Human Intelligence
The author explores the centrality of Human Intelligence in meeting the needs of the U.S. Army, the Department of Defense, and the whole of government. Such intelligence is essential to create a national security strategy, to define whole of government policies, to acquire the right capabilities at the right price in time to be useful, and to conduct local and global operations. He outlines 15 distinct types of HUMINT, four of which are classified (defensive and offensive counterintelligence, clandestine operations, and covert action), with the other 11 being predominantly unclassified. The author offers the U.S. Army an orientation to a world in which thinkers displace shooters as the center of gravity for planning, programming, and budgeting, as well as the proper structuring of mission mandates, force structures, and tactics and techniques to be used in any given mission area.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
21st Century Roles and Missions
Provisions of the Fiscal Year 2008 National Defense Authorization Act amend Title 10 of the US Code, mandating the Department of Defense (DoD) perform a review of the Services' roles and missions every four years, with the first review in 2008 and subsequent reviews occurring in 2011 and every four years thereafter. Additionally, it requires that the roles and missions of the DoD be organized into core mission areas and that each Service identify its core competencies and core capabilities that directly contribute to these core mission areas. More importantly, each service must demonstrate how its core capabilities and core competencies contribute to a core mission area of the DoD because the legislation mandates that the requirements, acquisition, and budgeting process will follow this organizational construct.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Arctic Security
This research examines the growing geopolitical uncertainty wrought by warming Arctic waters in an attempt to articulate a better US national strategy for the Arctic. It explores solutions to mitigate threats to national security while balancing economic rights and environmental responsibilities. This research uses the problem/solution method and assesses potential solutions based on four criteria for success. This strategy must: 1) Peacefully resolve territorial sovereignty issues and promote free trade economics. 2) Mitigate risks to human and environmental security in the region and around the globe. 3) Provide a long-term solution to the sustainable development of the Arctic. 4) Include a mechanism for enforcement and monitoring compliance. The fundamental finding of this research is that climate change in the Arctic should be seen as a warning and should underpin future security policy decisions. This necessitates a new paradigm in understanding not only the natural environment, but also the basic conduct of economics, politics, and science in developing an appropriate national security strategy. The thematic conclusions of this paper include the need for an ecologically-based economy, cooperative politics, and collaborative science, all of which are in the interests of national and global security.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Malacca Dilemma
China is strengthening diplomatic ties and building naval bases along the sea lanes from the Middle East. This "String of Pearls" strategy is designed to protect its energy security, negate US influence in the region, and project power overseas. China is rapidly building a blue-water navy, developing advanced missile technology, and stockpiling undersea mines to counter US Navy capabilities, especially in the event of a conflict over Taiwan. To counter China's growing naval power, the United States can exploit a critical vulnerability-China's dependence on sea lines of communication. Eighty percent of China's oil imports pass through the Strait of Malacca; the Chinese leadership calls this strategic weakness the "Malacca Dilemma." In conjunction with naval forces, land-based airpower offers a promising way to control key maritime chokepoints and trade routes. Land-based airpower proved a decisive maritime force in the war against Japanese shipping during World War II. China, like Japan at the start of WWII, is a rising Asiatic power with similar resource aspirations. Historical evidence suggests land-based airpower can control the littorals and cut China's "String of Pearls."This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Think Tank Agenda Setting
The idea that think tanks set the order of importance of issues seems fairly obvious--they are comprised of academics, revolving door administration officials, and other minds devoted to the full-time research and analysis of the issues facing our government and our world. They have the luxury of exploring a variety of options related to an issue and the resources to dig deeply and vertically into an issue versus the broader paintbrush strokes that official government agency and departments generally provide. In many respects, think tank influence is like that of the U.S. news media. Much like the news media, think tanks can highlight what they consider newsworthy and that highlighted information then becomes, by definition, news. American voters tend to perceive the big issues of the day as those issues on which the media focus. There has been a great deal of research and suggestion that it is the news media that are setting the public agenda in the United States. But it is not as simple as that. For example, why do the media focus on certain issues and not others? Is it due to the news value, which underlies the decisions the media professionals make? To what extent is the agenda set for the media? In some cases, organizations and individuals savvy to the business, play the media at their own game by taking advantage of news values--choosing to announce the details of an embarrassing report on the same day as another scheduled press announcement. This kind of activity is rampant in political campaign machines during election years in particular. In fact, the news media are generally exactly and only that--a medium for communicating the information of another source. To the extent an organization like the Council on Foreign Relations can influence the news media and the targeted government audience, the real source is often the think tank. Obviously, various think tanks focus on various different issues and for various effects. But once a think tank is firmly estaThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Study of the Need for Cross-Cultural Capability Development in the Members of the United States Military
The National Security Strategy of the United States has made it clear that the global war on terror knows no boundaries. In direct support of the National Security Strategy, the National Military Strategy has obligated US troops to combat terrorism wherever the need arises, as expeditiously as possible. This translates into the high probability of US Armed Forces rapidly deploying to parts of the world they know very little about. If the United States military does not educate its members in matters of culture during peacetime, there may not be time to educate them during times of conflict. Thus, the primary research question of this project is: Does the United States military need to better develop the cross-cultural capabilities of its members? To answer the primary research question, a research methodology was followed to ensure the available literature was researched and applied in a relevant and scholarly manner. The collected data was then analyzed and synthesized into conclusions and recommendations. The study concluded that the US military does need to increase efforts to develop the cross-cultural capabilities of its members. Additionally, the study recommends that a task force be created to create and implement training, and the task force be led by a qualified civilian to avoid unnecessary redundancies or individual service deficiencies.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
New Paradigm for the Iraqi Police
Policing can be an effective counterinsurgency tool. Police are able to determine the individual needs of each community and address each constituency's concern which in turn enhances the government's legitimacy. The Iraqi Police face the challenge of transforming themselves from an institution that served the state to an institution that serves the people. They have so far failed to achieve that paradigm shift. Commanders in the field that have recently executed the Police Transition mission, as well as experts in the Iraqi Police training process, admit that after years and millions of dollars in training and equipping, their developmental progress lags behind that of the military. Iraqi Police, however, have models of behavior they can rely on that are compatible with this change. Introducing the Community-Oriented Policing (COP) philosophy into their training may provide a reliable model of behavior to help the Iraqi Police accomplish this transformation. Their ability to change may have a direct impact on the legitimacy and success of the Government of Iraq (GOI). The success of the GOI may directly impact the United State's National Strategic Objectives.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Biopolitik
The long history of warfare reveals man's ingenuity for developing methods to triumph over other men. Nature possesses a similar ability to challenge human interlopers, and infectious disease joins warfare as a primary determinant of human affairs. Enlisting pathogens as weapons of war serves the pragmatic interest of gaining advantage over the enemy, and the specter of biowarfare endures in the modern era. Fundamental breakthroughs such as genetic engineering and the decoding of the human genetic blueprint usher in new possibilities for offensive weapons and the means to defend against them. America must now devise a practical approach to ensure its security in a modern world plagued by common access to potent bioweapons. This thesis investigates how the genomics revolution, or the transformation of modern bioscience, affects America's national security. The proliferation of advanced biotechnology equips state and non-state actors with the asymmetric means to challenge American interests, and in a world governed only by the security dilemma America must adopt a sensible posture towards biowarfare. Borrowing from the pragmatic doctrine of realpolitik, this thesis creates the term biopolitik to describe a realist approach to the promise and peril of biotechnology. Biopolitik demands an aggressive, resourceful biodefense to thwart the intent of modern adversaries, and this defense leverages new technology to detect, mitigate, and attribute biological attacks. Biopolitik also addresses the shortcomings of nuclear or conventional reprisal, and it examines the efficacy of including advanced bioweapons in America's strategic arsenal. This thesis also draws from the airpower experience to examine the nature of v asymmetric weapons and assess how America exploits technology to serve strategic objectives. The evolution of precision airpower portends the development of sophisticated bioweapons, and airpower's integration of offensive and defensive capabilities to pragmaticThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Analyzing the United States Air Force Organizational Structure -- A Case for Reorganization
The United States Air Force (USAF) faces a fiscally constrained environment today and will likely become even more constrained in the near future. With a reduced budget and important programs and critical functions that require funding, the USAF must find opportunities to save and reallocate these limited resources. This monograph will analyze the top-level USAF organization to address specifically whether organization and personnel changes can provide needed savings, while at the same time improving the USAF organization to support the combatant commanders and become more geographically focused to handle the complex global environment and nature of conflict. While the size of force and force structure have shrunk to the lowest points in USAF history, organizational analysis finds the USAF structure overmanned with staff officers and civilians. Further examination finds an organization with significant depth and primarily organized in a functional manner. Given these issues, this monograph proposes eliminating a layer of the USAF organization by removing major commands and promoting numbered air forces subordinate to the Headquarters USAF. This type of organization can better support combatant commands, advance USAF regional expertise and focus through the numbered air forces, adapt quicker to global situations, and also ensure important USAF history and traditions endure.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Effects of Deployments on Homestation Job Stress and Burnout
The Global War on Terrorism has increased the demands placed on military members. The increased rate of deployments, coupled with the reduction in resources, has military leaders concerned that these changing demands will cause undue strain, adversely affecting the military member's quality of life. This research tests the effects of active duty military deployments on homestation job stressors and burnout. Pre- and post- deployment surveys were administered to test for any significant changes that resulted from a deployment. A group of non-deploying members was also measured during the same time frame to serve as the control group. Results showed that deployments resulted in increased levels of two facets of job satisfaction and decreased levels of role conflict, emotional exhaustion, and burnout. The only significant change noted by the control group was a decrease in the level of organizational commitment. Therefore, despite the fact that military deployments can be extremely stressful themselves, they do offer some beneficial effects to military members upon return to their homestation environment. On the other hand, those who do not get a "break" from the everyday work environment either stay the same or show less desirable levels of job stress and burnout.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Understanding the Links Between Organized Crime and Terrorism in Military Operations
Organized crime is becoming a large-scale business that is conducting global commerce for the trafficking of illegal services and products as well as developing the associated supply chains. Criminal organizations are conducting commerce across traditional nation-state boundaries allowing criminal groups to work in coordination with other like groups; this coordination is called transnational crime. The United Nations (UN), aware of this activity, has stated that "the traditional hierarchical forms of organized crime groups have diminished; replaced with loose networks who work together to exploit new" markets of opportunity (UNODC 2006d, paragraph 2). These loose networks have many resources available to affiliates that include financial services, global transportation, and the weapons industry. Criminals, organized crime, and terrorist networks have access to these valuable resources via this affiliation. Currently: 1. Illegal drugs make up 8 percent of the world trade or $322 billion (Drug Policy Alliance 2004, paragraph 4) 2. Global prostitution industry is estimated to be $52 billion (Hughes 2000, paragraph 16) 3. Worldwide money laundering activity is at roughly $1 trillion a year (Ashcroft 2001, paragraph 4) 4. Weapons smuggling is a multi-billon dollar industry (UNODC 2006d, paragraph 3) Organized crime, consequently, may be used as a tool of war.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
What is the Role of the Joint Forces Air Component Commander as Airspace Control Authority During Stability Operations?
Airspace control is not a new concept and there has been considerable doctrinal development and discussion over the last 50 years. However, the role the joint forces air component commander as the airspace control authority during stability operations has not been explored. Airspace control has become increasingly complex due to the increase of unmanned aerial vehicles in use by the Army and other services. Differences in airspace control capability, the lack airspace control equipment, doctrine, joint training and common systems increase the difficulties for the joint forces air component commander to function as airspace control authority during stability operations. This analysis highlights the robust air control system employed during stability operations (counterinsurgency) in South Vietnam, but was not available for Operation Enduring Freedom and for Operation Iraqi Freedom after major combat operations ended and stability operations began. This study specifically highlights the lack of certain items of air control equipment, airspace control doctrine for stability operations, common systems, and robust joint training and offers recommendations for improving joint capabilities and doctrine.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
What is the Extent of Al Qaeda in the Islamic Maghreb and Where Does it Derive its Strength in the Sahelian-Saharan Region
While Algeria was facing internal security issues with illegal Islamist armed groups in the 1990s, some Sahelian-Saharan states were reducing their institutional presence in their border region with Algeria. Mali was demilitarizing its northern region in application of the peace agreement with the Arab-Tuareg rebellion, opening a large corridor to all kinds of smugglings and illegal activities. The Author used the RAND study's variable of ungovernability and conduciveness to analyze AQIM in northern Mali. The importance of kinship relationship in Somalia supported the emergence of a new variable called "Fortified Relationships". The objective of the study was to use the RAND's variables to do an analysis of AQIM's center of gravity. The conduciveness variables constitute AQIM's center of gravity critical capabilities and "Fortified Relationships" constitute its critical vulnerabilities. This emergent variable of "Fortified Relationships" seems to be a critical factor, at least in an African context, and warrants further study.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Terrorism Prevention
The 2002 US national security strategy is a proactive, world integrated strategy against terrorism. The US chose to highlight preemption as a viable option to deal with terrorists or rogue states. The aim of this thesis is to address the planning and execution of this policy at the operational level with regard to prevention more so than preemption. As such, strategic and operational decisions regarding actions to be taken against impending terrorist threats will need to be made to prevent the onset of hostile acts against the US. The decisions to act will also incur associated military and political risks. Once possible terrorist activity is detected, the US may choose to use diplomatic, economic or informational means but often the only sure means of stopping terrorist attacks will be by military means. This thesis addresses the unanswered operational level questions regarding the US strategy as well as the preventive military actions that the US and regional combatant commander can take to effectively mitigate the use of terrorism against America. The primary focus revolves around Special Operations Forces (SOF) capabilities and the circumstances to use them, as well as finding out how they fit into the grand scheme of the war on terrorism.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Policy Analysis of Chapter 101a
This research analyzed the United States Air Force's ability to meet the two conditions required for exemptions of critical habitat designations that are authorized under the National Defense Authorization Act for Fiscal Year 2004. The research was limited to natural resources management on United States Air Force training ranges. Department of Defense exemptions can only be achieved if specific conditions exist. The conditions require the development and management of an Integrated Natural Resources Management Plan that conserves threatened and endangered species and other natural resources to ensure the successful management of practices identified. The results of this project determined that United States Air Force's natural resources managers have Integrated Natural Resources Management Plans in place and have dedicated the resources to implement management polices identified in those plans. Electronic, internet-based surveys were used as the primary data collection tool. Phenomenological Analysis was used to perform an in-depth review of selected issues that were identified via the survey. Unexpected conclusions from this research highlighted a need for the United States Air Force to strengthen its education process for implementing new policies resulting from the implementation of the National Defense Authorization Act for Fiscal Year 2004.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Policy, Influence, and Diplomacy
"This study investigates how United States space systems can be used to directly achieve diplomatic objectives. While space systems are widely acknowledged as vital enablers of terrestrial-based forces, they are often overlooked as a critical component of national power capable of directly pursuing national objectives. A brief review of space doctrine and policy from the Department of Defense, Joint Staff, Unified Command, and Air Force perspectives reinforces the thesis that space systems' ability to independently shape events and achieve objectives, beyond their support to terrestrial forces, is overlooked. Historical precedent for the use of space systems and other military forces in directly supporting diplomatic objectives is then established through case studies on Sputnik's effect on global affairs, the use of U-2 imagery during the Cuban Missile Crisis, and the use of the United States Navy as a tool of diplomacy. The study then presents the Space-Diplomacy model that posits seven facets to the diplomatic power of space assets and shows when they can be effective over the spectrum of conflict: prestige, technology partnerships, access to space services, legal precedent, objective information, presence, and threat of punishment. Based on the model, the study offers six ways in which the United States could better leverage its existing space assets for diplomatic advantage."--Abstract from web site.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Negating the Threat of Libyan Weapons of Mass Destruction
The global war on terror illustrates a major change in the way the United States will use its military forces in the future. It is a war against not just governments but individuals with no solid national ties. The American formula for success in past wars will not work in the future, and its ability to recognize the enemy and the threat he poses will be critical to the country's ability to defend its national interests. Two of the biggest threats to peace and stability in the world today are terrorism and the proliferation of weapons of mass destruction (WMD). President Bush has made it clear that countries that support terrorism or acquire and use WMD represent the enemies of the United States and her allies. One such nation is Libya. Since coming to power in a coup in 1969, Libyan dictator Muammar Qadhafi has been on a collision course with American presidents angry over the dictator's support for global terrorism. They also recognized that Qadhafi's quest for nuclear, biological, and chemical weapons posed an unacceptable threat to peace in the Middle East.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Disentangling Jihad, Political Violence and Media
The entanglement of Jihad, political violence, and media has determined the lives of Muslims in Europe and the US over the past 20 years. This book unravels the nexus of these elements to critically examine how their conjunction is perpetuated, reproduced, or disputed. In 16 case studies, the contributors critically reflect on the identification of jihad with political violence, address the academic, legal, political and broader public production of knowledge on this topic, examine the aesthetic formations involved in the mediation and reaffirmation of this narrow understanding, explore the experiential worlds of people whose ideas and actions are labelled as and affected by notions of violent jihad, and illuminate the institutional and media contexts (e.g. of archives) in which an entanglement of jihad and political violence takes effect, with profound consequences. This volume decentres dominant discourses on so-called jihadist actors and deradicalization contexts to offer more nuanced understandings of the political and socio-cultural contexts.
Professionalism in the USAF
Decades ago, military sociologists predicted a rising trend among officers away from traditional institutional military values and toward more economically-based occupational values due to the effects of the transition from a conscription-based military to an all-volunteer force. Subsequent empirical research resulted in data that supports such predictions. More recent researchers have suggested that in addition to the all volunteer force, an increase on technology may also accelerate the trend toward occupationalism and away from traditional institutional military values and the warrior ethos that typically define successful military organizations. The officer corps may be particularly vulnerable to occupationalism due to increased technical specialization and the corporate mindset that is evolving within the service, potentially resulting in reduced organizational commitment and a greater reliance on extrinsic motivational incentives.The purpose of this study is to investigate the influence of rank structures on professionalism in the context of Moskos' institutional versus occupational (I/O) professionalism model. Previous studies utilizing the I/O model have been primarily limited to Air Force officers and suggest a trend toward occupationalism among this group. This study proposes that a much broader sample of Air Force personnel is required to determine the magnitude of this trend, both in the officer ranks as well as the NCO ranks. This study analyzes the roots of military professionalism, considers the impact of recent transformations in the military, and makes recommendations about enhancing professionalism within the Air Force among all ranks.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Creating a New Reality
Deception as a means to achieve surprise is a recurring theme in the history of warfare. Successful deception uses information to manipulate and shape an adversary's perception of the world to a viewpoint that creates an atmosphere in which the adversary acts in accordance to the deceiver's will. Deception is a complex problem that crosses the boundaries of several disciplines including sociology, psychology, and political studies. Today's information environment, however, demands a further examination of deception's relevance in the modern world. Given the technological explosion over the past two decades with respect to information flow and availability, certain questions arise. How do Information Age changes affect deception operations? Do they relegate deception to old world lore or does the increased access to knowledge and information increase deception opportunities and its effectiveness? In short, what effect does the Information Age have on the overall deception process and what are the ramifications for today's political and military strategists? In answering these questions, the deception process is simplified in a process model that encapsulates the core components of the information exchange and the interaction between deceiver and the target of the deception.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Changing Empires
The civil-military balances in Turkey and Iran are undergoing fundamental shifts. In Western democracies, civil-military relations are based on an ideal that the military should be subordinate to civilian authorities. While this may be the "norm" in the West, this is not so in Turkey and Iran. Given their directive to support and defend the ideals of their nation's founding leaders (Ataturk in the former case, Khomeini in the latter), the armed forces have sometimes acted independently of their civilian authorities. On occasion, this has led to direct conflict between the civilian and military leadership. In the past few years, however, Turkey's secular military has lost influence to the country's Islamist civilian leadership, while Iran's Islamic Revolutionary Guard Corps (IRGC) has gained against a civilian leadership that it believed was insufficiently committed to the values of the 1979 Islamic revolution. In recent months, this rebalancing of civil-military relations has altered the dynamics in a range of Middle Eastern countries. Under an Islamist government, Turkey has arguably moved away from Israel and towards Iran and Syria. In Iran, the IRGC's heavy hand in rigging the June 12, 2009 election resulted in massive popular protests against the government that continue despite the military's threats. As the two largest regional powers in the Middle East, these changes could have dramatic consequences for regional stability. In February 2010, the arrests of Turkish military officers and the IRGC's crackdown on protestors on the anniversary Iran's revolution provide additional anecdotal evidence that the civil-military balance in both countries is changing. What is needed is a concerted effort to look at the anecdotal evidence using civil-military relations models.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Think Tank Agenda Setting
The idea that think tanks set the order of importance of issues seems fairly obvious--they are comprised of academics, revolving door administration officials, and other minds devoted to the full-time research and analysis of the issues facing our government and our world. They have the luxury of exploring a variety of options related to an issue and the resources to dig deeply and vertically into an issue versus the broader paintbrush strokes that official government agency and departments generally provide. In many respects, think tank influence is like that of the U.S. news media. Much like the news media, think tanks can highlight what they consider newsworthy and that highlighted information then becomes, by definition, news. American voters tend to perceive the big issues of the day as those issues on which the media focus. There has been a great deal of research and suggestion that it is the news media that are setting the public agenda in the United States. But it is not as simple as that. For example, why do the media focus on certain issues and not others? Is it due to the news value, which underlies the decisions the media professionals make? To what extent is the agenda set for the media? In some cases, organizations and individuals savvy to the business, play the media at their own game by taking advantage of news values--choosing to announce the details of an embarrassing report on the same day as another scheduled press announcement. This kind of activity is rampant in political campaign machines during election years in particular. In fact, the news media are generally exactly and only that--a medium for communicating the information of another source. To the extent an organization like the Council on Foreign Relations can influence the news media and the targeted government audience, the real source is often the think tank. Obviously, various think tanks focus on various different issues and for various effects. But once a think tank is firmly estaThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Systems Approach to Urban Operations
This monograph describes a possible technique to allow military planners to identify key objectives that may be affected in gaining control of a city without destroying it. This technique involves viewing a city as a complex "system of systems" and offers the planner insights as to where to apply military means to achieve the desired ends. While much has been written on Effect Based Operations (EBO), this monograph attempts to "operationalize" the concept. It presents a planning technique to assist in identifying targets, understanding target interrelationships, and analyzing second and third order effects. This study uses the urban environment to present this planning technique. The primary research question is: Is it possible to seize and control a city without destroying it? The secondary question is: Is there a systems approach process to achieve military success in an urban environment? The purpose of this paper is to provide the operational commander with an approach to manage the complexity of the urban environment. It should provide the reader with a systems approach that is grounded in doctrine, a methodology to reduce complexity, and a practical planning approach to assist in urban operations. The systems approach discussed in this paper allows commanders to seize control of a city without destroying it. The approach can be seen as a graduated response matrix where critical requirements are affected in sequence in order to achieve a desired result. While it is impossible to determine to which threshold the adversary would relinquish his control of the city (aim), the systems approach does provide a method to gradually reach that threshold. In addition, the systems approach allows commanders to war-game and record the effects of an action throughout the entire greater system. This provides the commander with an analysis tool that captures potential second and third order effects that may or may not be desired. This is a technique that should be incorporateThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Defeating the United States With Radiological Weapons in Fourth Generation Warfare
On September 11th 2001, Al-Qaeda used the principles of fourth generation warfare (4GW) to achieve strategic effects that have cascaded throughout the United States. The devastating attacks could have been multiplied a hundred fold or more had each of the hijackers checked two bags each containing radioactive material. This paper addresses the possibility of a 4GW adversary launching a parallel radiological attack targeting the US economic system. An attempt will be made to determine if the effects of such an attack could strategically paralyze the US economy to the extent that the American way of life is significantly changed--a de facto "defeat of the United States." The methodology of the investigation will use the center of gravity analysis posed by Dr. Joe Strange coupled with Brig Gen David Deptula's effects-based operations model. In order to draw the conclusion, several historical examples will be extrapolated from in addition to an analysis of the likelihood of a 4GW adversary acquiring sufficient radioactive material to carry out a successful attack. Since September 11th 2001, the US government has trained its attention on terrorism and WMDs. The relevancy for understanding the principles of 4GW, radiological weapons, their effects, and the threats they pose has never been more urgent.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Unmanned Combat Aerial Vehicles
There will likely be political, moral, and social implications of UCAV employment that strategists and military commanders will need to pay attention to as they craft strategies for future conflict. UCAVs are a very appealing option for the politician faced with use-of-force decisions due to reduced forward basing requirements and the possibility of zero friendly operator casualties. The flexibility of the weapon system offers the politician a seemingly high degree of control over the process of war. Together, these advantages may make a politician more inclined to use force first rather than last. In the moral realm, UCAVs are neither immoral nor illegal simply because risk to one of the combatants is removed. Additionally, notions of chivalry and fairness are not good standards by which to judge this technology. The social impact of widespread UCAV employment on the operator is an area of further concern. Remote-control war, however, does not change the underlying assumptions that have been the basis for the military ethos in the past. The final chapter highlights the dynamic between political, moral, and social issues as it addresses a range of possible unintended consequences resulting from extensive UCAV employment.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
What is the Role of the Joint Forces Air Component Commander as Airspace Control Authority During Stability Operations?
Airspace control is not a new concept and there has been considerable doctrinal development and discussion over the last 50 years. However, the role the joint forces air component commander as the airspace control authority during stability operations has not been explored. Airspace control has become increasingly complex due to the increase of unmanned aerial vehicles in use by the Army and other services. Differences in airspace control capability, the lack airspace control equipment, doctrine, joint training and common systems increase the difficulties for the joint forces air component commander to function as airspace control authority during stability operations. This analysis highlights the robust air control system employed during stability operations (counterinsurgency) in South Vietnam, but was not available for Operation Enduring Freedom and for Operation Iraqi Freedom after major combat operations ended and stability operations began. This study specifically highlights the lack of certain items of air control equipment, airspace control doctrine for stability operations, common systems, and robust joint training and offers recommendations for improving joint capabilities and doctrine.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Should the Department of Defense (DoD) Establish a Unified Logistics Command (USLOGCOM)?
This monograph asserts that DoD should establish a Unified Combatant Command (COCOM)-level USLOGCOM. DoD should begin a deliberate 10-20 year process to establish a USLOGCOM. As an intermediate and immediate step, DoD should make the Defense Logistics Agency (DLA) an operational subordinate command of U.S. Transportation Command (USTRANSCOM). The monograph also makes additional recommendations that work toward an eventual USLOGCOM, including returning the Defense Contract Management Agency to DLA control and placing additional feeding and fueling functions in theater under DLA's control. The monograph relies on the large volume of existing work to arrive at the above recommendation. There is a clear majority of work calling for increased centralization of strategic logistics authorities. These previous studies were done by a wide variety of respected organizations including the Government Accountability Office, the Defense Science Board (DSB), the RAND Corporation, and monographs by graduate students. The DSB points out that recommendations for consolidation are consistent with their 1996, 1998, and 2001 studies on logistics transformation. The report pointedly asks, since these recommendations and the recommendations of other groups are consistent and not new, "Why has none of this been done before?" In an attempt to answer this question, they offer four possible explanations. First, stakeholders have felt no compelling reason (similar to a profit and loss statement in the private sector) to change to a more efficient organizational construct. Second, driven by risk avoidance and diffusion of authority in the logistics systems, decision times are too long. Third, the system is designed to focus on resource allocations principally to the Services rather than to mission priorities. Finally, the report states there is little incentive to use effective metrics to monitor resource utilization and then there is little, if any, consequence for not meeting or even settingThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Policy, Influence, and Diplomacy
"This study investigates how United States space systems can be used to directly achieve diplomatic objectives. While space systems are widely acknowledged as vital enablers of terrestrial-based forces, they are often overlooked as a critical component of national power capable of directly pursuing national objectives. A brief review of space doctrine and policy from the Department of Defense, Joint Staff, Unified Command, and Air Force perspectives reinforces the thesis that space systems' ability to independently shape events and achieve objectives, beyond their support to terrestrial forces, is overlooked. Historical precedent for the use of space systems and other military forces in directly supporting diplomatic objectives is then established through case studies on Sputnik's effect on global affairs, the use of U-2 imagery during the Cuban Missile Crisis, and the use of the United States Navy as a tool of diplomacy. The study then presents the Space-Diplomacy model that posits seven facets to the diplomatic power of space assets and shows when they can be effective over the spectrum of conflict: prestige, technology partnerships, access to space services, legal precedent, objective information, presence, and threat of punishment. Based on the model, the study offers six ways in which the United States could better leverage its existing space assets for diplomatic advantage."--Abstract from web site.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Covert Action Lead
Since the end of the "Cold War" in 1989, the Central Intelligence Agency (CIA) has had a reduction in its ability to perform its tenet missions: Foreign Intelligence Collection, Covert Action, and Counter Intelligence. This is primarily due to two reasons: insufficient resources (budget and manpower) to meet its current requirements and a shift in focus from Human Intelligence (HUMINT) to other forms of intelligence gathering. With the events of 11 September 2001, terrorism has seemingly surfaced as a top threat to the global community--especially the United States (U.S.). An effective method of infiltrating a terrorist network and neutralizing its capability is through HUMINT via Covert Action. Historically, the CIA has called upon the Department of Defense (DoD) to help with and augment Covert Action in the form of detailing. DoD, compared to the CIA, is resourced significantly greater in terms of budget and manpower. With respect to its training, skill sets and maturity, United States Army Special Forces are the most capable component of DoD to execute detailing for Covert Action. As the fear of terrorism continues to hold its place as an elevated threat to the U.S., combined with the decline in the CIA's ability to perform Covert Action, is it now time for Special Forces to assume the lead role in Covert Action?This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Preparing for the Inevitable
This monograph seeks to determine if the U.S. Army adequately prepares company grade officers to interact successfully with non-governmental organizations (NGOs) during humanitarian assistance and peace operations. It briefly analyzes the current operational environment and highlights that the U.S. Army is conducting Military Operations Other Than War (MOOTW) more frequently than in previous years. The author examines the culture and numerical explosion of NGOs and discusses their presence and participation in future operations. Using doctrinal information and the historical case studies of operations in Iraq, Somalia, and Haiti, successful and unsuccessful NGO-military interactions are examined. The author emphasizes the positive correlation that historically exists between effective interactions and mission success. Based on operational experiences, the unique knowledge and skills required for successful interactions with NGOs at the company grade officer-level are determined. Using this information as a baseline, the army's leader development system is analyzed and the author determines that the current system does not systematically prepare company grade officers for successful interactions with NGOs. In conclusion, recommendations are offered to improve company grade officer preparation for future operations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Alternate Futures for 2025
This paper serves as a transition piece between the Air Force 2025 and Blue Horizons futures studies, particularly in the area of study methodology. It reviews forecasting theory and methods to give the reader a general understanding of available long-term planning techniques. It analyzes the methodology used in Air Force 2025 and recommends changes for the follow-on study, Blue Horizons. With the retrospective advantage of a decade of past history, it evaluates Air Force 2025's alternate futures in terms of narrative, wildcards, and signposts. Finally, it assesses where the world of 2006 sits within the strategic planning space and where the world is trending. The paper concludes with five recommendations for Blue Horizons: 1) Institutionalize the futures process into Air Force long-range planning, complete with periodic reevaluations, 2) Use Air Force 2025 methodologies, with minor corrections, for Blue Horizons, 3) Reassess and update the key scenario drivers, 4) Use a Red Team to determine signposts for each of the worlds and use these markers for periodic reevaluation, and 5) Avoid including interim worlds in the study.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Analyzing the United States Air Force Organizational Structure -- A Case for Reorganization
The United States Air Force (USAF) faces a fiscally constrained environment today and will likely become even more constrained in the near future. With a reduced budget and important programs and critical functions that require funding, the USAF must find opportunities to save and reallocate these limited resources. This monograph will analyze the top-level USAF organization to address specifically whether organization and personnel changes can provide needed savings, while at the same time improving the USAF organization to support the combatant commanders and become more geographically focused to handle the complex global environment and nature of conflict. While the size of force and force structure have shrunk to the lowest points in USAF history, organizational analysis finds the USAF structure overmanned with staff officers and civilians. Further examination finds an organization with significant depth and primarily organized in a functional manner. Given these issues, this monograph proposes eliminating a layer of the USAF organization by removing major commands and promoting numbered air forces subordinate to the Headquarters USAF. This type of organization can better support combatant commands, advance USAF regional expertise and focus through the numbered air forces, adapt quicker to global situations, and also ensure important USAF history and traditions endure.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Modeling Homeland Security
The events of September 11, 2001 have propelled the topic of homeland security to the forefront of national concern. The threat of terrorism within the United States has reached an unprecedented level. The pervasive vulnerabilities of the nation's critical infrastructure coupled with the destructive capabilities and deadly intentions of modern terrorists pose extraordinary risks. The United States must mitigate these risks while at the same time balancing the associated costs and impact on civil liberties. Currently, the United States lacks effective methods and measure for assessing the security of the homeland from acts of terrorism. This study outlines a first cut decision analysis methodology for identifying and structuring key homeland security objectives and facilitating the measurement of the United States' capability to execute these objectives.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Knowledge Matrix Modeling of the Intelligence Cycle
This effort models information flow through the United States Intelligence Community's Intelligence Cycle using a knowledge matrix methodology. The knowledge matrix methodology takes explicit data from multiple sources and fuses that data to measure a current level of knowledge about a target, or situation. Knowledge matrices are used to develop a measure of user-needs satisfaction. User-needs satisfaction compares requested levels of knowledge to a probability of collecting that knowledge within a designated timeframe. This effort expands the work done by Captain Carl Pawling in his March 2004 thesis, Modeling and Simulation of the Military Intelligence Process, by modeling intelligence as an opportunistic, multi-source, multi-entity system of systems. The value of intelligence fusion is compared, and analyzed between three different algorithms; no fusion, a mixed forward and fuse strategy, and strict fusion strategy. These fusion algorithms are then applied to competing intelligence collection architectures in varying intelligence activity scenarios to determine which architectures will most improve the probability of satisfactory collection. Satisfactory collection is measured in terms of quantity, timeliness, and user-need satisfaction of completed intelligence reports.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Redefining the Global War on Terrorism
This paper argues that the development and implementation of a counter-insurgency strategy that fully integrates all elements of national power is critical to success in the Global War on Terrorism (GWOT). The paper discusses the flaws in declaring war on the method of terrorism rather than focusing on the actors or insurgents that use these methods. The paper analyzes Al-Qaida using the characteristics of successful insurgencies posed by Steven Metz and Raymond Millen in "Insurgency and Counterinsurgency in the 21st Century: Reconceptualizing Threat and Response." The analysis of the underlying social, economic and political conditions that support an insurgency, Al-Qaida's ideology, leadership and strategy, and the sources of support that enable an insurgency provide valuable insights in developing a strategy to defeat it. A review of the National Strategy for Countering Terrorism demonstrates an incongruence that limits its effectiveness as a blueprint for counterinsurgency. Recommendations include: the formation of a National Security Council Policy Coordination Committee to develop, implement and assess a counterinsurgency strategy integrating all aspects of national power; the reformation and revitalization of the executive branch, specifically the Department of State; and the development of military leaders with critical thinking skills and breadth of knowledge.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Waters Without Borders
In response to demographic forces, climate change, globalization, shifting societal values and norms, low rates of adoption of technological innovation, inadequate domestic and international laws, and market forces, pressures on water resources have increased to levels unprecedented in human history. Unanswered, the trend will accelerate in the future.Despite earlier perceptions that water scarcity most often leads to conflict, many recent studies conclude that cooperation is actually a more prevalent outcome in situations where two or more countries share water resources. Either way, future trends should not be overly predicated on past outcomes given that the anticipated scale of the impending water crisis exponentially outstrips scarcity conditions experienced to date. This paper explores possible future outcomes of interaction over shared international water resources based on two driving forces: governance and technology. Strengthened national and international governance can overcome geopolitical tendencies that would otherwise discourage cooperation. High levels of technological innovation, transfer, and adoption that increase water-use efficiency or available supply reduce immediate pressures and buy time for enduring cooperative mechanisms for governing shared water resources to develop. While universal cooperation over shared water resources is the obvious ultimate goal, the most immediate concern for the US is to prevent armed conflicts and widespread social upheaval in regions with overlapping US national interests. An understanding of what creates shared water resource "flashpoints" and the conditions that favor conflagration into larger regional conflicts is a valuable policy planning tool.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Policy Analysis of Chapter 101a
This research analyzed the United States Air Force's ability to meet the two conditions required for exemptions of critical habitat designations that are authorized under the National Defense Authorization Act for Fiscal Year 2004. The research was limited to natural resources management on United States Air Force training ranges. Department of Defense exemptions can only be achieved if specific conditions exist. The conditions require the development and management of an Integrated Natural Resources Management Plan that conserves threatened and endangered species and other natural resources to ensure the successful management of practices identified. The results of this project determined that United States Air Force's natural resources managers have Integrated Natural Resources Management Plans in place and have dedicated the resources to implement management polices identified in those plans. Electronic, internet-based surveys were used as the primary data collection tool. Phenomenological Analysis was used to perform an in-depth review of selected issues that were identified via the survey. Unexpected conclusions from this research highlighted a need for the United States Air Force to strengthen its education process for implementing new policies resulting from the implementation of the National Defense Authorization Act for Fiscal Year 2004.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
AEF Process
Following the Cold War, the United States reduced the size of its military. Much of the remaining force became home-based in the United States. The downsized Air Force had remained continually engaged in combat operations since 1991. In an effort to manage the operations tempo for Airmen and critical Air Force equipment, the Air Force implemented the Air Expeditionary Force (AEF) process. This process helped to better utilize the Air Force's limited assets while meeting the requirements of the Geographic Combatant Commands (GCC). Each AEF force package possesses capabilities to perform across the full spectrum of military operations. The AEF process enables the Air Force to present forces to a GCC rapidly in times of crisis. This paper examines how the AEF process improves the capabilities that the Air Force deploys to a crisis. To accomplish this, the paper performs a comparative analysis of crisis response with and without using the AEF process. Operation DESERT SHIELD provides an example of the Air Force's response to a crisis without the AEF. This historic case study is compared to a hypothetical response to a similar regional conventional crisis that utilizes the AEF process. This case study utilizes the joint functions-command and control, intelligence, movement and maneuver, fires, protection and sustainment-to analyze the Air Force's capabilities in these scenarios. This paper analyzes shortfalls in Air Force capabilities during the deployment to DESERT SHIELD.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Goldwater-Nichols Department of Defense Reorganization Act of 1986
The Goldwater-Nichols Reorganization Act (GNA) of 1986 was the most sweeping legislation related to the Department of Defense (DoD) organizational reform after World War II. With an overarching objective of enhancing "jointness", unifying the direction of the armed forces under joint doctrine and policies for the employmentof multi-service military forces, throughout the DoD, the practical purpose was to improve warfighting capabilities. This legislation was based upon implicit assumptions about threats and organizational needs which many feel have since changed. This report focuses on the joint officer personnel management aspects ofthe GNA legislation and on how officer personnel management has evolved as aresult of the mandates of the Act. As currently administered, DoD predicts that it is nearing a time of reporting non-compliance with certain provisions of the law. In addition, DoD finds that the law prevents the recording of some significant joint experiences for certain officers, and that the law prevents the utilization of technological advances in distributive and distance learning in association with joint professional military education. The report offers options for congressional consideration which would continue the status quo, would allow for changes in the law to maintain the progress in joint officer management which was originally envisioned, or would allow for additional study. This report will not be updated.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Command and Control of Airpower
Recent experiences in Operations Iraqi Freedom and Enduring Freedom have highlighted the need for adaptable and tailorable airpower command and control (C2) systems that can better serve the joint force across the entire range of operations. Though the Air Force has done a good job adapting the existing C2 system to the task, at times using a variety of control frameworks, it has not yet looked at future C2 requirements holistically in order to create a "toolbox of capabilities" that avoids the need for poorly optimized piece-meal or work-around solutions. Simply stated, as battlefield dynamics change and technology moves forward, air employment and its associated C2 systems must also change to remain relevant. The inattention has resulted in obsolete elements of the Theater Air Command System, Air Operations Centers funded at 50 percent (or less), poor command relationships, and an unwieldy C2 structure that is difficult to tailor for today's fight.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
21st Century Roles and Missions
Provisions of the Fiscal Year 2008 National Defense Authorization Act amend Title 10 of the US Code, mandating the Department of Defense (DoD) perform a review of the Services' roles and missions every four years, with the first review in 2008 and subsequent reviews occurring in 2011 and every four years thereafter. Additionally, it requires that the roles and missions of the DoD be organized into core mission areas and that each Service identify its core competencies and core capabilities that directly contribute to these core mission areas. More importantly, each service must demonstrate how its core capabilities and core competencies contribute to a core mission area of the DoD because the legislation mandates that the requirements, acquisition, and budgeting process will follow this organizational construct.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Conflict for Resources
This monograph discusses the propensity for conflict surrounding the diminishing water in Lake Chad. The shortage of water in the lake and its basin threatens regional economic development and the existence of the population in the area. The paper uses a comparative case study to determine the extent that states conflict over scarce natural resources. The first case study examines the dispute over possession of the Spratly Islands located in the South China Sea. The Spratly Islands and the South China Sea may possess significant oil and natural gas deposits. The island chain is also claimed by multiple states with interstate conflict between China and Vietnam over legitimate possession. The second case study examines the potential for conflict within the Lake Chad Basin. Lake Chad lies within four African states, Nigeria, Niger, Cameroon and Chad. These riparian states require water from the lake to support the population's drinking, agriculture, livestock and sanitation. Since 1960, Lake Chad's water has receded. Population increases, climate change, desertification, regional conflict and manmade water catchment projects compound the regional shortage of water.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
An Air Force for the Long War and Beyond
The Long War and the post-Cold War world in general demand that the U.S. military improve its ability to conduct effective Counterinsurgency; Stability, Security, Transition and Reconstruction; and Humanitarian Assistance. In practice, these operations have common elements and are closely related. This paper refers to them collectively as Extraordinary Operations (EO). Air forces bring vital capabilities to EO, but the U.S. Air Force has historically neglected their cultivation because EO requires fundamentally different ways of thinking, different skill sets, and different equipment - making them nearly antithetical to conventional operations. EO and building partner capacity (BPC) are fundamental elements of our strategy to win the Long War, but EO is so different from conventional operations and so historically vulnerable to neglect that the USAF should consider establishing an organization dedicated to EO that is focused on BPC. This paper presents an organizational concept for a Partnership Numbered Air Force and argues that it would meet national strategic guidance; assure proper professional development; improve EO skill, theory, doctrine and equipment; encourage better cooperation with other U.S. government agencies, IGOs and NGOs; provide better response to domestic emergencies; and would provide national leaders and combatant commanders with low-risk, high-payoff engagement options. Such an organization would be the Air Force's most effective weapon in the Long War and beyond.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Mitigating Insider Sabotage and Espionage
The security threat from malicious insiders affects all organizations. This problem is difficult due to the fact that there is no definitive profile for malicious insiders, organizations have placed trust in these individuals, and insiders have a vast knowledge of their organization's personnel, policies, and information systems. The purpose of this research is to analyze to what extent the United States Air Force (USAF) security policies address this problem. The policies are reviewed in terms of how well they align with best practices published by Carnegie Mellon University and additional factors this research deems important, including motivations, organizational priorities, and social networks. This research offers actionable recommendations that the USAF could implement in order to better prevent, detect, and respond to insider attacks. The most important course of action is to better utilize its workforce.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Strategic PSYOP
Psychological Operations (PSYOP) is a cornerstone of the United States'; Information Operations and is a combat multiplier. As defined by Joint Doctrine, Psychological Operations (PSYOP) are operations planned to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals. A Strategic PSYOP organization is necessary to breach the gap between diplomatic and political statements and actions and those statements and actions by military organizations. To be effective, PSYOP must operate in, with and amongst the national leadership and governmental organizations. Current operations in the Global War on Terror focus on the need to coordinate, integrate and conduct Psychological Operations at the strategic level. Throughout the 20th century, PSYOP has been a strategic enabler, enabling military and civilian forces to focus their efforts. PSYOP's importance has increased and decreased throughout the latter part of the century. The galvanizing events of September 11, 2001 bought a new focus to PSYOP and strategic information coordination. A Strategic PSYOP Unit will provide the focal point to coordinate various governmental organizations and national leadership directives into a cohesive, integrated PSYOP program. The majority of PSYOP expertise resides within that Army; however, manning a strategic PSYOP organization must be a joint endeavor. This provides for full participation from the Services, incorporating their unique capabilities. A joint strategic PSYOP organization will take time to implement, as the required skills and experiences must be grown throughout the Services. Ultimately, a Joint Strategic Psychological Operations Unit will provide the coordination and knowledge support required to the interagency and national leadership.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Devils in the Dialogue
The Air Force began its existence in 1947 as a bright star with almost limitless potential to defend the nation. Today, however, the Air Force appears to struggle in communicating its value and trustworthiness, and congressional support has waned. The relationship is strained if not adversarial. The more effectively the Air Force engages with Congress, the better the Air Force can posture to defend national interests. The intent of this paper is to understand the current relationship between the Air Force and Congress and determine if this relationship is configured in optimum fashion to contribute to the nation's security. This paper concentrates on the Air Force's Legislative Liaison (SAF/LL) office as a conduit to effectively communicate the Air Force's needs to Congress, which is vitally important during periods of struggle. A focused review of current interactions, both formal and informal, as well as comparison with the other services, will highlight strengths and weaknesses within the Air Force's Legislative Liaison office and it's ability to provide Congressional support. Synthesis of the information provides recommendations for the Air Force to better coordinate its strategic messaging and methodology with Congress via the legislative liaison office. The SAF/LL office has a unique opportunity to bridge the gap between the two organizations and eliminate the devils in the dialogue.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Dehydrated National Security
This study explores water scarcity as a threat to US national security. The region in question is the "arc of instability" extending from North Africa to China. Given the wide array of US interests in this region, the study specifically addresses the question; "Does US national strategy provide the most advantageous approach to protect national security interests in an increasingly water-scarce world?" Three major conclusions surfaced. First, water scarcity is an emerging problem that is destabilizing and threatens US interests. Second, current water policy is bared solely on a moral imperative to help the needy but stops well short of addressing water scarcity as a security threat either now or in the future. Third, advancing and protecting US interests will become more difficult as scarcity becomes more acute in the first quarter of this century. The study begins with a primer on water availability and its destabilizing nature. Next, four root causes of scarcity are classified and then related to US national interests. The assessment that US strategy does not address scarcity results from an examination of primary sources of current US strategy. Finally, critical elements pertinent to a security strategy that addresses the threat of water are offered along with areas for further study.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Harnessing the Military's Voice
Since 9/11 many articles have been written, studies undertaken and recommendations made in an effort to repair America's hemorrhaging public diplomacy (PD) capabilities. However, these efforts, intended to serve as holistic reviews of the U.S. public diplomacy apparatus, fail to adequately address the existing shortcomings within the Department of Defense (DoD) or, more importantly, to truly explore methods to better harness the military's significant potential to enhance the country's public diplomacy capability. Its size, budget and overseas presence make DoD perhaps the most powerful voice for U.S. public diplomacy, which in turn warrant a more detailed and critical review of its role and capabilities. To gain a full understanding of the issues and gather information relevant to making the recommendations included in the report, the authors conducted: " A thorough review of existing public diplomacy studies, draft directives, policy proposals and scholarly writings, with particular focus on those findings and recommendations that addressed the military " A review of existing doctrine and training programs to discern the extent to which they addressed public diplomacy " Interviews with relevant DoD, Department of State (DoS), Defense Science Board (DSB) and other agency officials and public diplomacy experts to gain insights into current efforts and challenges associated with DoD's attempts to define its public diplomacy role " Interviews with selected military leaders to garner insights from their personal experiences during recent deployments The authors then analyzed the available data to determine the key findings suggested by the information and developed a set of specific recommendations matched to each of the findings. This study, while not sufficiently comprehensive to address every aspect of DoD's public diplomacy task, does discern a number of significant issues that, if addressed, would likely improve both the military's ability to win heart minds andThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.