Leveraging Operational Preparation of the Environment in the GWOT
USSOCOM's effective execution of operational preparation of the environment (OPE) is a critical component in the strategy for winning the Global War on Terrorism (GWOT). OPE is a series of activities that seek to enable future operations by allowing U.S. Department of Defense (DOD) personnel to enhance their situational awareness and understanding within an area of interest and improve operational responsiveness. Joint Publication 3-13 defines OPE as "non-intelligence activities conducted to plan and prepare for potential follow-on military operations" conducted under Title 10 authority. Through predictive analysis and preemptive action, the United States can identify potential terrorist support areas, enhance situational understanding of these regions, and set the conditions to find, fix, and finish terrorists in these locations as or even before they take root. Conducting OPE in concert with our host and partner nation allies in areas of current or potential future terrorist activity is the means by which we can unobtrusively enhance our situational understanding and expedite the targeting and destruction of terrorist networks. OPE does fulfill key requirements outlined in the various national strategies to include disrupting and destroying terrorist organizations of global reach, denying safe haven, sustaining our intelligence advantage, and posturing for strategic uncertainty. It is an excellent method of achieving situational awareness and understanding, extending operational reach and responsiveness, and ultimately shorting the time between find to finish. Maximizing the effectiveness of OPE in support of the GWOT will require the following measures. Although USSOCOM has in fact developed a comprehensive unconventional warfare campaign plan and an OPE planning framework it would benefit from having an OPE specific campaign plan that operationalizes OPE in an effort to both guide its conduct and synchronize its effects. A comprehensive OPE campaign plan wouldThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Joint Logistics Component Commander and the Mobility Air Forces
Though joint operations have been the hallmark of U.S. military doctrine for many years, a systematic study of joint logistics and the role of the U.S. Air Force has not been undertaken. This neglect has allowed a significant question to remain unanswered, specifically, Would the theater Commander-in-Chief (CINC) benefit from a codified, doctrinally supported theater logistics commander? Moreover, no study has looked at this question from the unique perspective of the mobility air forces (MAF), and their role in joint theater leadership. This study grappled with the question of joint theater logistics command and control, especially from the MAF point of view. It looked at whether there can be a logistics component, if it could bring any benefit to the CINC, and finally, how the mobility air forces would be effected. A logistics component can exist: U.S. law allows a logistics component and doctrine supports its creation as an option for the CINC. OPERATIONS DESERT STORM, RESTORE HOPE and JOINT ENDEAVOR show that the U.S. has successfully used a theater logistics organization and that the concept works. These same examples also show how an ad hoc organization has serious shortfalls in the support it can provide. Current leadership is pursuing theater logistics implementation as shown by joint vision statements and the logistics plans of the various CINCs. A logistics component can bring benefits to the CINC. The JFLOGCC controls the logistics process from the theater and prevents any confusion about the requirements and priorities of the CINC.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The PLA at Home and Abroad
The chapters presented in this volume have demonstrated first, Chinese and PLA leaders have a strong sense of mission and concern for China's security and well-being. Second, the PLA is committed to the transformation in military affairs with Chinese characteristics. Third, the PLA is eager to learn from the U.S. military to expand and improve its operational capabilities. Finally, the PLA has made progress in its transformation and operational capabilities. For a long time, American leaders have been surprised with the PLA's advances. This volume (and many of the previous volumes from past PLA conferences) show that these advances did not come out of the blue. Although much of the learning and many of the improvements are still far from what is desired (from Chinese expectations and American critiques), and some of the learning has even created contradictions for the PLA, these persistent and diligent learning practices will eventually bring the PLA to a higher level of proficiency in its capabilities. The emergence of a much more sophisticated PLA in the coming years should not be a surprise.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Anti-Terror Lessons of Muslim-Americans
The National Institute of Justice (NIJ) is the research, development and evaluationagency of the US Department of Justice. The NIJ is dedicated to improvingknowledge and understanding of crime and justice issues through science. NIJprovides objective and independent knowledge and tools to reduce crime andpromote justice, particularly at the state and local levels. Each year, the NIJ publishes and sponsors dozens of research and study documentsdetailing results, analyses and statistics that help to further the organization'smission. These documents relate to topics like biometrics, corrections technology, gun violence, digital forensics, human trafficking, electronic crime, terrorism, tribaljustice and more. This document is one of these publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Active Duty Military Deployments
To explore the possible respite effects of deployments, active duty Air Force acquisition support personnel who were either scheduled to deploy (n=74), or recently returned from deployment (n=34) were surveyed. Analysis of variance compared the pre- and post-deployment group's perceived levels of burnout, emotional exhaustion, role ambiguity, role conflict, self-efficacy, organizational commitment, contingent rewards, operating conditions, co-worker satisfaction, and overall job satisfaction. Although the results indicated the differences were not large enough to be significant, many of the variables behaved as hypothesized. Specifically, burnout, emotional exhaustion, role conflict, contingent rewards, and co-worker satisfaction were all higher in the post-deployment group. Implications of the findings are discussed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
INSS China Strategic Perspectives 2
The Institute for National Strategic Studies (INSS) is National Defense University's (NDU's) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Force Protection
Force protection in the Air Force has taken on greater significance in the new, but well overdue, recognition of its contribution to air and space power. It now has higher priority than ever with senior leadership, extensive research and development efforts are ongoing, and a Force Protection Battlelab has been established--all focused on this one complex mission. Herculean efforts by the entire DoD, particularly since the 1996 bombing of Khobar Towers, have resulted in the publishing of literally thousands of pages on program guidance at all DoD levels. Unfortunately, the terms Force Protection and Antiterrorism are now nearly synonymous. This limited program focus does not facilitate a structure designed to ensure a true force protection effort, especially considering the challenges faced by today's Expeditionary Aerospace Force. The purpose of this study is to review existing force protection programs and ongoing initiatives, and then attempt to contribute to further program development from a "bottoms up" perspective. The "bottom" in this case is the base level support group commander. The challenges facing support group commanders in today's Air Force are great, perhaps too great. Managing support operations at permanent main operating bases with all its built-in support structure is one thing. Leading deployed support operations, of which force protection is just one aspect, is another. Simply stated, current expectations of the support group commander are unrealistic and doomed to failure. This study reviews current USAF force protection documentation through a literature review and then proposes a systematic approach to program development designed to enhance synergy in force protection operations. It maintains throughout that the key to effective force protection operations is the role played by the combat support commander.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Planning for Psychological Operations
It is incumbent upon the state to gain support for national objectives. Employment of instruments of power is designed to influence other nations and organizations to respond favorably. Therefore, impacting the decision making process is the underlying principle for IOP power projection and highlights the psychological element. During a period of declining resources and increased world competition, the United States must find new ways to reach out and promote American interests. In order to maximize the impact and exploit the influence events create, joint planning and interagency coordination of psychological operations are critical. The current ad hoc interagency coordination and joint planning process do not maximize the psychological factors' impact and fully exploit its asymmetrical influence on a target audience's decision making process. Traditional views towards concepts, particularly military PSYOP, do not lead to the innovative solutions demanded by an environment of declining funds and resources. This study recognizes the multidimensional aspect of military PSYOP and calls for redefining an area of operations that has changed little over the years. Additionally, the establishment of an organization responsible for the development of a national marketing strategy integrating all IOPs to achieve objectives beyond the tactical level is advocated. Reviewing subject matter literature from the last forty years provided the project's basis for concepts relating to PSYOP and the Soviet missile gap deception case study. Internet searches, interviews, and recent literature brought current issues to light and developed a picture of U.S. organizations involved in influencing target audiences.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Biopolitik
The long history of warfare reveals man's ingenuity for developing methods to triumph over other men. Nature possesses a similar ability to challenge human interlopers, and infectious disease joins warfare as a primary determinant of human affairs. Enlisting pathogens as weapons of war serves the pragmatic interest of gaining advantage over the enemy, and the specter of biowarfare endures in the modern era. Fundamental breakthroughs such as genetic engineering and the decoding of the human genetic blueprint usher in new possibilities for offensive weapons and the means to defend against them. America must now devise a practical approach to ensure its security in a modern world plagued by common access to potent bioweapons. This thesis investigates how the genomics revolution, or the transformation of modern bioscience, affects America's national security. The proliferation of advanced biotechnology equips state and non-state actors with the asymmetric means to challenge American interests, and in a world governed only by the security dilemma America must adopt a sensible posture towards biowarfare. Borrowing from the pragmatic doctrine of realpolitik, this thesis creates the term biopolitik to describe a realist approach to the promise and peril of biotechnology. Biopolitik demands an aggressive, resourceful biodefense to thwart the intent of modern adversaries, and this defense leverages new technology to detect, mitigate, and attribute biological attacks. Biopolitik also addresses the shortcomings of nuclear or conventional reprisal, and it examines the efficacy of including advanced bioweapons in America's strategic arsenal. This thesis also draws from the airpower experience to examine the nature of v asymmetric weapons and assess how America exploits technology to serve strategic objectives. The evolution of precision airpower portends the development of sophisticated bioweapons, and airpower's integration of offensive and defensive capabilities to pragmaticThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Africom
United States Africa Command AFRICOM promises to be a different kind of command that will take a non-traditional approach to solving African problems and achieving U.S. objectives on the continent. This unique mission includes a multi-agency and multi-organization approach. AFRICOM has incorporated within its ranks representatives from other US government agencies as well as non-governmental organizations (NGOs). And, as it sets out to achieve its goals of security and stability, AFRICOM will attempt to use non-kinetic means. It will focus on security, stability, and conflict-prevention. To achieve these objectives AFRICOM plans to utilize security cooperation, crisis response, humanitarian assistance and civil-military affairs projects as its weapons of choice. In essence this "sunshine and love" policy is an extension of the Combined Joint Task Force-Horn of Africa (CJTF-HOA) model, but is it an effective strategy for AFRICOM to us throughout the continent? CJTF-HOA was established to combat terrorism though promoting regional cooperation, good governance, stability, and development. This non-traditional military mission was intended to counter extremism and militant Islamism by preventing safe havens for terrorists and promoting US goodwill through civil military affairs projects. In order to assess the CJTF-HOA model as a strategy for AFRICOM, this paper looked at common critiques of military intervention in humanitarian affairs and information operations in Kenya, Ethiopia, and Djibouti as well as key issues in the Horn of Africa such as good governance in Ethiopia, problems in Somalia, and piracy. After reviewing these areas, it is clear that the CJTF-HOA model can be effective under certain circumstances. But, because the CJTF-HOA model requires that which AFRICOM aims to achieve, namely security and stability, it is unsuitable for AFRICOM to use as a model throughout the continent.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
United States Preparedness to Respond to a "Mumbai-Style" Attack Within the Homeland
"American homeland defenders are quick to criticize the Government of India's (GoI) counterterrorism techniques, or lack thereof, in response to the attacks in Mumbai last November. But there are two major gaps in the areas of 1) Federal authority and 2) State and Local authority if the "whole of U.S. Government" was required to counter a "Mumbai-style" assault in the United States. This study will outline the Mumbai attacks, examine a homeland defense simulation mandated by the National Security Council (NSC) to amplify these gaps, and recount recent success stories demonstrating what departments and agencies are doing to remedy these two deficiencies."--Abstract from web site.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Total Force Integration
The United States Air Force Reserve Component (RC) has moved from a Cold War strategic reserve posture to an ongoing operational mission. This change in posture necessitates a critical examination of the current Air Reserve Component structure. This paper seeks to examine the relevance of the traditional strategic structure for the future of the Total Force. Specifically, the Total Force Integration (TFI) requires the USAF to apply the correct mix of missions and roles to the Reserve Component through the effective implementation and expansion of the associate program between the active duty component (AC) and the reserve component. This paper will review the historical aspects of TFI and the associate program. It will present the causal aspects leading to the need for TFI and the associate program, while revealing benefits and challenges that are presented by associations. Finally, it will recommend the proper mix of missions and recommendations for TFI and the associate program to succeed under the current operations tempo and into the future.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Case Study on the U.S. Policy in Humanitarian Intervention
In the past 16 years, the U.S. has intervened militarily in approximately 20 crises ranging from feeding the Kurds in Iraq in 1990 to ousting a corrupt regime from Haiti in 2004. Given the current international security environment, it is likely that the U.S. will continue to intervene militarily in non-permissive environments to provide humanitarian assistance. Therefore, theU.S. must develop a current policy to address such why, when, and how the U.S. will participate in such operations. Analysis of case studies of humanitarian intervention (HI) in Somalia, Rwanda, and Liberia provides lessons learned to identify the conditions for U.S. participation and to shape the policy necessary for those participations. Although many lessons can be learned from analyzing these case studies, this paper addresses only those lessons crucial to developing a coherent HI policy. Lessons include ensuring a linkage to national interests and security, ensuring the HI addresses the root-cause of the conflict, accepting that HI risks American lives, and ensuring the appropriate allocation of national resources. Finally, the paper provides six recommendations in developing a coherent HI policy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Focusing Arctic Policy
Rising global temperatures are contributing to unprecedented recession of Arctic sea ice. This environment is providing new opportunities for Arctic development and, more importantly, access to Arctic sea lanes that were previously of limited utility. As Arctic waterways open, the U.S. must ensure full access to these global commons in order to bolster its own economic prosperity and support the global economic system. Disputes over appropriate use of Arctic resources and waterways are most likely to erupt between the three major Arctic powers ? the United States, Canada and Russia. Canada and Russia have made excessive claims in Arctic waters, designating the Northwest and Northeast Passages as sovereign areas. In order to delegitimize these claims and protect its Arctic interests, the U.S. must take coordinated diplomatic, economic, and military action. First, the U.S. should develop an interagency office for Arctic issues to coordinate its Arctic policy and implement actions directed by National Security Policy Directive 66. It should take a measured approach to the United Nations Convention on the Law of the Seas, understanding its impacts on U.S. Arctic and global interests. It should strengthen the Arctic regime by participating fully in the Arctic Council while investigating other institutional options for issues beyond the Council's charter. Economically, the U.S. should research deep water port options in Alaska, cooperate on development of Canadian and Russian ports, and investigate joint development of icebreaking vessels. Militarily, it should develop SAR capabilities and bases with Canada and Russia, and improve military to military contact.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
International Armament Cooperative Programs
The Joint Strike Fighter international program is unique; indeed there is no other example of a U.S. major prime contractor co-developing and co-producing a U.S. combat aircraft with other foreign entities. Consequently, the program provides an excellent model to evaluate in view of the new Department of Defense international acquisition strategy requirements. This paper is a preliminary analysis that seeks to answer the questions: what are the benefits and liabilities of the JSF international acquisition approach thus far, and what are the necessary precursors or conditions that should exist for future international cooperative programs to have the best chance of success? Such answers are relevant given that DoD now looks to international armament cooperative programs as the first option for future weapon systems acquisition strategies. Finally, the paper will identify barriers that are 'hard-wired' into our acquisition regulations, policies and statues that restrict cooperation, fail to take advantage of the global defense industrial market, and are antithetical to our National Security Strategy coalition goals. The paper concludes with recommendations intended to improve the success for future international cooperative initiativesThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
To Know Thy Enemy
This study examines the role of sociological intelligence in strategy development. It proposes a methodological approach to examining the socio-cultural dynamics at work within an adversary society and makes recommendations to improve sociological intelligence collecting to enhance United States strategy. Strategy in ancient Rome and U.S. policy in Iraq are used as case studies to illustrate successful and unsuccessful techniques. By providing a scholarly and analytical framework for approaching the complex questions relating to sociological and cultural intelligence, this work gives policy makers, strategists, and intelligence personnel the insights they need to incorporate these critical facets of the enemys essential dynamics into strategic and operational plans.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Guidelines for a US Counterpropaganda Strategy to Defeat Al-Qaeda Recruiting
This study evaluates the counterpropaganda strategy to defeat al-Qaeda recruiting and suggests new strategy guidelines based on an analysis of historical case studies. The author evaluates the counterpropaganda campaigns during WWI, WWII, and the Cold War in terms of ideology and purpose, context, target audiences, organization, media techniques, and effects and evaluation. The conclusion is five guidelines distilled from the case studies for a new counterpropaganda strategy. There are fundamental problems with the current US approach to al-Qaeda counterpropaganda strategy. Two related problems are the current organizational structure and policy for counterpropaganda. The US must adopt a counterpropaganda strategy that disaggregates al-Qaeda organizations and focuses on regional audiences susceptible to al-Qaeda influences. Furthermore, the US needs to adopt a cognitive approach to counterpropaganda.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Extremist Islamic Terrorist Organizations
Extremist Islamic Terrorist Organizations: Dangers for the Present and Future Al Qaeda (AQ), an Extremist Islamic Terrorist Organization (EITO), conducted a series of then unimaginable terrorist attacks on September 11th 2001 all without the benefit of any non-traditional Muslim recruits. AQ has since indicated that they want to continue to attack the United States (US) directly in their "jihad" against the West. Thus, future attacks within the US are a near certainty. US counter-terrorism efforts to date have been reactionary and occur only after terrorists have been recruited, organized, and trained. To develop an adequate counter-terrorism program, the US must make a concerted effort to interdict EITOs before they begin to plan future attacks. Optimally, this means preventing potential recruits from joining EITOs. To accomplish this, analysts need to fully understand EITOs ideological goals, which in turn helps explain what these terrorist organizations are attempting to achieve when recruiting as well as why, how, where, and who they are recruiting. An examination of the history, leadership, and ideological goals of the first EITO, the Muslim Brotherhood as well as AQ, currently the most active and violent EITO, establishes a basic understanding of the ideological goals of most EITOs. Indications are that most EITOs have similar ideological goals calling for the advancement of Islam and a greater Islamic Nation. This postulation warrants additional examination as understanding what each EITO wants to achieve is critical in developing adequate counter-recruiting and counter-terrorism strategies. Analysis reveals EITOs conduct a multifaceted recruiting campaign.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Guilt by Association? A Blending of Air Force Cultures
With long-standing, historic culture differences, legal restrictions, and different functional chains of command, can Air Force Active Duty, Air National Guard, and Air Force Reserve personnel co-exist as part of the same operational unit to form an effective warfighting team? This paper will utilize the Problem/Solution Research Methodology to present the key to break the cultural barriers of Total Force Integration. It is imperative that Air Force leaders understand how to overcome the limitations and synergize the diverse strengths of both the active duty and Citizen Airmen1 culture to develop an operationally effective warfighting team.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Don't Ask, Don't Tell
Homosexuals (to include bisexuals) are currently serving their country as members of the United States military. The existence of homosexuals in the military is not a new reality and the acceptance level of their military service has shifted over the years in an increasingly positive manner. An indicator of this acceptance level has been the government's policy for homosexuals in the military. The current policy enacted by President Clinton in 1993 opened the door for homosexuals to serve in the military on the condition that they refrain from revealing their homosexuality. The policy, commonly referred to as "Don't Ask, Don't Tell," was a compromise between President Clinton's desire to lift the ban entirely and end homosexual discrimination, and concerns by members of Congress and the military. One of the primary concerns voiced by Congressional and military members was the perceived negative affect allowing homosexuals to openly serve would have on good order and discipline.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Alternate Futures for 2025
The importance of long-range planning has never been greater due to thedwindling resources dedicated to defense, debates over roles and missions, and the changing security environment. In response to this need, the Air Force embarked on a wide-ranging effort to improve long-range planning. The Air University-hosted project, Air Force 2025 (or simply 2025 to capture the joint nature of air and space power), looks 30 years into the future and identifies the systems, concepts of operation, and technologies required to ensure the US possesses the dominant air and space forces in the future.In order to envision the world of 2025, the study had to make predictions. Futurists use several methods to "forecast" the future. The approach used for the 2025 study creates alternate futures by examining trends, studying the work of respected futurists, considering surprises and "wild cards," and conducting analyses to identify the factors, or "drivers," that will be major contributors to change.To be effective for planning, these drivers must encapsulate the majorforces likely to shape the world of 2025 and be relevant to theorganization. After extensive analysis, the Alternate Futures' teamidentified American World View, Delta TeK, and World Power Grid as the most important drivers affecting the future and relevant to air and space power. American World View is the US perspective of the world and describes American willingness and capability to interact with the rest of the world. Delta TeK is the differential in the rate of growth and proliferation of technology. World Power Grid describes the generation, transmission, distribution, and control of economic, political, and military power throughout the world.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Improving Risk Education to United States Citizens About the Weapons of Mass Destruction Threat
United States (US) citizens must receive personalized risk education about Weapons of Mass Destruction (WMD) threats, thereby creating a potent deterrent to would-be terrorists: a strong, confident citizenry armed with the correct steps to take in the event of a WMD attack. The US Department of Homeland Security's (DHS) Color-Coded Threat Level System communicates to the public the risk of a terrorist attack and preparatory steps to take in order to reduce the likelihood or impact of the attack. The terrorist attack threats include the use of WMD. The problem is that the color-coded system does not offer personalized risk education to the public regarding the WMD attack threat. An announcement of a change in the threat level is not met with discernible reaction from the public to implement preparatory steps. No one seems to know what moving up or down the color-coded system means to them personally, much less what they are reasonably expected to do.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Air Occupation
Asking the right questions. The adage "be careful what you wish for--you may get it" should be on the minds of airpower advocates coveting the air occupation mission. It may be a double-edged sword that expands the relative influence of the U.S. Air Force, but also saddles it with a complex, persistent, and costly mission. The U.S. Air Force must ensure it asks the right questions before embarking on a serious campaign to "win" the air occupation debate. What do we mean by the term air occupation? The term air occupation can be very perplexing. Unfortunately, neither the term air occupation, nor the word occupation, is defined in Joint or Air Force doctrine. Of the many historic occupation objectives, air occupation most likely applies to less intrusive scenarios that attempt to coerce, enforce sanctions, or create buffer zones. Probable air occupation tasks to achieve these objectives would include a combination of presence, intelligence, surveillance, reconnaissance, psychological operations, humanitarian airdrops and airlift, and punitive strikes.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Role of the Armed Forces in Indonesia
Indonesia is a strategically important country, rich in natural resources, sitting astride a critical chokepoint, the Strait of Malacca. Demographically, it holds the important distinctions of being the fourth most populous country in the world and the world's most populous Muslim country. Traditionally, Indonesia has embraced pancasila, a secular tradition which respects all religions equally, not favoring one over another. The first portion of this paper defines fundamentalism, explores the Indonesian version and what role the armed forces plays in preventing the spread of fundamentalism. The second section examines military professionalism, comparing the Indonesian variety to the Western model, and what role this professionalism plays in national stability. Inferring that the military enhances stability, the final section examines the country's stability from an empirical viewpoint. Indonesia emerged from the thirty-plus year Suharto dictatorship in 1998. Throughout Suharto's rule, the military proved to be a substantial element of his power base, yet fissures in this base helped contribute to Suharto's demise. Since 1998, various political parties have flexed their muscle as they jockey for position in the nation's new democratic hierarchy. Of these parties, those with a fundamentalist orientation prove worrisome from the United States' perspective in the Global War on Terrorism. Terrorist attacks carried out by fundamentalist groups in Bali and Jakarta in recent years highlight the potential threat. The Indonesian military, the TNI, has embraced the notion of dwifungsi, or dual role in its complex interaction with Indonesia's people and government. This dual role ensured the military's omniscient role in politics and the economy, particularly in the Suharto era. Using Professor Samuel Huntington's model of the western military professionalism, we clearly see that this dual role has resulted in questionable professionalism in the TNI. Consequently, now thdemocThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Weapons of Mass Destruction Civil Support Teams
If you believe weapons of mass destruction (WMD), chemical, biological, radiological, nuclear and high-yield explosives (CBRNE), exist and pose a threat to this country and our way of life, this paper will alternately elicit both fear and assurance. The reality of the threat will elicit a fear for yourself, your family and your country, while the recognition of this threat by the national security community and the creation of response units like the Army National Guard's (ARNG) Weapons of Mass Destruction Civil Support Teams (WMD-CST) might give you assurance you are safe. Unfortunately, poor program management, ineffective equipment acquisition and unclear command and control structures have made the current version of the WMD-CST teams ineffective and inspire fear because our nation is at risk. This paper investigates the threat that drove the creation and evolution of the WMD-CST program. It then explores the specific mission of the WMD-CSTs to assess, advise and facilitate a response to a WMD event in the United States. This mission, and the ARNG's unique federal-state status, is critical to coordinating a synergistic state/local and federal response during and after a WMD event. The paper then focuses on the current program management and organizational problems affecting these teams. The paper concludes by offering suggestions on programmatic, doctrinal and organizational solutions to make these teams an effective part of a coordinated Homeland Security (HLS) response force. For without these teams to bridge the chasm between state/local and federal response units to a WMD event, the nation's reaction will be inefficient and lives will be lost.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Drug Cartels
The bi-polar security policy of the Cold War has now evolved into a regional focus. However, traditional US thinking about regional security still focuses on "old-style" decision making and management practices. This "old-style" approach has been applied to the war on drugs. This paper focuses on a different approach using current capabilities to fight the war on drugs. Focusing directly on the cartels and their centers of gravity which are not currently targeted by the drug control strategy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Bureaucracy vs. Bioterrorism
The author shows how, even in a future where biological weapons are proliferated to terrorists through globalization and technological advancements, a bureaucracy can indeed develop an effective network of countermeasures to bioterrorism. The first aspect of the proposed network is professional policing among life science professionals through development of an oath of ethical actions. The second aspect in this network is a nanotechnology detection capability to permit unambiguous attribution of bioterrorist activity. The third aspect of this network is mitigation of the consequences of terrorists' desires though development of quick response teams capable of rapidly identifying pathogens, treating the infected and inoculating the masses through nanovector delivery techniques. Three pragmatic issues critical for effective Air Force contribution to a bureaucratic network of biothreat countermeasures are: 1) the Air Force must determine the proper level of active duty biologists and chemists required to support the 2010 National Security Strategy, 2) an institutionalized cross-functional communication mechanism across the intelligence, scientific, acquisition and medical functional communities, must be implemented, and 3) the Air Force must develop an industry-accepted certification program for life science officers.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Asymmetric Warfare
Description: The morning of September 11, 2001 changed the face of America. Terrorism is no longer a word reserved for television broadcasters when describing events taking place halfway around the world. Watching the smoke billowing into the clear blue skies that September day Americans knew that we were on longer safe at home or at work. Terrorism had come to America. This abstract idea of killing innocent people which has always been associated with places with names like Lebanon, the Gaza Strip and Columbia was not just knocking at our door it had kicked it in taking thousands of people along with it. As we sat glued to our television sets, the fact that terrorists were no longer a foreign problem was repeated over and over by commentators and we watched the safety of our nation burn and fall as the buildings collapsed into a pile of rubble. When the first plane hit the World Trade Center most of us assumed it was a tragic accident. Something terrible must have gone wrong. The plane must have veered off course due to a mechanical failure or pilot error, but when a second plane rammed the second tower right before our eyes, it was clear this was no accident. A choreographed terrorist attack on the United States was underway and we were helpless to stop it. The vulnerabilities of America became clear to the world in those few moments. As the smoke cleared and the rubble was cleaned up, it would be naive to think this was the last asymmetric attack that terrorists will inflict on America. We need to ask hard questions and be ready to make hard changes so we can maintain the very freedoms we hold so dear. How did these terrorists cause so much death and destruction within our borders? What made these buildings the targets of choice? In addition, could we have prevented it? The answer to the fist two are simple, they watched how we live in this land of the free and discovered our weaknesses.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
West Africa
After the 9/11 attacks, The United States of America (USA) destroyed al Qaeda's established training bases and removed the Taliban from power in Afghanistan. Thus, al Qaeda is forced to find new havens to continue operating safely as well as new sources of recruits. Unfortunately, if the conditions in the ground do not change, West Africa will be the next recruiting front for Osama bin Laden's terrorist movement. This paper examines what al Qaeda wants in the region and what the terrorist organization is presently doing there to meet its goals. Lastly, the document will address the means and ways to thwart al Qaeda's efforts in West Africa.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Aerospace Policy Integration
How will limited budgets affect the future exploitation of air and space? This question is extremely relevant to Air Force planners today. Some are now suggesting the integration of existing air and space policy, in an effort to maximize limited resources. This paper seeks answers to these questions through analysis of each public policy, offering three effects integrated policy may have on future Air Force operations. Public policy is all about what you can do for citizens. Determining the probable success of policies is not easy, given our political system, and the difficulty in capturing costs and assigning values to perceived benefits. For these reasons, this paper uses political science based administrative and values analysis tools to extrapolate success. The analysis of national air policy found it highly effective. The second analysis, an extrapolation of expected results for space policy, uncovered a lower chance for success. This was based on a comparison of the two case studies, which highlighted resource availability as an important success determinant. This formed the basis of arguments for integrated policy, and all subsequent doctrine recommendations The research supports arguments for adopting an integrated policy, and provides the rationale for three changes to Air Force doctrine, roles and missions; transfer of the responsibility for close air support, reevaluation of space launch support activities, and modification of the requirements for base operability and defense. Divestiture of these functions better focuses the Air Force on its unique core competencies in the future.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Time to Overhaul the United States Air Force's Air Command and Staff College
The Air Command and Staff College (ACSC) is the United States (US) Air Force's (AF) intermediate professional military education (PME) service school, charged with preparing field grade officers of all services, international officers, and US civilians to assume positions of higher responsibility within the military and other government arenas (ACSC Home Page 2006). The school has two mission statements: one directed towards students and the other towards faculty and staff. The student mission statement is to "inspire critically thinking Airmen to lead Air and Space forces in Joint/Combined operations." The faculty and staff mission statement is to "provide an intellectually stimulating environment that attracts, develops, and rewards the finest team of educator-leaders possible" (ACSC Home Page 2006). As a current ACSC student, I believe the overall content and educational approach is inefficient and does not help ACSC achieve its mission statements.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Towards a Fail-Safe Air Force Culture
The paper argues the current re-invigoration of a and Zero Defects and culture within the Air Force's Nuclear Enterprise following the B-52 and Taiwan incidents will not produce the desired results. Similarly, a tolerant approach to the problem is equally destined to failure. Long term excellence in the enterprise is achievable through embracing a and Fail Safe and culture espoused by modern research into High Reliability Organizations (HROs) and practiced within Air Force subcultures such as the Flight Safety System and Flight Test Safety Process.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Rescue Operations Center
The recovery of isolated American and allied personnel remains a priority for all commanders. The joint force commander designates the command-and-control of his rescue forces. The delegation during major combat operations is normally to the Joint Force Air Component Commander (JFACC). However, this delegation can be made outside of the Combined Air Operations Center (CAOC) for missions short of major combat operations. These missions include humanitarian and disaster relief operations, non-combat evacuation operations, defense support to civil authorities, and irregular warfare. The best method of decentralizing control is through the Rescue Operations Center (ROC). Rescue forces would use the ROC to control PR operations in a decentralized manner across the spectrum of military operations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
United States Oil Dependence
US dependence on oil produces a variety of national security and economic vulnerabilities that, if exploited, could result in widespread economic disorder and increased global instability. This paper will highlight these vulnerabilities and recommend the development of pragmatic national policy strategies to hedge against these vulnerabilities and reduce the risk.Unless the US makes strides to reduce it's reliance on foreign oil, the US will continue military interventions to maintain current and future supplies of oil. This paper will insist the US focus include energy into every facet of strategic policy making. Only through the inclusion of energy issues into every strategic decision making processes can the US develop comprehensive, integrated energy and foreign policy strategies. All agencies of the US government should elevate their analysis of the risks and draft strategies protecting the US against them.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Medical Diplomacy
The United States Air Force Chief of Staff advocated the tenets of the Outside the Continental United States Humanitarian Relief Operations (HUMRO) Operational Capabilities Package concept document to all combatant commanders in December 2006. The author critiques the disaster relief model on the premise that the concept document creates unrealistic combatant commander expectations of the HUMRO's employment capabilities. Unrealistic asset employment expectations can adversely impact medical diplomacy efforts aimed at furthering theater security cooperation objectives. The research methodology comprises a literature review of military doctrine and international humanitarian assistance principles, complemented by an analysis of recent military relief operations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Winning Hearts and Minds Is Not for Amateurs
U.S. military forces have repeatedly been expected to perform in peacekeeping, nationbuilding and other non-kinetic roles throughout history. However, in recent years, the U.S. military has been awakened to its lack of preparedness for full spectrum operations. Two factors, the publication of DoD Directive 3000.05 and recent studies of negotiation in Iraq may help pave the way for improved training in negotiation, one of these non-kinetic skill areas. Reviewing these recent reports led the author to assess the negotiation training currently provided to Provincial Reconstruction Teams (PRT). Likewise, to provide additional perspective, the author examined how the Canadians prepare their PRTs to negotiate effectively. This report examines current negotiation training provided to U.S. and Canadian PRTs and evaluates the current training. After reviewing both training programs, some areas for improvement were noted. The training provided to U.S. PRTs is improving every year, but should include more academics, more practice negotiating, and training for all team members. To their credit, U.S. PRT trainers have developed a very realistic "capstone" exercise at the end of training which well prepares the teams to deploy. On the other hand, the Canadians have a very solid negotiation training program which includes much training and practice for all team members, but one that would be improved with practice in a challenging role-play scenario, reflecting a realistic Afghani cultural environment.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Returning to an Apolitical Officer Corps
Today, evidence shows that military officers are increasingly identifying with the Republican Party. This trend has massive implications and threatens to undermine the trust so critical to a healthy civil-military relationship. Thankfully, history provides a crisis-tested path for the officer corps. An apolitical norm, based on the example set by General George C. Marshall before and during World War II, can steer today's military back to an appropriate, non-partisan posture where sound advice and proper dissent once again have their placeThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Disruptive Breakthroughs and the USAF
While on the ground responding to crises, strategic airlift aircraft are a likely target of terrorism because they represent pervasive US global influence and are relatively vulnerable to attack. Successful attacks will disrupt strategic airlift's global reach, hampering the US military's operational capability during crisis response actions. The media is an enabler of terrorism against strategic airlift because it may predict where the US military will be operating next and provides an opportunity for terrorists to have their message conveyed to the world community. The keys to preventing attacks that will disrupt strategic airlift are awareness of the vulnerability to the threat, increased education on terrorist threats, and expanded use of current tactics, techniques, and procedures. Enhancement of the PHOENIX RAVEN program is the most important element of this solution set. The methodology used to conduct this research consisted of two parts. First, an examination of the relevance of today's terrorism threat to the strategic airlift mission was accomplished. Second, key components of the mission itself were assessed for vulnerabilities to terrorism. Interviews with representatives from Air Mobility Command's (AMC) intelligence, force protection, and operations communities were central to this effort. Further research consideration should be given to other AMC aircraft that may be similarly vulnerable to this threat, to general airfield defense against terrorism, to the terrorist threat to airborne aircraft in similar situations, and to specific weapons RAVEN team members might expect terrorists to use against mobility aircraft in the future.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
At What Cost, Intelligence? A Case Study of the Consequences of Ethical and Unethical Leadership
irst Place Winner of the MacArthur Military Leadership Writing Competition for the CGSC Class 2009 -- 01. In this essay, the hypothesis that the essential ethical position assumed by leaders is the most important determinant of, one, the level of detainee abuse in interrogation units, and, two, whether these units are strategically effective on today's battlefield. This hypothesis will be validated by the storyline beginning with an email exchange. If this hypothesis is correct, then interrogations at detention facilities influenced by the CJTF-7, 3rd Armored Cavalry Regiment, and 4th Infantry Division leaders above should have escalated to serious detainee abuse, and conversely, the TF 1AD detention facility should have remained relatively free of allegations of detainee abuse since its leaders viewed interrogation operations from a higher ethical vantage point. Qualities shared by these detention facilities (such as theater policy, manning, overcrowding, interrogator experience, etc.) will be discussed before these "control factors" are discarded as largely irrelevant to the final results. Once this hypothesis is validated, it is applied to the present to indicate what steps our Army still needs to take to prevent future interrogation abuse and the strategic defeat such abuse creates.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Indirect Approach
The intent of this paper is to explain the significant contribution of aviation foreign internal defense in combating terrorism in weak states. This study begins by identifying the national security threat posed by weak states and their attractiveness as a sanctuary for terrorist organizations. This study then examines how states respond to internal threats such as terrorism by implementing internal defense and development programs that are designed to address the underlying causes of internal instability. Next, the role of US foreign internal defense is examined and how it is used to support the internal development efforts of friendly nations. The study then explains the importance of airpower in combating terrorists, noting, however, that airpower capabilities in most developing nations are inadequate to the task. Finally, the study shows how the aviation component of foreign internal defense can address airpower capability gaps in weak states and how this strengthens the government's indigenous capability to combat terrorists.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
But That's Not Fair
The current US conflicts in Iraq and Afghanistan are characterized by enemies who regularly disregard international law and just war principles. Asymmetric conflicts such as these, in which belligerents violate laws of war to gain an advantage over a superior military force, are likely to be the norm for the foreseeable future. When such opponents refuse to "play by the rules," are there rules which the United States may then justifiably set aside? This normative paper examines jus in bello principles within just war theory to provide recommendations for US forces faced with this situation. The restrictions based on discrimination and proportionality must remain intact, but the US interpretation of military necessity must be altered from traditional views that have historically led to immoral decisions in the conduct of war. Military necessity must be considered at all levels of war, and the justice of the cause must not be used to justify gradual violations of jus in bello when selecting the tactics. Fighting with strict adherence to these just war principles is not only vital to securing domestic and international support for the US military, but it directly affects our ability to achieve current and future military objectives.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Democratic Reform in Ukraine
Successful economic reform and the transition to a free-market economy under a stable political system is the key to Ukraine's successful road to a new democratic beginning. Western assistance should primarily serve in an advisory role to stabilize the Ukrainian government, establish a viable rule of law, rudimentary representative government, and a system to protect individual and investment capital followed by direct investment and joint economic ventures with Ukrainian companies. This paper proposes a sequentially phased transformation model which encourages Ukraine's leaders to concentrate their efforts on first building a stable government, although not necessarily a democracy, and then focus on meaningful economic reforms to establish a solid economy with free market principles. In the long term, free-market economic principles will undermine an authoritarian government and foster the introduction of a democratic government. Current Western efforts supporting simultaneous political and economic reform are inconsistent with Ukraine's cultural and historical past and undermine democratic and economic reform.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Rebalancing the Air Force
The author offers a comprehensive solution to the ongoing Air Force capabilities rebalancing effort by arguing for the adoption of military judgment criteria to inform and standardize the process. Additionally, the author argues for the adoption of a conceptual model meant to enable senior leaders to visualize the complex interplay of variables relevant to the rebalancing process. Armed with the model and a set of standardized military judgment criteria--senior leaders will be in a better position to make fully informed force structure decisions--theoretically improving the Air Force's ability to meet sustained operational requirements at a lower cost with minimum risk. Much of what is contained here is applicable to the Army, Navy and Marines, all of which have reserve components.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Prioritizing Quality of Life Issues
Quality of life has become more than simply taking care of people. Throughout the DoD, retention of trained personnel has become a top concern and is compounded by the inability to recruit sufficient numbers to refill the ranks. The heart of the issue is increased missions, decreased personnel, insufficient equipment, too much time away from family, too little leisure time, and not enough money to balance out these negatives. Today's active duty military force is 33% smaller and three times more deployed than it was just ten years ago: meaning more are gone for longer periods and do it more often. The strong economy only compounds the problem because alternatives to staying in the military are abundant. Despite increased emphasis from the Department of Defense's (DoD) leadership to stave the degradation of benefits and pay, quality of life within the ranks continues to suffer. This paper looks at the various quality of life (QoL) surveys utilized within the DoD and the information they provide leadership. Drawing from the best of the current surveys and filling in the gaps, four cross-DoD surveys are recommended to better ascertain which QoL areas most impact troop retention. The goal is to better understand the attitudes and opinions of the men and women in the "field" so that leadership can hone in on those issues that will most impact QoL and ultimately retention.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Failing States in the Horn of Africa and the Impact on the Global War on Terrorism
On 7 August 1998, Al Qaeda attacked almost simultaneously U.S. embassies in Nairobi, Kenya and Dar es Salaam, Tanzania killing 258 people and wounding over 5000. The U.S. indicted twenty-two individuals for the bombings including four Kenyans and two Tanzanians. 1 On 12 October 2000 the USS Cole was attacked in the Yemeni port of Aden. Seventeen sailors were killed and thirty-nine wounded.2 In March 2007, US District Court Judge Robert Doumar ruled that Al Qaeda (AQ) could not have carried out the USS Cole attack without official Sudanese support.3 While many might argue about the finer details of these attacks, there is no doubt that the terrorists behind the embassy bombings and the attack on the USS Cole recruited, planned, and trained from within the Horn of Africa.4 Perhaps the clearest reason why this area is fertile ground for terrorism is rooted in the region's instability.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
21st Century Roles and Missions
Provisions of the Fiscal Year 2008 National Defense Authorization Act amend Title 10 of the US Code, mandating the Department of Defense (DoD) perform a review of the Services' roles and missions every four years, with the first review in 2008 and subsequent reviews occurring in 2011 and every four years thereafter. Additionally, it requires that the roles and missions of the DoD be organized into core mission areas and that each Service identify its core competencies and core capabilities that directly contribute to these core mission areas. More importantly, each service must demonstrate how its core capabilities and core competencies contribute to a core mission area of the DoD because the legislation mandates that the requirements, acquisition, and budgeting process will follow this organizational construct.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Defeating the United States With Radiological Weapons in Fourth Generation Warfare
On September 11th 2001, Al-Qaeda used the principles of fourth generation warfare (4GW) to achieve strategic effects that have cascaded throughout the United States. The devastating attacks could have been multiplied a hundred fold or more had each of the hijackers checked two bags each containing radioactive material. This paper addresses the possibility of a 4GW adversary launching a parallel radiological attack targeting the US economic system. An attempt will be made to determine if the effects of such an attack could strategically paralyze the US economy to the extent that the American way of life is significantly changed--a de facto "defeat of the United States." The methodology of the investigation will use the center of gravity analysis posed by Dr. Joe Strange coupled with Brig Gen David Deptula's effects-based operations model. In order to draw the conclusion, several historical examples will be extrapolated from in addition to an analysis of the likelihood of a 4GW adversary acquiring sufficient radioactive material to carry out a successful attack. Since September 11th 2001, the US government has trained its attention on terrorism and WMDs. The relevancy for understanding the principles of 4GW, radiological weapons, their effects, and the threats they pose has never been more urgent.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Harnessing the Military's Voice
Since 9/11 many articles have been written, studies undertaken and recommendations made in an effort to repair America's hemorrhaging public diplomacy (PD) capabilities. However, these efforts, intended to serve as holistic reviews of the U.S. public diplomacy apparatus, fail to adequately address the existing shortcomings within the Department of Defense (DoD) or, more importantly, to truly explore methods to better harness the military's significant potential to enhance the country's public diplomacy capability. Its size, budget and overseas presence make DoD perhaps the most powerful voice for U.S. public diplomacy, which in turn warrant a more detailed and critical review of its role and capabilities. To gain a full understanding of the issues and gather information relevant to making the recommendations included in the report, the authors conducted: " A thorough review of existing public diplomacy studies, draft directives, policy proposals and scholarly writings, with particular focus on those findings and recommendations that addressed the military " A review of existing doctrine and training programs to discern the extent to which they addressed public diplomacy " Interviews with relevant DoD, Department of State (DoS), Defense Science Board (DSB) and other agency officials and public diplomacy experts to gain insights into current efforts and challenges associated with DoD's attempts to define its public diplomacy role " Interviews with selected military leaders to garner insights from their personal experiences during recent deployments The authors then analyzed the available data to determine the key findings suggested by the information and developed a set of specific recommendations matched to each of the findings. This study, while not sufficiently comprehensive to address every aspect of DoD's public diplomacy task, does discern a number of significant issues that, if addressed, would likely improve both the military's ability to win heart minds andThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.