Negating the Threat of Libyan Weapons of Mass Destruction
The global war on terror illustrates a major change in the way the United States will use its military forces in the future. It is a war against not just governments but individuals with no solid national ties. The American formula for success in past wars will not work in the future, and its ability to recognize the enemy and the threat he poses will be critical to the country's ability to defend its national interests. Two of the biggest threats to peace and stability in the world today are terrorism and the proliferation of weapons of mass destruction (WMD). President Bush has made it clear that countries that support terrorism or acquire and use WMD represent the enemies of the United States and her allies. One such nation is Libya. Since coming to power in a coup in 1969, Libyan dictator Muammar Qadhafi has been on a collision course with American presidents angry over the dictator's support for global terrorism. They also recognized that Qadhafi's quest for nuclear, biological, and chemical weapons posed an unacceptable threat to peace in the Middle East.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Convergence or Divergence
This paper suggests that Air Force doctrine, in general, and space doctrine, in particular, are moving in different directions and that this divergence poses a threat to our future capability as an air and space force. It identifies the airman and the institution as the root cause for this divergence. Airmen think too narrowly in their specialty and work in institutions that resist collective cooperation, broad perspectives, and overarching doctrine. It suggests mentoring airmen with broader perspectives and changing the Air Force institution to be consistent with combining air and space capabilities in an overarching doctrine of air and space power. The research was prepared by reviewing key air and space doctrinal documents published since 1918 and interviewing people at all levels of involvement in air and space doctrinal development-both inside and outside the Air Force. These sources were combined to analyze the issues and support the thesis.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Agroterrorism
Although U.S. intelligence agencies have not identified any terrorist acts targeting agricultural production (i.e., agroterrorism) in the United States to date, the events of September 11, 2001 have awakened the nation to their possibility. Some experts estimate that a single agroterrorist attack using a highly contagious livestock disease could cost between $10 billion and $30 billion to the U.S. economy. Experts also recognize weaknesses in the ability of most nations to prevent and contain a biological attack on their agricultural resources. Limited inspection capabilities, lack of rapid diagnostic tools, inadequate coordination between inspection agencies, and little biosafety training of farmers, agronomists, and veterinarians are among the recognized weaknesses.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Coin/Pa
This paper examines what part military PA professionals have in the fight against insurgencies, and posits feat the PA function should be playing a larger role in any COIN effort. To do so, the historical research methodology will be used, to include a review of COIN history and strategies, followed by a review of the PA function in the U.S. military. The results will be analyzed, and recommendations made as to the future of military PA in COIN campaigns.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
International Armaments Cooperation in the Post-Cold War Era
During the height ofthe Cold War, the United States Department of Defense had a focused acquisition effort to produce major weapons systems. These weapons systems were developed as single service acquisition efforts. Their high costs were justified by their sophisticated technology, which enabled the U.S. military to gain and maintain air and ground combat superiority. Such acquisition practices significantly increased the defense budget, which peaked in 1985 at $414 billion. However, with the collapse of the Soviet Union and an absence of a single galvanizing threat to global security, the U.S. has been forced to drastically cut defense spending. Although there is no longer a central security concern for the U.S., there are new threats that require new defense objectives-- and containing these threats is not cheap. Senior defense leaders agree that the U.S. policy of fielding technologically superior weapon systems will not change. What alternative, then, will effectively enable the U.S. to meet reduced spending goals, yet maintain current national security levels? This thesis suggests that international armaments cooperation is one such alternative.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Turning Cyberpower Into Idea Power
The United States is currently engaged in a struggle to counter the effects of violent extremist ideology. Heavy use of the military component of national power eliminated the immediate danger but also validated the threat ideology. Initial US actions failed to address the underlying causes and some argue increased the pool of individuals susceptible to violent extremist ideology. Strategic communications supports other national instruments of power in this struggle but can also attack the underlying ideology. The US communicates with multiple audiences through various forms of media both traditional and emerging. Social media may present an opportunity for US strategic communications efforts to reach an expanding audience, from which violent extremists are also trying to recruit. Like any other instrument effective use of social media requires a thorough understanding of the capabilities and limitations. Determining the role of social media in the overall US strategic communications efforts requires identifying methods to use and assess the effects of the medium.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Suicide Bombing
Individual suicide bombers are difficult to detect and apprehend, therefore governments plagued by these attacks are better served by convincing the leaders of terrorist groups not to conduct such campaigns. To accomplish this, however, government leaders must understand exactly what motivates a terror group to turn to this method of attack in the first place. The central question of this thesis is: why have terrorist organizations chosen to use suicide bombing at some points in their struggles but not in others? Terrorist leaders are influenced by the desire to increase the power, prestige, and legitimacy of their organizations, and by the tactical efficiency of suicide terrorism in the face of limited potential options. The desire to create an independent state or to remove "foreign infidels" from sacred lands is also a powerful motivator that encourages the use of the suicide bombing tactic. Finally, a permissive environment is necessary to sustain the campaign and to allow the accomplishment of its objectives. The importance of this permissive environment to start, accelerate, or sustain a suicide bombing campaign cannot be overstated. It is the single most important factor in determining whether suicide violence will take root. If suicide attacks do not resonate with the desired population, the perpetrating organization will seek other methods to achieve its objectives.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Violent Islamist Extremism, the Internet, and the Homegrown Terrorist Threat
This is the first in a series of reports by the Majority and Minority staff of the Senate Committee on Homeland Security and Governmental Affairs (Committee) on the threat of homegrown terrorism inspired by violent Islamist extremism. The Committee initiated an investigation into this threat during the 109th Congress under the leadership of Chairman Susan Collins (R-ME). The first hearing on the homegrown threat considered the potential for radicalization in U.S. prisons, including an examination of the activities of Kevin Lamar James, an American citizen. While in prison, James adopted a variant of violent Islamist ideology, founded an organization known as the Assembly for Authentic Islam (or JIS, the Arabic initials for the group), and began converting fellow prisoners to his cause. Upon release, James recruited members of JIS to commit at least 11 armed robberies, the proceeds from which were to be used to finance attacks against military installations and other targets in southern California. James and another member of the group eventually pled guilty to conspiring to wage war against the United States.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Reforming Social Services in New York City
Reforming Social Services in New York City examines efforts across six decades to respond to poverty, joblessness, and homelessness through the establishment and periodic restructuring of the city's Human Resources Administration (HRA) and related social welfare agencies.As Thomas J. Main shows through archival research and interviews with key figures, the HRA has been the focus of several mayoralties. The John Lindsay administration's creation of the HRA in 1966 was a classic liberal effort to fight poverty; Rudy Giuliani brought dramatic change by implementing work-oriented welfare reform; and the Bill de Blasio administration attempted to install a progressive social welfare agenda within the city's social service agencies to reduce inequality. Reforming Social Services in New York City tells the story of these efforts, assessing the strategies employed and the success of their outcomes, concluding that major nonincremental change in urban welfare policy is not only possible but has been effective.
The Army National Gaurd and the Department of Homeland Security
This AY-10 USAWC resident student paper argues that the citizen-soldiers of the Army National Guard have lost their focus and original purpose as a State Militia available for disaster recovery operations, assisting law enforcement, and defending the homeland. The author believes that the pressure felt by the current operations tempo to use the Army National Guard as an operational reserve can only be alleviated by moving the Army National Guard from the Department of Defense to the Department of Homeland Security. He asserts that such a move will not cut off relationships developed between the Army and the National Guard, two organizations with a common history, but recognizes that the two organizations should have different primary missions of homeland security (National Guard) and national defense (U.S. Army). He bases his argument in part upon the fact that this realization of similar capabilities but different missions is already working between the U.S. Coast Guard and the Department of Navy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Engaged Leadership
First Place Winner of the MacArthur Military Leadership Writing Competition for the CGSC Class 2011-01. The ethical behavior of Soldiers on the battlefield is paramount, especially in counterinsurgency and stability operations where the support of the local populace is vital to the success of the mission. Despite their rarity, a few ethical lapses of Soldiers serving at the lowest tactical echelons can be detrimental to the strategic mission. We continue to see how one incident by an individual Soldier or small group of Soldiers can set back the success of an entire unit, even a coalition. This came to the forefront during the war in Iraq with the events of Abu Ghraib and Haditha. Recently, similar events were reported in Afghanistan with five members of an Army Stryker brigade charged with the premeditated murder of three Afghan civilians. These events resurrected memories of Vietnam where Soldier misconduct was considered more prevalent, marked not only by major events such as the My Lai Massacre, but by frequent drug use, fragging of unit leaders, and poor treatment of non-combatants. These events in Iraq suddenly revived a debate over the professional ethic of our Soldiers calling into question whether these events represented isolated incidents or an ethical culture problem in our present armed forces. A culture problem might indicate a failure of initiatives introduced after Vietnam to help counter the problems of the "Hollow Army" including the extension of professional status to non-commissioned officers and the institution of the Army Values. On the surface, these events appear to represent a few isolated incidents. However, the present conditions that exist within our Army including repetitive combat deployments provide opportunities for future lapses to occur. Preventing ethical lapses in the face of these conditions requires a change in unit culture in which fellow members (Soldiers) hold each other accountable to proper standards of conduct and performThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
History of South Africa, From 1795-1872
Delve into the intricate past of South Africa with George McCall Theal's comprehensive 'History of South Africa, From 1795-1872, v. 2'. This volume offers a detailed exploration of the region's tumultuous years, marked by colonial expansion, conflict, and the evolving dynamics between European settlers and indigenous populations. Theal, a noted historian, meticulously chronicles key events, political developments, and social transformations that shaped the South African landscape. Readers will gain insights into the early stages of the Anglo-Boer conflicts, the establishment of colonial governance, and the complex interactions between the British Empire, the Boers, and various African communities. This historical account serves as an invaluable resource for understanding the roots of modern South Africa and the lasting impact of its colonial legacy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Role of Torture in Support of the Global War on Terror Intelligence Collection Effort
The September 11, 2001 attacks on the United States ushered in a new way of looking at the world for Americans. For the first time since World War II, America's homeland had suffered an attack from outside forces. Unlike the attacks on military facilities in Hawaii, however, this act of violence was directed at civilians with the intent of spreading terror among them. The use of hijacked airliners as instruments of terror was a wake up call and it opened the nation's eyes to a sobering reality: the Atlantic and Pacific Oceans were no longer sufficient barriers to the scourge of transnational terrorism threatening the rest of the world. In the eyes of President George W. Bush and his administration, this new reality dictated a dramatic shift in thinking about the challenges of combating terrorism. Weapons of mass destruction, capable of wreaking even greater destruction and loss of life, were suddenly uncomfortably realistic possibilities - especially considering America's unmatched military superiority and the resultant probable use by future opponents of asymmetric means to attack the nation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Intergovernmental Service Agreements Between the U.S. Department of Homeland Security
The United States Immigration and Customs Enforcement (ICE) is a government law agency ran by the U.S. Department of Homeland Security. ICE is responsible for protecting our nations borders and an abundance of national security such as: drug smuggling, human trafficking, terrorism, fraud, gangs, and much more. It was established in 2002 following what happened on September 11, 2001. Immigration and Customs Enforcement publishes memos, contracts, Detention Facility Reviews, Policies and more; this is one of those documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Africa
Amounts requested by the Bush Administration for assistance to Africa in FY2004 closely parallel amounts provided in FY2003. Child Survival and Health Assistance, combined with Development Assistance (DA), would total $1.041 billion under the FY2004 request, as compared with a projected $1.062 billion in FY2003. A number of African countries would receive additional assistance if the President's Global AIDS Initiative, to be administered by the Department of State, is funded by Congress. A few would also benefit if the Millennium Challenge Account proposal is approved.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
An Investigation of B-2 Pilot Force Reserve Component Augmentation
The B-2 "Spirit" stealth bomber pilot community is experiencing a number of factors that influence their ability to produce combat sorties. Because of career concerns, pilots often move to a career-broadening assignment, intermediate service school or other assignment after a relatively short period of three to four years flying the B-2. A number of pilots also choose to separate from active duty to enter the major airline industry. Due to the resulting limited number of B-2 instructor pilots the Air Force contracted for civilian B-2 academic instructors who are not as qualified to instruct as the B-2 instructor pilots they replaced. These factors have negatively influenced the level of pilot experience with the B-2.This paper explores the concept of utilizing Air Force Reserve pilots to provide a source of continuity within the B-2 community.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Globalization and Asymmetrical Warfare
Globalization is having a tremendous effect on the ability of terrorist and criminal organizations to act on a global scale. These organizations are using asymmetrical means to target U.S. interests at home and abroad. The events of September 11th were the culminating effect of this trend that has played an increasingly greater role in the world in which we live. This research paper analyzes the globalization trend and the effect it is having on the ability to wage this new type of war. The negative effects of globalization have continued to create a large disenfranchised population primarily centered in the Middle East, Africa, and Asia. This disenfranchised population has become the recruitment pool and their countries have become training bases for the networked terrorist and criminal who take advantage of the tools of globalization. Those tools include the internet that provides secure means of communication, the technology that enables them to act, and the porous environment that allows one to move around the world undetected.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Future of American Power
The continued reliance on imported fossil fuels presents significant economic, political, military and strategic challenges to the United States. The purchase of energy sources from outside the U.S. is typically not a problem, until they are purchased from unfriendly and unstable parts of the world. The U.S. is also facing a challenge to its global leadership. The rise of Chinese and Indian economic and political power complicates the execution of U.S. National Security Strategy. Additionally, the absence of the U.S. has not stopped the momentum towards international environmental agreements and the U.S. risks being left behind. Finally, the U.S. expends significant levels of human, political and monetary capital to ensure access to foreign sources of energyThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Why SOF Is the Military Force of Choice for AFRICOM
Until recently, the African continent was viewed by the US as having limited strategic importance. The events of 9/11, coupled with lingering African issues of HIV/AIDS, global trade, armed conflicts and terror, has pushed the US to begin viewing Africa strategically. As a sign of Africa's new strategic importance on the world stage Africa Command (AFRICOM) was established to better integrate the civil and military actions on the continent. However, very little has been discussed on what military forces will be used in conjunction with the interagency organizations within AFRICOM to support its strategic, operational and tactical goals. The primary missions of the new command has downplayed traditional military roles by concentrating on humanitarian assistance, building partnership capability, civil affairs projects, improving border and maritime security, and professionalization of the militaries on the continent. The purpose of this paper is to demonstrate why special operations forces (SOF) possess the experience and unique capabilities needed to be the primary military force used in support of AFRICOM. This paper will show how SOF possesses the experience to accomplish the wide array of missions required in Africa; experience in working with joint, coalition and interagency partners; culture and language expertise, which allows them to better interact with host nation (HN) personnel; and the ability to keep their footprint small and unobtrusive on the continent.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
2010 Country Reports on Human Rights Practices, Namibia
The world is changing every day in regards to Human Rights, and the United States has a close monitor on it. In 2010, from the Middle East to North Africa, and all around the globe, citizens stood up to demand respect for: human dignity, more promising economic opportunities, greater political liberties, and a say in their own future. Many times they faced tremendous odds and endured violent responses from their different governments. The resulting upheavals are still unfolding today effecting many. This year's Country Reports on Human Rights Practices chronicle these dramatic changes and the stories of the people defending human rights in almost 190 countries around the world; this is one of those reports.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Air Force Intelligence Officer Regional Specialization
In a security environment characterized by regional conflicts, complex political situations, and accompanying constraints, the need for accurate intelligence analysis has never been greater. Though the primary function of intelligence is to understand adversaries, the Air Force intelligence career field has not developed its own cadre of regional and country-specific experts. With this in mind, this thesis addresses the question: "Is Air Force intelligence properly organized and trained to provide regional expertise to theater air component commanders?" The study answers this question by addressing the role, organization, and success of regional intelligence specialists at the theater air component level in major operations since the end of the Cold War, including Operations Desert Storm, Allied Force, Enduring Freedom, and Iraqi Freedom. Next, the thesis examines the current state of intelligence officer training to assess how well it prepares officers to provide regional analysis at the theater air component level. It then delves into how the Air Force intelligence community manages its regional specialists, taking into account promotions, preferred career paths, and organizational culture. The thesis concludes with findings, recommendations, and areas warranting further study. The thesis finds the Air Force has not properly organized and trained its intelligence function to provide regional expertise to theater commanders.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
International Armaments Cooperation in the Post-Cold War Era
During the height ofthe Cold War, the United States Department of Defense had a focused acquisition effort to produce major weapons systems. These weapons systems were developed as single service acquisition efforts. Their high costs were justified by their sophisticated technology, which enabled the U.S. military to gain and maintain air and ground combat superiority. Such acquisition practices significantly increased the defense budget, which peaked in 1985 at $414 billion. However, with the collapse of the Soviet Union and an absence of a single galvanizing threat to global security, the U.S. has been forced to drastically cut defense spending. Although there is no longer a central security concern for the U.S., there are new threats that require new defense objectives-- and containing these threats is not cheap. Senior defense leaders agree that the U.S. policy of fielding technologically superior weapon systems will not change. What alternative, then, will effectively enable the U.S. to meet reduced spending goals, yet maintain current national security levels? This thesis suggests that international armaments cooperation is one such alternative.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Coin/Pa
This paper examines what part military PA professionals have in the fight against insurgencies, and posits feat the PA function should be playing a larger role in any COIN effort. To do so, the historical research methodology will be used, to include a review of COIN history and strategies, followed by a review of the PA function in the U.S. military. The results will be analyzed, and recommendations made as to the future of military PA in COIN campaigns.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Actions Speak Louder Than Words
The Department of Defense (DOD) recently issued a directive that increases the emphasis on stability operations in military operations. The very first policy statement in the directive states "Stability operations are a core U.S. military mission that the DOD shall be prepared to conduct and support. They shall be given priority comparable to combat operations"1 The DOD has also increased emphasis on information operations (IO) across the spectrum of warfare. Transformation is rampant within the DOD organization, culture and doctrine. Consequently, many of these changes can lead to confusion, redundancy, or even disagreement regarding military operations, capabilities, and employment methods. The utility of IO, for example is commonly misunderstood to mean just psychological operations (PSYOPS) and deception. In reality it includes many more capabilities that are underutilized.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Equipping Foreign Air Forces
Selecting the right aircraft and associated armament to sell to a foreign air force can be a complex and risky decision. There is potentially much to be gained by making the good sell, but even more to lose due to a bad decision to sell. Many factors go into the decision, and there are often more countries available to sell similar systems if the US government disapproves the sale. Using the three core values presented in US National Security Strategy, along with some case studies from past sales, this paper develops a set of guidelines. These guidelines can be used to assist in making this somewhat complex decision with consistency and logic. Using this information, the paper finishes with a discussion and general recommendations on what should be done when confronted with future cases of weapons releases involving the F-16, JSF, F-22, AMRAAM, and AIM-9X. All data presented was obtained from public access documents such as magazines, books, and US government web sites. The analysis of cases studied is done with the objective of supporting US National Security.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
2010 Country Reports on Human Rights Practices, Namibia
The world is changing every day in regards to Human Rights, and the United States has a close monitor on it. In 2010, from the Middle East to North Africa, and all around the globe, citizens stood up to demand respect for: human dignity, more promising economic opportunities, greater political liberties, and a say in their own future. Many times they faced tremendous odds and endured violent responses from their different governments. The resulting upheavals are still unfolding today effecting many. This year's Country Reports on Human Rights Practices chronicle these dramatic changes and the stories of the people defending human rights in almost 190 countries around the world; this is one of those reports.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Learning to Get Ahead
The Improvised Explosive Device (IED) threat has been termed the "grand challenge" by leading counter-terrorism organizations. What started as a nuisance has turned into a strategic threat. The US government is spending billions of dollars and thousands of man-hours to develop countermeasures and defeat technologies. Some countermeasures and technical solutions are quick; many are too slow to keep up with warfighter needs. The enemy, on the other hand, adapts quickly and develops weapons that are cheap and easy to build. The fundamental question driving this research is: how can an organization learn more effectively in order to become more flexible, adaptable, and innovative, while learning to make decisions faster and more proactively? This research will address the significance of learning at the operational and strategic levels, and the effect this learning has on the tactical level. Specifically, the research will draw on LTC John Nagl's "learning organization" concept as expressed in his work Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam. Additionally, this paper will draw on a historical example of the British experience with the IED threat in the Northern Ireland conflict. Finally, this research project will discuss how innovative intelligence analysis can help further drive down the decision timelines. Learning and innovative organizations are key to countering current and future asymmetric weapons threats.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
An Investigation of B-2 Pilot Force Reserve Component Augmentation
The B-2 "Spirit" stealth bomber pilot community is experiencing a number of factors that influence their ability to produce combat sorties. Because of career concerns, pilots often move to a career-broadening assignment, intermediate service school or other assignment after a relatively short period of three to four years flying the B-2. A number of pilots also choose to separate from active duty to enter the major airline industry. Due to the resulting limited number of B-2 instructor pilots the Air Force contracted for civilian B-2 academic instructors who are not as qualified to instruct as the B-2 instructor pilots they replaced. These factors have negatively influenced the level of pilot experience with the B-2.This paper explores the concept of utilizing Air Force Reserve pilots to provide a source of continuity within the B-2 community.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Rethinking the Operational Reserve
The various service Reserve Components have been a critical part of the Total Force for several decades. Although great efforts were undertaken to ?operationalize? the Reserve Component over the last few years, future requirements will likely not justify a fully manned, trained, and equipped operational reserve. The Department of Defense will not likely be able to simultaneously afford both a robust active component and an operational reserve; expected shortfalls require a change in how the reserves are structured and utilized. With the expected reduction of American presence abroad, and likely economic austerity for the military, the United States must rethink the missions, requirements, and readiness of the reserve components. If elements of the reserve component operated at lower levels of readiness and training, significant costs could be saved. Potential deployment options for the reserves must be predictive, should best leverage existing reserve capabilities, and should accurately assess costs for equipment and resources. Options to save costs include reducing reserve training days, exploring creative solutions to equipment shortfalls, and better assessing training requirements for reserve units. Although it will involve certain risks, the Department of Defense must review and transform the policies and options in which reserve units are trained, equipped, and employed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Learning to Get Ahead
The Improvised Explosive Device (IED) threat has been termed the "grand challenge" by leading counter-terrorism organizations. What started as a nuisance has turned into a strategic threat. The US government is spending billions of dollars and thousands of man-hours to develop countermeasures and defeat technologies. Some countermeasures and technical solutions are quick; many are too slow to keep up with warfighter needs. The enemy, on the other hand, adapts quickly and develops weapons that are cheap and easy to build. The fundamental question driving this research is: how can an organization learn more effectively in order to become more flexible, adaptable, and innovative, while learning to make decisions faster and more proactively? This research will address the significance of learning at the operational and strategic levels, and the effect this learning has on the tactical level. Specifically, the research will draw on LTC John Nagl's "learning organization" concept as expressed in his work Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam. Additionally, this paper will draw on a historical example of the British experience with the IED threat in the Northern Ireland conflict. Finally, this research project will discuss how innovative intelligence analysis can help further drive down the decision timelines. Learning and innovative organizations are key to countering current and future asymmetric weapons threats.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Suicide Terrorism and Its Impact on the Palestinian-Israeli Conflict
Suicide terrorism was introduced to the Palestinian-Israeli conflict in 1994 by the Palestinian militant organization Hamas. There was an average of 4 to 5 suicide attacks per year over the next few years until an exponential increase in 2001 led to a peak of 44 suicide attacks against Israeli targets in 2002. Although the number of suicide attacks has come down since then, the effects of suicide terrorism on the Palestinian-Israeli conflict have lingered, if not intensified. Israeli security measures imposed to curb suicide terrorism have been arguably successful and can be credited for the decline in suicide attacks since 2002. The motivation for Palestinian terror organizations to carry out suicide terrorism against Israel has, however, remained high. This is linked to the increase in support from the Palestinian public for violence against Israel as Palestinian perception of Israeli high-handedness in responding to suicide attacks led many to lose hope in the peace process. Suicide terrorism has undermined the position of nationalist Palestinian groups actively seeking a peaceful settlement with Israel. At the same time, it has weakened international sympathy for the plight of the Palestinian people and given Israel legitimacy for some kind of violent response. Rejectionist Palestinian militant groups have successfully used suicide terrorism to prevent a peaceful resolution to the Palestinian-Israeli conflict.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Country Reports on Human Rights Practices for 2011, Botswana
The world is changing every day in regards to Human Rights. In 2011, from the Middle East to North Africa, and all around the globe, citizens stood up to demand respect for: human dignity, more promising economic opportunities, greater political liberties, and a say in their own future. Many times they faced tremendous odds and endured violent responses from their different governments. The resulting upheavals are still unfolding today effecting many. This year's Country Reports on Human Rights Practices chronicle these dramatic changes and the stories of the people defending human rights in almost 200 countries around the world; this is one of those reports.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Suicide Terrorism and Its Impact on the Palestinian-Israeli Conflict
Suicide terrorism was introduced to the Palestinian-Israeli conflict in 1994 by the Palestinian militant organization Hamas. There was an average of 4 to 5 suicide attacks per year over the next few years until an exponential increase in 2001 led to a peak of 44 suicide attacks against Israeli targets in 2002. Although the number of suicide attacks has come down since then, the effects of suicide terrorism on the Palestinian-Israeli conflict have lingered, if not intensified. Israeli security measures imposed to curb suicide terrorism have been arguably successful and can be credited for the decline in suicide attacks since 2002. The motivation for Palestinian terror organizations to carry out suicide terrorism against Israel has, however, remained high. This is linked to the increase in support from the Palestinian public for violence against Israel as Palestinian perception of Israeli high-handedness in responding to suicide attacks led many to lose hope in the peace process. Suicide terrorism has undermined the position of nationalist Palestinian groups actively seeking a peaceful settlement with Israel. At the same time, it has weakened international sympathy for the plight of the Palestinian people and given Israel legitimacy for some kind of violent response. Rejectionist Palestinian militant groups have successfully used suicide terrorism to prevent a peaceful resolution to the Palestinian-Israeli conflict.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Suicide Bombing
Individual suicide bombers are difficult to detect and apprehend, therefore governments plagued by these attacks are better served by convincing the leaders of terrorist groups not to conduct such campaigns. To accomplish this, however, government leaders must understand exactly what motivates a terror group to turn to this method of attack in the first place. The central question of this thesis is: why have terrorist organizations chosen to use suicide bombing at some points in their struggles but not in others? Terrorist leaders are influenced by the desire to increase the power, prestige, and legitimacy of their organizations, and by the tactical efficiency of suicide terrorism in the face of limited potential options. The desire to create an independent state or to remove "foreign infidels" from sacred lands is also a powerful motivator that encourages the use of the suicide bombing tactic. Finally, a permissive environment is necessary to sustain the campaign and to allow the accomplishment of its objectives. The importance of this permissive environment to start, accelerate, or sustain a suicide bombing campaign cannot be overstated. It is the single most important factor in determining whether suicide violence will take root. If suicide attacks do not resonate with the desired population, the perpetrating organization will seek other methods to achieve its objectives.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Winning the Long War
Criticism and condemnation of al-Qaeda that originate from the worldwide Muslim community present the most formidable challenge to its existence and legitimacy as an organization and movement. There is ample literature that questions whether or not there are Muslim challenges to the ideology and harmful acts of violent extremists such as al-Qaeda. However there is a growing body of literature from the worldwide Muslim community that challenges al-Qaeda. Consequently, challenges to al-Qaeda that originate from the worldwide Muslim community are critical because they are a component in any strategy to defeat al-Qaeda. The identification, amplification, and exploitation of these Muslim challenges will serve to defeat al-Qaeda. The purpose of this monograph is to determine the nature of this Muslim challenge to al-Qaeda. This is accomplished by analyzing the recent revisions of the former mujahid that helped create al-Qaeda and developed its jihadi ideology, Sayyid Imam. In these revisions entitled Rationalizing Jihad, Sayyid Imam criticizes and condemns al-Qaeda and other violent extremists. To determine the legitimacy of his revisions, the major themes of Rationalizing Jihad are compared to the prescriptions in classical Islamic jurisprudence. Sayyid Imam's stature and influence within the mujahidin community is so great it prompted an immediate response from al-Qaeda's intellectual leader and second-in-command, Ayman al-Zawahiri. His response and that of nine other former and current mujahidin are analyzed in order to examine the rift in al-Qaeda's jihadi ideology and challenges to its tactics, strategy, and ideology. Finally, five recent initiatives by respected and prominent members of the worldwide Muslim community are analyzed to demonstrate the Muslim challenge to al-Qaeda. These challenges from Sayyid Imam, the ideological rift among mujahidin such as al-Zawahiri, initiatives from the worldwide Muslim community, and the identification, amplification, and exploThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Returning to an Apolitical Officer Corps
Today, evidence shows that military officers are increasingly identifying with the Republican Party. This trend has massive implications and threatens to undermine the trust so critical to a healthy civil-military relationship. Thankfully, history provides a crisis-tested path for the officer corps. An apolitical norm, based on the example set by General George C. Marshall before and during World War II, can steer today's military back to an appropriate, non-partisan posture where sound advice and proper dissent once again have their placeThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Morality in Modern Aerial Warfare
There is a moral way to wage war, be it in the air, on the sea, or on the ground. This paper contends that the US Air Force can maintain a high level of morality in the conduct of air operations. In doing so, we will save the lives of both our airmen and innocents on the ground. The authors intend to show that there is a long tradition of morality in war and that we can and should maintain high standards. We do NOT advocate, nor should the reader infer that we believe it is possible to conduct a war in which no innocents are harmed. We DO urge senior commanders to balance the proportionality of probable non-combatant casualties against the military necessity of the given targets. If that balance cannot be made, we urge our leaders to say so.Lt Gen Mike Short, the air commander for Operation Allied Force, quoted above, makes the proper case that there will be unintended casualties and that we, as a nation, must understand this when waging war. What the authors make clear is that anything beyond the proportional loss of life due to necessity is immoral and must be prevented.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Politics of Sanctuary
The Politics of Sanctuary examines sanctuaries as spaces where activists oppose what they see as an unjust restrictive regime trapping immigrants in conditions of legal liminality. Drawing on her fieldwork in New York City, Vojislava Filipcevic Cordes explores the politics of immigrant exclusions, and depicts how immigrants in sanctuary cities stake claims for their rightful presence. She argues for a more inclusive political life of expanded urban citizenship for undocumented immigrants, asylum seekers, and refugees through the mechanisms of sanctuary practice. Blending a participant-observation case study of the immigrant-organized New Sanctuary Coalition with urban politics and theory, The Politics of Sanctuary also offers ideas for how ways sanctuary practices, supported by governance and social-service arrangements, can promote legitimate claims to immigrant urban membership and belonging.
The Future of American Power
The continued reliance on imported fossil fuels presents significant economic, political, military and strategic challenges to the United States. The purchase of energy sources from outside the U.S. is typically not a problem, until they are purchased from unfriendly and unstable parts of the world. The U.S. is also facing a challenge to its global leadership. The rise of Chinese and Indian economic and political power complicates the execution of U.S. National Security Strategy. Additionally, the absence of the U.S. has not stopped the momentum towards international environmental agreements and the U.S. risks being left behind. Finally, the U.S. expends significant levels of human, political and monetary capital to ensure access to foreign sources of energyThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Role of Torture in Support of the Global War on Terror Intelligence Collection Effort
The September 11, 2001 attacks on the United States ushered in a new way of looking at the world for Americans. For the first time since World War II, America's homeland had suffered an attack from outside forces. Unlike the attacks on military facilities in Hawaii, however, this act of violence was directed at civilians with the intent of spreading terror among them. The use of hijacked airliners as instruments of terror was a wake up call and it opened the nation's eyes to a sobering reality: the Atlantic and Pacific Oceans were no longer sufficient barriers to the scourge of transnational terrorism threatening the rest of the world. In the eyes of President George W. Bush and his administration, this new reality dictated a dramatic shift in thinking about the challenges of combating terrorism. Weapons of mass destruction, capable of wreaking even greater destruction and loss of life, were suddenly uncomfortably realistic possibilities - especially considering America's unmatched military superiority and the resultant probable use by future opponents of asymmetric means to attack the nation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Air National Guard Structure for the Twenty-First Century
For many years, the Air National Guard acted "...more or less in parallel with active duty counterparts, working in unison but only interacting occasionally for exercises and such." Today, on the other hand, the Air National Guard is extensively employed worldwide with both the active and reserve components as part of the Total Force. During the Cold War, the Air National Guard represented a "strategic reserve" not unlike an off-the-shelf capability which could only be utilized in times of great crisis or war. In an era of ever-tightening budgets, drastic decreases in manpower, on-going global war efforts, and larger responsibilities within the CONUS, is there any wonder that Total Force Integration continues to receive great attention on Capitol Hill?This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Alongside the Best? The Future of the Canadian Forces
The Naval War College Review was established in 1948 and is a forum for discussion of public policy matters of interest to the maritime services. The forthright and candid views of the authors are presented for the professional education of the readers. Articles published are related to the academic and professional activities of the Naval War College. They are drawn from a wide variety of sources in order to inform, stimulate, and challenge readers, and to serve as a catalyst for new ideas. Articles are selected primarily on the basis of their intellectual and literary merits, timeliness, and usefulness and interest to a wide readership. The thoughts and opinions expressed in this publication are those of the authors and are not necessarily those of the U.S. Navy Department or the Naval War College.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Missile Defense Strategic Stationing
This U.S. Army War College student author believes that a strategic stationing plan for existing THAAD and JLENS missile defense assets must be developed concurrent with acquisition of new air and missile defense capabilities. He argues: ---- Although the Army has conceptual plans and requirements for the development of new air and missile defense capabilities, specifically THAAD and JLENS, the Army has not defined a strategic employment / deployment plan to meet Combatant Commanders' demands. ---- Throughout the 1990s, the Army deployed PATRIOT task forces to Southwest Asia and South Korea with little overarching strategic planning balanced against competing and evolving demands for missile defense capabilities. ---- The constant deployments had an adverse impact on the AMD force from personnel, training, and operational readiness perspectives. ---- This caused the Army to reevaluate its employment plan to sustain operational demand without breaking the AMD force. The Army used the Army Force Generation (ARFORGEN) model with 1:2 dwell time as means to sustain operational commitments. ---- Combatant Commanders' immediate demand for THAAD and JLENS, as they come off the production lines and lack of a clear stationing plan, could lead to a repeat of these 1990's challenges.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Turning Cyberpower Into Idea Power
The United States is currently engaged in a struggle to counter the effects of violent extremist ideology. Heavy use of the military component of national power eliminated the immediate danger but also validated the threat ideology. Initial US actions failed to address the underlying causes and some argue increased the pool of individuals susceptible to violent extremist ideology. Strategic communications supports other national instruments of power in this struggle but can also attack the underlying ideology. The US communicates with multiple audiences through various forms of media both traditional and emerging. Social media may present an opportunity for US strategic communications efforts to reach an expanding audience, from which violent extremists are also trying to recruit. Like any other instrument effective use of social media requires a thorough understanding of the capabilities and limitations. Determining the role of social media in the overall US strategic communications efforts requires identifying methods to use and assess the effects of the medium.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Devils in the Dialogue
The Air Force began its existence in 1947 as a bright star with almost limitless potential to defend the nation. Today, however, the Air Force appears to struggle in communicating its value and trustworthiness, and congressional support has waned. The relationship is strained if not adversarial. The more effectively the Air Force engages with Congress, the better the Air Force can posture to defend national interests. The intent of this paper is to understand the current relationship between the Air Force and Congress and determine if this relationship is configured in optimum fashion to contribute to the nation's security. This paper concentrates on the Air Force's Legislative Liaison (SAF/LL) office as a conduit to effectively communicate the Air Force's needs to Congress, which is vitally important during periods of struggle. A focused review of current interactions, both formal and informal, as well as comparison with the other services, will highlight strengths and weaknesses within the Air Force's Legislative Liaison office and it's ability to provide Congressional support. Synthesis of the information provides recommendations for the Air Force to better coordinate its strategic messaging and methodology with Congress via the legislative liaison office. The SAF/LL office has a unique opportunity to bridge the gap between the two organizations and eliminate the devils in the dialogue.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Africa
Amounts requested by the Bush Administration for assistance to Africa in FY2004 closely parallel amounts provided in FY2003. Child Survival and Health Assistance, combined with Development Assistance (DA), would total $1.041 billion under the FY2004 request, as compared with a projected $1.062 billion in FY2003. A number of African countries would receive additional assistance if the President's Global AIDS Initiative, to be administered by the Department of State, is funded by Congress. A few would also benefit if the Millennium Challenge Account proposal is approved.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Climate Deficit
"Why are the disasters getting worse while our leaders fall further behind?" This isn't just a question; it's the defining paradox of our time. The Climate Deficit takes you inside the critical 2024-2025 period, a moment when the brutal reality of climate change-record heat, catastrophic floods, and devastating storms-has dangerously outpaced our political will to act. This book travels across fifteen distinct nations, from the unparalleled wealth of the United States to the existential frontline in the Maldives, to diagnose the many faces of "climate inaction." You'll see it's not just an absence of policy, but a complex mess of competing interests, underfunded promises, and deep-seated inequality. Through a powerful analytical lens called the "Adaptation Inequity Trap," the book reveals a vicious cycle: climate disasters hit the poorest and most marginalized communities the hardest, yet the political and financial responses are often captured by the wealthy and powerful, deepening the inequality that fuels the next crisis. Forget the abstract science and political jargon. The Climate Deficit connects the dots between a record-breaking US hurricane season that cost over $182 billion, a lethal 54-day heatwave in India, and the desperate fight for survival in cyclone-battered Mozambique. It exposes why staggering economic losses don't automatically trigger the rational, transformative change we need. Instead, you'll discover how systemic paralysis in Washington, an "implementation chasm" in New Delhi, and a brutal "debt-disaster nexus" in southern Africa are all part of the same global story. This is the unflinching account of a world on fire and under water, and a clear-eyed analysis of the structural failures that keep us trapped in a cycle of catastrophe and delay. What's Inside the Book This book explores the global climate crisis. It focuses on the years 2024 and 2025. It examines fifteen different countries. The book details the extreme weather they face. It shows how these disasters connect to policy failures. A core idea is the "Adaptation Inequity Trap." This framework explains how inequality worsens climate impacts. The analysis covers powerful nations like the United States, Germany, and Japan. It also investigates highly vulnerable countries like Bangladesh, Pakistan, and Fiji. The book's central question is why meaningful climate action is so slow. It argues that the costs of disaster are not shared equally. This unequal burden paralyzes the political will needed for real change. How This Book is Different Many books describe the science of climate change or propose broad solutions. This book diagnoses the specific reasons for our collective failure to act. It doesn't just say governments are failing; it uses the "Adaptation Inequity Trap" framework to show how and why they are failing in different ways across the globe. Its unique strength is the comparative analysis of 15 case studies, moving beyond a generic call to action to reveal the distinct patterns of inaction-from political paralysis and technocratic delay to a crushing debt-disaster nexus. It provides a granular, evidence-based explanation for the frustrating gap between knowing what we must do and our inability to do it. Disclaimer: This publication is an independent work of analysis and commentary. The author is not affiliated with, sponsored by, or endorsed by any of the governmental or non-governmental organizations mentioned herein. All trademarks, service marks, and trade names are the property of their respective owners and are used here for identification purposes only under the principles of nominative fair use.
Systems Approach to Urban Operations
This monograph describes a possible technique to allow military planners to identify key objectives that may be affected in gaining control of a city without destroying it. This technique involves viewing a city as a complex "system of systems" and offers the planner insights as to where to apply military means to achieve the desired ends. While much has been written on Effect Based Operations (EBO), this monograph attempts to "operationalize" the concept. It presents a planning technique to assist in identifying targets, understanding target interrelationships, and analyzing second and third order effects. This study uses the urban environment to present this planning technique. The primary research question is: Is it possible to seize and control a city without destroying it? The secondary question is: Is there a systems approach process to achieve military success in an urban environment? The purpose of this paper is to provide the operational commander with an approach to manage the complexity of the urban environment. It should provide the reader with a systems approach that is grounded in doctrine, a methodology to reduce complexity, and a practical planning approach to assist in urban operations. The systems approach discussed in this paper allows commanders to seize control of a city without destroying it. The approach can be seen as a graduated response matrix where critical requirements are affected in sequence in order to achieve a desired result. While it is impossible to determine to which threshold the adversary would relinquish his control of the city (aim), the systems approach does provide a method to gradually reach that threshold. In addition, the systems approach allows commanders to war-game and record the effects of an action throughout the entire greater system. This provides the commander with an analysis tool that captures potential second and third order effects that may or may not be desired. This is a technique that should be incorporateThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.