Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Critical Link: Financial Implications of National Security Threats
"For most of the past century, the Naval War College has helped the national security community examine potential consequences of a wide range of crisis scenarios. Historically military and diplomatic responses were the focus of these activities. Because the number and types of issues affecting national security continues to grow, however, national security is no longer the special enclave of diplomats and soldiers. It was less than a decade ago that economic issues were first addressed in the President's National Security Strategy, and they were shortly joined by environmental issues as challenges that could adversely affect the nation. In October 1997, the Naval War College, in partnership with Cantor Fitzgerald, conducted the initial Economic Security Exercise exploring the link between maritime security issues and global financial markets....The success of the first Economic Security Exercise encouraged both institutions to conduct a follow-on event in order to broaden and deepen the discussion. Like the initial Economic Security Exercise, this workshop brought together key figures from the national security, governmental, and financial communities to explore and test the relationships between international events, national security, and financial markets. Participants (see Appendix A) included currency, commodity, fixed income, and securities traders. The overall purposes of the exercise were to draw insights and, where possible, explore options about how the various communities can work together to mitigate the unexpected effects of crises."
Naval War College (U.S.)
Hayes, Bradd C.
1998-06
-
Some Potential Risks at Lower Levels of Strategic Nuclear Weapon Arsenals
"An examination of the some of the risks if both the U.S. and Russia were to reduce their strategic nuclear inventories in future arms control environments. The risks considered include: loss of deterrence, launch on warning, and breakout or cheating. Assumed weapon limits for both sides included START III and a limit of 800 warheads on each side."
United States. Arms Control and Disarmament Agency
Nyland, F. S.
1998-06
-
Reducing the Threat of Biological Weapons
"'WEAPONS of mass destruction' is a terrifying term. We all have mental images of the horrors of a nuclear attack, and photos of Kurdish and Iranian casualties of Iraqi chemical attacks attest to the devastation of chemical weapons. The third weapon of mass destruction--the biological weapon--has been around at least since the Middle Ages when soldiers catapulted the bodies of dead smallpox victims over fortress walls in the hope of infecting their enemies or at least demoralizing them... Biological agents are of concern in part because of the ease with which many of them can be manufactured, transported, and dispensed. And because of the lag time between a biological attack and the appearance of symptoms in those exposed, biological weapons could be devastating. Many biological agents are contagious, and during this lag time, infected persons could continue to spread the disease, further increasing its reach. Hundreds or even thousands of people could become sick or die if a biological attack were to occur in a major metropolitan area. With the knowledge that several nations have produced and perhaps also deployed biological warfare agents, Congress in 1996 passed the Defense Against Weapons of Mass Destruction Act, which authorizes the Department of Energy to establish a Chemical and Biological Weapons Nonproliferation Program. Under this and similar programs, Lawrence Livermore and other laboratories and institutions are working together to increase this country's capabilities to detect and respond to an attack by biological or chemical weapons."
Lawrence Livermore National Laboratory
Spring, Baker
1998-06
-
Immigration Statistics: Status of the Implementation of National Academy of Sciences' Recommendations, Report to Congressional Requesters
"The quality of immigration statistics has been a long-standing issue among experts in the public and private sectors. The National Academy of Sciences (NAS) issued two reports in which it made recommendations regarding the need to improve the collection and management of immigration statistics. The recommendations were directed to various federal organizations, including Congress, the Department of Justice (DOJ), Immigration and Naturalization Service (INS), Office of Management and Budget (OMB), and Bureau of the Census. This report responds to your request that we provide information on the implementation status of the major recommendations to Congress, the agencies, and OMB in these reports. Specifically, we summarized NAS recommendations and determined what, if any, action Congress, the agencies, and OMB took in response to the 13 major recommendations in the 1985 NAS report and all 6 recommendations in the 1996 NAS report. Also, in your request, you asked us to assess demographic, statistical information on the foreign-born population and federal policies affecting immigration statistics. As agreed with your Subcommittee, we will provide this information at a later date."
United States. General Accounting Office
1998-06
-
Wildfire Prevention Patrol Guide
"The use of our wildlands by people, living, working and recreating is increasing rapidly in today's world. Many areas that received light visitor use a few years ago, now experience large numbers of people over an extended recreational season. The increased use of our wildlands escalates the risk of fire ignitions which threaten and damage human life, homes, property and natural resources. The wildfire prevention strategies which are most effective dealing with these types of human ignitions fall within the categories of education and enforcement. The most effective implementation of these prevention actions occur immediately before, during or after these activities take place. For example, it is proven that the most effective prevention actions that reduce recreational campfire ignitions include posting signs at specific camping locations, educating the specific target or user group and conducting highly visible patrols during periods of high fire danger. The irony of this situation is that as human-use of our wildland areas has increased, agency patrols and presence in these use areas has often decreased-generally, as a result of increased operating costs and decreased agency staffing. The challenge to proactively prevent unwanted loss of life, property and natural resources then becomes 'Implement effective prevention patrols in high risk, hazard and value areas during periods of increased fire danger with limited resources.' This guide is designed to help you take this first step and develop the appropriate and effective patrol plan for your area. The challenge that may remain is to garner agency support for and implement a proactive prevention program."
National Wildfire Coordinating Group (U.S.)
1998-06
-
FBI Law Enforcement Bulletin: June 1998
This issue provides an article about the number of effective strategies to help police officers prevent alcohol abuse by underage drinkers. Another article examines how some criminals are turning computers into clandestine remote-controlled listening devices. The bulletin also includes an article about the multidisciplinary response to domestic violence, as well as an article addressing workplace privacy. Regular departments provide information on mobile data access, family violence, death row data, and unidentified victims.
United States. Federal Bureau of Investigation
1998-06
-
International Crime Control Strategy
International criminal activity has increased in scale and extent in the wake of globalization, becoming a complex worldwide threat. International criminals today engage in a wide range of illegal activities, including drug trafficking, terrorism, alien and contraband smuggling, fraud, extortion, money laundering, bribery, economic espionage, intellectual property theft, and counterfeiting. Many also resort to extreme violence to advance their criminal enterprises. International criminals ignore borders, except when seeking safe haven behind them. They move sums of money through the international financial system that are so huge they dwarf the combined economies of many nations. They are often organized in multi-crime businesses, and they have capitalized on growth in international communications and transportation to expand their criminal operations and form potent alliances. They threaten all nations, including our own. International crime is not only a law enforcement problem; it is a formidable and increasing threat to national and international security. This document discusses the corrosive activities of international criminals in the post-Cold War era, and how they no longer threaten particular countries or regions, but threaten the whole world.
National Security Council (U.S.)
1998-06
-
Bioterrorism as Public Health Threat
In addition to meeting the continuing threat of new and reemerging infectious diseases, public health officials must also prepare for the possible use of infectious agents as weapons by terrorists to further personal or political agendas. These were the conclusions of session panelists. The potential spectrum of bioterrorism ranges from hoaxes and use of non-mass casualty devices and agents by individuals and small groups to state-sponsered terrorism that employs classic biological warfare agents and can produce mass casualties. If released under ideal environmental circumstances, certain agents can infect hundreds of thousands of persons and cause many deaths. Such scenarios would present serious challenges for patient management and for prophylaxis of exposed persons; environmental contamination could provide a continuing threat to the population and generate panic in the community.
Centers for Disease Control and Prevention (U.S.)
Franz, David R.; McDade, Joseph E.
1998-06
-
Digital Land Mobile Radio (DLMR) Security Problem Statement
"This problem statement highlights emerging security issues associated with evolving public safety radio communications systems. This narrative addresses the vital need for security from an infrastructure protection perspective, explains the cause of new security threats and vulnerabilities, and highlights the security challenges that face the public safety community."
United States. Department of Homeland Security. SAFECOM
United States. Public Safety Wireless Network Program
1998-06
-
LMR Replacement Cost Study Report
"This cost study was performed to estimate the replacement value of the Nation's public safety LMR equipment and infrastructure. Completed in June 1998, the study represents the first known comprehensive effort to estimate the replacement value of the LMR communications infrastructure currently installed and used by public safety agencies of local, state, and federal governments."
United States. Department of Homeland Security. SAFECOM
United States. Public Safety Wireless Network Program
1998-06
-
Cultural Explanations for Vietnamese Youth Involvement in Street Gangs
"The goal of this project was to provide recommendations toward the development of effective community-based programs to prevent gang membership and related delinquency. This cross-sectional study examined the relationship between gang involvement and delinquency in communities which have a large number of Vietnamese refugee families in Southern California. Intra-ethnic group comparisons of delinquency using 1,032 official records showed that Asian gang delinquency represents up to 48% of all Asian delinquency. Hypotheses concerning both cultural and non-cultural aspects of the etiology of youth gang involvement were developed in a series of focus groups with experts in Vietnamese culture and experts in gang behavior. Interviews with 270 pairs of Vietnamese parents and youths were conducted in a community agency setting by trained Vietnamese interviewers. Gang involvement was measured using both a traditional method, and an innovative method which quantified the centrality of gang members in the social life of the youth. Multivariate analyses indicated that non-cultural explanations were more predictive than cultural explanations of gang involvement. The best predictors were a positive attitude toward gangs on the part of the youth, and the presence of gangs in the youth's residential neighborhood environment. Findings suggest that promising approaches to reducing gang participation should include changing attitude toward gangs from positive to negative. Additionally, youth should be equipped with interpersonal skills to resist the influence of gangs within their residential areas. Attitude change and gang resistance skills should be incorporated into programs designed to reduce gang involvement among youth."
United States. Office of Juvenile Justice and Delinquency Prevention
Kent, Douglas. R.; Felkenes, George T.
1998-06
-
Sea Dragon Network: Implications of the International Expansion of China's Maritime Shipping Industry
"This thesis examines motivations and implications of the international expansion of China's maritime shipping industry (MSI). China's economic growth strategy depends on maritime shipping to export foreign exchange earning commodities and import strategic energy, industrial, and food resources. China's MSI is expanding faster than that of any nation and is creating regional shipping networks that increase levels of Sino-foreign trade (SFT) interdependence. The argument herein is that increases in SFT enhance Beijing's regional ability to advance China's economic, political, and security interests."
Naval Postgraduate School (U.S.)
Hugar, Wayne R.
1998-06
-
Safety Compliance Oversight Plan for Rail Transportation of High-Level Radioactive Waste and Spent Nuclear Fuel: Ensuring the Safe, Routine Rail Transportation of Foreign Research Reactor Spent Nuclear Fuel
"The primary purpose of this SCOP [Safety Compliance Oversight Plan] is to address stakeholders' concerns in regard to rail shipments of foreign research reactor fuel from the Concord Naval Weapons Station to INEEL [Idaho National Engineering and Environmental Laboratory] and from Charleston Naval Weapons Station to SRS [Savannah River Site] relative to the rail mode of transportation. This means addressing various issues associated with the railroad operating environment, such as human factors, mechanical equipment condition, infrastructure integrity and highway-rail grade crossing safety, for example. This plan will emphasize and coordinate actions between the FRA [Federal Railroad Administration], other Federal, State, local and tribal organizations and rail carriers, in order to promote the safe and secure rail transport of these shipments on the Nation's railroads. A secondary purpose of this SCOP is to establish a comprehensive task plan that can be used as a planning document for coordination of activities associated with rail shipments of SNF [Spent nuclear fuel] and HLRW [High-level radioactive waste] other than foreign research reactor fuel and national security shipments transported in accordance with 49 CFR 173.7(b). The tasks addressed in this SCOP incorporate existing and previously unstated actions that will be performed in order to ensure the safe and secure movement of the FRRF by rail in the United States. The existing actions that the FRA has implemented on known past shipments of SNF and HLRW in accordance with the agency's previous inspection policy3 are, of course, included. However, tasks in subject areas that were not specifically stated in the agency's previous policy have been added. While not specifically applied to a specific SNF or HLRW movement or shipping program, many of these 'additional' tasks were still addressed under existing regulations, policies and railroad safety oversight operations."
United States. Federal Railroad Administration
1998-06
-
Technical Information Bulletin 98-5: Signaling System Number 7 Standardization
This Bulletin reviews the Recommendations of the International Telecommunication Union - Telecommunication Standardization Sector (ITU-T) for Signaling System Number 7. It adheres to the conventions of the ITU-T with respect to spelling and terminology. For instance, the Recommendations refer to SS No. 7, and "signaling" is the consistent spelling within the Recommendations, whereas the national standards, published by the American National Standards Institute (ANSI) Accredited Standards Committee T1, refer to both SS7 and SS No. 7 as well as signaling and signaling. (In fact, the Recommendations are not consistent, especially where the text appears to have been contributed by T1.) The ITU-T terminology such as "clear down," which refers to the U.S. action known as "tear down," is also used. The Bulletin is based on Recommendations current as of September 1997. While there have been revisions to the Recommendations dated in 1998, the revisions are not known to be substantial, and the dates of Recommendations current as of May 1998 are therefore included in the list of effective standards. Other than the ITU-T Recommendations and the ANSI T1 Standards themselves, the open literature contains little current, detailed information on SS No. 7. The one exception discovered is Russell, Travis, Signaling System #7, McGraw-Hill, 1995. This source, which is based on the T1 Standards, was used as a general check against the tutorial and Recommendation summaries provided in this Bulletin.
National Communications System (U.S.). Office of the Manager
1998-06
-
Technical Information Bulletin 98-4: Selected Asynchronous Transfer Mode/Emerging Satellite Communications Technology Interface Issues
Due to its capability to accommodate a broad range of traffic from diverse sources, support high data rates, and provide gains in bandwidth use efficiency, Asynchronous Transfer Mode (ATM) is gaining broad acceptance as the preferred transport mode for broadband terrestrial communications. With increasing frequency, broadband communications solutions are now involving an integrated network approach in which satellites are playing an increasingly significant role. Due to their unique operating environment, satellites offer a number of challenges when used to provide broadband telecommunications support in an integrated ATM network environment. For the most part, current challenges in this arena are the result of fundamental differences that exist between the satellite environment and the influences of the optic fiber environment upon which the development of ATM was initially based. This report presents the results of an examination from a national security and emergency preparedness (NS/EP) perspective of selected ATM/emerging satellite communications technology interface issues.
National Communications System (U.S.). Office of the Manager
1998-06
-
Technical Information Bulletin 98-6: Asynchronous Transfer Mode Standardization
The purpose of this Technical Report is to provide a technical overview of Asynchronous Transfer Mode (ATM) technology and summarize the associated standardization activity as it relates to NCS interests.
National Communications System (U.S.). Office of the Manager
1998-06
-
National Missile Defense: Status of the Debate [Updated May 29, 1998]
From the Summary: "In recent years, the debate over National Missile Defense (NMD) has focused on how best, and how quickly, to develop and deploy a system to protect the United States against a limited ballistic missile threat- either an accidental or unauthorized launch from Russia or China or a deliberate attack from a rogue state. The Clinton Administration is pursuing what it calls a '3 plus 3' strategy- the goal is to develop NMD technology over the three years through 2000 sufficiently to allow a system to be deployed three years later, by 2003, if a decision is made to do so. If a decision to deploy is deferred, development would continue. Many missile defense advocates in Congress, however, want to set a date for deploying a nationwide defense. Key issues in the debate include how quickly rogue nations might acquire long-range missiles, whether advances in technology warrant deferring a decision to deploy, whether an initial deployment should be followed by a more extensive system, cost, and the implications of a deployment decision for the Anti-Ballistic Missile (ABM) Treaty and for negotiating further limits on strategic offensive weapons. Faced with the prospect of a Presidential veto, Congress has not set a deployment date in annual defense authorization or appropriations bills. Instead, Congress has considered freestanding bills to establish NMD policy- recently the Senate took up the American Missile Protection Act of 1998, S. 1873, but a cloture vote failed on May 13."
Library of Congress. Congressional Research Service
Daggett, Stephen
1998-05-29
-
Toward a National Encryption Strategy
The 1998 current administration is struggling with the failures and challenges of advocating policy for encryption technology uses, both domestically and for export, because it neglected to develop a vision of what encryption uses meant to legitimate users, focusing instead upon threats raised by those who exploit encryption technology and how that impacted U.S. interests. It appears now that no adequate compromises can be found within the administration's departments. A National Encryption Strategy can provide some relief. In the study of national security, Strategy (with the big S') precedes policy, which in turn leads to implementation or an implementing strategy (with the little s'). This concept and the framework that go with it can provide a guide to solving the current challenges regarding encryption technology controls. In this paper, the author has attempted to report the current dilemma, identify the participants and their views, analyze the issues, and propose such a Strategy. If successful, this approach can provide the administration a fresh perspective on the issues and a means of selecting compatible policies for the variety of areas that are affected by encryption technology.
National War College (U.S.)
Camilletti, Michael H.
1998-05-28
-
Effect of Posse Comitatus Act on Proposed Detail of Civilian Employee to the National Infrastructure Protection Center
This memorandum responds to your request that the Office of Legal Counsel consider the effect of the Posse Comitatus Act ("PCA"), 18 U.S.C. § 1385 (1994), on a proposed staffing and organizational arrangement whereby a civilian employee of the Department of Defense will be detailed to the National Infrastructure Protection Center ("NIPC") to serve in that office as a deputy chief. We conclude that the proposed arrangement is permissible under the
PCA.
United States. Department of Justice
1998-05-26
-
Effect of Posse Comitatus Act on Proposed Detail of Civilian Employee to the National Infrastructure Protection Center: Memorandum for the General Counsel, Federal Bureau of Investigation [May 26, 1998]
"The proposed detail of a civilian employee of Department of Defense to the National Infrastructure Protection Center, a component of the Federal Bureau of Investigation, is permissible under the Posse Comitatus Act. This memorandum responds to your request that the Office of Legal Counsel consider the effect of the Posse Comitatus Act ('PCA'), 18 U.S.C. § 1385 (1994), on a proposed staffing and organizational arrangement whereby a civilian employee of the Department of Defense will be detailed to the National Infrastructure Protection Center ('NIPC') to serve in that office as a deputy chief. We conclude that the proposed arrangement is permissible under the PCA."
United States. Department of Justice. Office of Legal Counsel
1998-05-26
-
National Guard and Challenges of 21st Century Defense
"America's National Guard has been an integral part of her defense for over 360 years. Coming into its own by law and extensive use during the 20th century, it now stands on the threshold of the 21st struggling again for its survival and the right to be a full partner with the Regular Army. Questioning its relevance in the modern concept of short, high-tech wars envisioned by the Army, the large combat formations remaining in the Guard, particularly its 8 divisions, are seen as too big, too hard to train, and too long to deploy to be of any use in projected war plans. This assertion, despite the huge increase in commitments of a drawn-down Army and the warnings of responsible authorities within and outside the military, is the crux of the debate now raging over the Guard's future. The premise of this paper is that America cannot afford to cut the National Guard combat capability. A sufficiently large and well-equipped combat reserve is necessary to counter threats to our national security and interests. While a smaller, high-tech Regular Army is postulated as the force of the future and able to handle any eventuality; what if it's not?"
Army War College (U.S.)
Little, Shelby K.
1998-05-24
-
Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63 [White Paper]
"This White Paper explains key elements of the Clinton Administration's policy on critical infrastructure protection. It is intended for dissemination to all interested parties in both the private and public sectors. It will also be used in U.S. Government professional education institutions, such as the National Defense University and the National Foreign Affairs Training Center, for coursework and exercises on interagency practices and procedures. Wide dissemination of this unclassified White Paper is encouraged by all agencies of the U.S. Government."
United States. National Domestic Preparedness Office
1998-05-22
-
Presidential Decision Directive 63: Critical Infrastructure Protection [Audio, Part 1]
This is part one of an audio recording of the text of Presidential Decision Directive 63. This Presidential Directive builds on the recommendations of the President's Commission on Critical Infrastructure Protection. In October 1997 the Commission issued its report, calling for a national effort to assure the security of the United States' increasingly vulnerable and interconnected infrastructures, such as telecommunications, banking and finance, energy, transportation, and essential government services. Presidential Decision Directive 63 is the culmination of an intense, interagency effort to evaluate those recommendations and produce a workable and innovative framework for critical infrastructure protection.
United States. White House Office
1998-05-22
-
Presidential Decision Directive 63: Critical Infrastructure Protection [Audio, Part 2]
This is part two of an audio recording of the text of Presidential Decision Directive 63. This Presidential Directive builds on the recommendations of the President's Commission on Critical Infrastructure Protection. In October 1997 the Commission issued its report, calling for a national effort to assure the security of the United States' increasingly vulnerable and interconnected infrastructures, such as telecommunications, banking and finance, energy, transportation, and essential government services. Presidential Decision Directive 63 is the culmination of an intense, interagency effort to evaluate those recommendations and produce a workable and innovative framework for critical infrastructure protection.
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
1998-05-22
-
Presidential Decision Directive 63: [For Official Use Only]
This Presidential Directive builds on the recommendations of the President's Commission on Critical Infrastructure Protection. In October 1997 the Commission issued its report, calling for a national effort to assure the security of the United States' increasingly vulnerable and interconnected infrastructures, such as telecommunications, banking and finance, energy, transportation, and essential government services. Presidential Decision Directive 63 is the culmination of an intense, interagency effort to evaluate those recommendations and produce a workable and innovative framework for critical infrastructure protection.
United States. White House Office
1998-05-22
-
Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63
This White Paper explains key elements of the Clinton Administration's policy on critical, infrastructure protection. It is intended for dissemination to all interested parties in both the, private and public sectors.
United States. Department of Energy
1998-05-22
-
Fact Sheet: Combating Terrorism: Presidential Decision Directive 62
President Clinton is determined that in the coming century, we will be capable of deterring and preventing such terrorist attacks. The President is convinced that we must also have the ability to limit the damage and manage the consequences should such an attack occur. To meet these challenges, President Clinton signed Presidential Decision Directive 62. This Directive creates a new and more systematic approach to fighting the terrorist threat of the next century. It reinforces the mission of the many U.S. agencies charged with roles in defeating terrorism; it also codifies and clarifies their activities in the wide range of U.S. counter-terrorism programs, from apprehension and prosecution of terrorists to increasing transportation security, enhancing response capabilities and protecting the computer-based systems that lie at the heart of America's economy. The Directive will help achieve the President's goal of ensuring that we meet the threat of terrorism in the 21st century with the same rigor that we have met military threats in this century.
United States. White House Office
Clinton, Bill, 1946-
1998-05-22
-
Presidential Decision Directive 62: Protection Against Unconventional Threats to the Homeland and Americans Overseas
From the Document: "In 1995, I reaffirmed and elaborated United States counterterrorism policy in PDD-39. [Presidential Decision Directive] That policy directive remains valid. Because of our military superiority, potential enemies, be they nations, terrorist groups, or criminal organizations, are increasingly likely to attack us in unconventional ways. Adversaries will be tempted to exploit vulnerabilities in our critical infrastructure, impede continuity of government operations, use weapons of mass destruction against civilians in our cities, disrupt our transportation systems, attack us when we gather as a community at special events, and prey on our citizens overseas. As this cluster of threats matures in the coming century, I am determined that we will be prepared to deter them, prevent them, or, if necessary, limit the damage they can inflict. Success requires that we recognize the common nature of these threats, the need for an integrated response, and, in the case of critical infrastructure protection, the importance of a public-private partnership."
United States. White House Office
1998-05-22
-
Intifada & the Blood of Abraham. 'Lessons in Asymmetrical Warfare--Written in Stone'
"A historical case study concerning the Israeli Army's response to the Palestinian 'Intifada' or uprising in the late 1980's and early 1990's provides instructive planning considerations for likely future application of U.S. military force in an asymmetrical threat environment. The monograph specifically analyzes the time period from the beginning of the uprising until the handshake of Rabin and Arafat on the White House lawn September 13th, 1993. Although the theoretical application of the case study is speculative of future environments, this paper attempts to link available historical data to anticipated trends in the international security environment and emerging concepts of operational art. The argument surrounding asymmetrical types of warfare leads into a discussion of the application of IDF [Israeli Defense Force] lessons learned that may be applied to future U.S. military scenarios."
Army War College (U.S.)
Randle, Lawrence L.
1998-05-21
-
Relationship among Tasks, Centers of Gravity, and Decisive Points
"At the operational and strategic levels, military planners use the concepts of centers of gravity and decisive points to assist them in determining the best ways for accomplishing assigned tasks. By identifying the enemy's center of gravity, the planner determines the enemy assets that must be defeated to gain victory. On the other hand, by identifying the friendly center of gravity, the planner has determined the friendly assets that must be protected to retain freedom of action to attack the enemy's center of gravity. Since it may not be possible to directly attack enemy centers of gravity, friendly forces attack formations, positions, or support structures that lead directly to the center of gravity. These are referred to as decisive points....This monograph discusses the military theory of centers of gravity and its relationship to assigned tasks and decisive points. United States' joint and individual service doctrines and historical examples frame the discussion of theory. This monograph seeks to clarify the relationship among assigned tasks, centers of gravity, and decisive points to assist commanders and planners in determining how to best accomplish assigned tasks."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Springman, Jeffrey A.
1998-05-21