Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Transportation Security Administration in Defense of the National Aviation Infrastructure
"'Please remove your shoes and place them in the bin. All laptops must be removed from their cases. Place all coats, jackets and sweaters in the bins along with any metal objects including cell phones, keys, jewelry and watches. Be sure to hold onto your boarding pass and a government issued ID.'" We have heard it dozens of times and can probably all repeat it by heart, but does it really make us safer? Just one look at the seven-mile stare of the Transportation Security Officer (TSO) behind the x-ray machine display and one wonders how these individuals keep their sanity after watching hundreds of images flash before their eyes every hour. Meanwhile, small squads of TSOs do nothing more than constantly shuffle empty bins from one end of the security checkpoint to the other. The only person who appears dutifully focused stands just on the opposite side of the magnetometer as the last hurdle before entering into America's airport transportation network. These officers are the front-line defense against terrorism and crime at our nation's airports. All the while, air travelers inadvertently attempt to subvert their process by demanding faster processing lines and less intrusive security measures. The TSA [Transportation Security Agency] faces two dialectically opposing challenges; speed up the security screening process, but provide a safer, more comprehensive search. The TSA now claims that 83% of passengers only wait 10 minutes or less to enter the security checkpoint area. Once cleared to pass into the checkpoint screening area most passengers exit in less than three minutes. This means TSOs have less than 15 minutes to identify and stop a criminal or terrorist from boarding an aircraft within the United States. The TSA boasts fielding state of the art x-ray machines, body imaging technology and explosive trace detection systems which cost the US taxpayer hundreds of millions of dollars."
Air University (U.S.). Air War College
Hafer, Michael W.
2009-02-12
-
Could the United States Army Have a Positive Impact on the Insurgency and Counterdrug Problems in Peru?
From the thesis abstract: "This study analyzes the Peruvian Maoist Shining Path insurgency and its association with illegal drug traffickers to determine if United States Army elements deployed to the region, could have a positive impact on the Peruvian Government's fight against these terrorists. The Shining Path insurgency is the most serious insurgency now active in Peru. The actions of the Shining Path threaten the United States' interests and our goals on two fronts. First, the ongoing insurgency threatens the regional security of a democratic country, and secondly, the drug trade in Peru is threatening the very foundation that has made the United States a world power. Peru's internal security problems are particularly complex in that both the drug and insurgency problems have become inseparable. This study focuses on branches of the Army to determine what contributions that branch brings to the conflict, and if that contribution assists in defeating the Shining Path."
U.S. Army Command and General Staff College
Burns, Michael J.
1994
-
Understanding Measures of Effectiveness in Counterinsurgency Operations
From the thesis abstract: "Both the National Security Strategy and the National Defense Strategy recently recognized that insurgency is causing an increased threat to the security of the world. This recognition combined with the fact that the military's counterinsurgency effort in Iraq is the central front on the Global War on Terrorism has caused the military to reorient its capabilities towards defeating the threat of an insurgency. An important piece of this reorientation needs to be focused on an increased understanding of measures of effectiveness and their integration into the operational framework of a counterinsurgency campaign. An examination of the theory, history, and doctrine of counterinsurgency operations is conducted to develop a general framework of an insurgency. An understanding of the general insurgency framework is then used to develop an operational design for counterinsurgency campaigns that applies logical lines of operations that are linked to the strategic end state. This framework makes it possible to develop the theory that to be useful, measures of effectiveness must contain certain characteristics. To be a valuable analytical tool that assists the commander in making decisions, a measure of effectiveness must contain the following characteristics; it must be meaningful, it must be linked to the strategic end state, it must have a strong identifiable relationship between cause and effect, it must be observable, it must be quantifiable, and it must be precise. The better a measure of effectiveness adheres to these characteristics the more valuable a tool it will be for the commander. In addition to these characteristics, an attribute of measures of effectiveness is that they must be correlated to changes in the environment to attain timeliness as the operation progresses."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Jones, Douglas D.
2006-05-25
-
Military Strategy of Bangladesh to Counter Terrorism in Near Future
From the thesis abstract: "Bangladesh is a developing country of South Asia which earned its independence from Pakistan in 1971. With a majority Muslim populace, it enjoys a reputation as a moderate Muslim country where its people are traditionally more Bengali than Muslim. Since independence, Bangladesh has faced criminal and terrorist acts by leftist cadres, separatist armed cadres and ethnic insurgents, transnational terrorists, and political cadres. However, religious fanaticism has also terrorized Bangladesh recently in the decade. Bangladesh has taken various reactionary measures to counterterrorism. Political initiatives to resolve insurgency and reactive actions to counter radical terrorism have temporarily subsided those problems. However, the core reasons behind these problems still exit and terrorism, in different forms, is likely to resurface anytime. This possibility of escalation reiterates the necessity for adopting a proactive, aggressive counterterrorism strategy for Bangladesh. It should develop this strategy to use all instruments of power. Military and security forces should be utilized in accordance with a military strategy to enable and complement the overall strategy to be effective. The military strategy of Bangladesh needs to prepare its military and security forces in both short and long-term considerations to enable them for disrupting, degrading, and finally uprooting terrorism."
U.S. Army Command and General Staff College
Chowdhury, A. K. M. Azam
2011-06-10
-
Preparing for Beslan: Anti-Terrorism Recommendations for an American School
From the thesis abstract: "The 2004 terrorist attack on a Beslan, Russia middle school left more than a hundred innocent schoolchildren dead and many more injured. In this tragedy's wake, numerous security experts offered American school officials recommendations on how to protect children in the United States. This study asks, 'What anti-terrorism measures would be feasible, suitable, and acceptable in protecting an American school from an attack similar to the one that occurred in Beslan, Russia?' Examination of the Beslan attack enabled the creation of a model to replicate a similar threat undertaken against an American school. Compiling recommended anti-terrorism measures determined how a school could prevent and prepare for such an attack. Field research conducted at a confidential subject school included a site assessment and unstructured interviews with staff. Analysis includes how each identified anti-terrorism measure could affect the subject school in terms of cost, instruction, or school climate. Recommendations are made for school officials to implement anti-terrorism measures found to be feasible, suitable, and acceptable."
U.S. Army Command and General Staff College
Mittman, Gregory D.
2008-05-31
-
Malaysia's Participation in a United Nations Standing Force: A Question of National Security
"This thesis investigates whether Malaysia, as a small state, should participate in a United Nations (UN) standing force. The proposal to establish a UN standing force for conducting peacekeeping operations was introduced not long after the inception of the UN itself. However, due to the lack of consensus among the UN members, it was not established. After the Cold War, there has been a sharp increase in the number and complexity of peacekeeping operations. The idea for the UN to have a standing force once again has emerged and gained the attention of many parties. In analyzing whether Malaysia should participate in a UN standing force, this paper explores the concept of comprehensive security to identify the main security concerns for small states. In this process, Malaysia's security strategy is identified. A cost, risk and benefit analysis determines the effects of participation in a UN standing force on Malaysia's security interests. Considering all the security measures already implemented by Malaysia as its national security strategy, participation in a UN standing force would incur substantially more cost and pose greater risks to its security than the potential benefits that can be gained by the country."
U.S. Army Command and General Staff College
Bin Ahmad, Khairol Amali
2002-05-31
-
Dangers of an Over-Reliance on Technology
From the thesis abstract: "As America's armed forces face an extremely complex and chaotic strategic environment, the ability to maintain an advantage over an uncertain adversary is a constant challenge. The world is currently seeing an increasing number of economic and political superpowers, a rise in the ability of state and non-state actors to produce nuclear weapons and an increase in the capability of violent extremist organizations to fund and support terrorist activities. During this time of global insecurity, the United States must stay determined and focused in order to protect the American people, its allies and partners. In order to accomplish this task, the U.S. currently relies heavily on technological means which are rapidly becoming the predominant choice for defeating global threats. From the organizational structure to the facilities utilized for training, warfighters have become significantly dependent on technology and the capabilities innovation provides. Unfortunately, the negative effects created due to this over-reliance result in significant dangers and hazards to the warfighters that often go unrecognized."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
Bryant, Steven L., 1973-
2011-06-14
-
Necessity of Human Intelligence in Modern Warfare
From the thesis abstract: "Since the early days of the Revolutionary War, the United States Army has relied upon actionable intelligence in order to find, engage, and defeat enemy forces. With the complexity and technology of warfare changing dramatically over time, Army personnel have had to adapt their tactics, techniques and procedures for gaining superiority in the arena of actionable intelligence. In many of America's early conflicts, there was a heavy reliance on human intelligence which focused almost exclusively on spy networks and ground reconnaissance in order to gain reports on enemy activity. As the nature of warfare progressed, however, large-scale conflicts which relied heavily on information gathered by sophisticated technology such as signal and imagery devices became the forefront of the United States Army's effort, oftentimes at the expense of training and implementation of proven human intelligence techniques. Although the U.S. Army has in past campaigns relied heavily upon signals and imagery intelligence, success on the battlefield while engaged in insurgency and counterinsurgency requires increased human intelligence collection in order to defeat the enemies of today as well as tomorrow. Almost all military leaders recognize the necessity of accurate, timely and actionable intelligence. In yesterday's wars, the only real possibility of gaining information and a tactical advantage was by human means. As demonstrated in The Philippine War from 1899-1902, U.S. Army officers quickly realized that victory would mean exploiting the Philippine guerilla's extensive secret network. In order to infiltrate their clandestine organizations, the Army employed spies, document exploitation of captured records and extensive analysis in order to achieve their ends. The value of this information became evident throughout the campaign as key leaders within the guerilla organization and enemy movement patterns and locations became identified, giving the Army a significant tactical advantage. (Birtle, 1998) Due to the small size of these guerilla forces and lack of technological advancements at the time, Army leaders quickly realized that the defeat of cellular organizations could only be accomplished by human means. Likewise, the lack of some military leaders to rely on human intelligence has met with disastrous consequences."
US Army Sergeants Major Academy
Bollinger, Bruce Scott
2009-07-31
-
Combating Domestic Violence
From the thesis abstract: "The following is an ethical dilemma paper cover domestic violence in the ranks of the United States Army. As Senior Non-Commissioned Officers in the Army, it is important that we understand and that we [are] doing everything possible to prevent domestic violence from occurring within our units. Family violence committed by soldiers does not only destroy the homes of soldiers, but it eats away at the soldier readiness and unit readiness. With today's soldiers facing multiple deployments in support of Operation Enduring Freedom and Operation Iraq Freedom, the likelihood of violence being present in the Army's families is increasing. This paper will take a look at the occurrence of family violence within the Army as well as taking a look of statistic from the civilian sector. The information could help soldiers in combating domestic violence."
US Army Sergeants Major Academy
Roberts, Eric J.
2006?
-
Maintaining the Critical Balance: The United States, NATO, and the European Security Equilibrium in the Post-Cold War Operating Environment
From the thesis abstract: "Faced with geo-political dynamics which were temporarily suppressed during the Cold War, Europeans are again witnessing the confluence of economic instability, ethnic and religious tension, empowerment of a resurgent and influential Germany, and renewed anti-Western sentiment in the wake of disputed Russian elections. These factors are compounded by the emergence of an unstable arrangement of developing nation states, non-state actors, ethnic discord, economic instability and terrorism, previously managed and contained during the Cold War. It is intended that by means of a historical analysis of NATO's origins, this study will provide perspective and consideration for the continued importance of the Transatlantic Alliance, and notably for the historical relevancy of U.S. participation in NATO, as factors to both U.S. and European security and stability. In doing so, the work intends to produce considerations regarding the importance and means of continued U.S. participation in NATO, as these factors relate to the prioritization and application of economized U.S. military assets and capabilities in an increasingly unstable operating environment."
U.S. Army Command and General Staff College
Russo, Joseph J.
2012-06-08
-
Shift Focus on the Al Qaeda Network: A More Comprehensive Approach to Defeating Al Qaeda
From the thesis abstract: "The Al Qaeda Network is a global insurgency. However, the United States and much of the western world continue to identify it as a global terrorist organization. This improper label misleads planners at both the strategy development level and the operational level. As a result, the national strategy and operational approach are not properly focused. The nation must recognize Al Qaeda as a global insurgency and adjust both the national strategy and the accompanying operational approach accordingly. The country has failed to adhere to one of Clausewitz's first maxims; it has not properly defined the war in which it is involved. To accomplish the goal of defeating Al Qaeda and its associated movements, the U.S. strategy towards them must change from a counterterrorism-centric to a counterinsurgency-centric approach. Terrorism is a tactic, not a strategy. So who or what is the nation fighting? And how should we be doing it? By ignoring the fact that the Al Qaeda Network is a global insurgency using terrorist tactics, the United States limits its ability to develop a holistic solution to defeat and destroy, rather than simply disrupt, the network. The new approach must be centered on indirect methods, focus on Al Qaeda's ideology, employ more aggressive diplomacy, increase diplomatic and developmental capacity, and establish a clear comprehensive strategy. This paper defines the nature of Al Qaeda, assesses the drawbacks of the current strategy against it, and proposes methods to improve the United States' approach to defeating this network."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
Wetherbee, Don
2012-06-15
-
Combating Narco-Terrorism in West Africa
From the thesis abstract: "Since 2001, Africa has steadily gained strategic importance to the United States' national security interests. Vital humanitarian, security, and economic interests, including long-term access to energy in West Africa, are at risk. Inadequate border and maritime security create a permissive environment for drug cartels and terrorists to operate and find safe haven. West Africa's strategic location, lack of governance, high corruption, and porous borders attract drug traffickers, international terrorists, and transnational criminals. Many of its states have failed because they lack effective government institutions, and those institutions are coupled with corruption. Poverty and lack of opportunities for West African youth have enabled drug traffickers and terrorists to recruit many discontented people. The combination of these factors has caused West Africa to become an ideal transit site for illegal narcotics trafficking and a fertile ground for terrorist operations. This paper examines the relationship between drug trafficking and terrorism in West Africa. It is in the United States' interests to combat this emerging threat in West Africa, with United States Africa Command (USAFRICOM) taking the lead to improve security in this region."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
Sevalia, Roy C.
2012-06-15
-
Deterrence in Cyberspace
From the thesis abstract: "There are significant differences between nuclear attack and cyber attack, but the development of cyber deterrence policy is relevant to the total defense of the United States' critical infrastructure and networked cyber systems. The rapidity, ambiguity of origination, and inexpensiveness of a cyber attack creates a problem that is not easily addressed by the strategies used in the implementation of nuclear deterrence. Similar to the nuclear deterrence policy developed during the Cold War, a policy for deterrence to compliment the United States' defense of its interests in cyberspace is needed today. Influencing the mental calculus of a potential adversary is a critical aspect of defending the nation's interests in cyberspace. Having the capabilities to effectively respond to enemy aggression in cyberspace is critical to deterrence as a strategy to defend the nation's critical infrastructure. The cyber attacks conducted against Georgia and Estonia during their conflicts with Russia demonstrate the ability for widespread effects at very little cost. While the private sector must do more to ensure that critical infrastructure is adequately protected, the government similarly needs to develop better policies to deter cyber attacks. The aspects of nuclear deterrence considered relevant to cyber deterrence in this paper are attribution, penalty, credibility, definition of attack, dependency, counter-productivity, awareness, and futility."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
Rivera, Matthew
2012-06-13
-
Examining U.S Irregular Warfare Doctrine
From the thesis abstract: "The United States' overwhelming conventional military superiority has forced its enemies for the foreseeable future to fight it unconventionally, mixing modern technology with the classic techniques of insurgency and terrorism. In response to the associated strategic challenges, a growing debate occurred and continues among military historians, strategists, and leaders about the proper principles necessary for contemporary irregular warfare, particularly against a potential transnational enemy. Without a Joint Publication to serve as a guide, several of the individual services have recently published updated doctrine to address the subject: 'Air Force Doctrine Document (AFDD) 2-3: Irregular Warfare' in August 2007 and 'Army Field Manual (FM) 3-24: Counterinsurgency' in December 2006 (jointly published as 'Marine Corps Warfighting Publication 3-33.5: Counterinsurgency'). 'Joint Publication 3-24: Counterinsurgency' has an anticipated release of May 2009. The detailed content analysis of 'AFDD 2-3', 'FM 3-24', and several authoritative documents required to construct a House of Quality provided several insights for the doctrine writers; each document was contrasted against the authoritative works and against each other. Similarities, differences, missing fundamentals, and overarching doctrinal concepts were determined by examining this study's Irregular Warfare Concept House of Quality and can guide the writers in critical concepts for inclusion. Additionally, analysis revealed some implications if the enemy proves to be truly transnational instead of the more traditional state-base threats."
Air Force Institute of Technology (U.S.). School of Engineering
Kimbrough, James M., IV
2008-06
-
Is the Narco-violence in Mexico an Insurgency?
From the thesis abstract: "Since Mexican President Felipe Calderón declared war on the drug cartels in December 2006, more than 35,000 Mexicans have died due to narco-violence. This monograph examines whether the various Mexican drug trafficking organizations are insurgents or organized criminal elements. Mexican narco-violence and its affiliated gang violence have spread across Mexico's southern border into Guatemala, Honduras, and El Salvador. Additionally, the narco-violence is already responsible for the deaths of American citizens on both sides of the United States -- Mexico border, and the potential for increased spillover violence is a major concern. This monograph argues that the Mexican drug cartels are transnational criminal organizations (TCOs) that pose a national security threat to the regional state actors; however, they are not an insurgency for four reasons. First, none of the cartels have the political aim or capability to overthrow the Mexican government. Second, the various TCOs are competing criminal organizations with approximately 90 percent of the violence being cartel on cartel. For example, the violence in the city of Juárez is largely the result of the fighting between the local Juárez cartel and the Sinaloa cartel for control of one of the primary smuggling routes into the United States. Third, the cartels' use of violence and coercion has turned popular support against them thus denying them legitimacy. Fourth, although the cartels do control zones of impunity within their areas of influence, the Mexican government has captured, killed, and extradited kingpins from every major TCO. [...] The conclusion of this monograph is that the TCOs have a weak case for being an insurgency due to their lack of legitimacy because violence has been excessively cruel and lacking in purpose in the eyes of the Mexican people."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Rogan, Michael G.
2011-05-18
-
When Does a 'Hacker' Become an 'Attacker?'
From the thesis abstract: "The ability to defend the United States cyber sovereign territory is a must for the country to continue to enjoy relative freedom. The actual defense of this is far more difficult than the traditional defense of land, sea or air space. The Internet offers an environment of exponential growth in both technology and users. Couple this with an infantile and developing governing system and the Internet is both a conduit for use and a vehicle for attack. The history of cyber attack is key in determining the ability to defend and the mode in which to do it. By tracing the capabilities of adversaries, both internal and external, we can attempt to delineate the point where the electronic intrusion becomes alarming to the nation. Combine this understanding with a thorough knowledge of current methodologies and tools used for cyber attack and one has a good jump on 'knowing one's enemy.' Constraining, yet legitimizing, the effort of governments to fight the unbounded attack of cyber warriors are laws and agreements which attempt to lay ground rules for cyber utilization. Careful construction of these rules joined with vigilant international agreements can facilitate apprehension and thwarting of would-be attackers worldwide. Laws which are drafted without thought to the defense of information systems can be equally as damaging to the government that adopts them. This monograph concludes with the current efforts underway by the United States government and the Department of Defense in particular, Presidential Decision Directives 62 and 63 posture the United States for success in combating cyber aggression. The follow through by the legislative, judiciary branches and various departments will determine the success of this country in securing its national information infrastructure."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Are, David C.
1998-12-16
-
Relevance of Armor in Counterinsurgency Operations
From the thesis abstract: "Since the end of the Second World War most modern armies have been conventionally structured and equipped to fight high intensity conflicts against like armed nations. Congruently, there has also been many low intensity conflicts in which similarly equipped nations found themselves engaged. In response to these low intensity conflicts, nations employed the forces available to them, which were generally armor and mechanized in nature. The result of these conflicts have made the relevance of heavy armor, specifically the tank on the asymmetric battlefield a point of contention for the last half century. The question this poses is: How were conventionally equipped, tank heavy forces employed in COIN [Counterinsurgency] operations and were they successful? To determine this, examples of French operations in Indo China, the United States' involvement in Vietnam, Somalia, and Iraq, Canadian Afghan operations, and Russia's combat in Chechnya and Afghanistan will be analyzed. The focus for each case study will discuss the situation and threat, tactics used by the counterinsurgency force, modifications to vehicles or doctrine, and the ultimate determination of either success or failure of the tank in the conflict. The results of this study are that the combined arms team provides the commander with a lethal and capable force. The initiative is gained by commanders who seek the non-conventional employment of armor despite the situation or terrain. Task organized units or units that train with different branches enjoy greater success with less friction than units task organized under fire. Lastly, units possessing a more deployable package have a greater initial effect on the battlefield."
U.S. Army Command and General Staff College
Baker, Douglas F.
2012-06-08
-
Peer-to-Peer Learning and the Army Learning Model
From the thesis abstract: "The Army Learning Model [ALM] is the new educational model that develops adaptive leaders in an era of persistent conflict. Life-long, individual-based learning will blend together self-development, institutional instruction, and operational experience across the operational and institutional components. The ALC [Army Learning Concept] 2015 changes the method and manner in which education will be delivered to the current and future force. This thesis examined the salient areas proposed by the ALM and its impact on P2P [Peer to Peer] learning. A literature review focused on five areas before conducting a quantitative survey on how current mid-grade leader's value P2P learning. The five areas were: defining the ALM, role of the individual, class facilitator, P2P, and blended learning. These five areas were the basis for conducting a survey among ILE [Intermediate Level Education] students at Fort Leavenworth. The survey was an attitude-type survey to determine how mid-grade leaders value the salient parts of the ALM--and its impact on P2P learning/reflection. The research showed that mid-grade leaders clearly prefer P2P learning in a collaborative environment, seconded by an effective facilitator, and technology is leveraged--and not a distractor to the educational objectives. The study provides recommendations by the researcher for schools and implementing bodies from the literature review and the survey results."
U.S. Army Command and General Staff College
Adkinson, Devon F.
2011-06-08
-
National Level Engagement Strategy: A Framework for Action
From the thesis abstract: "In order to protect America's National Security in a post-drawdown world, the President needs to institute a high-level agency whose sole purpose is to decide where to expand our resources in order to combat terrorism around the world and preserve our national interests. The United States has come full circle from the time of President Clinton, who had a selective-engagement policy, through George Bush, who implemented a preemptive strike, and back to the current selective-engagement policy of President Obama. However, the selection process is like a game of 'whack-a-mole.' This thesis explains how the US came to the place we are, what we are facing now int he current Global environment, and what needs to be done to allow us to maintain a Phase 0 end-state globally. This thesis develops a comprehensive framework that synergizes 'whole of government' efforts on weak, failing, or failed states that fall withint he intersection of the strategic environment, United States desired end-state, and benefit for the engaged state."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
LeRoy, Sean P.
2012-05-15
-
NATO's Air War in Libya: A Template for Future American Operations
From the thesis abstract: "America's recent experience in Afghanistan and Iraq proved that it is easier to get into war than it is to get out of it. These two conflicts bleed America, in terms of not only blood, but also its financial treasures. In an attempt to avoid these expenses in the future, this paper explores if there is a better way to achieve our nation's policy objectives. This research paper attempts to answer the question: does NATO's air war in Libya provide a template for how the United States will settle its future military conflicts? This paper explores three case studies involving airpower to identify the feasibility of a template for future military operations. The first case study explores NATO's 78-day air war against Bosnia over Kosovo. The next case study looks at America's involvement in Afghanistan during the first six months of Operation Enduring Freedom. The last case study involves NATO and America's 2011 involvement in Libya. From these case studies emerges a template that consists of three broad requirements necessary for the Limited Boots on Ground (LBoG) model to work. Finally, this paper discusses four disadvantages of the LBoG model followed by four advantages of the LBoG model."
U.S. Army Command and General Staff College
Book, Timothy E.
2012-06-08
-
Applying the Combatant Command Construct to the DHS Command Structure
From the thesis abstract: "An analysis of the Department of Homeland Security's (DHS) current command structure reveals that it is in a state of dysfunction when it comes to providing a unified effort in securing the homeland. This is due to several reasons, but the most glaring causes are the manner in which DHS was stood up, and the disjointed command system that is currently being used in an attempt to unify the efforts of all of its agencies. The Department of Defense (DOD) had similar issues prior to 1986. Prior to this date, DOD lacked true unity-of-command and unity-of-effort in its mission of providing for the defense of the nation. The DOD, after 1986, implemented the Combatant Command (CCMD) structure which provided a single position, with the proper authority to command all military assets under its command, that could be geographically or functionally focused to carry out the duties assigned to it. These two seemingly unrelated topics, DHS' command structure problems and the DOD's CCMD, are revealed to be remarkably similar. The latter is an excellent construct for the former to follow in that it is a proven system which addresses DHS' command structure issues."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
Morris, John R.
2012-06-17
-
Ethnical Dilemmas American Fighting Forces Face in the War on Terror
From the thesis abstract: "I will use reflect my own personal opinion that face our Soldiers, Sailors, Airmen, Marines, and Coast Guard as we take the fight to the enemy in OIF [Operation Iraqi Freedom] and OEF [Operation Enduring Freedom]. This paper will focus on the negative aspects individuals take to engage insurgents in combat. It will not reflect the ninety-eight percent of these warriors who show the highest level of personal courage and conduct themselves as an ambassador to the nations we currently fight in. All personnel that serve in the Armed Forces take an oath of enlistment to do what's legal and morally right in the situations they may find themselves in current operations in the Global War on Terrorism in Afghanistan and Iraq."
US Army Sergeants Major Academy
Kroll, Cory M.
2007-11-26
-
Preemptive and Preventive Operations
From the thesis abstract: "The U.S. should reserve the right to use deep operations in the form of preemptive and preventive operations to defend our national interests even if the act meets with the disapproval of United Nations member states. Many members of the United Nations firmly believe that any and all members must request permission and receive a consensus of votes to conduct any attack against a sovereign state. Many states also feel that preemptive and preventive operations are counter productive to world order. Through this document we will discuss what each type of operation represents, and we will present past uses in which the outcome demonstrated the ability of the United States to protect not only its interests, but also its citizens abroad and here at home. The United States even though not always seeking approval of the United Nations or her allies has and will continue to exhaust all diplomatic means prior to any operation against a sovereign nation. We will also discuss the negative affects of different unilateral operations to allow the reader to form an educated decision as to the information presented. We feel that at the conclusion of this paper we will have justified the unilateral use of deep operations in the form of preemptive and preventive operations to support our way of life."
US Army Sergeants Major Academy
Hammond, Isaac; Ramos, Sandy; Williams, Carleen
2007-11-27
-
'No More Mr. Nice Guy:' U.S. Adapting to Unconventional Warfare
From the thesis abstract: "The U.S. espouses the Laws of Land Warfare, follows the guidelines of the Geneva and Hague conventions, and tries to protect non-combatants. While this way of thinking is righteous, it creates a dilemma for our Armed Forces in dealing with guerillas [sic] and insurgents. While some troops, like Special Forces, train in depth for unconventional warfare, we don't effectively train Combat Support (CS) and Combat Service Support (CSS) soldiers in counterinsurgency tactics which lead to casualties. Iraq is evidence of that."
US Army Sergeants Major Academy
Frazier, Paul W.; Newby, Maura; Thomas, Don
2004-03-08
-
Posse Comitatus: An Impediment to Our National Security
From the thesis abstract: "The Posse Comitatus Act (PCA) is often the so called linchpin that bars the use of our military forces to support and enforce civil law within the borders of the United States. This act has in effect, denied the citizens of the United States the utmost protection they should be afforded by the federal government by restricting the use of Department of Defense assets to be used as force multipliers to our federal law enforcement and intelligence agencies. The United States will be required to once again do more with less as federal spending is decreased on not only homeland defense, but its security as well. The Federal Government will need to effectively utilize the combined resources of its numerous departments in order to accomplish this endeavor. Currently, the misinterpretation of the Posse Comitatus Act and the addition of subsequent restrictions have degraded our ability to properly protect the homeland. The Posse Comitatus Act is am ambiguous and highly misinterpreted law that needs to be rescinded and replaced with a new law that clearly identifies the terms in which the use of military forces in protection the homeland is appropriate. This research paper focuses on the use of military forces in domestic affairs within the historical context of posse comitatus within the United States, the subsequent Posse Comitatus Act of 1878, the interpretation of the Posse Comitatus Act since its passage, and its current influence on the United States ability to defend its homeland."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
Schad, Jason Thomas
2012-04-25
-
Current and Future Strategy in the War on Drugs
From the thesis abstract: "The United States military's role in the War on Drugs has had a negative impact domestically and internationally. The military's strategy in the War on Drugs has depended on a concept of interdiction and eradication that has suffered from a lack of resources necessary to accomplish its objectives. Moreover, it has contributed to the overworked and overextended use of the armed forces. Internationally, the militaries strategy has contributed to the criminalization of source countries peasant populations and has undermined the militaries strategy for winning the War on Terror. Furthermore, this strategy has caused the United States to shift scarce resources from domestic law enforcement and local agencies to the Pentagon and the Military Industrial Complex."
US Army Sergeants Major Academy
Martinez, Christopher M.
2007-11-27
-
Reframing Financial Sector Identity: Options For Reducing Mexican Drug Cartel Economic Power
From the thesis abstract: "Recent analyses of Mexican drug cartels' societal control and challenge to security reveal an insurgency in the making. More dangerous is the fact that the cartels are the most successful transnational criminal organization in history. Their strength comes not only from the ability to inflict harm or deliver tons of drugs. This paper argues their greatest source of power is monetary. Analysis shows Mexican drug cartels have a mature economic model that leverages the informal economy and includes a broad base of business ownership, and depth in assets beyond drug trade. Of greater concern, the cartels have a wide span of control in banking and finance. A proper understanding of these financial networks is needed because both the U.S. and Mexico are failing to control the fiscal batttlespace. The paper reveals Mexican laws and regulations still lack basic international standards and also highlights that banking controls in both countries are vulnerable. Finally, the paper argues that renewed government and private sector partnership and investment are needed to replace the drug cartel's financial culture with a new identity that permeates the banking sector. Without fundamental cultural change and resolution of gaps in regulation, the cartel business enterprise will continue to enable security challenges on both sides of the border."
Naval War College (U.S.). Joint Military Operations Department
Cunningham, William Scott
2012-01-15
-
U.S.-Russian Arms Control: A New Paradigm
From the thesis abstract: "The U.S. and Russia concluded the New Strategic Arms Reduction Treaty (NST) in April 2010. The Obama Administration sees the treaty as a key step in its campaign to reduce the proliferation of nuclear weapons and material worldwide, and the administration clearly wants another arms control agreement with Russia to lend more support to that effort. However, conclusion of another bilateral agreement could prove problematic. The U.S. and Russia have several major differences in strategic outlook, doctrine, and weapons development that will get in the way. The U.S., for example, believes that terrorists groups and rouge states armed with nuclear weapons pose a far bigger threat to security than Russia's nuclear arsenal does. Its doctrine and weapons development focus on non-proliferation and missile defense. Russia still views the U.S., NATO, and China as major threats and relies on nuclear weapons to offset perceived imbalances in conventional capability. Instead of attempting to conclude another ―traditional�- bilateral arms control treaty, this paper argues the two sides would be better served focusing on other non-proliferation and threat reduction activities that better support the long-term security requirements of both countries."
Army War College (U.S.)
Berrier, Andrew M.
2012-01-26
-
Army National Guard and Army Reserve: An Operational Transformation
From the thesis abstract: "The Army National Guard (ARNG) and the United States Army Reserve (USAR) are an integral element of the total force and employed as an Operational force since Operation Iraqi Freedom (OIF) and Operation Enduring Freedom (OEF), while resourced as a Strategic reserve. The current level of foreign and domestic operational demands exceed the available supply of Active Component forces and these demands will not decrease in the foreseeable future. In order to sufficiently meet the current and future operational demands, the Department of Defense (DoD) and the Department of the Army (DA) must transform the ARNG and USAR from a Strategic reserve to an Operational Reserve. This transformation requires fundamental reforms in Reserve Components (RC) homeland defense/ homeland security roles and missions; personnel management systems, equipping and training policies, family and employer support policies, the organizations and structures used to manage the RC, and funding. The Department of the Army, the ARNG, and the USAR all fundamentally agree on the general definition of an Operational Reserve. However, there is not a consensus on the detailed objectives and metrics necessary to achieve the desired end state. This is one of several issues currently impeding progress in achieving this objective. The Department of the Army, the ARNG, and the USAR collectively must clearly define the specific attributes of an Operational Reserve to include the appropriate employment, support policies and resources. This paper will examine the work that DA has completed thus far. It will identify the strengths and weaknesses of the work as well as outline some detailed measureable attributes of an Operational Reserve. It will conclude with some specific changes DA must implement to the process and process oversight structure to achieve these objectives. "
Army War College (U.S.)
White, Carl L.
2010-04-13
-
Computer Network Attack and the Laws of Armed Conflict: Searching for Moral Beacons in Twenty-First-Century Cyberwarfare
From the thesis abstract: "Computer network attack ushered in change for the profession of arms. Militaries achieve effects using computers, previously attained only through physical destruction. Computer network attack's problem is it operates outside the observable domain the laws of armed conflict describe, yet its effects are what the laws address. Thus, the primary research question is: Does a legal framework of analysis exist for computer network attack? The secondary question became: If a framework exists, is it applied consistently throughout the Department of Defense? A search of literature and interviews with information operators and their associated lawyers revealed a framework by Thomas Wingfield. The framework analyzes the level of force but does not address the four basic principles for warfare; military necessity, humanity, proportionality, and discrimination. Also, the framework is not applied throughout the Department of Defense. The Joint Task Force Computer Network Operations' creation is the first step in building a hierarchical structure for consistent application of law to computer network attack. Research recommends such a structure expand Wingfield's framework for computer network attack to be a viable weapon for Twenty-First-Century Warfare."
U.S. Army Command and General Staff College
Haber, Matthew E.
2002-05-31