Advanced search Help
Searching for terms: EXACT: "Command and General Staff College (CGSC) MMAS Theses" in: series
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Lebanese Armed Forces Engaging Nahr Al-Bared Palestinian Refugee Camp Using the Instruments of National Power
From the thesis abstract: "This is a study of the Nahr Al-Bared Palestinian Camp battle, which occurred in 2007 in North Lebanon between the Lebanese Armed Forces (LAF) and Fath Al-Islam (FAI) terrorist organization. It begins with a summary of the Palestinians' history in Lebanon, the Palestinian refugee camps, Nahr Al-Bared camp (NBC) characteristics, and FAI terrorist organization. Then, the study analyses the use of the Diplomatic, Informational, Military, and Economic instruments of national power (DIME) by the LAF in engagements during the NBC battle. During this extended operation, the LAF fought a fierce battle which formed a real test of its unity, military professionalism, and its ability to fight in one of the most difficult types of combat in unconventional warfare. The battle also puts the LAF as an institution, its leadership, combat units, and combat ability under the microscope of all audio-visual media that monitored the fighting minute by minute. This study describes the instruments of national power of the United States' doctrine and then analyzes their use by the LAF to manage the NBC battle. The study concludes that the application of the instruments of national power could improve the future defense of Lebanese sovereignty regarding Palestinian camps, counter-terrorism missions, and other operations."
U.S. Army Command and General Staff College
Dagher, Jean
2017-09-06
-
India Should Develop Its Naval Power in View of Growing Potential Security Concerns Connected to China's Non-Transparent Intentions in the Indian Ocean Region
From the thesis abstract: "Indian Ocean is a major conduit for the international trade. Growing demand for energy and maritime trade across the Indian Ocean is central to interests of India and China. Hence, both have increased their regional presence using diplomatic, economic, and military measures. The activities carried out by one concerns the other and vice-versa. Keeping this in view, this thesis will examine the activities being undertaken by India and China in the Indian Ocean Region and their mutual concerns toward each other; thereby, leading India to develop its naval power. This thesis will also consider the role United States is playing, which leads to a very dynamic situation in the region. The thesis will also examine various problems obstructing India in modernization of its forces. Lastly, suitable approaches along with a suggested composition of the Indian Navy will be given in order to meet potential security concerns in the Indian Ocean Region."
U.S. Army Command and General Staff College
Jindal, Sushil Kumar
2017-09-06
-
Application of Operational Art to the Korean War
From the thesis abstract: "The purpose of this research paper is to provide lessons from the Korean War on operational art, which is the pursuit of strategic objectives, in whole or in part, through the arrangement of tactical actions in time, space, and purpose. Future operations, strategic contexts, and history-theory-doctrine integration comprise the three main points concerning the application of operational art. This research uses a comparison method for war planning by North Korea, the United Nations, and China, from the perspectives of a political aim, theory, and doctrine. The three findings are as follows. First, the operational artist must focus on future operations and should not intercede in current tactical operations. Second, the operational artist must pay attention to the ever-changing international and domestic environment to understand the strategic context of operational art from both enemy and ally. Lastly, the operational artist must integrate history-theory-doctrine into planning. Regardless of time, these three findings could apply to other war applications of operational art analysis."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Lee, Dong Pil
2017-06-27
-
European Deterrence for European Assurance: The United States and Russian Adventurism in Crimea
From the thesis abstract: "This monograph is a security strategy analysis of conventional deterrence, assurance, and coercion in Europe leading up to and beyond the Russian annexation of Crimea in 2014. The purpose of this monograph is to examine historical concepts of deterrence, assurance, and coercion to determine whether the United States' European Reassurance Initiative, later relabeled the European Deterrence Initiative, was effective and sustainable in assuring allies and partners and deterring Russia. Deterrence of adversaries did not remain a centerpiece of US national defense policy as the threat of nuclear enabled assured destruction faded with the end of the Cold War in the late 1980s. Strategic assurance measures through extended deterrence gave way to an opportunity for the evolution of conventional assurance to partners and allies of the United States as global terror networks threatened them at the onset of the twenty-first century. However, as the Global War on Terrorism began to fade, a resurgent Russia began to seek a renewed regional hegemony in Eastern Europe. Russian actions in southeastern Europe forced the United States to reassure allies and rediscover a conventional deterrence theory to stabilize European fears. The seizure of Crimea required swift action by the United States to reassure allies and partners of its commitment to the security of Europe, but the assurances and deterrence of Russian adventurism came at a cost. The price America paid between 2014 and 2017 in terms of fiscal costs, military readiness, US Congressional support, and global influence was significant and unsustainable."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Geddings, Larry V., Jr.
2017-06-19
-
IED Campaign in the U.S. Homeland: Are U.S. Military EOD Units Prepared to Respond?
From the thesis abstract: "The United States faces an increasing threat from a variety of terror groups. These groups have shown intent to utilize improvised explosive devices (IED) in their attacks. Advancements in information technology give terrorists access to encrypted communications and information on IED device construction and methods. The threat of an organized IED campaign in the Continental United States is credible. U.S. military explosive ordnance disposal (EOD) units regularly support civil authorities for isolated incidents in the United States as part of a defense support to civil authorities mission. However, EOD units have not had to integrate into a civil authority task force for a widespread, protracted response like an IED campaign. This study examines threat analysis, law, doctrine, policy and strategy, and common practice through an analytical framework of DOTMLPF (Doctrine, Organization, Training, Materiel, Leadership, Personnel, and Facilities) to assess the readiness of military EOD units to integrate into a civil task force to command and control military EOD teams. Research showed units are mostly prepared for this scenario. Minor improvements in the doctrine, training, and leadership and education could improve readiness."
U.S. Army Command and General Staff College
Vaughan, Jon B.
2017-06-09
-
Millennial Warfare
From the thesis abstract: "The Global Millennial Generation has changed Irregular Warfare through their digital nativity, opportunity for mobilization, and global networking capacity. Millennials across the globe are being mobilized in support of the global ISIL [Islamic State of Iraq and the Levant] cause. The millennials within ISILs global insurgency are the drivers of these changes. The current Irregular Warfare literature does not account for these adaptations. Although the fundamentals are not changed, the global Millennial Generation has expanded them. They are traveling to Syria, Iraq, Afghanistan, and North Africa in support, as well as remaining a significant threat in their home nation. They are acting in roles from fighters to technical experts in social media and cyber warfare. Millennials are the first 'Global Generation', the internet and social media have removed barriers that separate the world and have given them access to the world, as well as all the good and bad that comes with that access."
U.S. Army Command and General Staff College
Gilstrap, Samuel S.
2017-06-09
-
Employment of Personnel at the Tucson Border Patrol Station
From the thesis abstract: "The Tucson Border Patrol Station runs its daily operations on the U.S. and Mexico border over a span of 20 miles between Nogales, Arizona and Sells, Arizona. Tucson Station Border Patrol Agents (BPAs) drive to the border to perform their duties each day and night in different forms of personnel employment once arriving at the border. There are small teams at the Tucson Station that have been successful at performing the duties of the Border Patrol. Examples of small teams are the Tucson Station Horse Patrol Unit (HPU), all-terrain vehicle (ATV) unit, disrupt unit, and a Tucson Station mountain team. Drug Trafficking Organizations (DTOs), and Alien Smuggling Organizations (ASOs) have made the border more complex providing guides with deterrence equipment, like carpet booties and camouflage gear. Combatting the DTO/ASO complexity, while working within both a rural environment and an urban one with the heightened scrutiny of small teams is an effective method of personnel employment in the Tucson Station's area of responsibility (AOR)."
U.S. Army Command and General Staff College
Edwards, Robert W.
2017-06-09
-
Refugee Status Required for Resettlement in the United States
"Immigration is a predominant topic in the United States (US) today. There are more refugees in need of humanitarian assistance than at any other time in history. The US has been admitting thousands of refugees in numbers equivalent to mass migrations. Many of the refugees originate from the nations with terrorist extremist known for making terrorist threats against Western nations, and many Americans believe this increases the probability of a terrorist attack. The US has experienced mass migrations throughout history. The most overwhelming was the 1980 Cuban-Haitian mass migration. This thesis evaluates the criteria from the Cuban Haitian migration that is applicable or no longer applicable today, with criteria applicable today for the approval of refugee status. This thesis will determine what can be learned from the criteria applied in 1980 and the changes enacted for the approval of refugee status today. US refugee laws mandate the procedures for Customs and Immigrations on the criteria for refugee status and entry into the US. Recommendations are based on refugee criteria"
U.S. Army Command and General Staff College
Cunningham, Linda C.
2017-06-09
-
Special Warfare in and Through Cyberspace: Shaping the Operational Environment in the Human Domain
"United States Special Operations Command's contribution to unified land operations is through United States Army Special Operations Command's critical capabilities of special warfare and surgical strike. Special warfare is unique in its reliance on indigenous war fighting capacity to stabilize or destabilize operational environments. Special warfare, as a critical capability, and the conceptual application of special warfare in and through cyberspace must address special warfare's contribution to operational art in the human domain. This study uses a qualitative content analysis to explore the linkages between special warfare operations and cyberspace operations to support joint force commanders and U.S. embassy country teams in shaping the human domain. Further, cyber-enabled special warfare is explored through a typology of human action as a framework of analysis to develop methods of integrating cyberspace operations and special warfare. A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE General Studies"
U.S. Army Command and General Staff College
Barnes, Chad A.
2017-06-09
-
Forging the 10th Mountain Division for War, 1940-1945: How Innovation Created a Highly Adaptive Formation
From the thesis abstract: "As the U.S. Army faces new and uncertain challenges across the globe, the need to create new capabilities in organizations, doctrine, and equipment is critical. As new threats in the sea, air, land and cyber domains appear, it is vital for the Army to produce capable and well-equipped formations that are prepared to adapt and meet any challenges. This thesis examines the relationship between how peace-time innovation influences combat adaptation. It uses the history of the 10th Mountain Division as a historical example of how the Army faced threats in multiple areas of the world. In response, it innovated to create a new capability to fight in the mountains. Using new techniques, it recruited highly experienced volunteers, developed new training and equipment to build a new capability for the U.S. Army. As a result of this innovation, the 10th Mountain exemplified a highly adaptive and successful formation in combat. The War Department's ability to leverage innovation to create an adaptive organization is relevant to the contemporary Army and how it looks at the challenges of multi-domain battle and the Army War Fighting Challenges."
U.S. Army Command and General Staff College
Chabalko, Justin J.
2017-06-09
-
How the Success of the CSS 'Hunley' Inspired the Development of the United States Naval Submarine Force
From the thesis abstract: "The entire nation took notice the moment the news broke of the CSS Hunley's historic sinking of the slope of war Housatonic. More to the point, the hearts and minds of inventors and engineers the world over were captured, and an era of development and innovation had begun. The evening of February 17, 1864, shaped the naval policies and government viewpoints regarding submarine warfare over the course of the next three decades. Extraordinary individuals such as Simon Lake, John Holland, and Thorsten Nordenfeldt were inspired by the events of the American Civil War and developed some of the most technologically advanced machines of the time. These innovators, along with many others, sought to motivate the naval powers of the time to implement this new and unique form of warfare. However, misguided engineers and tragic accidents led to skepticism and delays to innovation. Undaunted, these engineers continued to gain momentum and notoriety for their designs, resulting in the United States Naval Department commissioning the nation's first submarine, the USS Holland."
U.S. Army Command and General Staff College
Petty, Jesse P.
2017-06-09
-
Achilles' Heel of Daesh Propaganda
From the Thesis Abstract: "In this master's thesis, the researcher, representing the Kazakhstan Armed Forces at CGSC [Command and General Staff College], offers a set of recommendations to the military decision makers with possible solutions to counter the radical religious propaganda of Daesh. By exploring the relevance and importance of propaganda for this terrorist group strategy. This research states the problem and analyzes solutions using the Applied Professional Case Study Model with embedded Army Design Methodology, SCAME [source, content, audience, media, and effects] (Propaganda Analysis) Technique by determining the Operational Approach, the Stakeholder Analysis as well as Short and Middle-Term Plan. Additionally, the research analyzes Daesh's information campaign as a case study built on information collected from unclassified documents and interviews of a subject matter expert. This research also pursues an understanding about Daesh propaganda apparatus, mastered platforms, and examines Daesh propaganda products using the SCAME Technique, an analytical tool widely practiced in the U.S. Army. Finally, this research used primarily CARL [Combined Arms Research Library] resources as well as available open-source data. Unclassified collected data includes recent studies conducted in the Institute for the Study of War, the NATO Strategic Communication Center of Excellence, and other think tank organizations providing in-depth multidisciplinary analysis of Daesh propaganda. This operational approach is based on newly developed Theory of the Maneuver in the Narrative Space."
U.S. Army Command and General Staff College
Tainov, Aidar
2017-06-09
-
Romania and The New Cold War Security Challenges
From the abstract: "The 'New Cold War' refers to a revival of the political and military unrest, magnified by the modern era domains such as informational, cyber and social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security environment, raising many challenges for the decision makers. This study tried to decipher this security paradigm, unfolding the Russian economic, political and military capabilities, analyzing the Russian objectives, methods and resources allocated to implement its strategies and describing the Kremlin foreign affairs policies, reveling, in the end, the challenges answered by the most recent Romanian National Security Strategy. Whatever history will decide to name it, this emerging 'New Cold War' will definitely affect the entire international community. Therefore, young and vulnerable democracies must acknowledge the fact they represent significant opportunities for the Russian leadership to create unrest and instability, challenging both the nation and the organization that is part of."
U.S. Army Command and General Staff College
Oancea, Lucian
2017-06-09
-
Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone
From the abstract: "The current state of world affairs is a complex and uncertain environment. Unlike during the Cold War, the world is not bi-polar, but unlike the last 16 years, counter-terrorism and the rise of non-state actors cannot be the sole focus of the U.S. security apparatus. The Gray Zone that face the U.S. government and its interests are as varied as they are numerous, however two major security challenges are the ongoing political warfare between the U.S. and its major state competitors and the GWOT [Global War on Terrorism]. These security challenges are taxing resources and capacity for operations. Considering this resource constrained strategic environment, should the U.S. Government use the Global SOF [Special Operations Forces] Network under USSOCOM [United States Special Operations Command] to conduct covert-like activities or would this be duplicative of the current capabilities and mandate of the CIA."
U.S. Army Command and General Staff College
Nephew, Jeffrey M.
2017-06-09
-
Effects of Growing Indian Military Potential on South Asian Stability
From the thesis abstract: "India is emerging as an economic powerhouse and its national power is on the rise. India's regional and global ambitions are also growing correspondingly. It is enhancing its military potential constantly to cater for its ambitions. India justifies this enhancement as being necessary to act as a counterweight to China. A detailed examination of the capabilities and strategy formulation points towards a Pakistan focused intent. South Asia is already unstable due to territorial disputes, terrorism, and political shifts. India's growing military potential-linked to its strategic thought-is likely to exacerbate the existing instability in South Asia caused by a multitude of political, ideological, and security factors."
U.S. Army Command and General Staff College
Bajwa, Hashim Iqbal
2017-06-09
-
Psychological Operations Changes That the Peruvian Army Should Implement During Counterinsurgency Operations Against the Informational Campaigns of Sendero Luminoso Political Branch Since 2000
From the abstract: "The Peruvian Government was involved against terrorist groups from 1980 to 2000. Currently, terrorist military actions have decreased. The Sendero Luminoso (SL) have changed their tactics and procedures, and nowadays SL provides security to the drug cartels. Nonetheless, the political branch of SL continues performing ideological and indoctrination activities in cities and towns. The research question is: what are the Psychological Operations (PSYOPS) changes that the Peruvian Army should implement during counterinsurgency operations against the informational campaigns of the SL political branch since 2000? This is a qualitative research to attempt to understand the doctrine, modalities, techniques, support activities, means and types of communication used by the SL insurgency and the Peruvian Army PSYOPS since 2000. The conclusions address that the Peruvian Army must reformulate its PSYOPS doctrinal framework in terms of Doctrine, Organization, Training, Materiel, Leadership, Personnel, and Facilities (DOTMLPF-P)."
U.S. Army Command and General Staff College
Carpio, Luis Ricardo
2017-06-09
-
U.S. Armored Brigade Combat Team versus Current Hybrid Threat: How Should the U.S. ABCT Be Organized and Equipped to Address the Current Hybrid Threat
"Recent conflicts and military operations in the world have shown that hybrid threat (HT) is increasingly common. U.S. combat forces can expect to encounter HTs throughout the entire range of military operations. In recent decades, the United States have prepared for and fought mainly in counterinsurgency (COIN) operations, defeating opponents who did not have the sophisticated capabilities that a current HT would employ. That is why objectively assessing the readiness of the U.S. Army's ABCT [armored brigade combat team] to wage war against a hybrid adversary is important. The problem is insufficient assessment of the U.S. Army's ABCT organization and equipment in order to answer the question of whether the U.S. Army can successfully counter the HT or whether the U.S. Army still needs to learn more, adapt, and change. The research plan used is a qualitative approach that included analysis of available documents and studying the separate but similar cases of Israel fighting Hezbollah in Lebanon in 2006 and Ukraine fighting pro-Russian separatists in Eastern Ukraine."
U.S. Army Command and General Staff College
Sobko, Serhii
2017-06-09
-
Gyges Effect: An Ethical Critique of Lethal Remotely Piloted Aircraft
From the thesis abstract: "The U.S. Army pledges to defend the country against all enemies, foreign and domestic, in a manner that upholds national values. One such way recent presidential administrations make good on their pledge to protect the American people is by authorizing military strikes using the Remotely Piloted Aircrafts (RPA). If RPA do act as a political deposit on the sacred oath sworn by our leaders to protect and defend the constitution, does the policy likewise uphold the traditional norms associated with justice in war ('jus in bello')? In other words, does the U.S. Government violate 'jus in bello' in its use of RPA to conduct military strikes? To examine this question further, it is necessary to explore three broad areas. The first, and most substantial, is the moral basis for justifiable military action. The second area is legal precedence for RPA strikes. The final area deals in the consequences of such action within today's operational environment (OE) and the effects it has on the future of warfare. This thesis critiques the
morality, legality, and military ethics of the United States' RPA Policy."
U.S. Army Command and General Staff College
Pride, Matthew D.
2017-06-09
-
Online Radicalization: Bangladesh Perspective
From the thesis abstract: "The internet has significantly increased terrorists' reach, and person to person contact is no more essential to radicalize people. Some terrorist organizations in Bangladesh are also maneuvering in the cyber domain to spread their ideologies and radicalize people. To prevent radicalization through cyberspace, Bangladesh mostly implements hard powers such as removing contents and restricting access to the internet. However, freedom of speech and access to information are prime requirements for a prosperous and democratic society. Therefore, Bangladesh should develop an effective strategy to counter radicalization without impinging citizens' freedom of speech. The country, nonetheless, faces challenges due to lack of coordination among the counter-terrorism agencies, and lack of positive initiatives to grow enduring social resilience against radicalization. Bangladesh may harness benefits by adopting key elements of seemingly successful programs of other countries. It should also create a strategy for appealing positive messaging to foster inter-faith respect and communal harmony where counter-narratives will be embedded. Besides, developing ethics and responsibility of the Internet users will create a self-monitoring system in the cyber domain. Finally, constructive measures will enable Bangladesh to develop a sustainable counter radicalization mechanism without impinging citizens' democratic rights."
U.S. Army Command and General Staff College
Rashid, Mohammad Istiaque
2017-06-09
-
Shortcomings in Information Sharing Facilitates Transnational Organized Crime
From the thesis abstract: "This study asks what shortcoming exists hindering information sharing across the U.S. Government to combat transnational organized crime (TOC). A comprehensive review of national strategies, law, and scholarly works establish the immediate security and economic threat posed by criminal organizations worldwide. The confluent business models shared by terrorist and TOC organizations requires an equally unified effort to combat these threats. By employing a levels of analysis approach to disaggregate national level, organizational level and individual level factors, four gaps emerge to combat TOC. First, divergent strategies to combat terrorist and TOC organizations are revealed. Second, the current process for information sharing relies on gate keepers access to stove piped information. Third, the absence of a lead agency to combat TOC. Finally, bureaucratic boundaries to sharing information persist. To address these shortcomings, five recommendations are provided. First, a single national strategy clearly representing the convergence between terrorist and TOC organizations. Second, the Director of National Intelligence must have the authorities necessary to unify the intelligence community (IC). Third, reorganization of the IC is urgently needed. Fourth, designate the National Counter Terrorism Center as the lead agency to combat TOC. Finally, a directive to migrate all government networks to cloud technology."
U.S. Army Command and General Staff College
Tucker, Daniel J.
2017-06-09
-
Globalization vs. National Sovereignty
From the thesis abstract: "Does the continuing increase in globalization particularly in the areas of economic, technological, travel, immigration, and multiple citizenships decrease national sovereignty and
our ability to secure the homeland? This increase in globalization may cause unintended interdependencies. This thesis investigates the relationship between globalization, national sovereignty, and homeland security. If this increase continues without a balance will the government not be able to respond to an incident or will this impact the nation's willingness to unite to secure the homeland? Since the end of the Cold War (1991) the change of scale in international business exchange is unlike any other phase in history. Since the 1990s countries allowing or offering dual citizenship have also been increasing in number. This citizenship may cause confusion of allegiances to those that have more than one."
U.S. Army Command and General Staff College
Petro, Cory J.
2017-06-09
-
Utility of Army Design Methodology in U.S. Coast Guard Counter Narcotic Interdiction Strategy
"This study investigates the utility of using Army Design Methodology (ADM) to help frame U.S. Coast Guard (USCG) counternarcotic strategy. The USCG published the Western Hemisphere Strategy in 2014, outlining the strategic and operational framework for USCG operations in the Western Hemisphere, addressing a ten-year plan to combat networks, secure borders, and safeguard commerce. This study focuses on the following questions: has the Western Hemisphere Strategy been effective, so far, in combating networks and securing our borders; and is there utility in adding ADM as a tool in developing future USCG/whole of government counternarcotics operations strategy? This study uses an applied professional case study research approach as the basis, which takes into account personal experience in USCG operations in conjunction with relevant sources in order to persuade policy makers about the rich and deep context of a setting associated with complex human issues where the goal is to take informed action to improve the situation. Drug trafficking organization operations and USCG interdiction tactics are dynamic and humanly complex, with multiple key players, stakeholders, and influencers. Ultimately, this research and analysis goal, is to validate/non-validate USCG current tactics and provide key decision makers with additional, increased interdiction options . . . or maybe more importantly, provide a recommendation for a better approach in defining the problem."
U.S. Army Command and General Staff College
McWhite, John B.
2017-06-09
-
Psychodynamic Systems Perspective on Command Relationship During Combat Operations
From the thesis abstract: "The purpose of this research thesis is to provide new insight to one of the Danish Army´s warfighting challenges pertaining to the breakdown of the command relationship between two levels of command in a military organization deployed in hostile environments. The thesis focuses on how subconscious processes influence the command relationship, and ultimately, how those processes contribute to the spectra of conflicts between the company level and battlegroup level To that end, this thesis utilizes three different theories within psychodynamic system theory to analyzing interviews and questionnaires to identify perceived problem areas within the subconscious domain and their effects on the command relationship. The analysis of the empirical data has given an understanding of how subconscious processes influence command relations and as shown how the leadership roles of boundary regulation, problem solving and pathological process have influenced the command relationship in a variety of ways. It has also shown how splitting and projection have led to conflicts and subsequent breakdown of the command relationship. Overall this thesis has unmistakably shown that subconscious processes do play a role in the breakdown of command relationship, and thus have provided new insight to one the Danish Army´s warfighting challenges."
U.S. Army Command and General Staff College
Hejlesen, Dennis W.
2017-06-09
-
Enhancing the Army Operations Process Through the Incorportation of Holography
From the thesis abstract: "In order to dominate our opponents on the battlefield, the Army must have an agnostic technology that can quickly grow. Mission command information systems must be able to extend across multiple environments regardless of a commonality in hardware. The human dimension must be met at each domain (human, land, maritime, air, space, cyber)by an information system that augments the process. The focus needs to be on data delivery at the process in need over an approved secure based hardware. Holography is the future of mission command for the commanders, staff and soldiers allowing a distributed environment for all operations. Cognitive load is greatly reduced allowing for commanders, staff and soldiers to focus on the process and not on a computer screen. The process is no longer split between trying to take data and mentally overlaying it onto the process. Data now augments reality and is a noninvasive process to decision making."
U.S. Army Command and General Staff College
Burns, Samuel M.
2017-06-09
-
From Serpent to CEO: Improving First-Term Security Forces Airman Performance Through Neuroscience Education
From the thesis abstract: "United States Air Force Security Forces relies heavily on young adults and their ability to apply judgment while under threat. Security Forces assumes inherently greater risks than its civilian counterparts; it relies on a core population of young adults between 17 and 25 years old as primary first-contact sentries, patrolmen, and combat operators. Current research indicates the human brain requires at least 26 years to reach full maturation. The implementation of Defender's Edge, a mental health performance program specifically designed for Air Force Security Forces personnel, is significant to introducing neuroscience concepts into operations to mitigate resultant risks. However, a deeper understanding of neuroanatomical and physiological considerations affecting young adults would improve reflexive performance in judgment-dependent situations. Neuroscience education offers novel enhancements to training, operations, and Defender's Edge to reduce risk and increase cognitive performance abilities in young adults."
U.S. Army Command and General Staff College
Cheatham, Michael L.
2017-06-09
-
Operational-Level Information Sharing Between the U.S. Navy and Southeast Asia Maritime Institutions
"This thesis investigates the institutional barriers to operational-level information exchange between the U.S. Navy and its ASEAN [Association of Southeast Asian Nations] counterparts. The study emerged from a stated U.S. Department of Defense objective to facilitate maritime security in the South China Sea through regional maritime domain awareness and partner interoperability. A chief obstacle to this objective is the information sharing behavior of regional maritime institutions. The principal research mechanism is a case study of U.S.-ASEAN information sharing during the 2014 multinational search for Malaysia Airlines flight MH370. Using theoretical propositions derived from relevant literature, the study explores the influence of five institutional factors--culture, policy, technology, relationships, and structure--on information sharing during the search. The case study demonstrated that each factor inhibited effective information exchange to varying degrees. The study also showed that the relative health of strategic-level relationships between stakeholders governed the operational-level behavior of most of these factors during the search. Based on the case findings, this thesis recommends two lines of effort to improve regional information sharing. The first effort focuses on improving strategic-level relationships; the second focuses on development of a U.S.-ASEAN centralized command and control hub."
U.S. Army Command and General Staff College
Haertel, David
2017-06
-
Jamaican Maritime Security: What Are the Capability Gaps That Limit the Jamaica Defence Force in the Execution of Its Roles in Maritime Security?
From the thesis abstract: "Jamaica's geostrategic location makes it attractive to transnational organized criminals involved in the illicit narcotics trade. Jamaica's maritime domain is approximately 240,000 square kilometers, and presents a significant challenge to maritime security. The overall security of Jamaica is threatened by its murder rate, which is one of the highest rates per capita worldwide. Over 70 percent of these murders are committed with guns, and are often linked to the transnational narcotics and guns trade. Since Jamaica does not manufacture guns, addressing this problem must involve the security of the country's porous borders. The research found that the main capability gaps that limit the JDF [Jamaican Defense Force] in the execution of its roles in maritime security are persistent maritime awareness and maritime presence. Mature technologies such as coastal radar and unmanned aerial vehicles are recommended as a possible part of the broad solution to address the capability gaps. However, further research is recommended to develop the specific materiel solution."
U.S. Army Command and General Staff College
Creary, Dameon I.
2017-06
-
Philippine Navy's Strategic Sail Plan 2020: A Strong and Credible Force by 2020?
From the thesis abstract: "The Philippine Navy (PN) has been trying to implement a Strategic Sail Plan 2020. The Strategic Sail Plan 2020 vision states that the PN will be a strong and credible Navy that the Philippines nation can be proud of by 2020. Its task is daunting. The PN is burdened with obsolescent equipment without a budget for replacements or modernization. The aspects that the PN has more control over: training, education, organization, doctrine, personnel, and good governance are emphasized in its Strategic Sail Plan Strategy Map as the way forward to achieving its mission. This study will review the efforts by the PN and analyze them under a framework of ends, ways, and means and analyze the means through the doctrine, organization, training, materiel, leadership and education, personnel, and facilities domains. It argues that the PN envisioned in the Strategic Sail Plan 2020 is not feasible while there are alternative, more affordable options that would meet the island nation's needs."
U.S. Army Command and General Staff College
Luna, Thomas D.
2017-06
-
Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign
From the thesis abstract: "In 2013, United States Army Special Operations Command (USASOC) published 'ARSOF 2022' which defined the two primary capabilities of US Army Special Operations Forces (ARSOF) as special warfare and surgical strike. Much has been studied about these capabilities independently, this work examines their interdependent nature during a special warfare campaign. During recent special warfare operations in Iraq and Afghanistan, these two capabilities have been employed with the intention being complementary. However, the methods and details of employment have varied from campaign to campaign. This work analyzes four operational-level special warfare campaigns during OEF [Operation Enduring Freedom] and OIF [Operation Iraqi Freedom] to identify effective techniques and principles that can be applied when utilizing surgical strike capabilities in support of a special warfare mission, thereby increasing the special operations capability of the US. Finally, based on the findings presented in this research, the author provides recommendations on how to best enable US Special Operations Command and 1st Special Forces Command (Airborne) to provide the necessary capability to meet current and future demands for surgical strike-supported special warfare campaigns."
U.S. Army Command and General Staff College
Broom, Owen M.
2017-06
-
Contribution of Security Forces Personnel to Deter Migration and Improve Stability in West Africa
From the thesis abstract: "Bordered on the north by the Sahara Desert and on the south by the Gulf of Guinea, West Africa has sixteen countries and 365 million inhabitants. This region has experienced a migration phenomenon since the period of the great empires. While this is not a major issue, for the past two decades, the rise of rebel groups, the difficult economic situation, and the spread of diseases triggered a new mindset. Although most researchers targeted politic and economic reforms as a mean to mitigate the problem, this thesis posits that security forces can play key role. This research is based on the assumption that by enforcing border control and participating in economic development, security personnel can reduce migration. In view of the above, the study analyzes the capability of the Economic Community of West African States Standby Force to reduce migration, and makes a comparative case study of Mali and U.S. migration policies."
U.S. Army Command and General Staff College
Kambre, Palababade
2017-06