Advanced search Help
Searching for terms: EXACT: "U.S. Army Command and General Staff College" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Feasibility Evaluation of Employing a Sea-Based Adjunct to the United States' National Missile Defense Strategy
Germany's development and employment of the V-2 rocket in World War II ushered in a new ERA in warfare. During the Cold War, mutual assured destruction (MAD) was a key precept of both United States and Soviet Union strategic nuclear deterrence stategies. With the Cold War over, concern over the rapid proliferation of weapons of mass destruction amongst Third World rogue nations and the threat of an accidental or unauthorized ballistic missile attack has overtaken concern for an intentional nuclear attack by the former Soviet Union. Significant congressional legislative efforts have led the Department of Defense to develop a national missile defense (NMD) strategy employing ground- based interceptor missiles to defend all fifty states from a limited ballistic missile attack. This thesis shows that a sea-based adjunct to a land-based system would be operationally and technically feasible, and it would provide significantly enhanced defensive capabilities over a land-based only NMD system. This study also uses legal treaty interpretation methods to show that the deployment of any NMD system would require modification to or withdrawal from the ABM Treaty. And if the United States decides to pursue modifications to the ABM Treaty, this thesis recommends they include allowances for sea-based NMD systems.
U.S. Army Command and General Staff College
Kreitz, Jon C.
1998-06-05
-
Domestic Threat Intelligence Management
This thesis examines DTIM at the US Army installation level. It reviews the Army's view of domestic threat based on current doctrine, as well as the joint view of terrorism as the predominate threat. It suggests a revised approach that fuses both Army and joint sources by combining the USACIDC's criminal categories with joint terrorism threat indicators. This model envisions threat as a hierarchy of seven criminal categories or threat groups ranging along a spectrum from terrorists to unsophisticated criminals. This approach accommodates the most dangerous threat scenario as well as focusing on a range of progressively more likely threat scenarios. The thesis also examines current legal guidance for conducting DTIM. Although the Army is generally prohibited from conducting activities that may pervade civil law enforcement, there are narrow exceptions provided for activities that support a military nexus. As such, DTIM may be permitted in those situations with a clearly defined nexus. Research suggests, however, a need for establishing a more definitive and systematic process for determining this nexus. Conclusions and recommendations are provided for developing DTIM to improve installation counterthreat measures. Hopefully, this thesis provides additional insight toward this goal and generates new ideas and areas for future research.
U.S. Army Command and General Staff College
Jackson, Mark A.
2001-06
-
Toxic Industrial Chemicals: A Future Weapons of Mass Destruction Threat
Nuclear, biological, and chemical (NBC) proliferation is recognized as a serious threat across the operational spectrum--from the deployment of forces to posthostility activities, but there is a misconception when it comes to toxic industrial chemicals (TICs) as equal to CW (CW) agents threats. Release of these TICs could inflict the same damage as a military CW agent, albeit larger quantities of the TIC would be required. Thus, this thesis addresses the following question: Do TICs pose a weapons of mass destruction (WMD) threat, and what are their effects on joint military doctrine for operations in chemical environments? A significant array of books, periodicals, government documents, and Internet materials dealing with WMD as they relate to CW agents (i.e., TICs) toxicities at low levels were reviewed. This thesis concludes that in the hands of terrorists, aggressive states or nonstate actors, TICs will serve as WMD, undermine regional stability, and threaten US interests. In general, joint doctrine for combat and noncombat operations inadequately take account of current TIC realities. Based on the documents cited in this thesis, the US Armed Forces have not collectively identified overall force structure requirements for dealing with this threat.
U.S. Army Command and General Staff College
Small, Larry
2002-05-31
-
Assessing the Army National Guard's Enhanced Brigade Concept: Searching for Readiness and Relevance
The Army's Enhanced Brigades were created in the early 1990s to correct readiness deficiencies discovered in the unsuccessful mobilization of Army National Guard combat units for the Persian Gulf War. According to national leaders, the US military cannot prosecute a major combat operation without them. Critics have consistently questioned current Enhanced Brigade readiness and their relevance to US military strategy. To improve Enhanced Brigade readiness, the Army has instituted a number of integrative programs; these include the Training Support XXII program, the Bosnia Task Force, integrated divisions, and others. Despite the commitment of considerable resources, only very modest improvement in premobilization readiness has been realized and these units are still far less ready than the Army desires. Additionally, Enhanced Brigades are routinely deployed to perform tasks outside of their role in the National Military Strategy. Instead of focusing on readiness for Major Regional Conflicts, Enhanced Brigades are conducting peace operations in Europe and the Middle East, while bearing the burden of ongoing Homeland Security operations. This thesis provides an investigation into how effective the Army has been in bringing Enhanced Brigades to required readiness levels and keeping these units relevant to the US military's role in accomplishing national strategic objectives.
U.S. Army Command and General Staff College
Greene, Richard G., Jr.
2003
-
U.S. Army Special Forces Training for the Global War on Terror
With USSOCOM assuming the role as supported command in the Global War on Terror, Army Special Forces will no doubt to play a primary role in that effort. The unspoken assumption seems to be that America's new, unconventional foe will best be combated with America's own unconventional warriors. It is unclear whether a force raised to conduct behind-the-lines operations against a large conventional enemy can remain the force of choice against al-Qaida and similar threats. This thesis central research question is: Is US Army Special Forces adequately prepared, and trained to fight the Global War on Terror? This thesis examines the contemporary operating environment, the threat represented by al-Qaida, and whether it represents a traditional terrorist threat or a new, transnational insurgency. A review of both types of organization over the last century indicates that al-Qaida is, at this stage, merely a terrorist organization, and not an insurgency. However, al-Qaida sprang from a region that is ripe for insurgency should the terrorists choose to become more than what they currently are. Combating the threat posed by al-Qaida, then, seems to require both an aggressive counter-terrorist campaign and a simultaneous preemptive counter-insurgency. A review of current training indicates that Special Forces appear well prepared for both efforts with one glaring deficiency: foreign language proficiency.
U.S. Army Command and General Staff College
Moll, Daniel C.
2003-06-06
-
Where Should Weapons Release Authority Reside for Space Weapons?
The U.S. has a huge reliance on space. This reliance, combined with a leaner more rapidly deployable military, makes space weapons an appealing prospect. Space weapons technology continues to advance, and as improvements occur, the weaponization of space becomes more of a reality. This thesis answers the question of where should weapons release authority reside for space weapons. The results of the research was that this authority should reside with the joint forces commander, in all but very select instances regarding the targeting and destruction of space assets belonging to neutral countries or multinational consortium. In those cases, the authority remains with the president due the potential negative impacts to America.
U.S. Army Command and General Staff College
Anderson, Charles T.
2003-06-03
-
Identifying the Roles of the Separate Governmental Agencies in Countering the Proliferation of Weapons of Mass Destruction Among Nonstate Actors Throughout the Counterproliferation Continuum
The threat posed by nation states and nonstate actors armed with WMD is arguably the greatest, current threat to US national security. Governmental efforts to counter this threat are inherently inefficient due to the current organizational and command and control (C2) structure. This study first groups governmental efforts to counter this threat into ten functional areas which are then collated into a model christened the Counterproliferation Continuum. This model defines the roles of the major, separate governmental agencies in each functional area. The Counterproliferation Continuum demonstrates a linkage between the counterterrorism and nonproliferation/counterproliferation arenas. Further, this thesis identifies shortfalls in the current organizational and C2 structures and proposes changes to optimize governmental efforts. Rectifying required shortfalls requires the formation of a controlling entity routinely involved in the process and empowered with the ability to coordinate interagency efforts and streamline the flow of information and resources. This study researches options and proposes a C2 organizational and structural regrouping which will more efficiently focus governmental efforts to counter this threat.
U.S. Army Command and General Staff College
Cottrell, Scott C.
1997-06-06
-
Dodging Bullets: The Threat of Space Debris to U.S. National Security
"With several hundreds of thousands space debris 'bullets' orbiting the Earth, the U.S. Government enters a high risk environment whenever a satellite is launched into orbit. Because of the United States' dependence on space assets, the threat of space debris should be regarded as any other threat to national security interests. The current U.S. policy towards mitigating space debris will limit the amount of space debris created by the U.S. space industry. However, since there is no 'check and balance' approach or binding authority to ensure that other space faring nations or private industries follow the current United Nations Space Debris Mitigation Guidelines, there is a threat to U.S. national security. The United Nations Space Debris Mitigation Guidelines are voluntary and lack the enforcement mechanisms to effectively ensure compliance across the international industry. A space debris mitigation compliance program within the international community would better protect U.S. national security interests in space. This thesis compares two international groups with compliance measures to explore the compliance framework and the effectiveness of the compliance programs on the impacted industry. The analysis resulted in the development of a recommended model for incorporating compliance measures for the United Nations Space Debris Mitigation Guidelines."
U.S. Army Command and General Staff College
Ireland, Susan
2010-06-11
-
Evolution of Al Qaeda
"Al Qaeda is a significant threat to the national security of the United States and its allies. This makes it important for individuals in these countries, both military and civilian, to understand the evolution of this threat. This thesis analyzes Al Qaeda's evolution from 1989 to 2006. Despite numerous assaults by the United States and its allies, Al Qaeda has evolved to continue its jihad. However, the War on Terror is not the only factor that influenced its evolution. Al Qaeda is a product of the forces of globalization. Increasing access to global finances, international travel, and sophisticated technology is what has enabled Al Qaeda to evolve into its current form. The conclusion is that Al Qaeda's evolution has made it a more formidable opponent."
U.S. Army Command and General Staff College
Wilson, Sean P.
2006-06-16
-
How to Organize the Headquarters for Information Operations at the Brigade and Division
"As the Army transforms to a modular force, the issue of information operations is a topic for leaders at all levels. A particular issue is how to organize the unit staff to plan, prepare, and execute information operations. Currently, units at the brigade and division level are trying various methods of incorporating staff officers and noncommissioned officers into the planning process for information operations. Some units are approaching the problem of integrating information operations into operations with the use of an Effects Coordination Cell. Other units have Information Operations Working Group and a Fires Cell. With this in mind, what are marked benefits to the Effects Coordination Cell methodology as opposed to the separate Information Operations Working Group and Fires Cell? The challenge for this study is to determine which is the more efficient method, determining what is gained and if the process should be standard across the Army. Using Army doctrine and military journals, the study of information operations planning and the implications were limited to brigade and division headquarters. Considerations of available resources, the commander's intent and numerous other factors lead to the conclusion that the Effects Coordination Cell is the best way for these headquarters to organize."
U.S. Army Command and General Staff College
Brock, Mark E.
2005
-
Investigation into Islamic Fundamentalism and an Assessment of Its Relationship with the Concept of Jihad
"Islamic fundamentalism and Jihad are terms which have become prominent over the last two decades but are frequently misunderstood as concepts. Fundamentalism essentially means reviving Islam with its original pure principles as outlined by Mohammad and as demonstrated by his own example. Jihad means active struggle in the path of Allah both against evil and against enemies who threaten Islam. Fundamentalism is a recurring theme in Islam which is a religion of continual renewal. Frequent attempts have been made to cleanse Islam of the potential impurities of mysticism and the secular influences of nationalism and modernization. Sunni and Shia fundamentalist movements present interesting contrasts as exemplified by the Muslim Brotherhood in Egypt and Khomeini in Iran. The Sunnis have acted as a transnational 'conscience' of Islam without gaining power. The Shia appeal to emotion, through re-enactment of dramatic history, inspired fanatical martyrdom and produced a remarkable revolution."
U.S. Army Command and General Staff College
Campbell, Alastair
1992-06
-
Nez Perce Flight to Canada: An Analysis of the Nez Perce-US Cavalry Conflicts: Applying Historical Lessons Learned to Modern Counterinsurgency and Global War on Terrorism Operations
"This study details the Nez Perce's struggle and offers a historical case study for unconventional warfare. This study proposes to answer the questions: Why did the US Army fail to achieve decisive victory over the Nez Perce in 1877; and What lessons can be taken from this historical case and applied to today's wars. Considering the history of unconventional warfare in the United States, specifically the Indian Wars, it is vital that the modern day warrior look to the lessons of the past, specifically the 1877 US Cavalry pursuit of the Nez Perce. Many of the tactics, techniques, and procedures used by the modern day warriors often derive from lessons learned in early US military confrontations, such as the Nez Perce, and are applicable to today's Global War on Terrorism and counterinsurgency operations in Iraq and Afghanistan. The US Cavalry's clash with the Nez Perce provides an excellent case study. Their battles forced the Nez Perce Indians and their horses to flee on a perilous journey that sent them1,600-miles throughout the vast Northwest of the United States. The Nez Perce skillfully eluded the US Cavalry through means of deception, flexibility, and guerilla tactics. Additionally, the Nez Perce possessed superior mobility, enjoyed an adaptive logistics system, and demonstrated battle proven leadership. Conversely, the US Army during this time was a relatively small force, significantly drawn down since the US Civil War. Among this Army were many inexperienced soldiers who lacked proper training, and older officers who, at times, struggled with the physical demands associated with pursuing and fighting against the unorthodox Nez Perce warriors. These soldiers often misunderstood their enemy's culture, their will, and lacked sound procedures for man hunting. These misunderstandings often resulted in miscalculations and underestimations that greatly prolonged their ultimate victory. A sound study of the many US cavalry and Nez Perce engagements enables the modern day warrior with the necessary tools for victory in modern combat."
U.S. Army Command and General Staff College
Pfau, Scott E.
2006-06-17
-
Preempting and Countering Al Qa'ida's Influence: Development of a Predictive Analysis and Strategy Refinement Tool
"From shortly after its inception, Al Qa'ida has sought sanctuaries from which it could safely operate and provide support to Islamist groups around the world. It found one in Sudan from 1992 to 1996, in Afghanistan from the late 1980s to 2001, and in northern Pakistan in the 1980s, 1990s, and even after 2001. It also sought a sanctuary in Somalia in the early 1990s but had only limited success due to a number of societal factors. Operation Enduring Freedom ousted Al Qa'ida from its Afghani safe haven, forcing it to find a secure environment elsewhere. Initially it was in northern Pakistan, but Al Qa'ida undoubtedly will search for other areas to expand its influence as international influences pressure the Pakistani government to allow more and more operations into the northern provinces. This thesis develops and validates a hypothesis that identifies eight characteristics of a society that attracts Al Qa'ida and helps them establish a secure environment from which to operate. The characteristics defined in this hypothesis will aid in predicting Al Qa'ida's future engagement endeavors and help develop more tailored, poignant engagement strategies to preempt or counter Al Qa'ida's expansion efforts."
U.S. Army Command and General Staff College
Charles, Andrew
2008-06-13
-
Is it Time to Designate Coast Guard Special Operations Forces?
"This qualitative thesis examines the Coast Guard's historic participation in special operations and a potential national requirement for designated Coast Guard special operations forces. Some observers have rejected the label, "Global War on Terror," and embraced the notion of a "global counterinsurgency" characterized by a constant state of low-intensity conflict punctuated by short periods of mid- to high-intensity conflict. "Peacetime" and "wartime" are less useful terms. The Coast Guard's domestic missions have made it useful for niche missions in conflict, but Goldwater-Nichols overlooked Title 14, U.S. Code. There is no reason today administratively to transfer the Coast Guard to the Navy Department because neither the Secretary nor the Chief of Naval Operations is a warfighting commander. Likewise, Congress overlooked the Coast Guard when it created Special Operations Command. Insurgent, terrorist, and criminal networks all have cellular, compartmented structures and undermine legitimate governments. The Coast Guard is a natural enemy with considerable experience fighting them at home and abroad. Moreover, post-11 September Maritime Security Response requires prolific, robust, all-weather, day-night, opposed boarding capabilities with highly discriminate use of force to respond immediately to real-time, all-source intelligence. Homeland Security presents the opportunity to acknowledge the historical record and correct the policies and resourcing necessary for Coast Guard special operations forces."
U.S. Army Command and General Staff College
Bowen, Gary Russell
2005-06-17
-
Tail of the Dragon: Sri Lankan Efforts to Subdue the Liberation Tigers of Tamil Eelam
From thesis abstract: "This operational-level analysis, focused on campaign-planning issues, identifies shortcomings in the counterinsurgency efforts of the government of Sri Lanka (GSL), as it continues its conflict against the Liberation Tigers of Tamil Eelam (LTTE). Despite foreign military and economic assistance, the GSL's concerted efforts for nearly twenty years have failed to either defeat the LTTE or achieve a peaceful settlement. The LTTE continues to function effectively, if not thrive. The framework provided by JP 5-00.1 Joint Doctrine for Campaign Planning has been used to analyze three GSL campaigns: Operation Riviresa in 1995, Operation Jaya Sikurui in 1996, and Operation Kinihira in 2000. US principles of Internal Defense and Development and Foreign Internal Defense have also been utilized in assessing these campaigns. The thesis concludes that the GSL's violation of several campaign-planning fundamentals significantly contributed to poor operational and counterinsurgency performance. Operations were compromised by insufficient political-military synchronization and poor tactical preparedness. The thesis validates the use of JP 5-00.1 as an effective methodology for analyzing situations other than war, and advocates the publication of principles concerning tactics, techniques, and procedures as a supplement to current US counterinsurgency doctrine."
U.S. Army Command and General Staff College
Amato, Edward J.
2002-05-31
-
Islam, Terrorism, and the Strategy of Enlightened Moderation
"The study focuses on analyzing the ongoing acts of violence and radicalism by individuals associated with Islam, in the light of teachings and principles of this great religion of peace, which denounces terrorism. Tracing the roots of terror in almost all faith and beliefs, it suggests that violence is not a function of faith; rather it is politically motivated with more fundamental causes and reasons for such acts. After detailed analysis of all the related aspects, the study concludes that such acts in the name of Islam are not consistent with the teachings of Islam. The study also attempts to answer these questions: Is the violence and radicalism being practiced in the name of Islam, Islamic? How has Islam, being a religion of peace, gained a reputation as a belief of war, violence, intolerance, and terror? What is the Islamic concept of jihad, and what are the misperceptions about this concept? It then suggests the means and ways to deal with the menace of terrorism in Muslim countries on a more comprehensive basis through the strategy of 'Enlightened Moderation,' proposed by President Pervez Musharraf of Pakistan."
U.S. Army Command and General Staff College
Malik, Irfan Ahmed
2005-06-17
-
What Should be the Role of the Trinidad and Tobago Defence Force in Combating the Illegal Drug Trade?
From the thesis abstract: "This study examines the role of the Trinidad and Tobago Defense Force in combating the illegal drug trade in view of the harmful effects narco trafficking is having on the nation. It compares and contrasts the different counterdrug models used by the United States and Trinidad and Tobago. It analyses the functions of the government organizations in support of national interests and the counterdrug effort at the strategic, operational, and tactical levels of military operations other than war (MOOTW). The evidence shows that role of the military in the Trinidad and Tobago model is minimal, piecemeal, and ineffective and can be compared to the pre-1989 United States model. The United States model is synchronized and coordinated and provides a comprehensive effort to counterdrug operations. Trinidad and Tobago should adopt a modified version of the United States model with an enhanced role for the Defense Force in the new model. The Defense Force can provide the means whereby there is synchronization and coordination throughout the counterdrug effort at all levels of MOOTW and in support of national interests and objectives. This would provide Trinidad and Tobago with a new comprehensive, coordinated, and synchronized model for counterdrug operations that is national in scope."
U.S. Army Command and General Staff College
Antoine, Ancil W.
2000-01
-
Defeating a Cause: Anatomy of Defeat for Conflicts Involving Non-Nation-States
"This is a study about defeat, specifically addressing the question of whether and under what circumstances non-state actors will accept defeat. This study challenges conventional wisdom that victory and defeat have a reciprocal relationship. Regardless of whether one adversary perceives victory, the opponent must accept defeat to ensure an end to the conflict. This study proposes that traditional approaches to defeating nation-states offer little utility in defeating non-state actors, and a new approach is required. To induce defeat, the threat's will must be targeted not the threat's means. Attacking the threat's means is largely ineffective because of the strength of its will or more specifically his cause. In order to induce defeat on a non-state actor his cause must be negated. This study explores numerous defeat mechanisms, such as attrition, maneuver, and entropy as methods to induce defeat. In addition, this study explores the anthropological, sociological, and psychological aspects of defeat. However, this study does not really explore specific cultural and religious influences on defeat."
U.S. Army Command and General Staff College
Sallot, Steven M.
2006-06-16
-
Crossing the Line: A Study of the Legal Permissibility of Using Federalized Troops to Protect the Nation's Borders
"The attacks of 11 September 2001 showed that America has problems with its immigration system. The nineteen hijackers involved in these attacks took advantage of a problematic immigration system to penetrate the U.S. and wreak havoc. The porous border between the U.S. and its neighbors is another means by which terrorists can enter America. This thesis examined the legal permissibility of using federal troops to protect the nation's borders. It explored the growing problem American has with illegal immigration and how that problem is a threat to national security. The only viable solution to the border security problem is an increased presence along the border. The military is a source of manpower to supplement the United States Border Patrol (USBP). Asking federal troops to assist with border security, though, can create problems with the Posse Comitatus Act (PCA). This thesis used a legal methodology to examine this issue. The legal material analyzed in the course of this study showed that, barring a change in the PCA, the most that federal troops can provide is limited assistance. Based on these findings, the recommendation of this study is that federal troops and USBP agents work in concert to protect the nation's borders."
U.S. Army Command and General Staff College
Deaile, Melvin G.
2003
-
Combat with the God of War: A Comparison of Russian Cannon Artillery from 2000 and 2016 Using a DOTMLPF Framework
From the Thesis Primary Research Question: "The decreased knowledge of mid-grade U.S. Army leaders and the ever-changing battlefield allowed U.S. adversaries to bridge the gap in artillery skills which existed prior to the Global War on Terror. Since the Global War on Terror, the tactical use of artillery in the United States Army has diminished. Over the course of multiple conflicts, the Russians have demonstrated their ability to adapt to new technology and incorporate new systems in their tactics. The U.S. military has lost its advantage and should relearn their artillery skills to prepare for the future possibility of fighting a peer/near-peer competitor. In order to prepare for a future conflict, a baseline should be set to determine how artillery will be used in conflicts of the twenty-first century. One possibility to establish a baseline is by conducting a comparative study to answer the question: 'What were the changes in Russian cannon artillery from 2000 to 2016 when examined within the framework of Doctrine, Organization, Training, Materiel, Leadership and Education, Personnel, Facilities (DOTMLPF)?'"
U.S. Army Command and General Staff College
Grubofski, Sean R.
2018-06-15
-
Should the Antigua Barbuda Defense Force Consider Transformation into a Maritime Oriented Force?
From the Thesis Abstract: "The discussion about the change in orientation of the Antigua Barbuda Defense Force (ABDF) has been ongoing for more than ten years. The argument has centered around the view that, as a nation whose most significant security concerns originate in the maritime domain and as a nation that derives much of its economic benefits from the same environment, consideration should be given to having an organization that has a naval orientation. This thesis seeks to examine the ABDF's current operating environment and determine if an argument can be made for its transformation from an army to a naval orientation. In conducting this examination consideration is given to the impact that such a transformation might have on the legal mandate of the ABDF. The conclusion arrived at is that based on the complex nature of the operating environment and the economic emphasis on the diversification of the maritime sector, transformation should be considered."
U.S. Army Command and General Staff College
Benjamin, Telbert L. A.
2018-06-15
-
Defense Support to Civil Authorities Doctrinal Shortfalls During Cyber Attacks
From the Abstract: "As doctrine continues to evolve towards multi-domain battle, the homeland is under increasing risk. In the multi-domain extended battlefield, US reliance on the defense industrial base and strategic lines of communication present adversaries with unique opportunities. At the same time, access to domestic critical infrastructure and key resources in the cyber domain could put the homeland in play in the next war. Efforts to protect the nation's infrastructure in the cyber domain currently remain largely focused on cyber-defense. What if a threat actor successfully penetrated cyber-defenses and impacted critical infrastructure? What would the defense response look like if this attack came during a major combat operation? Would such an attack be defense support to civil authorities (DSCA) or homeland defense (HD), and does it matter? This thesis explores these questions by analyzing the current DSCA doctrine and comparing it to current cyber threats."
U.S. Army Command and General Staff College
Buller, Thomas T.
2018-06-15
-
China's Gray Zone Actions in the Philippines
From the Thesis Abstract: "The United States Government lacks an effective strategy for protecting national strategic interests in the Republic of the Philippines from the threat of China's actions. Several of these interests are threatened at a significant level of risk due to China's effective use of the instruments of national power--Diplomacy, Information, Military, and Economic (DIME). China is attempting to break the alliance between the US and the Philippines, to establish de facto control of the South China Sea, and to circumvent the international order in favor of its own alternative order. These actions are coordinated to achieve hegemony in the region that some consider to be the global economic center of gravity. This study analyzes how the US, China, and the Philippines have used ways and means to coordinate the elements of national power in support of achieving national objectives, and also assesses the risk to US national strategic interests in the Philippines."
U.S. Army Command and General Staff College
Finnie, Matthew S.
2018-06-15
-
On Global Warming: A Center of Gravity Analysis of Atlantic Basin Tropical Cyclones
From the Thesis Abstract: "The United States military faces several important near-term threats including a potentially unstable Europe and Korean peninsula. While geographic combatant commanders around the world focus on state and non-state actors, they must also understand the 'threat multiplier' of global climate change. Particularly, United States Northern Command, already faces the threat of large-scale destruction on the homeland. This threat takes the form not as a terrorist group or foreign army but as an extreme weather event, a hurricane. This incredible force of nature has demonstrated destructiveness many times over in our history and is expected to be further compounded by global climate change. With rising sea levels, increased sea surface temperatures, and a warmer atmosphere, tropical cyclones are forecasted to become more intense. The response following hurricane strikes will likely overwhelm local and state agencies requiring Title 10, or federal forces to respond more often. This will require United States Northern Command to adapt its strategy for the next 50 years meet this threat."
U.S. Army Command and General Staff College
Kent, Ian P.
2018-06-15
-
Identifying an Achilles' Heel: The Vulnerabilities of the Australian Army's Logistics Information Systems in Cyberspace
From the Thesis Abstract: "Logistics Information Systems have enabled the Australian Army's supply chains, maintenance, transportation and distribution systems to become lean, responsive and efficient. However, these systems are reliant on a permissive cyberspace environment. Not only are the Australian Army's logistics information systems reliant on cyberspace to support forces in the physical domains but they routinely share information with third-party contractors, civilian and commercial vendors to generate the required effects. These interactions between information systems increase the vulnerability of military logistics information systems operating within cyberspace."
U.S. Army Command and General Staff College
Pearce, Julie A.
2018-06-15
-
Conventional Air Advising in the Combat Environment: Capabilities-Based Assessment on the Train, Advise, Assist Command-Air's Future Efforts with the Afghan Air Force
From the Thesis Abstract: "Since 1919, Afghanistan's Air Force has shared a unique relationship with the Air Advising mission. The United States led North Atlantic Treaty Organization (NATO), Train, Advise, and Assist Command-Air (TAAC-A) mission has been essential to the development of Afghanistan's Air Force. Changes in the strategy for achieving a safe and secure Afghanistan, by both the Afghanistan government and NATO, have generated additional requirements and presented new challenges for the Afghan Air Force (AAF) and their ability to support Afghan National Defense and Security Forces conducting Internal Defense and Counter-Terrorism missions. Recent efforts to modernize the AAF comes at a time when the coalition has moved away from a time-line focused mission to one that is conditions-based. A capabilities-based assessment is needed to identify capability gaps within the AAF, assess current and future capabilities and capacity, and determine how the TAAC-A Advisors can mitigate these shortfalls across the Doctrine, Organization, Training, Materiel, Leadership and Education, Personnel, and Facilities spectrum."
U.S. Army Command and General Staff College
Weitershausen, Robert J.
2018-06-15
-
Box: Building Tactical Decision Making and Warfighting Function Integration Expertise Through Wargaming
From the Thesis Abstract: "Through the use of a tabletop wargame simulation, this thesis develops an easily-distributed, adaptable, and rapid method to develop leaders' abilities in tactical decision making and warfighting function integration. Titled 'The Box', this simulation is a turn-based, hex-mapped, brigade-level, peer-capable, force-on-force tactical wargame where players assume the role of a brigade commander and staff at the National Training Center. Players must use their knowledge of tactical maneuver, planning factors, and warfighting function enablers to achieve victory. 'The Box' seeks to be a method through which a leader can develop organizations in preparation for future training events or combat deployments."
U.S. Army Command and General Staff College
Fitzpatrick, Cary J.
2018-06-15
-
Battle of Leipzig: Warfighting Functions Through Wargame Simulation
From the Thesis Abstract: "The purpose of the 'Battle of Leipzig's' game design is to simulate a tactical combat scenario that employs the implementation of the warfighting functions to facilitate learning. The U.S. Army's Mission Command Training Program 'Key Observations' publication specified valid concerns of multiple challenges that army staffs have with implementing and integrating the warfighting functions in a near-peer fight. The game design system simplifies the understanding of the warfighting functions through the historical context of the Battle of Leipzig. The end objective is a tactical wargame that simulates warfighting functions in a decision-making environment in an effort to facilitate tactical knowledge and skill development through conceptual learning."
U.S. Army Command and General Staff College
Clayton, David L.
2018-06-15
-
Application of Mental Skills Training for Sustaining Effort During Operations
From the Thesis Abstract: "Throughout history there are examples of Soldiers enduring intense combat, being tested in excruciating crucible events, and bearing continuous strain on their mind and body. Literature recounts instances in which the Soldier endured, but there are the lesser told stories of when they did not. Some people have an innate ability to endure strain, maintain focus, and sustain a tremendous effort while operating. Some, however, cannot do that on their own. Training mental skills directed towards sustaining effort during operations can prepare Soldiers for the scenarios indicated above, and enable a higher level of performance at the individual level thus improving overall teams in the Army's force. This thesis examined the following psychological aspects and training tools: Mental Toughness, Confidence, Self-Talk, Reframing, Concentration and Attention Control (Control Training), Training Concentration, and Mindfulness to define them. The author examined programs within the military and competitive sports to establish common themes and practices that utilize mental skills training, and determine which mental skills support sustaining effort."
U.S. Army Command and General Staff College
LoRusso, Nicholas J.
2018-06-15
-
Economic Power and Technology: United States and China's Struggle for Technological Supremacy
From the Thesis Abstract: "The United States and China both have various strategic goals that rely on the application of the different powers each possess. Both states have identified economic prosperity as vitally important to its national security. In the current globalized modern world, technological superiority is a major component of both economic and national security. This study explores the connection between economic power and technology security by expanding on the existing body of scholarly literature on the theory of economic power. This study focused on the use of three economic tools by the United States and China: (1) Trade policy, (2) Investment policy, (3) foreign aid and how each tool was able to achieve certain objectives related to technology security. This study also shows the versatility of economic power in its ability to cause various effects depending on the goals of the state."
U.S. Army Command and General Staff College
Ku, Sam H.
2018-06-15