Advanced search Help
Searching for terms: EXACT: "U.S. Army Command and General Staff College. School of Advanced Military Studies" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Operation Husky: Operational Art in Large Formation Combined Arms Maneuver
"Operation Husky, the Allied World War II invasion of Sicily, featured the clash of an Allied Army Group against an Axis Army. The Allied 15th Army Group was composed of fourteen divisions -- an impressive total when one considers that combined, the United States and British Armies only have twelve active duty divisions today. Further, the Axis were a formidable opponent who skillfully employed combined arms maneuver, aggressively attacked the 15th Army Group, and contested Allied air superiority. In light of the United States Army's decade long focus on wide area security, this monograph examines Operation Husky through the lens of the elements of operational art to draw out lessons for modern planners who are changing their focus to large formation combined arms maneuver. The Allies skillfully incorporated lines of operation, decisive points, operational reach, basing, culmination, and risk. However, they poorly employed the elements of center of gravity, tempo, and phasing, which arguably allowed much of the Axis Army to retrograde to Italy in good order. The reason for this poor employment was poor planning. Therefore this monograph recommends that large scale combined arms maneuver operations be completely planned prior to execution, that there is a deliberate plan to plan, that the planning is fully resourced, and finally, that planners integrate all domains, land, sea, air, space, and cyber, in their application of operational art. Operation Husky is a rich depository of vicarious experience in large scale combined arms maneuver for today's field grad officers."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Lemay, John C.
2013-10-31
-
Airborne Intelligence, Surveillance, and Reconnaissance: Mission Command and Centralized Control
From the Abstract: "The United States Army is organizing, training, and equipping its divisions with medium-altitude unmanned aerial systems (UAS). These platforms are entering the battlespace just as operations in Afghanistan may be winding down, and just as the Air Force is gaining the ability to generate sixty-five global combat air patrols with heavily armed MQ-9 Reapers. There is risk that as the Army begins to rely more on organic medium altitude capabilities, the joint force will forget important lessons learned, and that integration of organic and theater ISR [intelligence, surveillance, and reconnaissance] capabilities will suffer. This monograph examines the utility of implementing the mission command philosophy in airborne intelligence, surveillance, and reconnaissance (ISR) operations. This study begins by examining Helmuth Von Moltke's views on the exercise of disciplined initiative in battle. Brian Lawson's design problem model provides a framework for analyzing constraints as a source of friction. Confederate calvaryman [sic] J.E.B. Stuart's Gettysburg saga provides a vehicle for mission command analysis, given similiarities [sic] between Civil War cavarly [sic] reconnaissance and modern airborne ISR operations. This monograph also highlights the experiences of World War I artillerymen and their pursuit of organic airborne reconnaissance support. The artillerymen echo current dialogue on UAS employment. This study concludes by assessing the impact of increased implementation of the mission command philosophy on theater airborne ISR effectiveness."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Floyd, Garry S.
2013-09
-
No Green-On-Blue Against the Reds?: Organizational Strategies Behind Insider Attacks in Afghanistan
From the thesis abstract: "This study examines the organization-level forces that drive insurgent infiltrator behavior. More specifically, it answers the question, why has the current Taliban-led insurgency in Afghanistan adopted the infiltrator tactic of Insider Attacks when the Mujahidin did not against the Soviets in the 1980s? This is an important phenomenon to study based on the continuing ubiquity of insurgencies and the ever-increasing interaction between US forces and host-national militaries as the US attempts to increase partner-nation capabilities through training. Current studies regarding Insider Attacks focus primarily on the personal reasons behind the behavior. They lack a holistic picture by ignoring higher-level causes, especially those at the organizational level. An analysis of key insurgent and counterinsurgent theorists was used to provide a list of key insurgent and counterinsurgent strategic goals. How these goals drove the Mujahidin and Taliban infiltrator tactics was then investigated by evaluating their common infiltrator missions (e.g. spying, stealing, recruiting, and delegitimizing the incumbent)."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Thorne, John
2013-06
-
Determining Factors for EU Military Intervention
From the thesis abstract: "The United States has long urged greater contributions to regional security by its allies. Given the Obama administration's shift in emphasis to Asia it is reasonable for the United States to urge the EU to play a greater role. However, arguing a greater role does not produce actual commitments. Hence an important question for US planners is when will the EU actually commit forces to regional security missions. An analysis of EU security policy and military engagement decisions can identify the core factors that persuade EU members to approve regional security missions. The three EU military engagement cases chosen for this study were: the 2006 EU military operation in the Democratic Republic of the Congo (EUFOR RD Congo), the EU decision not to commit forces to Lebanon in 2006, and EU decision to enforce a maritime zone off the coast of Somalia (EUNAVFOR Atalanta). The case studies were selected based upon the recent maturity of EU security policy and capability. The cases also illustrate the range of situations in which the EU might be asked to act. EU security policy has evolved to embrace regional security missions but the three cases show there are specific conditions that must apply when the EU makes a decision. There must be (1) clear EU interests, (2) an international basis for mission legitimacy, and (3) a willingness on the part of Britain, France and Germany, to provide the operational leadership. Additionally, the EU will not intervene in open armed hostilities; that is, the intervention will enforce a settlement, it will not produce a settlement. Understanding the criteria under which the EU might consider military operations can help U.S. strategic and operational planners develop 'economy of force' approaches that complement U.S. and EU interests. The analysis can also provide a common frame of reference for senior U.S. decision-makers concerning EU's aspirations to be a credible global security player."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Perry, Robert S.
2013-05-23
-
NATO: Identifying New Trends Within an Old Relationship
From the thesis abstract: "NATO is a resilient organization that has stood on the vanguard of European defense for over seventy years. NATO is an organization that links North America and Europe together. Over time, a relationship of trust and respect has formed between these two entities. The relationship developed from a common threat, and it has been rooted in US leadership and resources. This trend persisted during most of NATO's history. However, emerging trends of European ascendency begin to surface, initially in the 1960s and then gaining momentum in the 1990s and early 21st Century. These trends are shown both politically, through the emergence of a collective political European identity (EU), and militarily through several European lead NATO operations (KFOR, Operations Active Endeavor / Ocean Shield, and Unified Protector). These emerging trends are a rebalancing of NATO's leadership and not a reversal of the US and European relationship."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Mays, Michael C.
2013-05-23
-
9/11 and Canadian Special Operations Forces: How '40 Selected Men' Indelibly Influenced the Future of the Force
This Monograph thesis was published in partial fulfillment of graduate studies at the U.S. Army School of Advanced Military Studies. "This monograph identifies the seminal event causing this transformation by studying Canada's 20-year experience with her national counter-terrorism task force. A new narrative posits the 2001-02 OEF deployment of a 40-man CANSOF Task Force (TF) is the seminal event. This TF's disproportionately positive impact on the Canadian national scene caused the political, military and bureaucratic levels to take note of the strategic utility of SOF. Twenty-four interviews with defence and subject matter experts from the political, federal public service, military and academic domains, as well as two leading journalists provide vital insight. In addition, defence policy since WW II is examined. The findings prove two key points. First, defence policy consistently expresses the need for an irregular force to operate in asymmetrical environs. Second, the one-year OEF commitment produces a highly positive national strategic effect. As a result, CANSOF transforms to become a distinct element of national military power. Today, this transformation from a strategic resource to a strategically relevant, distinct 'hard power' option provides Canada with greater strategic choice when she deploys her military alongside key allies."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Day, Stephen
2013-05-23
-
Implementation of U.S. Policy in the Arctic
This Monograph thesis was published in partial fulfillment of graduate studies at the U.S. Army School of Advanced Military Studies. "The recent changes in the Arctic create numerous areas of interest for the United States, largely driven by national security and economic goals. Given the multiple US interests in the Arctic, in January 2009, President George W. Bush published a national Arctic strategy: National Security Presidential Directive 66 - Homeland Security Presidential Directive 25 (NSPD 66/HSPD 25). Thereafter, numerous departments and agencies developed their supporting Arctic strategies and conducted studies, assessments, and research. However, the United States has failed to put forth the effort and funding necessary to implement its national strategy as laid out by NSPD 66/HSPD 25. An examination of the national policy, along with the various department and agency policies, exposes the intricacies and shallowness of the different assorted Arctic policies. Finally, a detailed assessment of actions taken by US Government departments and agencies in the seven areas laid out in the USG policy, reveals poor overall implementation of policy, which if not corrected, will leave the US militarily, politically, environmentally, and economically vulnerable in the Arctic."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Jordan, Teri L.
2013-05-23
-
Division Restructuring to Support the Joint Operational Access Concept
This thesis was published in partial fulfillment of graduate studies at the U.S. Army School of Advanced Military Studies. "Doctrine and the methods of employment within the strategic, operational, and tactical context of conflicts drive changes to the methods in which the Army structures and employs its elements to meet these emerging and developing trends. Form follows function; the Army adjusts its organizational structure to conform to doctrinal requirements for force structure and capabilities. Updates within Army doctrine under the Doctrine 2015 concept focusing on Combined Arms Maneuver (CAM) and Wide Area Security (WAS), as well as the Joint strategic 'Rebalance to the Pacific' and the development of the Joint Operational Access Concept (JOAC) to counter anti-access and hybrid threat capabilities provides the ideal example of a tectonic shift in doctrinal concepts. With this tectonic shifts in the fundamental Army and Joint doctrine, the Army's responsibility is to identify what, if any, structural changes are mandated to the division and subordinate units to support emerging doctrine."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Knox, Sidney A.
2013-05-23
-
Combined Arms in the Electro-Magnetic Spectrum: Integrating Non-Kinetic Operations
This Monograph thesis was published in partial fulfillment of graduate studies at the U.S. Army School of Advanced Military Studies. "Anti-access, area denial (A2AD) environments provide adversaries with an asymmetric advantage too costly for a 21st - century military to overcome. Arguably, a counter to a defense-in-depth environment is an attack-in-depth strategy. However, regaining a relative advantage requires leveraging the electro-magnetic spectrum to offset the high cost of traditional targeting methodologies. This monograph suggests a framework for negating an anti-access, area denial advantage by integrating non-kinetic operations to induce strategic paralysis within the enemy's decision cycle. Electronic warfare, computer network operations, and space control negation require the same level of command and control, integration, and synchronization as kinetic fires in order to produce discernible effects on the battlespace."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Crivellaro, Jeffrey C.
2013-05-23
-
Influence of Social Media on Crowd Behavior and the Operational Environment
From the thesis abstract: "Since the Twitter Revolution and the penetration of the Internet, social media has dramatically altered how the world interacts and responds to crisis. The United States Army has yet to fully recognize the role social media plays in determining the organization, momentum, and scope of crowds. As demonstrated throughout history, particularly in the twenty-first century, crowds are a highly disruptive means for society to communicate their agenda for change and threaten the status quo. By decreasing the time it takes for information to spread and widening the audience to which information is accessible, social media has become one of the most influential factors in shaping the operational environment and dictating civilian-military response measures. By illustrating the impact of the social media phenomenon on the operational environment, this monograph will demonstrate the Army's need to develop doctrine that merges its methodology and terminology into a coherent multidisciplinary approach."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Krumm, Justine S.
2013-05-23
-
First Time Go: Creating Capacity for Enduring Stability in Post-Operational Environments
From the thesis abstract: "Why do Army stability operations fail to produce enduring stability in target countries? The Army has access to innumerable resources for mission accomplishment. Yet, when the US. Army pulls its last combat and peacekeeping or stability troops out of the supported country, historically, the nation too quickly returns to a security dilemma which threatens or destroys the opportunity for enduring stability. This research identifies institutional causes within the U.S. Army that limit its capability to foster stable post-operational environments. Doctrine, training, leadership and education, and policy, provide the framework from which one may detect institutional causes. Findings suggest that historic institutional biases against stability operations have restricted development in doctrine, training, leadership, and education. Similar difficulties at national levels and among senior military leaders have created inconsistent guidance for the execution of stability operations. In recent years, the Army acknowledged lapses in doctrinal development, training opportunities, as well as in the leadership and education of service members. The Doctrine 2015 initiative is a product of this acknowledgement. The new doctrine with Combined Arms Maneuver and Wide Area Security, identifies the concurrent stability environment and how it influences the tactical fight. Enduring stability is the operational goal in stability operations, and can only be achieved through deliberate planning and a whole of government approach."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Taylor, Janine T.
2013-05-23
-
United States Army and Large Cities Prior to the Global War on Terror
"The United States Army has relied on a variety of doctrinal manuals for urban operations over the past seventy years. During this period, it conducted operations in Manila, Berlin, Tokyo, Seoul, Saigon, and Panama City, among other cities. While U.S. Army keystone doctrine changed many times to reflect new strategic contexts, urban doctrine remained relatively static. In particular, U.S. Army urban doctrine has never addressed effectively the unique requirements and characteristics of operations in large cities (those with a population over 750,000). Analysis of the history of U.S. Army operations in large cities, considered in relation to relevant doctrine and theory, illustrates the longstanding flaws in the U.S. Army's doctrine and mission execution. The analysis herein describes these challenges in detail, and provides recommendations for updating doctrine to address the special properties of all urban environments - particularly large cities."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Fuller, Samuel T.
2013-05-23
-
Women in Combat Arms: A Study of the Global War on Terror
"The recent institutionalization of women in combat reignites a long standing debate on their roles in the military; a debate that elicits emotionally charged responses by proponents and critics alike. While much of the current discourse concerns hypothetical discussions of women in direct combat, there is a population of female soldiers that have contributed as front line 'trigger pullers' throughout the course of the past 12 years of war in both Iraq and Afghanistan. These women are Army aviators who have served in attack aviation roles, without restriction, since the beginning of major combat operations in the Global War on Terror. Given the significant implications of the political, social, cultural, and economic ramifications of women in combat, this paper synthesizes historical evidence and statistical data of female pilots' performance within attack aviation over the span of the past two conflicts in the Middle East. This research shows that over a decade of females serving on the front lines alongside their male counterparts, there is no significant stigma or other prohibitive factors that would degrade the effectiveness or lethality of combat arms units in war."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Peña-Collazo, Seneca
2013-05-23
-
Postmodern Morals, Ends, and Means: Shifting Ideas About Why, How and for Whom Wars are Fought
From the abstract: "During the postmodern era moral reasoning on why and how nations fight has shifted. The just war tradition was founded during the fourth century in a system of thought based on natural law as defined by the Christian conception of God. This moral construct served as a means of valuing both humanitarian concerns and state sovereignty. Then, during the Enlightenment era, modernist thinkers removed God as a metaphysical basis of the just war tradition, and systematized it such that state sovereignty had greater value over humanitarian concerns. […] Therefore, there is a search for international bodies that can assume such authority. The National Security Council has accepted this responsibility, but inherently lacks the process to execute the principle to achieve postmodern purposes, so the search continues. […] A viable means exists in the postmodern technologically centric unmanned system. While there may be legitimate moral concerns surrounding drone use, when judged using the just war tradition, there are no moral concerns inherent in unmanned warfare that would prevent it from being used for humanitarian intervention. In fact, unmanned combat vehicles are well suited for such police style enforcement actions. Given the continuing search for an international authority to conduct humanitarian intervention and the viability of unmanned combat vehicles as a means to conduct such missions, these postmodern influences portend an international organization with the authority and means to conduct international police functions in otherwise sovereign states."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Vicars, Robert P., IV
2013-05-23
-
Waking the Sleeping Giant at Pearl Harbor: A Case for Intelligence and Operations Fusion
From the abstract: "Despite the fact that for many years the United States conducted detailed planning the Japanese were still able to conduct a successful attack at Pearl Harbor. The 1907 war scare with Japan led to the initiation in American of war planning against the threat of Japanese aggression, and the establishment of a standing American capability at the Army War College. Plans continuously developed and annual tested. Based on these strategic plans, the Hawaiian Department implemented and developed Joint defense plans for Oahu. Historians have shown that the United States military possessed the intelligence to indicate an impending attack on Pearl Harbor. However, the ability to respond to the attack depended on two things: early warning, and effective defense planning. In 1941, radar -- the primary means of early warning -- remained a new technology. Radar proved to be effective and correctly detected the incoming attack but lacked the ability to discriminate between friendly or enemy aircraft. This monograph has particular significance given today's concern in America regarding homeland defense, since the lessons learned from analyzing the cause of the successful Pearl Harbor attack will offer insight to planners working on modern-day concerns like potential terrorist attacks against the United States involving chemical, biological, or nuclear weapons. By determining whether poor planning or lack of early warning and response capability led to the tragedy of Pearl Harbor, this research will contribute to modern efforts to prepare for homeland defense."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Reyes, Blanca E.
2013-05-23
-
Military Applications of Cloud Computing Technologies
From the abstract: "Cloud computing -- remotely hosting network services and data -- is an emerging concept in the business world that enables the use of mobile devices, increases security, and allows more effective information sharing within organizations. Within the last year, the U.S. Department of Defense has mandated that its networks be consolidated to achieve the goals of efficiency, effectiveness, and security. Through cloud computing across the network as an entire enterprise, efforts such as the Joint Information Environment and Enterprise Email can achieve those goals. The view of military networks as an enterprise blurs the existing lines between garrison and tactical. Consolidation efforts are effective in permanent, garrison networks that are connected by high-bandwidth, fiber optic cables. Hosting mission-critical services and data in the cloud saves resources and increases cyber security in the long run. However, the implementation of similar consolidation efforts in temporary, tactical networks that are employed in austere environments presents unique challenges. These challenges will be more effectively overcome if mission command systems are developed for use in both environments, remaining issues of physical security are more fully addressed, and the concepts of cyber are effectively operationalized in a more comprehensive doctrine."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Powell, Dallas A., Jr.
2013-05-15
-
Dying Breed: The United States Cavalry in Today's Army
From the abstract: "This monograph examines how the U.S. Army's recent changes in organization, doctrine, and technology have directly impacted the role of the cavalry in today's operating environment. Given the recent changes in the Army's doctrine, organization, and advance in technology, does the United States Cavalry still perform a unique and necessary function in today's Army? Section One focuses on the 'unique and necessary' function of the U.S. Cavalry. Section Two focuses on the two main conflicts that led to the most dramatic changes to the cavalry, World War II and Operation Desert Storm. Section Three analyzes the changes that have occurred over the years to bring the cavalry's role into question. Finally, concluding that the cavalry no longer performs a unique and necessary function, this monograph recommends how the Army should approach the employment of the cavalry in future conflicts."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Thomas, Vincent A.
2013-05-13
-
Social Media Analytics: A New Approach for Cyberspace Enabled Understanding of Operational Environments
From the Abstract: "The purpose of this paper is to highlight the need to increase discourse within the Army on the impacts of cyberspace on operational environments. Current Army doctrine emphasizes network defense and offensive strike capabilities for cyberspace activities, but does not expound on focusing advanced analytical tools for increasing shared understanding of the cyberspace information environment; then using that understanding to solve problems existing in a dual cyberspace-land domain. Global interconnectedness and the speed of change demand a new approach. This research borrows from data analytics, social media, systems theory, sociology, and contemporary U.S. Army and Joint Doctrine. The paper uses the Army Design Methodology (ADM) to provide a common lexicon and model. The question for operational artists given the explosion of information technology over the last ten years is, 'How does the Army at corps level Joint Task Forces and below leverage cognitive information from cyberspace to create a more complete understanding of operational environments?' This monograph explores Social Media Analytics (SMA) as a capability for providing Army commanders and staffs with cyberspace tools for generating human centric understanding. The research addresses SMA applied to a gap in contemporary Joint and Army doctrine, and evaluates SMA as an approach to bridging that gap."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Lyons, Sean P.
2013-02
-
Counter-Improvised Explosive Device Fusion Cells and the Brigade Combat Team: A Modern Day Imperative
From the Abstract: "The Improvised Explosive Device (IED) has been responsible for more deaths and injuries than any other weapons system in both Iraq and Afghanistan. Despite a $58 billion dollar investment in C-IED [Counter-IED] capability, the Department of Defense has been unable to prevent this weapon from achieving devastating effects on military and civilian targets and threatening national objectives. Within the Army, continued organizational refinements to fighting formations combined with formalization of specific capabilities will better prepare Army units for operations in high intensity IED environments. Specifically, the creation of an organic Brigade Combat Team [BCT] Counter-IED Fusion Cell, sufficiently manned and singularly responsible for the integration and synchronization of all Counter-IED (C-IED) initiatives, will significantly improve targeting activities within the BCT and enable a more offensive posture when confronted with active IED threats."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Bennett, Benjamin A.
2013-02
-
Two Sides of the Same Coin: A Comparative Analysis of American and British Counterinsurgency Approaches at the Turn of the Twentieth Century
From the Abstract: "The recent counterinsurgency efforts in Iraq and Afghanistan revitalized interest in counterinsurgency doctrine and practice. After multiple iterations changing approaches from a lethal enemy-centric approach to a whole-of-government population-centric approach, the U.S. Army continues to revise its doctrine Field Manual 3-24, 'Counterinsurgency' to address the needs of the current and anticipated environments. During this revision a debate has come to the forefront questioning which counterinsurgency practices and approaches lead to success. This monograph analyzed two successful counterinsurgencies using a methodology similar to the RAND study 'Victory Has a Thousand Fathers' to test the validity of the most common methods employed in best practice counterinsurgency. While each counterinsurgency campaign is unique and requires employment of different methods, based on the analysis of the two successful campaigns, this monograph suggests that the probability of success in a counterinsurgency campaign increases through using an adaptive approach comprised of mixed-methods."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Griffiths, Nicholas A.
2013-02
-
Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations
"This monograph proposes theories of SOF [Special Operations Forces] and irregular warfare to describe how states can use SOF to achieve strategic objectives. The theory defines special operations forces as those forces organized to combat irregulars and irregular warfare as war fought by institutionally weak combatants, as opposed to conventional warfare between institutionally strong states. A study of the evolution of irregular warfare and its theoretical underpinnings leads to five characteristics that differentiate it from conventional warfare. These characteristics define an opaque form of warfare, requiring physical, cognitive, and moral access to successfully pursue strategic objectives. The theory then proposes a set of tenets to guide operational planners and leaders in arranging SOF tactical actions to achieve a strategic objective."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Harris, William D., Jr.
2013-02
-
Combining Concepts Operational Shock in Insurgencies
This Monograph was published in partial fulfillment of a graduate degree from the U.S. Army School of Advanced Military Studies. "The focus of this work is to ascertain whether the concept of operational shock, which has served as the intellectual underpinning of the US Army's doctrine over the past thirty years, can be used to guide an operational approach in a counterinsurgency campaign. The concept of operational shock sits at the foundation of much of United States Army's operational doctrine. The American way of war now focuses not on the destruction of an enemy's equipment and personnel, but on degrading and disrupting his ability to continue to fight. Much of counterinsurgency doctrine and theory does not fit this operational logic. The previous decade of war has led to a renewed debate both in public and inside the national security apparatus of the United States. With the publication of Field Manual 3-24: Counterinsurgency, the United States produced its first doctrine dedicated to countering insurgency in over twenty years. The logic within FM 3-24 dictates that if the counterinsurgent can dissolve the conditions that enabled the existence of the insurgency, the governmental forces can change the logic of the population."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Bulger, Ryan
2013-01
-
FARC's Influence in Brazil
From the thesis abstract: "Colombia is one of 10 countries which is bordered by Brazil. Colombia also presents the highest risk to Brazilian sovereignty due to the presence of the largest drug trafficker and guerrilla group on the American continent, the Revolutionary Armed Forces of Colombia (FARC). In addition, the region is located in the Amazon forest, one of the richest and most coveted biomes on the planet. The guerrilla organization that was born nearly half a century has undergone periods of growth and weakening, but currently still has the capacity to carry out effective direct or indirect actions. These actions can be characterized as risks to the sovereignty of the countries surrounding Colombia, including Brazil. The FARC can impose many potential threats on Brazilian sovereignty in the Amazonia as well as the entire territory. These threats include drug trafficking, recruiting people of the region to FARC's cause, weapons trafficking, occupying Brazilian territory to install training bases, and deep relationships with authorities at the highest levels of power. Analyzing the potential of these threats may be conducive to improving the ongoing Brazilian government policy, and consequentially the operational role of the Brazilian Army and its contribution to achieving the strategic goal of maintaining untouchable Brazilian sovereignty."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Silva, Gerson Rolim Da
2013-01
-
Clausewitz's Trinity: Dead or Alive?
From the thesis abstract: "Prussian Carl von Clausewitz's meta-theoretical concept known as the Trinity has the potential to serve as an analytical vehicle to understand war in both a historical and contemporary context. An inherent historical misconception, however, restrains the Trinity from reaching its full potential. One of the three elements, policy, refers directly to the form of government represented by the nation state. Thus, critics argue, the Trinity's only relevance exists in state on state warfare. Clausewitz possessed a highly sophisticated mind and it seems unlikely to many that he meant to constrain his theory to the nation-state model of governance. In fact, many scholars have argued for the relevance of his theory in non-state situations. Nevertheless, he lacked the ability to articulate his thoughts in a contemporarily acceptable way, leaving his theory open for criticism, particularly by specialists in irregular or guerilla war. This monograph contemporizes Clausewitz's Trinity by replacing policy with the more general concept of ideology, thus demonstrating a clear means to establish the Trinity's relevance for twenty-first century warfare. To illustrate the argument, one case study each from the nineteenth, twentieth, and twenty-first centuries illustrates the role of ideology's in each conflict, and shows how this term can replace policy in the traditional Clausewitzian trinity, broadening the theorist's own ideological view of nationalism and state policy to the more general concept of ideology and its various applications that serve essentially the same role as policy in practice."
U.S. Army Command and General Staff College. School of Advanced Military Studies; U.S. Army Command and General Staff College
Starskov, Kenneth A.
2013-01
-
Security Cooperation: An Old Practice for New Times
"This monograph addresses the current security cooperation structures within the context of recent strategic guidance. This guidance calls for a whole-of-government approach to build partner capacity. Much of the current security cooperation structure, organization, and funding authorities developed over the course of the Cold War, however, and focused on building the defense capability of allies and security partners against the threat of Soviet expansion. The current strategic environment, in contrast to the Cold War era, includes threats from transnational and subnational actors. Terrorism and insurgency have moved from the periphery to the forefront of security concerns. This monograph examines two case studies at the geographic combatant command level to evaluate their organizational structure and interagency processes within this new context. The monograph then examines the new DOD funding authority, Section 1206, to determine its utility as a model for future security cooperation funding initiatives. This monograph finds that the requirements for Department of State and Department of Defense collaboration under Section 1206 foster the type of interagency cooperation advocated in recent strategic guidance."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Simontis, Nicholas R.
2013-01
-
Combating the Influence of Non-State Organizations' Deep Reach: Understanding the Expanded Influence of Non-State Actors and the Methodologies Required to Counter Their Future Growth
From the thesis abstract: "Over the years, organizations such as the Hezbollah, the Liberation Tigers of Tamil Eelam (LTTE), and the Algerian Front de Libération Nationale (FLN) have provided examples of successful frameworks for the development of violent non-state actors that have the ability to influence populations inside a nation-state. In many instances, these organizations are complex and sometimes maintain state sponsorship links outside of the nation-state itself. Furthermore, well-equipped militias and quasi-governmental frameworks provide services to the local populace in order to broaden the violent non-state organization's political influence in the area. In fact, some incidents indicate that the populace often depends solely upon these organizations for their fundamental needs to include food, water, sanitation, and security. Understanding this evolving process, however, and the mechanisms that lead to the existence of these groups is critical in formulating adequate responses and effectively countering the influential growth of these organizations. [...] These new solutions, in turn, facilitate relevant actions in each unique context that enable governments to effectively counter violent non-state organizations by isolating and delinking their activity from the population. Once the activities of these groups are effectively isolated and the organization collapses an environment ensues that is suitable for future peaceful development in the region."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Sundquist, Victor H.
2013
-
Examination of USNORTHCOM's Ability to Respond to Domestic Catastrophes in Support of Civil Authorities
"In the wake of 9/11, the Secretary of Defense assigned to USNORTHCOM [U.S. Northern Command] the mission of providing military forces in support of civilian authorities in case of a natural disaster or a terrorist attack anywhere in the United States or its territories. With this directive, USNORTHCOM planners formed Joint Task Force-Civil Support (JTF-CS) with the mission of providing support to civilian authorities. This Task Force contains multiple units across the United States to support a myriad of potential scenarios. In the structure of JTF-CS there are representatives from the Army, Air Force, and Navy ready within 24-48 hours' notice to assist civilian authorities based on identified gaps in states' capabilities. Distributed across the USNORTHCOM area of responsibility, these military forces must deploy following a strict timeline set by USNORTHCOM. To support the deployment of these forces, base support installations synchronize and coordinate deployment support efforts to ensure that these forces abide by USNORTHCOM timelines. Factors that this research will consider are USNORTHCOM's ability to deploy military forces to the incident area, capabilities required to support civil authorities, and requirements necessary to support domestic catastrophes. Successful synchronization will safeguard a unified effort among all stakeholders to include military forces and civilian authorities, especially at the state level. The monograph also will consider the increased emphasis on responsibilities by local state response forces. Additionally, based on recent changes to Army Doctrine Publication ADP 3-0, Defense Support of Civil Authorities is part of the unified land operations concept. This capstone doctrine places increased emphasis on the systems available to deploy military forces in support of civilian authorities."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Carattini, Merbin
2013-01
-
Beyond the Border: Mexico's Internal Conflict is the United States' Problem
"This monograph provides a starting point to address the importance of strategic guidance as it relates to operational planning for synchronized tactical actions. Analyzing Mexico's drug-war offers an interesting case study to help understand the current situation surrounding non-traditional forms of war, such as a drug related war, and how Mexico's internal conflict impacts their regional neighbors as well as the international community. The ultimate aim is to achieve a competent level of understanding in order to establish a unified regional approach that will disrupt the Mexican drug trafficking organizations and reduce violence to an acceptable and controllable level. Accomplishing this requires the unified efforts of all elements of national power from the U.S., Mexican, and regional governments by designing an operational approach that focuses efforts and unifies goals. The current U.S. and Mexican strategies work to contain drug trafficking organizations on a limited basis, but fail to fix the problem for the long-term because of their limited approach. At the conclusion, this study reveals how the employment of unified governmental approach can enhance the United States and Mexico's current security strategy by disrupting the actions of the Mexican drug trafficking organizations."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Lachicotte, George P., III
2013-01
-
The Evolution Of Preemptive Strikes In Israeli Operational Planning And Future Implications For The Cyber Domain
"The strategic and operational use of preemptive strikes transitioned from the traditional tactic of air raids to the use of covert cyber-attacks like Stuxnet designed specifically to disrupt enemy capabilities. Through a close examination of the evolution of preemptive strikes by the Israeli Defense Forces from the 1967 and 1973 wars to its airstrikes on neighboring nuclear production facilities in Iraq and Syria to its use of Stuxnet, operational planners can gain an understanding of the evolution of preemption as a concept. Examining this shift from air strikes to cyber-attacks through the lens of U.S. Army Doctrine and the tenets of Unified Land Operations (Depth, Synchronization, Integration, Adaptability, Flexibility, and Lethality) as well as the cyber concepts of Untraceability and Deception from modern thinkers gives operational planners a deeper understanding of how to conceptualize and integrate cyber activities into planning. By grasping these concepts and their usage in cyber, planners can gain a position of relative cognitive advantage when using preemptive attacks. Conceptualizing and interpreting the evolutionary process of Israeli operational planners and their understanding and planning of preemptive attacks can shed light on how they disaggregated depth and integrated cyber into preemption. Understanding how planners can better utilize cyber weapons similar to Stuxnet in preemptive strikes, contributes to the U.S. Army's ability to retain its position of relative advantage over its adversaries in future wars."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Parmenter, Robert C.
2013-01
-
Overmatch: Enabling the Infantry Rifle Squad as the Foundation of the Decisive Force
"Upon assuming duties as the Chief-of-Staff of the United States Army, General Martin Dempsey announced a priority focus on the infantry squad. Anticipating uncertainty in the future operational environment, and an enhanced role of the squad based on an increasing battlespace, Dempsey established a requirement to ensure that the rifle squad would be enabled with what he termed 'overmatch.' While previous attempts by the Army to reform the composition of the squad have focused on adjusting manning or fielding new weapons systems, overmatch was not achieved. A more effective method to enable a squad with overmatch is to increase squad capability, focusing specifically on developing the human dimension. Case studies of squads operating in both combined arms maneuver and wide area security operations illustrate the impact of the human dimension on small units, and the potential to achieve overmatch at the squad level. The success demonstrated by squads in the contemporary operating environment, which provides insight into future expectations of the rifle squad, indicates the potential operational or even strategic contributions that can be expected from a small infantry unit when enabled with overmatch."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Mundweil, Philip J.
2013-01