Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Universal National Service
As America begins the 21st century, it faces many challenges from the War on Terrorism to Homeland Defense to a potential war with Iraq. These challenges are spurring debate in American on the need for universal national service. This debate is not new; since the days of George Washington many American leaders have believed universal service was vital to the nature of our country This paper will argue for the reinstatement of a national service program which will funnel individuals either into the military or into a national service corps that involves either working in their local community or performing critical tasks associated with the recently created Homeland Defense department. To support this argument the paper will provide background on the challenges the military faces in manning and sustaining the all volunteer force and the resulting growing gap between the military culture and civilian population. The paper will also point out that by not having every socioeconomic class serving in the military, America's ability to sustain military operations even if the nation's national interests are at stake, may be at risk. In addition, the paper will identify key characteristics of a 21st century national draft and national service program. The conclusion will illustrate that revising a universal service program will allow a new generation of Americans to serve their country either in the military or in a national service corps. More importantly, universal service will restore a sense of national purpose and patriotism to a new generation of Americans.
Army War College (U.S.)
Crizer, Scott
2003-04-07
-
Total Force: How Can the CINC Utilize the Reserve Tactical Air Component?
In the aftermath of September 11th, 2001, the challenges faced by the operational commander are growing rapidly. The last decade was a time of post cold war force and budget reductions that have impacted the active and reserve components of U.S. forces. The operational commander has to balance force employment to meet the needs of the continued war on terrorism, and the infrastructure and demand associated with Homeland defense and the continuously changing terrorist threat. He is pressured to meet all the requirements of current operations, forward presence, and homeland security, and do so with zero friendly casualties while enduring target selection by political micromanagement and ever shrinking resources. To meet these challenges, the operational commander must broaden the scope of planning considerations to entertain the combat power resident in reserve tactical air units in consideration of mass, economy of force, simultaneity and depth. This is not a force structure issue; it is an operational commander issue. This untapped resource has tremendous potential for impact at the operational level, but it must make it to the operation commander's 'tool kit'. It is a crime that active component tactical air units suffer extreme OPTEMPO and PERSTEMPO, negative impact to readiness and retention, and limitations to use at the operation level of war, while three F/ A-18 squadrons wait in reserve, remnants of an old 'force-in-waiting' system, unutilized by the new system.
Naval War College (U.S.)
Anderson, Gregory S.
2002-05-13
-
NATO: Potential Sources of Tension
Throughout the beginning of 1999, NATO has experienced a period of relative internal calm. NATO is threatened neither by a powerful external threat nor by overarching internal strategic differences, and enjoys a degree of support that may indeed be higher than during the Cold War. Nevertheless, there are potential sources of strain and tension within the Alliance. Such strains collectively could introduce more serious tensions, especially with the imposition of other, unanticipated kinds of tension or crisis. Several long term tensions that existed during the Cold War continue to affect NATO today. These include geography as it affects how an Ally perceives its own interests, French exception and interpretation of its national independence, and the real purpose of the Alliance. Short and medium term issues include: (1) enlargement; (2) strategic concept review; (3) cost issues; (4) European Security and Defense Identity (ESDI); (5) counter proliferation and terrorism; (6) U.S. technology gap; (7) adaptation issues; (8) Greece and Turkey; and the (9) Balkans.
United States Air Force Academy
Wood, Joseph R.
1999-02
-
Restructuring for Homeland Security: What is Really Necessary?
The challenges of improving homeland security in the wake of the terrorist attacks on September 11th, 2001 and subsequent events, such as the anthrax outbreak and sniper shootings, have revealed numerous deficiencies of governmental functioning in the prevention and response to terrorist attacks, as well as operational adaptation by response agencies and officials at all levels of government. The defense of this nation and the war on terrorism ultimately involves every agency and level of government. We can anticipate numerous changes in the intergovernmental system and interorganizational structure. This strategic research paper analyzes the post-September 11 challenges faced by the U.S. national security apparatus and the new threat environment, homeland security and strategy, and recommends the decision-making structure that fits best.
Army War College (U.S.)
Brummond, Stephen
2003-03-16
-
Addition of a Homeland Security Mission for the National Guard Requires an Increase in Force Structure
Events on September 11, 2001, changed many aspects of the domestic security environment. Those changes will ultimately redefine the military role in domestic security, which will subsequently affect Army missions. The National Guard has played a major role in most every conflict our country has been engaged. The war on terrorism is no different. The National Guard must play a key role in homeland security, but not be excluded from other missions as part of the Total Force. The Defense Department needs to examine the structure of the National Guard and increase the end strength in a manner that will allow the National Guard to continue its role in Homeland Security, Major Theater Conflict, and Small Scale Contingencies.
Army War College (U.S.)
Corbett, Keith W.
2003-04-07
-
Employment of the Reserve Medical Force in Consequence Management/WMD
Although the end of the cold war brought promises of a new world order, terrorism in the next century presents a potentially more lethal and complex threat to the continental United States. This paper addresses three areas. First, the emerging threats and motives for use of weapons of mass destruction will be examined. Second, several Presidential Decision Directives and DoD Directives and actions required by Public Laws will be reviewed. Finally, the types of medical force structure in each of the Reserve components and their capabilities to respond to weapons of mass casualties" will be examined. The Department of Defense will play a major role in the domestic response to weapons of mass casualties." The emerging threats and motives for use of weapons of mass casualties" strongly support the further use of the reserve components when the demand placed on the Healthcare System following a WMD incident is unprecedented. Although the Army National Guard and Air Guard have early deploying capabilities to respond to a WMD incident, most reserve components do not have adequate deployable medical systems at home station" nor do they possess complete support requirements to respond to a domestic WMD incident when they will be needed.
Army War College (U.S.)
Baker, James M.
2000-05-01
-
Recent Amendments to the Foreign Sovereign Immunities Act: Strategic Tool, Cruel Hoax, or Untenable Impediment to Foreign Policy
Paper considers whether recently amended Foreign Sovereign Immunities Act constitutes viable strategic tool in combating terrorism, or whether it is domestic law giving plaintiffs judgments they might never recover on or, lastly, that it might be a strategic tool, but one too troublesome in terms of foreign policy to be useful to government strategists. Paper concludes with judgment that a better strategic mechanism would allow an international judicial body to hear cases based on an UN treaty, thereby reducing strains on comity and reciprocity resulting from having domestic law impact international relations. Conclusion is based on recent trends and developments in international law, as well as need for government to resolve inconsistency in terms of putting interests of U.S. citizens in opposition to national foreign policy concerns.
Naval War College (U.S.)
Ward, Brendan F.
2000-02-08
-
Fast Guns and the Posse Comitatus Act
Transnational threats, such as terrorism and international drug crime, and civil disturbances bode future domestic support operations in the realm of law enforcement for the U.S. military. The reserve components will play a key role in the growing homeland defense mission and will have to be integrated into the mission to provide the United States with an effective deterrent to potential domestic crises. The Posse Comitatus Act (PCA) generally precludes the use of federal forces to perform law enforcement actions. There are numerous constitutional and statutory exceptions to the PCA which allow U.S. military forces to conduct law enforcement operations. This paper examines national and military strategy focused on the homeland defense policy within the context of the ends-ways-means model. Countervailing civil-military relations policy concerns arising out of the PCA are identified and the history of federal forces use under the PCA discussed. Finally recommendations are made for an overarching homeland defense policy.
Army War College (U.S.)
Gallavan, Christopher G.
1999-04-15
-
Implementing the National Security Strategy of Critical Infrastructure Protection
Presidential Decision Directive (PDD) 63 provides detailed guidance for the protection of America's critical infrastructures of energy, banking, transportation, human services and telecommunications as viewed in the context of the Information Age. Does PDD 63 provide the necessary framework and resources to create a viable defense of these essential services or does it simply acknowledge there is a challenge that must be addressed? This report examines the National Security Strategy concerning PDD 63 and analyzes the challenges of implementing its complex strategy in a cooperative environment between the federal government and the private sector. The complexities of relating this directive to PDD 62 (Combating Terrorism) and PDD 56 (Interagency Cooperation) are explored in order to enhance the ways and means of implementing a cohesive strategy of infrastructure protection. The paper develops the emerging threats to this nation's infrastructure and identifies government, private sector and military implications. The paper further examines policy, doctrine and strategy for implementing critical infrastructure protection.
Army War College (U.S.)
Williamitis, Gregory M.
2000-03-31
-
Today's Requirements Generation Process; And Tomorrow's Warfighting Requirements
This paper examines the current requirements generation process and the ability of the Army to identify and field materiel solutions. The Army was ordered to deploy an Apache attack helicopter battalion into Albania to support operations in the Balkans. The attack helicopters would pressure Serbian ground forces to move out of protected hide positions, allowing coalition NATO aircraft the opportunity to attack. The preserved slow deployment of helicopters, soldiers, and air defense systems proved to be the catalyst for a broader change in the Army. The extended deployment times initiated a public debate over the speed of deployment and the relevancy of today's Army. The current United States Army is a product of a 40-year cold war, prepared to fight on the high intensity battlefields of Europe. Today the Army faces different challenges. Over the last decade the operational tempo has increased and the threat to national interests have broadened. The Army has been required to execute a diverse set of missions: arms control, combating terrorism, counter drug, enforcing exclusion zones, military assistance to civil authorities, peace operations and humanitarian assistance are only a few of the operations the Army has added to its skill set. The problem is that today's requirements generation process cannot keep pace with the changing requirements in today's world.
Army War College (U.S.)
Waterworth, Leonard D.
2000-04-10
-
Information Operations
This Strategy Research Project proposes designation of a single entity within the federal government to provide strategic guidance across the breadth of the nation's elements of power. It would coordinate and improve the security of the nation's critical information infrastructure, which is essential for the survival and prosperity of the United States. A review of the recent terrorist activities in the United States and the declaration of war against global terrorism revealed U.S. weakness in its ability to protect itself internally against terrorist activities. Area shortfalls include a lack of structure and policy and, in some cases, organizational structure that is focused on Homeland Defense. The U.S. also revealed an inability to protect its citizens, its physical infrastructures, the nation's economic structure, and critical information infrastructures. Numerous policies regarding domestic terrorists have been written and debated, but shelved. On 11 September 2001, America witnessed terror firsthand in a well orchestrated attack that ripped and tore the economic and military fabric of its foundation. This event has prompted U.S. leaders to take a serious look internally at securing the liberty and prosperity of the nation's foundation. This paper will define Information Operations as it relates to securing the U.S. critical information infrastructure. It will review relevant Presidential Decision Directives, as well as regulatory and policy guidance and joint publications doctrine for guidance to Information Operations (IO); analyze challenges to the system; and discuss using the office of Homeland Defense to strategically organize IO. It concludes with recommendations to enhance the security of the nation's critical information infrastructure.
Army War College (U.S.)
Burnett, Peter L., Jr.
2002-04-09
-
Implications of High-Resolution, Commercial Space Imagery for National Security and Homeland Defense
This paper examines the current and near term, high-resolution, commercial space imaging (CSI) capabilities and the potential impact on the United States, particularly as related to threat intelligence collection, targeting, and policy challenges. This rapidly growing segment of technology is surveyed, followed by a near term capabilities projection. The resulting, general threats to the United States are then developed. Examples of the types of intelligence available to an adversary are explored. Finally, potential courses of action to prepare for and mitigate these threats are discussed.
Army War College (U.S.)
Portouw, Lawrence J.
2002-04-09
-
Rapid Assessment and Initial Detection (RAID) Program
Terrorism has been and continues to be a critical problem for the United States. In 1998, the Department of Defense initiated a program that designated the National Guard as the first military responder to the use of weapons of mass destruction in the continental United States. This paper examines the existing structure of the Rapid Assessment and Initial Detection (RAID) elements in light of technological advances which may take place by the year 2020.
Army War College (U.S.)
Norrell, Oliver L., III
1999-04-01
-
National Guard's Role in a Weapons of Mass Destruction Incident
In the aftermath of the Cold War, the United States may well be facing its most formidable enemy. The enemy is a faceless individual or group, which has determined the only way the United States will understand their viewpoint, is through the calculated and indiscriminate use of violent acts. Unfortunately, these acts now include the potential to use a weapon of mass destruction (WMD) device. The defining domestic attack that caused the United States to review their laws and policies concerning terrorism occurred on April 19, 1995, in Oklahoma City, OK. The National Guard initially established a Rapid Assessment and Initial Detection (RAID) Element in each of the ten FEMA Regions to assist first responders in a WMD incident. This strategic research paper will identify shortfalls in the existing National Guard policy and provide a more cost effective RAID Element manning model to best support the first responders' needs, and retain the National Guard's inherent responsibility to be the Nation's first military.
Army War College (U.S.)
Finn, Robert L.
1999-04-05
-
Maritime Homeland Command and Control: Teaching an Old Dog New Tricks
The maritime homeland needs a command and control structure which unifies control of military defense and law enforcement security efforts under one commander. The organization should focus on a desired maritime security environment and coincide directly with specified operational objectives. Finally, the command and control structure should decentralize execution across established maritime zones of capability and authority. The three services primarily responsible for the maritime homeland, the Navy, the Coast Guard, the Customs Service, should provide resources and command capabilities to a unified command and control structure. Coast Guard forces and commanders can bridge the statutory gap dividing military defense and law enforcement security activities. The principle of simplicity should prevail, in limiting the command and control structure to three echelons. Traditional maritime organization models such as Maritime Defense Zones, Joint Inter-Agency Task Forces, and Joint Force Maritime Component Commands are not the answer. Instead, the solution lies in combining the best aspects from each of these models- teaching an old dog new tricks.
Naval War College (U.S.)
Bauby, D. Scott
2002-02-04
-
Maritime Homeland Security: Ensuring a Rapid, Flexible Response
In the wake of the terrorist attacks against the United States on September 11th, there is a pervasive sense that we must use all means available to eliminate the occurrence of future attacks on the American continent, on our people and on our way of life. The renewed focus on homeland security following the recent attacks mandated a reassessment of the critical vulnerabilities along America's international coastlines. While many potential threats to America exist via our shores, the immense quantity of international commercial traffic into the United States provides a seemingly easily exploitable and tempting weakness that requires a review and analysis of the efficacy of our maritime homeland security (HLS-M) operational plans. Current global maritime security operations provide the framework with which we can examine our HLS-M structure, specifically our command and control (C2) organization and maneuver force planning, to ensure adequate protection against present and future asymmetric threats.
Naval War College (U.S.)
Fluker, David P.
2002-02-04
-
Surveillance Society and the Conflict State: Leveraging Ubiquitous Surveillance and Biometrics Technology to Improve Homeland Security
The thesis examines the emergence of surveillance and biometrics technologies as a pragmatic baseline supporting the goals of homeland security. Assessment of existing catalysts of the world condition, conflict states, terrorist and criminal networks have facilitated increased U.S. and international attention to the field of surveillance and biometric technology. This study scrutinizes surveillance, biometric techniques, strategies, and prevailing present day applications. It contrasts the evolving requirements for improved security with a balanced consideration of civil liberties and privacy. The authors address developmental issues surrounding the hypothesis for a ubiquitous surveillance grid to monitor and combat terrorism, crime, and other contributing illicit behaviors. The authors recommend that federal, state, local, and corporate agencies unite in improving homeland security by implementing the deterrence, detection, monitoring, and response actions that these technologies have to offer.
Naval Postgraduate School (U.S.)
Makarski, Richard E.; Marreno, Jose A.
2002-09
-
Report on Allied Contributions to the Common Defense. A Report to the United States Congress by the Secretary of Defense.
A National Security strategy for a New Century (May 1997) identifies a diverse set of threats to U.S. security, including regional or state-centered threats (such as regional aggressors, unstable nations, internal conflicts, or failed states); transnational threats (including terrorism, illegal drugs, illicit arms trafficking, and organized crime); and threats from weapons of mass destruction (from existing arsenals and from the proliferation of advanced technologies). To meet these challenges, the Administration's national security strategy stresses the need for integrated approaches, specifically to shape the international environment to prevent or deter threats, to maintain the ability to respond across the full spectrum of potential crises, up to and including major theater war, and to prepare now to meet future uncertainties. A central aim of the Administration's strategy to defeat these transnational threats is to strengthen and adapt our security relationships with key nations around the world - including sharing collective security responsibilities with allies and other friendly nations.
United States. Department of Defense. Office of the Secretary of Defense
1998-03
-
Critical Infrastructure Assurance: Electric Power Reliability
In this policy analysis exercise (PAE), we analyze the North American electric power infrastructure and offer recommendations for reducing vulnerabilities. We examine the electric power industry, the threats to it, its vulnerabilities, and its relationships with other organizations. Our major sources of information consist of interviews, attendance at an infrastructure protection conference, and extensive academic research. Our recommendations focus on reducing three specific vulnerabilities: physical terrorism, cyber attacks and confluence of events. Finally, we assess the benefits of our recommendations and the obstacles to implementation.
Air Force Institute of Technology (U.S.)
Bremer, Maximilian K.; Feliz, Daniel; Perry, Troy
1999
-
Landpower and Dual Containment: Rethinking America's Policy in the Gulf
The author of this study contends that America's Dual Containment policy has failed. He outlines in what way he thinks that it has, and suggests alternative polices, which he believes might prove successful, and which would not destablize the Gulf--the risk that (in the author's view) we are now running. By a combination of economic sanctions and more forcible methods, America has sought, through Dual Containment, to make Iran and Iraq amend behavior that the United States believes it cannot tolerate. In the case of Iraq, America finds actions of the leadership so abhorent that nothing less than a complete regime change is demanded. The United States wants Iran to give up its alleged support for terrorism.
Army War College (U.S.). Center for Strategic Leadership
Pelletiere, Stephen C.
1999-11
-
Italian Army's Role in Homeland Security
Since the unification of the peninsula, the Italian Army has been actively involved in homeland security operations. In particular, the Army's role dramatically increased in 1992, when the Italian Government decided to employ some thousands of soldiers in Sicily, to cooperate with the State police and the "Carabinieri" in opposing the local organized crime. The purpose of this research is to analyze the different homeland security operations carried on by the Italian Army, drawing out from them the lessons learned and to find how these experiences could be utilized to face the threats posed by the new international strategic environment of international terrorism, failed states and rogue states.
Army War College (U.S.)
Serino, Pietro
-
General Services Administration Status of Efforts to Improve Management of Building Security Upgrade Program, Statement of Bernard L. Ungar, Director, Government Business Operations Issues, General Government Division, Testimony before the Subcommittee on Oversight, Investigations, and Emergency Man
I am pleased to be here today to discuss the General Services Administration's (GSA) progress in upgrading the security of federal buildings under its operation. As you know, following the April 19, 1995, bombing of the Murrah Federal Building in Oklahoma City, the President directed the Department of Justice (DOJ) to assess the vulnerability of federal office buildings, particularly to acts of terrorism and other forms of violence. Under the direction of DOJ, an interagency working group comprising security professionals from nine federal departments and agencies issued in June 1995 a report recommending specific minimum security standards for federal buildings. Subsequently, the President directed executive departments and agencies to upgrade the security of their facilities to the extent feasible based on the DOJ report's recommendations. The President gave GSA this responsibility for the buildings it controls, and in July 1995, GSA initiated a multimillion-dollar security enhancement program for these buildings.
United States. General Accounting Office
Ungar, Bernard L.
1999-10-07
-
Manhattan 2001 Political-Military Game
This report documents the MANHATTAN 2001 Political-Military Game, conducted by the Center for Army Analysis (CAA) for Headquarters, Department of the Army (HQDA), Office of the Deputy Chief of Staff for Operations and Plans (ODCSOPS), now the Deputy Chief of Staff, G3, Operations, Readiness, and Mobilization Directorate (DAMO-OD). The purpose of this report is to provide an overview of MANHATTAN 2001, to include a summary of insights gained from the game. The intent of MANHATTAN 2001 was to obtain an executive-level view of Army infrastructure assurance as it supports the Department of Defense Critical infrastructure Protection program, to further refine Army infrastructure assurance as a mission area for Army Homeland Security, and to examine the Army's infrastructure assurance strategic challenges.
Center for Army Analysis (U.S.)
Andreozzi, Greg
2002-01
-
Turkey and the Middle East: Threats and Opportunities
The end of the Cold War and the Second Gulf War affected the Middle East prodoundly. The role of regional countries changed when the end of the superpower competition transformed frozen animosities into new conflict areas. In this context, Turkey extremely involved in regional politics. During the 1989-2000 period Turkey's policy toward the Middle East in general centered on security issues while Turkey encouraged regional cooperation simultaneously. PKK terrorism and the prospect of a Kurdish state in northern Iraq have been the forefront issues in Ankara's agenda. Ankara followed an active policy in the region to counter the regional threats to Turkey, to recover its declining image in the West and to improve its economy through regional opportunities.
Naval Postgraduate School (U.S.)
Yilmaz, Hasan
2001-06
-
Information Technology: State Department Led Overseas Modernization Program Faces Management Challenges, Report to the Chairman, Committee on International Relations, House of Representatives
Dramatic changes continue to occur in the world's economic, political, technological, and environmental landscapes. Increases in global trade, transnational terrorism and organized crime, and international health concerns, for example, are combining to create a more complex, more vulnerable world scene. To promote U.S. interests in the face of such rapid change, 24 federal agencies are collectively engaged in foreign affairs activities at 255 overseas locations in 162 countries.
United States. General Accounting Office
2001-11
-
Technologies and Equipment For Military and Public Safety Emergency Response. Technology Needs Performance Deficiencies
This report, comprised of viewgraphs/slides, discusses weapons of mass destruction and terrorim preparedness and response.
U.S. Army Natick Research, Development, and Engineering Center
Haskel, Bill
2001-04-30
-
Terrorism and Organized Crime: The Alliance of Tomorrow? How to Counter a Possible Future Threat
While in the post-Cold War era threats to international security have become less direct and apocalyptic, they are today more diffuse and insidious. With the probability of large scale, high intensity conflicts decreasing during the l990s, terrorism and transnational organized crime --each in itself-- constitute an increasing and serious threat to the national security of affected nations. Any alliance of these two criminal phenomena is likely to cause a disproportional increase of the overall threat. The thesis, while following an analytical/inductive approach, tries to identity the rationale for such alliances. Although aims and objectives of terrorists and organized criminal groups are different by nature, alliances of convenience have already formed in the past. With globalization apparently working in the favor of terrorists and organized crime, it seems to be only a question of time before they begin merging and start working jointly. Since those criminal organizations tend to exploit the weaknesses of international cooperation by increasingly operating in the transnational sphere, any attempt at a successtul counter-strategy has to meet this threat where it originates. Against this background, international cooperation of law enforcement agencies becomes increasingly important - "Internal Security", it seems, acquires a transnational dimension.
Naval Postgraduate School (U.S.)
Morbach, Gernot W.
1998-06
-
Training for Terror: A Case Study of Al-Qaida
From the thesis abstract: "A recently acquired translated copy of an Al-Qaida training manual is analyzed utilizing the Four Frameworks Model, which states that organizations can be better understood if they are studied from structural, human resources, symbolic, and political perspectives. An overview of Middle Eastern terrorism, a synopsis of the Al-Qaida organization, a review of the contents of the training manual, and an Al-Qaida policy review are also delineated. Of the many conclusions presented, the first states that the Al-Qaida training manual and its precepts are indeed being used to guide terrorist operations. Al-Qaida believe their cause is just based on religious decrees, and that the use of training manuals helps to portray the group in a favorable light, reinforces ideology, and builds support. Al-Qaida have a strong need to rationalize and justify what they do. The success of the World Trade Center and Pentagon bombings may have given Al-Qaida a spiritual boost and hardened their resolve to continue their mission, despite the U.S. War on Terrorism. Recommendations and areas of further research are presented to enhance the intelligence community's understanding of the internal workings of the group."
Naval Postgraduate School (U.S.)
Kreckovsky, Melanie J.
2002-03
-
Structuring Homeland Security
In the wake of World War II the Soviet Union exploded an atomic bomb, which awakened Americans to the idea that the United States could be attacked by another nation. In recent months the attacks on the World Trade Center and the Pentagon have demonstrated the vulnerability of the U.S. and the civilized world to yet another threat: terrorism. Unlike 1950 when President Truman was perplexed and had no immediate course of action to prevent an attack on U.S. soil, President Bush answered the call by appointing former Governor Thomas Ridge director of the Office of Homeland Security. Cold war lessons learned from the stand up of the Federal Civil Defense Administration can serve as a blueprint for how lines of authority and resources can be employed for the Office of Homeland Security. The challenges over the next several months and years will be to fully empower and organize the Office of Homeland Security. This office will have responsibility for coordinating a wide variety of federal, state and local security activities to combat terrorism, including the gathering and distribution actions to prevent such attacks. Security experts and congressional panels have long known that certain national infrastructures are so vital that their disruption or destruction would have a debilitating impact on the national defense and/or economic security of the United States. Until now, no one office was charged with coordinating the protection of those resources and connecting the fragmented leadership to fight terrorism.
Army War College (U.S.)
Warren, Terrie
2002-04-09
-
Terrorist Application of Operational Art
The terrorist attacks committed by Osama bin Laden illustrate that he has developed the ability to apply operational art and network centric warfare to terrorism. He has clearly defined policy objectives on which he bases his strategy and focuses his attacks on U.S. centers of gravity and critical vulnerabilities. He develops and protects his own centers of gravity. He employs network centric warfare to multiply the effectiveness of his limited forces by dispersing them into C2, intelligence, logistics, and tactical nodes. His use of operational art makes him more dangerous than previous terrorists and exposes critical weaknesses in the United States anti-terrorism posture.
Naval War College (U.S.)
Tranchemontagne, Marc G.
2002-02-04