PREV
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
NEXT
Dissertations
OBESITY : A THREAT TO NATIONAL SECURITY  

Currently serving military men and women are increasingly overweight and out of shape while many of those who aspire entry into our Armed Forces are alarmingly, Too Fat to Fight. The recent strategic implication of obesity within our Armed Forces is threatening the National Security of this ...Read more >

32 Pages
677.60 KB
CONTRACTOR PERSONNEL ACCOUNTABILITY ON THE BATTLEFIELD  

Who should be responsible for contractor personnel accountability on the battlefield? While commanders and Joint and Army doctrine manuals place the responsibility for contractor accountability on the human resources staff element, Department of Defense (DOD) and Army guidance and other regulations assigns the responsibility and authority to enforce contractor personnel accountability on the battlefield to the logistics ...Read more >

32 Pages
352.78 KB
LEVERAGING GEOSPATIAL INTELLIGENCE (GEOINT) IN THE COGNITIVE HIERARCH OF MISSION COMMAND  

The federal government response to Hurricane Katrina demonstrated a vital need for the military to improve the process for assessment, response and decision-making for all organizations involved. Geospatial Intelligence (GEOINT) is an emerging intelligence discipline that provides detailed data analysis, an assessment of the operational environment and a means to investigate problems that may emerge. GEOINT is the exploitation and analysis of imagery and geospatial information to describe, ...Read more >

49 Pages
760.10 KB
UNDERSTANDING LEADERSHIP  

The paper will go beyond the question of whether a leader is born or made by suggesting that from America’s research on the topic, there are key areas that can be affected to develop good leaders regardless of their innate leadership gifts. The end result of this paper is to strip away some of the mystique of leadership and find the practices at the root of how one influences others to achieve an objective. The paper will show that, after examination of several of the major theories, one can ...Read more >

32 Pages
534.12 KB
SPEED VERSUS ACCURACY : A ZERO SUM GAME  

This paper examines the requirement for and the role of speed and accuracy in informing and influencing key ...Read more >

29 Pages
591.17 KB
ORGANIZATION OF DOD COMPUTER NETWORK DEFENSE, EXPLOITATION AND ATTACK FORCES  

The Department of Defense (DoD) faces many challenges in the world of computer networks and systems. Technical skills used to exploit adversary networks and systems for intelligence purposes can also be used to attack adversary networks and systems. In the likelihood that exploitation is much more common than attack, technicians performing exploitation will gain much experience in their ...Read more >

32 Pages
390.72 KB
POSSIBLE FUTURES : SPACE CAPABILITY RISKS AND THE JOINT FORCE  

By the mid 2020s, near peer competitors, regional powers and international non-state actors will be able to threaten the Joint Forces access to and application of space-based capabilities. These threats will cover the spectrum of space operations, from on orbit satellites to ground control elements and will include physical, electronic and cyber attacks. Analysis of the threat environment reveals recurring vulnerabilities in the satellite control network and in capabilities designed to disrupt ...Read more >

32 Pages
365.76 KB
PSYCHOLOGICAL RESILIENCE : PREPARING OUR SOLDIERS FOR WAR  

Veterans returning from Iraq and Afghanistan are diagnosed with Post Traumatic Stress Disorder (PTSD) at an alarming rate. This significantly impacts the combat readiness of our formations and the well being of our most valuable resource our ...Read more >

40 Pages
531.71 KB
WARRIOR ETHOS REVISITED : IMPLICATIONS FOR THE FUTURE  

This paper maintains that the Warrior Ethos, a subset of the Soldiers Creed, reflects a Cold War mindset focused on application of kinetic force and is out of alignment with the changing character of warfare as experienced over the last ten years of persistent ...Read more >

32 Pages
906.37 KB
STRATEGIC ANALYSIS OF IRREGULAR WARFARE  

Terrorism and insurgency and counterterrorism and counterinsurgency, are all subsets of irregular warfare. Conventional warfare models are often used at the strategic level to inform programmatic decisions. The modeling and dynamics of irregular warfare are not well established. An attempt to model an irregular warfare scenario took place in 2007 to 2009 within the Office of the Secretary of ...Read more >

38 Pages
651.27 KB
TENETS OF COUNTER INSURGENCY WARFARE  

This book posits there are 17 principles of counter insurgency warfare which fall into four broad categories: strategic, operational, logistical and cultural. Battlefield commanders must successfully master these principles in order to bring about success as efficaciously as ...Read more >

24 Pages
316.61 KB
REFLECTIONS ON A STRATEGIC VISION FOR COMPUTER NETWORK OPERATIONS  

Geographic Combatant Commands (GCC’s) are unprepared to effectively plan computer network operations (CNO) and incorporate them into military operations. This condition is not due to any failure of GCC commanders to recognize their warfighting responsibility. Current legal authorities and national policy primarily enable CNO support at the strategic level of war. However, they marginalize GCC CNO planning efforts by denying commanders CNO decision-making authority in the more decisive ...Read more >

35 Pages
615.53 KB
USING THE PAST TO INFORM THE FUTURE : VIETNAM AND AFGHANISTAN  

These lessons have been learned in the past, deserve consideration as we formulate policy today and are vital for informing foreign policy into the ...Read more >

46 Pages
593.71 KB
AT WHAT COST INDEED : CONTRACTOR INDISPENSABILITY IN ARMY LOGISTICS  

The paper also examines the problems with contract logistics and their recommended solutions concluding with a way forward that expands the professional contracting workforce, updates doctrine and training and strengthens unit oversight of contractor activity all part of the cost of contract ...Read more >

32 Pages
842.43 KB
LEARNING FROM THE ENEMY  

A great deal of money and effort to defeat Improvised Explosive Devices (IEDs) and attack IED networks. However, relatively little research exists that seeks to learn applicable lessons from insurgents tremendous offensive success with these crude explosive hazards. This paper aims to identify these offensive lessons learned and explore what methods and resources should develop to fully exploit the power of explosive hazards on the Full Spectrum ...Read more >

36 Pages
635.41 KB
PREV
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
NEXT