Listing 1 - 10 of 151 | << page >> |
Sort by
|
Choose an application
During stability operations, coalitions must incorporate participation by government agencies other than the military, the indigenous government, and its population more than is expected during conventional combat operations. This book investigates challenges confronting coalitions today and considers potential solutions that include questioning the conception of what constitutes a coalition in today's world.
Armed Forces -- Stability operations. --- Counterinsurgency. --- Integrated operations (Military science). --- Armed Forces --- Counterinsurgency --- Integrated operations (Military science) --- Military & Naval Science --- Law, Politics & Government --- Military Science - General --- Stability operations --- Military art and science. --- Fighting --- Military power --- Military science --- Warfare --- Warfare, Primitive --- ARMED FORCES--STABILITY OPERATIONS --- COUNTERINSURGENCY --- COMBINED OPERATIONS (MILITARY SCIENCE) --- INTEGRATED OPERATIONS (MILITARY SCIENCE) --- Naval art and science --- War
Choose an application
The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts. It addresses topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality. An extensive commentary accompanies each rule, which sets forth the rule's basis in treaty and customary law, explains how the group of experts interpreted applicable norms in the cyber context, and outlines any disagreements within the group as to each rule's application.
Information warfare (International law) --- Cyberspace operations (Military science) --- Information warfare (International law). --- Cyberspace operations (Military science). --- Cyberspace operations (International law) --- International law --- Cyberwarfare (International law) --- War (International law) --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science --- Law --- General and Others
Choose an application
The U.S. government is facing the dual challenge of building its own interagency capacity for conducting stability operations while simultaneously building partner capacity (BPC) for stability operations. This study finds that although BPC and stability operations are receiving a good deal of attention in official strategy and planning documents, insufficient attention is being paid to the details of an integrated strategy.
Integrated operations (Military science). --- United States. Army -- Stability operations. --- Integrated operations (Military science) --- Military & Naval Science --- Military Science - General --- Law, Politics & Government --- United States. --- Stability operations. --- Combined integrated operations (Military science) --- Multinational integrated operations (Military science) --- U.S. Army --- US Army --- USA--ARMED FORCES--STABILITY OPERATIONS --- Civil-military relations --- Military art and science
Choose an application
Insurgency is the most prevalent form of armed conflict and the subject of countless studies, yet the U.S. military has only recently begun to review doctrine and training in this area. An examination of approaches to counterinsurgency from 30 recent resolved campaigns reveals, for example, that good COIN practices tend to ""run in packs"" and that the balance of selected good and bad practices perfectly predicts the outcome of a conflict.
Counterinsurgency -- Case studies. --- Counterinsurgency --- Military & Naval Science --- Law, Politics & Government --- Military Science - General --- Counterguerrilla warfare --- COUNTERINSURGENCY --- Guerrilla warfare --- Insurgency
Choose an application
U.S. experiences in Iraq and Afghanistan have demonstrated that improving U.S. capacity for stabilization and reconstruction operations is critical to national security. The authors recommend building civilian rather than military capacity, realigning and reforming existing agencies, and funding promising programs. They also suggest improvements to deployable police capacity, crisis-management processes, and guidance and funding.
Integrated operations (Military science). --- Integrated operations (Military science) --- Military Administration --- Military & Naval Science --- Law, Politics & Government --- United States --- Armed Forces --- Civic action. --- Stability operations. --- Civil functions. --- Combined integrated operations (Military science) --- Multinational integrated operations (Military science) --- Stabilization operations --- POSTWAR RECONSTRUCTION--USA --- USA--ARMED FORCES--STABILITY OPERATIONS --- Civil-military relations --- Military art and science
Choose an application
Advances in information technology have led us to rely on easy communication and readily available information--both in our personal lives and in the life of our nation. For the most part, we have rightly welcomed these changes. But information that is readily available is available to friend and foe alike; a system that relies on communication can become useless if its ability to communicate is interfered with or destroyed. Because this reliance is so general, attacks on the information infrastructure can have widespread effects, both for the military and for society.
Military art and science --- Military & Naval Science --- Law, Politics & Government --- Military Engineering --- Automation --- Automation. --- Information society --- Military art and science. --- Société informatisée --- Computers --- Military applications --- Electronics in military engineering
Choose an application
The vast size and highly unregulated nature of the world's waterways have. made the maritime environment an increasingly attractive theater for. perpetrators of transnational violence. Piracy and sea-borne terrorism have. been on the rise since 2000. While the United States has spearheaded several. important initiatives to improve maritime security, the author urges. policymakers to consider four additional measures to safeguard the world's. oceans.
Maritime terrorism -- Prevention. --- Merchant marine -- Security measures -- United States. --- Piracy -- Prevention. --- Security, International. --- Shipping -- Security measures. --- Terrorism -- Prevention. --- Unified operations (Military science) -- United States. --- Merchant marine --- Security, International --- Shipping --- Maritime terrorism --- Terrorism --- Piracy --- Unified operations (Military science) --- Military & Naval Science --- Law, Politics & Government --- Navigation --- Security measures --- Prevention --- Security measures. --- Prevention. --- Joint operations (Military science) --- Unified commands (Military science) --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Collective security --- International security --- Mercantile marine --- Unified operations (Military science)Security measures --- Military art and science --- Strategy --- Tactics --- International relations --- Disarmament --- International organization --- Peace --- Marine service --- Merchant marine - Security measures - United States --- Shipping - Security measures --- Maritime terrorism - Prevention --- Terrorism - Prevention --- Piracy - Prevention --- Unified operations (Military science) - United States
Choose an application
Provides an analytic framework and procedure for the intelligence analysis of irregular warfare (IW) environments that can serve as the basis for IW intelligence curriculum development efforts. Defines IW in terms of two stylized situations: population-centric (such as counterinsurgency) and counterterrorism. Provides a detailed review of IW-relevant defense policy and strategy documents and a list of relevant doctrinal publications.
Choose an application
Nearly ten years of bloodshed and political turmoil have followed the Soviet invasion of Afghanistan in 1979. Soviet occupation not only proved a major trauma for the people of Afghanistan; invasion ended the growth in superpower dentents that had characterised the late 1970s; and in the Soviet Union the effects of escalating military costs and over 13,000 young military casualties have been felt at every level of society. The decision to withdraw combat forces under the provisions of the Geneva Accords of April 1988 is one of the most dramatic developments in the international system since the end of the Second World War. The effects of this decision will be felt not only in Afghanistan, but in the Soviet Union, in Southwest Asia, and in the wider world. The Soviet Withdrawal from Afghanistan has been designed to explore the background to the decision to withdraw and its broader implications. The authors, all established specialists, examine the Geneva Accords; the future for post-withdrawal Afghanistan; and the impact of withdrawal on regional states, Soviet foreign and domestic policies, the Soviet armed forces, Sino-Soviet relations and world politics. They write from diverse disciplinary traditions, while bringing together a shared sensitivity to the issues which complicate the Afghan question.
AFGHANISTAN--HISTORY--SOVIET OCCUPATION, 1979-1989 --- Social Sciences --- Political Science --- Soviet Union --- Afghanistan --- Foreign relations --- History
Choose an application
During the Cold War, U.S. intelligence was concerned primarily with states; non-state actors like terrorists were secondary. Now the priorities are reversed and the challenge is enormous. States had an address, and they were hierarchical and bureaucratic. They thus came with some 'story'. Terrorists do not. States were 'over there', but terrorists are there and here. They thus put pressure on intelligence at home, not just abroad. The strength of this book is that it underscores the extent of the change and ranges broadly across data collection and analysis, foreign and domestic, as well as presenting the issues of value that arise as new targets require collecting more information at home.
Intelligence service --- Terrorism --- Government policy --- INTELLIGENCE SERVICE--USA --- Social Sciences --- Political Science
Listing 1 - 10 of 151 | << page >> |
Sort by
|