Bennett, Bruce W. 1952-
Most widely held works by Bruce W Bennett
Initiatives and challenges in consequence management after a WMD attack by Bruce W Bennett ( Book )
2 editions published in 2004 in English and held by 233 libraries worldwide
Needed now the "85% quick fix" in bio-defense by Jim A Davis ( Book )
2 editions published in 2004 in English and held by 229 libraries worldwide
Theater analysis and modeling in an era of uncertainty : the present and future of warfare ( Book )
5 editions published in 1994 in English and held by 170 libraries worldwide
Within the U.S. defense community, there is no agreed-upon perception of how warfare is evolving. This report presents the results of war gaming and analysis on the future of warfare. It structures its findings around four issues: (1) warfare will be dominated by uncertainty and variability; (2) adversaries will seek new patterns of warfare to effectively oppose the United States; (3) asymmetrical battles will characterize war; and (4) weapons of mass destruction cast a shadow over almost all future contingencies. It proposes that analysis and modeling must evolve to: (1) reflect the significant differences in the warfare environment that will exist between theaters; (2) focus on strategic and operational events, variations, and uncertainties; (3) adopt a "counter-capabilities" approach to defining military threats; (4) adopt a new approach of developing simple but more comprehensive models; (5) address issues associated with the regional shadow of weapons of mass destruction; and (6) develop new procedures for presenting the uncertainties of analyses to decisionmakers.
JICM 1.0 summary ( Book )
4 editions published in 1994 in English and Undetermined and held by 153 libraries worldwide
This report documents the Joint Contingency Model (JICM), a global war gaming and analysis system that focuses on conflict from major regional contingencies through strategic warfare. The JICM is an outgrowth of the former RAND Strategy Assessment System (RSAS), engineered explicitly to address post-Cold War conflict issues. The JICM has been developed to support balance assessment, contingency analysis, and military training. It handles issues such as strategic mobility, ground combat maneuver and fires (including systems like ATACMS and future technological advances), the activities involved in achieving air or sea superiority, the ability to apply naval and aircraft fires against infrastructure targets or military forces in the field, and supplies and support of military forces. JICM is unique in its attempt to address qualitative factors such as unit cohesion and specialization, training, and national force effectiveness. It also deals with discontinuities in warfare such a breakthroughs and the failure of assaults. It is a global system because it includes, as part of its release, order of battle data for most major countries worldwide, relieving JICM users of the burden of having to develop such information. It also includes base cases covering conflicts in the Persian Gulf and Korea. Thus, the JICM comes as a ready-to-use package, though users will also find it easy to develop new theaters for analysis in the JICM.
The new map graphics in RSAS 5.0 by Bruce W Bennett ( Book )
3 editions published in 1993 in English and held by 152 libraries worldwide
The RAND Strategy Assessment System (RSAS) is a global warfare analysis system developed over the last decade for the Director of Net Assessment in the Office of the Secretary of Defense. This document reports on the new map graphics package for the RSAS, which we call RSAS Map. RSAS Map allows the user to examine the location and status of ground, air, and naval forces on a map. The user may click on one of the ground unit, airfield, or ship symbols and is given a more detailed display; for airfields, this includes their location, facilities, and air units assigned. RSAS Map also allows the user to monitor and determine the status of theater battles, showing where commands are joined in battle with a large green star burst. When air support and other supporting fires are provided to a command, a smaller, yellow star burst is shown next to the command symbol and name. The commands may be selected to see a listing of all of the units associated with the command, by mission, with further detail available at the unit level. The star bursts may be selected to get a summary of the battle or the fire support provided.
A Brief analysis of the Republic of Korea's defense reform plan by Bruce W Bennett ( Book )
4 editions published in 2006 in English and held by 133 libraries worldwide
Assemblyman Jin-Ha Hwang, a member of the National Assembly₂s National Defense Committee, this analysis was performed of the ROK Defense Reform Plan (DRP). It examines the overall nature of the DRP, identifies major risks in the plan, and discusses how those risks can be managed. It concludes that the DRP is a good approach to potential ROK security dilemmas, but the plan faces major risks, especially in meeting potential ROK security requirements. The DRP could be strengthened by adding concepts for managing its major risks. This paper discusses the background of the DRP and the manpower problem it needs to address. It then presents the author₂s estimates of the force changes that would occur and how those forces appear to fit the force requirements the ROK will likely face in the coming years. It examines the budget requested for the DRP and whether it will cover the necessary costs, addresses the effects that the DRP could have on ROK military morale and how the United States may view the DRP, and concludes by recommending steps the ROK could take to manage the key risks identified throughout this analysis.
What are asymmetric strategies by Bruce W Bennett ( Book )
5 editions published in 1999 in English and held by 133 libraries worldwide
No prospective adversary of the United States can afford to take on the U.S. military in a head-to-head confrontation. Serious threats have not disappeared, however. They now will likely take the form of asymmetric challenges to U.S. forces. How can the United States best address its potential vulnerability to such threats as chemical and biological warfare, terrorism, and information warfare? In support of the 1997 Quadrennial Defense Review, the authors examine such asymmetric strategies as airfield attack and a biological warfare attack on New York and conclude that the United States is "some distance" from having the ability to counter the range of asymmetric threats and will require "a significant intelligence shift away from tactical military issues and toward adversary strategies and their vulnerabilities" to avoid "fighting the last war."
How to assess the survivability of U.S. ICBMS by Bruce W Bennett ( Book )
4 editions published in 1980 in English and held by 108 libraries worldwide
Develops complete survivability distributions for U.S. ICBMs under various conditions of Soviet attack and under three U.S. basing options: silos, trenches, and shelters. The distributions show the cumulative probability of a Soviet attack achieving at most a given kill probability and thus specify the confidence with which survivability can be expected. Unlike other analyses in the literature, the report explicitly defines and develops the uncertainties in ICBM basing options and in Soviet operational effectiveness that influence the assessment of survivability. The report concludes that, from a U.S. perspective, the Soviets face a very high risk in any attack against U.S. ICBMs, even though they have developed MIRVed ICBMs with much improved accuracy.
RSAS 4.6 summary by Bruce W Bennett ( Book )
2 editions published in 1992 in English and held by 99 libraries worldwide
The RAND Strategy Assessment System (RSAS) is a global war gaming and analysis system that focuses on conflict, from major regional contingencies through strategic warfare. It has been developed to support balance assessment, contingency analysis, and military training. It is global because it includes order-of-battle data for most major countries worldwide. This Note summarizes the development status of RSAS 4.6, as released, describing each of its components and how they have been changed since RSAS 4.0. It describes known limitations of the RSAS and enhancements the authors feel ought to be made, as a reference point for RSAS applications and future development. Finally, it provides some basic information on how to use the RSAS, how it is designed to be used, and descriptions of RSAS inputs and outputs.
Assessing the capabilities of strategic nuclear forces : the limits of current methods by Bruce W Bennett ( Book )
2 editions published in 1980 in English and held by 93 libraries worldwide
Main theater warfare modeling in the Rand Strategy Assessment System (3.0) ( Book )
3 editions published in 1988 in English and held by 88 libraries worldwide
This Note provides an overview of the main theater warfare model developed as part of the RAND Strategy Assessment System (RSAS, Release 3.0), in a game-structured simulation of global conflict. This model covers land and air combat in Central Europe and Korea and is part of a global combat model (CAMPAIGN) that provides a fully integrated treatment of conventional, theater-nuclear, and intercontinental-nuclear warfare worldwide. The model has been designed to answer "What if?" questions quickly, to be used either as a closed simulation or as an interactive game, and to be flexible. It permits the user to vary assumptions about a broad range of qualitative and quantitative issues such as national fighting effectiveness, maximum combat intensity, air-ground interactions, etc. The model is also unique in its treatment of maneuver because it allows the attacker and defender to have explicit concepts of maneuver at corps level and above.
Early observations on possible defenses by the emerging threat agent project ( Book )
4 editions published in 2011 in English and held by 86 libraries worldwide
The Defense Department's 2010 Quadrennial Defense Review expressed concerns about emerging chemical and biological (CB) weapon agents and the ability of U.S. defenses to counter them. Scientific advances that facilitate the development of new and novel CB agents and the difficulties uncovering such work suggest that adversary programs could acquire new CB agents years before U.S. defense planners recognize those agents. Once these CB agents are recognized as threats, the United States will probably need many more years to establish a comprehensive defense against them, and even these defenses are unlikely to protect the civilians, contractors, and allied military personnel essential to modern U.S. military operations. Such gaps in CB agent defense capabilities pose a potentially serious risk to U.S. military operations. To best mitigate this risk, the U.S. Chemical and Biological Defense Program (CBDP) needs to augment current work with enhanced efforts to dissuade adversary CB agent development and to deter adversary use of new CB weapons. Successful initiatives in dissuasion and deterrence will depend on CB defensive programs that appear dynamic, progressive, and integrated with other Defense Department and national-level efforts in counterproliferation. The CBDP could add a second track to the current agent-specific science and technology effort to focus on the mechanisms of CB agent effects and interactions with the environment. The goal of the resulting robust combination of CBDP defense, dissuasion, and deterrence is to induce great doubts in adversaries about the value of employing any CB agents or developing new CB agents.
Automated war gaming as a technique for exploring strategic command and control issues by Paul K Davis ( Book )
2 editions published in 1983 in English and held by 84 libraries worldwide
Fatality uncertainties in limited nuclear war by Bruce W Bennett ( Book )
4 editions published between 1977 and 1978 in English and held by 67 libraries worldwide
Reflecting Soviet thinking in the structure of combat models and data by Bruce W Bennett ( Book )
2 editions published in 1985 in English and held by 67 libraries worldwide
"This paper provides an overview of the CAMPAIGN model being developed by the RAND Strategy Assessment Center (RSAC) for use in strategic and operational-level gaming and simulation. CAMPAIGN is global in scope, emphasizes integration across traditional boundaries of force type and theater, and accounts for many special phenomena ignored by traditional models (e.g., many elements of maneuver warfare). CAMPAIGN is fast and extremely flexible; it also includes graphics for game support and post-processing of multi-scenario simulations. Finally, CAMPAIGN reflects many Red-Blue asymmetries and will accommodate more as development continues. This paper gives examples of how RSAC has sought to reflect the Soviet perspective."--Rand abstract.
The role of automated war gaming in strategic analysis by Bruce W Bennett ( Book )
2 editions published in 1984 in English and held by 65 libraries worldwide
Uncertainty in ICBM survivability by Bruce W Bennett ( Book )
2 editions published in 1979 in English and held by 63 libraries worldwide
Uncertainties in the North Korean nuclear threat by Bruce W Bennett ( Book )
3 editions published in 2010 in English and held by 45 libraries worldwide
North Korea has been very successful in denying the United States and others information about its nuclear weapon program. The result is a high degree of uncertainty about the size and character of the North Korean nuclear weapon threat, how it might be used, and what impact it might have. This briefing addresses those uncertainties. Estimates of the number and nature of North Korean nuclear weapons depend heavily on how much external help the program has received; there is some evidence that help has included the provision of fissile material and assistance in the design of nuclear weapons, including miniaturization for ballistic missiles. North Korea uses its nuclear weapons actively in peacetime for deterrence and to obtain leverage. It could use them heavily in a war. If its force is as large as the uncertainties suggest it might be, North Korea could establish its nuclear weapon capabilities and intent to use them from early on in a war. Like other countries that have developed small nuclear forces, North Korea could threaten adversary cities (mainly in Japan and the Republic of Korea) to control escalation and the developments in a war, striving for some hope of victory. If North Korea actually attacked a city such as Seoul with a nuclear weapon, it could result in hundreds of thousands of casualties, as well as serious damage to the South Korean economy.
Integrating counterproliferation into defense planning ( Book )
2 editions published in 1997 in English and held by 40 libraries worldwide
Integrating counterproliferation into defense planning : QDR Conference proceedings by Gregory F Treverton ( Book )
1 edition published in 1997 in English and held by 29 libraries worldwide
Armed Forces--Reorganization Biological arms control Biological weapons Biological weapons--Safety measures Bioterrorism--Prevention Chemical arms control Chemical weapons Chemical weapons--Safety measures Civil defense Combat--Simulation methods Computer war games Computer war games--Computer programs Defense industries Emergency management Imaginary wars and battles--Computer simulation Intercontinental ballistic missile bases Intercontinental ballistic missiles Intercontinental ballistic missiles--Combat survivability JICM Korea (North) Korea (South) Limited war Medicine, Military Military art and science--Computer simulation Military planning Military policy Military readiness Military readiness--Computer simulation National security Nuclear arms control Nuclear crisis control Nuclear disarmament Nuclear warfare Nuclear-weapon-free zones Nuclear weapons Nuclear weapons--Safety measures Physicians--Supply and demand--Mathematical models RSAS Strategic forces Strategy Strategy--Data processing United States United States.--Office of Civilian Health and Medical Program of the Uniformed Services War games War games--Data processing War games--Mathematical models Weapons of mass destruction World politics World politics--Computer simulation World politics--Forecasting