WorldCat Identities

Bennett, Bruce W. 1952-

Works: 42 works in 128 publications in 1 language and 3,497 library holdings
Roles: Author
Classifications: U310, 793.9202855369
Publication Timeline
Most widely held works by Bruce W Bennett
Theater analysis and modeling in an era of uncertainty : the present and future of warfare by Bruce W Bennett( Book )

6 editions published in 1994 in English and held by 167 WorldCat member libraries worldwide

Within the U.S. defense community, there is no agreed-upon perception of how warfare is evolving. This report presents the results of war gaming and analysis on the future of warfare. It structures its findings around four issues: (1) warfare will be dominated by uncertainty and variability; (2) adversaries will seek new patterns of warfare to effectively oppose the United States; (3) asymmetrical battles will characterize war; and (4) weapons of mass destruction cast a shadow over almost all future contingencies. It proposes that analysis and modeling must evolve to: (1) reflect the significant differences in the warfare environment that will exist between theaters; (2) focus on strategic and operational events, variations, and uncertainties; (3) adopt a "counter-capabilities" approach to defining military threats; (4) adopt a new approach of developing simple but more comprehensive models; (5) address issues associated with the regional shadow of weapons of mass destruction; and (6) develop new procedures for presenting the uncertainties of analyses to decisionmakers
The new map graphics in RSAS 5.0 by Bruce W Bennett( Book )

6 editions published in 1993 in English and held by 149 WorldCat member libraries worldwide

The RAND Strategy Assessment System (RSAS) is a global warfare analysis system developed over the last decade for the Director of Net Assessment in the Office of the Secretary of Defense. RSAS Map has two major objectives: (1) Replace the former RSAS graphics package, Map Tool, with a new package that uses the current display standard (X Windows) and the current communications standard (ToolTalk) to make it more usable and easier to maintain than its predecessor; and (2) Provide a more visual interface for understanding theater military forces and their operations to make the RSAS easier to use. RSAS Map includes several components. The background maps are derived from a map server built around the Navy's Caricature map graphics program. The map server provides an interface. The map server allows the user to choose the area and resolution to be displayed, and can add several features (e.g., rivers) and employ a large number of map projections
JICM 1.0 summary by Bruce W Bennett( Book )

5 editions published in 1994 in English and Undetermined and held by 147 WorldCat member libraries worldwide

This report documents the Joint Contingency Model (JICM), a global war gaming and analysis system that focuses on conflict from major regional contingencies through strategic warfare. The JICM is an outgrowth of the former RAND Strategy Assessment System (RSAS), engineered explicitly to address post-Cold War conflict issues. The JICM has been developed to support balance assessment, contingency analysis, and military training. It handles issues such as strategic mobility, ground combat maneuver and fires (including systems like ATACMS and future technological advances), the activities involved in achieving air or sea superiority, the ability to apply naval and aircraft fires against infrastructure targets or military forces in the field, and supplies and support of military forces. JICM is unique in its attempt to address qualitative factors such as unit cohesion and specialization, training, and national force effectiveness. It also deals with discontinuities in warfare such a breakthroughs and the failure of assaults. It is a global system because it includes, as part of its release, order of battle data for most major countries worldwide, relieving JICM users of the burden of having to develop such information. It also includes base cases covering conflicts in the Persian Gulf and Korea. Thus, the JICM comes as a ready-to-use package, though users will also find it easy to develop new theaters for analysis in the JICM
What are asymmetric strategies? by Bruce W Bennett( Book )

5 editions published in 1999 in English and held by 132 WorldCat member libraries worldwide

No prospective adversary of the United States can afford to take on the U.S. military in a head-to-head confrontation. Serious threats have not disappeared, however. They now will likely take the form of asymmetric challenges to U.S. forces. How can the United States best address its potential vulnerability to such threats as chemical and biological warfare, terrorism, and information warfare? In support of the 1997 Quadrennial Defense Review, the authors examine such asymmetric strategies as airfield attack and a biological warfare attack on New York and conclude that the United States is "some distance" from having the ability to counter the range of asymmetric threats and will require "a significant intelligence shift away from tactical military issues and toward adversary strategies and their vulnerabilities" to avoid "fighting the last war."
A Brief analysis of the Republic of Korea's defense reform plan by Bruce W Bennett( Book )

7 editions published in 2006 in English and held by 126 WorldCat member libraries worldwide

Assemblyman Jin-Ha Hwang, a member of the National Assembly₂s National Defense Committee, this analysis was performed of the ROK Defense Reform Plan (DRP). It examines the overall nature of the DRP, identifies major risks in the plan, and discusses how those risks can be managed. It concludes that the DRP is a good approach to potential ROK security dilemmas, but the plan faces major risks, especially in meeting potential ROK security requirements. The DRP could be strengthened by adding concepts for managing its major risks. This paper discusses the background of the DRP and the manpower problem it needs to address. It then presents the author₂s estimates of the force changes that would occur and how those forces appear to fit the force requirements the ROK will likely face in the coming years. It examines the budget requested for the DRP and whether it will cover the necessary costs, addresses the effects that the DRP could have on ROK military morale and how the United States may view the DRP, and concludes by recommending steps the ROK could take to manage the key risks identified throughout this analysis
RSAS 4.6 summary by Bruce W Bennett( Book )

4 editions published in 1992 in English and Undetermined and held by 95 WorldCat member libraries worldwide

The RAND Strategy Assessment System (RSAS) is a global war gaming and analysis system that focuses on conflict, from major regional contingencies through strategic warfare. It has been developed to support balance assessment, contingency analysis, and military training. It is global because it includes order-of-battle data for most major countries worldwide. This Note summarizes the development status of RSAS 4.6, as released, describing each of its components and how they have been changed since RSAS 4.0. It describes known limitations of the RSAS and enhancements the authors feel ought to be made, as a reference point for RSAS applications and future development. Finally, it provides some basic information on how to use the RSAS, how it is designed to be used, and descriptions of RSAS inputs and outputs
Preparing for the possibility of a North Korean collapse by Bruce W Bennett( Book )

10 editions published between 2011 and 2013 in English and Undetermined and held by 93 WorldCat member libraries worldwide

A North Korean government collapse would have serious consequences in North Korea and beyond. At the very least, a collapse would reduce the already scarce food and essential goods available to the population, in part due to hoarding and increasing costs. This could lead to a humanitarian disaster. Factions emerging after a collapse could plunge the country into civil war that spills over into neighboring countries. Weapons of mass destruction (WMD) could be used and even proliferated. This report examines ways of controlling and mitigating the consequences, recognizing that the Republic of Korea (ROK) and its U.S. ally will almost certainly need to intervene militarily in the North, likely seeking Korean unification as the ultimate outcome. But such an intervention requires serious preparation. North Koreans must be convinced that they will be treated well and could actually have better lives after unification. The allies need to prepare to deliver humanitarian aid in the North, stop conflict, demilitarize the North Korean military and security services over time, and secure and eventually eliminate North Korean WMD. Potential Chinese intervention must be addressed, ideally leading to cooperation with ROK and U.S. forces. Plans are needed for liberating North Korean political prisons before the guards execute the prisoners. Property rights need to be addressed. The ROK must sustain its military capabilities despite major reductions in force size due to very low birthrates. And ROK reluctance to broadly address North Korean collapse must be overcome so that plans in these areas can move forward
Fatality uncertainties in limited nuclear war by Bruce W Bennett( Book )

9 editions published between 1976 and 1978 in English and Undetermined and held by 91 WorldCat member libraries worldwide

Presents counterarguments to the article "Limited Nuclear War," by S.D. Drell and F. von Hippel, [Scientific American], November 1976. The article concludes that any Soviet limited counterforce attack, if strategically effective, would inflict very high fatality levels; and because the USSR is not pondering such attacks, the United States should not inflame the situation by building up flexible counterforce capabilities as recommended by Secretary of Defense Schlesinger in 1974. The report argues that Drell and von Hippel neglect the importance of the assumptions underlying attack scenarios and the wide-ranging effects of uncertainty on fatality calculations. Using RAND's new SNAPPER model for assessing nuclear damage, the report concludes that the USSR could launch potentially effective limited counterforce attacks while causing only a one to three million U.S. fatalities, exactly the range suggested by Schlesinger. It therefore would be unwise to dismiss such attacks from the realm of possibility
Initiatives and challenges in consequence management after a WMD attack by Bruce W Bennett( Book )

3 editions published in 2004 in English and held by 89 WorldCat member libraries worldwide

In the past decade, as the threat from rogue states and terrorist groups has increased, the U.S. and its allies have devoted far greater attention to how to manage the consequences of prospective uses of weapons of mass destruction (WMD). Consequence management1 is a process to mitigate the effects of the use of weapons of mass destruction, including: " detecting and characterizing weapons of mass destruction attacks; " measures that protect public health, ensure safety, and protect the environment; " measures to medically counter the effects of weapons of mass destruction attacks; " measures that restore essential services to government, businesses, and individuals; and " planning, training, and equipping to coordinate/synchronize the civil-military response.2 A thorough review and discussion of U.S. plans for consequence management will include the following: " The history of consequence management of the effects of weapons of mass destruction, with particular focus on the period since 1993." The mandate for consequence management in the recent U.S. National Security Strategy and National Strategy to Combat Weapons of Mass Destruction.3 These strategies direct U.S. efforts both in the homeland and in support of U.S. forces and allies overseas, though these efforts are organized differently
Needed now : the "85% quick fix" in bio-defense by Jim A Davis( Book )

3 editions published in 2004 in English and held by 89 WorldCat member libraries worldwide

The search for the best solution for bio-defense is proving to be an obstacle to finding the more immediate good solution. In the day when Americans have grown used to fast food, instant access to the Internet, and minimal United States casualties during war, many have come to expect a silver bullet solution for almost any problem. The military, like the rest of America, is often in quest for the 100% solution to its challenges. For example, the military, now awakened to the biological warfare/biological terrorism (BW/BT) threat, is in search of the perfect solution to the problem posed by biological weapons. The pursuit of the 100% solution often diverts efforts from potential quick (though incomplete) fixes for such tough problems that could provide valuable protection. Some new proposals are presented to provide an "85% Quick Fix", including implementation of a Bio-Threatcon level, building preparation, providing off the shelf 1/2 mask respirators and more. While the technical information in this paper needs further study, it is hoped this chapter will provoke discussion and stimulate the development of new ideas for immediate solutions (albeit partial solutions) rather than waiting on the 100% solution. In April 1990, two U.S. naval bases, Yokosuka and Yokohama, were attacked with botulinum toxin, and although they failed, the scenario could have turned out much different. A home-grown Japanese terrorist organization, Aum Shinrikyo, had amassed over a billion dollars in net worth and had developed a clandestine biological warfare program. This group became famous for its nerve agent attack in the Tokyo subways in March 1995 that killed 12 and injured 5,500. Fortunately, in 1990, technology and scientific know-how were not as accessible as they are today, and as a result, the Aum Shinrikyo cult had not perfected its program. To our knowledge, no U.S. forces became ill from this attack
Assessing the capabilities of strategic nuclear forces : the limits of current methods by Bruce W Bennett( Book )

4 editions published in 1980 in English and held by 88 WorldCat member libraries worldwide

The purpose of this Note is to assess the nature and validity of the various procedures used in assessing strategic forces capabilities. Problems of assessment and the limitations of procedures are illuminated and, in some cases, more appropriate measures are illustrated. The review also suggests the complexity involved in making such assessments and the difficulties of arriving at specific conclusions about force capabilities. The following topics are addressed: bases for evaluating strategic forces; estimating countermilitary capabilities; estimating countervalue capabilities; aggregate measures; and assessing strategic force capabilities in off-design scenarios. The final section presents a sample analysis of Soviet capabilities in the mid-1980s and considers some of the difficulties of trying to apply the methodologies described earlier in the report. (Author)
Early observations on possible defenses by the emerging threat agent project( Book )

6 editions published in 2011 in English and held by 88 WorldCat member libraries worldwide

The Defense Department's 2010 Quadrennial Defense Review expressed concerns about emerging chemical and biological (CB) weapon agents and the ability of U.S. defenses to counter them. Scientific advances that facilitate the development of new and novel CB agents and the difficulties uncovering such work suggest that adversary programs could acquire new CB agents years before U.S. defense planners recognize those agents. Once these CB agents are recognized as threats, the United States will probably need many more years to establish a comprehensive defense against them, and even these defenses are unlikely to protect the civilians, contractors, and allied military personnel essential to modern U.S. military operations. Such gaps in CB agent defense capabilities pose a potentially serious risk to U.S. military operations. To best mitigate this risk, the U.S. Chemical and Biological Defense Program (CBDP) needs to augment current work with enhanced efforts to dissuade adversary CB agent development and to deter adversary use of new CB weapons. Successful initiatives in dissuasion and deterrence will depend on CB defensive programs that appear dynamic, progressive, and integrated with other Defense Department and national-level efforts in counterproliferation. The CBDP could add a second track to the current agent-specific science and technology effort to focus on the mechanisms of CB agent effects and interactions with the environment. The goal of the resulting robust combination of CBDP defense, dissuasion, and deterrence is to induce great doubts in adversaries about the value of employing any CB agents or developing new CB agents
How to assess the survivability of U.S. ICBMS by Bruce W Bennett( Book )

in English and held by 86 WorldCat member libraries worldwide

Integrating counterproliferation into defense planning by Gregory F Treverton( Book )

5 editions published in 1997 in English and held by 84 WorldCat member libraries worldwide

This document describes the implications of weapons of mass destruction proliferation on U.S. defense planning. The authors believe that, at the margin, improvements in passive defenses should be given priority over increases in firepower
Main theater warfare modeling in the Rand Strategy Assessment System (3.0) by Rand Corporation( Book )

4 editions published in 1988 in English and held by 81 WorldCat member libraries worldwide

This Note provides an overview of the main theater warfare model developed as part of the RAND Strategy Assessment System (RSAS, Release 3.0), in a game-structured simulation of global conflict. This model covers land and air combat in Central Europe and Korea and is part of a global combat model (CAMPAIGN) that provides a fully integrated treatment of conventional, theater-nuclear, and intercontinental-nuclear warfare worldwide. The model has been designed to answer "What if?" questions quickly, to be used either as a closed simulation or as an interactive game, and to be flexible. It permits the user to vary assumptions about a broad range of qualitative and quantitative issues such as national fighting effectiveness, maximum combat intensity, air-ground interactions, etc. The model is also unique in its treatment of maneuver because it allows the attacker and defender to have explicit concepts of maneuver at corps level and above
Automated war gaming as a technique for exploring strategic command and control issues by Paul K Davis( Book )

5 editions published in 1983 in English and held by 79 WorldCat member libraries worldwide

This Note describes a preliminary concept for including strategic command and control effects within the automated war gaming of RAND's Strategy Assessment Center. The concept features a top-down functionally oriented approach relevant to the interests of civilian and military leaders; a hierarchical and otherwise multilevel gaming structure; and heuristic rule-based models using a variety of artificial intelligence techniques. The approach will be sensitive to key features of war plans and control procedures. It will make a start on reflecting such phenomena as nonunitary decisionmaking, deception, and confusion. It will take into account some of the asymmetries distinguishing the U.S. and Soviet approach to C3I. Initial versions of the implemented concept should be useful and interesting but will be relatively simple; with time, it should be possible to evolve gracefully and use some of the detailed models available on pieces of the overall C3I problems
Reflecting Soviet thinking in the structure of combat models and data by Bruce W Bennett( Book )

3 editions published in 1985 in English and held by 65 WorldCat member libraries worldwide

"This paper provides an overview of the CAMPAIGN model being developed by the RAND Strategy Assessment Center (RSAC) for use in strategic and operational-level gaming and simulation. CAMPAIGN is global in scope, emphasizes integration across traditional boundaries of force type and theater, and accounts for many special phenomena ignored by traditional models (e.g., many elements of maneuver warfare). CAMPAIGN is fast and extremely flexible; it also includes graphics for game support and post-processing of multi-scenario simulations. Finally, CAMPAIGN reflects many Red-Blue asymmetries and will accommodate more as development continues. This paper gives examples of how RSAC has sought to reflect the Soviet perspective."--Rand abstract
Uncertainty in ICBM survivability by Bruce W Bennett( Book )

2 editions published in 1979 in English and held by 64 WorldCat member libraries worldwide

The role of automated war gaming in strategic analysis by Bruce W Bennett( Book )

5 editions published in 1984 in English and held by 64 WorldCat member libraries worldwide

For the last several years, The Rand Corporation's Strategy Assessment Center (RSAC) has been developing a new framework for strategy analysis. This paper reviews the effort and discusses early RSAC experience with automated war gaming, which includes not only computerized force modeling and bookkeeping, but also automated decision making. The initial focus was on strategic forces. It became obvious that Rand also had to handle major conventional conflicts as well, since the use of strategic forces seemed most likely to escalate from theater conflict. Furthermore, most analysts felt that the outcomes of theater conflicts were critical to the outcome of the war even after the employment of strategic forces. Rand is therefore producing a simulation of integrated, global conflict, which assesses the capabilities of both conventional and nuclear forces in various contigencies. Rand also emphasized model flexibility that facilitates sensitivity testing of both military and political issues--providing the capability to answer a broad range of 'what if?' questions
Uncertainties in the North Korean nuclear threat by Bruce W Bennett( Book )

4 editions published in 2010 in English and held by 43 WorldCat member libraries worldwide

North Korea has been very successful in denying the United States and others information about its nuclear weapon program. The result is a high degree of uncertainty about the size and character of the North Korean nuclear weapon threat, how it might be used, and what impact it might have. This briefing addresses those uncertainties. Estimates of the number and nature of North Korean nuclear weapons depend heavily on how much external help the program has received; there is some evidence that help has included the provision of fissile material and assistance in the design of nuclear weapons, including miniaturization for ballistic missiles. North Korea uses its nuclear weapons actively in peacetime for deterrence and to obtain leverage. It could use them heavily in a war. If its force is as large as the uncertainties suggest it might be, North Korea could establish its nuclear weapon capabilities and intent to use them from early on in a war. Like other countries that have developed small nuclear forces, North Korea could threaten adversary cities (mainly in Japan and the Republic of Korea) to control escalation and the developments in a war, striving for some hope of victory. If North Korea actually attacked a city such as Seoul with a nuclear weapon, it could result in hundreds of thousands of casualties, as well as serious damage to the South Korean economy
moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.57 (from 0.12 for Preparing ... to 0.64 for Integratin ...)

What are asymmetric strategies?
Alternative Names
Bennett, Bruce William 1952-

English (93)

A Brief analysis of the Republic of Korea's defense reform plan