WorldCat Identities

National Defense University Center for Technology and National Security Policy

Overview
Works: 246 works in 545 publications in 1 language and 52,641 library holdings
Genres: Conference papers and proceedings  Periodicals 
Roles: Publisher, Publishing director, Other
Classifications: UA23, 355.033573
Publication Timeline
.
Most widely held works by National Defense University
Bio-inspired innovation and national security by Robert E Armstrong( Book )

7 editions published in 2010 in English and held by 381 WorldCat member libraries worldwide

From the Introduction: This volume is designed as an overview of the many applications of biology to the military and national security writ large (with the exception of bioweapons and biomedicine). Policy issues are covered, and original research is presented. The diversity of the authors' backgrounds reflects the breadth of applications and opportunities of biology to modern problems. The read should walk away enlightened as to the many possible ways in which biology is influencing and will continue to influence national security. Authors were asked to provede foresight on trends and indicators in their areas of interest (but not forecasts, which would describe a single future state) in order to better understand their implications for the next 20 years or so
Defense horizons : a publication of the Center for Technology and National Security Policy, National Defense University( )

in English and No Linguistic content and held by 354 WorldCat member libraries worldwide

The 71F advantage : applying Army research psychology for health and performance gains( Book )

3 editions published in 2010 in English and held by 348 WorldCat member libraries worldwide

From the back cover: This book, which grew out of an Army research psychology conference, is the first of its kind, intended to provide a comprehensive overview of what Army research psychologists do. Chapters cover the diverse activity areas of 71Fs, from the neurophysiology of sleep, to traumatic brain injury, to leadership and organizational process, as well as several personal and historical accounts. Army research psychologists are making a difference. Through their research, 71Fs provide leaders with new insights and tools for increasing the health and performance of military personnel. This is the "71F Advantage."
Civilian surge : key to complex operations( Book )

3 editions published in 2009 in English and held by 329 WorldCat member libraries worldwide

Examines the national need for assistance and quick response to military personnel from civilian resources for stabilization and reconstruction operations. Concludes with the efforts to build a civilian response capacity for complex operations are incomplete and require further attention
Catastrophic bioterrorism : what is to be done? by Richard Danzig( Book )

2 editions published in 2003 in English and held by 313 WorldCat member libraries worldwide

New directions in U.S. national security strategy, defense plans, and diplomacy : an official studies blueprint by Richard L Kugler( Book )

2 editions published in 2011 in English and held by 296 WorldCat member libraries worldwide

"Where are U.S. national security strategy, defense plans, and diplomacy headed in the coming years? An answer to this important question comes from seven official studies that have been issued during 2010 ... This work addresses each of these seven studies individually in sequential order. In each case, it endeavors to summarize the main features of the study and to evaluate its contents. At the end, this book examines how these studies interlock to form an overall blueprint, identifies lingering issues that call for further analysis, and offers constructive ideas for further research and analyses"--Page xi-xii
Strategic shift : appraising recent changes in U.S. defense plans and priorities by Richard L Kugler( Book )

2 editions published in 2013 in English and held by 281 WorldCat member libraries worldwide

This study examines important changes in U.S. defense planning unveiled by the Department of Defense (DOD) during 2012 and early 2013. Through a series of strategic and operational documents DOD has put forth an interlocking set of changes that placed greater emphasis on the Asia-Pacific and Middle East regions, created a new force-sizing construct, adopted new operational concepts, trimmed the U.S. force structure and defense budget, and called for enhanced cooperation with global partners. These strategies and concepts were developed under to the levels of the FY13 Defense budget submission and are carried forth in the FY14 Defense budget submission. This study describes these changes, evaluates them, and addresses the challenges of implementation. In particular, it recommends that DOD 'double down' in its pursuit of globally integrated operations through joint force integration in the context of the Capstone Concept for Joint Operations and the cross-domain synergy needed to operate effectively in the face of sophisticated adversaries. These are likely to be important in any strategic context. This study's conclusions and recommendations are not altered by DOD's budget request in FY14, though effective implementation will be more challenging
Policing and COIN operations : lessons learned, strategies, and future directions by Samuel Musa( Book )

4 editions published between 2011 and 2012 in English and held by 281 WorldCat member libraries worldwide

Summaries of sessions from a workshop held on September 29, 2010, co-sponsored by the Center for Technology and National Security Policy (CTNSP) of the National Defense University (NDU) and the Combating Terrorism Technical Support Office (CTTSO) of the Threat Support Working Group (TSWG) of the Department of Defense. The workshop was focused on lessons learned from past campaigns, development of new strategies, and outlining future directions for implementation
Capability development in support of comprehensive approaches : transforming international civil-military interactions by International Transformation Conference( Book )

3 editions published in 2011 in English and held by 278 WorldCat member libraries worldwide

"This book includes papers presented at the Second International Transformation (ITX2) Conference, held in Rome, Italy, at the NATO Defense College (NDC) June 21-23, 2011, as well as a summary of the conference discussions. Co-hosted by NDC, Allied Command Transformation (ACT), and the International Transformation (ITX) Chairs Network, the conference brought together academics, policymakers, and practitioners from 13 nations to discuss the topic of 'Capability Development in Support of Comprehensive Approaches: Transforming International Civil-Military Interactions'"--Page vii
Changing mindsets to transform security : leader development for an unpredictable and complex world by International Transformation Conference( Book )

2 editions published in 2013 in English and held by 268 WorldCat member libraries worldwide

"This book is a compilation of papers and discussions from the Third International Transformation Conference and Workshop on Leader Development in Washington, DC, on June 19-20, 2013. The event was sponsored by the NATO Headquarters Supreme Allied Commander Transformation, hosted at the National Defense University, and supported by the International Transformation Chairs Network."--Page [4] of cover
Transforming for stabilization and reconstruction operations( Book )

7 editions published between 2003 and 2006 in English and held by 122 WorldCat member libraries worldwide

På baggrund af erfaringerne fra de amerikansk ledede operationer i Afghanistan og Irak analyseres, hvorledes de militære styrker fremtidigt kan forberedes bedst muligt til også at genopbygge og restabilisere de tidligere krigsskuepladser, således at de berørte samfund kan komme til at fungere optimalt
Battle-wise : seeking time-information superiority in networked warfare by David C Gompert( Book )

8 editions published in 2006 in English and held by 117 WorldCat member libraries worldwide

The capacity and means by which the American Armed Forces defend their nation are entering a paradigm-breaking transition period. Previous transitions have been driven by the technologies of weapons and their platforms. This is not so in the 21st century. Taking the information revolution as a starting point, Battle-Wise argues that only by strengthening the relationship between information technology and brain matter will the U.S. military enhance its ability to outsmart and outfight future adversaries. Our aim is to understand whether and how advantages in thinking and decisionmaking under operational conditions can affect outcomes victories or defeats especially in networked warfare. It is important to identify as precisely as possible the mental abilities, such as anticipation and rapid adaptation, that are of greatest utility in networked operations and thus in strategic competition so that these abilities can be emphasized in the ways that military personnel are recruited, taught, developed, and organized. The role of the mind in networked warfare is still unknown. This book is meant to raise ideas, issues, and possibilities, as well as at the risk of seeming presumptuous a potential framework
Information assurance : trends in vulnerabilities, threats, and technologies( Book )

4 editions published between 2004 and 2005 in English and held by 86 WorldCat member libraries worldwide

One of the missions of the Center for Technology and National Security Policy at National Defense University is to study the transformation of America's military and to explore the consequences of the information revolution. To further this mission, National Defense University, in collaboration with The Center for Public Policy and Private Enterprise of the University of Maryland's School of Public Affairs, brought together leaders in the fields of military and commercial technology. The purpose of the meeting was to gain insight into the risks and vulnerabilities inherent in the use of information technology on the battlefield and in military systems. This volume presents the results of that workshop. This volume examines threats and vulnerabilities in the following four areas: (1) physical attacks on critical information nodes; (2) electromagnetic attacks against ground, airborne, or space-based information assets; (3) cyber attacks against information systems; and (4) attacks and system failures made possible by the increased level of complexity inherent in the multiplicity of advanced systems. Chapters are as follows: "Trends in Vulnerabilities, Threats, and Technologies," by Jacques S. Gansler and William Lucyshyn; "Physical Vulnerabilities of Critical Information Systems," by Robert H. Anderson; "Physical Vulnerabilities Exposed at the National Training Center," by Colonel John D. Rosenberger; "Dealing with Physical Vulnerabilities," by Bruce W. MacDonald; "Vulnerabilities to Electromagnetic Attack of Defense Information Systems," by John M. Borky; "Vulnerabilities to Electromagnetic Attack of the Civil Infrastructure," by Donald C. Latham; "Trends in Cyber Vulnerabilities, Threats, and Countermeasures," by Michael A. Vatis; "Enhancing Cyber Security for the Warfighter," by Sean R. Finnegan; "Complexity of Network Centric Warfare," by Stanley B. Alterman; and "Difficulties with Network Centric Warfare," by Charles Perrow
Moore's law : a Department of Defense perspective by Gerald M Borsuk( Book )

2 editions published in 2003 in English and held by 17 WorldCat member libraries worldwide

Lessons of Abu Ghraib : understanding and preventing prisoner abuse in military operations by Paul T Bartone( Book )

2 editions published in 2008 in English and held by 11 WorldCat member libraries worldwide

The abuse of prisoners by U.S. soldiers at Abu Ghraib had broad struggle consequences, leading many people around the world to question the legitimacy of U.S. goals and activities in Iraq. This paper draws on extensive unclassified reports from multiple investigations that followed Abu Ghraib and applies key psychological as well as social-situational perspectives to develop a better grasp of the causative factors. From a psychological standpoint, most young adults are powerful inclined to behave in accord with the social conventions and pressures around them. Especially in ambiguous circumstances, then, it is important that standards of behavior be clear and explicit throughout all phases of an operation and that leaders at all levels represent and reinforce those standards
Organizing for national security : unification or coordination? by James M Keagle( Book )

2 editions published in 2007 in English and held by 10 WorldCat member libraries worldwide

Experience gained from the 9/11 attacks, combat in Iraq and Afghanistan, disaster assistance during and after Hurricane Katrina, and the ongoing war on terror provides the basis for amending our anachronistic national security structures and practices. Many analysts and officials have called for a second-generation version of the Goldwater-Nichols Department of Defense Reorganization Act of 1986 to address the array of organizational and management challenges that we face. Some argue that the new security environment requires even more fundamental change, similar to what was enacted after World War II. The principal legislation that emerged from that era was the National Security Act of 1947. Goldwater-Nichols aimed to fix inter-Service problems by streamlining the chain of command and promoting 'jointness' but did not fundamentally alter the structure of the U.S. military. These earlier efforts attempted to strike a balance between those who wanted to unite bureaucracies to improve efficiency (primarily resource considerations) and produce more effective outcomes and those who opposed potentially dangerous concentrations of power and desired to preserve their heart-and-soul missions (as well as congressional support for their strategic view and related combat systems and force structures). Today, the debate rages anew with the security of this nation dependent on the outcome. This paper explores two options for reorganization: unification and coordination. We investigate each against the backdrop of the two previous attempts at reorganization in the context of the Madisonian political culture that constitutes part of who we are as a nation. Finally, each option is judged against its ability to contribute to the development and implementation of the kinds of strategies and operations needed to wage the new kind of war and peace in the emerging global security environment
Army science and technology analysis for stabilization and reconstruction operations by Richard Chait( Book )

4 editions published in 2006 in English and held by 5 WorldCat member libraries worldwide

Examines capability gaps and science and technology needs of the Army to facilitate post-conflict reconstruction and stabilization operations
The bug stops here : force protection and emerging infectious diseases by Donald F Thompson( Book )

4 editions published in 2005 in English and held by 5 WorldCat member libraries worldwide

Despite significant advances in medical research and treatment in the past century, infectious diseases remain among the leading causes of death worldwide. These diseases are appearing in places they have never been seen before or were thought to have been eradicated, are spreading faster and more frequently, and are posing an increasing global health threat that will affect national and international security in both the near- and long-term future, even affecting the success of U.S. military missions and operations. Force health protection is an urgent priority for the Department of Defense (DoD), as increasing threats of natural outbreaks of infectious disease could seriously undermine mission readiness and success. U.S. national security might be impacted by military operations in regions with endemic and epidemic occurrences of infectious disease, where disease activity may prevent the successful completion of a mission or operation or may even result in infected soldiers carrying a contagious disease back to the United States. Changing military doctrine and tactics call for a fresh approach to force protection. The purpose of this paper is to review important lessons that have been learned in the past, and to revisit the older but proven principles of force protection that are in danger of being forgotten in today's technology-focused military environment. Recognizing that infectious diseases could have a significant impact on military operations, this report provides a series of case studies that analyze health threats to each regional combatant command and presents both tactical and strategic recommendations that will better prepare the entire DoD for future outbreaks of disease. These recommendations focus on procedural changes that will allow the U.S. military to regain its competitive advantage
Policy analysis in national security affairs : new methods for a new era by Richard L Kugler( Book )

2 editions published in 2006 in English and held by 4 WorldCat member libraries worldwide

This book addresses how to conduct policy analysis in the field of national security, including foreign policy and defense strategy. It is a philosophical and conceptual book for helphing people think deeply, clearly, and insightfully about complex policy issues. This books reflects the viewpoint that the best policies normally come from efforts to synthesize competing camps by drawing upon the best of each of them and by combining them to forge a sensible whole. While this book is written to be reader-friendly, it aspires to in-depth scholarship
New directions in U.S. national security strategy, defense plans, and diplomacy : a review of official strategic documents by Richard L Kugler( Book )

2 editions published in 2011 in English and held by 3 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.43 (from 0.29 for New direct ... to 0.60 for Defense ho ...)

Bio-inspired innovation and national security
Alternative Names
Center for Technology and National Security Policy

Center for Technology and National Security Policy (National Defense University)

CTNSP

CTNSP (Center for Technology and National Security Policy)

CTNSP (National Defense University. Center for Technology and National Security Policy)

National defense university

National Defense University Center for Technology and National Security Policy

National defense university Washington, D.C. Center for technology and national security policy

National Defense University Washington, DC Center for Technology and National Security Policy

Languages
English (73)

Covers
Civilian surge : key to complex operationsPolicy analysis in national security affairs : new methods for a new era