WorldCat Identities

National Defense University Center for Technology and National Security Policy

Works: 239 works in 527 publications in 1 language and 48,607 library holdings
Genres: Conference papers and proceedings  Periodicals 
Roles: Publisher, Publishing director, Other
Classifications: UA23, 958.4086
Publication Timeline
Most widely held works by National Defense University
Bio-inspired innovation and national security by Robert E Armstrong( Book )

7 editions published in 2010 in English and held by 419 WorldCat member libraries worldwide

From the Introduction: This volume is designed as an overview of the many applications of biology to the military and national security writ large (with the exception of bioweapons and biomedicine). Policy issues are covered, and original research is presented. The diversity of the authors' backgrounds reflects the breadth of applications and opportunities of biology to modern problems. The read should walk away enlightened as to the many possible ways in which biology is influencing and will continue to influence national security. Authors were asked to provede foresight on trends and indicators in their areas of interest (but not forecasts, which would describe a single future state) in order to better understand their implications for the next 20 years or so
The 71F advantage : applying Army research psychology for health and performance gains( Book )

2 editions published in 2010 in English and held by 355 WorldCat member libraries worldwide

From the back cover: This book, which grew out of an Army research psychology conference, is the first of its kind, intended to provide a comprehensive overview of what Army research psychologists do. Chapters cover the diverse activity areas of 71Fs, from the neurophysiology of sleep, to traumatic brain injury, to leadership and organizational process, as well as several personal and historical accounts. Army research psychologists are making a difference. Through their research, 71Fs provide leaders with new insights and tools for increasing the health and performance of military personnel. This is the "71F Advantage."
Defense horizons : a publication of the Center for Technology and National Security Policy, National Defense University( )

in English and No Linguistic content and held by 350 WorldCat member libraries worldwide

Civilian surge : key to complex operations( Book )

3 editions published in 2009 in English and held by 329 WorldCat member libraries worldwide

Examines the national need for assistance and quick response to military personnel from civilian resources for stabilization and reconstruction operations. Concludes with the efforts to build a civilian response capacity for complex operations are incomplete and require further attention
Policing and COIN operations : lessons learned, strategies, and future directions by Samuel Musa( Book )

4 editions published between 2011 and 2012 in English and held by 325 WorldCat member libraries worldwide

Summaries of sessions from a workshop held on September 29, 2010, co-sponsored by the Center for Technology and National Security Policy (CTNSP) of the National Defense University (NDU) and the Combating Terrorism Technical Support Office (CTTSO) of the Threat Support Working Group (TSWG) of the Department of Defense. The workshop was focused on lessons learned from past campaigns, development of new strategies, and outlining future directions for implementation
Capability development in support of comprehensive approaches : transforming international civil-military interactions by International Transformation Conference( Book )

3 editions published in 2011 in English and held by 319 WorldCat member libraries worldwide

"This book includes papers presented at the Second International Transformation (ITX2) Conference, held in Rome, Italy, at the NATO Defense College (NDC) June 21-23, 2011, as well as a summary of the conference discussions. Co-hosted by NDC, Allied Command Transformation (ACT), and the International Transformation (ITX) Chairs Network, the conference brought together academics, policymakers, and practitioners from 13 nations to discuss the topic of 'Capability Development in Support of Comprehensive Approaches: Transforming International Civil-Military Interactions'"--Page vii
Catastrophic bioterrorism : what is to be done? by Richard Danzig( Book )

2 editions published in 2003 in English and held by 316 WorldCat member libraries worldwide

Changing mindsets to transform security : leader development for an unpredictable and complex world by International Transformation Conference( Book )

2 editions published in 2013 in English and held by 301 WorldCat member libraries worldwide

"This book is a compilation of papers and discussions from the Third International Transformation Conference and Workshop on Leader Development in Washington, DC, on June 19-20, 2013. The event was sponsored by the NATO Headquarters Supreme Allied Commander Transformation, hosted at the National Defense University, and supported by the International Transformation Chairs Network."--Page [4] of cover
New directions in U.S. national security strategy, defense plans, and diplomacy : an official studies blueprint by Richard L Kugler( Book )

2 editions published in 2011 in English and held by 296 WorldCat member libraries worldwide

"Where are U.S. national security strategy, defense plans, and diplomacy headed in the coming years? An answer to this important question comes from seven official studies that have been issued during 2010 ... This work addresses each of these seven studies individually in sequential order. In each case, it endeavors to summarize the main features of the study and to evaluate its contents. At the end, this book examines how these studies interlock to form an overall blueprint, identifies lingering issues that call for further analysis, and offers constructive ideas for further research and analyses"--Page xi-xii
Transforming America's military( Book )

3 editions published between 2002 and 2003 in English and held by 293 WorldCat member libraries worldwide

Military transformation is the act of creating and harnessing a revolution in military affairs. It requires developing new technologies, operational concepts, and organizational structures to conduct war in dramatically new ways. The United States is undertaking such a transformation to tackle its 21st century missions. A properly transformed military can develop significant advantages over a potential enemy. But the process also introduces risks that, if not properly managed, could dangerously undermine military capability. This book, therefore, sets out the arguments for a purposeful and measured transformation that relies on sound experimentation as the basis for change, rather than the riskier strategy, proposed by some, of skipping a generation of technology. We argue that change must tie all of the services together in joint transformation efforts. Similarly, we must not neglect our coalition partners. A successful transformation will be one that has been conceived broadly to include homeland defense, space, cyberspace, and, though they may seem mundane, crucial reforms in weapons procurement and logistics. Part I of this book explores the foundations of today's military transformation: new missions, new technologies, and new operational concepts. Part II assesses the progress that is being made in this effort by each of America's military services. Part III analyzes the coordination and integration of these separate service efforts, while noting the capabilities gap being created with our allies. Part IV reviews broader aspects of military transformation, particularly those arising after the September 11 attacks
In the tracks of Tamerlane : Central Asia's path to the 21st century by Daniel L Burghart( Book )

2 editions published in 2004 in English and held by 284 WorldCat member libraries worldwide

Strategic shift : appraising recent changes in U.S. defense plans and priorities by Richard L Kugler( Book )

2 editions published in 2013 in English and held by 278 WorldCat member libraries worldwide

This study examines important changes in U.S. defense planning unveiled by the Department of Defense (DOD) during 2012 and early 2013. Through a series of strategic and operational documents DOD has put forth an interlocking set of changes that placed greater emphasis on the Asia-Pacific and Middle East regions, created a new force-sizing construct, adopted new operational concepts, trimmed the U.S. force structure and defense budget, and called for enhanced cooperation with global partners. These strategies and concepts were developed under to the levels of the FY13 Defense budget submission and are carried forth in the FY14 Defense budget submission. This study describes these changes, evaluates them, and addresses the challenges of implementation. In particular, it recommends that DOD 'double down' in its pursuit of globally integrated operations through joint force integration in the context of the Capstone Concept for Joint Operations and the cross-domain synergy needed to operate effectively in the face of sophisticated adversaries. These are likely to be important in any strategic context. This study's conclusions and recommendations are not altered by DOD's budget request in FY14, though effective implementation will be more challenging
Transforming for stabilization and reconstruction operations( Book )

7 editions published between 2003 and 2006 in English and held by 123 WorldCat member libraries worldwide

På baggrund af erfaringerne fra de amerikansk ledede operationer i Afghanistan og Irak analyseres, hvorledes de militære styrker fremtidigt kan forberedes bedst muligt til også at genopbygge og restabilisere de tidligere krigsskuepladser, således at de berørte samfund kan komme til at fungere optimalt
Battle-wise : seeking time-information superiority in networked warfare by David C Gompert( Book )

7 editions published in 2006 in English and held by 111 WorldCat member libraries worldwide

The capacity and means by which the American Armed Forces defend their nation are entering a paradigm-breaking transition period. Previous transitions have been driven by the technologies of weapons and their platforms. This is not so in the 21st century. Taking the information revolution as a starting point, Battle-Wise argues that only by strengthening the relationship between information technology and brain matter will the U.S. military enhance its ability to outsmart and outfight future adversaries. Our aim is to understand whether and how advantages in thinking and decisionmaking under operational conditions can affect outcomes victories or defeats especially in networked warfare. It is important to identify as precisely as possible the mental abilities, such as anticipation and rapid adaptation, that are of greatest utility in networked operations and thus in strategic competition so that these abilities can be emphasized in the ways that military personnel are recruited, taught, developed, and organized. The role of the mind in networked warfare is still unknown. This book is meant to raise ideas, issues, and possibilities, as well as at the risk of seeming presumptuous a potential framework
Information assurance : trends in vulnerabilities, threats, and technologies( Book )

4 editions published between 2004 and 2005 in English and held by 85 WorldCat member libraries worldwide

One of the missions of the Center for Technology and National Security Policy at National Defense University is to study the transformation of America's military and to explore the consequences of the information revolution. To further this mission, National Defense University, in collaboration with The Center for Public Policy and Private Enterprise of the University of Maryland's School of Public Affairs, brought together leaders in the fields of military and commercial technology. The purpose of the meeting was to gain insight into the risks and vulnerabilities inherent in the use of information technology on the battlefield and in military systems. This volume presents the results of that workshop. This volume examines threats and vulnerabilities in the following four areas: (1) physical attacks on critical information nodes; (2) electromagnetic attacks against ground, airborne, or space-based information assets; (3) cyber attacks against information systems; and (4) attacks and system failures made possible by the increased level of complexity inherent in the multiplicity of advanced systems. Chapters are as follows: "Trends in Vulnerabilities, Threats, and Technologies," by Jacques S. Gansler and William Lucyshyn; "Physical Vulnerabilities of Critical Information Systems," by Robert H. Anderson; "Physical Vulnerabilities Exposed at the National Training Center," by Colonel John D. Rosenberger; "Dealing with Physical Vulnerabilities," by Bruce W. MacDonald; "Vulnerabilities to Electromagnetic Attack of Defense Information Systems," by John M. Borky; "Vulnerabilities to Electromagnetic Attack of the Civil Infrastructure," by Donald C. Latham; "Trends in Cyber Vulnerabilities, Threats, and Countermeasures," by Michael A. Vatis; "Enhancing Cyber Security for the Warfighter," by Sean R. Finnegan; "Complexity of Network Centric Warfare," by Stanley B. Alterman; and "Difficulties with Network Centric Warfare," by Charles Perrow
Critical technology events in the development of the Apache helicopter : project Hindsight revisited by Richard Chait( Book )

5 editions published between 2005 and 2006 in English and held by 12 WorldCat member libraries worldwide

"We begin this paper by briefly reviewing a project that served as a source of inspiration for this study: Project Hindsight, a 1969 Defense Department (DOD) report. 2 Hindsight was an in-depth study sponsored by the Director of Defense Research and Engineering that provided some insights into the development of approximately 20 weapons systems across the DOD spectrum. Following the review of Hindsight, we present a short history of the events that led to the start of the Apache program. This is followed by a description of the methodology that we used to gather key data on the development of the Apache. The information that we have gathered is then broken out by topic area (Power System; Survivability and Structural Advances; Avionics, Fire Control, and Weapons; and Modeling and Simulation and other Enabling Methodologies) and presented in terms of Critical Technology Events (CTEs). CTEs are ideas, concepts, models, and analyses, including key technical and managerial decisions, that have had a major impact on the development of a specific weapons system. CTEs can occur at any point in the system's life cycle, from basic research, to advanced development, to testing and evaluation, to product improvements. CTEs can even relate to concepts that were developed but that ultimately were not incorporated into the weapons system. Also, they can originate anywhere, from in-house laboratories, to private industry, to academia. The final portion of the paper presents the concluding remarks and findings based on the CTEs that characterize the Apache helicopter's development."--Page [1]
Lessons of Abu Ghraib : understanding and preventing prisoner abuse in military operations by Paul T Bartone( Book )

2 editions published in 2008 in English and held by 11 WorldCat member libraries worldwide

The abuse of prisoners by U.S. soldiers at Abu Ghraib had broad struggle consequences, leading many people around the world to question the legitimacy of U.S. goals and activities in Iraq. This paper draws on extensive unclassified reports from multiple investigations that followed Abu Ghraib and applies key psychological as well as social-situational perspectives to develop a better grasp of the causative factors. From a psychological standpoint, most young adults are powerful inclined to behave in accord with the social conventions and pressures around them. Especially in ambiguous circumstances, then, it is important that standards of behavior be clear and explicit throughout all phases of an operation and that leaders at all levels represent and reinforce those standards
Organizing for national security : unification or coordination? by James M Keagle( Book )

2 editions published in 2007 in English and held by 10 WorldCat member libraries worldwide

Experience gained from the 9/11 attacks, combat in Iraq and Afghanistan, disaster assistance during and after Hurricane Katrina, and the ongoing war on terror provides the basis for amending our anachronistic national security structures and practices. Many analysts and officials have called for a second-generation version of the Goldwater-Nichols Department of Defense Reorganization Act of 1986 to address the array of organizational and management challenges that we face. Some argue that the new security environment requires even more fundamental change, similar to what was enacted after World War II. The principal legislation that emerged from that era was the National Security Act of 1947. Goldwater-Nichols aimed to fix inter-Service problems by streamlining the chain of command and promoting 'jointness' but did not fundamentally alter the structure of the U.S. military. These earlier efforts attempted to strike a balance between those who wanted to unite bureaucracies to improve efficiency (primarily resource considerations) and produce more effective outcomes and those who opposed potentially dangerous concentrations of power and desired to preserve their heart-and-soul missions (as well as congressional support for their strategic view and related combat systems and force structures). Today, the debate rages anew with the security of this nation dependent on the outcome. This paper explores two options for reorganization: unification and coordination. We investigate each against the backdrop of the two previous attempts at reorganization in the context of the Madisonian political culture that constitutes part of who we are as a nation. Finally, each option is judged against its ability to contribute to the development and implementation of the kinds of strategies and operations needed to wage the new kind of war and peace in the emerging global security environment
Policy analysis in national security affairs : new methods for a new era by Richard L Kugler( Book )

2 editions published in 2006 in English and held by 3 WorldCat member libraries worldwide

This book addresses how to conduct policy analysis in the field of national security, including foreign policy and defense strategy. It is a philosophical and conceptual book for helphing people think deeply, clearly, and insightfully about complex policy issues. This books reflects the viewpoint that the best policies normally come from efforts to synthesize competing camps by drawing upon the best of each of them and by combining them to forge a sensible whole. While this book is written to be reader-friendly, it aspires to in-depth scholarship
New directions in U.S. national security strategy, defense plans, and diplomacy : a review of official strategic documents by Richard L Kugler( Book )

2 editions published in 2011 in English and held by 1 WorldCat member library worldwide

moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.43 (from 0.30 for New direct ... to 0.59 for Defense ho ...)

Bio-inspired innovation and national security
Alternative Names
Center for Technology and National Security Policy

Center for Technology and National Security Policy (National Defense University)


CTNSP (Center for Technology and National Security Policy)

National defense university

National Defense University Center for Technology and National Security Policy

National defense university Washington, D.C. Center for technology and national security policy

National Defense University Washington, DC Center for Technology and National Security Policy

English (70)

Civilian surge : key to complex operationsPolicy analysis in national security affairs : new methods for a new era