WorldCat Identities

National Defense University Center for Technology and National Security Policy

Overview
Works: 246 works in 545 publications in 1 language and 54,388 library holdings
Genres: Conference papers and proceedings  Periodicals 
Roles: Publisher, Publishing director, Other
Classifications: UA23, 355.033573
Publication Timeline
.
Most widely held works by National Defense University
Bio-inspired innovation and national security by Robert E Armstrong( )

7 editions published in 2010 in English and held by 1,001 WorldCat member libraries worldwide

From the Introduction: This volume is designed as an overview of the many applications of biology to the military and national security writ large (with the exception of bioweapons and biomedicine). Policy issues are covered, and original research is presented. The diversity of the authors' backgrounds reflects the breadth of applications and opportunities of biology to modern problems. The read should walk away enlightened as to the many possible ways in which biology is influencing and will continue to influence national security. Authors were asked to provede foresight on trends and indicators in their areas of interest (but not forecasts, which would describe a single future state) in order to better understand their implications for the next 20 years or so
Battle-wise : seeking time-information superiority in networked warfare by David C Gompert( )

8 editions published in 2006 in English and held by 677 WorldCat member libraries worldwide

The capacity and means by which the American Armed Forces defend their nation are entering a paradigm-breaking transition period. Previous transitions have been driven by the technologies of weapons and their platforms. This is not so in the 21st century. Taking the information revolution as a starting point, Battle-Wise argues that only by strengthening the relationship between information technology and brain matter will the U.S. military enhance its ability to outsmart and outfight future adversaries. Our aim is to understand whether and how advantages in thinking and decisionmaking under operational conditions can affect outcomes victories or defeats especially in networked warfare. It is important to identify as precisely as possible the mental abilities, such as anticipation and rapid adaptation, that are of greatest utility in networked operations and thus in strategic competition so that these abilities can be emphasized in the ways that military personnel are recruited, taught, developed, and organized. The role of the mind in networked warfare is still unknown. This book is meant to raise ideas, issues, and possibilities, as well as at the risk of seeming presumptuous a potential framework
New directions in U.S. national security strategy, defense plans, and diplomacy : an official studies blueprint by Richard L Kugler( )

4 editions published in 2011 in English and held by 617 WorldCat member libraries worldwide

"Where are U.S. national security strategy, defense plans, and diplomacy headed in the coming years? An answer to this important question comes from seven official studies that have been issued during 2010 ... This work addresses each of these seven studies individually in sequential order. In each case, it endeavors to summarize the main features of the study and to evaluate its contents. At the end, this book examines how these studies interlock to form an overall blueprint, identifies lingering issues that call for further analysis, and offers constructive ideas for further research and analyses"--Page xi-xii
The 71F advantage : applying Army research psychology for health and performance gains( Book )

3 editions published in 2010 in English and held by 609 WorldCat member libraries worldwide

From the back cover: This book, which grew out of an Army research psychology conference, is the first of its kind, intended to provide a comprehensive overview of what Army research psychologists do. Chapters cover the diverse activity areas of 71Fs, from the neurophysiology of sleep, to traumatic brain injury, to leadership and organizational process, as well as several personal and historical accounts. Army research psychologists are making a difference. Through their research, 71Fs provide leaders with new insights and tools for increasing the health and performance of military personnel. This is the "71F Advantage."
Policing and COIN operations : lessons learned, strategies, and future directions by Samuel Musa( )

5 editions published between 2011 and 2012 in English and held by 572 WorldCat member libraries worldwide

Summaries of sessions from a workshop held on September 29, 2010, co-sponsored by the Center for Technology and National Security Policy (CTNSP) of the National Defense University (NDU) and the Combating Terrorism Technical Support Office (CTTSO) of the Threat Support Working Group (TSWG) of the Department of Defense. The workshop was focused on lessons learned from past campaigns, development of new strategies, and outlining future directions for implementation
Capability development in support of comprehensive approaches : transforming international civil-military interactions by International Transformation Conference( Book )

3 editions published in 2011 in English and held by 549 WorldCat member libraries worldwide

"This book includes papers presented at the Second International Transformation (ITX2) Conference, held in Rome, Italy, at the NATO Defense College (NDC) June 21-23, 2011, as well as a summary of the conference discussions. Co-hosted by NDC, Allied Command Transformation (ACT), and the International Transformation (ITX) Chairs Network, the conference brought together academics, policymakers, and practitioners from 13 nations to discuss the topic of 'Capability Development in Support of Comprehensive Approaches: Transforming International Civil-Military Interactions'"--Page vii
Changing mindsets to transform security : leader development for an unpredictable and complex world by International Transformation Conference( Book )

2 editions published in 2013 in English and held by 530 WorldCat member libraries worldwide

"This book is a compilation of papers and discussions from the Third International Transformation Conference and Workshop on Leader Development in Washington, DC, on June 19-20, 2013. The event was sponsored by the NATO Headquarters Supreme Allied Commander Transformation, hosted at the National Defense University, and supported by the International Transformation Chairs Network."--Page [4] of cover
Information assurance : trends in vulnerabilities, threats, and technologies( )

5 editions published between 2004 and 2005 in English and held by 388 WorldCat member libraries worldwide

One of the missions of the Center for Technology and National Security Policy at National Defense University is to study the transformation of America's military and to explore the consequences of the information revolution. To further this mission, National Defense University, in collaboration with The Center for Public Policy and Private Enterprise of the University of Maryland's School of Public Affairs, brought together leaders in the fields of military and commercial technology. The purpose of the meeting was to gain insight into the risks and vulnerabilities inherent in the use of information technology on the battlefield and in military systems. This volume presents the results of that workshop. This volume examines threats and vulnerabilities in the following four areas: (1) physical attacks on critical information nodes; (2) electromagnetic attacks against ground, airborne, or space-based information assets; (3) cyber attacks against information systems; and (4) attacks and system failures made possible by the increased level of complexity inherent in the multiplicity of advanced systems. Chapters are as follows: "Trends in Vulnerabilities, Threats, and Technologies," by Jacques S. Gansler and William Lucyshyn; "Physical Vulnerabilities of Critical Information Systems," by Robert H. Anderson; "Physical Vulnerabilities Exposed at the National Training Center," by Colonel John D. Rosenberger; "Dealing with Physical Vulnerabilities," by Bruce W. MacDonald; "Vulnerabilities to Electromagnetic Attack of Defense Information Systems," by John M. Borky; "Vulnerabilities to Electromagnetic Attack of the Civil Infrastructure," by Donald C. Latham; "Trends in Cyber Vulnerabilities, Threats, and Countermeasures," by Michael A. Vatis; "Enhancing Cyber Security for the Warfighter," by Sean R. Finnegan; "Complexity of Network Centric Warfare," by Stanley B. Alterman; and "Difficulties with Network Centric Warfare," by Charles Perrow
Transforming for stabilization and reconstruction operations( )

7 editions published between 2003 and 2006 in English and held by 388 WorldCat member libraries worldwide

Recent military operations in Afghanistan and Iraq were characterized by the rapid defeat of enemy military forces, by relatively small deployments of American forces, and by a very limited destruction of the critical civilian infrastructure. This success can be credited in large part to the ongoing transformation of the U.S. military evident in its effective use of information superiority, precision strike, and rapid maneuver on the battlefield. The Armed Forces were not nearly as well prepared to respond promptly to the lawlessness, destruction of the civilian infrastructure, and attacks on coalition forces that followed hard on the defeat of the Iraqi military. This has set back plans to restore essential services and to pass the reins to a representative Iraqi government. Moreover, the failure to establish security concurrently with the defeat of the Iraqi military may well have emboldened those who oppose the United States, United Kingdom, and even United Nations presence. It is precisely the success of the U.S. military in transforming its forces to execute rapid decisive operations that makes it imperative to transform how it prepares for and executes stabilization and reconstruction (S & R) operations. The very rapid defeat of the enemy military means the United States must be ready to field the resources needed to secure stability and begin the reconstruction process promptly-ideally concurrently-with the end of major combat. This can only be done if planning for the stabilization and reconstruction operations is integrated into planning for the conflict from the beginning and if the right skills are in theater to begin operations concurrently with the surrender or collapse of the enemy military
Defense horizons : a publication of the Center for Technology and National Security Policy, National Defense University( )

in English and No Linguistic content and held by 359 WorldCat member libraries worldwide

Civilian surge : key to complex operations( Book )

3 editions published in 2009 in English and held by 339 WorldCat member libraries worldwide

Examines the national need for assistance and quick response to military personnel from civilian resources for stabilization and reconstruction operations. Concludes with the efforts to build a civilian response capacity for complex operations are incomplete and require further attention
Catastrophic bioterrorism : what is to be done? by Richard Danzig( Book )

2 editions published in 2003 in English and held by 333 WorldCat member libraries worldwide

Strategic shift : appraising recent changes in U.S. defense plans and priorities by Richard L Kugler( Book )

2 editions published in 2013 in English and held by 290 WorldCat member libraries worldwide

This study examines important changes in U.S. defense planning unveiled by the Department of Defense (DOD) during 2012 and early 2013. Through a series of strategic and operational documents DOD has put forth an interlocking set of changes that placed greater emphasis on the Asia-Pacific and Middle East regions, created a new force-sizing construct, adopted new operational concepts, trimmed the U.S. force structure and defense budget, and called for enhanced cooperation with global partners. These strategies and concepts were developed under to the levels of the FY13 Defense budget submission and are carried forth in the FY14 Defense budget submission. This study describes these changes, evaluates them, and addresses the challenges of implementation. In particular, it recommends that DOD 'double down' in its pursuit of globally integrated operations through joint force integration in the context of the Capstone Concept for Joint Operations and the cross-domain synergy needed to operate effectively in the face of sophisticated adversaries. These are likely to be important in any strategic context. This study's conclusions and recommendations are not altered by DOD's budget request in FY14, though effective implementation will be more challenging
Lessons of Abu Ghraib : understanding and preventing prisoner abuse in military operations by Paul T Bartone( )

2 editions published in 2008 in English and held by 285 WorldCat member libraries worldwide

The abuse of prisoners by U.S. soldiers at Abu Ghraib had broad struggle consequences, leading many people around the world to question the legitimacy of U.S. goals and activities in Iraq. This paper draws on extensive unclassified reports from multiple investigations that followed Abu Ghraib and applies key psychological as well as social-situational perspectives to develop a better grasp of the causative factors. From a psychological standpoint, most young adults are powerful inclined to behave in accord with the social conventions and pressures around them. Especially in ambiguous circumstances, then, it is important that standards of behavior be clear and explicit throughout all phases of an operation and that leaders at all levels represent and reinforce those standards
Army science and technology analysis for stabilization and reconstruction operations by Richard Chait( )

4 editions published in 2006 in English and held by 284 WorldCat member libraries worldwide

Examines capability gaps and science and technology needs of the Army to facilitate post-conflict reconstruction and stabilization operations
The bug stops here : force protection and emerging infectious diseases by Donald F Thompson( )

3 editions published in 2005 in English and held by 282 WorldCat member libraries worldwide

Addresses the issue of force protection as it relates to epidemics, using lessons learned from past disease outbreaks as guidance for mitigating future epidemics
Organizing for national security : unification or coordination? by James M Keagle( )

2 editions published in 2007 in English and held by 279 WorldCat member libraries worldwide

Experience gained from the 9/11 attacks, combat in Iraq and Afghanistan, disaster assistance during and after Hurricane Katrina, and the ongoing war on terror provides the basis for amending our anachronistic national security structures and practices. Many analysts and officials have called for a second-generation version of the Goldwater-Nichols Department of Defense Reorganization Act of 1986 to address the array of organizational and management challenges that we face. Some argue that the new security environment requires even more fundamental change, similar to what was enacted after World War II. The principal legislation that emerged from that era was the National Security Act of 1947. Goldwater-Nichols aimed to fix inter-Service problems by streamlining the chain of command and promoting 'jointness' but did not fundamentally alter the structure of the U.S. military. These earlier efforts attempted to strike a balance between those who wanted to unite bureaucracies to improve efficiency (primarily resource considerations) and produce more effective outcomes and those who opposed potentially dangerous concentrations of power and desired to preserve their heart-and-soul missions (as well as congressional support for their strategic view and related combat systems and force structures). Today, the debate rages anew with the security of this nation dependent on the outcome. This paper explores two options for reorganization: unification and coordination. We investigate each against the backdrop of the two previous attempts at reorganization in the context of the Madisonian political culture that constitutes part of who we are as a nation. Finally, each option is judged against its ability to contribute to the development and implementation of the kinds of strategies and operations needed to wage the new kind of war and peace in the emerging global security environment
Moore's law : a Department of Defense perspective by Gerald M Borsuk( )

2 editions published in 2003 in English and held by 278 WorldCat member libraries worldwide

From Sputnik to Minerva : education and American national security by Sean Kay( )

2 editions published in 2009 in English and held by 277 WorldCat member libraries worldwide

This paper examines how external challenges have prompted national investments in education to enhance American national security. Rather than focusing primarily on traditional professional military education, this analysis examines how education has been used as a tool of American power. Four major moments of transformation in the international system are surveyed to illustrate a link between strategic educational capacity, defined as the application of attained knowledge and skills, and national power. The study then assesses how education is used as a power asset in the contemporary security environment. Today, an important educational capacity is emerging in the new Minerva program in the Department of Defense and other transformational educational concepts with security applications. Education is gaining an increasing interest among American decisionmakers as a strategic component of American power and an essential asset for successful military operations in the new global security environment
Policy analysis in national security affairs : new methods for a new era by Richard L Kugler( )

2 editions published in 2006 in English and held by 276 WorldCat member libraries worldwide

This book addresses how to conduct policy analysis in the field of national security, including foreign policy and defense strategy. It is a philosophical and conceptual book for helphing people think deeply, clearly, and insightfully about complex policy issues. This books reflects the viewpoint that the best policies normally come from efforts to synthesize competing camps by drawing upon the best of each of them and by combining them to forge a sensible whole. While this book is written to be reader-friendly, it aspires to in-depth scholarship
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.42 (from 0.31 for Bio-inspir ... to 0.60 for Defense ho ...)

Bio-inspired innovation and national security
Covers
Civilian surge : key to complex operationsPolicy analysis in national security affairs : new methods for a new era
Alternative Names
Center for Technology and National Security Policy

Center for Technology and National Security Policy (National Defense University)

CTNSP

CTNSP (Center for Technology and National Security Policy)

CTNSP (National Defense University. Center for Technology and National Security Policy)

National defense university

National Defense University Center for Technology and National Security Policy

National defense university Washington, D.C. Center for technology and national security policy

National Defense University Washington, DC Center for Technology and National Security Policy

Languages
English (75)