WorldCat Identities

Joint Forces Staff College (U.S.). Joint Advanced Warfighting School

Overview
Works: 378 works in 500 publications in 1 language and 524 library holdings
Genres: Case studies  History 
Classifications: LD2646,
Publication Timeline
.
Most widely held works about Joint Forces Staff College (U.S.).
 
Most widely held works by Joint Forces Staff College (U.S.).
U.S. intelligence : compliance with the Intelligence Reform and Terrorism Prevention Act of 2004 and the 9/11 Commission Report recommendations by Cheryl A Harris( Book )

3 editions published in 2006 in English and held by 5 WorldCat member libraries worldwide

Cultural bias in the Intelligence Community (IC) continues to interfere with meeting the mandated requirements of the Intelligence Reform and Terrorism Prevention Act of 2004 and the recommendation of the 9/11 Commission Report due to continued "stovepipe" operations. By the nature of IC's design, it is secretive and operates behind the scenes. True intelligence reform entails opening this closed society to organizations that do not routinely interact with the IC. This aspect alone is a sharp deviation from the normal intelligence modus operandi that will have to shift from the current "need to know" mentality toward a "need to share" collaborative environment. The IC community is transforming in stride while simultaneously supporting the Global War on Terrorism. The establishment of the first Director of National Intelligence is a progressive step toward unifying the 16 organizations under one centralized management authority. The DNI must quickly establish and publish common tactics, techniques and procedures that will unite the IC's efforts in a collaborative work environment. Predictive analysis will enable the civilian leadership and military warfighters to formulate viable courses of action based on the fidelity of the intelligence collected as prioritized by the National Security Strategy. Change in the intelligence community will take time, but strong leadership coupled with clear guidance from the DNI will focus this diverse community and continue to push reform and transformation initiatives forward to build a strong, integrated coalition of intelligence professionals prepared to address an ambiguous global threat
Transforming the Department of State : adapting operational capacities and capabilities to the post-9/11 reality, evolving interagency responsibilities, and the challenges of the 21st century by William J Vancio( Book )

2 editions published in 2006 in English and held by 4 WorldCat member libraries worldwide

Despite the President's call for transformation of U.S. government security agencies in his 2002 National Security Strategy, the Department of State (DOS) lags behind many of the other elements of national power in that its capabilities and capacities remain much as they were prior to the 9/11 terrorist attacks. Seams and gaps in policy and operations are magnified during times of conflict. Most experts agree that future conflicts will be asymmetrical in nature, with such factors becoming more visible and noticeable than during peacetime. President Bush has indicated that the Global War on Terrorism (GWOT) will likely continue for a generation, so transformation of national security agencies is an urgent requirement. The Department of State's deficiencies are predominantly in the operational sector. Chronic shortfalls in budget, material resources, an inflexible personnel system, an antiquated organizational structure, and lack of a formal integrated planning process represent significant obstacles that must be overcome for the Department to carry out its operational mission. The overall national interest of the United States requires that these challenges be resolved or mitigated, and that the Department of State continue to represent a capable, relevant, and viable element of national power. The purpose of this study is to assess the transformation of the Department of State and determine if the proposed changes adequately address the initiatives and recommendations contained in the 2002 National Security Strategy and numerous government-sponsored and independent studies. Measured within the context of the post-9/11 security reality, both existing and emerging capabilities of the Department are contrasted against those in other sectors of the national security establishment. In particular, the author compares the capabilities and performance of the DOS in the stabilization and reconstruction phases of the conflicts in Afghanistan, Iraq, and the GWOT, and contrasts it with that of the DoD
Cyber as a "team sport" : operationalizing a whole-of-government approach to cyberspace by Elizabeth A Myers( Book )

3 editions published between 2011 and 2014 in English and Undetermined and held by 4 WorldCat member libraries worldwide

"Cyberspace and its associated operations present both opportunities and challenges for military and United States Government decision-makers and planners. The Pentagon has formally recognized cyberspace as a domain of warfare. Cyberspace is man-made, dynamic, and intrinsically linked to not only the Department of Defense (DoD) capabilities across the other four domains, but also to national, commercial and global capabilities and interests as well. The implications for cyberspace, its defense and freedom of operations within, extend well beyond DoD's, and even the U.S. Government's span of control and influence. Increasingly, foreign influence and threats are shaping the cyber battlefield. In order to effectively navigate the complexities posed by cyberspace and ensure that the United States gains and maintains strategic advantage in the future battlefield using cyberspace operations, a whole-of-government approach is required. The United States will need to leverage the unique capabilities of the various actors across the diplomatic, information, military, economic, financial, intelligence, and law enforcement (DIMEFIL) spectrum to successfully defend against the asymmetric threats posed in cyberspace while ensuring freedom of action within the domain. This thesis examines the current strategic guidance, organizational framework, governance, and responsibilities associated with cyberspace operations. It identifies the issues and challenges currently facing the U.S. in operationalizing a whole-of-government approach to defending and operating in the cyberspace domain. Finally, this paper presents recommendations for improvements in the implementation and operationalization of a whole-of-government approach to cyberspace operations."--Abstract
China's energy security and its military modernization efforts : how China plans to dominate the world by Christopher J Larson( Book )

3 editions published in 2007 in English and held by 4 WorldCat member libraries worldwide

"This report examines China's increasing demand for energy and how that demand has the potential to threaten the stability of China's Communist Party regime. It illustrates that China's demand for energy will continue to grow and that China will become increasingly reliant on oil imports to meet its energy needs. This reliance on oil imports has forced China, in the short term to adopt an energy security strategy that seeks to protect its access to oil by adopting a non-threatening military posture complemented by use of its economic bargaining power. At the same, China has adopted a long range strategy, that runs side-by-side with the short-term strategy, of "Bide our time and build up our capabilities." This long-term strategy consists of a "String of Pearls" approach to gain the necessary forward bases to secure its energy lifeline and the development of asymmetric military capabilities. The ultimate goal of this long-term strategy is to develop sufficient military capability to challenge the West and achieve great power status."--Abstract
Let slip the dogs of (cyber) war : progressing towards a warfighting U.S. cyber command by Laurie A Mulford( )

2 editions published in 2013 in English and held by 3 WorldCat member libraries worldwide

"Since late 2009, most offensive cyber capabilities have been unavailable to the Joint Force Commander. Outside of the boundaries of a theater of war, offensive cyber activities are limited to those in response to Presidential direction only. This limitation is a result of competing interests within the U.S. Government for control of cyberspace as an operational domain. The competition is currently being played out through an artificial legal debate over authorities and terminology. To remove some of the subjectivity associated with the debate over cyberspace control, the author first engages in a plain language review of Congressional oversight pertaining to covert actions versus military special operations. Given the current attempts to apply this construct to cyberspace, what follows is analysis and explanation of why this approach is inappropriate for cyberspace as a domain of war. Finally, the author provides recommendations to enable a fully functional U.S. Cyber Command through executive policy, legislation, and extensive education and training for the Department of Defense workforce on cyberspace. In doing so, offensive cyber capabilities will once again be available for incorporation within campaign and contingency plans in support of the assigned mission."--Abstract
Afghanistan : a war that must be won via the concentration of United States elements of national power by James E Kraft( Book )

2 editions published in 2008 in English and held by 3 WorldCat member libraries worldwide

Heroic amateurs : the U.S. military in stability operations by C. Scott Leith( Book )

2 editions published in 2006 in English and held by 3 WorldCat member libraries worldwide

"With the importance of unstable regions now raised to the level of a peer competitor by our National Security Strategy and the task of DoDD 3000.05 to assume stability operations as a core mission, serious study and change to our military must occur. The first effort must be made in treating the subject appropriately in joint doctrine. The concept must be framed in a way that ideas can be associated precisely for further study and so that optimal organization, equipping, and training may be pursued. The assets required for successful stability operations cover the spectrum. The largest requirement generally for a stability operation will be security. Current formation can compel a basic security but fall short of that created by a police force. The combat formation can handle a heavily armed threat, but not the threat of criminal activity that is essential to the target nation population. If the force does not get larger, the current units must assume a wider range of skills. Other non-traditional military skills must be added to the force to assist in fostering national governance in failed states. The military education and training process has proven to be extremely agile, but it is currently held back by the lack of doctrine and the hesitance to optimize organizations to best handle stability operations. Until the issues are solved the military personnel employed in stability operations will continue to be heroic amateurs."--Abstract
The evolution of the joint ATO cycle by Robert P Winkler( Book )

2 editions published in 2006 in English and held by 3 WorldCat member libraries worldwide

"This study presents a historical look at the evolution of planning and conducting air operations to meet operational and strategic objectives of the combatant commander. It investigates how airpower was utilized to meet Theater Strategic campaign objectives since the birth of military aviation. The paper shows that the command and control process in current Joint Doctrine evolved over time to with particular attention paid to meeting the land component objectives using AirLand battle doctrine. The current Air Tasking Order (ATO) cycle is the result of continuous change throughout airpower's short history. The change process strived to meet the operational needs of the combatant commander and to achieve political goals of the U.S. Air Force. Ultimately, the time driven/current ATO cycle has become a relic of the Cold War and does not capitalize on the flexibility of airpower. This paper demonstrates that rather than devoting time and resources to restructure the planning process, doctrine has institutionalized new roles and missions, like Time Sensitive Targeting in order to circumvent the entrenched process of the Air Tasking Cycle. The paper concludes with a critical analysis of current Joint Doctrine from air apportionment to execution and offers some recommendations for significant improvement."--Abstract
Applying realism theory in Afghanistan by Michael E Samples( )

2 editions published in 2011 in English and held by 3 WorldCat member libraries worldwide

"Shortly after the attacks of 11 September 2001, President George W. Bush initiated the war in Afghanistan and ordered strikes against al Qaeda terrorist training camps and military installations of the Taliban regime. During the last nine years, both the Bush Administration and the Obama Administration adjusted and modified the Afghanistan strategy in order to meet changing national strategic objectives. Most recently the Obama administration, following a nine month strategy review, announced in March 2009 a new overarching AfPak strategy, and in December of 2009 announced a renewed Afghanistan strategy. These strategies are now being executed with the following objectives: 'to disrupt, dismantle, and defeat al Qaeda, ' 'to degrade the Taliban, ' 'to prevent their return, ' and to transition to Afghan government and security force lead by July 2011. One year after President Obama's December 2009 West Point speech, are the policy, strategy, and objectives for Afghanistan in the United States' vital national interests? Utilizing the Realism Theories of Hans J. Morgenthau as a comparative model, this thesis will demonstrate that the current United States national policy, strategy, and objectives for Afghanistan meet the principles of Realism Theory, support U.S. vital national security interests, and are achievable."--Abstract
The U.S. freedom agenda in the Middle East by Neil J Makepeace( Book )

2 editions published in 2007 in English and held by 3 WorldCat member libraries worldwide

"The Bush Administration's foreign policy has comprised three key components: security through forward defence; a black-andwhite view of the post-9/1 1 world; and, most pervasively, the so-called freedom agenda. These elements combine in an approach that many see as imperious and detached from on-the-ground realities. The thesis of this paper is that the United States requires a more balanced and realistic policy agenda in the Middle East, which discards the strident promotion of constitutional democracy in favour of a less imperious approach based on values that are meaningful to Middle Eastern people and societies. Revised U.S. policies and supporting strategies should reflect the complex and volatile relationship between the Western and Islamic worlds. Some analyses suggest that their clash is inevitable, while others offer hope for an "alliance of civilizations." Such an alliance would require a concerted effort to reconcile Westem and Islamic ideologies, which do not appear to be wholly incompatible. The United States and her allies must seek, through their policies and actions in the Middle East, to empower Muslims who advocate moderate interpretations of the Islamic texts. Radical Islamists and so-called jihadi fighters must be denied theological credibility. The U.S. agenda in the Middle East should also attempt to empower moderate and liberalizing political influences in the region. Middle Eastern regimes occupy a broad spectrum and many are undertaking cautious programmes of liberalization. Political Islam is an increasingly important feature of this social and political landscape. Islamist political parties should be encouraged to operate in the mainstream of politics and to exert moderating influences over their followers. Thus, the United States should discard her strident promotion of constitutional democracy in favour of more carefully focused encouragement of social, economic and political reform in the Middle East. The paper offers a set of 16 recommendations that represent a more realistic and balanced agenda in the Middle East."--Abstract
The Wrong Target: The Problem of Mistargeting Resulting in Fratricide and Civilian Casualties by Robert E Rasmussen( Book )

2 editions published in 2007 in English and held by 3 WorldCat member libraries worldwide

"Despite a considerable effort since Operation Desert Storm. the Services have yet to reduce the likelihood of mistargeting - the engagement of friendly forces and noncombatants by friendly fire. Mistargeting has always occurred but has historically received little scrutiny. The numbers of mistargeting casualties have gone down dramatically, but the rate has gone up since World War II. When tactical mistargeting occurs today. the effects can be enormous and are increasing, particularly given modern global media. There are thousands of U.S. military entities that potentially require Combat Identification (CID), plus coalition partners and neutrals. CID of aircraft and ships has historically reccived proportionally more attention compared to ground units, which suffer the greatest cost of mistargeting. Despite impressive technological advances, there is currently no universal system for positive identification of friendly forces or hostile tars. U.S. and coalition forces have an increasing; reliance on the accuracy of information to locate and positively identify targets. Aircraft are more dependent on external sources for precise targeting data, and weapons are increasingly being dropped "on coordinates" provided by off board sensors and sources, increasing the risk of mistargeting. Modern precision weapon capabilities have outpaced the military's ability to differentiate positively between friend. neutral, and foe, and to locate desired targets precisely. Mistargeting is not a crisis, but a serious, long-term. Joint approach to allow aircrew to distinguish enemy from friendlies and non-combatants is possible and must be pursued."--Abstract
A maritime approach to countering Horn of Africa piracy by Ronald W Toland( )

2 editions published in 2012 in English and held by 3 WorldCat member libraries worldwide

"Piracy in the waters off the Horn of Africa (HOA) has become a multi-million dollar venture annually for modern day pirates because vessel ownership groups continue to pay ransoms. The seizing of cargo ships and ransom demands have harmful economic impacts to companies and countries. Piracy operations directly threaten U.S. interests and citizens, as displayed during a recent kidnap for ransom action that led to the deaths of four Americans. In addition, piracy affects global trade. Despite significant multinational counter piracy efforts, which has included U.S. agencies and military forces, merchant vessels continue to be pirated regularly. Piracy off the coast of Somalia exists largely because Somalia is a failed state with little to no rule of law or domestic law enforcement capability. The economic situation of the people living in Somalia is dire. A lack of viable employment opportunities, a shortage of arable land, continuing drought, and increasing competition from other nations fishing off the coast, have all affected the standard of living. The conventional wisdom is that the solution lies ashore; meaning the establishment of good governance and economic development in Somalia, but the international community has displayed no interest to engage in nation building. This thesis will describe the challenges and ineffectiveness of current multi-national counter piracy operations and discuss how the international community can best combat piracy in the HOA region from a maritime perspective. By reviewing how states have historically responded to piracy and examining international legal approaches, the author will propose a multi-tiered coalition-based naval force solution, which uses all the traditional advantages of naval power to eliminate piracy without resorting to nation building."--Abstract
Saving the world for democracy : an historical analysis of America's grand strategy in the 21st century by J.A Bassani( Book )

2 editions published in 2005 in English and held by 2 WorldCat member libraries worldwide

"This study looks at three separate and distinct historical examples of grand strategy: The post-Republican Era of the Roman Empire, the rise of the Mongol Empire under Genghis Kahn, and Great Britain after the defeat of the Spanish Armada and the wars of Spanish Succession. From these examples, we see the common threads that run through all grand strategies and the different approaches that nations take in pursuing their national interests. Next, it examines the American experience with the emergence of the so-called Monroe Doctrine (America's first grand strategy), the move toward multilateralism as a result of the Second World War, and America's 21st Century grand strategy that emerged post-9/11. Lastly, I discuss the conflict between America's values and her national interests and the implications for America's future at the end of the Century."--Abstract
Shift focus on the Al Qaeda Network : a more comprehensive approach to defeating Al Qaeda by Don Wetherbee( Book )

2 editions published in 2012 in English and held by 2 WorldCat member libraries worldwide

"The Al Qaeda Network is a global insurgency; however, the United States and much of the western world continue to identify it as a 'global terrorist organization.' This improper label misleads leaders in the development of effective strategic and operational level plans. As a result, the national strategy and operational approach are not properly focused. The nation must recognize Al Qaeda as a global insurgency and adjust both the national strategy and the accompanying operational approach accordingly. The country has failed to adhere to one of Clausewitz's first maxims; it has not properly defined the war in which it is involved. To accomplish the goal of defeating Al Qaeda and its associated movements, the U.S. strategy towards them must change from a counterterrorism-centric to a counterinsurgency-centric approach. Terrorism is a tactic, not a strategy. So who or what is the nation fighting? Why? And how should they be doing it? By ignoring the fact that the Al Qaeda Network is a global insurgency using terrorist tactics, the U.S. limits its ability to develop a holistic solution to defeat and destroy, rather than simply disrupt, the network. The nation must adopt a new approach centered on indirect methods, a focus on Al Qaeda's ideology, aggressive diplomacy, increased diplomatic and developmental capacity, and a clear comprehensive strategy to support all of it. This paper defines the nature of Al Qaeda, assesses the drawbacks of the current strategy, and recommends methods to improve the United States' approach to defeating Al Qaeda."--Abstract
Taking the guesswork out of strategy by Clarence W Lukes( )

2 editions published in 2011 in English and held by 2 WorldCat member libraries worldwide

"Formulating strategy at the strategic level requires a comprehensive approach that identifies key strategic factors essential to success. History has shown how a lesser disciplined approach becomes overwhelmed and leads to faulty strategy. An appraisal process and more specifically, Dr. Harry Yarger's Strategic Appraisal Process, provides a framework that effectively distills from the strategic environment, the key strategic factors guiding strategy among nation states. The Strategic Appraisal Process is the framework applied against U.S.-African strategic relations to guide the national security professional through its implementation and provides valuable U.S. policy and strategy formulation insights. The analysis concludes with recommendations affecting the U.S. regional interests in Africa encompassing: China's growing influence in Africa, the valiant effort to prevent piracy along African coasts, empowering and holding accountable young democracies in Sub-Saharan Africa, developing a shared responsibility of eradicating violent extremism, and the effects of funding HIV/AIDS in Africa."--DTIC Abstract
Developing a Whole-of-Government Approach to Complex Problems by Andrew Burton( Book )

2 editions published in 2007 in English and held by 2 WorldCat member libraries worldwide

National security policy objectives, both in the US and the UK, will be met more effectively and efficiently if a truly cross-governmental approach to complex operations is developed and implemented. At the strategic level, failure by the US to achieve adequate unity of effort was one cause of the failure to produce an adequate plan for the post-combat phase of Operation Iraqi Freedom. At the operational level, an imbalance in resources between the military and other departments results in the situation that only the military are capable of taking effective action. A top-down solution that modifies the current Unified Command Plan to allow for the formation of whole-of-government operational level commands in lieu of military COCOMs (or PJHQ) is required. A review of the whole of the national security architecture, that redefines roles and missions, and allocates resources, is required to support the change
Response to a Chemical Incident or Accident -- Who Is In Charge? by Darryl J Briggs( Book )

2 editions published in 2007 in English and held by 2 WorldCat member libraries worldwide

"This paper explores and recommends a new strategy in the response to a chemical accident. The thesis of this paper is: Combatant Commanders and the Services must have specific guidance and appropriate authorities to be able to effectively manage a Chemical Accident and Incident Response and Assistance (CAIRA) at a chemical stockpile site. To support the assertion, this paper will explore three separate organizations: Department of Army, Chemical Stockpile Emergency Preparedness Program, and the Department of Homeland Security. In each one of these organizations, the background, authority, current policy and procedures, and other topics are discussed and analyzed. Following the research and analysis, this paper provides some recommendations, a "way," to possibly improve the preparedness and response to an event at a chemical stockpile site."--Abstract
Reorganizing Geographic Combatant Command Headquarter for Joint Force 2020 by Rhude Cherry( )

2 editions published in 2013 in English and held by 2 WorldCat member libraries worldwide

"As the United States' strategic defense priorities change, our Geographic Combatant Command Headquarters (GCCM HQ) must evolve to address these and other issues. The Geographic Combatant Command Headquarters' staff must holistically reorganize to meet strategic needs of the 21st century Joint Force. This study provides an academic and historical review of organization theory and constructs that end in a recommendation for all six GCCM HQs. Three ways to meet these requirements are: 1) staff efficiencies realized through organizational construct that provide greater flexibility; 2) inclusion of relevant interagencies and multinational participation in GCCM efforts; and 3) establishment of standardized staff positions that provide seamless synchronization of global efforts. Two case studies provide insight into how organizational structures evolve due to leadership changes, environmental dynamics, and strategic shifts. Keys to the recommended structure are Geographic Combatant Commander (GCC) span-of-control, structural hierarchy, external environment impacts on operations, the inclusion of interagencies and multi-national efforts within the staff and the various national and Combatant Command (COCOM) strategic interests."--Abstract (p. iii)
Boom or bust : Britain's nuclear deterrent beyond 2025 by Timothy C Green( Book )

2 editions published in 2012 in English and held by 2 WorldCat member libraries worldwide

"Britain's submarine launched nuclear deterrent is due to go out of service by 2025. The Ministry of Defense needs to make severe cuts to its already shrinking budget. The 2016 decision to replace the deterrent submarines will cost a 25 billion pound sum that is currently unallocated. The Conservative and Liberal parties within Britain's coalition government have opposing views on nuclear weapons. Contemporary global threats are ambiguous and, finally, Britain's only nuclear submarine base in Scotland is in jeopardy from an anti-nuclear Scottish government striding towards Scottish independence. Britain must take a positive action and soon if it is to guarantee a nuclear deterrent into the middle of this century."--Abstract
Making sense of irregular warfare, irregular challenges and the related role of the submarine force by Michael T Kubiniec( )

2 editions published in 2011 in English and held by 2 WorldCat member libraries worldwide

"Current National, Department of Defense and U.S. Navy strategies place as much emphasis on preventing conflict as they do on winning them. Failing and unstable countries and regions around the world foster an environment for broad irregular warfare challenges that include insurgents, violent extremists and criminals and others who pose a threat to U.S. national interests and global security. Countering these irregular challenges in and from the maritime domain is the Navy's espoused prioritized approach which concentrates on preventing, limiting, and eliminating those contributing factors which lead to regional instability, insurgency, crime and a base for violent extremism. The submarine, with an ability to provide persistent and sustained at-sea operations, is a unique multi-mission, high demand Navy resource, available to contribute to joint efforts to counter irregular threats. The submarine force should develop a comprehensive strategy for optimizing its contribution to the joint force in confronting irregular challenges as well as traditional or conventional threat approaches."--Abstract
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.53 (from 0.38 for Taking the ... to 0.76 for Boom or bu ...)

Alternative Names
Joint Forces Staff College (U.S.). JAWS

Languages
English (44)