...720th Special Tactics Strategic Analysis The 720 Special Tactics Group Strategic Analysis Strategic Planning OM 5040 Table of Contents Abstract 3 Introduction 4 Background 4 History 7 Organization 11 Mission statement 13 Mission 13 Mission Task 13 Vision statement analysis 15 Strategic management Application 17 Value Chain 18 Primary Activities 18 Support Activities 19 Translating...
Words: 4997 - Pages: 20
...a world of ever-increasing dependence on technology and the vast amount of information that is available, it is important to look at how this dependence will shape war in the future. P.W. Singer and August Cole present how this might look in the book Ghost Fleet: A Novel of the Next World War. Set in the near future the novel sets a hypothetical scenario that puts the United States at war with China and Russia. The initial conflict is a dramatic loss for America and an eye opener of the over reliance on digital systems, which begs the question, what do we do when the very systems we rely on are used against us? In my reading of the novel, I observed several key takeaways that I believe have great value in successfully fighting future wars and on growth as leaders. This review will discuss three main ideas that were present throughout the book and how to apply them to the present, as well as, mitigate them in the future. Part One will discuss how the authors build a view of technological dependence and how it impacts the conflict within the book. In this part, I will...
Words: 1244 - Pages: 5
...INTRODUCTION TO AIR DEFENCE ARTILLERY (ADA) INTRODUCTION 1. In the modern battlefield, air power is considered as a significant component of warfare. In modern war the first phase of air battle starts with the massive air attack to gain air superiority and the subsequent phase of attack will commence against the manoeuvre forces and their supporting elements. The aim of the second phase of attack would be to shape the battle field by isolating and reducing the ability of manoeuvre forces for ground campaign with minimum casualties. Gulf War is a practical demonstration of this prophecy where defences were ruined, command posts knocked out, communications disrupted, and supplies destroyed by the air action. In the future battlefield, our army is also likely to operate against a foe that will remain superior in terms of technology and resources, mostly in the air power. Therefore, the survival of our army components on the face of adversary’s air superiority has been a serious concern for our ground force commander 2. To protect and preserve sovereignty and integrity of a small state like ours, particularly with limited resources, AD ranks one of the top most priorities. Even if the resources are managed, the inadequacy of country’s depth and the location of enemy air bases will certainly reduce the effectiveness of the Interceptor fighters, as these would get less response time. Therefore, more and more dependency on ADA forces is a viable option because these are comparatively...
Words: 6511 - Pages: 27
...Chapter 4 RSOI An expeditionary Army depends on its ability to project combat power where needed. The process of reception, staging, onward movement, and integration is designed to rapidly combine and integrate arriving elements of personnel, equipment, and materiel into combat power that can be employed by the CCDR. This chapter discusses the segments of RSOI. Overview 4-1. The purpose of RSOI is to build the combat power necessary to support the CCDR's concept of operation. Force closure is that point which the combatant commander determines that an adequate combat-ready force is available. Force closure requires well-defined criteria by which unit commanders can measure their readiness. Assessment of combat power begins with established standards for readiness and is based on unit capability, rather than simple tallies of vehicles and weapon systems on hand. Readiness and reporting are inherently operational matters, normally handled through operations channels. Segments of RSOI 4-2. RSOI operations are necessary for commanders to build combat power. The four segments of RSOI are— Reception. Unloading personnel and equipment from strategic transport assets, managing port marshalling areas, transporting personnel, equipment, and materiel to staging areas, and providing logistics support services to units transiting the PODs. Staging. Organizing personnel, equipment, and basic loads into movement units; preparing the units for onward movement; and providing...
Words: 8723 - Pages: 35
...Military Technology Land Force Air And Missile Defence Dealing With The Complexities Of Future Warfighting Lieutenant Colonel Inger Lawes Abstract In the future, land force commanders will need to manage the use of airspace to enable multidimensional manoeuvre—coordinating joint and coalition assets and denying adversaries. Battlespace management, in an era of uninhabited and automated systems, is becoming increasingly complex. The author argues for the development of a ‘land force air and missile defence’ (LFAMD) to enhance friendly capability and defeat conventional and asymmetrical enemy manoeuvre. Introduction T he Australian Defence Force (ADF) Future Warfighting concept asserts that ‘the challenges of complex environments reinforce our view that warfare is multi-dimensional.’ 1 In future warfare, because of the presence of both conventional and asymmetric air threats, air and missile defence will become an essential capability in enabling the land force to conduct multi-dimensional manoeuvre. Australian Army Journal • Volume III, Number 2 • page 109 Military Technology • Lieutenant Colonel Inger Lawes The Future Land Operating Concept Complex Warfighting describes the contemporary operational environment in terms of defining characteristics such as complex physical, human and informational terrain and urban environments, increased threat diversity, diffusion and lethality. These characteristics necessarily impose a broader spectrum...
Words: 4481 - Pages: 18
...Foreword The Army is the primary landpower arm of our Nation’s Armed Forces. It exists to serve the American people, protect enduring national interests, and fulfill the Nation’s military responsibilities. FM 1 is one of the Army’s two capstone field manuals. It contains our vision for the Army. While the entire manual is important, I would direct your attention to four particular items. FM 1 establishes the fundamental principles for employing landpower. The most important of these are the Army’s operational concept and the fundamentals that support it. They form the foundation for all Army doctrine. All Soldiers should understand and internalize them. FM 1 describes the American profession of arms, the Army’s place in it, and what it means to be a professional Soldier. Central to this discussion are the Soldier’s Creed, Warrior Ethos, and Army Values. These three statements establish the guiding values and standards of the Army profession. To understand Soldiers, you must know about them. To be a Soldier, you must live them. FM 1 discusses Army contributions to the joint force. As the Armed Forces achieve even greater joint interdependence, the Army will depend more on the other Services and vice versa. For this reason, the Army is currently transforming its units and institutions to enhance our campaign qualities for sustained operations and to achieve greater expeditionary and joint capabilities. It is important for Soldiers and all who support or are associated with the...
Words: 27577 - Pages: 111
...The Doctrine 2015 Army Study Guide Mission Command Center of Excellence, Doctrine 2015 http://usacac.army.mil/cac2/MCCOE/Doctrine2015Tables.asp Doctrine 2015 is transforming the Army's doctrinal base to deliver doctrine - clear, concise, current and accessible - to the point of need. This process accelerates the implementation of new doctrine across the force by providing the Army with a completely revised structure of manuals. Doctrine 2015 captures the essential lessons learned from 10+ years of persistent conflict. It leverages a broader range of available collaborative technologies including wiki, interactive media instruction, video books, blogs and social media. Most importantly, it makes doctrine more accessible to Soldiers whether they are in a learning, training or operational environment."Our force has been operating at the speed of war for a decade-it's time our doctrine caught up." LTG Perkins, Commanding General, US Army Combined Arms Center, ARMY Magazine, March 2012. Created by: SAMANTHA S. SHIRLEY SGM, USA S-3 SGM, 86th ESB BLDG 21100, Room 3117 FT Bliss, TX 79918 COM: 915.741.4866 DSN: 312.711.4866 BB: 520.508.8370 NIPR: samantha.s.shirley.mil@mail.mil AKO: samantha.shirley@us.army.mil The NCO Creed No one is more professional than I. I am a Noncommissioned Officer, a leader of Soldiers. As a Noncommissioned Officer, I realize that I am a member of a time-honored corps, which is known as “The Backbone of the Army”. I am proud of...
Words: 8961 - Pages: 36
...CHAPTER 3 - CAN TECHNOLOGY SAVE SOLDIERS' LIVES IN IRAQ? Few areas demonstrate the need for effective information systems more than warfare. Poor communication and inefficient systems don't just waste money; they put soldiers in harm's way and increase their risk of being injured or killed. Though the U.S. Army has made great technological strides in recent years, many of those new technologies have not translated to better safety and more accurate flow of information in the combat zone. Some of the struggles of the U.S. counterinsurgency effort in Iraq illustrate these weaknesses. The U.S. military went into the Iraq War with many technological advantages. These included data transmission capacity that was 42 times faster than what was available to U.S. forces during the Gulf War; a plethora of sensor technologies such as motion sensors, heat detectors, and reconnaissance eavesdroppers; and an advanced vehicle tracking system, Blue Force Tracker, which marks the location of U.S. units and enables e-mail communication. The technology available to the enemy forces pales in comparison. But despite these significant advantages in information gathering, the methods used by the military to communicate that information suffered from critical flaws. Information about enemy movements and troop levels did not reach the officers on the ground in many cases, despite the wealth of technology available. Why? First the technology itself was often less efficient than advertised. Units...
Words: 1015 - Pages: 5
...States Air Force Blueprint for Cyberspace November 2, 2009 Foreword Cyberspace is a critical global domain, in which the USAF will conduct integrated operations in support of Joint Force Commanders’ needs. The United States is not alone in recognizing the asymmetrical advantages of this domain. Potential adversaries worldwide are rapidly improving or pursuing their own cyber capabilities. Attempts to disrupt or penetrate our networks are relentless. The blueprint that follows provides a framework to meet these challenges by evolving our culture and improving our capabilities. Air Force Space Command as the lead USAF Major Command (MAJCOM) for cyberspace will execute this blueprint as a unified effort--working closely within the Air Force, and with sister services, combatant commands, Joint Staff and other partners to fully provide the necessary capabilities for the future. C. ROBERT KEHLER General, USAF Commander, AFSPC 2 November 2009 Table of Changes Date 17 Mar 2010 No. 1 Page 13 Description Reference to Minuteman crossed out in Objective 5 Table of Contents Purpose .................................................................................................... 1 Current Situation ................................................................................. 2 Presidential Guidance ........................................................................ 2 Joint Guidance ...............................................................................
Words: 4766 - Pages: 20
...Army Reserve Training and Readiness Sergeant Major Kenneth Fenstermacher United States Army Sergeants Major Academy Class 63 Ms. Evelyn Hollis 20 November 2012 Abstract Never in our Nation’s history has the United States Army Reserve been more essential to the United States Regular Army. The United States Army Reserve has evolved into a fundamental part of the total force with modernized deployable forces and Citizen-Soldiers that exemplify the warrior mindset, culture, and ethos. Increasing demand for Army Reserve capabilities has introduced a new benchmark of dependence on the Army Reserve. The Army Reserve has become a critical part of our national security architecture and a positive investment for our nation. Transforming the Army Reserve from how the organization operated prior to 2001 to a solid contributor for unified land operations is remarkable. Senior leaders of the Army Reserve recognized the need for transformation in order to support the changing roles of a reserve force for the Active Component commanders. Supported by patriotic employers, resilient families, and caring communities, Army Reserve Soldiers are “Twice the Citizen.” Army Reserve Training and Readiness The United States Army Reserve has served our nation since 23 April 1908 as the Federal Reserve force of the United States Army. Peacetime Army Reserve leaders implemented a wartime trace for the first time in 1980. CAPSTONE professed to align every Army Reserve enabler with the active...
Words: 2920 - Pages: 12
...cyber-attacks was the Morris worm in the year 1988. It had affected the world cyber infrastructure. This worm utilized the weak areas of UNIX system Noun1. This worm has replicated adversely and slowed down the computers in all of the US and made them unusable. Cyber warfare has become a societal issue now. Though the roots of cyber warfare aimed at military areas primarily, it extended its effects to non-military areas too. The information infrastructure based companies have become victimized due to abundant availability of cheap cyber weapons over internet. This resulted in economic instability. Libicki classified information warfare into seven categories. They are intelligence based warfare, economic information warfare, hacker warfare, psychological warfare, electronic warfare, command and control warfare and cyber warfare. CSI and CERT information reflects that securities incidents are common, private firms are the major targets and much of these security incidents never receive public acknowledgement (Geeks et al., 2010). Several tools in the cyber warfare are developed based on Windows and are available free of cost. They require a minimal understanding about the technology frames. Many of the network organizations today are using well developed proxy servers, intrusion detection systems and firewalls. However these defensive systems are often configured improperly and carried known vulnerabilities. This weakness gave an opportunity even to a semi-skilled hacker to initiate...
Words: 1988 - Pages: 8
...congressional staff. From FY 1969 to FY 2005 OSD published the “Annual Defense Report” (ADR) to meet 10 USC Section 113 requirements. Starting with the President’s FY 2006 Budget, this report was no longer produced. Subsequently, the Overview began to fill this role. This year to ensure compliance with Section 113, new chapters are added to include reports from each Military Department on their respective funding, military mission accomplishments, core functions, and force structure. Key initiatives incorporated in the FY 2014 Defense budget. Our budget is formulated based on aligning program priorities and resources based on the President’s strategic guidance. This year’s budget involves key themes to: achieve a deeper program alignment of our future force structure with resource availability; maintain a mission ready force; continue to emphasize efficiencies by being even better stewards of taxpayer dollars; and continue to take care of our people and their families. Implementing Defense Strategic Guidance. The FY 2014 budget request continues the force structure reductions made in the FY 2013 budget request. Following the President’s National Security Strategy and the January 2012 revisions to that strategy, the Budget continues to make informed choices to achieve a modern, ready, and balanced force to meet the full range of potential military requirements. The restructured force will be balanced by technological advancements to deter and defeat aggression, to maintain flexibility...
Words: 74297 - Pages: 298
...Program * All of the above Which of the following best describes how the composite risk management process should be reflected in your safety briefing? * It is important to teach the composite risk management process in your briefing * It is important to review the composite risk management worksheet * It is useful to use the steps of the composite risk management process to organize your safety briefing * You should review the methods for assessing the probability and severity of hazards for your unit All of the following are effective controls to mitigate the risk of a privately owned vehicle accident EXCEPT: * Leave/Pass Form * Safety survey/inspection * Designated driver program * Travel Risk Planning System What document provides the requirement for establishing a unit safety program? * AR 385-10 * AR 385-90 * AR 11-9 * AR 385-1 What model are you required to use when creating a command safety briefing? * The model provided in The Commander’s Safety Course * The model found on the Army Safety website * The model used by the former commander * There is no model that you are required to use The requirement and procedures for Army aviation accident prevention programs are found in what document? * DA Pam 385-16 * DA Pam 385-10 * DA Pam 385-90 * DA Pam...
Words: 2669 - Pages: 11
...APC - PRESENT TRENDS AND FUTURE DEVELOPMENT INTRODUCTION The fundamental problem of managing military research and development is that uncertainty about the enemy and the costs and benefits on new technologies make it impossible to identify the single best route to innovation. Stephen P Rosen 1. Stephen Rosen’s statement identifies one of the most challenging problems facing political and military leaders today. In an era of uncertainty, which includes a diversity of potential threats and military operations, what is the “best route” in the area of military innovation to translate limited research and development resources into capabilities to deal with current or potential threats and its allies? By the time World War I ended military theorists around the world had learned from several rude surprises. First of all, horse-drawn and foot transport really wasn't good enough in the modern world. They didn't exactly get rid of the horse but horses were extremely vulnerable to fire, and the mud characteristic of trench warfare slowed them down a bit. Men were better in mud, but not much, and could not march quickly enough. The imperatives of battle were such that soldiers had to be able to move in almost all conditions, and if breakthroughs were to be exploited, they had to move fast. 2. The realities of trench warfare came as a rude shock to officers in World War I. Machine guns, barbed wire and trenches...
Words: 3811 - Pages: 16
...Army Regulation 350–1 Training Army Training and Leader Development Rapid Action Revision (RAR) Issue Date: 4 August 2011 Headquarters Department of the Army Washington, DC 18 December 2009 UNCLASSIFIED SUMMARY of CHANGE AR 350–1 Army Training and Leader Development This rapid action revision, 4 September 2011-o Implements the Don’t Ask, Don’t Tell Repeal Act of 2010 by deleting all references to developing and conducting training concerning the Army’s Homosexual Conduct Policy (paras 2-21p and 2-22k.) o Rescinds paragraphs 2-6r, 2-46ac, and G-14e.) o Makes administrative changes (app A: marked obsolete forms and publications; corrected forms and publication titles; and corrected Web site addresses; glossary: deleted unused acronyms and corrected titles/abbreviations as prescribed by Army Records Management and Declassification Agency). *Army Regulation 350–1 Headquarters Department of the Army Washington, DC 18 December 2009 Effective 18 January 2010 Training Army Training and Leader Development History. This publication is a rapid action revision (RAR). This RAR is effective 20 September 2011. The portions affected by this RAR are listed in the summary of change. Summary. This regulation consolidates policy and guidance for Army training and leader development and supports a full-spectrum, force protection, expeditionary Army. Applicability. This regulation applies to the active Army, the Army National ...
Words: 129456 - Pages: 518