319 results on '"Military strategy"'
Search Results
2. Partnership building for scale‐up in the Veteran Sponsorship Initiative: Strategies for harnessing collaboration to accelerate impact in suicide prevention.
- Author
-
Finley, Erin P., Frankfurt, Sheila B., Kamdar, Nipa, Goodrich, David E., Ganss, Elyse, Chen, Chien J., Eickhoff, Christine, Krauss, Alison, Connelly, Brigid, Seim, Richard W., Goodman, Marianne, and Geraci, Joseph
- Subjects
- *
MILITARY strategy , *SUICIDE prevention , *CULTURAL competence , *CONTENT analysis , *ACQUISITION of data - Abstract
Objective: To evaluate the implementation and trust‐building strategies associated with successful partnership formation in scale‐up of the Veteran Sponsorship Initiative (VSI), an evidence‐based suicide prevention intervention enhancing connection to U.S. Department of Veterans Affairs (VA) and other resources during the military‐to‐civilian transition period. Data Sources and Study Setting: Scaling VSI nationally required establishing partnerships across VA, the U.S. Department of Defense (DoD), and diverse public and private Veteran‐serving organizations. We assessed partnerships formalized with a signed memorandum during pre‐ and early implementation periods (October 2020–October 2022). To capture implementation activities, we conducted 39 periodic reflections with implementation team members over the same period. Study Design: We conducted a qualitative case study evaluating the number of formalized VSI partnerships alongside directed qualitative content analysis of periodic reflections data using Atlas.ti 22.0. Data Collection/Extraction Methods: We first independently coded reflections for implementation strategies, following the Expert Recommendations for Implementing Change (ERIC) taxonomy, and for trust‐building strategies, following the Theoretical Model for Trusting Relationships and Implementation; a second round of inductive coding explored emergent themes associated with partnership formation. Principal Findings: During this period, VSI established 12 active partnerships with public and non‐profit agencies. The VSI team reported using 35 ERIC implementation strategies, including building a coalition and developing educational and procedural documents, and trust‐building strategies including demonstrating competence and credibility, frequent interactions, and responsiveness. Cultural competence in navigating DoD and VA and accepting and persisting through conflict also appeared to support scale‐up. Conclusions: VSI's partnership‐formation efforts leveraged a variety of implementation strategies, particularly around strengthening stakeholder interrelationships and refining procedures for coordination and communication. VSI implementation activities were further characterized by an intentional focus on trust‐building over time. VSI's rapid scale‐up highlights the value of partnership formation for achieving coordinated interventions to address complex problems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Science as Diplomacy: Franklin Delano Roosevelt and the Third Presidential Cruise of 1938.
- Author
-
Tunc, Tanfer Emin
- Subjects
- *
FOREIGN military bases , *WAR , *MARINE invertebrates , *MILITARY strategy , *SUMMER vacations - Abstract
On July 16, 1938, Franklin Delano Roosevelt boarded the USS Houston in San Diego and embarked on what would come to be known as the Third Presidential Cruise. Publicized as a presidential fishing trip, the 1938 excursion was considerably more than a summer vacation. Covering 5,888 miles in twenty-four days, it comprised fourteen stops in the territories of five different countries: Mexico, France, Ecuador, Costa Rica, and Colombia. Concluding in Pensacola, Florida, after passing through the Panama Canal, it was an ambitious voyage that involved the intensive use of science as diplomacy, a mere thirteen months before the onset of World War II. On the surface, the cruise, whose collecting activities were supervised by the Smithsonian's Division of Marine Invertebrates, was a major scientific coup. However, the expedition also had a clear geopolitical goal: to assess the United States' naval capabilities in the Pacific and to formulate potential military strategies in the event of global war. Thus, the excursion illustrates how science and diplomacy can intersect at pivotal historical moments, and how it can be deployed to implement foreign policy based on military interests. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Disruptive innovations and defence procurement: a study of the Brazilian Navy Case.
- Author
-
Negrete, Ana Carolina Aguilera and Molas-Gallart, Jordi
- Subjects
- *
DISRUPTIVE innovations , *MILITARY tactics , *DEFENSE procurement , *MILITARY technology , *MILITARY strategy - Abstract
This paper deals with the study of the challenges that disruptive technologies represent for industrial defence strategies and procurement policies. It focuses on the incorporation of drones into military arsenals and will be based on a study of the Brazilian Navy case. Drones are a disruptive technology both for the defence industrial base and for their implications for military tactics and the organisational structure of the armed forces. The analysis addresses the main difficulties encountered in incorporating these technologies into traditional military structures and acquisition systems. We explore the ways in which defence procurement adapts (or fails to adapt) to the emergence of disruptive technologies: are traditional military organisations and procurement structures capable of introducing disruptive technologies and engaging in the organisational and operating practices required to do so? Some lessons are drawn from this experience: even when the military relevance of drone technology is widely acknowledged and even officially recognized, procurement strategies and practices have not been able to shift from their focus on incumbent suppliers and conventional systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Limits of India–US Relations: Balancing Through Strategic Autonomy and Multi-alignment.
- Author
-
Abraham, Josukutty C. and Purushothaman, Uma
- Subjects
INDIA-United States relations ,MILITARY strategy ,NATIONAL security ,BILATERAL trade ,BALANCE of power - Abstract
The India–US relationship has often been described as a defining partnership. But the nature of the friendship in actuality is yet to assume depth. Despite convergences at multiple levels, it falls short of a true strategic partnership or deep friendship. The India–US relationship is neither a trusted nor an assured economic or security partnership. It is often tested by the vagaries of real-time issues, especially involving other great powers. That is why, despite signing the civilian nuclear deal, foundational agreements, being members of the Quad and Indo-Pacific Economic Forum, and with the common objective of containing the rise of China, they are unable to work closely together on myriad bilateral, international and regional issues. There are differences over matters of primary interests and the type of partnership that each wants to establish. The United States was insensitive to Indian concerns in its abrupt drawdown from Afghanistan in 2021, sub-continental security threats emanating from the China–Pakistan axis and its continued military support to Pakistan. India's neutral stand (read in the United States as being pro-Russian) in the Ukraine crisis marked by its abstention from voting against Russia in the UN and purchase of Russian oil despite strong objections from the US-led Western camp are cases in point. We argue that India's US policy is a case of limited balancing dictated by compulsions and lacks depth. For rising India, a continued desire for strategic autonomy and multi-alignment—the post-non-alignment foreign policy principles—guides its foreign policy orientation. For Washington, a deeper relationship would imply India abandoning its visions of strategic autonomy and joining more formally in Washington's orbit. These core national objectives of the two countries limit the level of partnership they can forge. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. India, Japan and the Indo-Pacific: Evolution, Consolidation and Limitations of the Strategic Partnership.
- Author
-
John, Jojin V.
- Subjects
BILATERAL trade ,INTERNATIONAL relations ,INTERNATIONAL security ,MARITIME law ,MILITARY strategy - Abstract
India–Japan relations over the last two decades have become a regionally and globally oriented 'strategic partnership' from a narrow bilateral relationship. A key factor driving this transformation has been the discourse of the Indo-Pacific regional construct. Considering the overwhelming space occupied by maritime affairs in the bilateral strategic agenda, describing contemporary India–Japan relations as an India–Japan Indo-Pacific Strategic Partnership is justified. The article attempts to provide an evolutionary account of the India–Japan Indo-Pacific strategic partnership. In doing so, it identifies four phases in the evolution of the partnership: conception, actualisation, consolidation, and resilience, corresponding to the evolution of the Indo-Pacific concept from a geographic idea to a strategic concept to a regional order framework. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. The Sino-Indian Rivalry and Balance-of-power Theory: Explaining India's Underbalancing.
- Author
-
Paul, T. V.
- Subjects
CHINA-India relations ,BALANCE of power ,INTERNATIONAL solidarity ,MILITARY strategy ,NATIONAL security - Abstract
Balance-of-power theory has been challenged as insufficient for explaining state behaviour. Powerful anomalies for the theory exist, especially among states confronting intense rivalry and war. One such anomaly is underbalancing in the Sino-Indian rivalry by the Indian side up until 2017. Today India is still engaged in limited hard balancing, relying on asymmetrical arms build-up and strategic partnership with the United States and Japan that are not equal to military alignment. This article argues that India has occasionally engaged in hard balancing, relying on arms build-up and limited alliance formation, but in general, there has been a serious effort not to resort to intense hard balancing by forming military alliances or symmetrical arms build-up. This calls for an explanation. The core argument I make is that the type of balancing is intimately related to the type of rivalry states have. The China– India rivalry has yet to become an intense existential variety compared to the India– Pakistan rivalry where existential security and protection of national identity are of major concern. Indian elite's perceptions of the non-existential character of the Chinese threat and their reading of the Chinese strategy towards India have been the primary factors in explaining India's balancing response. In the latter, active hard balancing has been occurring both internally and externally, whereas the former is characterised by a combination of limited hard balancing, soft-balancing and diplomatic engagement, components of a hedging strategy. The hard balancing has picked up momentum since 2017 in response to a more assertive strategy of the Xi Jinping regime as the Chinese government has ratcheted up military activity on the India–China border. The general implication is that rivals who do not fear existential threats need not engage in intense hard balancing. Perceptions of the threat level play a bigger role in what kind of balancing behaviour occurs in international politics than acknowledged in standard theories on balance of power, especially of the automatic balancing variety. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. The Logic of "War on Deforestation": A Military Response to Climate Change in the Colombian Amazon.
- Author
-
Corredor-Garcia, Juan and López Vega, Fernando
- Subjects
- *
ARMED Forces , *MILITARY strategy , *DRUG control , *NON-state actors (International relations) , *CLIMATE change - Abstract
The renewed global efforts to contain climate change have meant a gateway for some Latin American countries to declare new military actions. The "war on deforestation," announced in 2021 by Iván Duque, the former president of Colombia, is a paradigmatic example. Through Operation Artemis (Operación Artemisa), the Colombian armed forces were assigned to protect the forests against threats from armed non-state actors (ANSAs) predominantly located in the country's Amazon rainforests. We argue that this war was a rhetorical and political model of the Duque government that sought, based on the re-elaboration of the counterinsurgent categories shared with the United States for half a century, to implement in the Amazon the first state military strategy to reach global agreements against climate change. Why does a state wage war in the name of protecting forests? We argue that in this novel rhetorical, military, and criminal framework, the war on deforestation encouraged the renewal of the war on drugs and the transformation of the internal enemy. Drawing on analyses of presidential policies passed since 1970 and, more recently, green crime law, this article showcases a new chapter on the state's goal of achieving territorial control through green militarization. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Hərbi sənaye və proqramlaşdırma.
- Author
-
Əliyeva, Günel
- Subjects
SECURITY systems software ,MILITARY supplies ,ARTIFICIAL intelligence ,MILITARY technology ,MILITARY strategy - Abstract
The military industry and programming is the sector that produces weapons, equipment and technologies in order to increase the defense capability of states. Programming, on the other hand, is essential for the functioning, management and development of these technologies. The role of programming is manifested in such areas as equipment management, simulation and training, data analysis. Of great importance is the use of programs for software control of military equipment, collection and analysis of intelligence information. Safety and reliability issues are also important. Cybersecurity ensures the security of the software of military systems. At the same time, the development of new technologies creates breakthroughs in the fields of artificial intelligence and automation. The military industry invests in the research of new weapons systems and defense technologies through programming. From the point of view of strategic importance, programming plays an important role in the development and implementation of military strategies. The development of programming and technology is important to ensure military superiority between states. Consequently, the military industry and programming are complementary areas. Programming increases the effectiveness of military technologies, ensures their safety and accelerates the development of innovations. This connection is of critical importance in modern times to increase the defense capability of states. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Cold weather operations: Preventive strategies in a military context.
- Author
-
Klous, Lisa, Teien, Hilde, Hollis, Sarah, Levels, Koen, Boonstra, Appie, Sullivan-Kwantes, Wendy, Haman, François, Castellani, John W., Catoire, Milène, and Kingma, Boris
- Subjects
- *
BEHAVIOR modification , *MILITARY strategy , *BODY composition , *ENVIRONMENTAL monitoring , *FROSTBITE - Abstract
Military cold weather operations (CWOs) introduce a range of challenges, including extreme temperatures, strong winds, difficult terrain, and exposure to snow, ice, and water. Personnel undertaking these missions face a heightened risk of cold weather injury (CWI), such as hypothermia, freezing cold injuries, and non-freezing cold injuries. The risk of these injuries is influenced by various factors, including age, sex, and body composition. To ensure optimal and safe performance in CWOs, it is crucial to implement effective preventive measures against CWI. This article emphasizes the most pertinent strategies for CWI prevention in CWOs. Initially, it is important to assess individual vulnerability to CWI. Education and training on CWI prevention should be provided before deployment in CWOs. During CWOs, attention should be given to crucial behaviors such as using a proper layered clothing system, recognizing the risks associated with prolonged stationary periods in cold conditions, consuming adequate calories, and staying hydrated. Additionally, environmental monitoring using tools like the windchill index and regular checks on physical status are essential. Although monitoring by itself does not prevent CWI, it can prompt necessary behavioral adjustments. Education and behavioral modifications are central to preventing CWI. Given the limited research on CWI prevention in military settings, despite the frequent occurrence of these injuries, there is a pressing need for further studies to evaluate effective preventive strategies within this specific operational framework. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. A Bibliometric Review of Chinese Traditional Defensive Settlement Heritage.
- Author
-
Lin, Xiuhong, Zhang, Yukun, Wu, Yilin, Yang, Yingqian, and Yang, Wenjing
- Subjects
LITERATURE reviews ,ARCHITECTURAL style ,DEFENSIVE (Military science) ,SUSTAINABLE development ,MILITARY strategy - Abstract
Unlike residential settlements, Chinese traditional defensive settlements (CTDS) are fortress-shaped settlements built by forefathers to resist invasion and defend their homeland. What remains of these settlements today are not only unique defensive entities but also defensive spatial layouts and architectural techniques that reflect military defense strategies and spatial patterns of ancient Chinese society, resulting in a distinct cultural heritage. Using CiteSpace as a research tool and CNKI as a core database, this paper conducts a visual analysis and review of the research related to CTDS, aiming to accurately and intuitively elaborate on the literature distribution characteristics, collaborative characteristics, key issues, research trends, and research hotspots. We found that research on CTDS focuses on three key issues: the composition system and defense mode of northern defensive settlements, the architectural style and cultural characteristics of southern defensive dwellings, and the settlements' heritage conservation and development planning; and research trends can be divided into three phases. We also propose five future research recommendations. This study helps to fill the gap in the bibliometric review of Chinese traditional defensive settlements, serves as a reference for future priority research directions, and provides a manual for heritage conservation and sustainable development of this special type of settlement. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. تحلیل رهبری نظامی پیامبر )ص (بر اساش هنر جنگ سىن تسو
- Author
-
ا ٥ِك ٬ائؿاوال
- Subjects
WAR ,HISTORICAL source material ,MILITARY planning ,MILITARY strategy ,MILITARY education - Abstract
Strategy, tactic, management, and leadership together with war planning and direction, organization, psychological warfare, and war diplomacy encompass the art of war. Sun Tzu, a Chinese thinker of the 6th century BC, was the first person to discuss the Art of War. This research aimed to analyze his opinions on this topic and evaluate the military performance of the Messenger of God (SAW) based on his theory. Additionally, the present research tried to elucidate the strategic military of the Prophet (SAW) as a successful commander, stating that his proficiency was not acquired through formal military training or the teachings of renowned thinkers. The research question concerns identifying the extent to which the Prophet's performance in the war fields was consistent with Sun Tzu's thoughts on the art of war. This research, conducted using a historical and analytical approach and relying on data from ancient historical sources and an analysis of Sun Tzu's book entitled The Art of War, reveals that successful military strategies of the Prophet (SAW) can be attributed to the practical application of the principles and fundamentals of the art of war. There are numerous parallels between his strategy and the ideas of this renowned strategist. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Clash of the Airborne Troops.
- Author
-
Bolger, Daniel
- Subjects
- *
WORLD War II , *AIRBORNE troops , *MILITARY strategy , *BATTLE of Leyte Gulf, Philippines, 1944 - Abstract
The article focuses on the strategic importance of the Philippines during World War II, particularly its role in the Pacific theater and the pivotal Battle of Leyte, where Japanese and American airborne troops clashed. It delves into the historical context of the Philippines' location, the American and Japanese military strategies, and the eventual U.S. victory.
- Published
- 2024
14. Middle East Spotlight.
- Subjects
MILITARY strategy ,AERIAL bombing ,RETALIATION for terrorism ,TERRORIST organizations - Abstract
The article reports on the Israeli military operation against the Hezbollah terrorist group in Lebanon in retaliation for rocket attacks into northern Israel. It informs the series of Israeli airstrikes in Beirut that killed several Hezbollah commanders including Ibrahim Aqil, Ahmed Wehbe and Hassan Nasrallah and destroyed military infrastructure, as well as the targeting Iran-backed Houthi militants in Yemen, and limited ground incursion into Lebanon.
- Published
- 2024
15. HOW ISRAEL GOT ITS MOJO BACK.
- Author
-
SCHANZER, JONATHAN
- Subjects
- *
MILITARY strategy , *ISRAEL-Hamas War, 2023- , *COUNTERTERRORISM , *MILITARY intelligence - Abstract
The article discusses Israel's strategic military response following the October 7, 2023, Hamas attack, highlighting the country's resurgence in defense capabilities throughout 2024. It mentions that after months of setbacks, Israel launched successful operations against Hamas and Hezbollah, utilizing advanced intelligence and counterterrorist tactics developed over two decades. It details Israel's precision strikes, including the targeted assassinations of key Hamas and Hezbollah leaders.
- Published
- 2024
16. The Joint Functions: Theory, Doctrine, and Practice.
- Author
-
Tackett, Matthew J.
- Subjects
- *
MILITARY science , *DOCTRINAL theology , *MILITARY strategy ,UNITED States armed forces - Abstract
The article delves into the concept of joint functions in military operations, emphasizing their role in providing structure and coherence amidst the chaos of warfare. It outlines how historical theories and doctrines, particularly those of military strategists like Carl von Clausewitz and Sun Tzu, inform current practices in joint military operations across various branches of the U.S. armed forces.
- Published
- 2024
17. From Sparta to Hostomel: The Enduring Role of Joint Forcible Entry Operations.
- Author
-
Cohen, Jonathan Maxwell
- Subjects
- *
FORCIBLE entry & detainer , *MILITARY strategy , *RUSSIA-Ukraine relations , *GEOPOLITICS - Abstract
The article discusses the evolving strategies of U.S. military joint forcible entry operations (JFEO) in the context of modern conflicts, particularly analyzing the Russian military's attempt to seize Hostomel Airport in Ukraine. It highlights the challenges posed by anti-access/area-denial (A2/AD) networks and argues for the necessity of adapting JFEOs to ensure their viability against contemporary threats.
- Published
- 2024
18. North Korea’s Naval Ambitions: A Strategic Shift.
- Author
-
Yu, Jihoon
- Subjects
SEA power (Military science) ,PATROL boats ,CHINA-United States relations ,INTERNATIONAL sanctions ,MILITARY strategy - Abstract
The article discusses North Korea's shift towards enhancing its naval capabilities, historically focusing on land-based military strength. The nation's interest in naval development has raised concerns globally, as it marks a strategic shift with implications for regional security and global dynamics. Despite facing obstacles such as limited technology and economic strain, North Korea's pursuit of naval power, particularly in submarine capabilities, could impact regional security and global trade routes, prompting the need for vigilance and diplomatic engagement to ensure stability in the region. [Extracted from the article]
- Published
- 2024
19. The Israel-Hamas war and the IDF strategy framework.
- Author
-
Kravetz, Jorge R.
- Subjects
- *
ARAB-Israeli conflict , *ISRAEL-Gaza conflict, 2006- , *WAR , *ISRAEL-Hamas War, 2023- , *URBAN warfare , *MASSACRES - Abstract
Hamas’s invasion of Israel on 7 October 2023, with the attendant massacre of some 1,200 Israelis and the occupation of population centres and military bases – something that no Arab army has done since the 1948 war – posed unprecedented challenges to Israel’s socio-political and security establishments. Based on Chief-of-Staff Eisenkot’s 2018 doctrinal manifesto ‘The IDF’s Strategy’, this article assesses Israel’s national security principles and the doctrines for the use of force in an attempt to evaluate whether its political and military actions were aligned with these doctrines during the 2023–24 war with Hamas, and to determine the strategy’s value and possible gaps. It concludes that while the political and military responses appear consistent with the outlined principles, unexpected problems like hostage dilemmas and urban warfare complexities present unforeseen challenges not directly addressed by the manifesto. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Culture: a sixth domain and the introduction of the ‘C6ISRT’ framework.
- Author
-
Sharpe, Jack, Trichas, Markos, and Terrill, Damian
- Subjects
- *
AIR warfare , *MILITARY culture , *MILITARY strategy , *SOCIAL interaction , *CYBERSPACE , *STRATEGIC communication - Abstract
The traditional domains of land, sea, and air warfare have long held prominence, while space and cyberspace have recently gained recognition as spheres of conflict. As conflicts continue to evolve, the domains of war must expand to accommodate new dimensions of engagement and integrate them alongside those human-centred factors that have previously held considerable sway. It is imperative, therefore, to recognise culture as the sixth domain and reflect upon its profound influence on group thinking, decision-making, and behaviour. Integrating culture into the Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance, Reconnaissance and Targeting (C5ISRT) framework acknowledges its strategic relevance in shaping military strategies and responses in an increasingly complex and interconnected world. This paradigm shift highlights that the modern landscape extends beyond physical and virtual theatres to encompass the cognitive and social dimensions that define human interactions and conflicts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Hamas’s unholy jihad.
- Author
-
Celso, Anthony
- Subjects
- *
ARAB-Israeli conflict , *ISLAMIC philosophy , *MILITARY strategy , *JIHAD , *TERRORISM , *MASSACRES , *ZIONISM - Abstract
This article explores the impact of Muslim Brotherhood and jihadist theorists on the making of Hamas’s 7 October 2023, assault. By way of doing so, it discusses Hamas’s historic, ideological, and organisational connections to the Muslim Brotherhood before exploring jihadist warfare doctrine to liberate al-Quds (Jerusalem) from ‘Zionist occupation’, which shaped Hamas’s covenant and may have influenced its military strategy including the 10/7 massacres. The article concludes that Hamas’s ideology is closely aligned with most extremist factions of jihadist and Muslim Brotherhood thought and that efforts to characterise the organisation’s terrorist activities as motivated by national considerations are totally misconceived. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. The Sahel on the edge of the abyss? Why U.S. counterterrorism engagement has failed to achieve its goal?
- Author
-
Yuan Zhu and Wanni Gao
- Subjects
COUNTERTERRORISM ,COOPERATION ,TERRORIST recruiting ,TRAFFIC congestion ,MILITARY strategy ,POWER (Social sciences) ,INTERNATIONAL cooperation - Abstract
The United States has emerged as a prominent actor in the international fight against transnational terrorism in the Sahel region of Africa since 2002, exerting significant political influence on regional affairs. Under the leadership of the United States, a coalition of Sahel countries has collaboratively established security programs, notably including the Trans-Saharan Counterterrorism Partnership (TSCTP). However, the U.S. counterterrorism strategy in the Sahel region has not only proven ineffective in containing the deterioration of regional security, but also has exacerbated the vulnerability to coups in recipient countries. The observed deterioration can be attributed to various driving factors, such as deviations in the willingness and ability to involve and the security traffic jam. We contend that the U.S.-Sahel counterterrorism partnership is fundamentally misaligned and plagued by a securitization problem. Firstly, a significant impediment to international cooperation lies in the United States' pursuit of consolidating its dominant role in Sahel security affairs, which usually overlooks the pragmatic principle of 'African solutions to African problems'. In the counterterrorism process, there is a misalignment between U.S. national interests and those of Sahel states. Furthermore, the United States' extensive reliance on military strategies indicates a significant securitization of non-violent civil affairs in certain Sahel states, inadvertently creating an opportunity for genuine terrorist organizations to recruit members. In addition, U.S. interference in the internal affairs of Sahel states heightens the risk of coups, thereby undermining the legitimacy of U.S. leadership in the region. Currently, with both the withdrawal of the United Nations Stabilization Mission in Mali (MINUSMA) and France withdrawing their security forces from the Sahel region, there has a significant weakening effect on regional security capabilities. Therefore, it is imperative for the international community to collaborate with African nations and adopt more proactive measures to safeguard regional security and maintain order. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Non‐Covalent Iron‐Armored Chain Horse: A Strategy Leading to Highly Efficient Deep‐Blue Room Temperature Phosphorescence.
- Author
-
Gu, Ting, Wang, Tai, Wu, Tongyue, Li, Xiaoyu, Huang, Jianbin, Xiao, Yunlong, and Yan, Yun
- Subjects
- *
IRON , *PHOSPHORESCENCE , *HORSES , *MILITARY strategy , *CYCLODEXTRINS , *HYDROGEN bonding - Abstract
The iron‐armored chain horse is a military strategy in ancient China to enhance the combat force of the entire army, especially when individual fighters are vulnerable to being picked off one by one. Herein, this strategy is adopted to generate highly efficient metal‐free blue room temperature phosphorescence (RTP) using the world's largest production of dicarboxylate acid. By encapsulating the commercially available chemical disodium terephthalate (DTPA) within the iron armor of α‐cyclodextrin (α‐CD), and subsequently linking the iron‐armored DTPA@α‐CD horses into a crystalline array mediated by hydrogen bonds and Na+ coordination, a highly confined and segregated arrangement of DTPA is achieved, leading to heavy atom‐free deep‐blue phosphorescence with a maximum efficiency of 83.3%. Since the crystalline array of the iron‐armored chain horse DTPA@α‐CD can be facilely obtained through water evaporation, the current phosphorescent material allows for rapid, high‐throughput solution processing of deep‐blue afterglow display, offering an economic and environmentally benign approach for deep‐blue RTP materials and facilitating their application. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Widening the Archival Sliver: Availing and Available Archival Materials Tied to Apartheid-Era African-Staffed Military Forces.
- Author
-
Raber, Richard Levi
- Subjects
- *
MILITARY government , *VETERANS , *ARMED Forces , *MILITARY tactics , *MILITARY strategy - Abstract
African-staffed apartheid-era military forces now command scholarly attention. I outline relevant archival holdings that survived the mass destruction of documentation as apartheid crumbled, suggesting that additional publicly available materials exist in underutilized archives. Composed of both official and vernacular materials, these sources are less likely to support research into studies of military tactics or strategy, but they offer glimpses into the day-to-day mechanics of these forces and more vividly, the militarized cultural worlds underpinning them. They offer insights into labor, cultural, and social histories. This has relevance for southern African history, and more broadly, for scholars interested in colonial military rule, democratization, the Cold War, and colonialism and its aftermath in Africa. I conclude by calling on scholars to work with military veterans and their families to facilitate archival donations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Artificial Intelligence, Warfare and Ethics in India.
- Author
-
Roy, Kaushik
- Subjects
- *
JUST war doctrine , *ARTIFICIAL intelligence , *MILITARY strategy , *MILITARY officers , *WEAPONS systems - Abstract
In the second decade of the new millennium, artificial intelligence (AI) became a catchword among senior politicians and the military officers of India. Indian military officers have raised concerns about the potential use of AI-enabled weapon systems by China and by insurgents supported by Pakistan in the subcontinent. This article portrays the complex interlinkages between AI, strategic planning about future warfare and the role of ethics in India. The article, divided into three sections, deals with the role of AI and ethics in India's grand strategy, in military strategy and in command culture. Finally, the article also offers some policy recommendations. For cultural reasons, India follows a defensive strategy. India is attempting to integrate the AI weapons within its dharmayuddha (just war) format. Indian military strategy emphasises that on no account should these intelligent machines be autonomous. Atman (self-consciousness) must not be subordinated to yantras (machines). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Un análisis prospectivo sobre la industria de defensa europea y sus repercusiones en la española.
- Author
-
Fonfría, Antonio and Vicente Oliva, Silvia
- Subjects
- *
DEFENSE industries , *OLIGOPOLIES , *MILITARY strategy , *SUPPLY chains , *AGENT (Philosophy) - Abstract
The new defence policy of the European Union (EU) is forcing the defence industry in Europe to adjust its strategies, especially since the invasion of Ukraine. Both the European Commission and the European Defence Agency (EDA) are pushing for a European Defence Technological and Industrial Base (EDTIB), taking account of factors that include the fragmentation of supply chains, the significant efficiency gains that can be made and the prospect of greater EU strategic autonomy. In the industrial field, particularly in the area of technology, it will change the shape of the European defence industry. But what direction will this new industry take? Will national oligopolies be reinforced at the same time as other European oligopolies emerge? Drawing on an empirical analysis based on interviews with experts, this paper focuses on Spain as a case study and explores the repercussions it will have on the country's defence industry. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. The Tyranny of Supply: Natural Resources and Rebel Territorial Control in Civil Conflicts.
- Author
-
Aronson, Jacob, Kikuta, Kyosuke, Findley, Michael, and Walsh, James Igoe
- Subjects
- *
NATURAL resources , *MILITARY strategy , *CIVIL war , *CONFLICT management , *SUPPLY chains - Abstract
The logic of territorial control is central to the study of internal conflict. Existing studies consider the consequences of territorial control without answering a critical question: what motivates rebel territorial control in the first place? Territorial control requires careful explanation. While it confers important benefits it is also costly to achieve and exposes rebels to state attack. This paper argues that benefits exceed costs when territorial control provides rebels with a reliable source of organizational supply. High-value lootable natural resources—resources available in abundance that are easy to extract and transport for sale—represent key components of a rebel's supply chain. To test the theory's implications, we introduce new cross- and sub-national time-series data on territorial control in sub-Saharan Africa and couple it with a new dataset of local natural resource values. We use an instrumental variable approach to address core endogeneity concerns. Results both substantiate our theoretical approach and provide evidence running contrary to existing arguments. These findings demonstrate that valuable natural resources, logistical supply constraints, and, more broadly, rebel military strategy, are critically important and need to be incorporated into work on civil war, territorial control, and rebel governance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. A Denoising Method Based on DDPM for Radar Emitter Signal Intra-Pulse Modulation Classification.
- Author
-
Yuan, Shibo, Li, Peng, Zhou, Xu, Chen, Yingchao, and Wu, Bin
- Subjects
- *
ARTIFICIAL neural networks , *SIGNAL denoising , *RANDOM noise theory , *WHITE noise , *MILITARY strategy , *SIGNAL-to-noise ratio - Abstract
Accurately classifying the intra-pulse modulations of radar emitter signals is important for radar systems and can provide necessary information for relevant military command strategy and decision making. As strong additional white Gaussian noise (AWGN) leads to a lower signal-to-noise ratio (SNR) of received signals, which results in a poor classification accuracy on the classification models based on deep neural networks (DNNs), in this paper, we propose an effective denoising method based on a denoising diffusion probabilistic model (DDPM) for increasing the quality of signals. Trained with denoised signals, classification models can classify samples denoised by our method with better accuracy. The experiments based on three DNN classification models using different modal input, with undenoised data, data denoised by the convolutional denoising auto-encoder (CDAE), and our method's denoised data, are conducted with three different conditions. The extensive experimental results indicate that our proposed method could denoise samples with lower values of the SNR, and that it is more effective for increasing the accuracy of DNN classification models for radar emitter signal intra-pulse modulations, where the average accuracy is increased from around 3 to 22 percentage points based on three different conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Russia's war strategy: what Chechnya suggests for Ukraine.
- Author
-
Iliyasov, Marat and Herrera, Yoshiko M.
- Subjects
- *
WAR , *MILITARY strategy , *PUBLIC service advertising , *SOVEREIGNTY ,RUSSIAN armed forces - Abstract
While the decision to invade all of Ukraine and Russia's atrocious behavior and disastrous performance in the war may seem surprising and even irrational, Russia has in fact followed patterns that it used in the recent past with the two Chechen wars of 1994–1996 and 1999–2009. In this article, we compare key similarities and differences in the two Russo-Chechen wars and the current war on Ukraine by analyzing three aspects of the wars: Russian political strategy in the territories, Russian military strategy and conduct, and the Russian state's approach to war-related information and media campaigns. By drawing these comparisons, we hope to show how Russia's past war strategies in Chechnya might shed light on outcomes in Ukraine. In addition, in showing the similarities between Russian actions in Chechnya and Ukraine we highlight the argument that Russia is treating Ukraine not as a sovereign state, but as a part of Russia. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Terör Örgütü Mensuplarına Yönelik Radikalleşmeden Arındırma Süreçleri ve DDR Modelinin Analizi: Endonezya JI Örneği.
- Author
-
Arslan, Alp Cenk
- Subjects
TERRORIST organizations ,MILITARY strategy ,QUALITATIVE research ,RADICALISM ,DISARMAMENT ,TERRORISM ,COUNTERTERRORISM - Abstract
Copyright of Mukaddime Journal is the property of Mukaddime Journal and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
31. The Reasons and Roles of the Establishment of National Political Assembly (Guo Min Can Zheng Hui).
- Author
-
Li Xiang, Mansor, Suffian, and Enh, Azlizan Mat
- Subjects
- *
SINO-Japanese War, 1937-1945 , *MODERN history , *COMMUNIST parties , *MILITARY strategy ,CHINESE history - Abstract
For nearly 80 years, the study of National Political Assembly (Guo Min Can Zheng Hui) has been a hot topic among scholars in mainland China. However there's a scarcity of deep research regarding the reasons and roles of National Political Assembly. This study aims to identify the reasons behind the establishment of National Political Assembly and to explore National Political Assembly’s role in uniting the Chinese. A qualitative research approach was employed, involving collecting primary and secondary historical materials in archives and libraries of China for literature analysis and case studies of representative events or proposals. The findings show that its establishment was related to Japan's aggression, the foreign policies of the United States, Britain, the Soviet Union and other countries, as well as the domestic anti-Japanese parties represented by the Kuomintang and the Communist Party of China, and the people of all walks of life across the country. This paper concludes that in the early days of its establishment, it played a positive role in China's unity against Japan, democratic politics, and economic stability. This research is extremely valuable for studying the history of China's Second Sino-Japanese War and the Second KMT-CPC Collaboration, as well as the economic policies, political proposals, and military strategies of the Kuomintang, the Communist Party of China, and other parties involved in the Second Sino-Japanese War, as well as the history of the Communist Party of China, the Republic of China, and modern Chinese history. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. UNDERSTANDING THE DISCONNECTION IN ROYAL COLONIAL LEADERSHIP OF THE BRITISH COMMANDERS-IN-CHIEF (1775-1783): GAGE, W. HOWE, AND CLINTON.
- Author
-
MCBATH, GABRIELLE L.
- Subjects
AMERICAN Revolutionary War, 1775-1783 ,MILITARY strategy - Abstract
When the British lost their American colonial territories in 1781 at the end of the American Revolutionary War, it was the culmination of events that began during the conclusion of the American Theater of the Seven Years' War (the French and Indian War, 1763). Examples include changing dynamics in British Parliamentary charters, the involvement of American international allies (primarily France, Spain, and the Dutch Republic) seeking retribution for the French and Indian War, shortages of supplies and munitions, misjudgments regarding Loyalist support, and independent British generals failing to coordinate their military offensives. However, one less-discussed example is the disconnection in leadership styles among the three British Commanders-in-Chief of the American Colonies from 1775 to 1783: Thomas Gage, William Howe, and Henry Clinton. This paper assesses their leadership failures as they navigated their varying styles during the American Revolutionary War (1775-1783). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Best Individual Guided Immune Plasma Algorithm on Solving Path Planning Problem of Unmanned Combat Aerial Vehicles.
- Author
-
Aslan, Selcuk and Ozkok, Fatma Ozge
- Subjects
- *
DRONE aircraft , *METAHEURISTIC algorithms , *CONVALESCENT plasma , *AUTONOMOUS vehicles , *ALGORITHMS , *MILITARY strategy , *PLASMA sheaths - Abstract
Unmanned aerial vehicles (UAVs) and their variants equipped with sophisticated weapon systems called unmanned combat aerial vehicles (UCAVs) have completely changed the classical war strategies and concept of military operations. For guaranteeing the autonomous flight safety and success of the task being performed by these modern aerial vehicles, a path must be determined optimally after considering some kinematic constrains, existence of enemy threats, fuel or battery limitations. Immune plasma algorithm (IP algorithm or IPA) inspired by the implementation steps of a medical method gained popularity with the COVID-19 and known as convalescent or plasma treatment is one of the most recent intelligent optimization or meta-heuristic techniques. In this study, plasma treatment procedure of the IPA was changed with a newly introduced approach called the best individual guidance for short BIG that is based on using the most qualified solution found by the algorithm and three different donors when collecting plasma and BIGIPA was developed as a novel UCAV path planner. For investigating the path planning capabilities of the BIGIPA, a set of detailed experiments was carried out by using different battlefield configurations and assigning various constants to the control parameters such as population size and number of receivers and then obtained results were compared with the results of other path planners based on well-known meta-heuristic algorithms. Experimental studies showed that introduced treatment procedure gives a significant contribution to the convergence performance and qualities of the final solutions especially for the test cases with relatively high dimensionalities and BIGIPA calculates more promising, flight efficient, and safe UCAV paths compared to the tested algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Recent U.S. Government and Military Space Strategy and Doctrine.
- Author
-
Chapman, Bert T.
- Subjects
- *
MILITARY government , *MILITARY strategy , *ARMED Forces , *PUBLIC sphere , *GRAND strategy (Political science) ,UNITED States armed forces - Abstract
Recent years have seen the U.S. Government and U.S. military branches produce national space strategy and military doctrinal documents for conducting military operations in or from space. This literature is produced by the White House and individual armed service branches and is often required by congressionally mandated legislation. This work will examine such literature produced during the Trump and Biden Administrations, emphasize the public availability of significant portions of this literature, assess that China and Russia are key rivals of the U.S. in the military space sphere, and will assess congressional reaction to these documents. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Taxonomía web de las principales unidades militares del planeta: análisis de contenido y etnografía digital.
- Author
-
Tejedor, Santiago, Rull Ribo, David, Martínez, Jesús, and Romero-Rodríguez, Luis M.
- Abstract
Different armies around the world have bet to make their websites the center of their digital communicative strategy. This paper examines and compares the websites of 14 elite military units in the five continents to elaborate a taxonomy based on the structured dimensions and indicators of usability, contents, interactivity, and accessibility. For this purpose, a qualitative digital ethnography has been developed using a quantitative-qualitative content analysis made up of 14 thematic dimensions, 36 indicators and 69 variables. This study identifies, among others, the importance of the dialogic and multiformat component in cyberspace. It also concludes that, in general, the armies analyzed have barely included content typologies from gamification, immersion and virtuality, and others. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. COMPLIANCE STRATEGY FOR THE CERTIFICATION OF ENVIRONMENTAL CONTROL SYSTEM IN MILITARY APPLICATIONS.
- Author
-
GÜLER, Emre
- Subjects
- *
MILITARY strategy , *REGULATORY compliance , *SAFETY standards , *CERTIFICATION , *LEARNING - Abstract
This review paper provides the compliance strategy for the certification activity of environmental control systems (ECS) according to the military standard. Firstly, the paper defines the ECS. Secondly, it outlines the steps for the system’s certification activities in the concept of the means of compliance. Thirdly, it recommends the minimum set of documents with technical explanations obtained by academic learning, vocational training and recommendations from the regulations for compliance with the given requirements in military certification of ECS. Then, the differences in terms of compliance methods are specified. Finally, it is concluded that a specific compliance strategy for military certification of ECS is required for a systematic and comprehensive approach. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. THE ROLE OF PMCS IN THE IMPLEMENTATION OF MILITARY STRATEGIES AS THE NEW WORLD ORDER: KEY STUDY - COMPARISON OF PMCS IN THE USA AND RUSSIA.
- Author
-
SHALA, Drizan
- Subjects
- *
MILITARY strategy , *CONSTITUTIONAL law , *PRIVATE military companies , *LEGAL justification , *TREATIES , *HUMAN rights , *FREEDOM of expression - Abstract
In this paper, I will try to provide the justifications according to the laws in force and the needs of democratic policies and institutions to allow the creation of PMCs according to international rules and standards by applying the constitutional laws and with particular emphasis on freedom and human rights in the civil-military aspect. So the challenge and the journey remain in the aspect of the formation of the professional framework within the organizational structure of the PMC from the functionality of the state military structures. During the work, I will be able to identify why there is a demand and implementation of PMC by many democratic states and how much these are covered by laws, regulations, and international conventions, considering that we are dealing with direct intervention in the civil-military aspect. [ABSTRACT FROM AUTHOR]
- Published
- 2024
38. Endogenous military strategy and crisis bargaining.
- Author
-
Spaniel, William and İdrisoğlu, Işıl
- Subjects
MILITARY strategy ,NEGOTIATION ,WAR ,CRISES ,AIR warfare - Abstract
When states fight wars, they choose between multiple military strategies, e.g. whether to place boots on the ground or restrict efforts to an air campaign. We modify the standard crisis bargaining model to account for this by endogenizing a state's war strategy. Intuitively, states choose the more powerful strategy when the additional strength gained covers the additional costs of doing so. However, there is a counterintuitive second-order consequence of this. When stronger campaigns are expensive but still credible, states are more likely to reach a negotiated settlement to avoid the corresponding high costs. As the cost of the more powerful option increases, states substitute their actions with cheaper but weaker alternatives. Because of these lower costs, states become less likely to reach a settlement. In some cases, both parties may be worse off as a result. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Emerging technology and the cult of the offensive.
- Author
-
Lonergan, Erica D.
- Subjects
TECHNOLOGICAL innovations ,UNITED States armed forces ,ELECTRONIC surveillance ,MILITARY relations ,MILITARY strategy - Abstract
Military organizations are generally defined by a "cult of the offensive." For cyberspace, this gives rise to an empirical puzzle, at least in the United States. What accounts for the early restraint and skepticism about cyber offense publicly expressed by many US military cyber leaders? In this article, I explore the US military's approach to cyberspace as a theory-developing case study. I examine more than a decade of public discourse among senior military leaders about when and how the military should employ cyber force. I argue that, in the formative years of US military cyber organization, the military's predisposition to the offense was challenged by other cultural and institutional influences, especially from the signals intelligence and strategic nuclear communities. Moreover, this influence shaped the public discourse even after US military cyber organizations gained greater autonomy and turned toward more objectively offensive strategies. This suggests implications for theory and policy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. The Influence of Non-Kinetic Actions on Multi-Domain Operations Command and Control.
- Author
-
Raţiu, Aurelian and Sălăvăstru, Claudiu-Marius
- Subjects
COMMAND of troops ,MILITARY science ,MILITARY strategy ,DISINFORMATION ,ESPIONAGE - Abstract
In the current context, the way military actions are carried out determines rethinking the military leadership and approaching it through the lens of hybrid, non-kinetic approaches, of high precision technologies and of those that integrate all areas of military operations. Potential adversaries are increasingly using non-kinetic warfare strategies that include subversive and disinformation campaigns, espionage and cyber attacks. Thus, non-kinetic actions are relevant elements for military operations requiring the implementation of new operating and command-control concepts. In modern military confrontations it is imperative that leadership systems project power and use both precise and long-range kinetic actions as well as non-kinetic actions with chain effects and substantial benefits in mission accomplishments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. The Russian Art of War: How the West Led Ukraine to Defeat.
- Author
-
Fedyashin, Anton
- Subjects
- *
MILITARY strategy , *RUSSIA-Ukraine relations , *NONFICTION - Published
- 2024
42. Building a Community: How to Create a Professional Writing Network.
- Author
-
Finney, Nathan K.
- Subjects
- *
BUSINESSPEOPLE , *INTERNET forums , *AFGHAN War, 2001-2021 , *MILITARY law , *MILITARY strategy - Abstract
Lt. Col. Nathan K. Finney, PhD, of the U.S. Army, discusses the importance of building a community to create a professional writing network. He emphasizes that writing is a collaborative effort that involves drawing from and contributing to various communities. By sharing his own experiences and providing practical tips, Finney encourages writers to find their passion, engage with others, and give back to the community. The article highlights the value of networking, engaging with experts, and continuously reassessing and strengthening writing communities to enhance intellectual endeavors. [Extracted from the article]
- Published
- 2024
43. Die strategische Bedeutung von Feucht-gebieten Sümpfe nördlich von Kiew halten Russland von einem erneuten Angriff aus Richtung Belarus ab. Global werden sie Teil geostrategischer Überlegungen.
- Author
-
Schwägerl, Christian
- Subjects
MILITARY strategy - Abstract
The article discusses the strategic importance of the wetlands north of Kyiv in deterring Russian aggression from Belarus, highlighting their ecological value and military utility, particularly how the Ukrainian government utilized flooding to impede enemy advances.
- Published
- 2024
44. China Naval Modernization: Implications for U.S. Navy Capabilities—Background and Issues for Congress.
- Author
-
O'Rourke, Ronald
- Subjects
MILITARY strategy ,NAVAL warfare ,MILITARY policy ,LEGISLATIVE oversight ,SEA control - Abstract
The article focuses on the implications of China's naval modernization for U.S. Navy capabilities. Topics include China's expanding naval fleet and its growing operations in the Western Pacific, comparisons of ship numbers between the U.S. and China, and U.S. strategic responses, including increased presence and new operational concepts, to counteract China's maritime advancements.
- Published
- 2024
45. 'ZEITENWENDE' -- THE TURNING POINT!
- Author
-
Jha, Manish Kumar
- Subjects
MILITARY modernization (Equipment) ,MILITARY strategy ,MILITARY relations - Abstract
An interview with Lieutenant General Ingo Gerhartz, chief of the German Air Force or Luftwaffe, is presented. He discusses the budget for the modernization efforts of the Air Force. Gerhartz explains the military strategy behind the deployment of exercise Tarang Shakti in the Indian subcontinent. He also comments on the state of strategic and military collaborations between Germany and India.
- Published
- 2024
46. UP IN THE AIR.
- Author
-
Jennings, Peter
- Subjects
- *
SPEECHES, addresses, etc. , *MILITARY readiness , *MILITARY strategy - Abstract
The article presents an address given by Peter Jennings, former Australian senior Defence Department official, to the Institute of Public Affairs (IPA) in Sydney, New South Wales on March 20, 2024 in which he offered some thoughts about Australia's defence and strategic outlook. Topics include a reduction in the country's defence capability, the strategic risk faced by Australia in the Indo-Pacific region, and the consequences of Chinese Communist Party's failure.
- Published
- 2024
47. The World Is Not About Us: Information and Power in the Current Strategic Environment.
- Author
-
Reno, Will and Humpal, Jesse R.
- Subjects
- *
INFORMATION resources management , *ACQUISITION of data , *MILITARY strategy , *INTERNATIONAL competition , *TECHNOLOGICAL innovations - Abstract
The article focuses on how the Taj Mahal Guest House in Afghanistan demonstrated a Cold War-era approach to information and network management, with implications for modern strategic practices. Topics include: the operational flexibility and data collection methods of the Taj, the historical U.S. strategies for indirect influence through networks, and the current challenges faced by the U.S. in adapting to global competition and technological advancements.
- Published
- 2024
48. Winning in the Competition Continuum With Engineer Civic Assistance Projects.
- Author
-
Ward, James M.
- Subjects
- *
MILITARY strategy , *INTERNATIONAL alliances , *MILITARY readiness , *INTERNETWORKING , *MILITARY science - Abstract
The article focuses on enhancing U.S. strategic positioning through Engineer Civic Assistance Projects (ENCAPs) in the context of a competitive global environment. Topics include the integration of ENCAPs into U.S. strategy for building alliances and military capabilities, the need for frequent and extended-duration projects to maximize effectiveness, and the importance of joint, multidisciplinary teams in improving interoperability and readiness.
- Published
- 2024
49. Engines of Chaos: Counterlogistics in Competition.
- Subjects
- *
LOGISTICS , *MILITARY strategy , *WAR , *MILITARY doctrine , *MILITARY policy - Abstract
The article focuses on counterlogistics as a strategy to enhance U.S. competitive advantage below the level of armed conflict. Topics include the concept of counterlogistics to disrupt adversary logistics, the integration of this strategy into existing joint doctrine and logistics frameworks, and the need for close cooperation with allies to effectively implement counterlogistics and bolster regional partnerships.
- Published
- 2024
50. Collaboration to support veterans: An ongoing project in the Pikes Peak region.
- Author
-
Zimbleman, Dana and McMahon, Sarah
- Subjects
- *
VETERANS , *MILITARY strategy , *STATE universities & colleges - Abstract
This article describes the collaborative efforts at Pikes Peak State College to support veterans within the institution and community. In partnership with PPSC's Military and Veterans Program and with assistance from professional colleagues inside and outside the institution, two English faculty spearheaded efforts to organize events and create a military arts publication they hope to turn into a national journal that accepts submissions from across the country. In keeping with military strategies encouraging teamwork and adaptation, they have built a framework for ongoing military and veteran outreach in the Pikes Peak region. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.