Welcome to the Introduction to Special Operations Forces course lesson on Special Operations.

Size: px
Start display at page:

Download "Welcome to the Introduction to Special Operations Forces course lesson on Special Operations."

Transcription

1 Welcome to the Introduction to Special Operations Forces course lesson on Special Operations. In this lesson we will discuss the term Special Operations and identify some of the characteristics, requirements, and advantages of Special Operations, as well as, some of the differences between Special Operations and conventional operations.

2 To understand Special Operations warfare we need to first answer What are Special Operations? This understanding is necessary to appropriately and effectively conduct planning, execute operations, resource, support, and integrate Special Operations without competition but as a complement to conventional forces and other governmental agencies. Most armed forces are designed as large organizations for employment against military threats. The equipment, training, and tactics are standardized for application to a wide range of operations. Conventional forces conduct operations with baseline tactical units against tactical level objectives. Special Operations provide an option to conduct Tactical Operations using direct or indirect methods to achieve strategic and operational level objectives. Understanding what Special Operations are is a foundation to build follow on learning about Special Operations Forces, core tasks, and employment.

3 Depending on one s frame of reference, past experiences, and individual notions the term Special Operations can have a different meaning and be easily confusing with other terms and acronyms. Before proceeding it is important to fully understand some terms and acronyms that are easily confused. Special Operations or SO which are acts or activities.

4 Special Operations Forces or SOF are forces or units of the military services designated by the Secretary of Defense to conduct or support Special Operations. Examples of Special Operations Forces include units such as the Army s 75 th Ranger Regiment, the Navy s SEAL Team 10 and Special Boat Unit 22, the Air Force s 320 th Special Tactics Squadron and 353 rd Special Operations Group and the Marine s 1 st Marine Special Operations battalion.

5 Special Forces or SF are specific U.S. Army Forces, organized, trained, and equipped to conduct Special Operations with an emphasis of unconventional warfare capabilities. At the individual level, Special Forces are those individuals who have attended and successfully completed a qualification course and been awarded the Army Green Beret.

6 Doctrinal Special Operations are Tactical Operations conducted using either direct or indirect methods to achieve strategic or operational level objectives using military capabilities for which there is no broad conventional force requirement. In addition to achieving military objectives, Special Operations can also be used to support the application of diplomatic, informational, and economic instruments of power. 6

7 SO can be conducted in all environments but are particularly well suited for denied, hostile and politically sensitive environments. Special Operations can be conducted independently or in support of conventional forces, other U.S. government agencies, or partner nations and may include operations by, with, or through indigenous, insurgent, or irregular forces. 7

8 To fully understand the doctrinally definition of Special Operations we need to look at the definitions of each of the levels of war. Strategic level of war The level of war at which a nation, often as a member of a group of nations, determines national or multinational (alliance or coalition) strategic security objectives and guidance, and develops and uses national resources to achieve these objectives. Activities at this level establish national and multinational military objectives; sequence initiatives; define limits and assess risks for the use of military and other instruments of national power; develop global plans or theater war plans to achieve those objectives; and provide military forces and other capabilities in accordance with strategic plans. Operational level of war The level of war at which campaigns and major operations are planned, conducted, and sustained to achieve strategic objectives within theaters or other operational areas. Activities at this level link tactics and strategy by establishing operational objectives needed to achieve the strategic objectives, sequencing events to achieve the operational objectives, initiating actions, and applying resources to bring about and sustain these events. Tactical level of war The level of war at which battles and engagements are planned and executed to achieve military objectives assigned to tactical units or task forces. Activities at this level focus on the ordered arrangement and maneuver of combat elements in relation to each other and to the enemy to achieve combat objectives. Special Operations are tactical operations, engagements, or activities that can have an immediate effect at the operational and strategic levels of war. 8

9 Special Operations differ from conventional operations in a number of ways. They require specialized personnel and equipment along with special tactics, techniques, and procedures exceeding that resident in conventional forces. These specialized forces require regional expertise, cultural knowledge, and language skills. Many of America s Special Operations Forces are focused on a specific geographic region of the globe. The ability to speak the host nation language(s) coupled with an in depth understanding of the culture are powerful tools when trying to establish relationships, trust, and mutual respect. 9

10 Special Operations tend to accept a higher degree of physical or political risk. In many cases their objective is a high value target located in a denied area and away from friendly support bases and combat support units. Operating in small teams, Special Operations Forces will often be numerically inferior to their adversaries. This requires the implementation of risk mitigation measures into the operation. Given the situation the decision to conduct a special operation can have a high degree of political risk, but it can also reduce the chance of escalation. 10

11 Special Operations rely on a variety of unique modes of employment in order to infiltrate and exfiltrate to and from a target area undetected. Examples include freefall airborne operations which could be either high altitude high opening (HAHO) and high altitude low opening (HALO) techniques. Other modes include SCUBA operations or the use of underwater submersibles and low-level terrainfollowing fixed and rotary-wing operations. All of these different modes represent unique capabilities that are not resident in conventional forces. They require specialized equipment and training which is often of higher physical risk than that of conventional operations. 11

12 Special Operations are quite often dependent on very detailed and real-time intelligence requirements. Depending on the mission, this could include things like guard schedules, the height and thickness of walls, precise locations of both friendly and hostile forces, which way doors open and close, to name a few. The intelligence collection efforts required to conduct Special Operations against widely dispersed global terrorist threats is far different than those required in traditional warfare. In traditional warfare it takes a relatively low level of effort and resources to find the enemy but a substantial amount of resources to defeat them. Take the Cold War for example; we knew where the Soviet forces were located, their order of battle, what equipment they had, and their capabilities. They were not hard to find because they maneuvered in very large formations and quite often did not try to conceal themselves. Consequently, it took a rather low level of effort to find the enemy but a substantial effort to engage and finish them. The current campaign against violent extremist organizations is just the opposite. It requires a substantial level of effort and resources to find the target but a much smaller force to quickly conduct a finishing operation. 12

13 Special Operations are often conducted at great distances from major operating bases with operating units widely separated and disbursed across the operational area. This makes Special Operations independent from friendly support and service support and more reliant on indigenous support and assets. Because Special Operations are conducted over extended distances they require sophisticated and redundant voice, data, and video communications that can literally communicate around the world. Additionally, those systems must be compatible across the service Special Operations Forces or Special Operations information enterprise as well as with the conventional forces. 13

14 Special Operations are typically defined by one or more of the following characteristics: Low visibility or clandestine operations Conducted across the entire range of military operations Complimentary to conventional operations Often conducted by, with, or through non-u.s. forces Direct and indirect approaches 14

15 Special Operations are typically low visibility or clandestine operations. Low visibility operations incorporate actions to limit the exposure of those involved and/or their actions. Examples include the use of civilian aircraft and vehicles or unmarked Department of Defense aircraft to travel or the wearing of civilian clothes to reduce the U.S. signature. Clandestine operations are operations conducted in such a way as to assure secrecy or concealment of the operation. Clandestine operations differ from covert operations which are operations that do not necessarily hide the operation or act but rather hide the sponsor of the act. Covert operations provide the sponsor plausible denial. The Department of Defense does not typically perform covert operations. 15

16 Special Operations are conducted across the full range of military operations from peacetime engagement to major operations and campaigns. They are typically an integral part of a theater campaign plan. Although Special Operations can be conducted unilaterally in support of specific theater or national objectives, they are most often designed and conducted to support the overall success of the geographic combatant commands campaign plan. Special Operations do not substitute or compete with conventional operations but rather support and complement them. 16

17 Special Operations are often conducted using indigenous or surrogate forces. The use of non-u.s. forces has several advantages to include providing legitimacy to the operation and reaching a resolution favorable to the United States or its allies without the need for an overt U.S. conventional force commitment. The opening days of Operation ENDURING FREEDOM in Afghanistan provides a good example of the use of indigenous forces. In early October 2001 U.S. Special Operations Forces infiltrated into Afghanistan, linked up with insurgent forces of the Northern Alliance and assisted them in overthrowing the Taliban controlling the country. The initial U.S. force operating with the Northern Alliance was two teams, twenty-four men, from the Army s Fifth Special Forces Group. 17

18 Special Operations have some unique requirements. They rely on individuals and small units proficient in specialized, nonconventional combat skills applied with adaptability, improvisation, and innovation. Special Operations normally require precise tactical-level planning, detailed intelligence, and knowledge of the culture and language of the area in which the mission is to be executed. Rigorous and often unique training, along with detailed mission rehearsals, are integral to the conduct of most Special Operations. And, as previously pointed out, Special Operations often rely on the use of sophisticated or unique methods of insertion and extraction from hostile, denied, or politically sensitive areas conducted at great distances from friendly support and sanctuary. 18

19 Strategic or operational objectives are often more vulnerable to a small unit than to large conventional formations. Special Operations provide military responses that minimize political liability or risk of escalation associated with larger more visible build up and use of conventional forces. Well equipped and proficient forces can be deployed to avoid detection and failure in order to accomplish politically sensitive missions. Finally, the results of Special Operations are normally disproportionate to the size of the force employed. 19

20 Special Operations are conducted using direct and indirect approaches. Both approaches are designed to influence the behavior of adversaries. These approaches enable the full potential of Special Operations Forces capabilities. They can be applied across the range of military operations and can be employed separately, intertwined and simultaneously. How and when the approaches are applied depends on the objective or desired end-state. Keep in mind that direct and indirect approaches are activities, not people, units, or capacities. 20

21 The direct approach is a short, sharply focused offensive action to isolate and defeat a threat. Direct approaches focus on the physical or material such as a specific terrorist or critical piece of infrastructure. These activities are normally associated with violent kinetic actions and have clarity of purpose and a clearly defined aim. The direct approach is characterized by technologically-enabled small-unit precision lethality, focused intelligence, and interagency cooperation integrated on a digitallynetworked battlefield. Extreme in risk, precise in execution, and able to deliver a high payoff, the effects of the direct approach are immediate, often visible to the public and have tremendous effects on the enemies networks. They are decisive at impact but do not necessarily achieve a definite end state. 21

22 Indirect approaches are focused on the psychological. They seek to prepare, shape and influence the environment, and target the minds of an adversary and/or a population. Indirect approaches are normally much longer in duration than direct approaches, some may take decades. They are normally planned for and executed in a protracted, methodical, and deliberate manner and are often conducted by, with, or through surrogate or indigenous forces to preserve legitimacy or obscure the sponsor. Special Operations activities that support the indirect approach include training, equipping, advising, and supporting foreign or partner nation forces, Civil Affairs operations and the conduct of both tactical and strategic level information support operations and campaigns. 22

23 The Doolittle Raid conducted in the early days of World War II offers an excellent historical example of a special operation. Following the Japanese bombing of Pearl Harbor in December of 1941, Japanese forces were rampaging through the Pacific capturing Wake Island and Guam and attacking the Philippine Islands. America did not have the capability to retaliate against Tokyo. We did not have Army Air Corps bases in proximity to launch an attack on Japan and the Navy did not have the capability to get close enough to Japan to launch aircraft carrying a payload of any significance. The Japanese seemed unstoppable and American morale was severely low. In January of 1942 a project was devised to launch Army Air Corps B-25 bombers off of a Navy aircraft carrier. The objective of the project was to bomb the industrial centers of Japan. It was hoped that the damage done would be both material and psychological. Material damage was to the destruction of specific targets with ensuing confusion and retardation of production. The psychological results, it was hoped, would be the recalling of combat equipment from other theaters for home defense, thus affecting some level of relief in those theaters, the development of a fear complex in Japan, improved relationships with our allies, and a favorable reaction on the American people. 23

24 In order to meet the mission parameters the aircraft were specially modified to carry more fuel and conduct bomb targeting from 1,500 feet. To accommodate these modifications other equipment was removed, including tail guns, the lower gun turret, radios, and the normal targeting sight which weighed several hundred pounds. One of the aircraft pilots devised a simple, cheap, and lightweight targeting site to replace the normal aircraft sight. In fact the materials for the improvised sight cost only twenty cents. Another innovative idea was to replace the removed tail guns with broomsticks painted black to give the appearance of weapons. The crews were all volunteers. Initially they volunteered for a mission that would be extremely hazardous, require a high degree of skill and be of great value to the nations defense efforts. They were not told of the exact mission until they reported for training and rehearsals at Eglin Field, Florida. Once advised of the mission, they were given an opportunity to revoke their volunteer statements, but none did. The plan called for the aircraft to launch from a point 400 miles off the east coast of Tokyo just before dark, bomb at night, and then fly on to recovery fields in China. To improve bombing accuracy one plane would take off ahead of the others and fire bomb flammable areas of the city for the other planes to use as navigation aids. The plan allowed the planes to take off during daylight hours and arrive at their recovery fields in China prior to darkness. 24

25 Unfortunately the best laid plans are subject to the fogs and frictions of war. At around 0730 on the 18th of April 1942 the Naval Task Force, still some 800 miles from Japan, was spotted by a Japanese picket boat. Although the vessel was sunk by the task force, there was concern that the element of surprise might be lost. This resulted in a decision to launch the mission immediately. An immediate launch, eight to nine hours earlier than planned, would result in a daylight attack and a night time recovery in China. Both of these would significantly increase risk to the aircrews. Nevertheless, between 0820 and 0920 hours on 18 April 1942, sixteen specially modified aircraft and eighty men, five per aircraft, departed without incident from the aircraft carrier Hornet on a historic mission. Although the bombings were successfully carried out, all of the aircraft involved were lost and eleven crewmen were killed or captured. The actual physical damage caused by the bombings was negligible but the strategic effects of the mission were enormous. 25

26 From a psychological aspect the morale of the American public skyrocketed while the Japanese psyche was severely wounded. Japan s leaders believed they were invulnerable to an American attack and made the people believe they were untouchable. However, the daring daylight raid by American bombers over Tokyo shook the confidence of the Japanese people and caused doubt in their military leaders. Militarily, Japan was forced to recall some of its front line forces and instead commit them to homeland defense. These forces included Japan s main carrier battle force operating in the Indian Ocean, which was wreaking havoc against British naval forces and merchant shipping in order to extend their sea and air picket lines further out to sea. This recall removed a significant amount of pressure on British forces operations in the Indian Ocean. Additionally, the appearance of twinengine land-based bombers confused the Japanese high command about the source of the attack. It was later concluded that this strengthened Admiral Yamamoto s resolve to capture Midway Island which subsequently resulted in a decisive American victory at the battle of Midway. The Doolittle raid, which was officially named Special Aviation Project Number One, clearly fits the doctrinal definition of a special operation and demonstrated many of the characteristics of a special operation, along with some of the differences from conventional operations. It was a tactical operation to achieve strategic level objectives. It was accomplished by a small number of specially trained volunteer forces using modified equipment and tactics that were not routinely resident in the nation s conventional forces. The mission demonstrated a capability that the Japanese didn t know the United States possessed, was carried out far from friendly lines of support, had a high level of physical risk to the aircraft and crews, and the recovery phase of the operation was completely independent of friendly support relying totally on Chinese civil and military assistance. 26

27 This concludes the first lesson in the course. To sum up the lesson: Special Operations are tactical level operations best applied to achieve operational or strategic level effects. They are different from conventional operations and have unique characteristics, requirements and advantages. Special Operations are applied across the full range of military operations using both direct and indirect methods which can be applied separately, intertwined, or simultaneously. Special Operations compliment rather than substitute conventional operations and should be planned for during development of the theater campaign plan. Understanding the characteristics, attributes, and requirements of Special Operations provides a fundamental understating of the types of missions that U.S. Special Operations Forces perform. In our next lesson we will look at the command relationships and authorities in joint doctrine and apply them to Special Operations Forces. 27

LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW

LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW TASK DESCRIPTION: LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW Learn the differences between planning for a campaign in war and planning

More information

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives: TASK FORCE ASW Anti-Submarine Warfare Conceptt off Operrattiions fforr tthe 21 s st t Centturry BACKGROUND As we sail deeper into the 21 st century, Anti-Submarine Warfare (ASW) will remain a core mission

More information

U.S. HISTORY 11 TH GRADE LESSON AMERICAN INVOLVEMENT IN WORLD WAR II: THE PACIFIC THEATER 1941-1945

U.S. HISTORY 11 TH GRADE LESSON AMERICAN INVOLVEMENT IN WORLD WAR II: THE PACIFIC THEATER 1941-1945 U.S. HISTORY 11 TH GRADE LESSON AMERICAN INVOLVEMENT IN WORLD WAR II: Objectives: TEKS Social Studies US1A, US1C, US6A, US6B, US6C, US22B, US24A, US24B, US24C, US24D, US24E, US25A, US25D 1. The student

More information

Student Lesson. Iwo Jima! Where Are You? Geography Lesson

Student Lesson. Iwo Jima! Where Are You? Geography Lesson Student Lesson Geography Lesson LESSON TITLE: Iwo Jima! Where are you? GRADE LEVEL: 7 12 EALRS: Social Studies: History 1.2 analyze the historical development of events, people, places, and patterns of

More information

IAI/Malat Solutions for the Maritime Arena

IAI/Malat Solutions for the Maritime Arena IAI/Malat Solutions for the Maritime Arena Any country with a proximity to the sea has an important operational need to positively and unambiguously identify, in time, threats that originate in the maritime

More information

Marine Corps Tank Employment MCWP 3-12 (CD) Appendix F. Scout and TOW Platoons

Marine Corps Tank Employment MCWP 3-12 (CD) Appendix F. Scout and TOW Platoons Appendix F Scout and TOW Platoons Section 1. Scout Platoon Section 2. TOW Platoon F - 1 Section 1. Scout Platoon. Mission. The battalion scout platoon performs reconnaissance, provides limited security,

More information

CNO: Good morning and thank you for being here. Today we are releasing the results of the investigation into the

CNO: Good morning and thank you for being here. Today we are releasing the results of the investigation into the Riverine Command Boat Investigation Press Remarks -As Prepared- CNO: Good morning and thank you for being here. Today we are releasing the results of the investigation into the seizure of two Riverine

More information

The role of special operations in the combating terrorism

The role of special operations in the combating terrorism AARMS Vol. 7, No. 1 (2008) 47 53 SECURITY The role of special operations in the combating terrorism CSABA KOVÁCS Miklós Zrínyi National Defence University, Budapest, Hungary The Special Operations Forces

More information

Name: Date: Hour: Allies (Russia in this instance) over the Germans. Allies (British and American forces defeated German forces in Northern Africa)

Name: Date: Hour: Allies (Russia in this instance) over the Germans. Allies (British and American forces defeated German forces in Northern Africa) Name: Date: Hour: World War II Use your textbook and other sources to complete the chart below regarding the significant events that took place during World War II. Answer the questions that follow in

More information

Foreign Affairs and National Security

Foreign Affairs and National Security Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Welcome to the Introduction to Special Operations Forces lesson on Joint command and control and Special Operations Command relationships.

Welcome to the Introduction to Special Operations Forces lesson on Joint command and control and Special Operations Command relationships. Welcome to the Introduction to Special Operations Forces lesson on Joint command and control and Special Operations Command relationships. In this lesson we will define the different levels of joint command

More information

ARSOF Conventional Army Integration: An Army perspective on integration and synergies in the current and future environment

ARSOF Conventional Army Integration: An Army perspective on integration and synergies in the current and future environment ARSOF Conventional Army Integration: An Army perspective on integration and synergies in the current and future environment -LTG John F. Mulholland Commanding General, United States Army Special Operations

More information

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime

More information

Name. September 11, 2001: A Turning Point

Name. September 11, 2001: A Turning Point Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point

More information

Army Doctrine Update

Army Doctrine Update Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near

More information

The Implication of TMD System in Japan to China s Security

The Implication of TMD System in Japan to China s Security The Sixth ISODARCO Beijing Seminar on Arms Control October 29-Novermber 1, 1998 Shanghai, China The Implication of TMD System in Japan to China s Security Institute of World Economics & Politics Chinese

More information

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. ADP 3-0 UNIFIED LAND OPERATIONS OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army

More information

Gary, thank you for that kind introduction and for hosting this very important gathering.

Gary, thank you for that kind introduction and for hosting this very important gathering. Remarks as delivered by Admiral Mike Mullen Western Pacific Naval Symposium Pearl Harbor, Hawaii 31 October 2006 It is nice to be back in Hawaii and very special. One of the ships that I had the fortune

More information

Chief of Naval Operations Adm. Jonathan Greenert. National Defense College of the Philippines. 13 February 2014

Chief of Naval Operations Adm. Jonathan Greenert. National Defense College of the Philippines. 13 February 2014 Chief of Naval Operations Adm. Jonathan Greenert National Defense College of the Philippines 13 February 2014 Adm. Greenert: I m very honored to be here. All I had to do was show up and I get a medallion

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)

More information

Newport RI Naval history

Newport RI Naval history Newport RI Naval history During the years of the Newport s heavy involvement in the Triangular Trade, the English considered establishing a navy yard at Newport. Robert Melville was hired to conduct a

More information

U.S. Coast Guard. America s Maritime Guardian

U.S. Coast Guard. America s Maritime Guardian U.S. Coast Guard America s Maritime Guardian Nov. 2009 A few armed vessels, judiciously stationed at the entrances of our ports, might at a small expense be made useful sentinels of the laws. Alexander

More information

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft COJUMA s Legal Considerations for Defense Support to Civil Authorities U.S. Southern Command 28 Miami, Florida Miami, Florida Draft Table of Contents Legal Considerations for Defense Support to Civil Authorities.....10

More information

Statement of. Vice Admiral William A. Brown, United States Navy. Deputy Commander, United States Transportation Command

Statement of. Vice Admiral William A. Brown, United States Navy. Deputy Commander, United States Transportation Command Statement of Vice Admiral William A. Brown, United States Navy Deputy Commander, United States Transportation Command Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces

More information

How Waves Helped Win the War: Radar and Sonar in WWII

How Waves Helped Win the War: Radar and Sonar in WWII The Science and Technology of WWII How Waves Helped Win the War: Radar and sonar in WWII Objectives: 1. Students will learn some basic historical facts about the role of radar in the Battle of Britain

More information

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces STATEMENT OF GENERAL JAMES L. JONES, USMC COMMANDER, UNITED STATES EUROPEAN COMMAND BEFORE THE HOUSE ARMED SERVICES COMMITTEE ON APRIL 7, 2006 A Commander s Perspective on Building the Capacity of Foreign

More information

ALLIED MARITIME COMMAND

ALLIED MARITIME COMMAND ALLIED MARITIME COMMAND MARCOM/N350/NSC Vision Iss 1 01 Oct 2015 The NATO Shipping Centre Strategic Vision THE NATO SHIPPING CENTRE (NSC) STRATEGIC VISION OCT 2015 I. Background The NATO Shipping Centre

More information

COMBATSS-21 Scalable combat management system for the world s navies

COMBATSS-21 Scalable combat management system for the world s navies COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

AeroVironment, Inc. Unmanned Aircraft Systems Overview Background

AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment is a technology solutions provider with a more than 40-year history of practical innovation in the fields of unmanned aircraft

More information

Flexible, Life-Cycle Support for Unique Mission Requirements

Flexible, Life-Cycle Support for Unique Mission Requirements Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics

More information

CHAPTER 7. AIRSPACE 7.1 AFFECTED ENVIRONMENT

CHAPTER 7. AIRSPACE 7.1 AFFECTED ENVIRONMENT CHAPTER 7. AIRSPACE 7.1 AFFECTED ENVIRONMENT 7.1.1 Definition of Resource Airspace management is defined as directing, controlling, and handling flight operations in the volume of air that overlies the

More information

SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY. " 166c. Geographic combatant commander's authority to transfer excess defense articles

SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY.  166c. Geographic combatant commander's authority to transfer excess defense articles SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY GEOGRAPHIC COMBATANT COMMANDERS. 1 7 8 9 10 11 1 1 1 1 1 17 18 19 0 1 (a) IN GENERAL. Chapter of title 10, United States Code, is amended by inserting

More information

Covert Operations: Kill Chain Actions using Security Analytics

Covert Operations: Kill Chain Actions using Security Analytics Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special

More information

Horn of Africa: Threat Factors for Commercial Shipping and Forecast of Pirate Activity Through 2009

Horn of Africa: Threat Factors for Commercial Shipping and Forecast of Pirate Activity Through 2009 Horn of Africa: Threat Factors for Commercial Shipping and Forecast of Pirate Activity Through 2009 Scope Note This assessment of factors affecting pirate success and the ability of commercial vessels

More information

White Paper: Cyber Hawk or Digital Dove

White Paper: Cyber Hawk or Digital Dove White Paper: Cyber Hawk or Digital Dove Published By: SkillBridge, LLC September 18, 2013 Today s Modern Warfare With the recent debate over whether or not the United States should take military action

More information

Support to Civil Administration

Support to Civil Administration Chapter 11 Support to Civil Administration Support to civil administration is the most specialized CA supporting mission. CA commands and brigades are organized to support civil administration in support

More information

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE TACTICAL AIR AND LAND FORCES SUBCOMMITTEE COMMITTEE ON ARMED SERVICES

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE TACTICAL AIR AND LAND FORCES SUBCOMMITTEE COMMITTEE ON ARMED SERVICES DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE TACTICAL AIR AND LAND FORCES SUBCOMMITTEE COMMITTEE ON ARMED SERVICES UNITED STATES HOUSE OF REPRESENTATIVES SUBJECT: FORCE PROTECTION ISSUES STATEMENT OF:

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

PUSD High Frequency Word List

PUSD High Frequency Word List PUSD High Frequency Word List For Reading and Spelling Grades K-5 High Frequency or instant words are important because: 1. You can t read a sentence or a paragraph without knowing at least the most common.

More information

While interagency education and training have long been staples of the intelligence and

While interagency education and training have long been staples of the intelligence and Navigating Interagency Education and Training Courses by John Dyson While interagency education and training have long been staples of the intelligence and law enforcement communities, such efforts are

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109)

Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109) August 17, 2004 Acquisition Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109) Department of Defense Office of the Inspector General Quality

More information

THE PATH TO BECOMING A MARINE CORPS AVIATOR

THE PATH TO BECOMING A MARINE CORPS AVIATOR THE PATH TO BECOMING A MARINE CORPS AVIATOR Every journey starts with a first step. Your first step in making a decision to join the ranks of the elite starts here. By reviewing the information in this

More information

Explain the image using visual clues to develop informative explanations of images

Explain the image using visual clues to develop informative explanations of images Teacher Guide TT targeted adaptable Primary Intermediate Middle Senior 4 4 Explain the image using visual clues to develop informative explanations of images Learning outcomes understand the basic contents

More information

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE COMMITTEE ON ARMED SERVICES PROJECTION FORCES SUBCOMMITTEE

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE COMMITTEE ON ARMED SERVICES PROJECTION FORCES SUBCOMMITTEE DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE COMMITTEE ON ARMED SERVICES PROJECTION FORCES SUBCOMMITTEE UNITED STATES HOUSE OF REPRESENTATIVES SUBJECT: TANKER RECAPITALIZATION STATEMENT OF: LIEUTENANT

More information

Rear Admiral Rempt is a 1966 graduate of the U.S. Naval Academy. Initial assignments included deployments to Vietnam aboard USS Coontz (DLG 9) and

Rear Admiral Rempt is a 1966 graduate of the U.S. Naval Academy. Initial assignments included deployments to Vietnam aboard USS Coontz (DLG 9) and Rear Admiral Rempt is a 1966 graduate of the U.S. Naval Academy. Initial assignments included deployments to Vietnam aboard USS Coontz (DLG 9) and USS Somers (DDG 34). He later commanded USS Antelope (PG

More information

CARVER+Shock Vulnerability Assessment Tool

CARVER+Shock Vulnerability Assessment Tool Published by: Government Training Inc. ISBN: 978-09832361-7-7 CARVER+Shock Vulnerability Assessment Tool A Six Step Approach to Conducting Security Vulnerability Assessments on Critical Infrastructure

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

MacArthur Memorial Education Programs

MacArthur Memorial Education Programs MacArthur Memorial Education Programs World War II Primary Resources Flag Raising on Iwo Jima, February 23, 1945 Background President Woodrow Wilson described World War I as the war to end all wars. In

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

New Modular Tactical Vest improves Marines combat effectiveness

New Modular Tactical Vest improves Marines combat effectiveness MTV New Modular Tactical Vest improves Marines combat effectiveness Dedra Jones, Corporate Communications, USMC, June 2009 Rather than waiting for the next generation of body armor in the years to come,

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

The Terrain and Tactics of If You Survive

The Terrain and Tactics of If You Survive The Terrain and Tactics of If You Survive Mechelle Rouchon Course: History 498 Instructor: Dr. Harry Laver Assignment: Analysis First Lieutenant George Wilson served in the U.S. Army during the last, but

More information

APPLICATION FOR COMBAT-RELATED SPECIAL COMPENSATION (CRSC)

APPLICATION FOR COMBAT-RELATED SPECIAL COMPENSATION (CRSC) APPLICATION FOR COMBAT-RELATED SPECIAL COMPENSATION (CRSC) PRIVACY ACT STATEMENT AUTHORITY: 10 U.S.C. 1413a, E.O. 9397, November 1943 (SSN), PDUSD(P&R) Memorandum (May 21, 2003), Subject: Combat-Related

More information

FDR Birth Announcement. Franklin Delano Roosevelt was born on January 30, 1882 to James Roosevelt and Sara Delano Roosevelt at their home in Hyde

FDR Birth Announcement. Franklin Delano Roosevelt was born on January 30, 1882 to James Roosevelt and Sara Delano Roosevelt at their home in Hyde FDR Birth Announcement. Franklin Delano Roosevelt was born on January 30, 1882 to James Roosevelt and Sara Delano Roosevelt at their home in Hyde Park, New York. This whimsical birth announcement was found

More information

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 NATO is anything but obsolete. It is needed more now than at any point since the end

More information

Trends in US foreign policy before 1900

Trends in US foreign policy before 1900 Trends in US foreign policy before 1900 Instances of the Use of U.S. Armed forces the 19 th and 20th Centuries Scope N.A. C-L.A. AF ME-CA Asia Europe Pac Total 1801-1900 2 7 3 0 4 1 6 23 1901-2000 1 8

More information

p o i n t s o f i n t e r e s t

p o i n t s o f i n t e r e s t p o i n t s o f i n t e r e s t The Air Force Officer Development Program: What s It All About? By Major Jamie Davidson and Major Rainer Wosnitza Major Bobby Orzechowski, during an instructional strategies

More information

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps QUICKSTART RULES The actual rules of Terror Network are a little more involved, but here is a simplified rules section to get you started. Terror Network puts you into the role of a counter-terrorism agent.

More information

Holloman Air Force Base Mission and Flying Operations

Holloman Air Force Base Mission and Flying Operations Holloman Air Force Base Mission and Flying Operations Holloman Air Force Base Mission and Flying Operations Col. Andrew Croft, 49th Wing Commander, will discuss Holloman Air Force Base's mission and aircraft,

More information

The National Counterintelligence Strategy of the United States

The National Counterintelligence Strategy of the United States The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence

More information

60 Years Later, Navy Man and Tragic Plane Crash Remembered

60 Years Later, Navy Man and Tragic Plane Crash Remembered 60 Years Later, Navy Man and Tragic Plane Crash Remembered By Dave Trojan, Aviation Historian, davidtrojan@earthlink.net John (Jack) Staples US Navy, photo courtesy Staples Family Navy P2V Neptune Patrol

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 2311.01E May 9, 2006 Incorporating Change 1, November 15, 2010 Certified Current as of February 22, 2011 GC, DoD SUBJECT: DoD Law of War Program References: (a) DoD

More information

Operation IMPACT (Injured Military Pursuing Assisted Career Transition)

Operation IMPACT (Injured Military Pursuing Assisted Career Transition) Operation IMPACT (Injured Military Pursuing Assisted Career Transition) January 2013 Operation IMPACT Program Management Office Northrop Grumman Today Leading global security company providing innovative

More information

United States of America Nuclear Regulatory Commission Office of Nuclear Material Safety and Safeguards William F. Kane, Director

United States of America Nuclear Regulatory Commission Office of Nuclear Material Safety and Safeguards William F. Kane, Director DD-01-01 United States of America Nuclear Regulatory Commission Office of Nuclear Material Safety and Safeguards William F. Kane, Director In the Matter of U.S. DEPARTMENT OF DEFENSE Docket No. 030-28641

More information

DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000

DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 5000 Ser NOO / )00063 21 May 10 MEMORANDUM FOR DISTRIBUTION From: Subj: Ref: Encl: Chief of Naval Operations

More information

INFANTRY RIFLE PLATOON AND SQUAD

INFANTRY RIFLE PLATOON AND SQUAD INFANTRY RIFLE PLATOON AND SQUAD HEADQUARTERS DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION Approved for public release; distribution is unlimited. C1, fm 7-8 1 March 2001 By Order of the Secretary of

More information

Training NATO for an uncertain future: An interview with Major General Erhard Bühler

Training NATO for an uncertain future: An interview with Major General Erhard Bühler 25 Neil Webb Training NATO for an uncertain future: An interview with Major General Erhard Bühler In facing potential threats, being lean and agile will be critical. Wolff Sintern Major General Erhard

More information

Joint Publication 3-13.3. Operations Security

Joint Publication 3-13.3. Operations Security Joint Publication 3-13.3 Operations Security 04 January 2012 PREFACE 1. Scope This publication provides joint doctrine for planning, executing, and assessing operations security in joint operations. 2.

More information

Chapter 2 Strengthening of the Japan-U.S. Alliance

Chapter 2 Strengthening of the Japan-U.S. Alliance Chapter 2 Strengthening of the Japan-U.S. Alliance Based on the Japan U.S. Security Treaty, the Japan-U.S. Security Arrangements, together with Japan s own efforts, constitute the cornerstone for Japan

More information

SENTINEL INVESTIGATORS GROUP. On Board Security Service

SENTINEL INVESTIGATORS GROUP. On Board Security Service SENTINEL INVESTIGATORS GROUP On Board Security Service AGENDA About us Scope of Service On Board Security Service Our People Our Training Center Your Benefit ABOUT US The founding of SENTINEL Investigators

More information

Military Reliability Modeling William P. Fox, Steven B. Horton

Military Reliability Modeling William P. Fox, Steven B. Horton Military Reliability Modeling William P. Fox, Steven B. Horton Introduction You are an infantry rifle platoon leader. Your platoon is occupying a battle position and has been ordered to establish an observation

More information

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School.

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School. DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON. D.C. 20350 1000 SECNAVINST 1524.2B DASN (MPP) October 27, 2005 SECNAV INSTRUCTION 1524.2B From: Subj: Secretary of the Navy

More information

ITEM FOR FINANCE COMMITTEE

ITEM FOR FINANCE COMMITTEE For discussion on 12 June 2009 FCR(2009-10)24 ITEM FOR FINANCE COMMITTEE HEAD 166 - GOVERNMENT FLYING SERVICE Subhead 603 Plant, vehicles and equipment New Item Replacement of two fixed-wing aircraft and

More information

A Leader Development Strategy for a 21 st Century Army

A Leader Development Strategy for a 21 st Century Army A Leader Development Strategy for a 21 st Century Army 25 November 2009 At the intersection of globalization, environmental calamity, resource scarcity, demographic strain, and international political

More information

Information Management for National Guard Agribusiness Development Teams: An Agile Development Case Study

Information Management for National Guard Agribusiness Development Teams: An Agile Development Case Study Information Management for National Guard Agribusiness Development Teams: An Agile Development Case Study Authors: Lynndee Kemmet, Network Science Center at West Point; Ray McGowan, Army CERDEC; C. Reed

More information

Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.

Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc. Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc. Executive Summary IFONE provides securable private cellular networks. It presents this paper

More information

Command and Staff College Distance Education Program (CSCDEP)

Command and Staff College Distance Education Program (CSCDEP) Command and Staff College Distance Education Program (CSCDEP) By Gina Douthit U.S. Marine Corps (USMC) Security Cooperation Training and Education Center What do you do when you can only send 20% of Marine

More information

CHAPTER 5 LOGISTICS AND TRAINING

CHAPTER 5 LOGISTICS AND TRAINING CHAPTER 5 LOGISTICS AND TRAINING UAV units use components that are common throughout the Army, such as transport vehicles, communications equipment, generators, and camouflage. However, due to the UAVs

More information

GOOD SECURITY IS A GROUP EFFORT

GOOD SECURITY IS A GROUP EFFORT THE OFFICE OF SECURITY Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT Operations Security (OPSEC) "Even minutiae should have a place in our collection, for things of a seemingly trifling nature,

More information

The National Security Act of 1947 July 26, 1947

The National Security Act of 1947 July 26, 1947 The National Security Act of 1947 July 26, 1947 Public Law 253, 80th Congress; Chapter 343, 1st Session; S. 758. AN ACT To promote the national security by providing for a Secretary of Defense; for a National

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5132.13 January 9, 2009 USD(P) SUBJECT: Staffing of Security Cooperation Organizations (SCOs) and the Selection and Training of Security Cooperation Personnel References:

More information

NATIONAL REPORT 2005/2006 DENMARK

NATIONAL REPORT 2005/2006 DENMARK NATIONAL REPORT 2005/2006 DENMARK INTRODUCTION All initiatives by the Danish Armed Forces (DAF) in connection with new policies, recruitment, training and career development are based on all personnel

More information

PRISONER P-09 FREE INFINITY MISSION DOWNLOAD BEASTSOFWAR.COM

PRISONER P-09 FREE INFINITY MISSION DOWNLOAD BEASTSOFWAR.COM PRISONER P-09 FOR MORE INFO. ABOUT INFINITY VISIT: WWW.INFINITYTHEGAME.COM ALL NAMES, TRADEMARKS, & IMAGES ARE COPYRIGHT OF THEIR RESPECTIVE OWNERS. MISSION OBJECTIVES Prisoner P-09, an agent possessing

More information

CHAPTER 6 NAVAL ORGANIZATION

CHAPTER 6 NAVAL ORGANIZATION CHAPTER 6 NAVAL ORGANIZATION Organization is the element of administration which entails the orderly arrangement of materials and personnel by functions in order to attain the objective of the unit. Organization

More information

FACT SHEET. General Information about the Defense Contract Management Agency

FACT SHEET. General Information about the Defense Contract Management Agency FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory

More information

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours Bergen Community College Division of Business, Social Science and Criminal Justice and Homeland Security Department of Criminal Justice and Homeland Security Master Course Syllabus Course Title: HSE-101

More information

Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career

Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career Chad Storlie Author, Iraq Combat Veteran, Business Leader www.combattocorporate.com

More information

Long Term Defence Study

Long Term Defence Study Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1 Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges

More information

Part III - Administrative, Procedural, and Miscellaneous. Tax Relief for Those Involved in Operation Enduring Freedom.

Part III - Administrative, Procedural, and Miscellaneous. Tax Relief for Those Involved in Operation Enduring Freedom. Part III - Administrative, Procedural, and Miscellaneous Tax Relief for Those Involved in Operation Enduring Freedom Notice 2002-17 PURPOSE This notice provides guidance in a question and answer format

More information

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,

More information

WORLD WAR 2 Political and economic conditions in Europe and throughout the world after World War 1 led directly to World War 2:

WORLD WAR 2 Political and economic conditions in Europe and throughout the world after World War 1 led directly to World War 2: Political and economic conditions in Europe and throughout the world after World War 1 led directly to World War 2: 1. The Treaty of Versailles, ending World War 1, was particularly harsh on Germany and

More information

Tactical Combat Casualty Care: A Brief History. Dr. Frank Butler 7 August 2015

Tactical Combat Casualty Care: A Brief History. Dr. Frank Butler 7 August 2015 Tactical Combat Casualty Care: A Brief History Dr. Frank Butler 7 August 2015 Disclaimer The opinions or assertions contained herein are the private views of the authors and are not to be construed as

More information

Response to the Defence Issues Paper

Response to the Defence Issues Paper LIBERAL NATIONAL PARTY DEFENCE AND VETERANS AFFAIRS POLICY COMMITTEE Response to the Defence Issues Paper LNP Defence and Veterans Affairs Policy Committee submission 2 4 November, 2014 Defence White Paper

More information

FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards 2025. Projecting maritime power to protect and promote our nation s interests

FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards 2025. Projecting maritime power to protect and promote our nation s interests FUTURE NAVY VISION The Royal Navy Today, Tomorrow and Towards 2025 Projecting maritime power to protect and promote our nation s interests The Royal Marine Commandos - The UK s specialist amphibious force.

More information

TEACHER S KEY SESSION 1. THE WORLD BEFORE THE GREAT WAR. PRETASK. 3. Pre- listening.

TEACHER S KEY SESSION 1. THE WORLD BEFORE THE GREAT WAR. PRETASK. 3. Pre- listening. TEACHER S KEY SESSION 1. THE WORLD BEFORE THE GREAT WAR. PRETASK 3. Pre- listening. 1. Before 1914, the nations of Europe were involved in a race to obtain overseas colonies all over the world, mainly

More information