While this is neither the first nor the last word on why and how to gain cognitive advantage, it aims to take an integrated view, provide a geo-strategic context, broaden and heighten awareness, frame policy issues, offer preliminary advice ...
This volume represents an early attempt at assessing the Long War, now in its 14th year.
The national security system has an authority problem.
Indeed, the chapters of this book suggest the emergence of a highly adaptive and parasitic alternative ecosystem, based on criminal commerce and extreme violence, with little regard for what we commonly conceive of as the public interest or ...
This volume is about applications of the biological sciences, here called "biologically inspired innovations," to the military.
This publication gives a history of biological warfare (BW) from the prehistoric period through the present, with a section on the future of BW. The publication relies on works by historians who used primary sources dealing with BW. In ...
The relative ease of a catastrophic bio-weapons attack against the American food and agriculture infrastructure, and the devastating economic and social consequences of such an act, demand that the Nation pursue an aggressive, focused, ...
If this book assists future military and civilian decisionmakers, it will have achieved its goal. The book is divided in this manner: chapter one focuses on the early, pre-Surge years in both campaigns.
The Center for Complex Operations (CCO) has produced this edited volume, Convergence: Illicit Networks and National Security in the Age of Globalization, that delves deeply into everything mentioned above and more.
China's People's Liberation Army (PLA) has embarked on its most wide-ranging and ambitiousrestructuring since 1949, including major changes to most of its key organizations.
Current United States counterinsurgency (COIN) doctrine espoused in Army Field Manual (FM) 3-24 Counterinsurgency is inadequate for the realities of the complex security environment that exist in the world today.
The authors present arguments about the role that technology and science will play within the international scene and globalization corridor as a way to develop a national security strategy for years to come.
Illicit networks affect everyone in our modern, globalized world.
This book includes papers presented at the Third International Transformation (ITX3) Conference and Workshop on Leader Development, held in Washington, DC, at the National Defense University (NDU) on June 19-20, 2013, as well as a summary ...
The pace of U.S.-India defense cooperation over the past decade-and especially the past2 years-has been unprecedented and impressive in many areas.
How did the fall of Saddam Hussein's regime look from the Iraqi perspective? That question triggered the Iraqi Perspectives Project (IPP), sponsored by U.S. Joint Forces Command and the National Intelligence Council.