Searched over 21.6 Million titles in 0.17 seconds
Please wait while the eBook Finder searches for your request. Searching through the full text of 2,850,000 books. Full Text searches may take up to 1 min.
My interest in the center of gravity (COG) concept began in the Republic of Singapore when I noticed with some amusement that a concept which purports to help campaign planners focus their main effort can be embroiled in such controversy and confusion. I attempt to unravel some of the mystique that surrounds the employment of the COG concept. Hopefully, by drawing out the potential sources of confusion that often accompany the use of the concept, we can soften the difficulties of communication and shift the focus of our arguments in a direction that will be more profitable to all....
Unfortunately, the existence of command, control, communications, and intelligence (C3I) structures, mechanisms, systems, and capabilities does not guarantee success. Major Orr attacks the basic problem of producing a conceptual model of the combat operations process. Only after he establishes the context, a paradigm of warfare based on classical literature, does he discuss the appropriate C3I architecture that will yield the desired results. In a larger sense, Major Orr’s study is an attempt to redefine the nature of modern technology-intensive warfare. This is a broad and contentious problem. While the reader may not agree with all of Major Orr’s assumptions and conclusions, this larger effort is vital to the American military’s capability to cope successfully with a rapidly changing and increasingly dangerous world. In this larger sense, the importance of Major Orr’s study goes far beyond the particular problems of C3I....
I COMBAT OPERATIONS . . . . . . . . . . . . . . . 1 Sun Tzu . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Objectives of War . . . . . . . . . . . . . . . . . 2 Civil-Military Relationships . . . . . . . . . . 2 Principles of War . . . . . . . . . . . . . . . . . 3 Tactical Principles . . . . . . . . . . . . . . . . 4 Carl von Clausewitz . . . . . . . . . . . . . . . . . 6 Andre Beaufre . . . . . . . . . . . . . . . . . . . . . 14 The American Style of War . . . . . . . . . . . . 22 The Traditional Approach . . . . . . . . . . . 22 Maneuver Warfare . . . . . . . . . . . . . . . . 24 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 II C3I AND THE COMBAT OPERATIONS PROCESS . . . . . . . . . . . . . . . . . . . . . . . .31 Command, Control, Communications, and Intelligence (C3I) . . . . . . . . . . . . . . . . . . .31 The Combat Operations Process Model . . . .34 Expansion of the Process Model Functions . .37 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 III COMMAND OF THE COMBAT OPERATIONS PROCESS . . . . . . . . . . . . . . . . . . . . . . . . 61 The Purpose of Command . . . ....
A comparison of the Misty and A-10 FAC missions clearly demonstrates a failure of the USAF to develop a full range of suitable tactics for the direct attack of enemy fielded forces. Although the quantum leaps in weapons delivery accuracy from Vietnam to Kosovo now make it possible to destroy armor and artillery from the air, there has not been a corresponding improvement in target identification. Until USAF prioritizes the direct attack of ground forces and target identification, its ability to attack fielded forces effectively will remain limited. Drawing from the lessons of the Misty and A-10 FACs, the recommendations presented here focus on equipment, tactics and training, and doctrine....
1 INTRODUCTION . . . . . . . . . . . . . . . . . . . 1 2 HISTORY OF AIR INTERDICTION FROM WORLD WAR I THROUGH VIETNAM . . . . . . . 7 3 MISTY-FAC TACTICS: HYPOTHETICAL MISSION . . . . . . . . . . . . . . . . . . . . . . . . 23 4 HISTORY OF ATTACKING FIELDED FORCES: POST-VIETNAM TO KOSOVO . . . . . . . . . . . .41 5 A-10 FORWARD AIR CONTROLLER TACTICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 6 CONCLUSION. . . . . . . . . . . . . . . . . . . . .79...
PART I Space Organization, Doctrine, and Architecture 1 An Aerospace Strategy for an Aerospace Nation . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Stephen E. Wright 2 After the Gulf War: Balancing Space Power’s Development . . . . . . . . . . . . . . . . . . . 63 Frank Gallegos 3 Blueprints for the Future: Comparing National Security Space Architectures . . . . . . . . . . 103 Christian C. Daehnick PART II Sanctuary/Survivability Perspectives 4 Safe Heavens: Military Strategy and Space Sanctuary . . . . . . . . . . . . . . . . . . . . . 185 David W. Ziegler PART III Space Control Perspectives 5 Counterspace Operations for Information Dominance . . . . . . . . . . . . . . . . . . . . 249 James G. Lee 6 When the Enemy Has Our Eyes . . . . . . . 303 Cynthia A. S. McKinley PART IV High-Ground Perspectives 7 National Security Implications of Inexpensive Space Access . . . . . . . . . . . . . . . . . . . 365 William W. Bruner III 8 Concepts of Operations for a Reusable Launch Space Vehicle . . . . . . . . . . . . . . . 437 Michael A. Rampino 9 The Inherent Limitations of Space Power: Fact or Fiction...
Information technology (IT) and its gadgets provide no allure. They are neither a marvel nor a toy but exist solely to help get something done. This impassive attitude allows me to avoid capability hype with what IT can do and ask “So, what does IT really do for me?” This attitude is partly due to my mechanical engineering background and to the practical systems engineering philosophies instilled in me by my father. I have successfully exploited IT capabilities to perform engine cold-start analyses, design coal crushers, train missile crews, simulate radar satellite constellations, track satellite parts and construction practices, and create intelligence fusion software. But with each success made possible through IT came scores of frustrations that sprang from IT solutions. While writing this paper I came to realize that this frustration comes from man having to manipulate IT rather than applying it as an extension of oneself. This fundamental disconnect between capability and utility comes from disconnects between developers and users, institutional restrictions on individual innovation, and general ignorance of available tools, p...