This Strategic Master Plan (SMP) translates the United States Air Force’s 30-year strategy, America’s Air Force: A Call to the Future, into comprehensive guidance, goals, and objectives. The complete SMP consists of a core narrative, goals, objectives. and four annexes: the Human Capital Annex (HCA), Strategic Posture Annex (SPA), Capabilities Annex (CA), and the Science and Technology Annex (STA). The core SMP will be updated every two years, while the annexes may be revised annually. as required. The SMP’s primary audience includes the Headquarters Air Force (HAF) staff, the Air Force Major Commands (MAJCOMs), and the Core Function Leads (CFLs) that reside within the MAJCOMs who are responsible for planning, progran1ming and budgeting. However, guidance in the SMP also serves as authoritative· direction for all Air Force programs and Flight Plans.
The Islamic State of Iraq and the Levant (ISIL) has risen to prominence as a danger to peace and a regional threat with global impact. This perception comes, in large measure, because of its successes in Syria and then a rapid takeover of northern Iraq. Its military victories are largely due to successful recruiting, intra-insurgent conflict, large cash reserves, and ineffective opponents. There is much to learn from how ISIL is fighting. The ready availability of recruits, many of whom are foreigners attracted to ISIL successes, and large amounts of money for payroll and purchasing war materiel are critical considerations, but it is also important to consider how ISIL is fighting on the ground.
The Assessing Revolutionary and Insurgent Strategies (ARIS) series consists of a set of case studies and research conducted for the US Army Special Operations Command by the National Security Analysis Department of The Johns Hopkins University Applied Physics Laboratory. The purpose of the ARIS series is to produce a collection of academically rigorous yet operationally relevant research materials to develop and illustrate a common understanding of insurgency and revolution. This research, intended to form a bedrock body of knowledge for members of the Special Forces, will allow users to distill vast amounts of material from a wide array of campaigns and extract relevant lessons, thereby enabling the development of future doctrine, professional education, and training.
FM 3-18 is the principal manual for Special Forces (SF) doctrine. It describes SF roles, missions, capabilities, organization, mission command, employment, and sustainment operations across the range of military operations. This manual is a continuation of the doctrine established in the JP 3-05 series, ADP 3-05, ADRP 3-05, and FM 3-05.
The United Arab Emirates Cultural Field Guide is designed to provide deploying military personnel an overview of UAE’s cultural terrain. In this field guide, UAE’s cultural history has been synopsized to capture the more significant aspects of the country’s cultural environment, with emphasis on factors having the greatest potential to impact operations.
This handbook provides basic reference information on the United Arab Emirates, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to the United Arab Emirates.
This handbook provides basic reference information on Egypt, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Egypt.
The Egypt Cultural Field Guide is designed to provide deploying military personnel an overview of Egypt’s cultural terrain. In this field guide, Egypt cultural history has been synopsized to capture the more significant aspects of the Egypt cultural environment, with emphasis on factors having the greatest potential to impact operations.
This handbook provides basic reference information on Guatemala, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Guatemala.
TRADOC Pamphlet 525-3-1 describes how future Army forces, as part of joint, interorganizational, and multinational efforts, operate to accomplish campaign objectives and protect U.S. national interests. It describes the Army’s contribution to globally integrated operations, and addresses the need for Army forces to provide foundational capabilities for the Joint Force and to project power onto land and from land across the air, maritime, space, and cyberspace domains. The Army Operating Concept guides future force development through the identification of first order capabilities that the Army must possess to accomplish missions in support of policy goals and objectives.
In concert with other agencies, the United States’ Department of Defense (DoD) is responsible for defending the U.S. homeland and U.S. interests from attack, including attacks that may occur in cyberspace. In a manner consistent with U.S. and international law, the Department of Defense seeks to deter attacks and defend the United States against any adversary that seeks to harm U.S. national interests during times of peace, crisis, or conflict. To this end the Defense Department has developed capabilities for cyber operations and is integrating those capabilities into the full array of tools that the United States government uses to defend U.S. national interests, including diplomatic, informational, military, economic, financial, and law enforcement tools.
Special Operations Command Central Multi-Method Assessment of the Islamic State of Iraq and the Levant
Early in 2014, as it became clear that the rise of the so-called “Islamic State” was becoming a significant menace to Regional Stability and US Interests, SOCCENT began a dialogue with Dr. Hriar Cabayan and his co-workers regarding a topic that has been at the core of the struggle against Violent Extremism. That question has been, and remains today, a perplexing one for those of us from Western cultures and societies: “What precisely are we contesting, and what is it that fuels the adversary’s power?” The contents of this paper reflect some of the work that Dr. Cabayan and his colleagues are doing to help us understand and comprehend this “intangible power” across a unique enterprise of academicians, scientists, policy intellectuals, current and former Foreign Service, military, and intelligence professionals. Most importantly, their efforts to improve our comprehension will enable us to adjust our efforts, our operations, our investments, and our risk-‐calculations to more effectively contest it and the organization that wields it. I am grateful for their tireless work in this regard, and I commend it to the reader.
Supervisors and coworkers are willing to report on behaviors that have a clear connection to security, such as transmitting classified documents to unauthorized personnel, but they are unwilling to report on colleagues’ personal problems, such as alcohol abuse. Because it was difficult to discern which reporting requirements were clearly related to security, there was very little reporting. PERSEREC, in collaboration with counterintelligence professionals, developed a clear, succinct list of “Coworker Reporting Essentials” (CORE) behaviors that could pose a possible threat to national security and thus should be reported if observed. The draft CORE was reviewed and edited by counterintelligence professionals at the Counterintelligence Field Activity (CIFA), and was coordinated by the DoD Investigative Working Group (IWG).
The world is evolving into an increasingly interconnected environment. The Army of 2020 will operate in a complex world where cloud-based computers receive data from tens of billions of devices. These computers will have the capacity to digest, correlate, contextualize, process and then present data back to humans in a way that assists our decision-making process. The Army is modernizing its network to prepare for the impending data-driven, cloud-based world, as depicted in Figure 1. While legacy networking architectures stored and protected data locally, cloud-based architectures will store and protect data in a centralized yet distributed repository that enables global access. The Army Network Campaign Plan outlines current efforts that posture the Army for success in a cloud-based world.
Radicalization is the process by which an individual, group, or mass of people undergo a transformation from participating in the political process via legal means to the use or support of violence for political purposes (radicalism). Radicalism includes specific forms, such as terrorism, which is violence against the innocent bystander, or insurgency, which is violence against the state. It does not include legal and/or nonviolent political protest, such as protest that is more properly called activism.
This handbook provides basic reference information on Mozambique, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Mozambique.
The Gabon Cultural Field Guide is designed to provide deploying military personnel an overview of Gabon’s cultural terrain. In this field guide, Gabon’s cultural history has been synopsized to capture the more significant aspects of the country’s cultural environment, with emphasis on factors having the greatest potential to impact operations.
Cloud computing technology and services provide the Department of Defense (DoD) with the opportunity to deploy an Enterprise Cloud Environment aligned with Federal Department-wide Information Technology (IT) strategies and efficiency initiatives, including federal data center consolidation. Cloud computing enables the Department to consolidate infrastructure, leverage commodity IT functions, and eliminate functional redundancies while improving continuity of operations. The overall success of these initiatives depends upon well executed security requirements, defined and understood by both DoD Components and industry. Consistent implementation and operation of these requirements assures mission execution, provides sensitive data protection, increases mission effectiveness, and ultimately results in the outcomes and operational efficiencies the DoD seeks.
Mauritania is the westernmost country in the Sahel region. Its location between Arab-influenced North Africa and Sub-Saharan Africa has created some ethnic divides and tensions between people of Arab origin and the indigenous populations. In other cases, the population has become united under a common belief; nearly all Mauritanians are Muslim. Most of the country is desert, making life in Mauritania difficult. In the past, northern populations were nomadic herders and the southern populations were sedentary farmers. Many continue these lifestyles today, but desertification and droughts have severely reduced the amount of fertile land in Mauritania.This has hurt herders and farmers. Many have had to abandon their lifestyles to attempt make a living in the cities. As a result, most Mauritanian cities are overcrowded and have high unemployment rates.