• Home
  • Search
  • Browse Publications
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
USAWC Press US Army War College
  • Home
  • About
  • FAQ
  • My Account

Home > Monographs

Monographs, Books, & Publications

 
Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.

Follow

Switch View View Slideshow
 
  • What Next for Russia’s Front-Line States? by Keir Giles Mr.

    What Next for Russia’s Front-Line States?

    Keir Giles Mr.


    Russia’s annexation of Crimea and intervention in Eastern Ukraine in 2014, alarmed not only Western-leaning states in Central Europe and the Baltic but also Moscow’s traditional allies. These events signaled that Moscow is now willing and capable of using direct military force against perceived strategic threats in its self-proclaimed region of vested interests. With the exception of Ukraine and the Baltic States, this Letort Paper examines how Russia’s front-line states have adjusted their foreign policy posture since 2014. Belarus, Moldova, the states of Central Asia and the South Caucasus calculate the benefits and risks in their relationship with Moscow and either make concessions or strengthen their defenses accordingly to avoid triggering a Russian reaction. This Letort Paper provides a range of policy recommendations intended to maximize the opportunities of a new alignment with the West for these states while minimizing the risk of Russia, using again, those capabilities it has demonstrated in Ukraine and Syria.

  • Implications of Service Cyberspace Component Commands for Army Cyberspace Operations by Jeffrey L. Caton Mr.

    Implications of Service Cyberspace Component Commands for Army Cyberspace Operations

    Jeffrey L. Caton Mr.

    The first 7 years of U.S. Cyber Command operations are paved with milestones that mark the steady operationalization of modern cyberspace as the newest domain of military conflict as well as a realm of international power. The creation of the Cyber Mission Force and Joint Force Headquarters-Cyber are significant steps toward improving the timeliness and effectiveness of cyberspace operations that directly support combatant commands and the whole-of-government responses to cyberspace threats. It focuses on the central question: “What is the context in which different military services approach cyberspace component operations internally as well as with the Department of Defense?”

  • Contemporary Chemical Weapons Use in Syria and Iraq by the Assad Regime and the Islamic State by Robert J. Bunker Dr.

    Contemporary Chemical Weapons Use in Syria and Iraq by the Assad Regime and the Islamic State

    Robert J. Bunker Dr.

    This monograph focuses on an understudied, but yet a critically important and timely component of land warfare, related to the battlefield use of chemical weapons by contemporary threat forces. It will do so by focusing on two case studies related to chemical weapons use in Syria and Iraq by the Assad regime and the Islamic State. Initially, the monograph provides an overview of the chemical warfare capabilities of these two entities; discusses selected incidents of chemical weapons use each has perpetrated; provides analysis and lessons learned concerning these chemical weapons incidents, their programs, and the capabilities of the Assad regime and the Islamic State; and then presents U.S. Army policy and planning considerations on this topical areas of focus. Ultimately, such considerations must be considered vis-à-vis U.S. Army support of Joint Force implementation of National Command Authority guidance.

  • Examining the Roles of Army Reserve Component Forces in Military Cyberspace Operations by Jeffrey L. Caton Mr.

    Examining the Roles of Army Reserve Component Forces in Military Cyberspace Operations

    Jeffrey L. Caton Mr.

    Cyberspace operations have become pervasive in the United States, and they enable many aspects of modern life for the average citizen, such as entertainment, communication, education, transportation, banking, and voting. The continuing development of the U.S. Army and Department of Defense (DoD) Reserve component cyberspace units can leverage the capabilities and experience of industry and academia to help protect critical information infrastructure and enhance national security. What opportunities and challenges surround the integration of these forces into a still-evolving joint cyberspace force?

  • Scenario Planning and Strategy in the Pentagon by Michael Fitzsimmons Dr.

    Scenario Planning and Strategy in the Pentagon

    Michael Fitzsimmons Dr.

    Scenario planning should be one of the Pentagon’s most important tools for developing strategy for an uncertain future. However, the formalized joint scenario planning process to support strategy and force development—Support for Strategic Analysis—has faced many challenges over the past 2 decades, and has ultimately proven less influential than intended on strategic decision-making. Explaining why is the main purpose of this monograph. It argues that scenario analysis has been most effective in supporting capability and program development, while it has fallen short in shaping strategy and force structure. The reasons for this are numerous and are rooted in intrinsic, structural characteristics of decision-making in large organizations. The monograph concludes with several recommendations for rejuvenating scenario planning in the Pentagon.

  • The U.S. Army in the Iraq War – Volume 1: Invasion – Insurgency – Civil War, 2003-2006 by Joel D. Rayburn COL and Frank K. Sobchak COL

    The U.S. Army in the Iraq War – Volume 1: Invasion – Insurgency – Civil War, 2003-2006

    Joel D. Rayburn COL and Frank K. Sobchak COL

    The Iraq War has been the costliest U.S. conflict since the Vietnam War. To date, few official studies have been conducted to review what happened, why it happened, and what lessons should be drawn. The U.S. Army in the Iraq War is the Army’s initial operational level analysis of this conflict, written in narrative format, with assessments and lessons embedded throughout the work. This study reviews the conflict from a Landpower perspective and includes the contributions of coalition allies, the U.S. Marine Corps, and special operations forces. Presented principally from the point of view of the commanders in Baghdad, the narrative examines the interaction of the operational and strategic levels, as well as the creation of theater level strategy and its implementation at the tactical level. Volume 1 begins in the truce tent at Safwan Airfield in southern Iraq at the end of Operation DESERT STORM and briefly examines actions by U.S. and Iraqi forces during the interwar years. The narrative continues by examining the road to war, the initially successful invasion, and the rise of Iraqi insurgent groups before exploring the country’s slide toward civil war. This volume concludes with a review of the decision by the George W. Bush administration to “surge” additional forces to Iraq, placing the conduct of the “surge” and its aftermath in the second volume.

    This study was constructed over a span of 4 years and relied on nearly 30,000 pages of hand-picked declassified documents, hundreds of hours of original interviews, and thousands of hours of previously unavailable interviews. Original interviews conducted by the team included President George W. Bush, Secretary of State Condoleezza Rice, Secretaries of Defense Leon Panetta and Robert Gates, Chairmen of the Joint Chiefs of Staff, and every theater commander for the war, among many others. With its release, this publication, The U.S. Army in the Iraq War, represents the U.S. Government’s longest and most detailed study of the Iraq conflict thus far.

    NOTICE: Due to the high cost of printing, only a limited numbers of hard copies of The U.S. Army in the Iraq War will be produced. These copies will be distributed primarily to military educational institutions across the Joint force. Hardcopies of the study can be acquired through the Government Printing Office Bookstore. Organizations and individuals will be able to order printed copies. Both volumes of The U.S. Army in the Iraq War are available for pre-order through the GPO Bookstore. Volume 1 can be found here. And Volume 2 can be found here.

    ADDENDUM: The U.S. Army Heritage and Education Center (USAHEC) has no archive of declassified documents except for the declassified documents from U.S. Central Command (USCENTCOM) posted online here. USAHEC does not have the authority to declassify or to review OIF sources for release.

  • Maneuvering the Saudi-Iranian Rivalry in the Middle East: How the United States Can Preserve and Protect Its Long-Term Interests in the Region by Gregory Aftandilian Mr.

    Maneuvering the Saudi-Iranian Rivalry in the Middle East: How the United States Can Preserve and Protect Its Long-Term Interests in the Region

    Gregory Aftandilian Mr.

    This monograph examines the conflicts in the Middle East region between Saudi Arabia and Iran and the so-called proxy wars that are being fought between them, and discusses ways that the United States needs to maneuver carefully in this struggle to preserve its long-term interests in the area. Although Washington has political, economic, and strategic equities with Riyadh, it needs to think carefully about being perceived as engaging in sectarian strife that would alienate Shia allies in Iraq, show bias in its human rights policy, and anger millions of Iranian young people who want better relations with the United States.

  • Creating Great Expectations: Strategic Communications and American Airpower by Conrad C. Crane Dr.

    Creating Great Expectations: Strategic Communications and American Airpower

    Conrad C. Crane Dr.

    Americans have always been uniquely attracted to airpower, a fact that has been successfully exploited by generations of U.S. Air Force leaders in information campaigns. But as a result, the nation has often entered conflicts with exorbitant expectations about what airpower could actually accomplish, creating unique challenges in strategic communications when promises did not match reality, especially in recent conflicts. Adaptive enemies have also become very adept at using their own carefully crafted information campaigns to counter what is America’s greatest asymmetric advantage on the battlefield.

  • Silent Partners: Organized Crime, Irregular Groups, and Nation-States by Shima D. Keene Dr.

    Silent Partners: Organized Crime, Irregular Groups, and Nation-States

    Shima D. Keene Dr.

    The U.S. Army increasingly faces adversaries that are difficult to define. The threat landscape is further complicated by the silent partnership between criminal organizations, irregular groups, and nation-states. This collaboration, whatever its exact nature, is problematic, because it confounds understanding of the adversary, making existing countermeasures less effective, and thus directly challenging U.S. national security interests. Military action taken without full appreciation of the dynamics of the nature of these relationships is likely to be ineffective at best or suffer unintended consequences. This monograph provides a comprehensive assessment of the threat to U.S. national security interests posed by the silent partners, as well as how the vulnerabilities of the relationships could be exploited to the advantage of the U.S. Army.

  • Assessing the Collective Security Treaty Organization: Capabilities and Vulnerabilities by Richard Weitz Dr.

    Assessing the Collective Security Treaty Organization: Capabilities and Vulnerabilities

    Richard Weitz Dr.


    Russia has strengthened its military position in Central Asia and the South Caucasus through a combination of bilateral and multilateral initiatives. The Collective Security Treaty Organization (CSTO) has become the most important multilateral defense structure in the former Soviet Union and is an essential instrument in Russia’s resurgence. The CSTO has expanded its missions, authorities, and capabilities. However, it faces both internal and external challenges, especially debilitating divisions among its members.

  • Maintaining Information Dominance in Complex Environments by John A. S. Ardis Dr. and Shima D. Keene Dr.

    Maintaining Information Dominance in Complex Environments

    John A. S. Ardis Dr. and Shima D. Keene Dr.

    There are many risks to the U.S. Army’s command and control (C2) operations and to its intelligence and information warfare (IW) capabilities. The challenges include: significant uncertainty; sudden unexpected events; high noise and clutter levels in intelligence pictures; basic and complex deceptions exercised through a variety of channels; the actions of hidden malign actors; and novel forms of attack on U.S. and allied command, control, communications, computers, information/intelligence, surveillance, targeting acquisition, and reconnaissance (C4ISTAR) systems. If the U.S. Army is to secure and maintain information dominance in all environments, it must exploit complexity and uncertainty in the battlespace and not simply seek to overcome it. Innovation requires that new ideas are considered, and that old ideas should be robustly challenged. To achieve and maintain information dominance, the U.S. Army will also require a significant injection of innovation, a robust and resilient C2 and intelligence capability, novel technologies and an accelerated information operations capability development program that is broad, deep, sustained and well-coordinated. Furthermore, once information dominance is achieved, maintaining it will demand continuous change and development.

  • The Relevance of the European Union and the North Atlantic Treaty Organization for the United States in the 21st Century by Joel R. Hillison Dr.

    The Relevance of the European Union and the North Atlantic Treaty Organization for the United States in the 21st Century

    Joel R. Hillison Dr.

    The “America First” approach to foreign policy seems to call into question the value of institutions like the North Atlantic Treaty Organization (NATO) and the European Union (EU). However, in a more competitive and uncertain strategic environment, NATO and the EU remain vital to promoting U.S. interests.

  • Exit Strategy: Rule of Law and the U.S. Army by Shima D. Keene Dr.

    Exit Strategy: Rule of Law and the U.S. Army

    Shima D. Keene Dr.

    Establishing the rule of law is a key goal and end state in counterinsurgency (COIN) operations and is a critical aspect of securing peace and preventing future conflict. However, recent experience in theaters such as Afghanistan has shown that establishing effective rule of law institutions and practices is not a straightforward task. Consequently, considerations as to how and when rule of law institutions can start to be developed and integrated into the stability transition process must not only be planned in advance, but also form part of the U.S. Army’s strategy from the start of any military intervention. The analysis provided in this monograph will assist the U.S. Army, and more broadly the Departments of Defense and State, in better facilitating a seamless rebalancing from military to police functions in post-conflict environments, and to ensure that sustainable and effective rule of law interventions are delivered as part of an exit strategy.

  • The Dual-System Problem in Complex Conflicts by Robert D. Lamb Dr. and Melissa R. Gregg Ms.

    The Dual-System Problem in Complex Conflicts

    Robert D. Lamb Dr. and Melissa R. Gregg Ms.

    Conflict and fragile environments are increasingly complex and unpredictable, but the U.S. policy system itself is much more complex and unpredictable than most leaders appreciate. In this monograph, the authors argue that until we get a grasp on this “dual-system problem,” the United States will fall further and further behind in its strategic ambitions.

  • A Security Role for the United States in a Post-ISIS Syria? by Gregory Aftandilian Mr.

    A Security Role for the United States in a Post-ISIS Syria?

    Gregory Aftandilian Mr.

    Syria has become one of the most vexing and complex problems for U.S. strategic planners in recent times. Currently, the United States has about 2,000 troops in the northeastern part of the country whose primary mission has been to aid the Syrian Democratic Forces (SDF), made up primarily of Kurds and some Arab tribesmen, to fight ISIS. The near total defeat of ISIS in Syria, especially with the fall of its so-called caliphate capital in Raqqa in October 2017, might seem to suggest that the military mission is coming to an end and, therefore, the United States should pull out its troops. Indeed, President Donald Trump stated publicly in late March 2018, that he wanted these troops to come home “very soon.” However, since that time, the U.S. President has backtracked from this statement after receiving advice from several of his top military advisers, including Defense Secretary James Mattis, some foreign leaders like French President Emanuel Macron and Israeli Prime Minister Benjamin Netanyahu, and influential members of Congress, such as Senator Lindsey Graham, all of whom have recommended that the President keep these troops in Syria.

  • Impacts of Anti-Access/Area Denial Measures on Space Systems: Issues and Implications for Army and Joint Forces by Jeffrey L. Caton Mr.

    Impacts of Anti-Access/Area Denial Measures on Space Systems: Issues and Implications for Army and Joint Forces

    Jeffrey L. Caton Mr.

    The 2018 National Defense Strategy and National Space Strategy both reaffirm the vital interests that the United States has in the domain of space. However, space remains an inherently hostile environment that has become congested, contested, and competitive among the nations. What are ways for the U.S. Army to assure the success of its space-dependent warfighting functions in an anti-access/area denial (A2/AD) environment where space systems are degraded for significant periods of time?

  • New Directions in Just-War Theory by J. Toby Reiner Dr.

    New Directions in Just-War Theory

    J. Toby Reiner Dr.

    One of the major developments in international law since World War II is the growth of human rights law dedicated to ensuring the protection of individuals from violence wherever they are, including from their own state. Tracking such changes, in recent decades, just-war theory has evolved from its traditional focus on state sovereignty in the direction of a rights-based approach that treats just wars as a form of global law enforcement. This monograph provides a survey of these developments, focusing on the increased scope for humanitarian intervention, principles of justice after war, and on the question of the responsibility of combatants for assessing the justice of their military's cause. It concludes by considering the call for strengthening international institutions and training programs in military ethics.

  • Friendly Force Dilemmas in Europe: Challenges Within and Among Intergovernmental Organizations and the Implications for the U.S. Army by Jose Luis Calvo Albero Colonel, Angus McAfee Colonel, Stefano Messina Colonel, and Kirk Gallinger Colonel

    Friendly Force Dilemmas in Europe: Challenges Within and Among Intergovernmental Organizations and the Implications for the U.S. Army

    Jose Luis Calvo Albero Colonel, Angus McAfee Colonel, Stefano Messina Colonel, and Kirk Gallinger Colonel

    After a period of stability, the transatlantic community is facing considerable challenges in maintaining European security. Russia’s efforts to destabilize Europe, terrorism, climate change, energy insecurity, migration, fracturing European identity, and the reemergence of nationalist populism challenge the ability of European institutions to perform their central functions. Different visions for Europe’s future and the lack of a shared threat perception add to these dilemmas.

    The U.S. military can help to shape these “friendly force dilemmas” by influencing European actors and institutions, promoting positive change through the U.S. interagency, and providing capabilities to tackle the theater-specific challenges.

  • Robotics and Military Operations by William G. Braun Prof., Stéfanie von Hlatky Dr., and Kim Richard Nossal Dr.

    Robotics and Military Operations

    William G. Braun Prof., Stéfanie von Hlatky Dr., and Kim Richard Nossal Dr.

    In the wake of two extended wars, Western militaries find themselves looking to the future while confronting amorphous nonstate threats and shrinking defense budgets. The 2015 Kingston Conference on International Security (KCIS) examined how robotics and autonomous systems that enhance soldier effectiveness may offer attractive investment opportunities for developing a more efficient force capable of operating effectively in the future environment. This monograph offers 3 chapters derived from the KCIS and explores the drivers influencing strategic choices associated with these technologies and offers preliminary policy recommendations geared to advance a comprehensive technology investment strategy. In addition, the publication offers insight into the ethical challenges and potential positive moral implications of using robots on the modern battlefield.

  • The Land, Space, and Cyberspace Nexus: Evolution of the Oldest Military Operations in the Newest Military Domains by Jeffrey L. Caton Mr.

    The Land, Space, and Cyberspace Nexus: Evolution of the Oldest Military Operations in the Newest Military Domains

    Jeffrey L. Caton Mr.

    Over the last century, the domains of air, space, and cyberspace have joined the traditional warfighting domains of land and sea. While the doctrine for land operations is relatively mature, the doctrine for space and cyberspace continue to evolve, often in an unstructured manner. This monograph examines the relationships among these domains and how they apply to U.S. Army and joint warfighting. It concentrates on the central question: How are U.S. military operations in the newest domains of space and cyberspace being integrated with operations in the traditional domain of land? This inquiry is divided into three major sections:

    • Existing Doctrine: This section presents an overview of the current state of joint and U.S. Army doctrinal development
    for each of the domains of land, space, and cyberspace.

    • Operations in Multiple Domains: This section examines the concept of cross-domain synergy and its ability to enhance
    globally integrated operations.

    • Future Operations: This section explores probable future operating environments as well as the resulting implications for
    U.S. Army and joint force development. It includes recommendations for policymakers and senior leaders regarding the future
    development and integration of space and cyberspace doctrine.

    Anticipated future trends favor the decreased emphasis on traditional large-scale land operations and increased frequency and intensity of conflict in space and cyberspace, perhaps even where these newer domains may become preeminent for a given operation. The joint staff’s pursuit of achieving cross-domain synergy in planning and operations offers a credible method to face some of the challenges of the future joint force, but this will likely remain an evolutionary vice revolutionary endeavor.

  • Still Soldiers and Scholars? An Analysis of Army Officer Testing by Steven J. Condly, Arthur T. Coumbe Dr., and William L. Skimmyhorn Lieutenant Colonel

    Still Soldiers and Scholars? An Analysis of Army Officer Testing

    Steven J. Condly, Arthur T. Coumbe Dr., and William L. Skimmyhorn Lieutenant Colonel

    Still Soldiers and Scholars? sheds light on a neglected aspect of talent management, namely, officer accessions testing and evaluation. It does so by tracing the history of officer testing since 1900, identifying and analyzing key developments in the assessment process, and then offering recommendations about how the Army should revise its approach to officer testing. This book supplements a series of monographs written by the Army’s Office of Economic and Manpower Analysis (OEMA) and published by the Strategic Studies Institute (SSI) in 2009 and 2010. In those monographs, the authors proposed an officer corps strategy based on the theory of talent management. This book is a necessary first step in reforming the Army’s officer accessions effort in order to better align it with the Army’s talent-based approach to officer management.

  • Armed Robotic Systems Emergence: Weapons Systems Life Cycles Analysis and New Strategic Realities by Robert J. Bunker Dr.

    Armed Robotic Systems Emergence: Weapons Systems Life Cycles Analysis and New Strategic Realities

    Robert J. Bunker Dr.

    Armed robotic systems—drones and droids—now emerging on the battlefield portend new strategic realities not only for U.S. forces but also for our allies and future potential belligerents. Numerous questions of immediate warfighting importance come to mind with the fielding of these drones and droids that are viewed as still being in their experimental and entrepreneurial stage of development. By drawing upon historical weapons systems life cycles case studies, focusing on the early 9th through the mid-16th-century knight, the mid-19th through the later 20th-century battleship, and the early 20th through the early 21st-century tank, the monograph provides military historical context related to their emergence, and better allows both for questions related to warfighting to be addressed, and policy recommendations related to them to be initially provided.

  • Evaluation of the 2015 DoD Cyber Strategy: Mild Progress in a Complex and Dynamic Military Domain by Jeffrey L. Caton Mr.

    Evaluation of the 2015 DoD Cyber Strategy: Mild Progress in a Complex and Dynamic Military Domain

    Jeffrey L. Caton Mr.

    In 2011, the Department of Defense (DoD) released its Strategy for Operating in Cyberspace, which officially recognized cyberspace as an operational domain akin to the traditional military domains of land, sea, air, and space. This monograph examines the 2015 DoD Cyber Strategy to evaluate how well its five strategic goals and associated implementation objectives define an actionable strategy to achieve three primary missions in cyberspace: defend the DoD network, defend the United States and its interests, and develop cyber capabilities to support military operations. This monograph focuses on events and documents from the period of about 1 year before and 1 year after the 2015 strategy was released. This allows sufficient time to examine the key policies and guidance that influenced the development of the strategy as well as follow-on activities for the impacts from the strategy. This inquiry has five major sections that utilize different frameworks of analysis to assess the strategy:
    1. Prima Facie Analysis: What is its stated purpose and key messages?
    2. Historical Context Analysis: What unique contributions does it introduce into the evolution of national security cyberspace activities?
    3. Traditional Strategy Analysis: Does it properly address specific DoD needs as well as broader U.S. ends in a way that is appropriate and actionable?
    4. Analysis of Subsequent DoD Action: How are major military cyberspace components—joint and Service—planning to implement these goals and objectives?
    5. Whole of U.S. Government Analysis: Does it integrate with the cyberspace-related activities of other U.S. Government departments and agencies?
    The monograph concludes with a section that integrates the individual section findings and offers recommendations to improve future cyberspace strategic planning documents.

  • Terrorist Sanctuary in the Sahara: A Case Study by Joseph Guido Lieutenant Colonel

    Terrorist Sanctuary in the Sahara: A Case Study

    Joseph Guido Lieutenant Colonel

    The idea to deny sanctuary to terrorist groups lies at the heart of contemporary U.S. counterterrorism strategy. Violent extremist organizations in North Africa, most notably the group al-Qaeda in the Islamic Maghreb (AQIM), have used remote and sparsely populated areas in the Sahara for protection from security forces to perform a range of activities such as training, planning, and logistics in order to conduct terrorist operations like kidnapping, murder, and bombing. Even after 16 years since the September 11 attacks and the resources dedicated to efforts to deny sanctuary, the concept of sanctuary remains largely unexplored. To deny sanctuary requires an understanding of what sanctuary is as an object and how sanctuary is used by terrorist organizations. This monograph proposes a functional understanding of sanctuary and offers fresh ideas to control sanctuary using a detailed case study of the most notorious of the North African terrorists, Mokhtar Belmokhtar, from his arrival to Mali in the late 1990s until the French intervention in early 2012. This multi-disciplinary inquiry utilizes a wide range of open-source documents as well as anthropological, sociological, and political science research, including interviews with one-time Belmokhtar hostage, Ambassador Robert Fowler, in order to construct a picture of what a day in the life of sanctuary-seeking terrorists is like. Belmokhtar and other violent groups remain active and at large in the Sahara in spite of a large French military presence, a small U.S. military presence, and local security forces conducting counterterrorism and counterinsurgency operations. Additionally, the Islamic State movement could be viewed as the emergence of mega sanctuaries for terrorists and other violent extremist organizations. These threats require a new strategy to isolate, contain, or defeat terrorists and violent extremists in their sanctuary areas.

  • Closer Than You Think: The Implications of the Third Offset Strategy for the U.S. Army by Samuel R. White

    Closer Than You Think: The Implications of the Third Offset Strategy for the U.S. Army

    Samuel R. White

    The Defense Innovation Initiative (DII), begun in November 2014 by former Secretary of Defense Chuck Hagel, is intended to ensure U.S. military superiority throughout the 21st century. The DII seeks broad-based innovation across the spectrum of concepts, research and development, capabilities, leader development, wargaming, and business practices. An essential component of the DII is the Third Offset Strategy—a plan for overcoming (offsetting) adversary parity or advantage, reduced military force structure, and declining technological superiority in an era of great power competition.
    This study explored the implications for the Army of Third Offset innovations and breakthrough capabilities for the operating environment of 2035-2050. It focused less on debating the merits or feasibility of individual technologies and more on understanding the implications—the second and third order effects on the Army that must be anticipated ahead of the breakthrough.

 

Page 2 of 37

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
 
 

Search

Advanced Search

  • Notify me via email or RSS

Browse

  • Publications
  • Subjects
  • Authors

Author Corner

  • Author FAQ
  • Policies
 
Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright