Information Attack is defined by the USAF as either "directly corrupting adversary information without changing visibly the physical entity in which it resides." or "activities taken to manipulate or destroy an adversary's information without visibly changing the physical entity within which it resides." This essay argues that the proper understanding and future development of information attack, based on USAF information warfare competencies and systems, is the key to information dominance. It is likewise argued that a central obstacle to a future information warfare capability is that the...
Information Attack is defined by the USAF as either "directly corrupting adversary information without changing visibly the physical entity in which i...
The threat to Earth due to the impact of an Earth-crossing asteroid or comet is not new, but scientists have only recently recognized it as a continuing threat. The past ten years reveal several frightening near misses, and "hits" by bodies too small to survive long enough in the atmosphere to cause damage. The hazard created when an object strikes Earth varies greatly, from a minimum of no damage due to the object's destruction in the atmosphere to a maximum of millions of deaths, extinction of species, and an end to present civilization. While the potential hazard is great, the probability...
The threat to Earth due to the impact of an Earth-crossing asteroid or comet is not new, but scientists have only recently recognized it as a continui...
During the Civil War some of the earliest examples of joint operations in American Military history were undertaken. Except for General Scott's landing at Veracruz during the War with Mexico, joint undertakings in the form of amphibious operations were rare. Army and navy commanders had little experience dealing with the problems associated with the ideas of jointness. Doctrinal guidance was unavailable and commanders worked together often with mixed results. In eastern North Carolina, the Union attempted several joint operations during the course of the war. Attacks were crudely planned and...
During the Civil War some of the earliest examples of joint operations in American Military history were undertaken. Except for General Scott's landin...
The objective of this book is to examine how the Union and Confederate naval strategies and new naval technologies affected the conduct of the American Civil War. With regard to the Union Navy's strategy, the effectiveness of the blockade, Western River Campaign, and amphibious operations were examined. Discussions on the Union blockade also touch on the effectiveness on Confederate blockade runners. The Confederate strategies of using privateers and commerce raiders are examined. Confederate coastal and river defenses are examined within the context of new technology, specifically with...
The objective of this book is to examine how the Union and Confederate naval strategies and new naval technologies affected the conduct of the America...
The United States is vulnerable to attacks from cyberterrorists. A "Digital World Trade Center Attack," possibly killing thousands and causing billions of dollars in damage. This paper will provide fundamental background information on what cyberterror is and what it means. It also presents a model to understand the anatomy of cyberterrorism, describing some real-world cyber events, assesses cyberterrorist capabilities, and finally makes specific recommendations for improvement in cyber security.
The United States is vulnerable to attacks from cyberterrorists. A "Digital World Trade Center Attack," possibly killing thousands and causing billion...
Using a review of current print and electronic media, this research paper explores the role of ethnic interest groups in shaping U.S. foreign policy. In particular, the paper looks at the increased political power wielded by America's ethnic population based on both their increasing percentage of the overall population and the growing sophistication of their lobbying efforts. The experiences of Jewish- and Irish-Americans are used as examples of successful group influence. These successes are contrasted against the initial failures of two other groups, Armenian- and Arab-Americans, to...
Using a review of current print and electronic media, this research paper explores the role of ethnic interest groups in shaping U.S. foreign policy. ...
This book develops a compelling case for a national space vision to advance the American vital interests of prosperity and security. The first half of book focuses on laying the background for the vision that follows in the second half. In the title, prosperity is listed before security since it is the reason for exploration and eventually requires protection. The book begins with the premise that space is becoming an information center of gravity that is increasingly important to the commercial sector as well as the military. However, a major stumbling block in this transition is the lack of...
This book develops a compelling case for a national space vision to advance the American vital interests of prosperity and security. The first half of...
The US bomber force faces a significant modernization challenge. As the weapon of choice for rapidly projecting national resolve over intercontinental distances, the bomber force must prepare for the future by establishing a wide array of capabilities across the entire spectrum of conflict. However, our current modernization process is bogged down in a short-view, threat-based planning cycle. Instead, bomber modernization must come to grips with a wide range of requirements addressing future conflict. These essential requirements which stem from a series of military studies and vision...
The US bomber force faces a significant modernization challenge. As the weapon of choice for rapidly projecting national resolve over intercontinental...