… truism that 'any enemy… will always seek to dislocate our critical capabilities' . Digitisation is an imperative across … hardware presents a massive vulnerability against a technically …
Operational Analysis of the Battle of Tora Bora, Afghanistan, 2001
… The Battle of Tora Bora was a US led assault on the Tora … not pursue Bin Laden without damaging relations with the fighters … ://fas.org/irp/congress/2009_rpt/torabora.pdf [7] …
… Since the Cold War there have been three global … Defeat of COVID-19 is a strategic end for Australia and the … for urgent reassessment of vulnerability, The Australian, 13 March …
Clausewitz and Centres of Gravity: Turning the Esoteric Into Practical Outcomes
… Introduction Clausewitz’s On War is a monumental military … is a tough read, and many give up early on – it is perhaps … we attack are Critical Vulnerabilities. Note that we are not …
Drone Wars, AI and the Future of Unmanned Battlefield Systems
… The future of war is entering a transitory … maritime environment while bringing complexity and lethality to … the early 2000s were not answerable to Big Air Force, and thus …
… an organised, empowered and collegiate planning team deliberately … the problem is concomitantly rewarded when a problem is … depends? What critical vulnerabilities are present in the …
Interchangeability – Driving Radical Reform in Defence
… – the ambition to improve interoperability between Australia and its … as the Five Eyes [FVEY] nations) was enduring. It’s hard to recall … same, the training systems, the logistics regime, the language of …
… like armoured crewman and logisticians and a modular short … the SOPMOD kit [i] ). The M4 was 29.5-33 inches long, had a … which coincidentally has desirable terminal ballistics [xvi] …
… worth the cost? If the purpose of war is to “'impose one’s will on … of people. Australia is vulnerable to such disruption, and as … The levels of autonomy given on page 27 of the RASS, …
Quantum Command Posts: Tactical Decision at Machine Speed
… heel‘ The tactical level of war is the culminating point of … while obviating singular vulnerabilities. However, balancing the … are currently equipped with digital battle-management systems …