… the importance of each soldier understanding the principles … doctrine, they may find that Land Warfare Doctrine (LWD) 3-9-1 … is also necessary. Interoperability is not necessarily doing …
… (a derivative of Design Thinking) Disciplined Entrepreneurship Each … to thoughtfully iterate towards a distinct innovation … has since gained quite considerable interest and traction within …
… of battle management system - dismounted (BMS-D), a 'Missing … truism that 'any enemy… will always seek to dislocate our … hardware presents a massive vulnerability against a technically …
… Since the Cold War there have been three global … and now coronavirus. Each has radically disrupted the … for urgent reassessment of vulnerability, The Australian, 13 March …
… application of asymmetric space warfare by nonstate actors will … Professor of Leadership Studies, USAF ACSC Diverse, … Rocket Anti-Satellite , Los Alamos: Los Alamos National …
Operational Analysis of the Battle of Tora Bora, Afghanistan, 2001
… The Battle of Tora Bora was a US led assault on the Tora … they were unknown to most, including those in high office. This … ://fas.org/irp/congress/2009_rpt/torabora.pdf [7] …
Clausewitz and Centres of Gravity: Turning the Esoteric Into Practical Outcomes
… take to the field, the addition of one more cannot be … Introduction Clausewitz’s On War is a monumental military … we attack are Critical Vulnerabilities. Note that we are not …
Drone Wars, AI and the Future of Unmanned Battlefield Systems
… The future of war is entering a transitory … all the military domains, including cyber-attack and space … the early 2000s were not answerable to Big Air Force, and thus …
… enhance collective understanding and develop actionable … the problem is concomitantly rewarded when a problem is … depends? What critical vulnerabilities are present in the …
… Army in Motion, Accelerated Warfare and Good Soldiering , … shielding friendly vulnerabilities and defeating the … is when, in our exuberance, calamitous decisions are made. …