… Since the Cold War there have been three global … stay at home, socially distance, wash hands, control coughing and … for urgent reassessment of vulnerability, The Australian, 13 March …
Operational Analysis of the Battle of Tora Bora, Afghanistan, 2001
… The Battle of Tora Bora was a US led assault on the Tora … border. The battle was one of the opening stages of … ://fas.org/irp/congress/2009_rpt/torabora.pdf [7] …
Clausewitz and Centres of Gravity: Turning the Esoteric Into Practical Outcomes
… Introduction Clausewitz’s On War is a monumental military … into a general philosophy of war, Clausewitz swept a broad but … we attack are Critical Vulnerabilities. Note that we are not …
Drone Wars, AI and the Future of Unmanned Battlefield Systems
… The future of war is entering a transitory … since the end of the Second World War and the dawning of the Atomic … the early 2000s were not answerable to Big Air Force, and thus …
… the problem is concomitantly rewarded when a problem is simplified, and inched toward solutions, through … depends? What critical vulnerabilities are present in the …
Interchangeability – Driving Radical Reform in Defence
… – the ambition to improve interoperability between Australia and its … as the Five Eyes [FVEY] nations) was enduring. It’s hard to recall … ASPI has plenty of examples. We want a new helicopter, but rather …
… the SOPMOD kit [i] ). The M4 was 29.5-33 inches long, had a … SOPMOD M4A1 on deployment in Kuwait. They had never been fans of … which coincidentally has desirable terminal ballistics [xvi] …
In this long, well researched and very informative read, Peter Milani gives us some intelligent insight into Autonomous Weapon Systems (AWS) and what they could mean for the Australian Defence Force (ADF).
Quantum Command Posts: Tactical Decision at Machine Speed
… heel‘ The tactical level of war is the culminating point of … while obviating singular vulnerabilities. However, balancing the … post is enshrined in foundation warfighting doctrine as an …