… article ' The V-Twin Effect' , I described in detail how the … to thoughtfully iterate towards a distinct innovation … has since gained quite considerable interest and traction within …
… commitment of Main Effort and Reserves, enable deception at all … truism that 'any enemy… will always seek to dislocate our … hardware presents a massive vulnerability against a technically …
Path to the Gallipoli Campaign | Part 5: The Landing and Beyond
… ordered to penetrate the Dardanelles Strait passage and 'run amok' in the Sea of Marmara. It was the first submarine to do so … failed on 17 August 1915. Considerable casualties have been …
Operational Analysis of the Battle of Tora Bora, Afghanistan, 2001
… The Battle of Tora Bora was a US led assault on the Tora … battle was one of the opening stages of the invasion of Afghanistan … ://fas.org/irp/congress/2009_rpt/torabora.pdf [7] …
… Since the Cold War there have been three global crises: the 9/11 terror attacks of … for urgent reassessment of vulnerability, The Australian, 13 March …
… This article describes five ideas for planning … the problem is concomitantly rewarded when a problem is … depends? What critical vulnerabilities are present in the …
Interchangeability – Driving Radical Reform in Defence
… – the ambition to improve interoperability between Australia and its close allies (typically described as the Five Eyes [FVEY] nations) was enduring. It’s hard to recall …
… F88SA1/2 From about 1990, Colt designed a shorter version of the … the SOPMOD kit [i] ). The M4 was 29.5-33 inches long, had a … which coincidentally has desirable terminal ballistics [xvi] …
Quantum Command Posts: Tactical Decision at Machine Speed
… increasingly be seen as an Achilles heel‘ The tactical level of war is the culminating point of … while obviating singular vulnerabilities. However, balancing the …
Electronic Warfare – Threat from a Command Post Perspective
… expect to have unimpeded access to the Electro Magnetic … shown clearly that Electronic Warfare (EW) can be synchronised … operators’ behalf is a key vulnerability in protecting our use of …