Operational Analysis of the Battle of Tora Bora, Afghanistan, 2001
… The Battle of Tora Bora was a US led assault on the Tora … border. The battle was one of the opening stages of … ://fas.org/irp/congress/2009_rpt/torabora.pdf [7] …
Clausewitz and Centres of Gravity: Turning the Esoteric Into Practical Outcomes
… Introduction Clausewitz’s On War is a monumental military … into a general philosophy of war, Clausewitz swept a broad but … we attack are Critical Vulnerabilities. Note that we are not …
Book Review | Range: How Generalists Triumph in a Specialised World
… & Simon, 1973 [1] We have people walking around with all the … relationship, but also a model of how two people publicly … with some confusion’ and ‘desirable difficulties’. [8] This …
… the problem is concomitantly rewarded when a problem is simplified, and inched toward solutions, through … depends? What critical vulnerabilities are present in the …
Time for a New Approach to War? A Case for Adopting the Kill Chain Concept.
… Is it time for a new approach to war? Each war represents an … to apply ‘one-size-fits-all’ models and guides, critical … combination of manoeuvre, interoperability, networking and decision …
Force from the Sea: Australia’s Amphibious Capability – An Update
… and disaster relief to high-end warfighting, the latter capability … of operations has focused on a model of … one: a strategy of setting favourable security conditions forward …
… stress to which a specific desirable adaptation can occur, you … Cove has been a source of some forward-thinking discussion on … FORCOMD-driven human performance model [iii]. Major Pete Tarling …
Quantum Command Posts: Tactical Decision at Machine Speed
… heel‘ The tactical level of war is the culminating point of … while obviating singular vulnerabilities. However, balancing the … post is enshrined in foundation warfighting doctrine as an …