Effects–Centric Warfare: Across the spectrum of conflict
… this year I attended the Joint Warfighting Assessment 2019 (JWA19), a Command Post Exercise … was to improve coalition interoperability and test a number of …
Understanding Offensive Support: An Airman Responds
… goes against the very nature of war...'. Greg Colton uses ‘effect’ … rather it is the measurable effect on an enemy of … which could be conducted by a blocking force. The expectation is …
… highlights the populations’ vulnerability to the disease when … plan? Health planning should always be SMART, which is a mnemonic … for 300 million deaths globally, was achieved with small groups of …
Daring, Persistent, and Adaptive: Achieving Depth With Robotic and Autonomous Systems
… since the end of the Second World War, Australia’s Government … requirements. Looking forward, ADF force designers and … hardening to reduce their vulnerability to enemy effects. Over …
Power Management and Silent Watch – Challenges and Opportunities for the Digitised Force
… processing, enhanced situational awareness and enabled application … gunline unable to maintain silent watch for a useful duration becomes vulnerable to location and …
… freedom of manoeuvre and considerable degradation of the enemy’s … provides a significant step forward with the acquisition of the … the combined arms team a considerable increase in its lethality …
Unmanned Aerial Systems Employment at the Combat Team Level
… as outlined within Accelerated Warfare . These enhanced … CT level to win the Accelerated Warfare land battle. During the … tactical employment and interoperability of units across the …
Reducing Tourniquet Injuries in Large-Scale Combat Operations: Rationale for a Policy of Liberalised Forward De-Escalation
This article examines the reasoning and justification for developing a universal tourniquet de-escalation capability within the Australian Defence Force.
Ways Matrix Decisive Event Planning: Part 1- Defeat Mechanisms
… 'This is the Way.' How useful are Decisive … threat’s critical targetable vulnerabilities. If you have followed … the Jenga tower itself, and the blocks that hold the tower up are …