Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies

Nonfiction, History, Military
Cover of the book Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310991509
Publisher: Progressive Management Publication: April 21, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310991509
Publisher: Progressive Management
Publication: April 21, 2014
Imprint: Smashwords Edition
Language: English

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

More books from Progressive Management

Cover of the book Rearming for the Cold War 1945-1960: History of Acquisition in the Department of Defense - Nuclear Weapons, Missiles and Rockets, Nuclear Navy, Air Force Bombers, Atomic Army by Progressive Management
Cover of the book Space Shuttle NASA Mission Reports: 1989 Missions, STS-29, STS-30, STS-28, STS-34, STS-33 by Progressive Management
Cover of the book Joint Doctrine for Operations in Nuclear, Biological, and Chemical (NBC) Environments (Joint Publication 3-11) - Combat Operations, Health Service Support, Hazard Considerations by Progressive Management
Cover of the book 2018 Report on James Webb Space Telescope (JWST): Integration and Test Challenges Have Delayed Launch and Threaten to Push Costs Over Cap by Progressive Management
Cover of the book Histories of the Soviet / Russian Space Program: Volume 5: Soviet Space Programs: 1981-87 - Piloted Space Activities, Launch Vehicles, Launch Sites, and Tracking Support by Progressive Management
Cover of the book The Evolution of the Combined Allied Headquarters in the North African Theater of Operations from 1942 to 1943: World War II Unity of Effort and Command, Eisenhower and Multinational Integration by Progressive Management
Cover of the book Radio to Free Europe: Armored Force Radio Development, Great Britain and the United States 1919-1941 - Signal Corps, Tank Radiotelephony, Radio Science, Wireless During the Great War by Progressive Management
Cover of the book Implications of Ideology in the Endurance of Competitive Authoritarian Regimes: Case Studies of Venezuela Under Hugo Chavez and Peru Under Fujimori, Left versus Right, Bolivarianismo and Chavismo by Progressive Management
Cover of the book Globalness: Toward a Space Power Theory - Military Spaceflight, Strategic Theory, Weaponization, ASAT Anti-Satellite, GPS, Prompt Global Strike, Global Connectivity, Weapons Delivery by Progressive Management
Cover of the book NASA Astrophysics Missions: Reviews of Operating Missions - Hubble Space Telescope, Chandra X-ray Observatory, Fermi Gamma-ray Telescope, Kepler, Planck, Suzaku, Swift, Spitzer, XMM-Newton by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force AC-130 Gunship Ground-Attack Aircraft - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book 2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO by Progressive Management
Cover of the book War of 1812: The Staff Ride Handbook for The Battles of New Orleans, 23 December 1814 - 8 January 1815 - British Army, Infantry, Opposing Naval Forces, Dragoons, Plains of Chalmette, Rodriguez Canal by Progressive Management
Cover of the book Bitcoin Digital Currency and Blockchain Technology: Disruptive Computer Technology, Movement of Money, Tokenization of Assets, Mt. Gox, Advanced Cryptographic Signatures, Cyber Security, Banking by Progressive Management
Cover of the book The Russian Military Today and Tomorrow: Putin, Russian Navy, Ukraine, Gazprom, Rosneft, Lavrov, Deep Operations, Campaign Design, Russian-Chinese Security Relations, Mafia and Arms Dealers by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy