Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies

Nonfiction, History, Military
Cover of the book Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310991509
Publisher: Progressive Management Publication: April 21, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310991509
Publisher: Progressive Management
Publication: April 21, 2014
Imprint: Smashwords Edition
Language: English

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

More books from Progressive Management

Cover of the book On Mars: Exploration of the Red Planet 1958-1978 (NASA SP-4212) - Comprehensive Official History of the Viking Program and Man's First Successful Landing on Mars, Voyager and Mariner Programs by Progressive Management
Cover of the book North Korea: Economic Leverage and Policy Analysis - Juche Philosophy and the Military, Nuclear Six-Party Talks, DPRK Economy, China Investment, Kaesong Industrial Complex, Source of Funds by Progressive Management
Cover of the book Federal Reserve Consumer Handbooks: Mortgages, Mortgage Refinancing, ARMs, Foreclosures, Credit Cards, Substitute Checks, Home Equity Line, Improving Your Credit Score, Mobile by Progressive Management
Cover of the book Cyberspace Cybersecurity: First American International Strategy for Cyberspace, White House and GAO Reports and Documents, Internet Data Security Protection, International Web Standards by Progressive Management
Cover of the book An Organizational Assessment of the United States Military's Ability to Control the Electromagnetic Spectrum in the 21st Century: Electronic Warfare, Titan Rain Attack by Chinese Hackers by Progressive Management
Cover of the book The Necessity for the Military Assistance Command: Vietnam Studies and Observations Group - MACVSOG Psychological Warfare, Maritime Interdiction, Recon Patrols, and Personnel Recovery Missions by Progressive Management
Cover of the book Leading The Way: The History of Air Force Civil Engineers, 1907-2012 - Airfields, Red Horse, World War I and II, Special Projects, DEW Line, BMEWS, ICBM, Atlas, Titan, Minuteman, Air Force Academy by Progressive Management
Cover of the book Success in Opposite Direction: Strategic Culture and the French Experience in Indochina, the Suez, and Algeria, 1945-1962 - Decolonization After Second World War, First Indochinese War and Vietnam by Progressive Management
Cover of the book Learning From the Enemy: The Gunman Project - Espionage at the Moscow U.S. Embassy, Soviet Spying, IBM Selectric Typewriter Bugs, Great Seal Implant by Progressive Management
Cover of the book Moldova Encyclopedia: Comprehensive Coverage - Political Situation, Economy, Foreign Policy, Russian Influence, NATO, European Union, U.S. Policy, Transnistria and the Transniestrian Conflict by Progressive Management
Cover of the book NSA Secrets Declassified: Cryptologic Aspects of German Intelligence Activities in South America during World War II - Nazi, Reich Security Administration, Abwehr, Enigma Cipher Machine by Progressive Management
Cover of the book 2012 Defense Acquisitions: Assessments of Selected Weapon Programs by the GAO - Army, Navy, Air Force Weapons Systems including UAS Programs, Missiles, Ships, F-35 JSF, Carriers, Space Fence by Progressive Management
Cover of the book Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference - Cold War, COINTELPRO, CHAOS, Reagan, Soviet Active Measures, KGB, Gorbachev by Progressive Management
Cover of the book The End of the Beginning: On the Application of Aerospace Power in an Age of Fractured Sovereignty, Trends 2020, Demography, Technology, Military, Social, Operations with Blurred Boundaries by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Electronic Attack Tactics, Techniques, and Procedures (FM 34-45) EW, EP, Electronic Warfare (Value-Added Professional Format Series) by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy