Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies

Nonfiction, History, Military
Cover of the book Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310991509
Publisher: Progressive Management Publication: April 21, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310991509
Publisher: Progressive Management
Publication: April 21, 2014
Imprint: Smashwords Edition
Language: English

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

More books from Progressive Management

Cover of the book Comprehensive History of American Aviation Pressure Suits: Early Pioneers to Space Shuttle, Kittinger, Crossfield, Neil Armstrong, SR-71, U-2, Navy and Air Force Suits, Asteroid Mission Suit by Progressive Management
Cover of the book National Security History Series - The Manhattan Project, Making the Atomic Bomb (2010 Edition) - From the Einstein Letter to the Atomic Bomb and American Strategy, Project Chronology by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Coast Guard (USCG) Rescue and Survival Systems Manual - Surviving Without a Raft, Skills, Swimmer Equipment, PFDs, Vests, Clothing, Beacons, Buoys by Progressive Management
Cover of the book The Battle of the Bulge Battlebook: U.S. and German Army in World War II, Equipment, Defense of Bastogne, Senior Allied and German Commanders, Allied Command Architecture, Order of Battle, Code Names by Progressive Management
Cover of the book Space Shuttle NASA Mission Reports: 1989 Missions, STS-29, STS-30, STS-28, STS-34, STS-33 by Progressive Management
Cover of the book Scotland's Potential Independence: Defense Implications for Britain, NATO, and the United States - UK's Nuclear Weapons Deterrence Posture with Trident Submarine-Launched Ballistic Missiles by Progressive Management
Cover of the book Commander's Handbook for Joint Time-Sensitive Targeting: United States Joint Forces Command, Engaging Targets, Intelligence, Decision Cycles, Major Theater of War and Small-scale Contingencies by Progressive Management
Cover of the book Convergence: Special Operations Forces (SOF) and Civilian Law Enforcement - Escalation of Threats, SWAT, Comparison of Military and Law Enforcement, Factors Forging Future Convergence, Implications by Progressive Management
Cover of the book The United States Air Force in Southeast Asia: The Advisory Years to 1965 - Truman, Eisenhower, Kennedy, Ranch Hand, Diem, Interdiction, Gulf of Tonkin, Johnson, Diffusion of Air Assets by Progressive Management
Cover of the book The U.S. Forest Service: An Overview - History, Fast Facts and Key Points, Forestry Mission, Wildfires, Forests, and Communities, The National Fire Plan and Fire Management Programs by Progressive Management
Cover of the book Laws and Regulations Governing the Protection of Sensitive But Unclassified Information: Classification Directives, FOIA, State Department Emails, Nuclear and Missile Technology, DoD, NASA, NRC, TSA by Progressive Management
Cover of the book Deterring North Korea from Using WMD in Future Conflicts and Crises: Nuclear, Chemical, Biological Weapons, Deterrence by Punishment, Understanding North Korean Provocations, Escalatory Brinksmanship by Progressive Management
Cover of the book Complete Guide to the Sinking of the U.S.S. Indianapolis (CA-35), World War II Attack by Japanese Submarine, 1945, Captain McVay and Hashimoto, Rescue Operations, Survivors, Court Martial Documents by Progressive Management
Cover of the book Delta II & III Space Operations at Cape Canaveral 1989-2009, Origins, Military Missions, Civil Missions, Commercial Missions by Progressive Management
Cover of the book 2012 Guide to Natural Gas Hydraulic Fracturing from Shale Formations: Improving the Safety and Performance of Hydraulic Fracturing and Fracking by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy