Civil Military Engagements Program: A Special Operations Solution to Threats Derived from Undergoverned Areas - SOF and Civil Affairs in Pakistan, Sri Lanka, Horn of Africa, and Battle Against ISIS

Nonfiction, History, Military, United States
Cover of the book Civil Military Engagements Program: A Special Operations Solution to Threats Derived from Undergoverned Areas - SOF and Civil Affairs in Pakistan, Sri Lanka, Horn of Africa, and Battle Against ISIS by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463400784
Publisher: Progressive Management Publication: May 3, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463400784
Publisher: Progressive Management
Publication: May 3, 2018
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction.

Arguably the most serious threats to United States (U.S.) national security, in both the current and future operating environments are terrorist or criminal non-state organizations. The 2015 National Security Strategy, 2014 Quadrennial Defense Review, and Army Operating Concept 2020-2040 clearly identifies these threats as the most complex problem that the U.S. Army will face. In 2014, Special Operations Command (SOCOM) requested further research to identify ways that Special Operations Forces (SOF) may effectively accomplish their objectives in undergoverned, threat areas. Using three regionally diverse examples, this thesis proposes that the Civil Military Engagements (CME) program, within the Civil Affairs (CA) Regiment, provides SOF an optimal solution to achieve its long-term objectives in undergoverned areas. This is initially due to their ability to gain and maintain access into targeted regions, and capitalizing on this access by filling information gaps and identifying sources of instability. However, the greatest value is its ability to serve as a vanguard for Department of State (DoS) efforts in assisting host nation governance.

ACRONYMS * ILLUSTRATIONS * TABLES * CHAPTER 1 INTRODUCTION * The Problem * Assumptions * Limitations * Delimitations * Conclusion * Definitions * CHAPTER 2 LITERATURE REVIEW * Operational Environment * Strategic Guidance * Geographic Combatant Commands * Special Operations Forces * Current Civil Affairs Education * Horn of Africa * Pakistan * Sri Lanka * Summary * CHAPTER 3 RESEARCH METHODOLOGY * CHAPTER 4 ANALYSIS * Horn of Africa * Mission and Primary Role * Vulnerability Assessments * Information Collection * DoS Synchronization * Horn of Africa Summary * Pakistan * Mission and Primary Role * Vulnerability Assessments * Information Collection * DoS Synchronization * Pakistan Summary * Sri Lanka * Mission and Primary Role * Vulnerability Assessments * Information Collection * DoS Synchronization * Sri Lanka Summary * Summary * CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS * Conclusion * Recommendations * Civil Affairs Organization * Special Operations Forces-Department of State Synchronization * Civil Information Management * Education and Training * Summary * APPENDIX A CONSENT TO PARTICIPATE IN A RESEARCH STUDY * APPENDIX B INTERVIEW QUESTIONS FOR SOF AND DoS PERSONNEL * APPENDIX C INTERVIEW QUESTIONS FOR IMSG AND CMAG * APPENDIX D SOF AND DoS INTERVIEW RESPONSES * APPENDIX E CMAG AND IMSG INTERVIEW RESPONSES * BIBLIOGRAPHY

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction.

Arguably the most serious threats to United States (U.S.) national security, in both the current and future operating environments are terrorist or criminal non-state organizations. The 2015 National Security Strategy, 2014 Quadrennial Defense Review, and Army Operating Concept 2020-2040 clearly identifies these threats as the most complex problem that the U.S. Army will face. In 2014, Special Operations Command (SOCOM) requested further research to identify ways that Special Operations Forces (SOF) may effectively accomplish their objectives in undergoverned, threat areas. Using three regionally diverse examples, this thesis proposes that the Civil Military Engagements (CME) program, within the Civil Affairs (CA) Regiment, provides SOF an optimal solution to achieve its long-term objectives in undergoverned areas. This is initially due to their ability to gain and maintain access into targeted regions, and capitalizing on this access by filling information gaps and identifying sources of instability. However, the greatest value is its ability to serve as a vanguard for Department of State (DoS) efforts in assisting host nation governance.

ACRONYMS * ILLUSTRATIONS * TABLES * CHAPTER 1 INTRODUCTION * The Problem * Assumptions * Limitations * Delimitations * Conclusion * Definitions * CHAPTER 2 LITERATURE REVIEW * Operational Environment * Strategic Guidance * Geographic Combatant Commands * Special Operations Forces * Current Civil Affairs Education * Horn of Africa * Pakistan * Sri Lanka * Summary * CHAPTER 3 RESEARCH METHODOLOGY * CHAPTER 4 ANALYSIS * Horn of Africa * Mission and Primary Role * Vulnerability Assessments * Information Collection * DoS Synchronization * Horn of Africa Summary * Pakistan * Mission and Primary Role * Vulnerability Assessments * Information Collection * DoS Synchronization * Pakistan Summary * Sri Lanka * Mission and Primary Role * Vulnerability Assessments * Information Collection * DoS Synchronization * Sri Lanka Summary * Summary * CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS * Conclusion * Recommendations * Civil Affairs Organization * Special Operations Forces-Department of State Synchronization * Civil Information Management * Education and Training * Summary * APPENDIX A CONSENT TO PARTICIPATE IN A RESEARCH STUDY * APPENDIX B INTERVIEW QUESTIONS FOR SOF AND DoS PERSONNEL * APPENDIX C INTERVIEW QUESTIONS FOR IMSG AND CMAG * APPENDIX D SOF AND DoS INTERVIEW RESPONSES * APPENDIX E CMAG AND IMSG INTERVIEW RESPONSES * BIBLIOGRAPHY

More books from Progressive Management

Cover of the book Technology Strategy in Irregular Warfare: High-Tech Versus Right-Tech - Unconventional Warfare, Special Operations, Afghanistan and the Soviet Union, Britain, and America, Aircraft, Artillery by Progressive Management
Cover of the book Kenya in Perspective: Orientation Guide and Swahili Cultural Orientation: Geography, History, Economy, Security, Nairobi, Mombasa, Nakuru, Kenyatta, Lake Victoria, Maasai, Samburu, Tribes, Bantu by Progressive Management
Cover of the book Changing Course: Preventing Gang Membership - Juvenile Crime, Youth Violence, Delinquency, Substance Abuse, Public Health Interventions, Homeboys, Girls and Gangs, Race and Ethnicity, Poverty by Progressive Management
Cover of the book The Art of Naming Military Operations: Operations in the World Wars, Using Nicknames to Shape Perceptions, Korea, Vietnam, Desert Shield, Just Cause, Military Strategy by Progressive Management
Cover of the book 21st Century Essential Guide to DARPA: Defense Advanced Research Projects Agency, Doing Business with DARPA, Overview of Mission, Management, Projects, DoD Future Military Technologies and Science by Progressive Management
Cover of the book Unmanned Aircraft Systems (UAS) Operations in the National Airspace System: Safety Considerations, FAA Rules and Regulations, Plans for Expanded Use, Military Integration (UAVs, Drones, RPA) by Progressive Management
Cover of the book Army Correspondence Course: Unit Ministry Team (UMT) Crisis Counseling - The Chaplain Assistant's Role (Subcourse CH1313), plus Army Guide to the Prevention of Suicide and Self-Destructive Behavior by Progressive Management
Cover of the book The Small War Manual (SWM) and Marine Corps Military Operations Other than War Doctrine - Relevance in the 21st Century, MOOTW, Operational History, World War II by Progressive Management
Cover of the book Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities by Progressive Management
Cover of the book Ecuador: A Low-Threat Environment for Drug Trafficking - Cocaine Trade, Rafael Correa, Cartels, Andes Narcotics, Mexico, Transnational Crime Organizations, U.S.-Ecuadorian Relations, Money Laundering by Progressive Management
Cover of the book A Concise History of the U.S. Air Force: From the Genesis of American Air Power to the Gulf War, World War II, Nuclear Age and Cold War, Billy Mitchell, Foulois, von Richtofen, Spaatz by Progressive Management
Cover of the book Short of General War: Perspectives on the Use of Military Power in the 21st Century - Al-Qaeda, Future of Warfare, Africa Command, Militarization of U.S. Foreign Policy, Counterinsurgency, Iraq by Progressive Management
Cover of the book Historic Reclamation Projects: Project Skywater - Rainmaking, Weather Modification, History and Politics, Technology, Testing, and Implementation by Progressive Management
Cover of the book U.S. Army Equipment Encyclopedia: Weapons, Tracked and Wheeled Vehicles, Helicopters, Artillery, Programs, and Systems - plus the Army Posture Statement, Weapon Systems Document, Acquisitions by Progressive Management
Cover of the book The U.S. Air Service in World War I: The Final Report and A Tactical History - Sopwith Camel, Haviland, Eddie Rickenbacker, Observation Balloons, Pursuit Tactics, Handley-Page, Spad Planes by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy