Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies

Nonfiction, History, Military
Cover of the book Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310991509
Publisher: Progressive Management Publication: April 21, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310991509
Publisher: Progressive Management
Publication: April 21, 2014
Imprint: Smashwords Edition
Language: English

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

More books from Progressive Management

Cover of the book Shooting Down a Star: Program 437, the U.S. Nuclear ASAT System and Present Day Copycat Killers - Anti-Satellite, Nike-Zeus, North Korea, India, Iran, China, Space Launch, Space Asset Vulnerability by Progressive Management
Cover of the book Third War: Irregular Warfare on the Western Border 1861-1865 - Civil War, Confederate Guerrillas, Abolitionists, Bushwhackers, Cherokee, Jayhawkers, Highwaymen, Indian Territory-Arkansas by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Environmental Considerations in Military Operations Field Manual - FM 3-100.4 (Value-Added Professional Format Series) by Progressive Management
Cover of the book U.S. Strategic Interests and Georgia's Prospects for NATO Membership: Russian Aggression in Georgia and Ukraine, Fear in Central and Eastern European Nations, Georgia Geostrategic Importance by Progressive Management
Cover of the book The Russian Military and the Georgia War: Lessons and Implications - Ukraine and Crimea, NATO and EU, Putin and Obama, S-300 Missiles, Yushchenko, Yanukovich, Abkhazia, South Ossetia by Progressive Management
Cover of the book 21st Century Pediatric Cancer Sourcebook: Childhood Ependymoma, Subependymoma - Clinical Data and Practical Information for Patients, Families, and Physicians by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Army Aviation Operations Field Manual - FM 1-100 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Marines in the Korean War Commemorative Series: Corsairs to Panthers - U.S. Marine Aviation in Korea - Tigercat, F4, Night-Fighter Squadrons, 1st Marine Aircraft, Bell and Sikorsky Helicopters by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multiservice Tactics, Techniques, and Procedures for Theater Missile Defense Intelligence Preparation of the Battlespace TMD IPB (FM 3-01.16) by Progressive Management
Cover of the book Transformation of the German Reichsheer: German Army After World War I, Wehrmacht, General Hans von Seeckt, Nazis and Hitler, Invasions of Poland and France, Operation Barbarossa, Second World War by Progressive Management
Cover of the book 21st Century FEMA Study Course: Leadership and Influence (IS-240.a) - Case Studies, Rule of Six, Paradigms, Balancing Inquiry and Advocacy, Personal Influence and Political Savvy by Progressive Management
Cover of the book Operational Art in Pontiac's War: 1763 Pan-Indian Movement Attack on British Forts in Great Lakes Region, Pays d'en Haut and the Ottawa Chief Pontiac, Bradstreet and Bouquet Campaigns by Progressive Management
Cover of the book Wings of Hope: The U.S. Air Force and Humanitarian Airlift Operations - Berlin Airlift, Vietnam, Floods, Disasters, Africa, Provide Comfort for Iraqi Kurds, Bosnia, Hurricanes, Earthquakes, Katrina by Progressive Management
Cover of the book 2011 Essential Guide to Nuclear Power Plants and Nuclear Energy: Reactor Designs, Safety, Emergency Preparedness, Security, Renewals, New Designs, Licensing, American Plants, Decommissioning by Progressive Management
Cover of the book Elihu Root Study: The Total Army - United States Army War College Carlisle Scholars Program, 2016 Study on the Future of the United States Army - Strategic Environment, Culture, Command, Agility by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy