Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies

Nonfiction, History, Military
Cover of the book Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310991509
Publisher: Progressive Management Publication: April 21, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310991509
Publisher: Progressive Management
Publication: April 21, 2014
Imprint: Smashwords Edition
Language: English

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

More books from Progressive Management

Cover of the book Secret Weapon: High-value Target Teams as an Organizational Innovation - Iraq, Afghanistan, Taliban, al-Qaeda, Petraeus, Odierno, The Surge in Iraq, SOF, Tommy Franks, Task Force Freedom in Mosul by Progressive Management
Cover of the book 21st Century Geothermal Technologies Program: Multi-Year Research, Development, and Demonstration Plan through 2025, Enhanced Geothermal Systems, Hydrothermal Fields, Reservoirs, Drilling by Progressive Management
Cover of the book 2011 Nuclear Power Plant Sourcebook: Mixed Oxide Fuel (MOX), Plutonium Health Effects, Fabrication Facility Documents, Safety Issues, Japanese Accident Crisis Fukushima Reactor Unit 3 by Progressive Management
Cover of the book Don't Forget About Dedicated Sea Mine Countermeasures (MCM) - Scenario for Disaster, History, Current Force, Threat to American Economic Security, Shipping Lane Protection, Straits of Malacca, Hormuz by Progressive Management
Cover of the book 21st Century FEMA Study Course: National Response Framework, An Introduction (IS-800) - Emergency Support Functions (ESF), NRF Roles and Responsibilities, Response Actions by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Pheochromocytoma and Paraganglioma - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Separatist Model: Compare and Contrast Between the Malay Muslims of Southern Thailand and the Moro Islamic Liberation Front (MILF) of the Southern Philippines - Islamic Terrorism, Four Basic Factors by Progressive Management
Cover of the book Strategic Air Command SAC Missile Chronology 1939: 1988: Full History of SAC Missiles, System Maps, Cold War, Missile Defense, ICBM, IRBM, ALCM, Thor, Atlas, Titan, Snark, Minuteman, MX Peacekeeper by Progressive Management
Cover of the book Joint Doctrine Encyclopedia: Part Two: Definitions of Critical Joint Force Defense Department Terms, From Joint Force Surgeon to Worldwide Military Command and Control System by Progressive Management
Cover of the book Real Time Analysis: Does the Navy Have a Plan? Operational Information Dominance (ID) From Electromagnetic and Cyber Domains and Organic Sensor Data, Leveraging Commercial Technology by Progressive Management
Cover of the book U.S. Navy Arctic Roadmap 2014: 2030: American National Interests, Evolving Arctic Region Security Environment, Navy Roles and Missions, Alaska, Climate Change and Loss of Arctic Sea Ice by Progressive Management
Cover of the book Russian Nuclear Weapons: Past, Present, and Future - Strategy, Doctrine, Relationship to Conventional Forces, Tactical Nukes, New START and Nonproliferation, Threats, Putin, Lavrov by Progressive Management
Cover of the book Evolution of Aircraft Carriers: The History of U.S. Navy Carriers, USS Langley, Early Tests and Developments, World War II and Beyond by Progressive Management
Cover of the book The Two-Headed Eagle: Faces of Russian Foreign Policy - History of Actions in the Near Abroad of Central and Eastern Europe, Stalin through the Cold War to Vladimir Putin, Restoring Regional Hegemony by Progressive Management
Cover of the book 21st Century Maglev Train Technologies and High-Speed Rail Programs: Comprehensive Guide to Advanced Magnetic Levitation Technology, Benefits, and Advantages by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy