Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies

Nonfiction, History, Military
Cover of the book Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations - al-Qaeda, Bin Laden, Iraq, COIN, Insurgencies by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310991509
Publisher: Progressive Management Publication: April 21, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310991509
Publisher: Progressive Management
Publication: April 21, 2014
Imprint: Smashwords Edition
Language: English

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations provides a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world's societies have migrated into the urban areas, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. This analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent automatically delegitimizes the government's efforts.

The author provides several recommendations for the U.S. military to better understand the importance of clandestine cellular networks. First, he suggests that the U.S. military needs to conduct further research into the form, function, and logic of contemporary insurgencies, specifically those in Iraq, Afghanistan, and globally, focused on al-Qaeda and its associated movements. These studies should use the Special Operations Research Office products from the 1960s as a model for these efforts. The author recommends deploying researchers to Iraq and Afghanistan to interview former Sunni and Shi'a insurgents, such as the members of the Sons of Iraq, and detained insurgents, in order to develop an in-depth understanding of the local, as well as al-Qaeda and Iranian, methods of clandestine cellular network operations.

Second, include a detailed discussion of the form, function, and logic of clandestine cellular networks, including the underground, auxiliary, and urban guerrillas, in the next version of both Field Manual 3-24 and Joint Publication 3-24, currently in draft, to increase the understanding of this organizational form.

Third, conduct comparative analysis of the form, function, and logic of clandestine cellular networks with current network and network attack methodologies to identify which network theories and network attack methodologies are truly feasible, acceptable, and suitable. Adjust current counternetwork operations—tactically, operationally, and strategically— based on this analysis.

More books from Progressive Management

Cover of the book Large Aircraft Infrared Countermeasures (LAIRCM) Systems Engineering Case Study - Laser Transmitter Pointer/Tracker by Progressive Management
Cover of the book Osama bin Laden: Letters from Abbottabad - Complete Declassified Internal al-Qaida Communications and Analysis, Historical Perspective and Implications for American Policy (bin Ladin and al Qaeda) by Progressive Management
Cover of the book Honey Bees and Colony Collapse Disorder (CCD): Latest Official Information on the Role of the Varroa Mite, Neonicotinoid Pesticides, Bee Management Stress, Genetics & Breeding by Progressive Management
Cover of the book Foundations for Economic Development in Latin America: Review of Core Literature on Industrial Revolution, Fundamental Principles at Work, Case Study of Mexico Revealing Needed Institutions by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force EC-130H Compass Call Aircraft - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book Ensuring Operational Access: Leveraging Engineering Contractors in the Pacific - Joint Operational Access Concept (JOAC), Anti-access and Anti-denial Threats, Wake Island and Vietnam War Case Studies by Progressive Management
Cover of the book NASA's Space Shuttle Program: Shuttle Avionics Design Constraints and Considerations - Guide Book Based on KSC Engineering's Shuttle Turnaround Experience Lessons Learned by Progressive Management
Cover of the book 2015 U.S. Intelligence Community Worldwide Threat Assessment: Clapper Testimony: Islamic State, ISIS, Cyber Threats, Russia, Iran, Terrorism, al-Qaida, North Korea, Syria, National Security Strategy by Progressive Management
Cover of the book Like a Thunderbolt: The Lafayette Escadrille and the Advent of American Pursuit in World War I - Sopwith Camel, American Pilots, Aces, William Thaw, Foulois by Progressive Management
Cover of the book Repressive States and Insurgencies: Implications for Future Campaigns - Counterinsurgency (COIN) Theories, Werewolf Movement, Werwolf Program, Nazi Waffen SS, Resistance in Soviet Union, Iraq War by Progressive Management
Cover of the book Youth Gang Programs and Strategies: Prevention, Early Childhood, Community Organization, Crisis Intervention, Violence Reduction, Strategy for Violent Juvenile Offenders, Summits and Truces, Police by Progressive Management
Cover of the book Evidence Based Assessment of Public Health Planning: A Case Study of the 2014 Crisis in Ukraine - Case Study of Mortality, Tuberculosis (TB), and Cholera Metrics During Armed Conflict by Progressive Management
Cover of the book The Emerging Shield: The Air Force and the Evolution of Continental Air Defense, 1945-1960 - NORAD, Dew Line, SAGE, BOMARC, SAC, Early Warning Systems, Radar Fence, Atom Bomb Impact by Progressive Management
Cover of the book National Defense Intelligence College Paper: Democratization of Intelligence - Melding Strategic Intelligence and National Discourse - South America, Canada, U.S. Intelligence, Canadian Attitudes by Progressive Management
Cover of the book Circling the Earth: United States Plans for a Postwar Overseas Military Base System, 1942-1948 - Projecting Military Power after World War II by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy