Intelligence Transformation

About The Book

<p>The Army's fielding of military intelligence companies to the modular brigade combat teams (BCTs) as part of the Army Transformation has created a loss of intelligence capability for the modular division commander. Furthermore the global design of the modular brigade and division focus on providing generalist capabilities employable against a wide array of threats and do not favor designing systems that focus on the unique aspects of individual threats. Because predictable intelligence is intent based it requires a system with capabilities that specialize in the unique aspects of the target adversary. This monograph explores the intelligence requirements of a modular division conducting operations during the Contemporary Operational Environment (COE). It assesses the nature of the emerging security environment by comparing the U.S. government's strategic and operational threat models with the characteristics of evidentiary threats in the current environment. It poses the question: does the intelligence system of a modular division have the capability to provide a focused and detailed understanding of a networked irregular threat? The conceptual model of this study is a modular division operating on a non-contiguous battlefield against an irregular networked threat. By comparing the characteristics of evidentiary and emerging irregular threats to the intelligence system capabilities of a modular division this study identifies existing intelligence capabilities gaps commanders and planners will need to consider when tailoring force packages for operations in the Global War On Terrorism (GWOT). The purpose of this monograph is to recommend concepts that can mitigate the identified intelligence gaps. The results of this analysis provide three observations. First the theoretical threat model the Army is using in its capabilities based approach to force design may be based on a false premise. Second the capabilities based approach to force design may be insufficien</p><p>This work has been selected by scholars as being culturally important and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact and remains as true to the original work as possible. Therefore you will see the original copyright references library stamps (as most of these works have been housed in our most important libraries around the world) and other notations in the work.</p><p>This work is in the public domain in the United States of America and possibly other nations. Within the United States you may freely copy and distribute this work as no entity (individual or corporate) has a copyright on the body of the work.</p><p>As a reproduction of a historical artifact this work may contain missing or blurred pages poor pictures errant marks etc. Scholars believe and we concur that this work is important enough to be preserved reproduced and made generally available to the public. We appreciate your support of the preservation process and thank you for being an important part of keeping this knowledge alive and relevant.</p>
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE