Future Attack


Book Description

With the ability of time travel, certain world powers seek to reverse historical events in an attempt to change the future to attain global power in their favor by dissolving the power of the US. Ronnie Slay is a time travel agent for the Agency. He is tasked with traveling through time to prevent these historical reversals from occurring. In other words; prevent future attacks on the US and its allies, by protecting the past, preserving the present, and defending the future, in the name of Global and National Security interest.




Threatcasting


Book Description

Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.




'Armed Attack' and Article 51 of the UN Charter


Book Description

This book examines to what extent the right of self-defence, as laid down in Article 51 of the Charter of the United Nations, permits States to launch military operations against other States. In particular, it focuses on the occurrence of an 'armed attack' - the crucial trigger for the activation of this right. In light of the developments since 9/11, the author analyses relevant physical and verbal customary practice, ranging from the 1974 Definition of Aggression to recent incidents such as the 2001 US intervention in Afghanistan and the 2006 Israeli intervention in Lebanon. The notion of 'armed attack' is examined from a threefold perspective. What acts can be regarded as an 'armed attack'? When can an 'armed attack' be considered to take place? And from whom must an 'armed attack' emanate? By way of conclusion, the different findings are brought together in a draft 'Definition of Armed Attack'.







Before the Next Attack


Book Description

Also includes information on aftermath of terrorist attack, Al Qaeda, George W. Bush, civil liberties, U.S. Congress, U.S. Constitution, courts, detainees, detention, due process, emergency constitution, emergency powers, emergency regime, existential crisis, extraordinary powers, Founding Fathers, framework statutes, freedom, habeas corpus writ, Iraq war, Abraham Lincoln, Jose Padilla, panic reaction, precedents of presidential powers, presidency, president, Franklin D. Roosevelt, rule of law, second strike, Second World War, secrecy, seizure, September 11, 2001, state of emergency, supermajoritarian escalator, terrorist attack, torture, United Kingdom, etc.




Preparing for the Psychological Consequences of Terrorism


Book Description

The Oklahoma City bombing, intentional crashing of airliners on September 11, 2001, and anthrax attacks in the fall of 2001 have made Americans acutely aware of the impacts of terrorism. These events and continued threats of terrorism have raised questions about the impact on the psychological health of the nation and how well the public health infrastructure is able to meet the psychological needs that will likely result. Preparing for the Psychological Consequences of Terrorism highlights some of the critical issues in responding to the psychological needs that result from terrorism and provides possible options for intervention. The committee offers an example for a public health strategy that may serve as a base from which plans to prevent and respond to the psychological consequences of a variety of terrorism events can be formulated. The report includes recommendations for the training and education of service providers, ensuring appropriate guidelines for the protection of service providers, and developing public health surveillance for preevent, event, and postevent factors related to psychological consequences.




Command Of The Air


Book Description

In the pantheon of air power spokesmen, Giulio Douhet holds center stage. His writings, more often cited than perhaps actually read, appear as excerpts and aphorisms in the writings of numerous other air power spokesmen, advocates-and critics. Though a highly controversial figure, the very controversy that surrounds him offers to us a testimonial of the value and depth of his work, and the need for airmen today to become familiar with his thought. The progressive development of air power to the point where, today, it is more correct to refer to aerospace power has not outdated the notions of Douhet in the slightest In fact, in many ways, the kinds of technological capabilities that we enjoy as a global air power provider attest to the breadth of his vision. Douhet, together with Hugh “Boom” Trenchard of Great Britain and William “Billy” Mitchell of the United States, is justly recognized as one of the three great spokesmen of the early air power era. This reprint is offered in the spirit of continuing the dialogue that Douhet himself so perceptively began with the first edition of this book, published in 1921. Readers may well find much that they disagree with in this book, but also much that is of enduring value. The vital necessity of Douhet’s central vision-that command of the air is all important in modern warfare-has been proven throughout the history of wars in this century, from the fighting over the Somme to the air war over Kuwait and Iraq.




The Koltanowski-Phoenix Attack


Book Description

In The Moment of Zuke: Critical Positions and Pivotal Decisions for Colle System Players, David Rudel wrote that the main line of the c3-Colle was looking quite grim for White. He proposed that Colle-Koltanowski players should adopt a new idea, meeting 1.d4 d5 2.Nf3 Nf6 3.e3 e6 4.Bd3 c5 5.c3 Nc6 6.Nbd2 Bd6 7.O-O O-O with 8.dxc5 Bxc5 9.b4 , a variation he dubbed the Koltanowski-Phoenix Attack. Rudel promised to write a treatise on this new idea, and-two years later-he has delivered. Koltanowski Phoenix Attack: The future of the c3-Colle is a 250+ page project giving extensive coverage of all critical defenses. Even though the book is long, it is organized in such a way that a player can begin playing the Koltanowski-Phoenix almost immediately. Rudel first gives a "Simple mini-Repertoire" that can be learned in hours, and then he provides more complicated, alternate lines that can be added as the player becomes more experienced with the opening. David Rudel is an authority on the Colle System, Koltanowski-Phoenix Attack: The Future of the c3-Colle being his third book intended for Colle System players.




Surprise Attack


Book Description

Surprise Attack explores sixty plus years of military and terror threats against the United States. It examines the intelligence tools and practices that provided warnings of those attacks and evaluates the United States' responses, both in preparedness – and most importantly – the effectiveness of our military and national command authority. Contrary to common claims, the historical record now shows that warnings, often very solid warnings, have preceded almost all such attacks, both domestic and international. Intelligence practices developed early in the Cold War, along with intelligence collection techniques have consistently produced accurate warnings for our national security decision makers. Surprise Attack traces the evolution and application of those practices and explores why such warnings have often failed to either interdict or intercept actual attacks. Going beyond warnings, Surprise Attack explores the real world performance of the nation's military and civilian command and control history – exposing disconnects in the chain of command, failures of command and control and fundamental performance issues with national command authority. America has faced an ongoing series of threats, from the attacks on Hawaii and the Philippines in 1941, through the crises and confrontations of the Cold War, global attacks on American personnel and facilities to the contemporary violence of jihadi terrorism. With a detailed study of those threats, the attacks related to them, and America's response, a picture of what works – and what doesn't – emerges. The attacks have been tragic and we see the defensive preparations and response often ineffective. Yet lessons can be learned from the experience; Surprise Attack represents a comprehensive effort to identify and document those lessons.