Targeted Attack: Using Tempo as a Weapon


Book Description

This interactive book presents 20 different procedural tools to utilize in any offensive attack. Instructional videos and game examples show exactly how to utilize these tools. Over two hours of video including cut-ups for further review give you depth and detail into this topic. Learn: Why every offense should implement Tempo as part of the attack. How you can develop Tempo/Procedures that work as counters to defensive reaction. Methods for communication. Installation and practice thoughts. ….much, much more.




Weapon Systems


Book Description




Weapon Systems


Book Description




The Law of Targeting


Book Description

Targeting is the primary method for securing strategic objectives in an armed conflict. Failure to comply with the law of targeting jeopardizes the achievement of those aims. It is therefore essential that all those involved in or studying issues surrounding targeting have an accurate and complete understanding of this area of law. This book offers the definitive and comprehensive statement of all aspects of the law of targeting. It is a 'one-stop shop' that answers all relevant questions in depth. It has been written in an open, accessible yet comprehensive style, and addresses both matters of established law and issues of topical controversy. The text explains the meanings of such terms as 'civilian', 'combatant', and 'military objective'. Chapters are devoted to the core targeting principles of distinction, discrimination, and proportionality, as well as to the relationship between targeting and the protection of the environment and of objects and persons entitled to special protection. New technologies are also covered, with chapters looking at attacks using unmanned platforms and a discussion of the issues arising from cyber warfare. The book also examines recent controversies and perceived ambiguities in the rules governing targeting, including the use of human shields, the level of care required in a bombing campaign, and the difficulties involved in determining whether someone is directly participating in hostilities. This book will be invaluable to all working in this contentious area of law.




The Perfect Weapon


Book Description

NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An important—and deeply sobering—new book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend the 2016 U.S. election from interference by Russia, with Vladimir Putin drawing on the same playbook he used to destabilize Ukraine. Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger reveals a world coming face-to-face with the perils of technological revolution, where everyone is a target. “Timely and bracing . . . With the deep knowledge and bright clarity that have long characterized his work, Sanger recounts the cunning and dangerous development of cyberspace into the global battlefield of the twenty-first century.”—Washington Post




Weapon Systems, U. S. Army, 1996


Book Description

Provides an overview of the major weapons systems & support equipment the Army is currently developing or has fielded. Sections include: project and sustain; protect the force; win the information war; conduct precision strikes; & dominate the maneuver battle. Over 100 color photos & drawings. Each weapon system described in detail as to mission, characteristics, foreign counterpart, program status, projected activities, & prime contractor. Appendices: contractors by system, contractors by state, points of contact & an index. Comprehensive!




U.S. Army Weapons Systems 2009


Book Description

In addition, it covers cutting-edge tech that will soon be employed by our soldiers: missiles, small arms, biological detection systems, rockets, reconnaissance systems, radios, planes, bows and arrows (believe it or not)...you name it, this book has it. Also included is a thorough discussion of Future Combat Systems (FCS), the system of systems that, when fully operational, will provide the Army and joint forces with unprecedented capability to see the enemy, engage him on our terms, and defeat him on the twenty-first century battlefield. Full-color photographs illustrate each weapon, making this the most comprehensive and up-to-date resource of its kind.










Managing Command and Control in the Persian Gulf War


Book Description

During Desert Shield, the Air Force built a very complicated organizational architecture to control large numbers of air sorties. During the air campaign itself, officers at each level of the Central Command Air Forces believed they were managing the chaos of war. Yet, when the activities of the many significant participants are pieced together, it appears that neither the planners nor Lt. Gen. Charles A. Horner, the Joint Force Air Component Commander, knew the details of what was happening in the air campaign or how well the campaign was going. There was little appreciation of the implications of complex organizational architectures for military command and control. Against a smarter and more aggressive foe, the system may well have failed.