File:An alternate military strategy for the War on Terrorism (IA anlternatemilita109451289).pdf
Original file (1,275 × 1,650 pixels, file size: 506 KB, MIME type: application/pdf, 90 pages)
Captions
Summary[edit]
An alternate military strategy for the War on Terrorism ( ) | |
---|---|
Author |
Canonico, Peter J. |
Title |
An alternate military strategy for the War on Terrorism |
Publisher |
Monterey California. Naval Postgraduate School |
Description |
Alternate Military Strategy for the War on Terrorism calls for addressing the war as a global insurgency. Addressing the war on terrorism as a Global Insurgency provides an alternative strategic framework for prosecuting the campaign. This study is intended to determine the utility of analyzing the war on terrorism using an insurgency/counterinsurgency conceptual framework. Additionally, the recommendations can be applied to the strategic campaign, even if it is politically unfeasible to address the war as an insurgency. The study is broken down into five chapters: an introduction, explanation of Dr. McCormick’s Counterinsurgency model used for analysis, application of the model to a historical case, application to the war on terrorism, and conclusions. The first half of the study is intended to provide a thorough understanding of Dr. McCormick’s model. This is done by, first providing an overview of the model and, second, applying the model to a historical case: the insurgency in Lebanon following the Israeli invasion in 1982. The second half of the study addresses the current U.S. lead war on terrorism. The counterinsurgency model is applied to the war on terrorism based on the al Qaeda Network and the United States’ vision and mission for the conflict. Ten on terrorism are drawn from the analysis. The final chapter addresses the utility provided by the insurgency/counterinsurgency framework as applied to the war on terrorism. Subjects: War on Terrorism, 2001-2009; Terrorism; Prevention; Insurgency; Counterinsurgency; Strategy; War on terrorism; Global Insurgency; insurgency; counterinsurgency; COIN; Hizballah; Lebanon; al Qaeda; al Qaeda Network; AQN; military strategy; U.S. strategy; WOT; GWOT |
Language | English |
Publication date | December 2004 |
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
Accession number |
anlternatemilita109451289 |
Source | |
Permission (Reusing this file) |
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. |
Licensing[edit]
Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 11:52, 14 July 2020 | 1,275 × 1,650, 90 pages (506 KB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection anlternatemilita109451289 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #7209) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title |
|
---|---|
Author | silva |
Software used | PScript5.dll Version 5.2 |
File change date and time | 00:58, 16 December 2004 |
Date and time of digitizing | 00:58, 16 December 2004 |
Conversion program | Acrobat Distiller 6.0.1 (Windows) |
Encrypted | no |
Page size | 612 x 792 pts (letter) |
Version of PDF format | 1.4 |