The extensive use of contractor personnel to augment military intelligence operations is now an established fact of life and, occasional contracting scandals notwithstanding, any effective and effi cient design for intelligence support to operating forces must provide for their use. The author suggests evaluation standards for the use of contractors and possible long-term initiatives to reduce dependence on traditional outside contractors.
Long before Mount Bachelor became one of the country's largest ski areas, the booming timber mills drew workers to Oregon's forested hills. In the late 1920s, Scandinavian immigrants started a community ski club, and their passion for the mountains creat
Oregon's long tradition of volunteer search and rescue dates back to the territorial days, when Good Samaritans and mountain men came to aid those in need. On the coast, surfmen of the U.S. Life-Saving Service protected mariners traversing the "Graveyard of the Pacific." In the early twentieth century, outdoor clubs like the Mazamas, the Skyliners and the Obsidians served as informal search and rescue units, keeping Oregonians safe in the mountains, rivers and wilderness areas. After World War II, Oregon's volunteer teams began to professionalize and became some of the most effective units in the country. Join author Glenn Voelz as he recounts the history of Oregon search and rescue.
During a decade of global counterterrorism operations and two extended counterinsurgency campaigns, the United States was confronted with a new kind of adversary. Without uniforms, flags, and formations, the task of identifying and targeting these combatants represented an unprecedented operational challenge. The existing, Cold War-era doctrinal methods were largely unsuited to the cyber-warfare and terrorism that have evolved today. Rise of iWar examines the doctrinal, technical, and bureaucratic innovations that evolved in response to these new operational challenges. It discusses the transition from a conventionally focused, Cold War-era military approach to one optimized for the internet age, focused on combating insurgency networks and conducting identity-based targeting. It also analyzes the policy decisions and strategic choices that caused these changes. This study concludes with an in-depth examination of emerging technologies that are likely to shape how this mode of warfare will be waged in the future, and provides recommendations for how the US military should continue to adapt to be combat its foes in the digital age.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.