Military Intelligence
The objective of Part One of this study is to examine the use of Unmanned Vehicle Systems in intelligence collection and how this has expanded significantly. This work will discuss the major trends in UV utilization in intelligence collection, as well as some of the moral and ethical concerns when utilizing UVs. Part Two of this study will examine Open Source Intelligence (OSINT), which has been around for many years and will discuss some of the keep issues in OSINT and whether or not this is a valuable platform for the intelligence community.
Unmanned Vehicle Systems: Ethical, Legal and Moral Considerations
The work of Waddell (2007) entitled "A Theoretical, Legal and Ethical Impact of Robots on Warfare" reports that robotics are involved in assisting the reduction of participation of human beings in conflict and introduction of robots on the battlefield. This participation is large in scale and such that will serve…...
mlaBibliography
Arkin, RC (2011) Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture. Technical Report. Retrieved from: http://www.cc.gatech.edu/ai/robot-lab/online-publications/formalizationv35.pdf
Best, RA and Cumming, A. (2007) Open Source Intelligence (OSINT): Issues for Congress. CRS Report to Congress. 5 Dec 2007. Retrieved from: http://www.fas.org/sgp/crs/intel/RL34270.pdf
Cowan, TH and Waddell, WO (2007) A Theoretical, Legal and Ethical Impact of Robots on Warfare. USAWC Strategy Research Project. Retrieved from: http://www.dtic.mil/dtic/tr/fulltext/u2/a469591.pdf
Hanson, J. (2012) Taking Many Out of the Loop: The Dangers of Exponential Reliance on Artificial Intelligence. Retrieved from: http://www.slideshare.net/johanson104/dangers-of-overreliance-on-ai-in-the-military
Female HUMINT Collectors
Proposed esearch Completion Schedule
The proposed research is to be completed according to the following outline.
The first draft of the initial thesis proposal is complete, as of 12/20/2014. A refined draft may be submitted, if required, by January 2, 2015
Initial eference List
The reference list for completing the proposal has been completed. However, an official search paper will be written, detailing the search strategies to be used -- including known key words -- and the databases and journals that will be initially targeted. In addition, an annotated literature review will be prepared that will be a bridge to the final literature review. These components will be completed by January 16, 2015.
The full-length literature review, which will evolve throughout the initial stages of the proposed research through the snowball effect of following lines of research. The literature review will be completed by February 28, 2015.
evised Literature eview
As noted, the literature review…...
mlaReferences
____. (2013). 20 Owl Online Writing Lab: Writing academic proposals: Conferences, articles, and books. Retreived from https://owl.english.purdue.edu/owl/resource/752/1/
Hazelrigg, G.A. (2011, December 6). Twelve steps to a winning research proposal. National Science Foundation. Retreived from http://www.famu.edu/graduatestudies/Twelve%20Steps%20To%20A%20Winning%20Proposal_George%20A%20Hazelrigg_NSF.pdf
Raphel, A. (2013, January 23). Gender, health care, security, military: Women in the U.S. military and combat roles: Research roundup. Retrieved from http://journalistsresource.org/studies/society/gender-society/women-military-research-roundup#
Complete Proposed Schedule
Against InclusionThe inclusion of cultural and human geographic concepts in military and intelligence operations might seem potentially advantageous operationally, but it presents substantial ethical dilemmas and risks misusing sensitive cultural information, compromising research objectivity, and fostering mistrust due to perceived ulterior motives. This is why we are against it.Historical Misuse of Social SciencesOne of the primary concerns is the historical misuse of the social sciences in conflict zones. The integration of cultural geography into military and intelligence operations can lead to the exploitation of sensitive cultural information. esearchers often struggle with ethical concerns that the information they provide may be used to harm individuals or communities. For example, understanding the cultural dynamics of a region might be used to manipulate local populations or exploit divisions within communities, leading to further conflict and harm (Pawinski, 2018).Financial Support and ObjectivityAnother ethical dilemma arises from the financial support provided by military and intelligence…...
mlaReferencesGill, P. & Phythian, M. (2013). From Intelligence Cycle to web of intelligence: complexity and the conceptualization of intelligence. In M. Phythian (Ed.), Understanding the Intelligence cycle (pp. 21-42). Taylor & Francis GroupMedina, R. M. (2016). From anthropology to human geography: Human terrain and the evolution of operational sociocultural understanding. Intelligence and National Security, 31(2), 137-153.Pawinski, M. (2018). Going beyond human terrain system: Exploring ethical dilemmas. Journal of Military Ethics, 17(2-3), 122-139. Wainwright, J. D. (2016). The U.S. military and human geography: Reflections on our conjuncture. Annals of the American Association of Geographers, 106(2), 513-520.
By 1945, the OSS was abolished and by 1947 the National Security Act had completely transferred the task of espionage and intelligence from military to civilian hands ("United States Intelligence"). This transfer set the stage for the successes and failures of the U.S. intelligence community during the early Cold ar. It meant that U.S. intelligence was much more greatly coordinated and more aggressively implemented during that period to some apparent success. But it also meant that these new civilian agencies did not have the legacy of experience with espionage that existed within the military intelligence community. The end result was a higher degree of coordination during the early Cold ar, which improved the level of intelligence and communication and helped create the U.S.'s first true intelligence community.
orks Cited
United States Intelligence, History." Espionage Information: Encyclopedia of Espionage, Intelligence, and Security. 2007. 4 Oct. 2007 http://www.espionageinfo.com/Ul-Vo/United-States-Intelligence-History.html....
mlaWorks Cited
United States Intelligence, History." Espionage Information: Encyclopedia of Espionage, Intelligence, and Security. 2007. 4 Oct. 2007 http://www.espionageinfo.com/Ul-Vo/United-States-Intelligence-History.html .
ebuttal to Group 1 PositionIntegrating cultural and human geographic concepts into military and intelligence operations is something to consider, but it is also important to be critical of the idea and understand potential risks and implications. Some of these risks include the possibility for misinterpretation and over-generalization, exploitations, historical oversights, cultural reductionism and over-emphasis on operational efficiency at the expense of long-term stability.For example, human geography is helpful in some cases but it can also be subject to misinterpretation. Over-reliance on the Human Terrain System (HTS) or any other such tool can oversimplify situations. Because cultures are complex, a rigid system is unlikely to capture the nuances of the reality. For this reason, these systems can contribute to faulty intelligence. Likewise, too much emphasis on understanding regional cultures could lead to false senses of security. Indeed, the assumption was that the U.S. military had taken steps after 9/11 to be…...
mlaReferencesWirtz, J. J. (2023). Are Intelligence Failures Still Inevitable?. International Journal of Intelligence and CounterIntelligence, 1-24.
Military
The colonists' most revered military institution was the militia, a model inherited from their forebears in England. The philosophical underpinnings of the militia model are easy to understand: "fear of a standing army," (Millet and Maslowski 1). A standing army can turn against its people, staging what now would be called military coups one after the other. During and especially after Independence, the validity, effectiveness, efficiency, and relevance of the militia model was called into question. This is why the United States Constitution eventually included the provisions for federalized systems of national security. Naturally, the existence of a standing army to "provide for the common defense" would be required. Independence required an organized military strategy against a powerful Empire; to protect the new nation, it was certain that the military would be necessary to preserve all that hard work. The Constitution therefore enabled the creation and maintenance of standing armies,…...
mlaWorks Cited
Boot, Max. "The New American Way of War." Foreign Affairs. 2003.
Jay, John. "The Federalist 2." Independent Journal. Oct 31, 1787.
Madison, James. "Federalist 41." Independent Journal. Jan 19, 1788.
Millet, Allen R. And Maslowski, Peter. For the Common Defense. Free Press, 1994.
Military Draft
In arguing against reinstating the military draft in the United States, several things come immediately to mind. First among those, for anyone who has learned anything at all about the Vietnam ar, is that the draft can be devastating to society, causing upheaval at home as well as the return of bright, strong young men in body bags. David Halberstam, a journalist of considerable experience, wrote a book, The Best and the Brightest, about the sacrifice of these young Americans for precious little, if any, gain to this country or any other.
Moreover, that war lasted for years, ending in horrific scenes of people running through the streets of Saigon trying to leave any way they could. In the end, there was a Communist takeover despite the loss of all those young Americans.
In an article called "Thinking About the Draft," illiam Galston wrote:
In the wake of September 11, the United…...
mlaWorks Cited
Galston, William A. 2004. Thinking about the Draft. Public Interest, Wntr, 6ff. http://www.questia.com/ .
Swomley, John. 2004. The Return of the Draft? The Humanist, July/August, 14ff.
Short to military dances. The book is riddled with anecdotes such as these that indicate the military was ill prepared for a surprise attack, and in fact were arrogant in their ignorance.
In fact, Clausen's investigation showed the American military knew Japanese codes but ignored them in seeking intelligence; the agencies were unprepared for war or a surprise attack. As the author notes, "Although vested with high commands and responsibilities, they were surprised by the attack. They were unprepared for war. Thus, they were really guilty of criminal neglect of duty" (Clausen & Lee, 1992, p. 228). There was little joint action between the services during and after the attack, and that had a midnight message been decoded, it might have prevented the attack. In short, Pearl Harbor was a series of bungles that resulted in the most horrific naval losses the U.S. has ever endured.
eferences
Clausen, H.C. And Lee, B.…...
mlaReferences
Clausen, H.C. And Lee, B. (1992). Pearl Harbor: Final Judgement. New York: Crown Publishers, Inc.
-29 and -26 bombers were used by U.S. forces to decimate Korean cities through round-the-clock air war using incendiary bombs, delayed demolition explosives and an "infernal jelly" called napalm.[footnoteRef:38] Created secretly during World War II, napalm was basically a mixture of petroleum and a thickening agent, designed to fiercely adhere to the target and severely burn it. Though first used against enemy structures and humans in World War II, napalm was used in the Korean War to devastating effect.[footnoteRef:39] the results of the U.S. air war against North Korea were intentionally catastrophic: at the commencement of the War, North Korea had 22 major cities, 18 of which suffered at least 50% obliteration.[footnoteRef:40] Furthermore, the U.S. government seriously considered using the atomic bombs that had so decisively ended World War II in the Pacific Theater. Particularly in September and October of 1951, -29 bombers were used for multiple runs to…...
mlaBibliography
Bizony, Piers. The Space Shuttle: Celebrating Thirty Years of NASA's First Space Plane. Minneapolis, MN: Zenith Press, 2011.
Blight, James G., and Janet M. Lang. The Fog of War: Lessons from the Life of Robert S. McNamara. Lanham, MD: Rowman & Littlefield Publishers, Inc., 2005.
Boyne, Walter J. Beyond the Wild and Blue: A History of the United States Air Force, 1947-2007, Second Edition. New York, NY: St. Martin's Press, 2007.
Chant, Christopher. The World's Greatest Aircraft. New York, NY: Crescent Publishing, 1991.
Franks (along with the Bush war cabinet, including Vice President Dick Chaney) "met repeatedly" to plan the attack on Iraq. It was groupthink through and through. At the same time Bush was saying publicly he was "pursuing a diplomatic solution" (Hamilton, 2004), "intensive war planning" was going on during the whole year 2002. It "created its own momentum" in the administration, Hamilton wrote.
In oodward's book, which was recognized as conveying authentic details about the Bush war planning and strategies, he covers much of the pre-war discussions Bush had with top members of his administration, along with decisions Bush made on his own and with help from people like his Foreign Policy Advisor, Condoleezza Rice. But according to an excerpt from oodward's book, Bush waited until the last minute (among his top staff) to brief Secretary of State Colin Powell, who had not been an advocate of going to war,…...
mlaWorks Cited
Bar-Joseph, Uri, and Levy, Jack S. 2009, 'Conscious Action and Intelligence Failure', Political Science Quarterly, vol. 124, no. 3, pp. 461-489.
Bar-Joseph, Uri. 1995, Intelligence Intervention in the Politics of Democratic States: The United States, Israel, and Britain. The Pennsylvania State University Press, University Park, Pennsylvania.
Gentry, John a. 2008, 'Intelligence Failure Reframed', Political Science Quarterly, vol. 123, no. 2, pp. 247-260.
Hamilton, William. 2004. 'Bush Began to Plan War Three Months After 9/11.' Washington Post, April 17, 2004, p. A01.
"
It was also a pivotal tool in discovering the ussian nuclear missile sites that sparked the Cuban Missile Crisis in 1962. The U.S. also gained spy satellites in 1960, and combined with the U-2 and other tools, American technological superiority began to assert itself. The spy satellites were a direct result of rocketry experimentation during and after World War II, and many German rocket scientists transplanted to America helped create the rockets that would launch the satellites. The scope of the intelligence operations was growing, and so were the technological advances that helped the agencies grow and learn more every day.
There are many who believe that factors such as the Cold War may help develop new agencies, but they have little to do with how the agencies evolve. Author Zegat continues, "The truth is that international factors such as the onset of the Cold War may catalyze the development of…...
mlaReferences
Andres, Christopher. For the President's Eyes Only. (New York: HarperPerennial), 1996.
Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century. New York: Doubleday, 2001.
Painter, David S. The Cold War: An International History. London: Routledge, 1999.
Powers, Thomas. Intelligence Wars: American Secret History from Hitler to al-Qaeda. New York: New York Review Books, 2002.
Military Commission Act 2006 was passed by the U.S. government to provide the law enforces additional powers and certain immunities while dealing with terrorists. However, this law has drawn severe criticism as well as a fair share of support from various sections of the society. The main argument against the law is that it has the potential for the government to suspend the right of habeas corpus for non-citizens which includes legal permanent residents who are in the U.S. custody. The president of the United States or the law enforcement agencies have gained the right to detain anyone in the U.S. - including U.S. citizens, and not assign any charge against them. This power has been awarded the designation of such individuals as enemy combatants or enemy combatants who are unlawful. The law also allows the president to decide what would constitute torture. Evidence that is obtained by coercion and…...
Military Ops
Military-Led econstruction and Fiedler's Contingency Theory
In light of the unfolding instability, violence and difficulty that characterized the wars in Iraq and Afghanistan, the United States military must reexamine its approach to the strategic invasion, occupation, reconstruction and power-handover that have evolved into a war-making template for the nation. Accordingly, the research conducted hereafter considers the need for a change in leadership orientation, using Fiedler's Contingency Theory as the lens for the literature review thereafter. The Findings drawn from the review of literature are presented in this account and, generally, provided confirmation of the pertinence of Fiedler's contingency theory to modern military strategy as well as the pertinence of Fiedler's Least-Preferred Coworker checklist to defining ideal military leadership. The reported findings connecting Fiedler's ideas with strategic and empirical documentation on applied military policy contribute to a number of policy recommendations. In particular, these policy recommendations revolve around two major dimensions…...
mlaReferences
Conner, Maj. W.D. (2005). Understanding First in the Contemporary Operational
Environment. School of Advanced Military Studies; For Leavenworth Kansas.
Ellyson, L.M.; Gibson, J.H.; Nichols, M. & Doerr, A. (2012). A Study of Fiedler's
Contingency Theory Among Military Leaders. Allied Academies International
[footnoteRef:32] This lack of forces for other Pacific struggles generally weakened the Japanese war effort, as the Japanese were forced to fight those battles with insufficient men, weapons, ammunition and other related materiel. [27: Eric Hammel. Guadalcanal: Decision at Sea: The Naval attle of Guadalcanal, November 13-15, 1942. Pacifica, CA: Pacifica Military History, 1999, p. 346.] [28: Colin G. Jameson. "attle of Guadalcanal: 11-15 November, 1942." www.history.navy.mil Web site. 1944. http://www.history.navy.mil/library/online/battleguadalcanal1942.htm (accessed March 18, 2013), p. 78.] [29: Robert Leckie. Challenge for the Pacific: Guadalcanal: The Turning Point of the War (Paperback). New York, NY: antam ooks, 2010, pp. 127-128.] [30: Mark Stille. USN Cruiser vs. IJN Cruiser: Guadalcanal 1942. New York, NY: Osprey Publishing, 2009, pp. 19-20.] [31: Leckie, p. 306.] [32: Ibid.]
The Allied victory at the Naval attle of Guadalcanal through the leadership of Vice Admiral William F. Halsey, the Southwest Pacific Theater commander, was also a turning…...
mlaBibliography
Baer, George. One Hundred Years of Sea Power: The U.S. Navy, 1890-1990. Stanford, CA: Stanford University Press, 1993.
Frank, Richard B. Guadalcanal: The Definitive Account of the Landmark Battle. New York, NY: Penguin Books USA, Inc., 1992.
Hammel, Eric. Carrier Clash: The Invasion of Guadalcanal and the Battle of the Eastern Solomons: August, 1942. St. Paul, MN: Zenith Press, an imprint of MBI Publishing Company, 2004.
-- . Guadalcanal: Decision at Sea: The Naval Battle of Guadalcanal, November 13-15, 1942. Pacifica, CA: Pacifica Military History, 1999.
Shortly after, the Navy successfully cracked the Japanese military code in Operation Magic, which allowed U.S. forces to turn the tide of the war in the Pacific by 1942 ("United States Intelligence").
One of the chief actions taken during this period was the creation of the Office of Strategic Services by FDR in 1942. During orld ar II, the OSS coordinated all of the information through collection and analysis that was used for clandestine operations up until 1945 ("United States Intelligence"). The development of the OSS, though short-lived, demonstrates that the role of the intelligence community in United States foreign policy was growing significantly. Before this period, U.S. espionage was limited at best and primarily a domestic affair. By 1945, the role of the intelligence community had greatly expanded and become a more central part of life in the United States.
orks Cited
United States Intelligence, History." Espionage Information: Encyclopedia of Espionage,…...
mlaWorks Cited
United States Intelligence, History." Espionage Information: Encyclopedia of Espionage, Intelligence, and Security. 2007. 4 Oct. 2007 http://www.espionageinfo.com/Ul-Vo/United-States-Intelligence-History.html .
I. Overview of Army ROTC Requirements
II. Application Process for Army ROTC
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now