Summary of the 2018 National Defense Strategy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Strategy and Strategic Management 1
CHAPTER STRATEGY AND STRATEGIC MANAGEMENT 1 For the past decade, Texas Health has been executing a strategic plan called the Ascent to the Summit. As the organization nears the end of that climb with a stronger strategic footing in place, the THR Promise continues to unify and strengthen us as we move into a journey toward becoming a high-reliability organization transforming the way healthcare is delivered. In the past decade, Texas Health has shifted from an acute care hospital company to an integrated health system. In 2009, Texas Health Physicians Group was formed, creating a base of employed physicians who work with Texas Health on numerous objectives. Today, the group includes more than 830 physicians, physician assistants, nurse practitioners, and medical pro- fessionals dedicated to providing safe, quality care for its patients. The Texas Health Physicians Group’s primary care and specialist network represents more than 50 medical specialties, with more than 250 locations spanning 11 North Texas counties. Because of our culture, Texas Health was rec- ognized in 2015 as the number one healthcare organization to work for in the United States by Fortune. We also were recognized as the number two workplace for women and the number three workplace for diversity in the nation, with one-third of our nurses from ethnically diverse backgrounds. We’re proud to say we reflect the diversity of the communities we serve. —Barclay Berdan, 2016, “Climbing the Healthcare Summit” Learning Objectives After reading this chapter, you will • comprehend that strategy has many definitions, and its meaning depends on one’s perspective; • understand the role of strategy in moving a healthcare organization to achieve its goals, increase its business, and improve its performance; • recognize the use of prospective and emergent strategies; and • be aware that business strategies evolve over time as a result of changing circumstances and managerial modifications. -
BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE
Command, Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security University Center of Excellence BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE July 2013 Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti-Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each .........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guid e ........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 – Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment ...................................................................................................................15 -
Axis Blitzkrieg: Warsaw and Battle of Britain
Axis Blitzkrieg: Warsaw and Battle of Britain By Skyla Gabriel and Hannah Seidl Background on Axis Blitzkrieg ● A military strategy specifically designed to create disorganization in enemy forces by logical firepower and mobility of forces ● Limits civilian casualty and waste of fire power ● Developed in Germany 1918-1939 as a result of WW1 ● Used in Warsaw, Poland in 1939, then with eventually used in Belgium, the Netherlands, North Africa, and even against the Soviet Union Hitler’s Plan and “The Night Before” ● Due to the non-aggression pact with the Soviet Union, once the Polish state was divided up, Hitler would colonize the territory and only allow the “superior race” to live there and would enslave the natives. ● On August 31, 1939 Hitler ordered Nazi S.S. troops,wearing Polish officer uniforms, to sneak into Poland. ● The troops did minor damage to buildings and equipment. ● Left dead concentration camp prisoners in Polish uniforms ● This was meant to mar the start of the Polish Invasion when the bodies were found in the morning by Polish officers Initial stages ● Initially, one of Hitler’s first acts after coming to power was to sign a nonaggression pact (January 1934) with Poland in order to avoid a French- Polish alliance before Germany could rearm. ● Through 1935- March 1939 Germany slowly gained more power through rearmament (agreed to by both France and Britain), Germany then gained back the Rhineland through militarization, annexation of Austria, and finally at the Munich Conference they were given the Sudetenland. ● Once Czechoslovakia was dismembered Britain and France responded by essentially backing Poland and Hitler responded by signing a non-aggression with the Soviet Union in the summer of 1939 ● The German-Soviet pact agreed Poland be split between the two powers, the new pact allowed Germany to attack Poland without fear of Soviet intervention The Attack ● On September 1st, 1939 Germany invaded Warsaw, Poland ● Schleswig-Holstein, a German Battleship at 4:45am began to fire on the Polish garrison in Westerplatte Fort, Danzig. -
The Security Lexicon from Westphalia to the Present a Cautionary Tale
THE SECURITY LEXICON FROM WESTPHALIA TO THE PRESENT A CAUTIONARY TALE MAX G. MANWARING, PH.D. A new and dangerous dynamic is at work around the world today. That new dynamic involves the migration of some of the monopoly of political power (i.e., the authoritative allocation of values in a society) from the traditional nation-state to unconventional actors such as the Islamic State (ISIS), transnational criminal organizations, Leninist-Maoist insurgents, tribal militias, pri- vate armies, enforcer gangs and other modern mercenaries. These actors conduct their own political-psychological type of war against various state and other non-state adversaries. These violent politicized non-state actors are being ignored; or, alternatively, are being considered too hard to deal with. That misunderstanding must inevitably result in an epochal transition from traditional Western nation-state systems and their liberal democratic values to something else dependent on the values—good, bad, or non-existent—of the winner.1 To help civilian and military leaders, policy-makers, opinion-makers, and anyone else who might have the responsibility for dealing with modern conflict come to grips analytically with the security dilemma and other realities of the 21st century political-psychological environment, this paper seeks to do three things. In Part One, we outline a bit of essential history that takes us from the Westphalian Peace Treaty of 1648 to the present. In that context, we briefly consider a con- temporary example of the traditional military-centric approach to national and international security that is still alive and well. That is, Chinese military activity in the South China Sea. -
Decision-Making Process in Combat Operations
DECISION-MAKING PROCESS IN MILITARY COMBAT OPERATIONS 4120/002 10.2013 2000 10.2013 4120/002 International Committee of the Red Cross 19, avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org © ICRC, October 2013 DECISION-MAKING PROCESS IN MILITARY COMBAT OPERATIONS PREFACE Every state has an obligation to ensure respect for the law of armed conflict. The ICRC is mandated to support states in these efforts and does so through a range of activities, including promoting the integration of appropriate com- pliance measures into military doctrine, education, training and sanctions, with a view to ensuring that behaviours of those engaged in armed conflict comply with the law. The present note is designed to support the integration of the Law of Armed Conflict into military decision-making processes, primarily at the operational level. It is not based on any specific national doctrine. It is designed to support those responsible for developing national doctrine and operational planning procedures in their efforts to integrate the Law of Armed Conflict into military practice. The desired outcome is staff procedures which ensure the development of military plans and orders that accurately and effectively integrate compliance with the Law of Armed Conflict into operational practice, thereby reducing the effects of armed conflict on those who do not, or no longer, participate in the hostilities. The techniques of warfare change rapidly, particularly at times when combat operations are commonplace. The humanitarian impact of conflict is timeless. The Law of Armed Conflict is designed to limit the humanitarian consequences of war. -
Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II. -
The Role of UN Peacekeeping in China's Expanding Strategic Interests
UNITED STATES INSTITUTE OF PEACE www.usip.org SPECIAL REPORT 2301 Constitution Ave., NW • Washington, DC 20037 • 202.457.1700 • fax 202.429.6063 ABOUT THE REPORT Marc Lanteigne This Special Report assesses China’s evolving participation in international peacekeeping missions in the context of its rise as a major economic and military power. The report is based on data collection on Chinese foreign and security policy issues as well as fieldwork in China and Norway. Supported by the Asia The Role of UN Center at the United States Institute of Peace, the report is part of USIP’s broader effort to understand China’s engagement in the peace processes and internal conflicts of other nations. Peacekeeping in ABOUT THE AUTHOR Marc Lanteigne is a senior lecturer in security studies in the China’s Expanding Centre for Defence and Security Studies at Massey University in New Zealand. Previously, he was a senior research fellow at the Norwegian Institute of International Affairs, where he specialized in Chinese and Northeast Asian politics and foreign Strategic Interests policy, as well as Asia-Arctic relations, international political economy, and institution building. He has written on issues related to China’s regional and international relations as well as Summary economic security, the politics of trade, and energy issues. • Despite its growing status in the international system, including in the military sphere, China continues to be a strong supporter of United Nations peacekeeping operations (UNPKO), a stance commonly considered to be more the purview of medium powers. China is also a major contributor of peacekeeping personnel and support. -
DDS Security Specification Will Have Limited Interoperability with Implementations That Do Implement the Mechanisms Introduced by This Specification
An OMG® DDS Security™ Publication DDS Security Version 1.1 OMG Document Number: formal/2018-04-01 Release Date: July 2018 Standard Document URL: https://www.omg.org/spec/DDS-SECURITY/1.1 Machine Consumable Files: Normative: https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_spis.idl https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_model.xmi Non-normative: https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance_example.xml https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions_example.xml Copyright © 2018, Object Management Group, Inc. Copyright © 2014-2017, PrismTech Group Ltd. Copyright © 2014-2017, Real-Time Innovations, Inc. Copyright © 2017, Twin Oaks Computing, Inc. Copyright © 2017, THALES USE OF SPECIFICATION – TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royalty-free, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification. -
National Security and Constitutional Rights in Korea
National Security and Constitutional Rights in Korea - National Security Law, Past and Present Park Won Soon, Human Rights Lawyer Chair, Executive Committee, PSPD Director, Beautiful Foundation As of 25 August, of the 99 political prisoners in detention, 54 were detained on charges under the National Security Law. Of these, the majority were arrested under Article 7, which punishes membership of organizations deemed to "benefit the enemy", improving relations with North Korea prompted debate on reform of the National Security Law. President Kim Dae-Jung apparently encouraged by his award of the Nobel Peace Prize, announced his support for revisions to the National Security Law, but opposition to reform in the National Assembly from both the GNP and the ULD prevented significant revisions. (Amnesty International Report 2001) 1. Introduction De Facto Constitution - The National Security Law The National Security Law (NSL) in Korea has been called as a de facto constitution. It meas the NSL was under no other laws including the Constitution. Even though it is inferior to the Constitution namely, no legal enforcement agencies and the court could not challenge unconstitutionality of the law in reality. Korean peninsula has been one of the powder magazine where small incident could lead to big armed conflict. As a matter of fact, in 1950, there broke out Korean war in which over 3 million people were killed. Since then, national security has been regarded as the most important and senstive agenda among Korean people. Basic freedom and human rights enshrined in the Constitution has been sacrificed in the name of national security. -
To Examine the Horrors of Trench Warfare
TRENCH WARFARE Objective: To examine the horrors of trench warfare. What problems faced attacking troops? What was Trench Warfare? Trench Warfare was a type of fighting during World War I in which both sides dug trenches that were protected by mines and barbed wire Cross-section of a front-line trench How extensive were the trenches? An aerial photograph of the opposing trenches and no-man's land in Artois, France, July 22, 1917. German trenches are at the right and bottom, British trenches are at the top left. The vertical line to the left of centre indicates the course of a pre-war road. What was life like in the trenches? British trench, France, July 1916 (during the Battle of the Somme) What was life like in the trenches? French soldiers firing over their own dead What were trench rats? Many men killed in the trenches were buried almost where they fell. These corpses, as well as the food scraps that littered the trenches, attracted rats. Quotes from soldiers fighting in the trenches: "The rats were huge. They were so big they would eat a wounded man if he couldn't defend himself." "I saw some rats running from under the dead men's greatcoats, enormous rats, fat with human flesh. My heart pounded as we edged towards one of the bodies. His helmet had rolled off. The man displayed a grimacing face, stripped of flesh; the skull bare, the eyes devoured and from the yawning mouth leapt a rat." What other problems did soldiers face in the trenches? Officers walking through a flooded communication trench. -
Procedures for Reverencing the Tabernacle and the Altar Before, During and After Mass
Procedures for Reverencing the Tabernacle and the Altar Before, During and After Mass Key Terms: Eucharist: The true presence of Christ in the form of his Body and Blood. During Mass, bread and wine are consecrated to become the Body and Blood of Christ. Whatever remains there are of the Body of Christ may be reserved and kept. Tabernacle: The box-like container in which the Eucharistic Bread may be reserved. Sacristy: The room in the church where the priest and other ministers prepare themselves for worship. Altar: The table upon which the bread and wine are blessed and made holy to become the Eucharist. Sanctuary: Often referred to as the Altar area, the Sanctuary is the proper name of the area which includes the Altar, the Ambo (from where the Scriptures are read and the homily may be given), and the Presider’s Chair. Nave: The area of the church where the majority of worshippers are located. This is where the Pews are. Genuflection: The act of bending one knee to the ground whilst making the sign of the Cross. Soon (maybe even next weekend – August 25-26) , the tabernacle will be re-located to behind the altar. How should I respond to the presence of the reserved Eucharist when it will now be permanently kept in the church sanctuary? Whenever you are in the church, you are in a holy place, walking upon holy ground. Everyone ought to be respectful of Holy Rosary Church as a house of worship and prayer. Respect those who are in silent prayer. -
Sanctuary: a Modern Legal Anachronism Dr
SANCTUARY: A MODERN LEGAL ANACHRONISM DR. MICHAEL J. DAVIDSON* The crowd saw him slide down the façade like a raindrop on a windowpane, run over to the executioner’s assistants with the swiftness of a cat, fell them both with his enormous fists, take the gypsy girl in one arm as easily as a child picking up a doll and rush into the church, holding her above his head and shouting in a formidable voice, “Sanctuary!”1 I. INTRODUCTION The ancient tradition of sanctuary is rooted in the power of a religious authority to grant protection, within an inviolable religious structure or area, to persons who fear for their life, limb, or liberty.2 Television has Copyright © 2014, Michael J. Davidson. * S.J.D. (Government Procurement Law), George Washington University School of Law, 2007; L.L.M. (Government Procurement Law), George Washington University School of Law, 1998; L.L.M. (Military Law), The Judge Advocate General’s School, 1994; J.D., College of William & Mary, 1988; B.S., U.S. Military Academy, 1982. The author is a retired Army judge advocate and is currently a federal attorney. He is the author of two books and over forty law review and legal practitioner articles. Any opinions expressed in this Article are those of the author and do not represent the position of any federal agency. 1 VICTOR HUGO, THE HUNCHBACK OF NOTRE-DAME 189 (Lowell Bair ed. & trans., Bantam Books 1956) (1831). 2 Michael Scott Feeley, Toward the Cathedral: Ancient Sanctuary Represented in the American Context, 27 SAN DIEGO L. REV.