THE PAPER | Net Assessment: Threats to Future Army Acquisitions by Joel Lawton and Phillip Serpico, SWJ

By Joel Lawton and Phillip Serpico  (Edited by: Barry Wardlaw, SWJ) Introduction The Net Assessment Working Group, comp...

By Joel Lawton and Phillip Serpico 
(Edited by: Barry Wardlaw, SWJ)

THE PAPER | Net Assessment: Threats to Future Army Acquisitions by Joel Lawton and Phillip Serpico, SWJ


Introduction

The Net Assessment Working Group, comprised of Army science and technology (S&T) experts, formed to compare planned S&T acquisitions and investments with emerging technologies. The purpose was to assist the Army in defining potential areas where future forces may be presented with “overmatch” technologies from adversaries that may impact future forces. In March 2015, Net Assessment Working Group participants identified the following:  1) Army mobility and protection assets are at risk from the proliferation and advances of anti-tank guided missiles (ATGM); 2) Army aviation assets are facing an increasing threat from area denial (AD) strategies as well as a growing range of weapons; 3) Individual Soldiers are at risk from a general reliance on position, navigation, and timing (PNT) technologies and cognitive overload; 4) U.S. precision ammunition is at risk from jamming technologies that threaten the delivery of precision fires; 5) Army intelligence and electronic warfare (EW) systems are at risk from cover, camouflage, concealment, denial, and deception (C3D2) technologies and an inability to identify some advanced adversary EW systems: and 6)  Combat Service Support is susceptible to the large resource requirements required to deploy and sustain Army forces where resources may be limited.

Overview

In the near-term, mid-term (2020-2030), and far-term (2030-2040) adversarial technological advances are expected to be wide-ranging and challenging for the U.S. Army to defend against.[i]  In order to ensure the U.S. Army maintains its technological and competitive edge, it is important to categorize the potential for adversary advantage by capability portfolio management and equipment areas identified by the Long-Range Investment Requirements Analysis (LIRA) process. The LIRA is a "30 year long-range planning process" which includes the major investment areas (portfolios) of: Mission Command; Maneuver; Ammunition; Fires, Air, and Missile Defense; Protection/Chemical Biological Radiological, Nuclear and Explosives (CBRNE); Intelligence and Electronic Warfare (EW); Combat Service Support; Aviation; Soldier, and Mobility.[ii] Thus, the LIRA is a 30-year plan that depicts the “big picture,” linking “all capability gaps to S&T activity to fielding material, and every fielding operations, support and eventual disposal and/or replacement.”[iii]

This paper examines threat insights as they pertain to each of the LIRA's investment categories. Each of the LIRA's categories are related potential threats derived from multiple intelligence community assessments and S&T subject matter experts (SME) during a Training and Doctrine Command (TRADOC) and Army Capabilities Integration Center (ARCIC) S&T sponsored Net Assessment Working Group held in March 2015. The purpose of the Net Assessment Working Group was to use members of the Army S&T community to collaborate with ARCIC capability developers to address overmatch concerns. Discussions were limited to topics where potential adversaries may have a technological advantage over future U.S. investments. The insights in this paper are intended to assist the LIRA process and inform the S&T community's research and development efforts.

The Net Assessment Working Group assisted in the substantiation of several concerns impacting some technological investment categories within the LIRA. Some of the insights derived include possible vulnerabilities to space, cyberspace operations (CO), intelligence surveillance reconnaissance (ISR), and U.S. networked Mission Command Systems (MCS). There is a potential for risk in the assessed timeframes as a result of the increased lethality and velocity of kinetic weapons such as anti-tank guided missiles (ATGM), rocket-propelled grenades (RPG), man-portable air-defense systems (MANPADS), and improvised explosive devices (IED) affecting the protection, maneuver, fires, and aviation functions of the Army. Emerging electro-magnetic weapons, such as directed-energy weapons (DEW), radio frequency (RF), electromagnetic rail guns, and advanced electronic attack/jamming will undoubtedly force the Army and Joint community to adapt to these technological and threat-based trends.

This paper discusses generally the future operational environment and how threats may impact future acquisitions. Further, this paper is organized to give the reader a broad sense how the Army will be presented with diverse technologies in the future.  Finally, it associates specific threats to LIRA portfolios and concludes with recommendations that may help the Army mitigate a technological gap in the future.

Threats to Portfolios

The possible threats identified and reviewed by the Net Assessment Working Group were matched against planned U.S. Army technological investments in the mid- and far-terms, as defined above. Major adversarial technological threats that present a challenge to investments in the LIRA are generally developed by near-peer competitors. Conversely, it is unlikely that the U.S. will come into direct confrontation with near-peers, but nations supplied or sold these technologies may pose a threat to the U.S. or its interests. This proliferation makes it possible that the U.S. will confront advanced technologies that can have an advantage over planned programs in the LIRA.    

Adversaries will continue to target U.S. vulnerabilities and try to negate technological areas where the U.S. has the advantage. In the mid- and far­terms, access to progressively more advanced technology will give adversaries increased advantage in: range, inventory, and precision of rockets and missiles; space capabilities; counter-precision capabilities, and an increase in the lethality within small units.[iv] These future threats require comprehensive solutions to mitigate due to pervasive characteristics of the operational environment (OE), which include: increased velocity and momentum of human interaction and events; potential for overmatch; proliferation of weapons of mass destruction; spread of advanced cyberspace and counter-space capabilities; ease of technology transfer to state and non-state actors; transparency and ubiquitous media, and demographics and operations among populations, in cities, and in complex terrain.[v] [vi] Ergo, the characteristics of future adversaries will be complex, dynamic, innovative, and determined to match or supplant historical U.S. technological advantages.

The proliferation and distribution of new and emerging technologies makes it important that the Army develop a comprehensive concept and capability development program through collaboration with the public and private S&T communities. The ambiguity about technological advances of potential near-peer adversaries and the proliferation of those technologies to non-state groups presents a challenging future OE, and along with ominous DoD budget cuts, makes prioritized S&T investments critical. Former Secretary of Defense, Chuck Hagel, stated in his 2014 Defense Innovation Initiative Memorandum that the U.S. must accelerate innovation through “identify[ing], develop[ing], and field[ing] breakthrough technologies and systems that sustain and advance the capability of U.S. military power” in order to assure “America’s continued strategic dominance.”[vii]  Conclusively, the Net Assessment insights help the Army think about the evolution of the OE and the effects of all aspects of technology on the future of armed conflict.

Net Assessment Insights

The proliferation of technology in the near-, mid-, and far-terms puts planned Army investments at risk. Programmed technologies in the LIRA address some concerns through near-term (i.e., until 2020). Near-peer adversaries are currently investing heavily in capabilities, technologies, and concepts in order to mitigate perceived U.S. advantages on the battlefield. Their investments will likely create a technological gap throughout the mid- and far-terms, confronting the Army with commensurate or superior technologies. Joint and Army investments throughout the far-term will have to address the concerns of the future through developing advanced technologies and concepts in order to minimize adversarial advances in weapon and technology effects.

Mobility and Protection. The LIRA’s Mobility and Protection portfolios are at risk throughout the far-term from several threats exhibited currently. The most stressing threat to the portfolio is the proliferation of and advances in ATGMs. Trends indicate advances in ATGM effects have accelerated partner-nations’ investments in protection systems. The use of protection systems by partners have had great success in recent conflicts, increasing the survivability of many armor platforms. Such advancements include Israel’s development and deployment of the Trophy Active Protection Systems (APS) used during the 2014 Israel-Gaza Conflict. However, LIRA investments do little to advance or invest in APS.

Another stressing threat is system survivability and protection against IED blasts. IEDs are easily made and adapted by both state and non-state adversaries. Presently, the Army has invested in IED protections (e.g., heavy armor packages for vehicles, electronic counter-measures, and body armor for dismounted troops), but due to pervasiveness and adaptability of the IED threat, protection and mobility will continue to be at risk throughout the far-term. The LIRA does not sufficiently invest in capabilities to defend against the impacts of IED technologies without impacting mobility (i.e., size, weight, and power considerations).

An additional threat to the portfolios is the use of chemical and biological weapons by state and non-state actors. The LIRA does not invest in areas of CBRNE, presenting a threat to future land forces. As the recent cases of the use of chemical weapons in Syria has shown the DoD, state and non-state actors will exploit the low cost of CBRNE weapons as an effective alternative to expensive advanced weapon systems. Near-peer adversaries are making advances in fourth-generation chemical and biological agents that will likely be weaponized by unpredictable non-state actors. Current protection equipment is currently not adequate for use against all types of CBRNE attacks. This makes the Protection portfolio vulnerable to new or modified CBRNE technology (e.g., inoculations, protective gear, decontamination; etc.) and risks Mobility through degraded maneuver in a CBRNE environment.

Aviation. The Aviation portfolio is facing an increasing threat from area denial (AD) strategies as well as growing range of weapons. Such as the proliferation of MANPADS, programmable fusing munitions, long-range air defense systems, and air-to-air missiles, which increases the threat to aircrafts and their associated mission sets. Within the LIRA and tech base (i.e., technologies available, but not programmed) there are programs looking at increasing the capability of airframes to defend against advances in these weapons. However, the Net Assessment Working Group was aware of few technologies that could counter the threat posed by MANPADS due to a general lack of research and development directed towards counter technologies.

Participants also noted counter-tactics such as avoidance that will do little to thwart this threat and will likely diminish effectiveness by adding to, for example, loiter and response times. Concepts and technology together must begin to address the increasing AD threat and allow the Army to maintain its advantage in the air domain.

Soldier. Technology threats and cognitive overload pose risk to the Soldier portfolio. Initially, the targeting of U.S, position, navigation, and timing (PNT) systems will be the most stressing threat. Soldiers will likely face degraded or denied PNT throughout the far-term when faced with adversarial employment of jamming and spoofing technologies. Current PNT systems rely on 1970’s technology enabled by the Global Position System (GPS); which has limited defenses. In the future, PNT must be available in environments where GPS is unavailable. The Net Assessment Working Group believed LIRA investments are adequate to ensure the effects from jamming or spoofing will be limited and the Army can operate in a GPS denied or degraded OE. However, provisions and requirements must be made within the acquisition and S&T communities to ensure access to PNT in any environment.

Cognitive overload is another risk that Soldiers may be presented with when challenged with managing numerous Mission Command Systems, operating in complex environments, and analyzing all variables of the OE. The LIRA does have some programs to optimize cognitive performance via emphasizing “Agile and Adaptive Leaders.”[viii] Agile and Adaptive Leaders is a “position of intellectual advantage over a situation or adversary that fosters proactive agility over reactive adaptation, facilitating the ability to anticipate change before it occurs.”[ix] This will allow for Soldiers, leaders, and decision-makers to make timely judgments and maneuver through complex areas of operation. Training in the mid- and far-terms must assimilate new techniques to foster competencies in cognitive dominance to deal with the complexities and countless variables where Soldiers will have to make decisions. 

Ammunition. The Ammunition portfolio is another category where jamming technologies pose risk to the delivery and range of munitions. Specifically, precision-guided munitions (PGM) are enabled by PNT technologies and may be vulnerable to GPS denial systems. Denial of GPS through jamming or spoofing could reduce or degrade the Army’s ability to deliver precision fires. Alternative PNT technologies (i.e., other than GPS) need to be integrated into PGM development programs to ensure the delivery and accuracy of munitions in the future. The LIRA and tech base does little to address the development of alternatives to traditional PNT technologies within PGMs. The development of future munitions similarly should address their survivability in AD environments.

Intelligence and EW. The Intelligence and EW portfolio is at risk from cover, camouflage, concealment, denial, and deception (C3D2) technologies as well as an inability to identify some advanced adversary EW systems. Near-peer adversaries currently have advanced C3 that is designed to conceal the locations of air defense systems or advanced decoys used to deceive oppositional forces. C3D2 technologies are comparatively inexpensive to produce and provide protection to both ground and air defense systems. The LIRA or tech base does little to invest in systems to help the Army distinguish between actual or decoy systems.

A second area of concern is that the DoD has invested much into the interoperability of Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) systems, but greater compatibility of systems will be needed throughout the far-term. The Net Assessment Working Group believed that EW and intelligence systems are not integrated well. This impacts how information and data is disseminated throughout the intelligence community (IC) as well as between military IC components. Future Intelligence and EW investments will have to address the interoperability through a systems-of-systems (SoS) approach and procedurally systematize the integration of EW with intelligence functions. 

Combat Service Support. The Combat Service Support portfolio is susceptible to the large resource requirements required to deploy and sustain Army forces where in-theater resources may be limited. Power and energy resources (e.g., fuel, electric power generation; etc.) are the most contentious resource constraints. Increasing power and energy consumption of the future force may limit response times and sustainment of land and air systems. The Army has invested in lighter and more efficient systems (e.g., solar power, fuel efficient vehicles; etc.), nonetheless improvements are needed to facilitate a smaller, lighter, and versatile supply chain. Throughout the far-term, it is expected that DoD budgets will be constrained, thus requiring an efficacious approach to power and energy consumption.   

Conclusion and Recommendations

The Army will undoubtedly be challenged with a diverse and challenging future OE. This will require “the U.S. Army to innovate to ensure that forces are prepared to accomplish future missions.”[x] The Net Assessment Working Group is part of many efforts throughout the Army intended to help to “anticipate the demands of future armed conflict.”[xi] Specifically, this event and other concurrent efforts will help the Army maintain a technological edge and maintain its position of “overmatch” over adversaries through prioritizing investments, determining capability gaps, and organizing a greater community of interest.

Recommendation 1. The LIRA’s portfolios will remain contested throughout the far-term. The S&T community, through research and development efforts, can present a range of viable and sustainable solutions to counter threats to U.S. systems and capabilities. One potential approach may be to seek partner nation technologies as well as work with the trusted international communities to foster new and innovative solutions.  Solutions must also be broad and agile enough to adapt to changes in the OE and emerging technologies.

Recommendation 2. The Army should initiate a phased approach to research and development, acquisition, and Joint Force collaboration. In the interim, the Army S&T community should continue to explore, develop, and expand existing technologies by adding to the tech base. During this period, Mobility and Protection portfolio technologies should receive priority; followed by Soldier and Aviation portfolios. Also, programs funded through LIRA investments that provide little value to sustaining or advancing Joint Force capabilities should be reallocated to areas of high risk within the portfolios. Following realignment and prioritization of efforts, the Army should take strides to work with the Joint Force and Office of the Under Secretary of Defense for Acquisition, Technology and Logistics [OSD (AT&L)] to develop a Joint Net Assessment. The purpose of a Joint Net Assessment would be to examine technologies across the services and to prioritize capability gaps requiring improvement or expansion.

Recommendation 3. Use of TRADOC G-2’s Mad Scientist line of effort and ARCIC’s Technology Industry Exchange (TIE) to better integrate private sector, academic, and the S&T community of interest with LIRA planning initiatives. Mad Scientist, enables continuous dialogue to help the “Army think about the evolution of the OE and the effects of all aspects of technology on the far future of Armed Conflict.”[xii] Mad Scientist and TIE can be used as a venue to help prioritize investment/acquisition activities by linking them to specific technologies, capabilities, and concepts.

The opinions expressed in this paper are those of the authors, and may not represent those of the U.S. Government, Department of Defense, U.S. Army, or TRADOC.

About The Authors:

Joel Lawton ,is a former member of the U.S. Army’s Human Terrain System (HTS). His work with HTS included working in the U.S. and two tours to Afghanistan, where he conducted socio-cultural research management, collection, and support; as well as open-source intelligence analysis and qualitative data collection and analysis. Joel served in the USMC, deploying to southern Helmand Province in 2009 in support of combat operations. Further, Joel is an advocate of qualitative analysis and its use in military intelligence collection efforts. He currently works as an intelligence analyst for the Army, Training and Doctrine Command (TRADOC). Email: joel.b.lawton@gmail.com

Major Phillip Serpico is an Army Field Artillery Officer with experience in targeting and planning joint fires. His most recent deployment was to Regional Command South (RC-S) Afghanistan in 2010, where he served as the Assist Division Fire Support Coordinator. His other published works include a 2011 Center for Army Lesson Learned (CALL) article titled Joint Fires in Regional Command, South. MAJ Serpico also served as a military transition team advisor in Iraq in 2006-2007. He is currently serving as a military analyst for the Science and Technology (S&T) Division within the Army Capabilities Integration Center (ARCIC).

 
End Notes

[i] ARCIC S&T. “Balancing S&T Efforts and Innovation for the Deep Future.” October 2014. Overall document classification is: SECRET//NOFORN.  Extracted content is: UNCLASSIFIED

[ii] Department of the Army. Army Equipment in Support of Presidents Budget 2015. May 2014. Overall document classification is: UNCLASSIFIED

[iii] Matrisciano, Vince. “Thirty-Year Plans: What They Are and Why We Need Them.” Defense AT&L: January-February 2014. http://dau.dodlive.mil/files/2014/11/Matrisciano.pdf. Overall document classification is: UNCLASSIFIED

[iv] TRADOC G-2. “The Potential for Adversary Advantage in the Operational Environment.” Overall document classification is: SECRET//NOFORN. Extracted content is: UNCLASSIFIED.

[v] Department of the Army 2014. The U.S. Army Operating Concept: Win in a Complex World 2020-2040. TRADOC Pamphlet 525-3-1. 31 October, 1-12. Overall document classification is: UNCLASSIFIED

[vi] TRADOC G-2. “The Potential/or Adversary Advantage in the Operational Environment.” Overall document classification is: SECRET//NOFORN. Extracted content is: UNCLASSIFIED.

[vii] Hagel, Chuck, U.S. Secretary of Defense 2014. “The Defense Innovation Initiative.” Memo OSD013411-14. 15 November. Overall document classification is: UNCLASSIFIED

[viii] Gen Mark A. Milley redfined the term “Cognitive Dominance” with Agile and Adaptive Leaders in 2015. See “STAND-TO” article “Cognitive Dominance Education Program” for more information. http://www.army.mil/standto/archive_2015-09-08/

[ix] Nabi, Farzana PhD. “Culture of Learning, Innovation & Human Dimension.” TRADOC Human Dimension Task Force. 20 December 2014, 10. Overall document classification is: UNCLASSIFIED

[x]  Department of the Army 2014. The U.S. Army Operating Concept: Win in a Complex World 2020-2040. TRADOC Pamphlet 525-3-1. 31 October, 8. Overall document classification is: UNCLASSIFIED

[xi] Ibid.


[xii]  Hutchinson, Kira PhD. “Mad Scientist Conference: Human Dimension 2025 and Beyond.” TRADOC G-2. Information Paper, 19 August 2015. Overall document classification is: UNCLASSIFIED
This paper was originally published at Small Wars Journals on October 10, 2015  and licensed under the Creative Commons 3.0 by the Original Publisher itself.

Image Attribute: US 
XM1219 Armed Robotic Vehicle / Source: Wikimedia Commons [Link]


AIDN: 001-10-2015-0352
Name

-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,11,Accidents,22,Activism,1,Adani Group,7,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,36,Aerospace,5,Afghanistan,88,Africa,115,Agile Methodology,2,Agriculture,21,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,6,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,31,Army,3,Art,3,Artificial Intelligence,84,Artillery,2,Arunachal Pradesh,2,ASEAN,13,Asia,71,Asia Pacific,24,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,58,Austria,1,Automation,13,Automotive,133,Autonomous Flight,2,Autonomous Vehicle,4,Aviation,63,AWACS,2,Awards,17,Azerbaijan,17,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Bali,1,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,30,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,2,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,21,BIMSTEC,1,Biodiversity,1,Biography,1,Biology,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,11,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,33,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,7,Bomb,3,Bond Market,3,Book,11,Book Review,24,Border Conflicts,13,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,107,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,5,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1273,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,58,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Banks,1,Central Eastern Europe,49,Certification,1,Chad,2,Chagos Archipelago,1,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Chemistry,1,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,600,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,6,Climate,68,Climate Change,29,Climate Finance,2,Climate Studies,2,Clinical Research,3,Clinton,1,Cloud Computing,46,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,16,Commodities,5,Communication,13,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,2,Conflict,117,Conflict Diamonds,1,Conflict Resolution,49,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,3,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,5,Credit,2,Credit Rating,3,Credit Score,1,Crimea,4,Critical Minerals,1,CRM,1,Croatia,2,Crypto Currency,21,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,9,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,10,Cyber Crime,2,Cyber Security & Warfare,118,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,5,DACA,1,Dagestan,1,DARPA,3,Data,9,Data Analytics,36,Data Center,4,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,14,Debt Fund,1,Decision Support System,5,Defense,12,Defense Deals,8,Deflation,1,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,3,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,5,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,55,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,2,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,Ebrahim Raisi,1,ECB,1,eCommerce,11,Econometrics,2,Economic Indicator,1,Economic Justice,1,Economics,46,Economy,115,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,61,Education,67,EFTA,1,Egypt,28,Election Disinformation,1,Elections,55,Electric Vehicle,15,Electricity,7,Electronics,9,Elon Musk,1,Emerging Markets,1,Employment,23,Energy,317,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,9,Entrepreneurship,15,Environment,48,ePayments,14,Epidemic,6,ESA,1,Ethiopia,4,Eulogy,4,Eurasia,3,Euro,6,Europe,15,European Union,237,EuroZone,5,Exchange-traded Funds,2,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,6,Featured,1439,Federal Reserve,6,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,19,Financial Markets,60,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,15,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,37,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,French Polynesia,1,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,23,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gambling,1,Gaming,1,Garissa Attack,1,Gas Price,24,GATT,1,Gaza,16,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,9,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,11,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,72,Ghana,3,Gibratar,1,Gig economy,1,Glaciology,1,Global Markets,2,Global Perception,1,Global Trade,101,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,5,Google,20,Gorkhaland,1,Government,129,Government Analytics,1,Government Bond,1,GPS,1,Greater Asia,187,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,2,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,5,Haiti,2,Hamas,12,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,17,Houthi,13,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,77,Immigration,21,Impeachment,1,Imran Khan,1,Independent Media,73,India,693,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,28,Indian Ocean,25,Indices,1,Indigenous rights,1,Indo-Pacific,9,Indonesia,25,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,4,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,213,Iraq,54,IRGC,1,Iron & Steel,5,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,154,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,95,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,7,Judicial,4,Julian Assange,1,Justice System,3,Kamala Harris,3,Kanchin,1,Kashmir,10,Kaspersky,1,Kazakhstan,26,Kenya,6,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Ladakh,1,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,84,Law,6,Leadership,3,Lebanon,12,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,2,Light Battle Tank,1,Linkedin,1,Lithium,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,11,Lockdown,1,Lone Wolf Attacks,3,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,51,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,30,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,3,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,19,Meta,3,Metadata,2,Metals,4,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,113,Military Exercise,12,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,58,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,2,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,4,NASA,14,NASDAQ,1,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Aviation,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,13,Netflix,1,Neurosciences,7,New Caledonia,1,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1334,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Noble Prize,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,56,North Korea,60,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,7,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,2,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,388,Oil Gas,7,Oil Price,77,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,130,Open Access,1,Open Journal Systems,2,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,709,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,183,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,27,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Payment Orchestration,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,6,Petrochemicals,1,Petroleum,19,Pharmaceuticals,15,Philippine,1,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,6,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,56,Polynesia,3,Pope,1,Population,7,Portugal,1,Poverty,8,Power Transmission,6,Preprint,1,President APJ Abdul Kalam,2,Presidential Election,35,Press Release,158,Prison System,1,Privacy,18,Private Debt Fund,1,Private Equity,3,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,14,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,8,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,7,Recall,4,Recession,2,Red Sea,6,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,54,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Revenue-based Financing,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,3,Royal Canadian Air Force,1,Rupee,1,Russia,328,Russian Navy,6,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,407,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,4,Securities,2,Security,6,Semiconductor,21,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,3,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Sociology,1,Soft Power,1,Software,8,Software Engineering,1,Solar Energy,17,Somalia,5,South Africa,20,South America,55,South Asia,498,South China Sea,37,South East Asia,84,South Korea,68,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,47,Space Station,3,Spaceflight,1,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,26,Stablecoin,1,Stamps,1,Startups,43,State,1,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,29,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,6,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,114,Taiwan,34,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,5,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,78,Testing,2,Texas,3,Thailand,12,The Middle East,665,Think Tank,317,Tibet,3,TikTok,2,Tim Walz,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,22,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,16,Tsar,1,Tunisia,7,Turkey,75,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,117,Ukraine War,30,Ummah,1,UNCLOS,8,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,86,United Nations,29,United States,788,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US Dollar,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,22,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,26,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,18,Water Politics,8,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,2,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,40,World Economy,33,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,29,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: THE PAPER | Net Assessment: Threats to Future Army Acquisitions by Joel Lawton and Phillip Serpico, SWJ
THE PAPER | Net Assessment: Threats to Future Army Acquisitions by Joel Lawton and Phillip Serpico, SWJ
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4Ev17YIrw04jczeyM6571rezDGIR6Add-8R_txtWBSqQoNRvGWyQDh_dv5q2rGgnupnrPrhf4Jne1JglUn_V4Z3gWrfm5p2ZnzNpUPe5GU4GHunnVOFhzj0vekGOlg4fr1hyphenhyphen7M9-XFxg/s640/ARV-A-L_opt.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4Ev17YIrw04jczeyM6571rezDGIR6Add-8R_txtWBSqQoNRvGWyQDh_dv5q2rGgnupnrPrhf4Jne1JglUn_V4Z3gWrfm5p2ZnzNpUPe5GU4GHunnVOFhzj0vekGOlg4fr1hyphenhyphen7M9-XFxg/s72-c/ARV-A-L_opt.jpg
IndraStra Global
https://www.indrastra.com/2015/10/PAPER-Net-Assessment-Threats-to-Future-Army-Acquisition-0352.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2015/10/PAPER-Net-Assessment-Threats-to-Future-Army-Acquisition-0352.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content