Search Results
Your search for Special Operations found 155 results.
- Future of Global Competition
- /analyses/2019/05/future-of-global-competition
- The 2018 National Defense Strategy (NDS) makes clear that competing effectively with state adversaries will be the primary focus of the Department of Defense (DOD) going forward. Irregular warfare (IW) is a key element of modern great power competition (GPC), and our adversaries are deftly exploiting unconventional methodologies— particularly the use of information and intermediaries (i.e., proxies and surrogates)—as mediums of national influence. In March 2019, CNA hosted a cohort of academic, government, and military experts for a discussion on how special operations forces (SOF) can best lead or support US Government (USG) efforts to compete successfully on a global scale using information operations and intermediary partnerships. The discussion is summarized and synthesized in this document.
- experts for a discussion on how special operations forces (SOF) can best lead or support US Government (USG) efforts to compete successfully on a global scale using information operations and intermediary ... , and military experts for a discussion on how special operations forces (SOF) can best lead or support US Government (USG) efforts to compete successfully on a global scale using information operations ... military entity to consistently train for and conduct unconventional warfare operations, and they maintain a significant portion of DOD’s IW capabilities. As such, the US Special Operations Command (SOCOM
- Maritime Sabotage and Implications for Strategic Competition
- /analyses/2021/10/maritime-sabotage-and-implications-for-strategic-competition
- Warring sides have undertaken sabotage operations throughout history to generate battlefield effects, with varying degrees of success. In many cases, the forces conducting these operations have been special operations forces, their predecessors, or intelligence agencies. CNA initiated a quick-look study to examine past instances of sabotage in order to derive lessons and best practices for the future conduct of such operations. To increase the utility of the study for US Navy and US Marine Corps organizations, and because of the dearth of prior research on the topic, we focused our efforts on examining sabotage in the maritime domain. We generated a dataset of maritime sabotage instances dating back to World War II and analyzed this dataset according to a set of coding variables. These coding variables allowed us to perform both descriptive analysis of the dataset, as well as exploratory analysis.
- Maritime Sabotage and Implications for Strategic Competition Maritime Sabotage: Lessons Learned and Implications for Strategic Competition Warring sides have undertaken sabotage operations throughout history to generate battlefield effects, with varying degrees of success. In many cases, the forces conducting these operations have been special operations forces, their predecessors ... cases, the forces conducting these operations have been special operations forces (SOF), their predecessors, or intelligence agencies. During World War II, for example, the US Office of Strategic Services
- Understanding Gender and Violent
- /analyses/2021/04/understanding-gender-and-violent
- The Office of the Assistant Secretary of Defense for Special Operations/Low Intensity Conflict – Stability and Humanitarian Affairs (OASD (SO/LIC-SHA)) asked CNA to study the role of women and gender in both violent extremist organizations (VEOs) and US counterterrorism (CT) and counter violent extremism (CVE) operations (hereafter CT/CVE). Our research demonstrates that the dominant stereotypes about women’s roles in VEOs miss the vast majority of female activity in these groups and fundamentally fail to capture women’s lived experiences. Despite the passage of Women, Peace, and Security (WPS) legislation in the US, we found that internal DOD activities that are truly gender considered are severely limited, lack nuance, and are not institutionalized. External US CT/CVE efforts do not consider the roles men or women play from a nuanced perspective, and they are disproportionately influenced by a set of gender stereotypes that shape expectations of men and women’s roles. Much of the current DOD approach can be traced to misunderstanding gender as a concept. This report provides an analysis of the gaps, risks, and opportunities for the Department of Defense (DOD) on understanding women and gender in extremism, and integrating a gender considered approach to CT/CVE.
- Understanding Gender and Violent Understanding Gender and Violent Extremism The Office of the Assistant Secretary of Defense for Special Operations/Low Intensity Conflict – Stability ... Secretary of Defense for Special Operations/Low Intensity Conflict – Stability and Humanitarian Affairs (OASD (SO/LIC-SHA)) asked CNA to study the role of women and gender in both violent extremist ... in the short and long terms? What are the existing Department of Defense (DOD) and Special Operations Forces (SOF) approaches and policies regarding gender and CT/CVE? What opportunities
- ai and autonomy in russia: Special Issue, September 8, 2022
- /our-media/newsletters/ai-and-autonomy-in-russia/special-issue
- September 8, 2022 issue features translations of several Russian military journal articles that reflect on the use of AI and autonomy. All have been written since the Russian invasion of Ukraine.
- development of the success of the operation. At the same time, the role of special operations and special forces is increasing, and the range of tasks they perform is expanding. In general, it can ... operations to achieve the goals. On this occasion, back in 1926, in his work “Strategy”, A. Svechin wrote: “For each war, it is necessary to develop a special line of strategic behavior, each war ... on the analysis and generalization of military experience. These features include: widespread use of special operations forces; the use of asymmetric, non-standard methods of military operations
- Alison Vernon
- /our-experts/vernon-alison
- Alison Vernon is a Senior Research Scientist at CNA.
- and has also used this model to assess effects in training and special operations. As part of these efforts Vernon has traveled extensively in Asia, South and Central America, the Caribbean ... Vernon-Alison Alison Vernon is a Senior Research Scientist at CNA. /images/Experts/Vernon-Alison.webp Alison Rimsky Vernon has conducted studies ranging from an overview of military operations in the 1990s; US civil-military relations; the issue of interagency cooperation during military operations; the role of humanitarian operations in the War on Terror, Navy strategic laydown and global
- Operational Warfighting Division
- /centers-and-divisions/cna/ow
- Research spans the spectrum of warfighting, from combined operations with allies to cyber, intelligence and special operations.
- OW Research spans the spectrum of warfighting, from combined operations with allies to cyber, intelligence and special operations. /images/Centers/CNA/OWBannerB%26W.jpg Operational Warfighting ... , from combined operations with allies to cyber, intelligence and special operations. CNA analyses link concepts to the real world through an iterative research cycle: Wargaming Concept development Hypothesis testing Exercise assessment Operations assessment Division /images/Centers/CNA/OWBanner.jpg
- coming in from the cold: Urgent Fury: The 1983 Invasion of Grenada
- /our-media/podcasts/coming-in-from-the-cold/39
- In 1983, the United States along with Caribbean partner nations invaded the island nation of Grenada. The goals of the operation outlined by the Reagan administration were to protect American citizens on the island, forestall further chaos, and restore the rule of law and order on the island of Grenada. While broadly successful in objectives, the operation was criticized by both U.S. and allied officials. In this episode of Coming in From the Cold, Alex Powell and Steve Wills join Bill, to discuss operation Urgent Fury, and its impact on military reform and special operations forces.
- and allied officials. In this episode of Coming in From the Cold, Alex Powell and Steve Wills join Bill, to discuss operation Urgent Fury, and its impact on military reform and special operations forces ... combatants, including an assignment as the executive officer of a mine countermeasures ship. Alex Powell is an expert on terrorist group tactics, counterterrorism, and special operations forces ... : The Planning and Execution of Joint Operations in Grenada, 12 October – 2 November 1983 (Washington, DC: DOD, 1997). Danny Shaw, “Grenada: 38 Years after a Triple Assassination, the Short-Lived
- Proxy Warfare
- /analyses/2019/07/proxy-warfare
- Proxy warfare—that is, conflict in which a “major power instigates or plays a major role in supporting and directing to a conflict but does only a small portion of the actual fighting itself”—is receiving new attention from policymakers, analysts, and practitioners. This study uses a series of four case studies on US involvement in proxy war (the “Secret War” in Laos, the Contras in Central America, the African Union Mission in Somalia, and the Syrian Defense Forces) to develop a set of key themes. These themes, in turn, form the basis of a set of rules of thumb to guide senior decisionmakers as they contemplate the future use of proxy forces. Finally, this report discusses implications for U.S. Special Operations Forces, which are likely to play an increasingly important role in supporting U.S. proxies.
- Special Operations Forces, which are likely to play an increasingly important role in supporting U.S. proxies. Proxy warfare, according to one definition, occurs “when a major power instigates or plays ... following the attacks of September 11, 2001, Congress granted the Department of Defense, and US Special Operations Command, significant authorities to organize, train, equip, and advise proxy forces. However ... and military officials should consider when developing plans, policies, and programs for surrogate-support operations: Policy-makers should set limited, reasonable objectives for proxies to accomplish
- Christopher Steinitz
- /our-experts/steinitz-christopher
- Chris Steinitz is a CNA wargame designer and facilitator.
- Steinitz-Christopher Chris Steinitz is a CNA wargame designer and facilitator. /images/Experts/Steinitz-Christopher.webp Chris Steinitz is a senior wargame designer and facilitator. He has designed and executed wargames to examine topics including force structure, operational warfighting, special operations, adversary decision-making and climate change. At CNA, he has conducted studies ... adversary analytics program, served as a scientific analyst to the Director for International Engagement in the Office of the Chief of Naval Operations, and deployed aboard the USS John C. Stennis
- Innovation and Communications
- /expertise/innovation-and-communications
- CNA experts in machine learning, AI, cybersecurity, autonomy, drones, and data links help DOD, the FAA, and first responders make the most of new technology.
- /expertise/INNOVATIONBanner.jpg Innovation and Communications The 21st century requires new types of expertise that CNA has developed as special areas of focus. We use artificial intelligence and machine ... resulted in significant reliability improvements. And CNA has pioneered a capability to incorporate cyber operations into any wargame through the Merlin cyber module. Onsite Analysis|Operations ... of tomorrow. video report podcast Battlefield of Tomorrow none half /images/research/AegisSystem.jpg blank blank orange half small AI AND NUCLEAR OPERATIONS: IDENTIFYING AND MITIGATING RISKS