This document discusses the use of unmanned aerial vehicles (UAVs) in the wars in Afghanistan and Iraq. It begins with an introduction on war and then lists the aim of focusing on the types of drones used and their missions. The document provides background on the wars in Afghanistan and Iraq. It then discusses what UAVs are, why they are used, their system composition, and specific types like the Predator and Shadow 200. The conclusion discusses the future of drones and some ethics around their use.
This document outlines various individual and unit awards for military service, including amendments. It provides details for three specific awards of the Distinguished Service Cross to Major Bruce P. Crandall, Second Lieutenant Leland B. Fair, and Sergeant First Class Issac Camacho for their heroic actions in Vietnam and the Philippines. It also lists several foreign military personnel being awarded the Legion of Merit for their service from the 1990s to 2000s.
This document is a report on the 2006 Quadrennial Defense Review conducted by the Department of Defense. It examines how the department has transformed since 2001 to address the new strategic environment characterized by uncertainty, surprise, and non-state threats like terrorism. The review found that the department needs to maintain a sense of wartime urgency, better fuse intelligence and operations, and ensure everything contributes to joint warfighting. It also identified a shift in emphasis from the threats and approaches of the 20th century to the challenges of the 21st, including more proactive and preventative postures.
China's Incomplete Military Transformationmmangusta
This document analyzes weaknesses in China's People's Liberation Army (PLA) by examining its organization, human capital, combat capabilities, and defense industry. It finds that while the PLA has modernized significantly since the 1990s, weaknesses remain. In particular, it faces challenges in joint operations, non-combat operations, and modern hardware. The PLA is working to address these weaknesses through reforms, but they may limit its ability to achieve all of its missions, including deterring Taiwan independence and defending maritime claims, through 2025. Understanding the PLA's weaknesses is important for assessing its military transformation and implications for US and allied security.
I used to play this game called Counter Strike: Source, and now has evolved to Counter Strike: Global Offensive, and because of this game, it inspired to try out for the Marines, as well as apply video game tactics towards real life situations, where gamification (in moderation) could be useful for cognitive flexibility, which further research will be done for this topic in future articles.
This document provides information about Sun Tzu's classic work "The Art of War". It begins with a brief introduction stating that "The Art of War" is considered the oldest military treatise in the world. It then provides contents of the book, organized into 13 chapters that discuss strategies for warfare such as laying plans, waging war, attack by stratagem, tactical dispositions, energy, weak points and strong points, maneuvering, variation in tactics, the army on the march, terrain, the nine situations, the attack by fire, and the use of spies. The document aims to make this classic text more accessible to readers.
The document summarizes key principles from Sun Tzu's classic work "The Art of War". It discusses Sun Tzu's emphasis on using deception and intelligence gathering to defeat an enemy without actual fighting. Some of Sun Tzu's principles mentioned include knowing yourself and your enemy, attacking the enemy's strategy rather than their army directly, and creating a perception of inactivity while actually being ready to move quickly. The document argues these principles remain highly applicable to modern warfare and international relations.
This document outlines various individual and unit awards for military service, including amendments. It provides details for three specific awards of the Distinguished Service Cross to Major Bruce P. Crandall, Second Lieutenant Leland B. Fair, and Sergeant First Class Issac Camacho for their heroic actions in Vietnam and the Philippines. It also lists several foreign military personnel being awarded the Legion of Merit for their service from the 1990s to 2000s.
This document is a report on the 2006 Quadrennial Defense Review conducted by the Department of Defense. It examines how the department has transformed since 2001 to address the new strategic environment characterized by uncertainty, surprise, and non-state threats like terrorism. The review found that the department needs to maintain a sense of wartime urgency, better fuse intelligence and operations, and ensure everything contributes to joint warfighting. It also identified a shift in emphasis from the threats and approaches of the 20th century to the challenges of the 21st, including more proactive and preventative postures.
China's Incomplete Military Transformationmmangusta
This document analyzes weaknesses in China's People's Liberation Army (PLA) by examining its organization, human capital, combat capabilities, and defense industry. It finds that while the PLA has modernized significantly since the 1990s, weaknesses remain. In particular, it faces challenges in joint operations, non-combat operations, and modern hardware. The PLA is working to address these weaknesses through reforms, but they may limit its ability to achieve all of its missions, including deterring Taiwan independence and defending maritime claims, through 2025. Understanding the PLA's weaknesses is important for assessing its military transformation and implications for US and allied security.
I used to play this game called Counter Strike: Source, and now has evolved to Counter Strike: Global Offensive, and because of this game, it inspired to try out for the Marines, as well as apply video game tactics towards real life situations, where gamification (in moderation) could be useful for cognitive flexibility, which further research will be done for this topic in future articles.
This document provides information about Sun Tzu's classic work "The Art of War". It begins with a brief introduction stating that "The Art of War" is considered the oldest military treatise in the world. It then provides contents of the book, organized into 13 chapters that discuss strategies for warfare such as laying plans, waging war, attack by stratagem, tactical dispositions, energy, weak points and strong points, maneuvering, variation in tactics, the army on the march, terrain, the nine situations, the attack by fire, and the use of spies. The document aims to make this classic text more accessible to readers.
The document summarizes key principles from Sun Tzu's classic work "The Art of War". It discusses Sun Tzu's emphasis on using deception and intelligence gathering to defeat an enemy without actual fighting. Some of Sun Tzu's principles mentioned include knowing yourself and your enemy, attacking the enemy's strategy rather than their army directly, and creating a perception of inactivity while actually being ready to move quickly. The document argues these principles remain highly applicable to modern warfare and international relations.
This document provides an overview of the Chinese military strategist and philosopher Sun Tzu and his famous work "The Art of War". Some key points:
- Sun Tzu served as a military strategist for the state of Qi in ancient China and first used his strategies against the states of Ch'u and Wu.
- "The Art of War" was written over 2500 years ago during the Warring States period in China and provides principles of military strategy that are still used today by militaries and businesses.
- The work contains 13 chapters and 390 items exploring strategies like attacking where the enemy is unprepared, using deception, knowing your enemy and your own strengths and weaknesses, and avoiding direct combat in favor
A cursory comparison & contrast between the classics of Sun tzu & Niccolo Machiavelli of the same title -- The Art of War. Is there a philosophy behind the act of war?
This document contains a history homework assignment given to a student about the Battle of Hastings in 1066. It includes background information on the invasion and Battle of Hastings, as well as several primary source excerpts for the student to analyze. The homework assignments ask the student to examine pieces of the Bayeux Tapestry and excerpts written about William the Conqueror to answer questions about how the battle was fought, William as a leader, and the weapons and armor used. The teacher provides feedback on the student's work, noting what they did well and areas for improvement.
Sun Tzu was a Chinese military strategist who lived in the 5th century BC and authored the classic work "The Art of War", covering military strategy and tactics. Some key points from the document include:
- "The Art of War" outlines principles of strategy, tactics, troop management, and planning that have influenced military and business thinking across East Asia and the Western world.
- It emphasizes factors like positioning, planning, and understanding the enemy as being essential for victory in warfare. Tactics discussed include flexible formations and exploiting weaknesses.
- Sun Tzu's teachings stress careful assessment, avoiding direct confrontation of strength, using deception, and winning without battle through strategic advantage. His work continues to be studied for insights
The document provides an overview and summary of Sun Tzu's classic work "The Art of War". It discusses how the text is divided into 13 chapters that cover initial estimations of war, waging war, planning offensives, military disposition, and other strategic concepts. The document also notes that while the book was written in ancient China, its teachings have been studied and applied by various militaries throughout history and remain important in understanding strategy and military planning.
Sun Tzu's Art of War discusses strategic principles for business and warfare. It emphasizes calculating strengths and weaknesses, limiting costs, achieving swift victory, winning without fighting through preparedness, knowing when to attack and when not to, and combining different forces effectively. The document provides examples of companies that effectively applied Sun Tzu's teachings, such as Toyota studying American car buyers and IBM acquiring other companies' shares. Overall, it presents Sun Tzu's Art of War as providing timeless strategic guidance for both military conflicts and business competition.
The document contains passages from Sun Tzu's classic work The Art of War discussing strategic principles for military victory. Some of the key ideas discussed include calculating carefully before battle, knowing when to fight and when not to, understanding superior and inferior forces, preparing while catching the enemy unprepared, avoiding mistakes to ensure victory, using indirect tactics over direct confrontation, and exploiting an enemy's weaknesses. Proper strategy is presented as vital for success in war.
This document provides a history and commentary on Sun Tzu's classic work "The Art of War". It begins with a brief biography of Sun Tzu, noting he lived around 490 BC and wrote the 13 chapters of "The Art of War" which became influential in both China and other countries. The document then excerpts and comments on several chapters, focusing on Sun Tzu's teachings around strategic planning, deception, assessing strengths and weaknesses, maneuvering troops, and adapting to different terrain. The overall message is that war should be a last resort, and the goal should be subduing enemies without actual combat through strategies like dividing their alliance, attacking weaknesses, and maintaining flexibility.
El documento define el liderazgo como el conjunto de habilidades que una persona tiene para influir en un grupo y lograr metas u objetivos. Explica que el poder es la base del líder y cómo se gana, y distingue el poder de la autoridad. Finalmente, destaca la importancia del liderazgo al señalar que ha sido indispensable para el progreso de las sociedades a lo largo de la historia.
Mental health affects how people think, feel and act. It determines how they handle stress and relate to others. Many factors influence mental health, including genetics, life experiences and family history. Some early warning signs of mental health problems are changes in eating, sleeping, energy levels and behavior. Positive mental health allows people to reach their full potential and cope with life's stresses. Maintaining good mental health involves getting help if needed, connecting socially, and living a healthy lifestyle. Stress can be positive or negative. Positive stress motivates and improves performance, while negative stress causes anxiety and decreases functioning.
The document discusses challenges small healthcare providers face in complying with HIPAA security regulations. It notes that while HIPAA and HITECH were meant to improve privacy and security of electronic health records, smaller practices and hospitals struggle with understanding and implementing security standards due to limited resources and technical expertise. This leaves them at greater risk of data breaches compared to larger organizations. Revising HIPAA and providing better guidance tailored to small providers' needs could help address these challenges.
Contest for Students in IT, Computers, Design, Mass media, Content writing, Ideas, Business-Plan, Creativity, Article, Photo & Prizes of Rs. 1 Lakh to WIN.
Este documento lista los ganadores de varios premios para las mejores imágenes de Internet del año 2007, según votaciones de internautas, incluyendo categorías como mejor escenario natural interior y exterior, mejor escenario urbano, mejor montaje, mejor disparo espontáneo, y premios especiales para paisajes humanos, mundo animal, mascotas, pintura urbana y corporal, deportes de aventura, y transporte espectacular; además de reconocimientos al género y público en general. La imagen global más votada alcanzó una puntu
The document discusses atmosphere control and air treatment systems on submarines. It focuses on the need for oxygen supply and carbon dioxide removal to maintain a safe and breathable atmosphere for crew onboard. Key systems discussed include electrochemical oxygen generators that produce oxygen through electrolysis of water, lithium hydroxide absorbers that remove carbon dioxide, and emergency air systems to handle accidents. The goal is to control the atmosphere to support optimal crew performance, similar to normal surface conditions, and allow submarines to stay underwater for extended periods of time.
Ballroom dancing involves two partners dancing with physical contact while following a leader and follower role. The waltz originated in Germany and was popularized in Vienna, having a 3/4 time rhythm where the first beat is accented. It is danced in closed position and has a basic step pattern of stepping forward, to the side, and closing the feet. The cha cha cha is a Latin dance from Cuba with African and Cuban influences, using small steps in a 4/4 rhythm that is slow-slow-quick-quick-slow. It begins on the fourth beat and is counted as "2-3-4 and 1." A line dance has a repeated sequence of steps performed at the same time by a group facing
Kapil Kumar is a project manager with over 6 years of experience managing the installation and configuration of telecommunications equipment including 3G, LTE, BTS, microwave links, and core networks. He is currently working as an implementation manager at Brightview Telecom on projects for Airtel, Telenor, and Bharti Airtel. Previously he has worked on projects for HTIS, Syncroute Infranet, Alcatel-Lucent, and Samsung managing teams, vendors, and ensuring quality, safety and compliance. He has expertise in technologies from Alcatel-Lucent, Huawei, Nokia, Samsung, and Cisco.
India is the seventh largest country by area and the second most populous country with over 1.2 billion people. Clothing in India varies depending on the region and its cultural traditions and has evolved from simple loincloths to more elaborate costumes. India's handmade textiles date back at least 6000 years and are an integral part of its identity and culture. Tapestry is a form of woven textile traditionally created on a vertical loom where all the warp threads are hidden in the completed work. The crafts of India reflect the influence of different empires throughout history and have been embedded as traditions within rural communities. Accessories consist of small decorative items worn for personal adornment. Body ornamentation is a cultural universal found
The Philippine film industry has evolved significantly since its introduction in 1897. It has grown to become the most popular art form in the country, outpacing other art forms in gaining widespread public acceptance across the Philippines. Early films ranged from silent movies to talkies and black and white to color. By the early 1980s, there were over 1,000 movie theaters nationwide and an estimated 2.5 million moviegoers in Metro Manila alone. This document provides background on the history of Philippine cinema from the 1930s to 1990s, examining how films have influenced and reflected Philippine culture. It outlines the purpose to document important events, films and trends that have shaped the industry over the past 90 years. However, sources are limited for the early
This document provides an overview of the Chinese military strategist and philosopher Sun Tzu and his famous work "The Art of War". Some key points:
- Sun Tzu served as a military strategist for the state of Qi in ancient China and first used his strategies against the states of Ch'u and Wu.
- "The Art of War" was written over 2500 years ago during the Warring States period in China and provides principles of military strategy that are still used today by militaries and businesses.
- The work contains 13 chapters and 390 items exploring strategies like attacking where the enemy is unprepared, using deception, knowing your enemy and your own strengths and weaknesses, and avoiding direct combat in favor
A cursory comparison & contrast between the classics of Sun tzu & Niccolo Machiavelli of the same title -- The Art of War. Is there a philosophy behind the act of war?
This document contains a history homework assignment given to a student about the Battle of Hastings in 1066. It includes background information on the invasion and Battle of Hastings, as well as several primary source excerpts for the student to analyze. The homework assignments ask the student to examine pieces of the Bayeux Tapestry and excerpts written about William the Conqueror to answer questions about how the battle was fought, William as a leader, and the weapons and armor used. The teacher provides feedback on the student's work, noting what they did well and areas for improvement.
Sun Tzu was a Chinese military strategist who lived in the 5th century BC and authored the classic work "The Art of War", covering military strategy and tactics. Some key points from the document include:
- "The Art of War" outlines principles of strategy, tactics, troop management, and planning that have influenced military and business thinking across East Asia and the Western world.
- It emphasizes factors like positioning, planning, and understanding the enemy as being essential for victory in warfare. Tactics discussed include flexible formations and exploiting weaknesses.
- Sun Tzu's teachings stress careful assessment, avoiding direct confrontation of strength, using deception, and winning without battle through strategic advantage. His work continues to be studied for insights
The document provides an overview and summary of Sun Tzu's classic work "The Art of War". It discusses how the text is divided into 13 chapters that cover initial estimations of war, waging war, planning offensives, military disposition, and other strategic concepts. The document also notes that while the book was written in ancient China, its teachings have been studied and applied by various militaries throughout history and remain important in understanding strategy and military planning.
Sun Tzu's Art of War discusses strategic principles for business and warfare. It emphasizes calculating strengths and weaknesses, limiting costs, achieving swift victory, winning without fighting through preparedness, knowing when to attack and when not to, and combining different forces effectively. The document provides examples of companies that effectively applied Sun Tzu's teachings, such as Toyota studying American car buyers and IBM acquiring other companies' shares. Overall, it presents Sun Tzu's Art of War as providing timeless strategic guidance for both military conflicts and business competition.
The document contains passages from Sun Tzu's classic work The Art of War discussing strategic principles for military victory. Some of the key ideas discussed include calculating carefully before battle, knowing when to fight and when not to, understanding superior and inferior forces, preparing while catching the enemy unprepared, avoiding mistakes to ensure victory, using indirect tactics over direct confrontation, and exploiting an enemy's weaknesses. Proper strategy is presented as vital for success in war.
This document provides a history and commentary on Sun Tzu's classic work "The Art of War". It begins with a brief biography of Sun Tzu, noting he lived around 490 BC and wrote the 13 chapters of "The Art of War" which became influential in both China and other countries. The document then excerpts and comments on several chapters, focusing on Sun Tzu's teachings around strategic planning, deception, assessing strengths and weaknesses, maneuvering troops, and adapting to different terrain. The overall message is that war should be a last resort, and the goal should be subduing enemies without actual combat through strategies like dividing their alliance, attacking weaknesses, and maintaining flexibility.
El documento define el liderazgo como el conjunto de habilidades que una persona tiene para influir en un grupo y lograr metas u objetivos. Explica que el poder es la base del líder y cómo se gana, y distingue el poder de la autoridad. Finalmente, destaca la importancia del liderazgo al señalar que ha sido indispensable para el progreso de las sociedades a lo largo de la historia.
Mental health affects how people think, feel and act. It determines how they handle stress and relate to others. Many factors influence mental health, including genetics, life experiences and family history. Some early warning signs of mental health problems are changes in eating, sleeping, energy levels and behavior. Positive mental health allows people to reach their full potential and cope with life's stresses. Maintaining good mental health involves getting help if needed, connecting socially, and living a healthy lifestyle. Stress can be positive or negative. Positive stress motivates and improves performance, while negative stress causes anxiety and decreases functioning.
The document discusses challenges small healthcare providers face in complying with HIPAA security regulations. It notes that while HIPAA and HITECH were meant to improve privacy and security of electronic health records, smaller practices and hospitals struggle with understanding and implementing security standards due to limited resources and technical expertise. This leaves them at greater risk of data breaches compared to larger organizations. Revising HIPAA and providing better guidance tailored to small providers' needs could help address these challenges.
Contest for Students in IT, Computers, Design, Mass media, Content writing, Ideas, Business-Plan, Creativity, Article, Photo & Prizes of Rs. 1 Lakh to WIN.
Este documento lista los ganadores de varios premios para las mejores imágenes de Internet del año 2007, según votaciones de internautas, incluyendo categorías como mejor escenario natural interior y exterior, mejor escenario urbano, mejor montaje, mejor disparo espontáneo, y premios especiales para paisajes humanos, mundo animal, mascotas, pintura urbana y corporal, deportes de aventura, y transporte espectacular; además de reconocimientos al género y público en general. La imagen global más votada alcanzó una puntu
The document discusses atmosphere control and air treatment systems on submarines. It focuses on the need for oxygen supply and carbon dioxide removal to maintain a safe and breathable atmosphere for crew onboard. Key systems discussed include electrochemical oxygen generators that produce oxygen through electrolysis of water, lithium hydroxide absorbers that remove carbon dioxide, and emergency air systems to handle accidents. The goal is to control the atmosphere to support optimal crew performance, similar to normal surface conditions, and allow submarines to stay underwater for extended periods of time.
Ballroom dancing involves two partners dancing with physical contact while following a leader and follower role. The waltz originated in Germany and was popularized in Vienna, having a 3/4 time rhythm where the first beat is accented. It is danced in closed position and has a basic step pattern of stepping forward, to the side, and closing the feet. The cha cha cha is a Latin dance from Cuba with African and Cuban influences, using small steps in a 4/4 rhythm that is slow-slow-quick-quick-slow. It begins on the fourth beat and is counted as "2-3-4 and 1." A line dance has a repeated sequence of steps performed at the same time by a group facing
Kapil Kumar is a project manager with over 6 years of experience managing the installation and configuration of telecommunications equipment including 3G, LTE, BTS, microwave links, and core networks. He is currently working as an implementation manager at Brightview Telecom on projects for Airtel, Telenor, and Bharti Airtel. Previously he has worked on projects for HTIS, Syncroute Infranet, Alcatel-Lucent, and Samsung managing teams, vendors, and ensuring quality, safety and compliance. He has expertise in technologies from Alcatel-Lucent, Huawei, Nokia, Samsung, and Cisco.
India is the seventh largest country by area and the second most populous country with over 1.2 billion people. Clothing in India varies depending on the region and its cultural traditions and has evolved from simple loincloths to more elaborate costumes. India's handmade textiles date back at least 6000 years and are an integral part of its identity and culture. Tapestry is a form of woven textile traditionally created on a vertical loom where all the warp threads are hidden in the completed work. The crafts of India reflect the influence of different empires throughout history and have been embedded as traditions within rural communities. Accessories consist of small decorative items worn for personal adornment. Body ornamentation is a cultural universal found
The Philippine film industry has evolved significantly since its introduction in 1897. It has grown to become the most popular art form in the country, outpacing other art forms in gaining widespread public acceptance across the Philippines. Early films ranged from silent movies to talkies and black and white to color. By the early 1980s, there were over 1,000 movie theaters nationwide and an estimated 2.5 million moviegoers in Metro Manila alone. This document provides background on the history of Philippine cinema from the 1930s to 1990s, examining how films have influenced and reflected Philippine culture. It outlines the purpose to document important events, films and trends that have shaped the industry over the past 90 years. However, sources are limited for the early
This paper aims to develop a coherent United Nations approach to support the international community’s efforts to improve the regulation of international transfers of conventional arms. It records the United Nations Organization’s advocacy over the past years of a robust and comprehensive Arms Trade Treaty that covers the full array of conventional weapons as well as ammunition and that includes provisions that arms not be transferred where there is a clear risk that they will be used to commit violations of international humanitarian law and human rights law or seriously undermine development.
The document provides an overview of counterinsurgency efforts in Iraq between 2003 and 2006. It describes the various armed groups involved in the conflict, including Sunni and Shi'a militias, Al Qaeda in Iraq, and criminal gangs. It also analyzes how the U.S. counterinsurgency approach developed over this period, covering issues such as detainee operations, training of Iraqi security forces, and military tactics used in places like Fallujah and Baghdad.
This document discusses a series of war games conducted to examine Russian "gray zone" tactics in Europe. The games featured a Russian team seeking to expand influence, and European and U.S. teams aiming to defend against gray zone activities without war. Key insights include: 1) Russia uses both routine, long-term tactics and more aggressive short-term actions; 2) NATO cannot compel Russia to stop everyday gray zone actions but may deter high-level aggression; and 3) vulnerability to Russian tactics varies across Europe, with the Balkans and countries near Russia most at risk. Civilian organizations, not militaries, are best positioned to counter most Russian gray zone actions. The research suggests the West is winning but does not recognize it
Improving strategic competence lessons from 13 years of warMamuka Mchedlidze
The document outlines lessons learned from 13 years of war based on insights from policymakers and experts involved in national security strategy formation from 2001-2014. It analyzes findings from a RAND workshop on improving strategic competence, including the need for a better understanding of strategic art, more integrated civilian-military strategy processes, ensuring military campaigns are based on a political strategy, and the importance of non-military partners and multinational coordination. The purpose is to help assess capabilities needed for future irregular and hybrid conflicts.
The document is a report published by RAND Corporation that examines the strategic environment and security challenges in Asia from 2030 to 2040. It develops concepts for Chinese and U.S. national interests and policies, and considers potential U.S. national strategy in light of these. It then assesses roles and requirements for the U.S. Army, focusing on security cooperation, protecting bases and allies, and projecting forces if needed. The goal is to promote cooperation while addressing potential conflict.
Future us relationships with iraq and afghanistanmmangusta
This document discusses a PDF document made available from the RAND Corporation website as a public service. The RAND Corporation is a nonprofit research organization that provides objective analysis and solutions to challenges facing the public and private sectors worldwide. This product is part of the RAND Corporation monograph series, which presents major research findings that address challenges facing the public and private sectors.
This document provides an overview and summary of a RAND report that assesses the relative costs and strategic benefits of the U.S. military's overseas basing posture. The report examines how overseas bases support contingency response operations, deterrence efforts, assurance of allies, and security cooperation activities. It also discusses potential risks to investing in overseas facilities, including political risks to access and risks to peacetime and contingency access. The document provides context on the history and current configuration of the U.S. global military posture.
Russia employs hostile measures across the spectrum of conflict to challenge NATO and undermine Western interests. These measures include information operations, economic coercion, paramilitary activities, and limited military force.
Russia has institutionalized these hostile measures and refined their use over the past century. Case studies of recent Russian actions in Moldova, Georgia, Estonia, Ukraine, and Turkey found tactical successes but strategic failures. While achieving short-term goals, these measures weakened Russia's international standing and strengthened NATO unity.
To deter future hostile measures, NATO is pursuing a multifaceted approach including enhanced military readiness, economic sanctions, and political solidarity. Forward-deployed forces aim to reassure allies and raise the potential costs for Russia of further
100 Awesome Military Essay Topics and Ideas - Write On Deadline. Army Values: Why It Is Important to Implement Them - Free Essay Example .... A High-Quality Military Essay for a Reasonable Price. The Military Changed My Life for the Better Essay Example GraduateWay. Military Essay Writing Service with upto 50 OFF by Ph.D. Experts in Canada. Essay On Following Orders In The Army - Why Following Orders in the .... Army Board Essay Topics. US Military History Essay Example Topics and Well Written Essays .... Military topics for research paper. Military Essay Writing Service .... Mandatory Military Service Essay - PHDessay.com. Military Argumentative Essay - CELLESSAY. How To Write An Essay For The Army - Aiston Text. Narrative Essay: Army essay. Buy Essay Online - military essay samples - 2017/10/09. Essay Mandatory Military Service - Should Military Service Be Mandatory?. Army Experiences - Free Essay Example PapersOwl.com. Military Essay Topics - 2021 TopicsMill. The Importance Of Accountability In The Army Essay StudyHippo.com. How To Write A Military Essay: Best Tips From Experts - Tutoriage. The United States Army - Free Essay Example PapersOwl.com. 018 Soldier Essay Example Thatsnotus. Argumentative essay about women in the military. Persuasive Essay: Military Service Free Essay Example. Seven Army Values Essay Telegraph. 1500 Word Essay On Army Values : Essay on Military Accountability. 25 Most Popular Military Essay Topics for Writing Military-Today.com. Argumentative research paper Mandatory Military Service for all Males Essay. 100 Best Military Essay Topics 2024 Updated - EssayWriter. Branches of the military In APA Style Essay Example GraduateWay. ESSAY CONTEST Military Studies. Research paper: Military essays. 010 Veterans Day Essay Example What Is Expository Outline Of An .... Expert Essay Writers - military research paper topics - 2017/10/10 Military Essay Topics Military Essay Topics
100+ Awesome Military Essay Topics and Ideas - Write On Deadline. Army Values: Why It Is Important to Implement Them - Free Essay Example .... A High-Quality Military Essay for a Reasonable Price. ⇉The Military Changed My Life for the Better Essay Example | GraduateWay. Military Essay Writing S
This document summarizes a RAND Corporation study assessing the implications of allowing transgender personnel to serve openly in the U.S. military. The study estimates the number of transgender service members, the healthcare needs and costs associated with transition-related treatment, potential readiness impacts, and lessons from foreign militaries. The report finds that the number of transgender personnel in the military is likely small but their healthcare needs are generally consistent with established medical standards. Allowing transgender service was also found to have little impact on operational effectiveness or unit cohesion based on the experiences of foreign militaries.
This document is a research paper presented to Air Force 2025 that examines the capabilities required for interdiction missions in the year 2025. It discusses that interdiction will still rely on precision employment and information dominance, which stem from accuracy, lethality, target detection/identification, and cycle time. The paper outlines that future interdiction systems will need to delay, disrupt, destroy, or divert both personnel and materiel across a range of environments and scenarios, requiring improvements in accuracy measured in centimeters rather than meters, as well as variable levels of lethality and faster target detection and engagement times. Technologies like nanotechnology, nonlinear modeling, and expanded use of the electromagnetic spectrum are identified as enabling future interdiction capabilities.
Counterterrorism and Cybersecurity: Total Information AwarenessNewton Lee
From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism."
In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed.
The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace.
This document is a thesis submitted to Central European University examining the changing discourse surrounding the American drone debate. The 15,865-word thesis analyzes how drones can be considered both conventional and non-conventional weapons, using Just War Theory and the concept of military revolution. It contrasts the early 1950s nuclear debate with the current drone debate, and examines how the Obama administration justifies drone strikes while critics argue they raise moral and ethical issues. It also analyzes how popular media representations, like TV shows and films, have influenced public opinion and the debate.
This thesis examines the potential incentives a leader may have to initiate war in order to consolidate domestic power and implement demanding policies. The model proposes that threatening the population with the consequences of an external defeat during a time of war can deter them from attempting a revolution. This allows the leader to extract more from the population, who choose to voluntarily relinquish some liberty in order to avoid the costs of war. The thesis then extends the model to consider how generating popular support for a belligerent foreign policy can similarly commit the leader in the short term when other commitment devices may be imperfect. Historical examples from the Franco-Prussian War and Cold War are discussed in relation to the incentives proposed in the models.
The U.S. Marine Corps made extensive use of heavy armored forces such as tanks and amphibious assault vehicles in both major combat operations and counterinsurgency operations in Iraq. Tanks and AAVs provided protected mobility, fire support for dismounted infantry, and convoy security. While less heavily armored than tanks, AAVs still contributed to minimizing casualties. Marine Corps sources consider tanks a major contributor to success in counterinsurgency due to their ability to withstand attacks from insurgent weapons that would have destroyed other vehicles.
This document provides a summary of factors that can contribute to or impede the spread of violence from civil conflicts like the ongoing war in Syria to neighboring countries. It examines how these factors apply to four neighboring countries - Turkey, Lebanon, Iraq, and Jordan. The key factors discussed are external support/intervention, refugees, fragility of neighboring states, ethnic/cultural ties, access to open media, perceived uncertainty, timing/effectiveness of intervention, and government/insurgent capabilities. The document analyzes the influence of these factors on each country and assesses the likelihood and forms of potential spillover violence from Syria.
This document provides a summary of the Occasional Paper No. 1 by Matthew Schroeder from the Federation of American Scientists. The paper examines the threats posed by the proliferation of small arms and light weapons in Latin America, with a focus on how they fuel conflict and violence in Colombia. It discusses the Organization of American States' Inter-American Convention Against the Illicit Manufacturing of and Trafficking in Firearms as a tool to address these threats. Specifically, the Convention aims to prevent arms from entering the illicit market by requiring basic controls on firearms manufacturing and transfers among member states. While many countries in the Americas have ratified the Convention, the paper argues universal ratification, including by the United States, is urg
2019This report is available online at www.dia.milMil.docxvickeryr87
2019
This report is available online at www.dia.mil/Military-Power-Publications.
For media and public inquiries about this report, contact [email protected]
For more information about the Defense Intelligence Agency, visit DIA's website at www.dia.mil.
Information cutoff date, November 2018.
Cover image, Navy frigate Yantai of the 11th Chinese naval escort flotilla. Source: Shutterstock.
DIA-02-1706-085
INTENTIONALLY LEFT BLANK
IV
PREFACE
In September 1981, Secretary of Defense Caspar Weinberger asked the Defense Intelligence Agency to
produce an unclassified overview of the Soviet Union’s military strength. The purpose was to provide
America's leaders, the national security community, and the public a comprehensive and accurate view
of the threat. The result: the first edition of Soviet Military Power. DIA produced over 250,000 copies, and
it soon became an annual publication that was translated into eight languages and distributed around
the world. In many cases, this report conveyed the scope and breadth of Soviet military strength to U.S.
policymakers and the public for the first time.
In the spirit of Soviet Military Power, DIA began in 2017 to produce a series of unclassified Defense
Intelligence overviews of major foreign military challenges we face. This volume provides details on
China’s defense and military goals, strategy, plans, and intentions; the organization, structure, and
capability of its military supporting those goals; and the enabling infrastructure and industrial base.
This product and other reports in the series are intended to inform our public, our leaders, the national
security community, and partner nations about the challenges we face in the 21st century.
C H I N A M I LITA RY P OW E R Modernizing a Force to Fight and Win
D
E
F
E
N
S
E
I
N
T
E
L
L
I
G
E
N
C
E
A
G
E
N
C
Y
V
The Defense Intelligence Agency—indeed the broader U.S. Intelligence Community—is continually asked, "What
do we need to know about China?" What is China’s vision of the world and its role in it? What are Beijing’s strategic
intentions and what are the implications for Washington? How are the PLA’s roles and missions changing as it
becomes a more capable military force?
Since Mao Zedong’s Communist Revolution in October 1949 brought the Chinese Communist Party to power, China
has struggled to identify and align itself with its desired place in the world. Early factional struggles for control of party
leadership, decades of negotiations to define territorial boundaries, and continued claims to territories not yet recovered
have at times seemed at odds with the self-described nature of the Chinese as peace-loving and oriented only toward
their own defense. Chinese leaders historically have been willing to use military force against threats to their regime,
whether foreign or domestic, at times preemptively. Lack of significant involvement in military operations during the
last several dec.
This document discusses the changing nature of warfare due to new unmanned vehicle robotic technologies. It covers the current state of robotic technology in militaries, including unmanned ground vehicles (UGVs) and unmanned aerial vehicles (UAVs). The document also discusses future strategies that may involve hiding robots from sensors using decoys, fiber optic vehicles, electronic attack, and swarming robot strategies. It considers how technologies may change after electronic attacks and proposes concepts like cell phone dirigibles. The overall document examines how robotic technologies will impact future warfare.
1. The Use of Unmanned Air Vehicle
(UAVs) in the War on Afghanistan
and the War on Iraq
Mohammed Dayraki
104357965
Engineering, Military, & Society
06-88-590-10
Instructor:
Dr. Graham Reader
Leading Teaching Assistants:
Lorraine Grodin
Shouvik Dev
Kelvin Xie
Department of Electrical Engineering, Faculty of Engineering
University of Windsor
401 Sunset Avenue, Windsor, ON N9B 3P4
2. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
1
The Project “The Use of Unmanned Aerial Vehicles (UAVs) in the War on Afghanistan
and the War on Iraq” and its content is the Original Work of Mohammed A. Dayraki
(104357965).
Signature: ________________
3. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
2
Abstract
The project talks about the use of unmanned aerial vehicles in both wars on Afghanistan
and Iraq. Its goal is to focus on the types of drones used and types of missions those
drones had. Starting with meaning of war, this paper highlights the history of weapons
used in major wars and then states the reasons lying behind wars. It also gives a glimpse
about the unmanned aerial vehicle and why are they sometimes used instead of normal
manned jets. AUVs are subsystems assembled together to act as a whole system and
while reading the paper, a lot of components will be introduced and explained. Types of
UAVs such as the Predator and the Shadow 200 are brought into the paper as examples
of drones used in the war on Afghanistan and Iraq. And by summing up, the author talks
about the future of drones and some ethics related to the use of these drones in the
battlefield.
5. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
4
Introduction
“War does not determine who is right. Only who is left” Bertrand Russell said. Although
The Use of UAVs in the War on Afghanistan and the War on Afghanistan doesn’t
go deep explaining this quote, this project opens the mind for the why and the how it
determines who is left. Going back in time, killing another human needed a man 5 feet
away with a sword to stab him. After that, rifles were created the ability to kill from
distance made it easier to kill because people are not witnessing the death directly
anymore. Today, the operator sitting behind the chair is not even recognized by the
victim but even though, killing is killing no matter what. The only difference is that the
more far you are, the safer you feel, and the easier to kill. This is war.
6. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
5
Aim
The purpose of this project is to explain the components of an unmanned aerial vehicle,
to list the drones used in the war on Afghanistan and Iraq, and to specify unique
missions held by them.
7. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
6
A Look into War
People talk about war in the terms of a right or a wrong thing. Others think that having
war comes from a moral judgment or a moral tradition. War itself is another world apart
from the world we are living where life is at stake and where there is no humanity. In
war, people do what they have to do to satisfy their selfishness. “In time of war the law
is silent” [1]. As the famous proverb says, “All’s fair in love and war” and this means
there’s no rules in love and war.
People can be faithful or faithless, they can be giving or receiving, they can be calm or
angry. In cases of love and war, betrayal is an option and seduction is an option too.
When we come for the question about the definition of war, we imagine death as an
answer. War means killing people without distinction of age, sex, or moral condition.
War means death without taking into consideration who’s right or who’s wrong. War
itself is a crime without looking deeper into that word.
The Flashback of Weapons in Use
“In order to attack the enemy’s strategy, we must understand the enemy and we must
understand war” Sun Tzu said [2]. This means that before going into war, we need to
take our time studying wars, their reasons, and how to deal with them in addition to
studying our enemy’s strength point, weakness points, gates, and walls. Technology
throughout history played a big role in defining what is violent and what is not. It raised
up our ability to assassinate and kill without the knowledge of the other part. The unique
thing about warfare technology is that it doesn’t kill its ancestor. A bronze age knife can
8. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
7
still kill and so does a sniper or a drone. But we the humans seek more complex
weapons to make sure we are secure while we attack.
In the dawn of history, warriors started their battles using their bare hands to fight the
enemy. Upon picking up the first stone to hit the opponent, man realized that weapons
can be used to help with winning a fight. As a result, he started sharpening this stone for
more violent and more damage and by the time learned to throw the stone to increase
the safety of himself. Thus, killing from a distance was created so that the attacker will
be in the safety zone.
Why War?
When we took a look into war, we found that war itself is a crime. To have a wrong
result, we should have irrational reasons. There are three major reasons for humanity to
have wars through history. Starting with religion, this reason for war has been
considered a rational and convincing reason in the history of wars. Sometimes, wars
happened just to increase the size of population of one relation or decreasing another.
Most of the time, it’s done not by the choice of the leader but by the thought that a
higher authority is ordering that. Agreements in these cases are not taken into
consideration because the problem is the well-being and not this actions, according to
the attacker. One example is the Palestinian - Israel long-standing conflict. The problem
in this conflict is that no one can find an agreement to satisfy the two sides and this is
because the two sides believe that the other side’s presence is the problem and not his
actions.
9. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
8
Another reason is revenge and by revenge, I don’t mean the repeated game of
punishments. Revenge is that emotion that goes behind irrational reasons for fights and
wars because it includes actions pushed by anger for things happened in the past and
not by strategies or real-time problems.
Ethnic cleansing is the third reason history witnessed. It shares the religion the taste of
having a larger social cake. This type of ideologies is not convincing and don’t have a
reasoned choice. Hitler wanted to dominate the world because he believed that his race
was had the right to do so. A lot of agreements failed including Munich Agreement and
that was because he wasn’t trustworthy. The failure of all the agreements was a result
of his believe that was “Me or no-one”.
As the letters shared between Einstein and Freud [4] shows that wars are act of human
nature. People seek power and are famous for willing to control and not to be controlled.
Like everything, there’s a group of people who are able to do so because of their
intelligence. This type of people controls schools, commercials, and press making it
easier to organize and sway the emotions of the masses turning them into tools.
Another reason was Right and Might which is being right and violence. Laws and rules
are created by those who were violence to prove themselves right. Thus, one is
developed out of the other. People in nature tend to prove themselves that they are right
and this happens by arguments and facts. If things didn’t work, some people turn into
violence or into what others may say “By Force” to prove that they are right.
10. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
9
The War on Afghanistan
Washington asked the Taliban to surrender and give Bin Landen but Mullah Omar
refused again after the first refuse in 1998. As a result, president Bush went to
Congress. Then Congress then gave the permission as followed: To use all necessary
and appropriate force against those nations, organizations, or persons he determines
planned, authorized, committed, or aided the terrorist attacks that occurred on
September 11, 2001, or harbored such organizations or persons, in order to prevent any
future acts of international terrorism against the United States by such nations,
organizations or persons.
The United States started its air attack on October 7, 2001. By the end of October, the
CIA started operating aligned with the Northern Alliance and the Pashtun tribes.
Pakistan had put its in hand in the war were it had to support the religions Mujahideen
groups at first. After pressure from the U.S, Pakistan changed its path to provide logistic
space and equipments for the states to go to war. The two phases of “Enduring
Freedom” consisted of the conventional fighting and evolved insurgency. The first one
had a network of military operations between Northern Alliance, Tajiks, Hazarra,
Uzbeks, and anti-Taliban Pashtun forces against Taliban and al Qaeda. The U.S
supported this phase by airpower contribution and advice from the SOF and CIA. They
also maintained a close relation between “Massoud” and the Northern Alliance.
Operation Anaconda, the last battle in phase one broke up a strongpoint in the Shahi
Kot valley and weakened the unity of the Taliban’s command.
11. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
10
The first phase conventional operations ended in success without being decisive. The
U.s and its allies didn’t destroy the enemy and they didn’t capture Osama bin Laden or
Mullah Omar. The United Nations held a conference in Germany where the U.S and its
allies didn't invite Taliban saying that it doesn’t sit with the allies of al Qaeda. The
conference resulted in forming a government without Taliban participation in it with
Hamid Karzai as a president.
In 2002, Afghanistan was in the worst 10 countries with socio-economical problems
where it almost had no human capital to build on. $5 billion were given from the
international community as an aid but it didn’t meet the country’s need. To give a hand
to Afghanistan, Aid donors and NGOs had to work with a weak government but that
developed a serious problem. The assistance controlled that government and
Afghanistan became dependent on the supplies given.
Taliban started to build its groups again from 2002 to 2005 using drug money and
donations from the Gulf states and al Qaeda. By the end of 2005, Taliban, the Hwezb-
Islami, and the Haqqani Network worked together. Taliban started offending around the
world to spread its influence where it affected the security worldwide and increased the
suicide bombing.
The War on Iraq
Bush administration highlighted Iraq’s weapons of mass destruction after 9/11 and put
12. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
11
Iraq, Iran, and North Korea on the axis of evil in January 2002. In august 2002, Vice
President Cheney charged Iraqi president Saddam Hussein with holding weapons of
mass destruction to take control of the Middle East and threaten U.S oil supplies. This
would take the States to act violently against Iraq.On October 16, authorized use of
force against Iraq was given from the U.N Security Council.
Starting in January 2003, the U.S began its military increase in the Persian Gulf
showing that it’s getting ready for an attack. on January 14, the President of U.S said
that “time is running out” [6] adding that he was sick and tired of the games and
deceptions done by the Iraqi President. On January 28 ,2003 president bush said “With
nuclear arms or a full arsenal of chemical and biological weapons, Saddam Hussein
could resume his ambitions of conquest in the Middle East and create deadly havoc in
the region.” He added that Iraq “aids and protects” Al Qaeda terrorist organization.
On March 17, and after long discussions between the United States, the United
Kingdom, Spain, France, Germany, China, and Russia; the U.S, Spain, and the U.K
announced that they were ready for a military conflict with Iraq and President Bush went
on television said that unless Saddam Hussein fled Iraq within 48 hours, this will result
in “Military conflict commenced at the time of our own choosing.” On March 19, aerial
attack against a location where Saddam Hussein was suspected to be meeting with
Iraqi officials was done. The U.S and British military stepped on the land of Iraq on
March 20. By April 9, the marines gained control of Baghdad, the Capital after a huge
13. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
12
resistance. On April 15, President Bush said that “the regime of Saddam Hussein is no
more”.
What is a UAV?
An Unmanned Aerial Vehicle (UAV) is an automatic intelligent vehicle able to
communicate with its controller returning payload data, position, airspeed, heading and
altitude using the satellite and the internet. UAVs are famous in ‘housekeeping data’
and it is a specific type of data including the amount of fuel in a drone and the
temperatures of components. UAVs are also well known in taking corrective actions in
case of errors and the also alert their operators in such events. The drone for example
may search for a radio beam and try to regain contact in case of radio communication
failure.
Intelligent UAVs may also act in many situations under the condition of If-else programs.
UAVs are also known to be called “uninhabited air vehicle” to show that these types of
vehicles are manned but remotely. This means that the drone itself is under control of a
human and it’s not acting by its own.
Why UAVs?
UAVs are created so they will overpower manned jets in many cases. Depending on
what the situation is, designers decide whether to create a manned or unmanned
vehicle. Unmanned Vehicles in general are created for the roles of dull, dirty, or
dangerous (DDD).
14. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
13
In dull cases such as long surveillance or intelligence time, aircrew will spend a lot of
hours without relaxing resulting in loss of concentration and mission effectiveness.
Using drones in these missions will provide recorded video, radar scanning, and thermal
vision in addition to being cheaper in operation. Operators will work in shift-job making
the mission itself in success. In dirty places such as nuclear environment or chemical
spaces, the crew might be at risk of being toxicated. UAVs don’t need air and the
detoxification of them will be easier than normal jets. In dangerous missions, manned
jets have the probability of going down more than UAVs. UAVs are difficult to be
detected or be strikes with anti-aircraft fire due to their smaller size and stealthier tech.
Aircrew in many missions lose their concentration while being under the threat of being
shot down or being captured. In UAV missions, the operators have no personal threat
so they can concentrate more on the mission itself. In the civilian field, drones can help
in power-line inspections and forest fire control without putting any human under the
danger of being killed. In extreme weather conditions, flying a jet will be dangerous on
the crew so using drones in such conditions will be a lot safer.
Stealth missions are a need in many operations not to alert the enemy. Through UAVs
and their undetectable abilities, these operations are achievable. Going into alien
territories is sometimes against the international border laws especially in case of
peacetime. Diplomatic embarrassment can be decreased in case of detecting a UAV
instead of a normal jet. Not to forget that UAVs produce less emissions and noise, this
makes them eco-friendlier than normal manned aircrafts. Power-lines are usually placed
15. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
14
near civilians’ houses and using manned planes or choppers will be noisy but UAVs fly
using soundless engines making them better to use. UAVs are considered cheaper than
manned aircraft because of their maintenance cost, fuel cost and hangarage costs. The
operators are paid lower also and insurance is a lot cheaper.
UAV System Composition
The UAV is composed of many sub-systems that are not isolated from each other. All of
the sub-systems work together making a whole system which is intelligent but
dependent.
Control Station (CS)
The CS is center of all the operations and it’s from where the operator controls the UAV.
CSs are found on the ground, on ships, or sometimes in an airborne aircraft. CS are the
stations where missions are planned in usual cases. The operator uses a
communication system to link up wit the UAV and controls its flight and actions. The
UAV in return send videos and information about the mission live.
The Payload
Payloads varies not only from a drone to drone by from a mission to mission. Some
payloads are simple consisting of video camera with fixed lens with 200 g of mass.
Other has greater range with longer focal length to zoom and gyro stabilizers that would
weight between 3 to 4 kg. Some payloads can be heavy to 1000 kg. Some more
sophisticated UAVs carries more than one type of sensor to improve the information or
16. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
15
to provide more than one type of image and data. As an example, a payload can send
optical and thermal images with radar scanning.
The Air Vehicle
Each mission determines the type of air vehicle needed. The vehicle itself has a primary
role of carrying the payload to the position needed and returning it. The operating range
effects the design of the aircraft as well as its stepped and endurance. Long time
missions ask for more fuel and thus they need bigger designs with long wings to carry
out the weight. Some missions ask for hovering or low speed vehicles especially
surveillance and intelligence missions. Other missions need vertical take-offs and
landings and this effects the design of the vehicle. Compounded helicopters add wings
to the rotor enabling it to achieve higher speed while moving. Some UAVs are
convertible where they can take off and land vertically with the ability of endurance and
this is achieved by upgrading the rotor making them tilting horizontally and vertically
upon need.
Navigation System
Knowing the position of the UAV at anytime is necessary for both the operator and the
UAV itself. This will tell the operator if the drone is in position and will help the lead the
drone to ‘return to base’ when commanded. Global positioning system (GPS) is one of
the systems used for earth-satellites tracking. They are light in weight and cheap white
continuous positional updates. When there’s a risk of blocking the GPS, other systems
are used. One of them is the radar tracking and it works on the radar transmission
17. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
16
emitted from the CS. Radio tracking is another way and it is applied when the CS sent a
radio signal and calculate its time to travel and return. The third system is direct
reckoning and with the help of the velocity vectors and time elapsed, the position of the
UAV can be calculated. Other ways is done by comparing the geographical features
with their known positions on a map can help in figuring out where a UAV is.
Launch Equipment
Some UAVs don't have the ability to launch vertical and can’t access a runway of
suitable surface and length. As a solution, a ramp with rubber bungees and compressed
air can be used to push the drone until it can sustain the airspeed of airborne flight.
Recovery Equipment
UAVs not capable of vertical flight can’t be recovered or can’t land in case of no runway.
Using parachutes, airbags, and replaceable frangible material can be a solution where
the aircraft will designate its landing zone, upon the parachute and deploy the airbags
for less damage.
Communication
Communication system is a major system in a UAV where up-link and down-link
between the CS and UAV will be established. Most frequently, the transmission used
will be in a form of light to make it as fast as possible. The transmission from the CS to
the drone is called uplink and this provides flight path, real-time flight control
commands, and commands to payload. The transmission from the UAV to the CS is
18. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
17
called downlink and this provides position info, images from the payload, and
housekeeping information.
Types of UAVs Used in Iraq and Afghanistan
There’s no clear data or reference to any specific type of drones used in the war on Iraq
or the war on Afghanistan. Actually, the military doesn’t give to the press any type of
information about the attacks and strikes established. From the information collected,
some UAVs had a major impact in the war on Iraq, Afghanistan, and even in the Gulf
war and some assassinations in Pakistan. UAVs like the Predator, Global Hawk, the
Pioneer were key players along with the Hunter, the shadow, and the Dragon Eye. Both
the U.S military and the Britain Ministry of Defense learned that these UAVs can change
a war.
The Predator
Name: RQ-1 / MQ-1 Predator
Role: Remote Piloted Aircraft
Manufacturer: General Atomics Aeronautical Systems
First Flight: 3 July 1994
Introduction: July 1995
Status: In Service
Primary User: United States Air Force
Produced: 1995 - Present
Program Cost: US $2.38 Billion (2011)
19. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
18
Unit Cost: US $4.03 million (2010)
An upgraded version of the Predator UAV carries a Multispectral Targeting System
(MTS) with AGM-114 missile with targeting capability of electro-optical, infrared, and
laser designators in one single sensor. It can’t carry both a MTS and a synthetic
aperture radar together but can put 2 more laser guided missiles. This unmanned
vehicle can fly from 84 mph up to 135 mph and has a range up to 454 miles with ceiling
of 25,000 carrying a payload of 450 pounds. It has the ability to operator for 24 hours on
the altitude of 15,000 feet.
The Dragon Eye, on April 4, targeted a large Iraqi Army formation going out of Baghdad
Name: RQ-4 Global Hawk
Role: Surveillance UAV
National Origin: United States
Manufacturer: Northrop Grumman
First Flight: 28 February 1998
Status: In Service
Primary User: United States Air Force, NASA, NATO
Program Cost: US $10 billion (2014)
Unit Cost: US $ 131.4 million
The Global Hawk is a surveillance UAV used in near-real-time battles. Its high altitude
flights help it cover large geographic areas with high resolution. This UAV has the ability
20. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
19
to taxi, take off, fly, return, and land autonomously. Operators monitor the drone’s health
and status and control the payload during the mission itself. The Global Hawk has a
wingspan of 116 feet and is 44 feet long. It can go far to 12,000 nautical miles and high
to 65,000 feet. It ca reach about 400 mph and last for 35 hours. During a mission, the
Global Hawk can image an area of 40,000 nautical square miles in just 24 hours
imaging 200 to 300 sites on a single maneuver.
The Dragon Eye
Name: RQ-14 Dragon Eye UAV
Role: Remote controlled UAV
Manufacturer: AeroVironment
First Flight: June 2001
Introduction: Mid-2002
Primary User: United States Marine Corps
The Dragon Eye is a small UAV designed to detect threats for units. It is fully
autonomous launched with hand UAV. Dragon Eye UAVs can fly with altitudes of 300 to
500 feet with excessed video range till 5 kilometers. Providing it with electric motors, the
UAV has a low noise signature and its small size makes it hard to detect. It’s battery can
go up to 60 minutes
The Shadow
Name: RQ-7 Shadow
21. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
20
Role: Tactical Reconnaissance UAV for ground maneuver forces
Manufacturer: AAI Corporation
First Flight: 1991
Introduction: 2002
Status: Active, in Production
Primary User: United States Army
Unit Cost: US $15.5 million (2011) per system
US $750,000 (2011) per aircraft
The Shadow 200 is a gasoline engine UAV. It can carry electro-optic/ infrared imaging
sensor payload and can fly away to 31 miles with 4-hour flight. This UAV was used by
the 4th infantry Division.
The Raven
Name: RQ-11 Raven
Role: Remote Controlled UAV
Manufacturer: AeroVironment
First Flight: October 2001
Introduction: May 2003
Status: In use on combat field
Primary Users: United States Army, United States Air Force, United States Marine
Corps, United States Special Forces
Produced: 2004 – Present
22. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
21
Unit Cost: $173,000 per system (Including 4 UAVs. 2 GCS and spare parts)
The Raven is a six-pound hand-launched UAV. It can fly up to 6.2 miles at altitudes of
500 feet with a speed covering 60 mph. The Raven can fly for 60-80 minutes.
Specific Missions Accomplished by UAVs
A Predator had an air fight with an Iraqi MiG-25 before the MiG fired two air-to-air
missiles and shot it down. The Predator, that was equipped with air-to-air stingers, had
the ability to fire two of them in response while transmitting the real-time video to the
operator. This encounter showed that Predators are detectable and they have limited
self defense against in air fights.
A Predator killed by mistake some Afghan scrap metal collectors near Zhawar Kili in
February 2002 because one of them was similar to Osama bin Laden. Another incident
happened in March 4, 2002 in Operation Anaconda when a CIA Predator destroyed a
Taliban bunker when an F-15 and F-16 were unable to do it. April 6, 2011 is the date of
the first friendly fire a Predator have. In Iraq, a group of Iraqis intercepted a predator
video but couldn’t encrypt it. They used a Russian software called SkyGrabber.
On April 4, a Dragon Eye witnessed a large formation of Iraqi Army going out of
Baghdad in the middle of the night. It then passed the data to Marine Combat Operation
Center displaying them in a real-time stream and provided grid coordinates to F/A-18s
and AV-Bs to attack that formation.
23. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
22
Another accident happened on 15 August 2011 when a US Air Force C-130 collided
with a Shodow 200 in Paktika Province, Afghanistan. As a result, the C-130 had an
emergency landing with two damaged engines and one wing while the RQ-7 was
completely destroyed. Reports indicated that the C-130 had a taking-off without
clearance. On 3 April 2014, a National Guard Shadow UAV crashed beside an
elementary school in Pennsylvania while training and no injuries were reported.
The Raven UAV became a popular UAV after Iran captured and claimed two RQ-11.
One of them in Shahrivar September 19, 2011 and the other in Aban November 20,
2012. Most of the drone’s data has been decoded, Iran reported but there’s no evidence
if it has been duplicated like the RQ-170 and the ScanEagle.
24. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
23
Conclusion
In conclusion, the era we’re living these days is the era of drones and AUVs. Scientists
say that we only cover about 8% of the UAV technology and 92% is ahead. A lot of
prototypes have been built for UAVs producing 30 kW with different engine types
including the IC Engine: Turbo shaft and going deep in electric power UAVs and Fuel
Cell Technology. This will lead to higher efficiency than any other fossil-fuel-based
technology, modular and easy install equipment, zero-emission devices, and zero to low
noise with exceptional vibrations. Two of the future UAVs will be the AeroVironment
HELIOS and the Qinetiq ZEPHYR.
Another major study includes Artificial Intelligence. This science started in 1930s and
includes two approaches. One of them is developing neural networks similar to that of
the human brain. The second approach is increasing the performance of human brain
by using high speed CPUs. Unfortunately, none of both is successful but some systems
are relying on database to determine right and wrong decisions. Those systems are
used in the UAVs navigation and strike systems.
Out of the engineering life, a man should take into consideration ethics behind the use
of UAVs. To start with, we should consider the laws of Just War to determine when a
war is just, legal, and ethical. These principles are divided into 2 sets which are the jus
ad bellum principles and the jus in bello principles. The first type decides whether it is
morally permissible to go to war where the other one shows how war should be fought.
25. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
24
From my point of view, the use of drones in wars might be a little unfair especially when
we consider that the enemy doesn’t have capability to react and defend himself. A lot of
assassinations in Pakistan while a group of people were sitting doing nothing or
chatting. Another thing is that it’s always hard to decide if this group of people are acting
in a ‘terrorist’ way or not especially when monitoring them from far skies without
analyzing their intensions. Stereotyping people is a wrong assumption and acting upon
stereotyping will always be a wrong action. Not all girls who put makeup and wear
dresses are prostitutes, not all boys who wear baggies and are bald are gangsters, not
all people with pistols are bad guys, and not all those with beards are terrorists.
Terrorism was never and never will be an act under a religion, gender, race, or
nationality. Terrorism is an act of personality and ignorance.
26. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
25
Map of Afghanistan
27. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
26
Map of Iraq
28. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
27
Appendix A: UAV Design
1¶ Synthetic Aperture Radar (SAR) Antenna 18 Battery Assembly
2¶ Inertial Navigation System/GPS 19 Alt Equipment Bay Tray
3¶ Ku-Band Satellite Communication Antenna 20 Secondary Control Module
4¶ Video Cassette Recorder 21 Synthetic Aperture Radar
5¶ GPS Antennas (Left and Right) 22 Primary Control Module
6¶ Identification Friend or Foe Transponder 23 Front Bay Avionics Tray
7¶ Ku-Band Satellite Communication Sensor Processor Modem Assembly
8¶ C-Band Upper Omni-directional Antenna Bracket 24 Receiver/Transmitter
9¶ Forward Fuel Cell Assembly 25 Flight Sensor Unit
10¶ Alternative Fuel Cell Assembly 26 Video Encoder
11¶ Ancillaries Bay 27 De-ice Controller
12¶ Ancillaries Cooling Fan 28 Electro-Optical Sensor
13¶ Oil Cooler/Radiator 29 Front Bay Payload Tray
14¶ Engine 30 Ice Detector
15¶ Tail Servo (Left and Right) 31 SAR Receiver/Transmitter
16¶ Battery Assembly 32 Nose Camera Assembly
17¶ Power Supply
29. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
28
Appendix B: UAV System – Functional Structure
30. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
29
List of References
Walzer, Michael. Just and Unjust Wars: A Moral Argument with Historical Illustrations.
ISBN 978-0-465-05270-7. Fifth Edition. Basic Books. 1977.
Schnitzer, Eric. Perfecting War: Searching for the Silver Bullet. Center for Strategy and
Technology. Air War College, Air University. USAF. November 2005
Jackson, Matthew & Morelli, Massimo. The Reasons for Wars - an Updated Survey.
Elgar Publishing. CEPR, Switzerland. December 2009.
Einstein, A. and Freud, S. Why War? Exchange of Letters between Einstein and Freud.
July 30, 1932.
Collins, Joseph J. Understanding War in Afghanistan. National Defense University
Press. June 2011
Copson, Raymond W. Iraq War: Background and Issues Overview. Report for
Congress. Foreign Affairs, Defense, and Trade Division. Order Code RL31715. April 22,
2003
Unmanned aircraft systems (UAS). (2011). Montréal: International Civil Aviation
Organization. ICAO’s circular 328 AN/190. ICAO. ISBN 978-92-9231-751-5
Retrieved 3 February 2016.
Austin, Reg. Unmanned Aircraft Systems: UAVs Design, Development, and
Deployment. ISBN 978-0-470-05819-0. First Edition. John Wiley and Sons, Ltd,
Publication. 2010
Leszek Cwojdziński & Mirosław Adamski. (2014). Power units and power supply
systems in UAV, Aviation, 18:1, 1-8
Greenwald. Brave New Films (2015, April 1). Unmanned: America’s Drone Wars [Video
File]. Retrieved from https://www.youtube.com/watch?v=mpzk7OdbjBw
Cordesman, Anthony H. The Iraq War: Strategy, tactics, and military lessons. V. 25. No.
5. Washington, DC: CSIS PRESS. ISBN 0-89206-432-3
C. D. Meyers. GI, ROBOT: THE ETHICS OF USING ROBOTS IN COMBAT. (January
2011). Vol.25. pp. 21-36. University of Illinois Press. Retrieved 10 November 2015
31. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
30
List of Definitions, Symbols and Abbreviations
U.S: United States
U.K: United Kingdom
U.N: United Nations
UAV: Unmanned Aerial Vehicle
DDD: Dull, Dirty, and Dangerous
CS: Control Station
GCS: Ground Control Station
GPS: Global Positioning System
USAF: United States Air Force
NGOs: Non-Governmental Organizations
Bronze Age: The Bronze age begins around 3000 BC when civilizations first established
a far raging trade network. This network imported tin and charcoal to Cyprus, where
copper was mined and alloyed with the tin to produce bronze.
Sun Tzu: He was a Chinese, general, military strategist, and philosopher who lived in
the Spring and Autumn period of ancient China.
Bin Landen: He is Osama bin Mohammed bin Awad bin Laden, the founder of al-
Qaeda, the organization that claimed responsibility for the September 11 attacks on the
32. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
31
United States, along with numerous other mass-casualty attacks against civilian and
military targets
Mullah Omar: The Afghan Mujahideen commander who founded the Islamic Emirate of
Afghanistan in 1996.
Taliban: They are an Islamic fundamentalist political movement in Afghanistan currently
waging war within that country.
Qaeda: It is a militant Sunni Islamist global organization founded in 1988 by Osama bin
Laden, Abdullah Azzam, and several other Arab volunteers who fought against the
Soviet invasion of Afghanistan in the 1980s.
MiG-25: Mikoyan-Gurevich is a supersonic interceptor and reconnaissance aircraft that
was among the fastest military aircraft to enter service. It was designed by the Soviet
Union.
F/A-18: It’s called the McDonnell Douglas Hornet and it is a twin engine supersonic, all-
weather carrier-capable multirole combat jet, designed as both fighter and attack
aircraft.
C-130: It’s called the Lockheed C-130 Hercules and it’s a four-engine turboprop military
transport aircraft designed and built originally by Lockheed.
33. THE USE OF UAVS IN THE WAR ON AFGHANISTAN AND THE WAR ON IRAQ
32
CPUs: It is the central processing unit within a computer and it carries instructions and
programs by performing basic arithmetic, logical, control, and I/O operations.