Joint Targeting Planning Training Guide

Joint Targeting Planning Training Guide

Author: James F. Love

Publisher:

Published: 1998

Total Pages: 88

ISBN-13:

DOWNLOAD EBOOK

"This guide resulted from an effort to develop a new approach to assessment and diagnostic training feedback in joint training. The guide resulted from a front-end analysis of joint targeting for an air campaign planning simulation. The analysis generated detailed training objectives, measurement instruments, and self-assessment procedures for each objective. For each phase of the joint targeting cycle, inputs, behavioral processes, and products were specified and incorporated in measurement tools. The measures were developmentally applied during Blue Flag 97-1. Blue Flag is a recurring cycle of air campaign planning exercises, managed by a numbered air force. Lessons learned from the application were combined with comments for Blue Flag participants to produce this joint training guide in its current form."--DTIC.


Joint Officer Handbook (JOH) Staffing and Action Guide

Joint Officer Handbook (JOH) Staffing and Action Guide

Author: United States. Joint Chiefs of Staff. Joint Staff. J-7

Publisher:

Published: 2010

Total Pages: 348

ISBN-13:

DOWNLOAD EBOOK

This is a practical and easily accessible guide for those new to the joint environment and staff assignments. With input from serving action officers and senior leaders, here are the competencies and behaviors of highly effective and successful joint staff officers which provide a roadmap for career self development. This is the most current joint information available for managing staff activities.


Joint Mission Essential Task List (JMETL) Development Handbook

Joint Mission Essential Task List (JMETL) Development Handbook

Author: United States. Joint Chiefs of Staff

Publisher:

Published: 1995

Total Pages: 48

ISBN-13:

DOWNLOAD EBOOK

The process of JMETL development involves the examination of the missions of a combatant commander, subordinate joint force commander, and functional or Service component commanders in order to establish required warfighting capabilities consisting of joint tasks, conditions, and standards. This handbook is intended to assist the combatant commands describe required capabilities in a form useful in the planning, execution and assessment phases of the joint training system. Further, it should aid resource providers and the Joint Staff in examining and coordinating joint training requirements among a number of combatant commands with diverse missions. The next phase of the joint training system begins with the development of a joint training plan delineating how combatant commanders allocate their joint training resources to meet JMETL requirements.


Countdown to Zero Day

Countdown to Zero Day

Author: Kim Zetter

Publisher: Crown

Published: 2015-09-01

Total Pages: 450

ISBN-13: 0770436196

DOWNLOAD EBOOK

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility. In these pages, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making. But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.