Corpus ID: 107936093

Manhunting: Counter-Network Organization for Irregular Warfare

@inproceedings{Crawford2009ManhuntingCO,
  title={Manhunting: Counter-Network Organization for Irregular Warfare},
  author={George A. Crawford},
  year={2009}
}
Abstract : Manhunting - the deliberate concentration of national power to find, influence, capture, or when necessary kill an individual to disrupt a human network - has emerged as a key component of operations to counter irregular warfare adversaries in lieu of traditional state-on-state conflict measures. It has arguably become a primary area of emphasis in countering terrorist and insurgent opponents. Despite our increasing employment of manhunting, our national security establishment has… Expand

Figures from this paper

Paradigm Change: Targeting Enemy Leadership in a Complex Environment
Abstract : As the United States (US) continues operations to neutralize terrorist activity and prepare its military for future hybrid threats, operations to target enemy leadership, in aExpand
A Long-Term Counterinsurgency Strategy
The rapid, decisive campaign conducted against the Taliban by US Special Operations Forces (SOF) in conjunction with the Northern Alliance and supported by US airpower in the opening phases ofExpand
Convergence: Special Operations Forces and Civilian Law Enforcement
Abstract : John B. Alexander's monograph about the convergence of Special Operations Forces (SOF) and civilian law enforcement activities is timely considering the U.S. Government's revampedExpand
Information friction : information technology and military performance
Militaries have long been eager to adopt the latest technology (IT) in a quest to improve knowledge of and control over the battlefield. At the same time, uncertainty and confusion have remainedExpand
The politics and ethics of drone bombing in its historical context
This thesis intervenes in current debates concerning the violence of armed drones, developing a historical perspective on what is predominantly understood to be a novel form of warfare. It arguesExpand
Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations
Abstract Two big ideas have shaped recent debate about military doctrine: the Revolution in Military Affairs (RMA) and Counterinsurgency (COIN). These ‘network centric’ and ‘population centric’Expand
Biometrically Supported Census Operations as a Population Control Measure in Counterinsurgency
Abstract : This monograph examines the conduct of biometrically supported census operations as a population control measure in a counterinsurgency campaign. First, the monograph explores why theExpand
The manhunt doctrine
A new doctrine of state violence has emerged, finding its unity in the concept of the militarized manhunt.

References

SHOWING 1-10 OF 45 REFERENCES
Manhunting : a methodology for finding persons of national interest
Abstract : The asymmetrical threats that challenge U.S. national policies are not large-standing armies, but rather individuals who seek to usurp and coerce U.S. national interests. The nature ofExpand
North Korea: Chronology of Provocations, 1950-2003
Abstract : This chronology provides information on selective instances of North Korean provocations between June 1950 and 2003. The report places current provocations in the context of past actionsExpand
Authorization for Use of Military Force in Response to the 9/11 Attacks (P.L. 107-40): Legislative History
This report provides a legislative history of the legislation, S.J.Res. 23 , the “Authorization for Use of Military Force” (AUMF), which, as Congress stated in its text, constitutes the legislativeExpand
A Century of Spies: Intelligence in the Twentieth Century
Here is the ultimate inside history of twentieth-century intelligence gathering and covert activity. Unrivalled in its scope and as readable as any spy novel, A Century of Spies travels from tsaristExpand
Operation RÖSSELSPRUNG and The Elimination of Tito, May 25, 1944: A Failure in Planning and Intelligence Support
Operation RÖSSELSPRUNG was a Second World War German operation, conducted in Bosnia, which aimed at eliminating the leadership of the Partisan movement, namely Marshal Josip-Broz Tito. It was aExpand
Stasi: The Untold Story Of The East German Secret Police
Revenge Versus the Rule of LawErich Mielke: Moscows Leader for the Red GestapoKGB and Stasi: Two Shields, Two SwordsThe Sword of RepressionThe Invisible Invasion: Espionage Assault on West GermanyTheExpand
The Rise and Fall of the Third Reich: A History of Nazi Germany
Before the Nazies could destroy the files, famed foreign correspondent and historian William L. Shirer sifted through the massive self-documentation of the Third Reich, to create a monumental studyExpand
White Slaves, African Masters: An Anthology of American Barbary Captivity Narratives
White Slaves, African Masters: An Anthology of American Barbary Captivity Narratives. Edited and with an introduction by Paul Baepler. (Chicago: University of Chicago Press, 1999. Pp. xiii, 310.Expand
Over the line : North Korea's negotiating strategy
This book explores the role of espionage and infiltration and provides an alarming prediction of the future course of North Korea's relations with the United States and it allies.
The Origin of Assassin
T HE GENERALLY ACCEPTED ETYMOLOGY of assassin has recently been challenged by an attempt to trace the word to the Arabic root hassa. I will argue here that the new etymology is incorrect; thatExpand
...
1
2
3
4
5
...