Results 81-90 of 98

Back to Iraq

April 1, 2007 A hardened Army 3rd Infantry Division prepares for an unprecedented third combat tour. In the thick pine forests of southern Georgia sit dozens of Abrams tanks and Bradley Fighting Vehicles, part of the 2nd Brigade of the Army's 3rd Infantry Division, based at Fort Stewart. The unit is part of...

Lethal Weapons

March 15, 2007 Low-tech arms and loose networks trip up the world's most sophisticated fighting force. For the U.S. military, the Iraq war has settled into a deadly learning cycle. As soon as U.S. troops develop counters to insurgent weapons and tactics, insurgents come up with something new so Americans must again adapt....

Mixed Signals

March 1, 2007 Jammers meant to foil roadside bombs in Baghdad jeopardize troop safety. The trademark image of Baghdad: an Iraqi insurgent, radio or cell phone in hand, lurking in sight of a military convoy. The insurgent pushes a button; an improvised explosive device detonates. In reaction, the United States has rushed out...

Tribal War

March 1, 2007 Fueled by frustration with an impotent government and resentment of violent American tactics, the forgotten war in Afghanistan threatens to ignite. On March 28, 2006, as an Afghan army convoy snaked its way through the Helmand River Valley in the high desert of southern Afghanistan, Taliban fighters detonated a massive...

Shock Troops

March 1, 2007 Commandant Gen. James T. Conway details what the Marine Corps needs to win in Iraq and elsewhere. In 1940, the Marine Corps published a pamphlet on fighting guerrilla warfare, the "Small Wars Manual," which has stood the test of time and remained a classic on counterinsurgency warfare. It urges Marine...

Intelligence analysis warns against rapid withdrawal from Iraq

February 2, 2007 Violence and sectarian killing is likely to worsen in Iraq over the next year as the country continues a gradual decline into fragmentation and chaos that could draw its neighbors into a larger regional war, according to a newly released collaborative analysis compiled by all 16 U.S. spy agencies. The...

Part-Time Soldiers Head Back to Iraq

February 1, 2007 Within hours of President George W. Bush's Jan. 10 announcement of an increase in the total troop numbers deployed to Iraq, the Pentagon reversed a long-standing policy that limited National Guard and reserve troops' time on active duty to one deployment in five years. The policy change means thousands of...

The Battle for Baghdad

February 1, 2007 History suggests we are surging the wrong troops, holding the wrong ground, following the wrong strategy and fighting the wrong way in Iraq. In January 1957, Gen. Jacques Massu, commander of the French 10th Parachute Division, marched his elite paratroopers into the capital of Algeria. Insurgents had taken their three-year-old...

Policy change could mean recalls for thousands of reservists

January 12, 2007 Part-time citizen-soldiers who have already served a yearlong tour in Iraq or Afghanistan can now be recalled to active duty for a second year's tour, the Pentagon announced this week in a reversal of a long-standing policy that limited Guard and Reserve deployment times. The policy that kept Guard or...

Military leadership shakeup continues

January 8, 2007 The turnover in America's top military ranks continues, with the announcement by Defense Secretary Robert Gates that Army Gen. George Casey, former commander of all coalition forces in Iraq, will replace departing Army Chief Gen. Peter Schoomaker. "There is no officer at this time better suited to be Army chief...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.