Skip to main content

Currently Skimming:

2 National Security Environments and the Context for Landmines
Pages 19-24

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 19...
... The national security strategy envisions that the U.S. military will be faced with an array of threats to our interests, including direct threats to the continental United States, small-scale contingencies, major theater wars, terrorism, cyber attack, information operations, and the threat or use of weapons of mass destruction.
From page 20...
... The goal of the transformation is the creation of a force that is dominant across the full spectrum of military operations, based on the strategic concepts of decisive power, power projection, overseas presence, and strategic agility. A1though considerable emphasis is placed on information operations, "...information superiority neither equates to perfect information, nor does it mean the elimination of the fog of war" (CJCS, 2000~.
From page 21...
... Joint Vision 2010 and the Armecl Services In keeping with their missions and drawing upon their unique capabilities, the Army, Marine Corps, Navy, and Air Force have adapted their force structures, strategies, tactics, people, weapons, and platforms, indeed the way they conduct warfare, to fulfill the broad objectives outlined in Joint Vision 2010.i The Army and the Marine Corps, the forces that must fight ground wars, rely on landmine capabilities in battlefield environments. The Navy and the Air Force are responsible for the air delivery of certain landmine systems.
From page 22...
... In an open letter to President Clinton published in the New York Times, 15 senior, well-respected retired military officers announced their support for a potential ban on APL: "We support such a ban as not only humane, but also militarily responsible" (New York Times, 1996~. BENEFITS AND VULNERABILITIES OF NEW TECHNOLOGIES With no threatening peer competitor to plan for and with the continued rapid emergence of new technologies, particularly information technologies, this would appear to be an opportune time for the United States to make a concerted effort to replace (or at least improve)
From page 23...
... Advances in the development of unmanned aerial vehicles might enable a platoon pinned down by enemy fire to launch a bird-sized aircraft and use its video camera to look over the horizon, behind buildings, and beyond the range of average eyesight. These micro air vehicles might be able to fly miles from their takeoff point for hours, all the while feeding video images back to ground stations that can use the information to coordinate ground attacks and air strikes (Braham, 1999~.
From page 24...
... The system could even be deactivated long enough to allow an enemy to enter the munition field and then ALTERNATIVE TECHNOLOGIES TO REPLACE ANTIPERSONNEL LANDMINES reactivated for an efficient enemy kill. This capability could make the difference between victory and defeat for an initial-entry force because the first units to land on hostile soil are certain to be initially outnumbered by enemy forces.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.