The good, the bad, and the ugly: selecting and vetting indigenous leaders
Reed, Donald K.
Upperman, Matthew P.
Lober, George;Lee, Doowan
MetadataShow full item record
Determining who is the right indigenous leader for U.S. forces to work with in a complex environment during irregular and unconventional warfare is a complicated endeavor, affected by countless factors. Selecting, vetting, and influencing indigenous leaders in foreign countries has been a key task of U.S. Special Operations Forces since its inception, but to date Special Operations Forces often struggles with mastering this, as evidenced by recent experiences in Iraq and Afghanistan. The primary aim of this thesis is to improve this capability. To assist with the future selection and vetting of indigenous leaders, this thesis introduces a leader selection heuristic. It is the authors contention is that to find the right individual requires correctly identifying particular attributes, features, and behaviors in both the individual and the environment.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Yost, Bryce E. (Monterey, California: Naval Postgraduate School, 2017-06);Millions of refugees have fled Syria because of directed violence from the Assad regime and by the Islamic State. The United States has a choice between admitting refugees to aid in human suffering, or to restrict Syrians ...
Thompson, Michael F.; Vidas, Timothy (Elsevier, 2018);The DARPA Cyber Grand Challenge (CGC) pit autonomous machines against one another in a battle to discover, mitigate, and take advantage of software vulnerabilities. The competitors repeatedly formulated and submitted binary ...
Rasmussen, Craig W.; Irvine, Cynthia E.; Dinolt, George W.; Levin, Timothy E. (DARPA DISCEX Conference, April 2003, 2003);Large complex systems need to be analyzed prior to operation so that those depending upon them for the protection of their information have a well defined understanding of the measures that have been taken to achieve ...