Threat, OPFOR, Regional & Cultural
Threat, OPFOR, Regional & Cultural
CYBER1: The Cyberspace Operations & Electronic Warfare SMARTbook
OPFOR SMARTbook 3 - Red Team Army, 2nd Ed.
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
TAA2: The Military Engagement, Security Cooperation & Stability SMARTbook, 2nd Ed. (w/Change 1)
The Stability, Peace & Counterinsurgency SMARTbook (PREVIOUS EDITION)
Cultural Guide SMARTbook 1 – Afghanistan
Military Reference: Multi-Service & Specialty
BSS5: The Battle Staff SMARTbook, 5th Ed.
SUTS2: The Small Unit Tactics SMARTbook, 2nd Ed. (w/Change 1)
TLS5: The Leader's SMARTbook, 5th Ed.
SMFLS4: The Sustainment & Multifunctional Logistics SMARTbook, 4th Ed. (w/Change 1)
TAA2: The Military Engagement, Security Cooperation & Stability SMARTbook, 2nd Ed. (w/Change 1)
Military Reference: Joint & Service-level
JFODS5: The Joint Forces Operations & Doctrine SMARTbook, 5th Ed.
AODS6: The Army Operations & Doctrine SMARTbook, 6th Ed.
MEU2: The Marine Expeditionary Unit SMARTbook, 2nd Ed.
AFOPS2: The Air Force Operations & Planning SMARTbook, 2nd Ed.
The Naval Operations & Planning SMARTbook
Homeland Defense, DSCA, & Disaster Response
HDS1: The Homeland Defense & DSCA SMARTbook
Disaster Response SMARTbook 1 – Federal/National Disaster Response
Disaster Response SMARTbook 2 – Incident Command System (ICS)
Disaster Response SMARTbook 3 - Disaster Preparedness, 2nd Ed.
CYBER1: The Cyberspace Operations & Electronic Warfare SMARTbook
Joint Strategic, Interagency, & National Security
JFODS5: The Joint Forces Operations & Doctrine SMARTbook, 5th Ed.
Joint/Interagency SMARTbook 1 – Joint Strategic & Operational Planning, 2nd Ed.
CYBER1: The Cyberspace Operations & Electronic Warfare SMARTbook
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
Plastic-Comb Binding (Limited Stock)
BSS5: The Battle Staff SMARTbook, 5th Ed. (Plastic-Comb)
SUTS2: The Small Unit Tactics SMARTbook, 2nd Ed. w/Change 1 (Plastic Comb)
TLS5: The Leader's SMARTbook, 5th Ed. (Plastic-Comb)
SMFLS4: The Sustainment & Multifunctional Logistics SMARTbook, 4th Ed. w/Change 1 (Plastic-Comb)
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook (Plastic-Comb)
Books in Development
FHA/DR: Foreign Humanitarian Assistance, NEO & Disaster Relief SMARTbook
Joint/Interagency SMARTbook 2 – Interagency Planning & Process
Joint/Interagency SMARTbook 3 – Information Operations
SUTS3: The Small Unit Tactics SMARTbook, 3rd Ed.
SMARTsets
The ''WARFIGHTING'' SUPERset (7 books)
The ''ARMY'' SMARTset (5 books)
The ''MARINE'' SMARTset (5 books)
The 'JOINT FORCES + JOINT/INTERAGENCY' SMARTset (2 books)
The ''THREAT'' SMARTset (3 books)
The ''DISASTER RESPONSE'' SMARTset (3 books)
The ''AIR FORCE'' SMARTset (3 books)
The ''NAVY'' SMARTset (3 books)
CYBER1: The Cyberspace Operations & Electronic Warfare SMARTbook
ISBN-10 :1935886711
Release Date :Oct 22nd, 2019
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:344

Paperback Edition
Price: $38.95 $32.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Multi-Domain Guide to Offensive/Defensive CEMA and CO
CYBER1: The Cyberspace Operations & Electronic Warfare SMARTbook (Multi-Domain Guide to Offensive/Defensive CEMA and CO) topics and chapters include cyber intro (global threat, contemporary operating environment, information as a joint function), joint cyberspace operations (CO), cyberspace operations (OCO/DCO/DODIN), electronic warfare (EW) operations, cyber & EW (CEMA) planning, spectrum management operations (SMO/JEMSO), DoD information network (DODIN) operations, acronyms/abbreviations, and a cross-referenced glossary of cyber terms.
United States armed forces operate in an increasingly network-based world. The proliferation of information technologies is changing the way humans interact with each other and their environment, including interactions during military operations. This broad and rapidly changing operational environment requires that today’s armed forces must operate in cyberspace and leverage an electromagnetic spectrum that is increasingly competitive, congested, and contested.
Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Operations in cyberspace contribute to gaining a significant operational advantage for achieving military objectives.
Cyber electromagnetic activities (CEMA) are activities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary and enemy use of the same and protecting the mission command system (ADRP 3-0). CEMA consist of cyberspace operations, electronic warfare, and spectrum management operations.
Cyberspace operations (CO) are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace (JP 3-0). Cyberspace operations consist of three functions: offensive cyberspace operations, defensive cyberspace operations, and Department of Defense information network operations.
Electronic warfare (EW) is any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. EW consists of three functions: electronic attack, electronic protection, and electronic warfare support. These functions are referred to as divisions in joint doctrine.
Spectrum management operations (SMO) are the interrelated functions of spectrum management, frequency assignment, host-nation coordination, and policy that enable the planning, management, and execution of operations within the electromagnetic operational environment during all phases of military operations. SMO are the management portions of electromagnetic spectrum operations (EMSO). EMSO also include electronic warfare.
Department of Defense information network (DODIN) operations are operations to secure, configure, operate, extend, maintain, and sustain DOD cyberspace.
Cybersecurity ensures the confidentiality, integrity, availability, authentication, and nonrepudiation of friendly information and information systems while denying adversaries access to the same information and information systems. Cybersecurity incorporates actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity on DOD information systems and computer networks.
Related Books
Discount sets with this book
OPFOR SMARTbook 3 - Red Team Army, 2nd Ed.
ISBN-10 :1-935886-78-9
Release Date :Oct 15th, 2019
Cover Type:Gloss U.V. Coating
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:264

Paperback Edition
Price: $38.95 $32.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Red Team Army: Forces, Operations & Tactics (OPFOR3-2)
OPFOR3-2 is the second edition of OPFOR SMARTbook 3 - Red Team Army, completely revised for 2019. In addition to the base FM 100-2-1/2/3 Soviet Threat series, new/updated material includes the FM/TC 7-100 Opposing Forces series, FM 3-0 Operations (Oct ‘17), ADP 3-90 Offense and Defense (Aug ‘18), FMs 3-90-1 & -2 (May ‘13), a review of modern (present-day) Russian forces, and more than a dozen historical vignettes. At 264 pgs, this second edition also features an additional 32 pages over the original first edition.
Topics and chapters include an Opposing Force Overview/Introduction, Red Team Army Overview (Military Doctrine, Operational Concept, Personnel & Training, Force Structure, Motorized Rifle Regiment, Modern Russian Land Forces), Offensive Operations (Front & Army Operations, Division and Lower Tactics, Small Unit Tactics), Defensive Operations (Prepared Defense, Hasty Defense, Withdrawal & Relief, Small Unit Tactics), Specialized Warfare (Airborne, Heliborne, Amphibious, Unconventional Warfare), Tactical Enabling Tasks (Reconnaissance, River Crossings, Troop Movement, Relief in Place, Passage of Lines, Checkpoints), Small Unit Drills (Movement & Formations, Dismounted and Mounted Patrols), Urban & Regional Environments (Urban, Mountain, Desert, Cold Wx, and Nighttime Operations), and Rear Area Operations & Logistics.
In today’s complicated and uncertain world, it is impossible to predict the exact nature of future conflict that might involve U.S. forces. This is the nature of the contemporary operational environment (COE), and training for such an environment requires a different type of Opposing Force (OPFOR) than that of the past.
It has been nearly thirty years since a holistic explanation of the Soviet-based Opposing Force (OPFOR) was examined in the U.S. Army Field Manual 100-2 series. Recognizing this, OPFOR SMARTbook 3: Red Team Army re-examines and outlines the doctrinal operational construct and historical foundations of Soviet-era military forces from the FM 100-2 series, which is now out-of-print and largely unavailable. Second, OPFOR SMARTbook 3 reorganizes that foundational material and aligns it in keeping with contemporary military doctrinal taxonomy to include the FM/TC 7-100 Opposing Forces series, FM 3-0 Operations, ADP 3-90 Offense and Defense, and FMs 3-90-1 & -2 Tactics. Third, OPFOR SMARTbook 3 translates and bridges the strategic- and operational-level doctrine into tactical application at the small-unit level. Through this triangulation, a more modern rendition of Red Team Armies emerges.
Related Books
Discount sets with this book
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
ISBN-10 :1935886436
Release Date :May 19th, 2016
Norman M. Wade
Binding Type:Lay Flat with Spine
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:384

Paperback Edition
Price: $38.95 $32.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Guide to Terrorism, Hybrid and Emerging Threats
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook topics and chapters include: the terrorist threat (characteristics, goals & objectives, organization, state-sponsored, international, and domestic), hybrid and future threats (forces, organization, operations & tactics), forms of terrorism (tactics, techniques, & procedures), counterterrorism (strategy, fundamentals, command, planning, and operations) critical infrastructure (identifying weaknesses, risk management, and cyber threats), protection (warfighting function, supporting tasks, and planning), countering WMD (WMD weapons, planning, and execution), and consequence management (all hazards response, domestic, international and DoD-led CM).
* This is the second printing of CTS1 (Jul 2017), incorporating an updated DNI World Threat Assessment and additional materials from START/GTD. An asterisk marks changed pages.
Terrorism has evolved as a preferred tactic for ideological extremists around the world, directly or indirectly affecting millions of people. Terrorists use many forms of unlawful violence or threats of violence to instill fear and coerce governments or societies to further a variety of political, social, criminal, economic, and religious ideologies. Terrorists threaten the national power, sovereignty, and interests of the United States and our allies. Terrorists organize and operate in a number of ways. Some operate within transnational networks, others operate as small independent groups, and others operate alone.
A hybrid threat is the diverse and dynamic combination of regular forces, irregular forces, and/or criminal elements all unified to achieve mutually-benefiting effects. Hybrid threats are innovative, adaptive, globally connected, networked, and embedded in the clutter of local populations. They can operate conventionally and unconventionally, employing adaptive and asymmetric combinations of traditional, irregular, and criminal tactics and using traditional military capabilities in old and new ways.
Counterterrorism activities and operations are taken to neutralize terrorists, their organizations, and networks in order to render them incapable of using violence to instill fear and coerce governments or societies to achieve their goals. The purpose of CT is to disrupt, isolate, and dismantle terrorist organizations and networks to render them incapable of striking the homeland, US facilities and personnel, or US interests abroad. CT also includes crisis response operations to respond to imminent terrorist threats or incidents when preemption and preclusion are not successful. In addition to increasing law enforcement capabilities for counterterrorism, the United States, like many nations, has developed specialized, but limited, military CT capabilities.
Weapons of mass destruction (WMD) are chemical, biological, radiological, or nuclear (CBRN) weapons or devices capable of a high order of destruction and/or causing mass casualties. The terrorist threat is amplified by the proliferation of WMD and their potential use by terrorists. The existence of these materials and the potential for use by actors of concern precipitates the need to plan, prepare for, and counter their use.
Critical infrastructure is a term used by governments to describe assets that are essential for the functioning of a society and economy - the infrastructure. Protection is the preservation of the effectiveness and survivability of mission-related military and nonmilitary personnel, equipment, facilities, information, and infrastructure deployed or located within or outside the boundaries of a given operational area.
Consequence management refers to measures to protect public health and safety, restore essential government services, and provide emergency relief to governments, businesses, and individuals affected by the consequences of terrorism. Incidents involving CBRN material produce a chaotic and hazardous environment requiring immediate response to minimize pain and suffering, reduce casualties, and restore essential infrastructure. Responders at the local, state, and federal levels may be overwhelmed by the magnitude of the incident, and U.S. DoD forces may be requested to provide additional support through the national response framework (NRF).
Related Books
Discount sets with this book
TAA2: The Military Engagement, Security Cooperation & Stability SMARTbook, 2nd Ed. (w/Change 1)
ISBN-10 :193588669X
Release Date :Jan 1st, 2018
Binding Type:Lay Flat with Spine
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:392

Paperback Edition
Price: $38.95 $32.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Train, Advise, & Assist
TAA2: The Military Engagement, Security Cooperation & Stability SMARTbook (with Change 1*) is the re-titled and re-focused second edition of The Stability, Peace & Counterinsurgency SMARTbook. Topics and references include the Range of Military Operations (JP 3-0); Train, Advise & Assist (SFA/FID/IDAD/HN/FSF); Stability Operations (JP & ADRP 3-07); Peace Operations (JP & FM 3-07.3); Counterinsurgency Operations (JP & FM 3-24); Civil-Military Operations (JP 3-57); Multinational Operations (JP 3-16); and Interorganizational Cooperation (JP 3-08).
* Change 1 to TAA2 (Sept 2017) incorporates new material and text edits from JP 3-0 (Jan 2017), JP 3-07 (Aug 2016), JP 3-20 (May 2017), JDN 1-3 (Apr 2013), and JP 3-08 (Oct 2016). An asterisk marks changed pages.
In the complex, dynamic operational environments of the 21st century, significant challenges to sustainable peace and security exist. Sources of instability that push parties toward violence include religious fanaticism, global competition for resources, climate change, residual territorial claims, ideology, ethnic tension, elitism, greed, and the desire for power. These factors create belts of state fragility and instability that threaten U.S. national security.
Throughout U.S. history, U.S. forces have learned that military force alone cannot secure sustainable peace. U.S. forces can only achieve sustainable peace through a comprehensive approach in which military objectives nest in a larger cooperative effort of the departments and agencies of the U.S. Government, intergovernmental and nongovernmental organizations, multinational partners, the private sector, and the host nation.
Military engagement, security cooperation, and stability missions, tasks, and actions encompass a wide range of actions where the military instrument of national power is tasked to support OGAs and cooperate with IGOs (e.g., UN, NATO) and other countries to protect and enhance national security interests, deter conflict, and set conditions for future contingency operations.
Use of joint capabilities in these and related activities such as Security Force Assistance and Foreign Internal Defense helps shape the operational environment and keep the day-to-day tensions between nations or groups below the threshold of armed conflict while maintaining US global influence.
Stability operations are various military missions, tasks, and activities conducted outside the US in coordination with other instruments of national power to maintain or reestablish a safe and secure environment, provide essential governmental services, emergency infrastructure reconstruction, and humanitarian relief.
Peace Operations are crisis response and limited contingency operations conducted by a combination of military forces and nonmilitary organizations to contain conflict, redress the peace, and shape the environment to support reconciliation and rebuilding and to facilitate the transition to legitimate governance.
A counterinsurgency campaign is a mix of offensive, defensive, and stability operations conducted along multiple lines of operations. It requires military forces to employ a mix of familiar combat tasks and skills more often associated with nonmilitary agencies and to be nation builders as well as warriors.
Civil-military operations are a primary military instrument to synchronize military and nonmilitary instruments of national power, particularly in support of stability, counterinsurgency and other operations dealing with asymmetric and irregular threats.
Related Books
Discount sets with this book
The Stability, Peace & Counterinsurgency SMARTbook (PREVIOUS EDITION)
ISBN-10 :098248593X
Release Date :Jan 1st, 2010
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:304

Paperback Edition
Price: $38.95 $24.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Nontraditional Aproaches in a Dynamic Security Environment

In the complex, dynamic strategic environment of the 21st century, significant challenges to sustainable peace and security persist across the spectrum of conflict. The drivers of conflict emerge as numerous symptoms of crises worldwide. Achieving victory will assume new dimensions as we strengthen our ability to generate “soft” power to address root causes of conflict among the disenfranchised populations.
At the heart of this effort is a comprehensive approach to stability operations that integrates the tools of statecraft with our military forces, international partners, humanitarian organizations, and the private sector. Stability operations leverage the coercive and constructive capabilities of the military force to establish a safe and secure environment; facilitate reconciliation among local or regional adversaries; establish political, legal, social, and economic institutions; and facilitate the transition of responsibility to a legitimate civil authority.
Peace Operations are crisis response and limited contingency operations conducted by a combination of military forces and nonmilitary organizations to contain conflict, redress the peace, and shape the environment to support reconciliation and rebuilding and to facilitate the transition to legitimate governance.
A counterinsurgency campaign is a mix of offensive, defensive, and stability operations conducted along multiple lines of operations. It requires military forces to employ a mix of familiar combat tasks and skills more often associated with nonmilitary agencies and to be nation builders as well as warriors.
Civil-military operations are a primary military instrument to synchronize military and nonmilitary instruments of national power, particularly in support of stability, counterinsurgency and other operations dealing with asymmetric and irregular threats.
The Stability, Peace & Counterinsurgency SMARTbook is multi-service, single-source reference for stability, peace and counterinsurgency operations designed for all levels of Soldiers, Sailors, Airmen, Marines & Civilians! Includes material from FM 3-07 Stability Operations, JP & FM 3-07.3 Peace Operations, JP & FM 3-24 Counterinsurgency Operations, JP 3-57 Civil-Military Operations, JP 3-29 Foreign Humanitarian Operations, FM 3-07.1 Security Force Assistance, JP 3-16 Multinational Operations, JP 3-08 Interagency, IGO and NGO Coordination, and many more.
Publisher's Note: Before purchasing The Stability, Peace & Counterinsurgency SMARTbook (Jan 2010), readers should also consider the updated, re-titled and re-focused second edition, "TAA2: The Military Engagement, Security Cooperation & Stability SMARTbook, 2nd Ed." (Aug 2016). The 2010 edition of "The Stability, Peace & Counterinsurgency SMARTbook" is still available because we continue to receive special requests for it because of its unique and specific focus on counterinsurgency and stability operations at the height of OIF/OEF -- including the Dec 2006 edition of FM 3-24 (Counterinsurgency Operations) and the Sept 2008 edition of FM 3-07 (Stability Operations).
Related Books
Cultural Guide SMARTbook 1 – Afghanistan
ISBN-10 :1935886509
Release Date :Apr 1st, 2015
Norman M. Wade
Dag Hansen
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:248

Paperback Edition
Price: $38.95 $24.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Train, Advise and Assist in a Culturally-Sensitive Manner
Culture forms the basis of how people interpret, understand, and respond to events and people around them. Cultural understanding is critical because who a society considers to be legitimate will often be determined by culture and norms. Afghan values, beliefs, behaviors, customs, and norms have been shaped by Afghanistan’s rugged environment and geography; history of conflict; non-standard Islamic beliefs; tribal ethnicity; external and internal politics; and education.
Cultural Guide SMARTbook 1 - Afghanistan contains information designed to enhance knowledge of Afghanistan, including history, politics, country data and statistics, and the military operational environment. Topics include Afghan cultural influences: ethnicity, economics, government, and the Taliban; Train, Advise and Assist topics: working with host-nation forces, developing host-nation security forces, working effectively with foreign security forces, conflict resolution and meetings, linguist support and interpreters; a chapter on life in Afghanistan (a practical view); and Afghanistan national and provincial data.
Cultural awareness has become an increasingly important competency for leaders at all levels. Perceptive leaders learn how cultures affect operations. To be successful in interacting with the local population to gain information on the enemy, or to understand their requirements, military members must do more than learn a few basic facts or “do’s and do nots.” Effective leaders adapt to new situations, realizing their words and actions may be interpreted differently in different cultures. They must understand the way that their actions can change the situation for the local population (both positively and negatively) and the resulting perceptions of the population towards those actions.
Military engagement, security cooperation, and deterrence encompass a wide range of actions where the military instrument of national power supports other instruments of national power to protect and enhance national security interests and deter conflict. Security Force Assistance (SFA) aims to establish conditions that support the partner’s end state, which includes legitimate, credible, competent, capable, committed, and confident security forces. There are five SFA essential tasks: organize, train, equip, rebuild and build, and advise and assist.
Building relationships can lead to partnerships, and is central to security cooperation whether conducting military engagement with a foreign partner in Europe and Asia, or conducting Soldier and leader engagements with foreign security forces during operations. It is essential for the Soldier, particularly the advisor, to place a considerable amount of time and energy in establishing solid relationships among U.S. forces and foreign security forces. By its very nature, the advisor mission forces its members out of their traditional roles. An advisor must purposefully look to build solid relationships between U.S. and foreign security force commanders, staffs, and the defense establishment, as well as a variety of governmental and nongovernmental entities.
Related Books