The Interim Division

Gosinski Jr., David L.
July 2000
Military Intelligence Professional Bulletin;Jul-Sep2000, Vol. 26 Issue 3, p8
Discusses how the Interim Division of the United States Army has prepared itself to meet national security and information technology challenges. Background information on the National Security Strategy; Principal axes of the transformation task force that was formed; Characteristics of the Interim Division; Major force attributes of the Interim Division's military intelligence component.


Related Articles

  • Rule of Law in Iraq and Afghanistan? Martins, Mark // Army Lawyer;Nov2011, p21 

    The article presents a speech by Mark Martins, Brigadier General and U.S. Army Commander, delivered as part of the Dean’s Distinguished Lecture Series at Harvard Law School on April 8, 2011 in Massachusetts. He discusses U.S. national security interests, risk mitigation, and the rule of...

  • The Army's Birthday. Nelson, Harold W. // Army Magazine;Jun2002, Vol. 52 Issue 6, p17 

    Reports the celebration of the anniversary of the U.S. Army. Commitment of the Army to national security; Growth of the Army in terms of number and power; Success of the Army in combatting terrorism at home and abroad.

  • Challenge and change: A legacy for the future. Reimer, Dennis J. // Military Review;Jul/Aug97, Vol. 77 Issue 4, p108 

    Discusses the changes made in the United States national security strategy to reflect that changes in the international environment and how the US Army is adapting to the change. Change in the post-Cold War World; Changes in strategy; Changes in requirements; Changes in the Army; Army changing...

  • Q2 Federal IT Contracts Increase 50% From Last Year. Van Camp, Scott // Adweek Magazines' Technology Marketing;Jul2004, pN.PAG 

    This article reports on the 50 percent increase of information technology (IT) contracts during the second quarter of 2004, according to a report issued by INPUT. Through homeland security, IT-related contracts totaled more than $23 billion in second quarter of 2004, a 50 percent increase over...

  • G2 Contributions to the Threat and Vulnerability Assessment.  // Military Intelligence Professional Bulletin;Apr-Jun2003, Vol. 29 Issue 2, p20 

    Provides information on role of the installation G2 in the threat and vulnerability assessment (TVA) process of the U.S. Army. Function of TVA; Background on the security program; Responsibilities of G2.

  • Womanpower for a Superpower: The National Security Implications of Women in the United States Army. Partlow Jr., Frank A. // World Affairs;Spring84, Vol. 146 Issue 4, p290 

    Examines through the national security prism some of the major objective questions regarding the capacity, individually and collectively, of U.S. Army women. Individual soldier's propensity to complete an initial enlistment contract; Changes in the physical fitness program; Attributes of...

  • International Interest Strong in U.S. Army's Future Combat System.  // Defense Daily International;12/5/2008, Vol. 9 Issue 48, p3 

    The article offers information on the U.S. Army's strategy concerning Future Combat System (FCS). According to a U.S. official, as part of the strategy, service personnel from Australia and Canada will be at Ft. Bliss, Texas in 2009 to learn about the FCS. Service personnel from the two...

  • NAVAL SERVICES. Steiner, Walter K. // Officer;Jun2002, Vol. 79 Issue 5, p38 

    Report the transformation of the U.S. military. Definition of transformation in the context of national security of objectives; Analysis of national interest and the establishment of a national security framework; Rumors of massive force structure and personnel reductions to the Naval Reserve.

  • New Transformation Doctrine Issued. Snyder, Lisa Beth // Soldiers;Aug2001, Vol. 56 Issue 8, p10 

    Presents information on the two manuals which offer information on how the United States Army will operate while changing to meet the evolving security challenges of the 21st century. Components of FM 1 `The Army'; Topics covered by FM 3-0 `Operations.'


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics