IDT PM Scott Jasper Speaks on ISIS as Adaptive Hybrid Threat - Defense Security Cooperation University
ABOUT
defense security cooperation university
2800 defense pentagon, washington, dc 20301-2800
commercial telephone: 571-372-3728 (571-372-DSCU)
international toll-free: 833-438-3728 (833-GET-DSCU)
information requests: dsca.dscu.info@mail.mil
Social Media:
STUDENT SUPPORT
the school of sc studies
the institute for security governance
naval support activity monterey
1635 cunningham road (bldg, 259), monterey, CA 93943-5011
commercial telephone: +1 831.656.3171
fax: +1 831.656.3351
email: ISGINFO@NPS.EDU
website: instituteforsecuritygovernance.org
Social Media:
the defense institute of international legal studies
441 elliot avenue, newport, ri 02841-1531
commercial telephone: 401-841-6000
website: dscu.edu/diils
Social Media:
publications & resources
sc certification
-
ABOUT
- DSCU
- CAREERS & OPPORTUNITIES
-
ADDITIONAL INFO
defense security cooperation university
2800 defense pentagon, washington, dc 20301-2800commercial telephone: 571-372-3728 (571-372-DSCU)
international toll-free: 833-438-3728 (833-GET-DSCU)
information requests:
dsca.dscu.info@mail.mil
Social Media: - ABOUT
- STUDENT SUPPORT
- SSCS
-
ISG
- ABOUT
- OUR WORK
- NEWS
- RESOURCES
-
ADDITIONAL INFO
naval support activity monterey
1635 cunningham road (bldg, 259), monterey, CA 93943-5011
commercial telephone: +1 831.656.3171
fax: +1 831.656.3351
email: ISGINFO@NPS.EDU
website: instituteforsecuritygovernance.org
Social Media: - ISG
-
DIILS
- ABOUT
- LEARNING
-
ADDITIONAL INFO
441 elliot avenue, newport, ri 02841-1531
commercial telephone: 401-841-6000
website: dscu.edu/diils
Social Media: - DIILS
- RESOURCES
- CERTIFICATION
- DSCU
Defense Security Cooperation University
CSOD Prelaunch Message
NOTE: A Common Access Card (CAC) and CSOD account are required
Registration is completed using a system called Cornerstone on Demand (CSOD) hosted by the Defense Acquisition University (DAU). You will sign in to this system on the next screen.
If you currently occupy a Security Cooperation Workforce position and do not see any courses listed after signing in to CSOD, please press the button at the top of your screen to open Frequently asked questions, and read the solutions under the "CSOD Sign In Issues" category.
Press the button below if you are ready to proceed. If you have trouble signing in, press the the next screen's "Need help signing in?" link To Get help.
Defense Security Cooperation University
Certification Center Prelaunch Message
NOTE: A Common Access Card (CAC) is required to access the Certification Center
If you receive an "Untrusted Site" or "Untrusted SSL Server Certificate" error when trying to access the Certification Center, please follow the instructions in the link below to update your Internet browser's certificates, and then try again.
How to Update Browser Certificates for the Certification Center
IDT PM Scott Jasper Speaks on ISIS as Adaptive Hybrid Threat
Posted: Oct 5, 2016
E. Shipitalo
Scott Jasper, the International Defense Transformation (IDT) Program Manager, spoke about Countering ISIS: An Adaptive Hybrid Threat at an International Conference in Sofia, Bulgaria in late September. His talk covered how the characteristics of ISIS have shifted over time in regional, transition, and adaptive operations. Insights from the conference will be applied in design and delivery of presentations on Hybrid Threats in the CCMR Executive Courses in residence and other IDT sponsored mobile courses. A paper on the topic written with Scott Moreland will be included in the conference proceedings.
The International Conference on “Interagency and International Cooperation in Countering Hybrid Threats” was held in Sofia, Bulgaria from 28-29 September 2016. The Conference was attended by over 80 participants from 20 international and national institutions. Keynote speeches were provided by the Deputy Minister of Defense and the Deputy Chief of Defense for Bulgaria. Scott spoke in the First Panel on “Emerging challenges of hybrid warfare and related threats and risks to the collective and national security.” His presentation helped to define early in the conference the definition and characteristics of a formidable hybrid threat in actual operations. Scott’s delineation of changing tactics by ISIS in phases of an extended campaign raised many pertinent questions regarding how to prepare, deter and defend against the threat.