Proxy Wars: Control Problems in Irregular Warfare and Cyber Operations

Total Page:16

File Type:pdf, Size:1020Kb

Proxy Wars: Control Problems in Irregular Warfare and Cyber Operations Proxy Wars: Control Problems in Irregular Warfare and Cyber Operations Jon R. Lindsay University of California Institute on Global Conflict and Cooperation La Jolla, CA [email protected] Prepared for the International Studies Association annual meeting, San Francisco, April 2013 Introduction We hear much debate about unconventional warfare and cybersecurity, respectively, but little overlap between them. The first deals with unconventional actors like insurgents, terrorists, and armed gangs and the suitability of doctrine like counterinsurgency and counterterrorism to suppress them. The second focuses on vulnerable computer networks, proliferating hacking tools, and arguments about the revolutionary potential of cyberspace. “War amongst the people” in the developing world and high-tech cyberwar between advanced states seem, reasonably enough, to be radically distinct problems. Yet there are also important similarities between them. In particular, the experience of irregular warfare (IW) has lessons for cyber operations (CO) regarding the limits of simple doctrine for complex conflicts. The history of IW goes back centuries, but the tragedies of 9/11, Iraq, and Afghanistan injected new energy into discussion of COIN and CT. Initial frustration at the inability of conventional force to combat unconventional threats gave way to near euphoria at the rediscovery of an earlier era’s COIN doctrine and its apparent triumph in Iraq. The intellectual pendulum then swung back to disillusionment at the failure of COIN to fix the mess in Afghanistan.1 Even the efficacy of COIN in Iraq now appears dubious in recognition of other forces acting simultaneously, such as the Sunni realignment or “Awakening” in Anbar Province and the culmination of ethnic cleansing in Baghdad.2 Critical scholars have argued that COIN manuals which emphasize population protection and infrastructure development neglect the violent and highly localized bargaining processes which characterize civil war and state 1 For a sampling of disillusioned perspectives see Rory Stewart, Pervez Musharraf, Seth G. Jones, Amrullah Saleh, Sherard Cowper-Coles, Sarah Chayes, Alex Strick Van Linschoten, Felix Kuehn and Frederick W. Kagan, "What Went Wrong in Afghanistan?" Foreign Policy (March/April 2013) 2 See commentary by Jon Lindsay and Austin Long in International Security vol. 37, no. 4? (2013) on Stephen Biddle, Jeffrey A. Friedman and Jacob N. Shapiro, "Testing the Surge: Why Did Violence Decline in Iraq in 2007?" International Security vol. 37, no. 1 (2012): 7-40. See also Jon Lindsay and Roger Petersen, Varieties of Insurgency and Counterinsurgency in Iraq, 2003-2009, CIWAG Case Study Series 2011-2012, Ed. Andrea Dew and Marc Genest (Newport, RI: U.S. Naval War College, 2012) building.3 Indigenous security forces, armed militias, local contractors, and clan elites are critical in COIN, but their loyalty, competence, or efficacy cannot be taken for granted. Even CT, carried out unilaterally by special operations forces or armed drones, must contend with a restive population that reacts adversely to targeting errors, and successes as well. Moreover, the military and civilian agencies tasked with monitoring and influencing all these local actors have frequently been frustrated by self-inflicted failures to coordinate. Cybersecurity is a much more recent problem, and the onset of early frustration is gaining steam.4 Many policymakers and analysts now fear that ubiquitous dependence on cyberspace makes a “digital Pearl Harbor” or “cyber 9/11” increasingly likely.5 As Michael McConnell, a former U.S. Director of National Intelligence, observed rather ominously, “cyber-war mirrors the nuclear challenge in terms of the potential economic and psychological effects.”6 This is hardly a uniquely American perspective, for Chinese strategists also write that, “just as nuclear war was the strategic warfare of the industrial age, network warfare will be the strategic warfare of the information age.”7 However, the overwhelming majority of cyber “attacks” have actually consisted of online crime, espionage, and nationalist expression or “hacktivism.” The only historical case of cyber attack known to have damaged physical infrastructure, the Stuxnet infection of Iranian nuclear enrichment controls, produced just minor and 3 Joshua Rovner, "The Heroes of COIN," Orbis vol. 56, no. 2 (2012): 215-232; Paul Staniland, "States, Insurgents, and Wartime Political Orders," Perspectives on Politics vol. 10, no. 2 (2012): 243-264; Stathis N. Kalyvas, "Review: The New U.S. Army/Marine Corps Counterinsurgency Field Manual," Perspectives on Politics vol. 6, no. 2 (2008): 351-353; Jacqueline L. Hazelton, Compellence and Accommodation in Counterinsurgency Warfare (Ph.D. Dissertation, Brandeis University, 2011); Colin F. Jackson, Defeat in Victory: Organizational Learning Dysfunction in Counterinsurgency, Ph.D. Dissertation, Massachusetts Institute of Technology, 2008 ; Kelly M. Greenhill and Paul Staniland, "Ten Ways to Lose At Counterinsurgency," Civil Wars vol. 9, no. 4 (2007): 402-419 4 The roots of electronic warfare and information security roots go back many decades, but this history is usually forgotten in the future-oriented discussion of cybersecurity as a wholly novel threat. See Michael Warner, "Cybersecurity: A Pre-History," Intelligence and National Security vol. 27, no. 5 (2012): 781-799 5 As President Obama stated in the 2013 State of the Union address, “America must also face the rapidly growing threat from cyber-attacks. We know hackers steal people’s identities and infiltrate private e-mail. We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.” http://www.whitehouse.gov/the-press-office/2013/02/12/president-barack-obamas-state-union-address. Statements of the emerging conventional wisdom on the potency of cyber attack from former senior U.S. officials include Richard A. Clarke and Robert Knake, Cyber War: The Next Threat to National Security and What to Do about It (New York, NY: Harpercollins, 2010); Joel Brenner, America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare (New York: Penguin Press, 2011). 6 Mike McConnell, "Mike McConnell on How to Win the Cyber-War We’re Losing," Washington Post (28 February 2010) 7 Ye Zheng and Zhao Baoxian, “How Do You Fight a Network War?”, Zhongguo Qingnian Bao Online, 3 June 2011 temporary disruption.8 Moreover, an emerging literature by skeptical scholars argues that fears about catastrophic cyberwar are overhyped.9 At the same time, the growing scale of cyber espionage is indeed alarming, especially Chinese activities targeting expatriate political concerns and Western economic interests.10 This has prompted an alternative cyber threat vision of a “death by a thousand cuts” through chronic industrial espionage vice a “digital Pearl Harbor.” However, cybercrime damage estimates are notoriously overinflated and there are formidable obstacles involved in analyzing and acting on petabytes worth of stolen data.11 It is possible that present excitement over cyber warfare may well be headed for empirical disillusionment, not unlike that which met earlier enthusiasm for COIN doctrine. 12 IW and CO fall at extreme ends on a spectrum of cultural and technological perspectives on war, respectively, yet there is an underexplored family resemblance between them. In particular, both depend on undependable third parties. IW works “by, with, and through” indigenous militias, host country security forces, and local contractors amid a complex milieu of civilian interactions. CO works through an overwhelmingly civilian infrastructure, invented, owned, and administered by civilian actors involved in a wide variety of transactions. All action in cyberspace, from this perspective, is indirect 8 Jon Lindsay, “Stuxnet and the Limited Future of Cyber Warfare,” (2013) 9 Sean Lawson, "Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber- Threats," Journal of Information Technology & Politics (Forthcoming 2013); Thomas Rid, "Cyber War Will Not Take Place," Journal of Strategic Studies vol. 35, no. 1 (2011): 5-32; Adam P. Liff, "Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War," Journal of Strategic Studies vol. 35, no. 3 (2012); Jerry Brito and Tate Watkins, "Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy," Harvard National Security Journal vol. 3 (2011): 39-84; Myriam Dunn Cavelty, "Cyber-Terror: Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate," Journal of Information Technology & Politics vol. 4, no. 1 (2008): 19-36; Paul Ohm, "The Myth of the Superuser: Fear, Risk, and Harm Online," UC Davis Law Review vol. 41, no. 4 (2008): 1327. 10 Office of the National Counterintelligence Executive, Foreign Spies Stealing US Economic Secrets in Cyberspace, Report to Congress on Foreign Economic Collection and Industrial Espionage 2009-2011, October 2011; Information Warfare Monitor, Tracking Ghostnet: Investigating a Cyber Espionage Network, Secdev Group and University of Toronto Citizen Lab, 29 March 2009. 11 Ross Anderson, Chris Barton, Rainer Bohm, Richard Clayton, Michel J.G. Van Eeten, Michael Levi, Tyler Moore and Stefan
Recommended publications
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • Applying Irregular Warfare Principles to Cyber Warfare
    Soldier from 3/187th Infantry, 101st Airborne Division, out of Fort Campbell, Kentucky, sets up SATCOM to communicate further with key rear elements as part of search and attack mission in area of Narizah, Afghanistan, July 23, 2002 (U.S. Army/Todd M. Roy) Applying Irregular Warfare Principles to Cyber Warfare By Frank C. Sanchez, Weilun Lin, and Kent Korunka he cyberspace threat exists in a cyberspace and cyberspace threats that and can foresee, rapidly respond to, realm that does not conform to are initiated by faceless, borderless, and and counter cyberspace threats, the T the physical limits of land, sea, sometimes nationless enemies. These U.S. military’s strategy and approach to air, and space. Unlike these traditional enemies manifest in a domain neither cyberspace must adapt and incorporate domains, cyberspace fosters an unpre- confined nor governed by the tradi- unconventional approaches and hybrid dictable threat that can adjust, morph, tional norms and rules of war, which warfare into its operational capability. and reproduce without a national the broader military has no experience Despite its importance, the Nation’s identity or face.1 The challenge of the undertaking. To ensure the United leaders, strategists, and military planners military is to posture its approach to States maintains cyberspace dominance struggle to understand how cyberspace operations (CO) fit into national security as an instrument of national policy. A Commander Frank C. Sanchez, USN, is an Action Officer on the Joint Staff J32, Intelligence, significant shortcoming is due to the Surveillance, and Reconnaissance Operations. Major Weilun Lin, USAF, is Chief of the Central and leaders’ lack of experience and basic South Asia Branch, Joint Cyberspace Center, U.S.
    [Show full text]
  • Maritime Irregular Warfare
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Characterizing and Exploring the Implications of MARITIME IRREGULAR WARFARE MOLLY DUNIGAN | DICK HOFFMANN PETER CHALK | BRIAN NICHIPORUK | PAUL DELUCA Prepared for the United States Navy Approved for public release; distribution unlimited NATIONAL DEFENSE RESEARCH INSTITUTE The research described in this report was prepared for the United States Navy.
    [Show full text]
  • Fourth-Generation War and Other Myths
    FOURTH-GENERATION WAR AND OTHER MYTHS Antulio J. Echevarria II November 2005 Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. This publication is a work of the United States Government, as defined in Title 17, United States Code, section 101. As such, it is in the public domain and under the provisions of Title 17, United States Code, section 105, it may not be copyrighted. ***** The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government. This report is cleared for public release; distribution is unlimited. ***** This monograph is an expanded version of an article entitled "Deconstructing the theory of Fourth-Generation War," published in the August 2005 symposium of Contemporary Security Policy. ***** Comments pertaining to this report are invited and should be forwarded to: Director, Strategic Studies Institute, U.S. Army War College, 122 Forbes Ave, Carlisle, PA 17013-5244. ***** All Strategic Studies Institute (SSI) monographs are available on the SSI Homepage for electronic dissemination. Hard copies of this report also may be ordered from our Homepage. SSI’s Homepage address is: www.StrategicStudies Institute.army.mil. ***** The Strategic Studies Institute publishes a monthly e-mail newsletter to update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming conferences sponsored by the Institute. Each newsletter also provides a strategic commentary by one of our research analysts.
    [Show full text]
  • Russian Strategic Intentions
    APPROVED FOR PUBLIC RELEASE Russian Strategic Intentions A Strategic Multilayer Assessment (SMA) White Paper May 2019 Contributing Authors: Dr. John Arquilla (Naval Postgraduate School), Ms. Anna Borshchevskaya (The Washington Institute for Near East Policy), Dr. Belinda Bragg (NSI, Inc.), Mr. Pavel Devyatkin (The Arctic Institute), MAJ Adam Dyet (U.S. Army, J5-Policy USCENTCOM), Dr. R. Evan Ellis (U.S. Army War College Strategic Studies Institute), Mr. Daniel J. Flynn (Office of the Director of National Intelligence (ODNI)), Dr. Daniel Goure (Lexington Institute), Ms. Abigail C. Kamp (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Roger Kangas (National Defense University), Dr. Mark N. Katz (George Mason University, Schar School of Policy and Government), Dr. Barnett S. Koven (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Jeremy W. Lamoreaux (Brigham Young University- Idaho), Dr. Marlene Laruelle (George Washington University), Dr. Christopher Marsh (Special Operations Research Association), Dr. Robert Person (United States Military Academy, West Point), Mr. Roman “Comrade” Pyatkov (HAF/A3K CHECKMATE), Dr. John Schindler (The Locarno Group), Ms. Malin Severin (UK Ministry of Defence Development, Concepts and Doctrine Centre (DCDC)), Dr. Thomas Sherlock (United States Military Academy, West Point), Dr. Joseph Siegle (Africa Center for Strategic Studies, National Defense University), Dr. Robert Spalding III (U.S. Air Force), Dr. Richard Weitz (Center for Political-Military Analysis at the Hudson Institute), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Prefaces Provided By: RDML Jeffrey J. Czerewko (Joint Staff, J39), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Editor: Ms.
    [Show full text]
  • Irregular Warfare: Irregular Warfare: Brazil’S Fight Against Fight Brazil’S
    JSOU Report 09-8 IW: Brazil’s Fight Against Criminal Urban Guerrillas Criminal Pinheiro Urban Against Fight 09-8 Report Brazil’s JSOU IW: Irregular Warfare: Brazil’s Fight Against Criminal Urban Guerrillas Alvaro de Souza Pinheiro JSOU Report 09-8 September 2009 Joint Special Operations University Brian A. Maher, Ed.D., SES, President Kenneth H. Poole, YC-3, Strategic Studies Department Director William W. Mendel, Colonel, U.S. Army, Ret.; Jeffrey W. Nelson, Colonel, U.S. Army, Ret.; and William S. Wildrick, Captain, U.S. Navy, Ret — Resident Senior Fellows Editorial Advisory Board Joint Special Operations University John B. Alexander Alvaro de Souza Pinheiro and the Strategic Studies Department Ph.D., Education, The Apollinaire Group Major General, Brazilian Army, Ret. and JSOU Senior Fellow JSOU Associate Fellow The Joint Special Operations University (JSOU) provides its publications Roby C. Barrett, Ph.D., Middle James F. Powers, Jr. to contribute toward expanding the body of knowledge about joint special Eastern & South Asian History Colonel, U.S. Army, Ret. Public Policy Center Middle East Institute Director of Homeland Security, operations. JSOU publications advance the insights and recommendations and JSOU Senior Fellow Commonwealth of Pennsylvania and of national security professionals and the Special Operations Forces (SOF) Joseph D. Celeski JSOU Associate Fellow students and leaders for consideration by the SOF community and defense Colonel, U.S. Army, Ret. Richard H. Shultz, Jr. leadership. JSOU Senior Fellow Ph.D., Political Science JSOU is the educational component of the United States Special Opera- Chuck Cunningham Director, International Security tions Command (USSOCOM), MacDill Air Force Base, Florida.
    [Show full text]
  • Operations in Irregular Warfare
    Operations in Irregular Warfare Martijn Kitzen Contents Introduction ....................................................................................... 2 Irregular Warfare .................................................................................. 3 Operationalizing Irregular Warfare ............................................................... 6 Counterterrorism .................................................................................. 9 Counterinsurgency ................................................................................ 10 Stability Operations ............................................................................... 13 Security Force Assistance ........................................................................ 14 Unconventional Warfare .......................................................................... 15 Conclusion ........................................................................................ 17 Summary .......................................................................................... 18 Cross-References ................................................................................. 19 References ........................................................................................ 19 Abstract Irregular warfare differs tremendously from the regular, conventional warfare for which Western armed forces traditionally have been optimized. This chapter explores this contrasting form of warfare and its underlying body of knowledge which characterizes irregular conflicts
    [Show full text]
  • Navy Irregular Warfare and Counterterrorism Operations: Background and Issues for Congress
    Navy Irregular Warfare and Counterterrorism Operations: Background and Issues for Congress Updated December 17, 2019 Congressional Research Service https://crsreports.congress.gov RS22373 Navy Irregular Warfare and Counterterrorism Operations Summary In the years following the terrorist attacks of September 11, 2001, the Navy has carried out a variety of irregular warfare (IW) and counterterrorism (CT) activities. Among the most readily visible of these were operations carried out by Navy sailors serving ashore in the Middle East and Afghanistan, as well as the May 1-2, 2011, U.S. military operation in Abbottabad, Pakistan, that killed Osama bin Laden. During these years, the Navy took certain actions intended to improve its IW capabilities. For example, the Navy established the Navy Expeditionary Combat Command (NECC) informally in October 2005 and formally in January 2006. NECC consolidated and facilitated the expansion of a number of Navy organizations that have a role in IW operations. The Navy also established the Navy Irregular Warfare Office in July 2008, published a vision statement for irregular warfare in January 2010, and established “a community of interest” (COI) to develop and advance ideas, collaboration, and advocacy related to IW in December 2010. The Navy during these years also reestablished its riverine force and initiated The Global Maritime Partnership, which was a U.S. Navy initiative to achieve an enhanced degree of cooperation between the U.S. Navy and foreign navies, coast guards, and maritime police forces, for the purpose of ensuring global maritime security against common threats. In addition, the Navy operated the Southern Partnership Station (SPS) and the Africa Partnership Station (APS), which were Navy ships, such as amphibious ships or high-speed sealift ships, that deployed to the Caribbean and to waters off Africa, respectively, to support U.S.
    [Show full text]
  • Won't Get Fooled Again: America's Strategic
    WON’T GET FOOLED AGAIN: AMERICA’S STRATEGIC SHORTCOMINGS IN IRREGULAR WARFARE by Troy H. Thomas A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Masters of Government Baltimore, Maryland August 2020 Abstract How does America improve its Irregular Warfare (IW) capability? Academia defines IW as encompassing insurgency and terrorism. It is used to counter and defeat Violent Extremist Organizations (VEOs) such as Al Qaeda (AQ) and the Islamic State. 2018 saw 9,600 terrorist attacks and 49 of the 52 conflicts tracked by the Uppsala Conflict Data Program were non-state against state actors.1 IW remains an immediate ongoing concern for America. This paper is a historical evaluative dissertation. Chapter one addresses the difficult task of studying IW and the differing definitions of IW (or lack of same) and their history. It addresses the American military’s relationship with the concept historically and its current status. It includes a discussion of how this affects the Special Operations Forces (SOF) that are the primary practitioners of IW for the American military. Chapter two discusses VEOs, one of the five major threats outlined in the 2018 National Defense Strategy (NDS). Case studies assess how terrorists and insurgents seek to shape public opinion. The first is a classic insurgency campaign, the Algerian Revolution and the second 1 Barnett S. Koven, Re-evaluating Special Operations Forces-led Counterterrorism Efforts, (Tampa: Joint Special Operations University, 2019), 1. ii covers the Palestine Liberation Organization’s (PLO) ground-breaking terror campaign. There is also a discussion of ideology and strategy.
    [Show full text]
  • Irregular Warfare
    IRREGULAR WARFARE Air Force Doctrine Document 3-2 15 March 2013 This document complements related discussion found in Joint Publications (JP) 3-22, Foreign Internal Defense; 3-24, Counterinsurgency Operations; and 3-26, Counterterrorism BY ORDER OF THE AIR FORCE DOCTRINE DOCUMENT 3-2 SECRETARY OF THE AIR FORCE 15 MARCH 2013 SUMMARY OF CHANGES This document is substantially revised and renumbered from 3-24 to 3-2. Its focus was shifted from a counterinsurgency-centric view to an overarching perspective of irregular warfare that encompasses the following key activities: stability operations, counterterrorism, counterinsurgency, foreign internal defense, and unconventional warfare. Irregular Warfare (IW) history and strategic context from the Airman’s perspective are presented in Chapter 1. A command and organization discussion, including responsibilities of the commander, Air Force forces and presentation of forces, is streamlined in Chapter 2. Chapter 3 encompasses strategy, planning, execution, and assessment considerations. This publication also includes a new appendix that clarifies the relationship between IW and traditional warfare in the context of phases of war. Supersedes: AFDD 3-24, 1 August 2007 OPR: LeMay Center/DDS Certified by: LeMay Center/DD (Col Todd C. Westhauser) Pages: 60 Accessibility: Available on the e-publishing website at www.e-publishing.af.mil for downloading Releasability: There are no releasability restrictions on this publication Approved by: Walter D. Givhan, Major General, USAF Commander, Curtis E. LeMay Center for Doctrine Development and Education FOREWORD Irregular warfare remains in the forefront of the Air Force’s warfighting focus. Airmen continue to plan and counter irregular and evolving threats as joint, multinational, and multi-agency campaigns, beginning with strategy development and concluding with the achievement of the desired end state.
    [Show full text]
  • Out of Bounds : Transnational Sanctuary in Irregular Warfare / by Thomas A
    Out of Bounds OP 17 Transnational Sanctuary in Irregular Warfare Thomas A. Bruscino, Jr. Global War on Terrorism Occasional Paper 17 Combat Studies Institute Press Fort Leavenworth, Kansas Out of Bounds OOPP 1177 Transnational Sanctuary in Irregular Warfare by Thomas A. Bruscino, Jr. Combat Studies Institute Press Fort Leavenworth, Kansas Library of Congress Cataloging-in-Publication Data Bruscino, Thomas A. Out of bounds : transnational sanctuary in irregular warfare / by Thomas A. Bruscino, Jr. p. cm. -- (Global War on Terrorism occasional paper 17) 1. Transnational sanctuaries (Military science)--Case studies. 2. Transnational sanctuaries (Mili- tary science)--History--20th century. 3. Vietnam War, 1961-1975--Campaigns. 4. Afghanistan--History--Soviet occupation, 1979-1989--Campaigns. I. Title. II. Series. U240.B78 2006 958.104’5--dc22 2006027469 CSI Press publications cover a variety of military history topics. The views expressed in this CSI Press publication are those of the author and not necessarily those of the Department of the Army or the Department of Defense. A full list of CSI Press publications, many of them available for downloading, can be found at http://www.cgsc.army.mil/carl/resources/csi/csi.asp. For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop IDCC, Washington, DC 20402-0001 ISBN 0-16-076846-2 Foreword In this timely Occasional Paper, Dr. Tom Bruscino analyzes a critical issue in the GWOT, and one which has bedeviled counterinsurgents past and present. He examines the role played by sanctuaries as they relate to irregular warfare in two conflicts.
    [Show full text]
  • Recent Trends in Thinking About Warfare
    CRM D0014875.A1/Final September 2006 Recent Trends in Thinking about Warfare Albert A. Nofi 4825 Mark Center Drive • Alexandria, Virginia 22311-1850 Approved for distribution: September 2006 Ms. Maureen A. Wigge Director, Operational Policy Team Operations Evaluation Group This document represents the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the Department of the Navy. Approved for Public Release; Distribution Unlimited. Specific authority: N00014-05-D-0500. Copies of this document can be obtained through the Defense Technical Information Center at www.dtic.mil or contact CNA Document Control and Distribution Section at 703-824-2123. Copyright 2006 The CNA Corporation Contents Summary . 1 Overview . 5 Basic ideas . 7 Fourth-Generation warfare . 7 Information-age warfare . 11 The revolution in military affairs . 13 Effects-based operations . 16 Throw it all out? . 18 A vision of war in the future . 21 Critique . 25 Revolution or evolution?. 25 Some historical revolutions in military affairs . 27 The Romans. 28 The Gunpowder Revolution . 33 Some other real RMAs . 36 The trouble with RMAs . 39 Blitzkrieg: revolution or evolution? . 39 Critique of the foundations of the concept of 4GW . 45 Critique of some of the concepts of information-age warfare 62 Critique of some ideas behind EBO. 66 Should we fire the Baron? . 68 “Where's the beef?” . 73 The Irish War of Independence . 73 The Emancipation Proclamation . 75 Fighting the Fourth-Generation threat . 81 So, how do we “make war the 4GW way”? . 87 Coping with the threat . 90 How will we know when we've won? .
    [Show full text]