Invasion Ecology

Total Page:16

File Type:pdf, Size:1020Kb

Load more

and Marchetti Lockwood, Hoopes, panion m w o e c b s e i e t e r Invasion Ecology f Second Edition Lockwood, Hoopes, and Marchetti INVASION This new edition of Invasion Ecology provides a comprehensive and updated introduction to all aspects of biological invasion by non-native species. Highlighting Invasion Ecology important research fi ndings associated with each stage of invasion, the book provides an overview of the invasion process from transportation patterns and causes of ECOLOGY establishment success to ecological impacts, invader management, and post-invasion evolution. The authors have produced new chapters on predicting and preventing invasion, managing and eradicating invasive species, and invasion dynamics in a changing climate. Second Edition Modern global trade and travel have led to unprecedented movement of non-native species by humans with unforeseen, interesting, and occasionally devastating consequences. Increasing Julie L. Lockwood, recognition of the problems associated with invasion has led to a rapid growth in research into the dynamics of non-native species and their adverse effects on native biota and human economies. Martha F. Hoopes, and This book provides a synthesis of this rapidly growing fi eld of research and is an essential text for undergraduate and graduate students in ecology and conservation management. Michael P. Marchetti Julie L. Lockwood is a Professor at Rutgers University. Her research interests include conservation biology, population biology, and biological invasions. Martha F. Hoopes is an Associate Professor at Mount Holyoke College. She has worked primarily with plants and insects on questions of spatial community dynamics and invasions. Michael P. Marchetti is the Fletcher Jones Professor of Ecology at St. Mary’s College of California. Second Edition He is an aquatic ecologist who primarily studies community and landscape aspects of freshwater invaders in the western U.S. panion m w There is a free companion website available for this book at o e c b s e i e t e r f www.wiley.com/go/invasionecology On the site you will fi nd: ■ Downloadable versions of the illustrations within the book ■ Downloadable versions of the tables within the book panion m w o e c b s e i e t e r f hb_9781444333640.indd 1 27/2/13 13:40:33 Invasion Ecology Invasion Ecology Second Edition Julie L. Lockwood Ecology, Evolution and Natural Resources Department Rutgers, The State University of New Jersey USA Martha F. Hoopes Department of Biological Sciences Mount Holyoke College USA Michael P. Marchetti Fletcher Jones Professor of Ecology Biology Department St Mary’s College of California USA A John Wiley & Sons, Ltd., Publication This edition first published 2013 © 2013 Julie L. Lockwood, Martha F. Hoopes, and Michael P. Marchetti First edition published 2007 © 2007 Julie L. Lockwood, Martha F. Hoopes, and Michael P. Marchetti Blackwell Publishing was acquired by John Wiley & Sons in February 2007. Blackwell’s publishing program has been merged with Wiley’s global Scientific, Technical and Medical business to form Wiley-Blackwell. Registered Office John Wiley & Sons, Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK Editorial Offices 9600 Garsington Road, Oxford, OX4 2DQ, UK The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK 2121 State Avenue, Ames, Iowa 50014-8300, USA 111 River Street, Hoboken, NJ 07030-5774, USA For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com/wiley-blackwell. The right of the authors to be identified as the authors of this work has been asserted in accordance with the UK Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Designation used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service names, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. Limit of Liability/Disclaimer of Warranty: While the publisher and author(s) have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. It is sold on the understanding that the publisher is not engaged in rendering professional services and neither the publisher nor the author shall be liable for damages arising herefrom. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Library of Congress Cataloging-in-Publication Data Lockwood, Julie L. Invasion ecology / Julie Lockwood, Ecology, Evolution and Natural Resources Department Rutgers University, USA, Martha Hoopes, Biological Sciences Department,Mount Holyoke College, USA, Michael Marchetti, Fletcher Jones Professor of Biology, Biology Department, St Mary’s College of California, USA. – Second edition. pages cm Includes bibliographical references and index. ISBN 978-1-4443-3364-0 (hardback : alk. paper) – ISBN 978-1-4443-3365-7 (softback : alk. paper) – ISBN 978-1-118-57078-4 – ISBN 978-1-118-57080-7 – ISBN 978-1-118-57081-4 (emobi) – ISBN 978-1-118-57082-1 (epub) – ISBN 978-1-118-57083-8 (epdf) 1. Biological invasions. I. Hoopes, Martha F. II. Marchetti, Michael P. III. Title. QH353.L63 2013 577′.18–dc23 2013001797 A catalogue record for this book is available from the British Library. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Cover images: Front: Gorse (Ulex europaeus) at Lake Wakatipu just outside of Queenstown, New Zealand. Gorse is an extremely invasive weed in New Zealand, and covers approximately 700,000 hectares (1,700,000 acres) of the New Zealand landscape. Gorse is native to Western Europe and has become established in NZ, Australia, the US and Chile. Photo courtesy of Michael Marchetti. Back: Nutmeg Mannikin (Lonchura punctulata), a passerine bird native to tropical Asia that has been introduced to Puerto Rico, Australia and the US. The picture was taken in Puerto Rico. Photo courtesy of Alberto Lopez. Cover design by Nicki Averill Design & Illustration Set in 10.5/12pt Classical Garamond by SPi Publisher Services, Pondicherry, India 1 2013 Contents Preface ix 1 An Introduction to Invasion Ecology 1 What are invaders and why do we care about them? 2 A brief history of invasion ecology 5 The wicked terminological web we weave 7 The invasion process 13 Summary 18 2 Transport Vectors and Pathways 24 What’s the difference between a vector and a pathway? 25 Does human-mediated dispersal differ from natural dispersal? 26 Transport vectors 29 Which species are transported via what vector group? 41 Dynamics of transport pathways 44 Summary 48 3 Trends in Numbers of Invaders 50 Invasion rates through time 51 Geographic patterns in numbers of invaders 63 Summary 72 4 Propagules 74 What are propagules? 75 Donor region and propagule pressure 75 vi Contents Biological mechanisms 79 Empirical evidence 85 The hidden influence of propagule pressure 92 Summary 97 5 Disturbance 99 History and definition of disturbance 100 Disturbance facilitates invasion? 104 Restoration and disturbance 112 Agriculture and urbanization as disturbance 115 Biotic disturbance 118 Summary 127 6 Establishment Success: The Influence of Biotic Interactions 129 Conceptual issues 130 Resistance to invasion 131 Facilitation of establishment 146 Summary 155 7 Modeling the Geographical Spread of Invasive Species 157 What exactly is geographical spread? 158 Why do we want to model geographical spread? 162 The reaction–diffusion model 163 Long-distance dispersal 170 Directional dispersal 173 Stratified dispersal 176 Other forms of heterogeneity 182 Summary 187 8 Ecological Processes and the Spread of Non-native Species 189 Population growth 190 Dispersal 194 Biotic interactions 202 The role of heterogeneity 207 Lag times 210 Boom and bust 215 Summary 216 Contents vii 9 Ecological Impacts of Invasive Species 218 Genetic impacts 219 Individual impacts 222 Population impacts 228 Community impacts 233 Ecosystem impacts 240 Landscape, regional, and global impacts 242 Summary 244 10 Impact Synthesis 246 Perception and recognition of impact 247 Integrating perception with ecological determinants of impact 255 A theory of impact? 258 Finding common currencies 263 A cross-stage impact formula 273 Summary 275 11 Evolution of Invaders 277 Founding process 279 Losses and gains in genetic variability via transport mechanisms 279 Genetics and post-release success 288 Local adaptation and life-history evolution 291 Evolution of native species in response to non-natives 296 Summary 298 12 Predicting and Preventing Invasion 299 Explanation versus risk assessment 301 Inherent limitations to prediction 301 Risk analysis 303 Screening risky species 304 Screening risky transportation vectors 317 Summary 333 13 Eradication and Control of Invaders 335 Cause for optimism? 336 Rapid response 337 Lazarus effect 343 Long-term control 346 Sisyphus effect 350 Summary 354 viii Contents 14 Global Climate Change and Invasive Species 356 Global climate change 101 357 Non-native species and global climate change 364 Transport 365 Establishment 368 Spread 373 Impact 379 Human responses 387 Summary 391 References 393 Index 428 A colour plate section falls between pages 372 and 373 Preface It has been our experience that placing the reams of observations, examples, and research within the broad context of invasion ecology gets more difficult as the field grows each year.
Recommended publications
  • Warfare in a Fragile World: Military Impact on the Human Environment

    Warfare in a Fragile World: Military Impact on the Human Environment

    Recent Slprt•• books World Armaments and Disarmament: SIPRI Yearbook 1979 World Armaments and Disarmament: SIPRI Yearbooks 1968-1979, Cumulative Index Nuclear Energy and Nuclear Weapon Proliferation Other related •• 8lprt books Ecological Consequences of the Second Ihdochina War Weapons of Mass Destruction and the Environment Publish~d on behalf of SIPRI by Taylor & Francis Ltd 10-14 Macklin Street London WC2B 5NF Distributed in the USA by Crane, Russak & Company Inc 3 East 44th Street New York NY 10017 USA and in Scandinavia by Almqvist & WikseH International PO Box 62 S-101 20 Stockholm Sweden For a complete list of SIPRI publications write to SIPRI Sveavagen 166 , S-113 46 Stockholm Sweden Stoekholol International Peace Research Institute Warfare in a Fragile World Military Impact onthe Human Environment Stockholm International Peace Research Institute SIPRI is an independent institute for research into problems of peace and conflict, especially those of disarmament and arms regulation. It was established in 1966 to commemorate Sweden's 150 years of unbroken peace. The Institute is financed by the Swedish Parliament. The staff, the Governing Board and the Scientific Council are international. As a consultative body, the Scientific Council is not responsible for the views expressed in the publications of the Institute. Governing Board Dr Rolf Bjornerstedt, Chairman (Sweden) Professor Robert Neild, Vice-Chairman (United Kingdom) Mr Tim Greve (Norway) Academician Ivan M£ilek (Czechoslovakia) Professor Leo Mates (Yugoslavia) Professor
  • Hamilton County General Sessions Court - Criminal Division 9/23/2021 Page No: 1 Trial Docket

    Hamilton County General Sessions Court - Criminal Division 9/23/2021 Page No: 1 Trial Docket

    CJUS8023 Hamilton County General Sessions Court - Criminal Division 9/23/2021 Page No: 1 Trial Docket Thursday Trial Date: 9/23/2021 8:30:00 AM Docket #: 1825414 Defendant: ANDERSON , QUINTON LAMAR Charge: DOMESTIC ASSAULT Presiding Judge: STARNES, GARY Division: 5 Court Room: 4 Arresting Officer: SMITH, BRIAN #996, Complaint #: A 132063 2021 Arrest Date: 5/14/2021 Docket #: 1793448 Defendant: APPLEBERRY , BRANDON JAMAL Charge: AGGRAVATED ASSAULT Presiding Judge: WEBB, GERALD Division: 3 Court Room: 3 Arresting Officer: GOULET, JOSEPH #385, Complaint #: A 62533 2021 Arrest Date: 5/26/2021 Docket #: 1852403 Defendant: ATCHLEY , GEORGE FRANKLIN Charge: CRIMINAL TRESPASSING Presiding Judge: STARNES, GARY Division: 5 Court Room: 4 Arresting Officer: SIMON, LUKE #971, Complaint #: A 100031 2021 Arrest Date: 9/17/2021 Docket #: 1814264 Defendant: AVERY , ROBERT CAMERON Charge: THEFT OF PROPERTY Presiding Judge: WEBB, GERALD Division: 3 Court Room: 3 Arresting Officer: SERRET, ANDREW #845, Complaint #: A 091474 2020 Arrest Date: 9/9/2020 Docket #: 1820785 Defendant: BALDWIN , AUNDREA RENEE Charge: CRIMINAL TRESPASSING Presiding Judge: SELL, CHRISTINE MAHN Division: 1 Court Room: 1 Arresting Officer: FRANTOM, MATTHEW #641, Complaint #: M 115725 2020 Arrest Date: 11/14/2020 Docket #: 1815168 Defendant: BARBER , JUSTIN ASHLEY Charge: OBSTRUCTING HIGHWAY OR OTHER PASSAGEWAY Presiding Judge: STARNES, GARY Division: 5 Court Room: 4 Arresting Officer: LONG, SKYLER #659, Complaint #: A 094778 2020 Arrest Date: 9/18/2020 Docket #: 1812424 Defendant: BARNES
  • A Historical Assessment of Amphibious Operations from 1941 to the Present

    A Historical Assessment of Amphibious Operations from 1941 to the Present

    CRM D0006297.A2/ Final July 2002 Charting the Pathway to OMFTS: A Historical Assessment of Amphibious Operations From 1941 to the Present Carter A. Malkasian 4825 Mark Center Drive • Alexandria, Virginia 22311-1850 Approved for distribution: July 2002 c.. Expedit'onaryyystems & Support Team Integrated Systems and Operations Division This document represents the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the Department of the Navy. Approved for Public Release; Distribution Unlimited. Specific authority: N0014-00-D-0700. For copies of this document call: CNA Document Control and Distribution Section at 703-824-2123. Copyright 0 2002 The CNA Corporation Contents Summary . 1 Introduction . 5 Methodology . 6 The U.S. Marine Corps’ new concept for forcible entry . 9 What is the purpose of amphibious warfare? . 15 Amphibious warfare and the strategic level of war . 15 Amphibious warfare and the operational level of war . 17 Historical changes in amphibious warfare . 19 Amphibious warfare in World War II . 19 The strategic environment . 19 Operational doctrine development and refinement . 21 World War II assault and area denial tactics. 26 Amphibious warfare during the Cold War . 28 Changes to the strategic context . 29 New operational approaches to amphibious warfare . 33 Cold war assault and area denial tactics . 35 Amphibious warfare, 1983–2002 . 42 Changes in the strategic, operational, and tactical context of warfare. 42 Post-cold war amphibious tactics . 44 Conclusion . 46 Key factors in the success of OMFTS. 49 Operational pause . 49 The causes of operational pause . 49 i Overcoming enemy resistance and the supply buildup.
  • The Crucial Development of Heavy Cavalry Under Herakleios and His Usage of Steppe Nomad Tactics Mark-Anthony Karantabias

    The Crucial Development of Heavy Cavalry Under Herakleios and His Usage of Steppe Nomad Tactics Mark-Anthony Karantabias

    The Crucial Development of Heavy Cavalry under Herakleios and His Usage of Steppe Nomad Tactics Mark-Anthony Karantabias The last war between the Eastern Romans and the Sassanids was likely the most important of Late Antiquity, exhausting both sides economically and militarily, decimating the population, and lay- ing waste the land. In Heraclius: Emperor of Byzantium, Walter Kaegi, concludes that the Romaioi1 under Herakleios (575-641) defeated the Sassanian forces with techniques from the section “Dealing with the Persians”2 in the Strategikon, a hand book for field commanders authored by the emperor Maurice (reigned 582-602). Although no direct challenge has been made to this claim, Trombley and Greatrex,3 while inclided to agree with Kaegi’s main thesis, find fault in Kaegi’s interpretation of the source material. The development of the katafraktos stands out as a determining factor in the course of the battles during Herakleios’ colossal counter-attack. Its reforms led to its superiority over its Persian counterpart, the clibonarios. Adoptions of steppe nomad equipment crystallized the Romaioi unit. Stratos4 and Bivar5 make this point, but do not expand their argument in order to explain the victory of the emperor over the Sassanian Empire. The turning point in its improvement seems to have taken 1 The Eastern Romans called themselves by this name. It is the Hellenized version of Romans, the Byzantine label attributed to the surviving East Roman Empire is artificial and is a creation of modern historians. Thus, it is more appropriate to label them by the original version or the Anglicized version of it.
  • PICKETT's CHARGE Gettysburg National Military Park STUDENT

    PICKETT's CHARGE Gettysburg National Military Park STUDENT

    PICKETT’S CHARGE I Gettysburg National Military Park STUDENT PROGRAM U.S. Department of the Interior National Park Service Pickett's Charge A Student Education Program at Gettysburg National Military Park TABLE OF CONTENTS Section 1 How To Use This Booklet ••••..••.••...• 3 Section 2 Program Overview . • . • . • . • . 4 Section 3 Field Trip Day Procedures • • • . • • • . 5 Section 4 Essential Background and Activities . 6 A Causes ofthe American Civil War ••..•...... 7 ft The Battle ofGettysburg . • • • . • . 10 A Pi.ckett's Charge Vocabulary •............... 14 A Name Tags ••.. ... ...........• . •......... 15 A Election ofOfficers and Insignia ......•..•.. 15 A Assignm~t ofSoldier Identity •..••......... 17 A Flag-Making ............................. 22 ft Drill of the Company (Your Class) ........... 23 Section 5 Additional Background and Activities .••.. 24 Structure ofthe Confederate Army .......... 25 Confederate Leaders at Gettysburg ••.•••.••• 27 History of the 28th Virginia Regiment ....... 30 History of the 57th Virginia Regiment . .. .... 32 Infantry Soldier Equipment ................ 34 Civil War Weaponry . · · · · · · 35 Pre-Vtsit Discussion Questions . • . 37 11:me Line . 38 ... Section 6 B us A ct1vities ........................• 39 Soldier Pastimes . 39 Pickett's Charge Matching . ••.......•....... 43 Pickett's Charge Matching - Answer Key . 44 •• A .•. Section 7 P ost-V 1s1t ctivities .................... 45 Post-Visit Activity Ideas . • . • . • . • . 45 After Pickett's Charge . • • • • . • . 46 Key: ft = Essential Preparation for Trip 2 Section 1 How to Use This Booklet Your students will gain the most benefit from this program if they are prepared for their visit. The preparatory information and activities in this booklet are necessary because .. • students retain the most information when they are pre­ pared for the field trip, knowing what to expect, what is expected of them, and with some base of knowledge upon which the program ranger can build.
  • Democracies Waging Counterinsurgency in a Foreign Context: the Past and Present

    Democracies Waging Counterinsurgency in a Foreign Context: the Past and Present

    Utah State University DigitalCommons@USU All Graduate Theses and Dissertations Graduate Studies 5-2015 Democracies Waging Counterinsurgency in a Foreign Context: The Past and Present Scott J. Winslow Utah State University Follow this and additional works at: https://digitalcommons.usu.edu/etd Part of the Political Science Commons Recommended Citation Winslow, Scott J., "Democracies Waging Counterinsurgency in a Foreign Context: The Past and Present" (2015). All Graduate Theses and Dissertations. 4475. https://digitalcommons.usu.edu/etd/4475 This Thesis is brought to you for free and open access by the Graduate Studies at DigitalCommons@USU. It has been accepted for inclusion in All Graduate Theses and Dissertations by an authorized administrator of DigitalCommons@USU. For more information, please contact [email protected]. DEMOCRACIES WAGING WAR IN A FOREIGN CONTEXT: THE PAST AND PRESENT by Scott J. Winslow A thesis submitted in partial fulfillment of the requirement for the degree of MASTER OF ARTS in Political Science Approved: ________________________ _______________________ Dr. Veronica Ward Dr. Jeannie Johnson Major Professor Committee Member ________________________ ________________________ Dr. Abdulkafi Albirini Dr. Mark McLellan Committee Member Vice President for Research and Dean of the School of Graduate Studies UTAH STATE UNIVERSITY Logan, Utah 2015 ii Copyright © Scott Winslow 2015 All Right Reserved iii ABSTRACT Democracies Waging Counterinsurgency in a Foreign Context: The Past and Present by Scott J. Winslow, Master of Arts Utah State University, 2015 Major Professor: Dr. Veronica Ward Department: Political Science Why have Western democracies been successful in conducting external counterinsurgency operations in the past and unsuccessful recently? This thesis conducts a comparison between two successful past interventions, and a recent unsuccessful one using three variable groupings.
  • Defense Primer: 75Th Anniversary of D-Day, June 6, 1944

    Defense Primer: 75Th Anniversary of D-Day, June 6, 1944

    May 28, 2019 Defense Primer: 75th Anniversary of D-Day, June 6, 1944 June 6, 2019, marks the 75th anniversary of the historic manned by Germans), as the main barrier to the invasion amphibious landing by Allied Forces on the coast of force. Allied leaders initially set June 5, 1944, as D-Day but Normandy, France, on June 6, 1944, during World War II on the morning of June 4, stormy weather over the English (1939-1945). D-Day marked the beginning of the Allied Channel forced Gen. Eisenhower to postpone the attack for campaign to liberate Europe from Nazi Germany. 24 hours to June 6 when a break in the weather was expected. Operation NEPTUNE was the code name given What is the “D” in D-Day? to the seaborne assault phase. See Figure 1. The “D” in D-Day is the designation for the first day of any important invasion or military operation. The days before Allied Landings on June 6, 1944 and after a D-Day are indicated using minus and plus signs, Before dawn on June 6, 1944, 13,000 paratroopers from (i.e., D-1 means one day before (June 5) while D+7 means three airborne divisions—the U.S. 82nd and 101st and the seven days after D-Day (June 13)). British 6th—parachuted and landed by glider behind targeted beaches. See Figure 2. Over 1,200 aircraft were D-Day Preparation and Operations used in the pre-landing drop. Allied naval forces, including At the Tehran Conference in August 1943, Allied leaders the U.S.
  • “This Is Our House!” a Preliminary Assessment of the Capitol Hill

    “This Is Our House!” a Preliminary Assessment of the Capitol Hill

    MARCH 2021 “This is Our House!” A Preliminary Assessment of the Capitol Hill Siege Participants Program on Extremism THE GEORGE WASHINGTON UNIVERSITY MARCH 2021 “This is Our House!” A Preliminary Assessment of the Capitol Hill Siege Participants Program on Extremism THE GEORGE WASHINGTON UNIVERSITY All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2021 by Program on Extremism Program on Extremism 2000 Pennsylvania Avenue NW Washington, DC 20006 www.extremism.gwu.edu Cover: ©REUTERS/Leah Millis TABLE OF CONTENTS Acknowledgements 6 Executive Summary 8 Introduction 10 Findings 12 Categorizing the Capitol Hill Siege Participants 17 Recommendations 44 Conclusion 48 ACKNOWLEDGEMENTS This report was researched and written jointly by the research team at the Program on Extremism, including Lorenzo Vidino, Seamus Hughes, Alexander Meleagrou- Hitchens, Devorah Margolin, Bennett Clifford, Jon Lewis, Andrew Mines and Haroro Ingram. The authors wish to thank JJ MacNab for her invaluable feedback and edits on this report. This report was made possible by the Program’s team of Research Assistants—Ilana Krill, Angelina Maleska, Mia Pearsall, Daniel Stoffel, Diana Wallens, and Ye Bin Won—who provided crucial support with data collection, data verification, and final edits on the report. Finally, the authors thank Nicolò Scremin for designing this report, and Brendan Hurley and the George Washington University Department of Geography for creating the maps used in this report.
  • “Never Have I Seen Such a Charge”

    “Never Have I Seen Such a Charge”

    The Army of Northern Virginia in the Gettysburg Campaign “Never Have I Seen Such a Charge” Pender’s Light Division at Gettysburg, July 1 D. Scott Hartwig It was July 1 at Gettysburg and the battle west of town had been raging furiously since 1:30 p.m. By dint of only the hardest fighting troops of Major General Henry Heth’s and Major General Robert E. Rodes’s divisions had driven elements of the Union 1st Corps from their positions along McPherson’s Ridge, back to Seminary Ridge. Here, the bloodied Union regiments and batteries hastily organized a defense to meet the storm they all knew would soon break upon them. This was the last possible line of defense beyond the town and the high ground south of it. It had to be held as long as possible. To break this last line of Union resistance, Confederate Third Corps commander, Lieutenant General Ambrose P. Hill, committed his last reserve, the division of Major General Dorsey Pender. They were the famed Light Division of the Army of Northern Virginia, boasting a battle record from the Seven Days battles to Chancellorsville unsurpassed by any other division in the army. Arguably, it may have been the best division in Lee’s army. Certainly no organization of the army could claim more combat experience. Now, Hill would call upon his old division once more to make a desperate assault to secure victory. In many ways their charge upon Seminary Ridge would be symbolic of why the Army of Northern Virginia had enjoyed an unbroken string of victories through 1862 and 1863, and why they would meet defeat at Gettysburg.
  • China's Role in the Chemical and Biological Disarmament Regimes

    China's Role in the Chemical and Biological Disarmament Regimes

    ERIC CRODDY China’s Role in the Chemical and Biological Disarmament Regimes ERIC CRODDY Eric Croddy is a Senior Research Associate at the Chemical and Biological Weapons Nonproliferation Program, Center for Nonproliferation Studies, Monterey Institute of International Studies. He is the author of Chemical and Biological Warfare: A Comprehensive Survey for the Concerned Citizen (New York: Copernicus Books, 2001). odern China has been linked with the prolif- least—and with considerable diplomatic effort—China eration of nuclear, chemical, and missile weap- broadcasts its commitment to both the CWC and the Mons technology to states of proliferation con- BWC. cern, and its compliance with arms control and disarma- Few unclassified publications analyze the role that CBW ment is seen as key to the effectiveness of weapons of have played in Chinese military strategy, nor is much in- 1 mass destruction (WMD) nonproliferation efforts. In this formation available on Beijing’s approach to negotiating context, the answer to Gerald Segal’s question, “Does CBW disarmament treaties. This is not surprising: China 2 China really matter?” is most definitely, “Yes.” In the is an extremely difficult subject for study where sensitive realm of chemical and biological weapons (CBW), military matters are concerned. A 1998 report by Dr. Bates Beijing’s role is closely linked to its view of the multilat- Gill, Case Study 6: People’s Republic of China, published eral disarmament regimes for CBW, namely the Chemi- by the Chemical and Biological Arms Control Institute, cal Weapons Convention (CWC) and the Biological and was the first to seriously address the issue of China and Toxin Weapons Convention (BWC), and of related mul- CBW proliferation.
  • Bombard Bombard Cavalry Charge Cavalry Charge

    Bombard Bombard Cavalry Charge Cavalry Charge

    BOMBARD BOMBARD CAVALRY CHARGE CAVALRY CHARGE Issue an order to 4 or fewer Issue an order to 4 or fewer Issue an order to 4 or fewer Issue an order to 4 or fewer CAVALRY units. Ordered cavalry CAVALRY units. Ordered cavalry units battle with 1 additional die units battle with 1 additional die ARTILLERY units. An order unit ARTILLERY units. An order unit may move up to 3 hexes, but may may move up to 3 hexes, but may the entire turn. Heavy cavalry units the entire turn. Heavy cavalry units not battle or may battle with 2 not battle or may battle with 2 may move 3 hexes and still battle. may move 3 hexes and still battle. additional dice. Guard artillery, additional dice. Guard artillery, Guard cavalry, when ordered, battle Guard cavalry, when ordered, battle when ordered, battle with 3 when ordered, battle with 3 with 2 additional dice. Horse with 2 additional dice. Horse additional dice. If you do not have additional dice. If you do not have artillery units may also be ordered. artillery units may also be ordered. If you do not have any cavalry or If you do not have any cavalry or any artillery units, issue an order to any artillery units, issue an order to 1 unit of your choice. 1 unit of your choice. horse artillery units, issue an order horse artillery units, issue an order to 1 unit of your choice. to 1 unit of your choice. COUNTER-ATTACK COUNTER-ATTACK ELAN CAVALRY CHARGE Issue an order to 4 or fewer Issue the same order card that your Issue the same order card that your Roll 1 battle die for each CAVALRY units.
  • Notes on Charge - BAYONET

    Notes on Charge - BAYONET

    Notes on Charge - BAYONET Written by Dom Dal Bello 1. Charge-Bayonet - Reenacting Practice It is a common practice in some reenacting companies that during a Charge, the rear rank comes to Right Shoulder Shift while the front rank comes to Charge Bayonet. Why this is the case is a bit of a mystery, as no where is it prescribed in the manuals. In both Hardee's and Casey's Infantry Tactics, instructions for Charge Bayonet are only found in the "School of the Soldier;" neither manual gives any practical instruction for when a company or battalion is to actually Charge. Another questionable procedure on the reenacting battlefield is giving the command "Charge - Bayonet" when the unit is at a halt; this may be true when instructing the men, but makes no sense in "combat." In short, these procedures are questionable. 2. Charge-Bayonet - Theoretical Instruction The "School of the Soldier" (and higher schools), are just that, instructional manuals to give the officers and men the basic understanding of moving troops on the field and developing discipline. If and when the time comes for actual service, practical movements may be made using the drill that should ideally be second nature. This is where the military science becomes art. Since the "School of the Soldier" is instructional, Hardee teaches his recruits in one rank (Paras. 193-4); nothing is ever said of the rear rank in either of Hardee's two volumes. As for instructing the men in two or more ranks, Scott says: Charge - BAYONET. One time and two motions.