War Theory: the Evolution of War and Military Thought Syllabus Ay 19
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Department of Military Science 1
Department of Military Science 1 DEPARTMENT OF MILITARY SCIENCE Scholarships and Allowances Scholarships are available for two, three, or four years. Students enrolled in the Advanced Course receive a tax-free subsistence allowance each month. They also receive about $700 for attending a five-week Advanced Camp (between the junior and senior year). Total remuneration for the final two years is approximately $7,500. All uniforms and equipment are furnished at no cost to students. Military Science Extracurricular Activities In addition to ROTC classes, the Military Science Department offers unique opportunities in various activities. These activities are designed to create new and lasting friendships as well as to develop leadership skills. The extracurricular activities are: the Color Guard, Intramural Sports, and Ranger Challenge Team (the varsity sport of Cadet Command). For further information, contact the Military Science Department, Room 217, Gullickson Hall, or call 304-696-6450. Summer Training Opportunities In addition to the Leaders Training Course and the Leader Development and Assessment Course, ROTC offers other training opportunities to broaden experience and leadership. These include the Basic Airborne Course, Air Assault Course, Mountain Warfare, Northern Warfare, United Kingdom Officer Training Course, Cadet Troop Leadership Training, Drill Cadet Leadership Training, Army Science Board, Cadet Intern Program, Nurse Summer Training Program, JFK Special Warfare Internship Program and Cultural Leadership Program. Some of these programs are conducted outside of the continental United States and with foreign countries. All programs are competitive and require the approval of the Professor of Military Science. Some cadets may also elect to train with a local Army Reserve or National Guard unit, each with additional training opportunities and benefits. -
Deterring and Dissuading Nuclear Terrorism
Journal of Strategic Security Volume 5 Number 1 Volume 5, No. 1: Spring 2012 Article 6 Deterring and Dissuading Nuclear Terrorism John J. Klein ANSER, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 15-30 Recommended Citation Klein, John J.. "Deterring and Dissuading Nuclear Terrorism." Journal of Strategic Security 5, no. 1 (2012) : 15-30. DOI: http://dx.doi.org/10.5038/1944-0472.5.1.2 Available at: https://scholarcommons.usf.edu/jss/vol5/iss1/6 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Deterring and Dissuading Nuclear Terrorism Abstract While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack. -
Axis Blitzkrieg: Warsaw and Battle of Britain
Axis Blitzkrieg: Warsaw and Battle of Britain By Skyla Gabriel and Hannah Seidl Background on Axis Blitzkrieg ● A military strategy specifically designed to create disorganization in enemy forces by logical firepower and mobility of forces ● Limits civilian casualty and waste of fire power ● Developed in Germany 1918-1939 as a result of WW1 ● Used in Warsaw, Poland in 1939, then with eventually used in Belgium, the Netherlands, North Africa, and even against the Soviet Union Hitler’s Plan and “The Night Before” ● Due to the non-aggression pact with the Soviet Union, once the Polish state was divided up, Hitler would colonize the territory and only allow the “superior race” to live there and would enslave the natives. ● On August 31, 1939 Hitler ordered Nazi S.S. troops,wearing Polish officer uniforms, to sneak into Poland. ● The troops did minor damage to buildings and equipment. ● Left dead concentration camp prisoners in Polish uniforms ● This was meant to mar the start of the Polish Invasion when the bodies were found in the morning by Polish officers Initial stages ● Initially, one of Hitler’s first acts after coming to power was to sign a nonaggression pact (January 1934) with Poland in order to avoid a French- Polish alliance before Germany could rearm. ● Through 1935- March 1939 Germany slowly gained more power through rearmament (agreed to by both France and Britain), Germany then gained back the Rhineland through militarization, annexation of Austria, and finally at the Munich Conference they were given the Sudetenland. ● Once Czechoslovakia was dismembered Britain and France responded by essentially backing Poland and Hitler responded by signing a non-aggression with the Soviet Union in the summer of 1939 ● The German-Soviet pact agreed Poland be split between the two powers, the new pact allowed Germany to attack Poland without fear of Soviet intervention The Attack ● On September 1st, 1939 Germany invaded Warsaw, Poland ● Schleswig-Holstein, a German Battleship at 4:45am began to fire on the Polish garrison in Westerplatte Fort, Danzig. -
Deterrence Theory in the Cyber-Century Lessons from a State-Of-The-Art Literature Review
Working Paper Research Division EU/Europe Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century Lessons from a state-of-the-art literature review SWP Working Papers are online publications of SWP’s research divisions which have not been formally reviewed by the Institute. Ludwigkirchplatz 3−4 10719 Berlin Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org Working Paper RD EU/Europe, 2015/ 02, May 2015 [email protected] SWP Berlin Table of Contents List of Figures 1 List of Abbreviations 2 Introduction 3 In theory – Deterrence theory and cyberspace 4 Deterrence-by-retaliation and deterrence-by-denial 6 In practice – Suitability of cyber: lessons and implications 7 Key challenges: Credibility and capability to display and use force 7 How to deter? Deterrence-by-denial and deterrence-by- retaliation 9 Determining the type of defence 9 Adding offence to the equation 10 When and whom to deter? Immediate vs. general deterrence and the challenge of attribution 10 What to deter? Narrow vs. broad deterrence 12 For whom? Central vs. extended deterrence 13 Conclusion and outlook 14 Annex 16 Glossary 16 List of References 17 List of Figures Figure 1: Limits to retaliation in cyberspace .................. 9 Figure 2: A possible model of escalation ....................... 11 Figure 3: EEAS figure on a possible inter-ministry division of labour ................................................................. 15 Figure 4: Risk assessment -
On Strategy: a Primer Edited by Nathan K. Finney
Cover design by Dale E. Cordes, Army University Press On Strategy: A Primer Edited by Nathan K. Finney Combat Studies Institute Press Fort Leavenworth, Kansas An imprint of The Army University Press Library of Congress Cataloging-in-Publication Data Names: Finney, Nathan K., editor. | U.S. Army Combined Arms Cen- ter, issuing body. Title: On strategy : a primer / edited by Nathan K. Finney. Other titles: On strategy (U.S. Army Combined Arms Center) Description: Fort Leavenworth, Kansas : Combat Studies Institute Press, US Army Combined Arms Center, 2020. | “An imprint of The Army University Press.” | Includes bibliographical references. Identifiers: LCCN 2020020512 (print) | LCCN 2020020513 (ebook) | ISBN 9781940804811 (paperback) | ISBN 9781940804811 (Adobe PDF) Subjects: LCSH: Strategy. | Strategy--History. Classification: LCC U162 .O5 2020 (print) | LCC U162 (ebook) | DDC 355.02--dc23 | SUDOC D 110.2:ST 8. LC record available at https://lccn.loc.gov/2020020512. LC ebook record available at https://lccn.loc.gov/2020020513. 2020 Combat Studies Institute Press publications cover a wide variety of military topics. The views ex- pressed in this CSI Press publication are those of the author(s) and not necessarily those of the Depart- ment of the Army or the Department of Defense. A full list of digital CSI Press publications is available at https://www.armyu- press.army.mil/Books/combat-studies-institute. The seal of the Combat Studies Institute authenticates this document as an of- ficial publication of the CSI Press. It is prohibited to use the CSI’s official seal on any republication without the express written permission of the director. Editors Diane R. -
Law of Armed Conflict
Lesson 1 THE LAW OF ARMED CONFLICT Basic knowledge International Committee of the Red Cross Unit for Relations with Armed and Security Forces 19 Avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org Original: English – June 2002 INTRODUCTION TO THE LAW OF ARMED CONFLICT BASIC KNOWLEDGE LESSON 1 [ Slide 2] AIM [ Slide 3] The aim of this lesson is to introduce the topic to the class, covering the following main points: 1. Background: setting the scene. 2. The need for compliance. 3. How the law evolved and its main components. 4. When does the law apply? 5. The basic principles of the law. INTRODUCTION TO THE LAW OF ARMED CONFLICT 1. BACKGROUND: SETTING THE SCENE Today we begin a series of lectures on the law of armed conflict, which is also known as the law of war, international humanitarian law, or simply IHL. To begin, I’d like to take a guess at what you’re thinking right now. Some of you are probably thinking that this is an ideal opportunity to catch up on some well-earned rest. “Thank goodness I’m not on the assault course or on manoeuvres. This is absolutely marvellous. I can switch off and let this instructor ramble on for 45 minutes. I know all about the Geneva Conventions anyway – the law is part of my culture and our military traditions. I really don't need to listen to all this legal ‘mumbo jumbo’.” The more sceptical and cynical among you might well be thinking along the lines of a very famous orator of ancient Rome – Cicero. -
Marie Von Clausewitz: the Omw an Behind the Making of on War, by Vanya Eftimova Bellinger John T
Naval War College Review Volume 69 Article 10 Number 3 Summer 2016 Marie von Clausewitz: The omW an behind the Making of On War, by Vanya Eftimova Bellinger John T. Kuehn Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Kuehn, John T. (2016) "Marie von Clausewitz: The omW an behind the Making of On War, by Vanya Eftimova Bellinger," Naval War College Review: Vol. 69 : No. 3 , Article 10. Available at: https://digital-commons.usnwc.edu/nwc-review/vol69/iss3/10 This Book Review is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. 146 NAVALKuehn: WAR COLLEGEMarie von REVIEW Clausewitz: The Woman behind the Making of On War, by V challenges in the Gulf of Guinea� Indeed, international cooperation� (4) Prevailing the book may be viewed as a compen- regional cooperative processes lack coor- dium of the existing legal regimes in the dination and have suffered several set- Gulf of Guinea� This legal landscape is backs� (5) International support for mar- important to understand as efforts pro- itime security cooperation in the Gulf ceed to combat maritime insecurity and of Guinea is inadequate, uncoordinated, enhance maritime governance through and in some cases driven by national in- cooperation� The section on emerging terests that affect its overall -
What About Peacekeepers? Deterring Attacks Against Humanitarian Workers
What about Peacekeepers? Deterring Attacks against Humanitarian Workers Marcellina Priadi Uppsala University Department of Peace & Conflict Research Master Thesis Summer 2017 Word Count: 18,208 Abstract This thesis seeks to understand the phenomenon of attacks against humanitarian workers by asking: why are humanitarian workers attacked in some contexts, but not in others? By exploring the effects of deterrence as a security strategy, this thesis investigates the direct link between causes of attacks against humanitarian workers and humanitarian security. It argues that when humanitarian organisations involve peacekeepers directly in their humanitarian relief activities, this is likely to lead to a decrease in attacks. This is because peacekeepers are armed and able to function as a capable and credible counterthreat against belligerents for humanitarian organisations. A game- like theoretic model of the decision-making sequence leading up to attacks in the humanitarian space is applied to illustrate this. The theoretical argument is tested quantitatively on freshly collated data on peacekeeping activities using a negative binomial count model. Unexpectedly however, the results reveal a contradictory relationship to the hypothesis. Directly involving peacekeepers in humanitarian relief activities is associated with an increase in attacks against humanitarian workers. The surprising results are found to be significant and robust overall. 2 Acknowledgements I would like to take the opportunity to thank everyone that has assisted and supported me throughout this research process. To my classmates, for the camaraderie we have shared during this time and the immeasurable ways they have helped me to grow. To my teachers, who have challenged my thoughts and built the foundation for this thesis. -
Applying Traditional Military Principles to Cyber Warfare
2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1]. -
The Citadel, MA in Military History, CAAL, 05/15/2018 – Page 1 CAAL 05/15/2018 Agenda Item 5K
CAAL 05/15/2018 Agenda Item 5k New Program Proposal Master of Arts in Military History The Citadel Executive Summary The Citadel requests approval to offer a program leading to the Master of Arts in Military History, to be implemented in Fall 2019. The proposed program is to be offered through online instruction. The chart below outlines the stages of approval for the proposed program. The Advisory Committee on Academic Programs (ACAP) voted to recommend approval of the proposal. The full program proposal is attached. Stages of Date Comments Consideration Program Proposal 2/1/18 Not Applicable Received ACAP Consideration 3/29/18 The Citadel representatives discussed the need for the program, explaining that the program is combined with leadership theory and targets military officers. The College of Charleston representative noted The Citadel and the College of Charleston offer a joint master’s degree in History and the proposed program is separate from that program. Members also commented on the financial support chart and inquired whether it accurately presents the costs and sources of financing of the program. The Citadel representative agreed to revise the chart. Following remaining discussion about the proposal, ACAP members voted to recommend the program proposal. Staff transmitted remaining questions for additional clarity. Comments, questions, 4/3/18 Staff requested revisions to address the following questions as and suggestions from discussed at ACAP or transmitted afterward: CHE staff sent to the • Explain why CIP Code 290201 -
Getting the Joint Functions Right JFQ 94, 3Rd Quarter 2019 of U.S
2K12 Kub mobile surface-to-air missile system fires during multinational live-fire training exercise Shabla 19, in Shabla, Bulgaria, June 12, 2019 (U.S. Army/Thomas Mort) This article provides the first orga- Getting the Joint nizational history of the joint functions in order to better understand why dif- ferences persist in how this concept is implemented in the United States versus Functions Right its North Atlantic Treaty Organization (NATO) partners. Doing so allows us to By Thomas Crosbie better understand enduring challenges in interoperability and persistent cultural clashes within the Alliance. The history reveals that today’s joint functions are built n July 2017, the Chairman of the of Defense (DOD) thinking and around a core of four kinetic principles Joint Chiefs of Staff announced a practice.1 A 2018 article by Alexus G. (leadership or command and control [C2], special out-of-cycle revision to joint Grynkewich in this journal elaborated I maneuver, firepower, and protection), doctrine, adding information to the on why this matters to the national to which subsequent revisions have at- joint functions. The significance of security community.2 Nevertheless, tempted to add a range of “softer” military this policy change was highlighted despite these clear signals that DOD fields (intelligence, information, sustain- by the Secretary of Defense in a Sep- takes the joint functions seriously, and ment, and civil-military cooperation), tember 2017 endorsement, where he despite their centrality in military doc- sometimes successfully, sometimes not. stressed that inclusion in the joint trine, the joint functions remain little The history of the joint functions is functions signaled an “elevation” of understood by those who have not a history of overcoming the resistance information throughout Department served in an operational staff role. -
The Civilization of War Edited by Alessandro Dal Lago and Salvatore Palidda Conflict, Security and the Reshaping of Society the Civilization of War
Conflict, Security and the Reshaping of Society This book is an examination of the effect of contemporary wars (such as the ‘War on Terror’) on civil life at a global level. Contemporary literature on war is mainly devoted to recent changes in the theory and practice of warfare, particularly those in which terrorists or insurgents are involved (for example, the ‘revolution in military affairs’, ‘small wars’, and so on). On the other hand, today’s research on security is focused, among other themes, on the effects of the war on terrorism, and on civil liberties and social control. This volume connects these two fields of research, showing how ‘war’ and ‘security’ tend to exchange targets and forms of action as well as personnel (for instance, the spreading use of private contractors in wars and of military experts in the ‘struggle for security’) in modern society. This shows how, contrary to Clausewitz’s belief that war should be conceived of as a ‘continuation of politics by other means’, the opposite statement is also true: that politics, insofar as it concerns security, can be defined as the ‘continuation of war by other means’. This book will be of much interest to students of critical security studies, war and conflict studies, terrorism studies, sociology and international relations in general. Alessandro Dal Lago is Professor of Sociology of Culture and Communica- tion at the University of Genoa. Salvatore Palidda is Professor of Sociology in the Faculty of Education at the University of Genoa. Routledge studies in liberty and security Series editors: Didier Bigo, Elspeth Guild and R.B.J.