Doctrine Asymmetric Warfare

Total Page:16

File Type:pdf, Size:1020Kb

Doctrine Asymmetric Warfare Doctrine for Asymmetric Warfare NY DISCUSSION of doctrine and asym- A metry must begin by acknowledging the ten- Tactics are employed against an sion inherent between the role of doctrine and the asymmetric opponent in the course of combat, nature of asymmetry in warfare. Doctrine should but there can be no set of tactics checklists succinctly express the collective wisdom about how for asymmetric warfare, since each application U.S. Armed Forces conduct military operations. In is unique. Tactics are whatever we do against 1923, historian J.F.C. Fuller wrote that “the central an asymmetric opponent when we arrange idea of an army is known as its doctrine, which to forces to counter that opponent. be sound must be principles of war, and which to be effective must be elastic enough to admit of mu- antidotes, and the ability to attack or defeat the tation in accordance with change in circumstance. enemy’s delivery means, civil support, and so on. In its ultimate relationship to the human understand- Such preparation serves to deter the use of biologi- ing this central idea or doctrine is nothing else than cal weapons, because the opponent’s original asym- common sense—that is, action adapted to circum- 1 metric advantage has been reduced. stance.” Unfortunately, uncertainty is inseparable from the While asymmetric warfare encompasses a wide nature of warfare, and asymmetry increases uncer- scope of theory, experience, conjecture, and defini- tainty. Those who expect doctrine and tactics, tech- tion, the implicit premise is that asymmetric warfare niques, and procedures (TTP) to provide solutions deals with unknowns, with surprise in terms of ends, and checklists for action are soon disabused of that ways, and means. The more dissimilar the opponent, notion during actual operations. If and when the en- the more difficult it is to anticipate his actions. If we emy surprises us with a capability, our response is knew in advance how an opponent planned to ex- necessarily ad hoc and less effective. Depending on ploit our dissimilarities, we could develop specific our preconceptions and ability to adapt, the advan- doctrine to counter his actions. Against asymmetric tage an opponent enjoys might persist. Doctrine must opponents, doctrine should provide a way to think prepare the military force with a mindset to deal with about asymmetry and an operational philosophy that uncertainty quickly and effectively. The Japanese would take asymmetry fully into account. navy’s Long Lance torpedo illustrates our failure to One way to look at asymmetric warfare is to see deal with an asymmetric threat. it as a classic action-reaction-counteraction cycle. Our enemies study our doctrine and try to counter Japan’s Long Lance Torpedo it. Any competent enemy will do the unexpected, if In the years between World War I and World he believes it will work. When we understand the War II, the U.S. and Japanese navies pursued dif- asymmetry, we counter it, and so forth. For example, ferent technical and tactical solutions to naval sur- if a potential opponent has biological weapons and face combat. The U.S. Navy focused on very long- the United States does not, our preparation occurs range daylight gunnery, supported by seaplane across a technological, doctrinal, and operational spotters and sophisticated analog computers.2 For the range in terms of force protection, development of computers to calculate a firing solution, the firing 18 July -August 2003 l MILITARY REVIEW ASYMMETRIC WARFARE ship had to maintain a steady course to allow the ing the term doctrine are referring to the whole body computer to “settle down” and provide accurate data of doctrine and fail to separate out each com- to the turrets. ponent’s specific role. Defining each component’s The Japanese Navy developed the Type 93 Long role is a seemingly minor distinction, but it is impor- Lance torpedo that carried a large warhead and tant to understanding since each component plays could travel 20,000 yards or more at speeds of up 3 to 45 knots. The Japanese had an ideal fire-and- Examples of asymmetry and adaptation forget system. In consequence, the Japanese trained to it can be found in insurgency warfare and the to fight at night, with radically maneuvering destroy- development of counterinsurgency forces and ers and cruisers that fired torpedoes. doctrine. At a tactical level, we can see the For more than 2 years after the U.S. Navy en- effects of the machinegun, accurate indirect countered the Long Lance in early 1942, it did not artillery, and barbed wire during World War I. appreciate the weapon’s capabilities. The two navies We can study the development of storm tactics had proceeded down different asymmetric paths, and and the armor with which to counter them. U.S. torpedo development had many shortcomings. We can analyze U.S. air attacks on the Serbs in U.S. torpedoes were quite slow, carried a smaller Kosovo and appreciate the Serbs’ deception warhead, had a range of less than 10,000 yards, and and camouflage tactics. often failed to explode even when striking a target. In consequence, the U.S. Navy projected its poor capabilities onto those of the opponent’s and refused a different part in how the military operates. More to believe that the Japanese could deploy a superior germane is that each component has a slightly torpedo. Eventually, U.S. air power, radar-directed different role with respect to asymmetry, and gunfire, and other tactical adaptations restored some each has a different cyclic rate in terms of its de- balance, but throughout the war, the Japanese tor- velopment and useful life. pedo baffled Navy planners. The U.S. Navy suf- Effective doctrine explains how we expect to fered an asymmetric technological and tactical fight and operate based on past experience and surprise. Because we did not anticipate the a best guess of what lies ahead. Doctrine— weapon and, indeed, could not accept that the Japa- l Provides the link between research, theory, nese had it, we had no easy answers, and it took history, experimentation, and practice. years to adapt. l Encapsulates a body of knowledge and ex- perience so it can be applied. Developing U.S. Doctrine l Provides common understanding and a com- To get beyond the tension inherent between mon language, which allows us to articulate clearly asymmetry and doctrine, our focus is on two obser- and succinctly what Army forces should accomplish. vations about asymmetry that to many of our po- The narrow definition of doctrine is “fundamen- tential opponents we are highly relevant to the de- tal principles by which the military forces or elements velopment of U.S. doctrine. The first is the thereof guide their actions in support of national ob- requirement to understand that to many of our po- jectives. It is authoritative but requires judgment in tential opponents we appear to be as asymmetric application.”4 To distinguish between the broad con- as they appear to be to us. To the al-Qaeda fighter, cept, including all four components, and the more cowering in a cave in a remote part of Afghanistan, narrow definition, we can italicize the latter. fuel air explosives, dropped with deadly precision As Fuller noted, Army doctrine should provide an from aircraft miles away and thousands of feet up, operational concept, a philosophy of how the Army directed by laser designators wielded by highly operates.5 In doing so, doctrine must reconcile op- trained and stealthy special operation forces (SOF), erational requirements with the force’s perceived is as asymmetric to him as his tactics are to us. The strengths. Armies operate best when capitalizing on second point is that doctrine cannot predict the na- demonstrated capabilities and asymmetric strengths. ture and form of asymmetric conflicts, but it can History contains many examples of military failure forecast the necessary traits and body of concep- occasioned by attempts to match an enemy’s style tual knowledge necessary to cope with a chaotic of warfare despite friendly forces being ill-suited to asymmetric operational environment. the challenge. To understand the role of doctrine, we must dis- Tactics. Tactics deals with how units are em- tinguish between doctrine and TTP. Most people us- ployed during combat.6 The actual application of MILITARY REVIEW l July -August 2003 19 Tactics vary constantly with the situa- A Japanese Type 93 torpedo tion. There is no playbook of tactical so- fired from a destroyer blew away the bow of the heavy lutions; the tactics manual only offers a cruiser USS Minneapolis on menu from which to choose. Tactics are 30 November 1942. Only the crew’s high level of training employed against an asymmetric oppo- kept the ship afloat. nent in the course of combat, but there can be no set of tactics checklists for asymmetric warfare, since each applica- tion is unique. Tactics are whatever we do against an asymmetric opponent when we arrange forces to counter that oppo- nent. What differentiates tactics against an asymmetric opponent is that we might not have ever used that particular com- bination of options before, or we might have to incorporate new and novel op- tions to counter asymmetry. When con- fronted by a situation, leaders must choose from a variety of possible solu- tions and adapt their solution to circum- stances at the point of engagement. Techniques and procedures. Tech- niques are the general, detailed methods US Navy The Japanese Navy developed the Type 93 troops and commanders use to perform Long Lance torpedo that carried a large warhead and assigned missions and functions, specifi- could travel 20,000 yards or more at speeds of up to 45 cally methods of using equipment and knots.
Recommended publications
  • How Technology Impacts Doctrine in Asymmetric Warfare
    0 How Technology Impacts Doctrine in Asymmetric Warfare Jeremiah Rozman Northfield Vermont Bachelors of Arts, University of Vermont, 2014 A Thesis presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Master of Arts Department of Foreign Affairs University of Virginia May, 2016 1 Abstract How does technology impact military doctrine, and how does this in turn impact political support for offensive, preventative or preemptive military action?1 I study defensive weapons systems, specifically focusing on missile defense in the theoretical context of technology and defense-based strategies as a whole. Through the study of Israel’s use of Iron Dome, I aim to demonstrate that technology can be an exogenous factor affecting military doctrine. Through careful case study analysis, I demonstrate that operationally successful defensive technologies can lead to the adoption of a defensive military doctrine by decreasing the political cost of inaction to the extent that allowing attrition becomes politically less costly than launching an offensive. Introduction A comparison of Israel’s two recent wars in Gaza, Operation Cast Lead in 2008/9 and Operation Protective Edge in 2014, indicates that the tactical success of Iron Dome, as a defensive military technology, can effect a change in military doctrine. The goal of this study is to demonstrate the effect of an unexpectedly successful defensive military technology on military doctrine, an effect which leads to prioritizing defense, allowing attrition, and moving away from a long-standing offense-based doctrine, specifically when dealing with asymmetric conflict. This study focuses on Israel, specifically in the Gaza theater of conflict and not in the Northern theater of conflict where Israel’s adversary, Hezbollah is 1 Preemptive war is defined as actor A launching a first strike in order to gain advantage in a situation where an attack by actor B is anticipated to be imminent.
    [Show full text]
  • Asymmetric Warfare - the Siege of Fallujah
    ASYMMETRIC WARFARE - THE SIEGE OF FALLUJAH Csér Orsolya Abstract: Asymmetric warfare is a tactical process based on policy objectives which can be used to force our will upon the enemy. The non-traditional, inexpensive actions involving material damage and human casualties (such as terrorism, deployment of weapons of mass destruction, threat of using them, information warfare); guerrilla- and partisan-type raids implemented with simple tools and techniques are considered its basic advantages. All these are usually the weapons of the party fighting in the occupied territories (eg. bombings, suicide attacks, actions against logistics, command posts, attacks against officers, command staff, destruction of supply routes and transportation routes). The detection of these weapons and the psychological preparation of the soldiers is very difficult, because the offenders do not comply with the conventions of warfare. The siege of Fallujah in Iraq, which wrote itself into the history books as one of the most infamous and serious insurgencies and in which the media and propaganda played a major role, is regarded as an example of asymmetric warfare. Keywords: asymmetry, insurgency, guerrilla, civilians, civilian victim, propaganda, military gain 1. Introduction Asymmetry doesn't mean anything other than the lack of symmetry between the belligerents, partially or wholly. Asymmetric warfare is: "A warfare for the sake of precisely outlined political aims, often based on ideological, religious, ethnic community of several organizations, implementing military and non-military operations, tactics and techniques building upon direct and indirect effects and intensifying each other's effects, endangering different dimensions of security, mainly tactical procedures, with whose effect altogether we may force our will upon the enemy." All of this is such an activity that can be connected to asymmetric challenges, when the executors - in most cases not even sparing their own lives - execute military actions, and is usually done against a belligerent on a higher technological level.
    [Show full text]
  • Asymmetric Warfare Thematic Bibliography No
    Public Diplomacy Division Room Nb123 B-1110 Brussels Belgium Tel.: +32(0)2 707 4414 / 5033 (A/V) Fax: +32(0)2 707 4249 E-mail: [email protected] Internet: http://www.nato.int/library Asymmetric Warfare Thematic Bibliography no. 10/10 Les guerres asymétriques Bibliographie thématique no. 10/10 Division de la Diplomatie Publique Bureau Nb123 B-1110 Bruxelles Belgique Tél.: +32(0)2 707 4414 / 5033 (A/V) Fax: +32(0)2 707 4249 E-mail: [email protected] Internet: http://www.nato.int/library How to borrow items from the list below : As a member of the NATO HQ staff you can borrow books (Type: M) for one month, journals (Type: ART) and reference works (Type: REF) for one week. Individuals not belonging to NATO staff can borrow books through their local library via the interlibrary loan system. How to obtain the Multimedia Library publications : All Library publications are available both on the NATO Intranet and Internet websites. Comment emprunter les documents cités ci-dessous : En tant que membre du personnel de l'OTAN vous pouvez emprunter les livres (Type: M) pour un mois, les revues (Type: ART) et les ouvrages de référence (Type: REF) pour une semaine. Les personnes n'appartenant pas au personnel de l'OTAN peuvent s'adresser à leur bibliothèque locale et emprunter les livres via le système de prêt interbibliothèques. Comment obtenir les publications de la Bibliothèque multimédia : Toutes les publications de la Bibliothèque sont disponibles sur les sites Intranet et Internet de l’OTAN. 2 Books Livres* 2010 355.1 /00058 Moral Dilemmas of Modern War : Torture, Assassination, and Blackmail in an Age of Asymmetric Conflict - Cambridge, UK : Cambridge University Press.
    [Show full text]
  • Redalyc.Asymmetric Warfare: a State Vs Non-State Conflict
    OASIS ISSN: 1657-7558 [email protected] Universidad Externado de Colombia Colombia Lele, Ajey Asymmetric Warfare: A State vs Non-State Conflict OASIS, núm. 20, julio-diciembre, 2014, pp. 97-111 Universidad Externado de Colombia Bogotá, Colombia Available in: http://www.redalyc.org/articulo.oa?id=53163822007 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Asymmetric Warfare: A State vs Non-State Conflict* Ajey Lele, Ph.D.1 Research Fellow at Institute for Defence Studies and Analyses (IDSA), India [email protected] ABSTRACT Key words: Asymmetric, warfare, strate- gy, non-state actor, terrorism. Asymmetry in warfare is not a new phenome- non. Historically, it has been observed that on various occasions there has been a marked Guerras asimétricas: difference in the relative military power and un conflicto entre Estado strategy of the warring states. However, in the post 9/11 era, it has been observed that the versus actores no estatales character and nature of war itself is changing particularly amid the wars between state and RESUMEN non-state actors. The usage of unconventio- nal tools and tactics, be it guerrilla warfare La asimetría en la guerra no es un fenómeno or terrorism or irregular warfare or any other nuevo. Históricamente, se ha observado que forms are becoming more synonymous with en varias ocasiones ha existido una marcada non-state entities. All this is leading to a com- diferencia en el relativo poder militar y estra- position of warfare in which a non-state actor tégico de Estados en guerra.
    [Show full text]
  • Irregular Warfare
    THEMATIC BIBLIOGRAPHIES NO. 6/2009 IRREGULAR WARFARE LA GUERRE IRRÉGULIÈRE Bibliographies thématiques No. 6/2009 · To contact us : · NATO Library Public Diplomacy Division Room Nb123 1110 Brussels Belgium Tel. : 32.2.707.44.14 Fax : 32.2.707.42.49 E-mail : [email protected] · Intranet : http://hqweb.hq.nato.int/oip/library/ · Internet : http://www.nato.int/library · How to borrow items from the list below : As a member of the NATO HQ staff you can borrow books (Type: M) for one month, journals (Type: ART) and reference works (Type: REF) for one week. Individuals not belonging to NATO staff can borrow books through their local library via the interlibrary loan system. · How to obtain the Library publications : All Library publications are available both on the NATO Intranet and Internet websites. -------------------------------------------------------------------------------------------------------------------------------------------- · Pour nous contacter : · Bibliothèque de l'OTAN Division de la Diplomatie Publique Bureau Nb123 1110 Bruxelles Belgique Tél. : 32.2.707.44.14 Télécopieur : 32.2.707.42.49 E-mail : [email protected] · Intranet : http://hqweb.hq.nato.int/oip/library/ · Internet : http://www.nato.int/library · Comment emprunter les documents cités ci-dessous : En tant que membre du personnel de l'OTAN vous pouvez emprunter les livres (Type: M) pour un mois, les revues (Type: ART) et les ouvrages de référence (Type: REF) pour une semaine. Les personnes n'appartenant pas au personnel d l'OTAN peuvent s'adresser à leur bibliothèque locale et emprunter les livres via le système de prêt interbibliothèques. · Comment obtenir les publications de la Bibliothèque : Toutes les publications de la Bibliothèque sont disponibles sur les sites Intranet et Internet de l’OTAN.
    [Show full text]
  • AFDD 2-3.1 Foreign Internal Defense
    FOREIGN INTERNAL DEFENSE Air Force Doctrine Document 3-22 15 September 2007 Interim Change 2 (Last Review), 1 November 2011 This document complements related discussion found in Joint Publication 3-22, Foreign Internal Defense. BY ORDER OF THE AIR FORCE DOCTRINE DOCUMENT 3-22 SECRETARY OF THE AIR FORCE 15 SEPTEMBER 2007 INCORPORATING INTERIM CHANGE 2, 1 NOVEMBER 2011 SUMMARY OF CHANGES The Air Force Doctrine Working Group has reviewed this document and recommended that it remains valid and will again be reviewed no later than September 2012. AFDD numbering has also been changed to correspond with the joint doctrine publication numbering architecture. AFDD titles and content remain unchanged until updated in the next full revision. A margin bar indicates newly revised material. Old Number New Number Title AFDD 2-1 changed to AFDD 3-1 Air Warfare AFDD 2-1.1 changed to AFDD 3-01 Counterair Operations AFDD 2-1.2 changed to AFDD 3-70 Strategic Attack AFDD 2-1.3 changed to AFDD 3-03 Counterland Operations AFDD 2-1.4 changed to AFDD 3-04 Countersea Operations AFDD 2-1.6 changed to AFDD 3-50 Personnel Recovery Operations AFDD 2-1.7 changed to AFDD 3-52 Airspace Control AFDD 2-1.8 changed to AFDD 3-40 Counter-CBRN AFDD 2-1.9 changed to AFDD 3-60 Targeting AFDD 2-10 changed to AFDD 3-27 Homeland Operations AFDD 2-12 changed to AFDD 3-72 Nuclear Operations AFDD 2-2 changed to AFDD 3-14 Space Operations AFDD 2-2.1 changed to AFDD 3-14.1 Counterspace Operations AFDD 2-3 changed to AFDD 3-24 Irregular Warfare AFDD 2-3.1 changed to AFDD 3-22 Foreign
    [Show full text]
  • Counterinsurgency Law: New Directions in Asymmetric Warfare Edited by William A
    International Review of the Red Cross (2013), 95 (891/892), 763–767. Multinational operations and the law doi:10.1017/S1816383114000149 BOOK REVIEW Counterinsurgency Law: New Directions in Asymmetric Warfare Edited by William A. Banks* Book review by R. James Orr, Dean of the School of Criminal Justice and Social Sciences of Tiffin University. Dean Orr is a retired US Navy judge advocate specialising in international and operational law and served as deputy legal adviser to NATO Headquarters, Supreme Allied Commander Transformation from 2004 to 2008. As the active engagement of US and North Atlantic Treaty Organisation (NATO) troops in the conflict in Afghanistan winds down, the challenges of that conflict, and the legacy of challenges of the conflict in Iraq, continue to resonate in the policy discussions within governments and in academic literature. Throughout the first decade of the twenty-first century, legal literature has reflected an effort to adapt to what has often been characterised as a new era of conflict.1 Counterinsurgency Law: New Directions in Asymmetric Warfare, edited by Professor William Banks, is but one of the latest contributions to this literature. The second publication of collected essays produced under the aegis of Syracuse University’s Institute for National Security and Counter-Terrorism,2 the book provides a collection of well-researched and well-supported papers that serve the legal community. Both publications propose practical analytic approaches intended to help decision-makers and practitioners, as well as scholars, deal with an extremely * Published by Oxford University Press USA, 2013. The views expressed here are those of the book reviewer alone and not of the International Committee of the Red Cross.
    [Show full text]
  • Examining the Suicide Terror Movement in Afghanistan Matthew Dearing1
    The Culture & Conflict Review Vol. 2, No. 3, Summer 2008 Examining the Suicide Terror Movement in Afghanistan Matthew Dearing1 “When you do not have guns or bomber planes then your body is the only weapon that you use to resist people killing your families.”2 What is behind the surge of Improvised Explosive Devices (IED) and suicide attacks in Afghanistan? Suicide attacks in particular are a recent phenomenon in Afghanistan, increasing by 42 percent from 2006 to 2007.3 This article will examine some of the factors behind the increasing use of suicide and IED attacks as tactics of unconventional warfare in Afghanistan. It will analyze the strategic environment in which these types of operations are used and provide some policy recommendations for countering future IED attacks. It is important to understand that unconventional warfare is a “strategy of necessity” for the weaker side in an insurgency.4 As an asymmetric warfare tactic, suicide terrorism provides incentives for insurgents. In Afghanistan, IED and suicide missions are founded upon three fundamental aims – to compel the United States and ISAF to leave the perceived homeland of Pashtuns, to undermine the legitimacy of the U.S. backed government in Kabul, and to create a desperate environment that provides little alternative but to join the suicide jihad movement. While current evidence shows the Taliban have been only slightly successful in changing perceptions, the momentum could easily shift to their advantage. Current Events & Trends Recent attacks have been the most violent since U.S. operations began in 2001. On February 17, 2008, more than 100 Afghans were killed when a suicide bomber detonated his explosives vest at a dog-fighting match, targeting the chief 1 Matthew Dearing is a Research Associate with the Program for Culture & Conflict Studies.
    [Show full text]
  • The New World Politics
    The New World Politics Research Project “Is Terrorism a Legitimate Response to Asymmetric Warfare?” by Peita Davis Due: 11th November, 2004 1 Is Terrorism a Legitimate Response to Asymmetric Warfare? Terrorism: the new global threat. Just like fascism and communism before it, terrorism has gripped the world population with fear. The West is so spellbound with ‘The War on Terror’ that people see terrorists in every airport, every café and in every mosque. But what exactly is it that we fear? Is it that terrorism can strike at any time, any place? Or is it that we fear someone who does not play by the rules? “Terrorists” and “terrorist acts” get a great deal of media coverage today, but what do we know of their situation? By branding them terrorists do we immediately disregard all claim to legitimacy they might have? Many groups that we identify as terrorists are fighting against a more powerful enemy with military superiority and greater political might. In these circumstances, is it fair for the weaker side to use unorthodox methods to try and balance the scales? By analysing the Palestinian/Israeli conflict and the Beslan hostage crisis in Russia, this paper will determine whether terrorism is a legitimate response to asymmetric warfare. The complex nature of this topic requires a clear understanding of the terms that will be used. To establish the characteristics of a terrorist, terrorism must be defined as “the deliberate use of violence or the threat of such, directed upon civilians in order to achieve political objectives” (Kapitan in Sterba, 2003: 48).
    [Show full text]
  • XVII Asymmetric Warfare
    Color profile: Disabled Composite Default screen XVII Asymmetric Warfare: How to Respond? Wolff Heintschel von Heinegg* Introduction emands for a reform of the law of armed conflict are often justified by Dclaiming that the “novel” phenomenon of asymmetric warfare has proven the inadequacy of that body of law. Allegedly, the law of armed conflict is charac- terized by a post-Westphalian approach, that is, its underlying concept is one of symmetric warfare between belligerents that will abide by its rules only because they expect their opponent to also abide (the principle of reciprocity). In asymmet- ric warfare reciprocity is said to have become obsolete and the allegedly “new” threats brought about by that “novel” phenomenon call for an adaptation of the law of armed conflict. It will be shown in this article that asymmetric warfare is far from being unprec- edented, and that either the law of armed conflict has been adapted to address past forms of asymmetric warfare or, in other instances, adaptation has been unneces- sary despite the asymmetries. Accordingly, the calls for “new” law, if not un- founded, are, at a minimum, premature. It is conceded, however, that it has become increasingly difficult to cope with certain forms of asymmetry; therefore it is of the utmost importance to develop strategies that enable States and their armed forces to adequately respond to asymmetric warfare. Finally, this article will focus on situations of armed conflict, whether of an inter- national or of a non-international character. Cross-border—or so-called spillover— * Professor of Public International Law at the Europa-Universität Viadrina in Frankfurt (Oder), Germany.
    [Show full text]
  • The Future of Urban Warfare in the Age of Megacities
    Études de l’Ifri Focus stratégique 88 THE FUTURE OF URBAN WARFARE IN THE AGE OF MEGACITIES Margarita KONAEV March 2019 Defense Research Unit The Institut français des relations internationales (Ifri) is a research center and a forum for debate on major international political and economic issues. Headed by Thierry de Montbrial since its founding in 1979, Ifri is a non- governmental, non-profit organization. As an independent think tank, Ifri sets its own research agenda, publishing its findings regularly for a global audience. Taking an interdisciplinary approach, Ifri brings together political and economic decision-makers, researchers and internationally renowned experts to animate its debate and research activities. The opinions expressed in this text are the responsibility of the author alone. ISBN: 979-10-373-0017-1 © All rights reserved, Ifri, 2019 How to cite this publication: Margarita Konaev, “The Future of Urban Warfare in the Age of Megacities”, Focus stratégique, No. 88, Ifri, March 2019. Ifri 27 rue de la Procession 75740 Paris Cedex 15 – FRANCE Tel. : +33 (0)1 40 61 60 00 – Fax : +33 (0)1 40 61 60 60 Email: [email protected] Website: ifri.org Focus stratégique Resolving today’s security problems requires an integrated approach. Analysis must be cross-cutting and consider the regional and global dimensions of problems, their technological and military aspects, as well as their media linkages and broader human consequences. It must also strive to understand the far reaching and complex dynamics of military transformation, international terrorism or post-conflict stabilization. Through the “Focus stratégique” series Ifri’s Security Studies Center aims to do so, offering new perspectives on the major international security issues in the world today.
    [Show full text]
  • Suicide Bombing Operations
    Issue No. 5 March 2007 Security & Terrorism Research Bulletin Suicide Bombing Operations During the last three years, the world has witnessed a notable upsurge in the number of suicide attacks, as well as in the geographical spread of this tactic. As the suicide bombers become more sophisticated and inventive in their tactics, the number of victims of suicide bombing attacks around the world has also increased significantly. Counter measures designed to combat suicide bombing have proven largely ineffective. This is now an acknow- ledged reality, and despite all national and international efforts, success in the field of preventive and preemptive measures has been limited. The research team at the Department of Security and Terrorism Studies at the GRC, which has produced this study, felt the need to analyze the suicide bombing phenomenon. As part of a Middle East-based think-tank, the researcher at the GRC is living and working within a regional environment that has become familiar with the terrible consequences of suicide operations. With this modest contribution, the researchers at the S&T department hope to add some knowledge that will help in understanding the suicide bombing phenomenon, and contribute to efforts of combating the same. Dr. Mustafa Alani Senior Advisor Director, Security and Terrorism Department Gulf Research Center w w w. g r c . a e TARGET THE GULF ������������������������������� �������������������������������������������������������������������������������������� �������������������������� �������������������������������������
    [Show full text]