Counterinsurgency Law: New Directions in Asymmetric Warfare Edited by William A
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How Technology Impacts Doctrine in Asymmetric Warfare
0 How Technology Impacts Doctrine in Asymmetric Warfare Jeremiah Rozman Northfield Vermont Bachelors of Arts, University of Vermont, 2014 A Thesis presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Master of Arts Department of Foreign Affairs University of Virginia May, 2016 1 Abstract How does technology impact military doctrine, and how does this in turn impact political support for offensive, preventative or preemptive military action?1 I study defensive weapons systems, specifically focusing on missile defense in the theoretical context of technology and defense-based strategies as a whole. Through the study of Israel’s use of Iron Dome, I aim to demonstrate that technology can be an exogenous factor affecting military doctrine. Through careful case study analysis, I demonstrate that operationally successful defensive technologies can lead to the adoption of a defensive military doctrine by decreasing the political cost of inaction to the extent that allowing attrition becomes politically less costly than launching an offensive. Introduction A comparison of Israel’s two recent wars in Gaza, Operation Cast Lead in 2008/9 and Operation Protective Edge in 2014, indicates that the tactical success of Iron Dome, as a defensive military technology, can effect a change in military doctrine. The goal of this study is to demonstrate the effect of an unexpectedly successful defensive military technology on military doctrine, an effect which leads to prioritizing defense, allowing attrition, and moving away from a long-standing offense-based doctrine, specifically when dealing with asymmetric conflict. This study focuses on Israel, specifically in the Gaza theater of conflict and not in the Northern theater of conflict where Israel’s adversary, Hezbollah is 1 Preemptive war is defined as actor A launching a first strike in order to gain advantage in a situation where an attack by actor B is anticipated to be imminent. -
Highlights of Recent RAND Research on Counterinsurgency
Highlights of Recent RAND Research on Counterinsurgency For more information, contact Shirley Ruhe, Director of Congressional Relations, at 703-413-1100, x5632 or [email protected], or Kurt Card, National Security Legislative Analyst, at 703-413-1100 x5259 or [email protected] As the leading research authority on counterinsurgency, the RAND Corporation has developed a wide selection of materials for policy makers. With multiple insurgencies operating in several theaters this research was developed to provide a historical, geographical, and functional understanding of past and present insurgencies and counterinsurgency operations. Social Science for Counterterrorism Putting the Pieces Together Darcy Noricks et al., 2009 This report from an interdisciplinary project to survey and integrate the scholarly social- science literature relevant to counterterrorism answers questions related to why some individuals become terrorists, how terrorists generate public support, how terrorist organizations make decisions, and why individuals disengage. A Stability Police Force for the United States Justification and Options for Creating U.S. Capabilities Terrence K. Kelly et al., 2009 Establishing security is the sine qua non of stability operations, since it is a prerequisite for reconstruction and development. Security requires a mix of military and police forces to deal with a range of threats from insurgents to criminal organizations. This research examines the creation of a high-end police force, which the authors call a Stability Police Force. 1 Underkill Scalable Capabilities for Military Operations amid Populations David C. Gompert et al., 2009 The battle for Gaza revealed an extremist strategy: hiding in cities and provoking attack to cause civilian deaths that can be blamed on the attacking forces. -
Asymmetric Warfare - the Siege of Fallujah
ASYMMETRIC WARFARE - THE SIEGE OF FALLUJAH Csér Orsolya Abstract: Asymmetric warfare is a tactical process based on policy objectives which can be used to force our will upon the enemy. The non-traditional, inexpensive actions involving material damage and human casualties (such as terrorism, deployment of weapons of mass destruction, threat of using them, information warfare); guerrilla- and partisan-type raids implemented with simple tools and techniques are considered its basic advantages. All these are usually the weapons of the party fighting in the occupied territories (eg. bombings, suicide attacks, actions against logistics, command posts, attacks against officers, command staff, destruction of supply routes and transportation routes). The detection of these weapons and the psychological preparation of the soldiers is very difficult, because the offenders do not comply with the conventions of warfare. The siege of Fallujah in Iraq, which wrote itself into the history books as one of the most infamous and serious insurgencies and in which the media and propaganda played a major role, is regarded as an example of asymmetric warfare. Keywords: asymmetry, insurgency, guerrilla, civilians, civilian victim, propaganda, military gain 1. Introduction Asymmetry doesn't mean anything other than the lack of symmetry between the belligerents, partially or wholly. Asymmetric warfare is: "A warfare for the sake of precisely outlined political aims, often based on ideological, religious, ethnic community of several organizations, implementing military and non-military operations, tactics and techniques building upon direct and indirect effects and intensifying each other's effects, endangering different dimensions of security, mainly tactical procedures, with whose effect altogether we may force our will upon the enemy." All of this is such an activity that can be connected to asymmetric challenges, when the executors - in most cases not even sparing their own lives - execute military actions, and is usually done against a belligerent on a higher technological level. -
Counterinsurgency Operations
The Basics of Counterinsurgency By R. Scott Moore1 Abstract The study examines the basic characteristics of insurgencies and counterinsurgency campaigns conducted over the past century, strip away many of the prevailing assumptions. Based on detailed analysis of nearly sixty counterinsurgency campaigns, successful and unsuccessful, as well as the lessons learned by American and Coalition forces in Afghanistan and Iraq since 2001, the conclusions offer a historically grounded framework for thinking about counterinsurgency. While every conflict exhibited its own unique causes and conditions requiring tailored solutions, as a whole the many counterinsurgency campaigns exhibited fundamental characteristics that remained constant. If there were no immutable laws or empirical formulas for counterinsurgency, there existed certain basic principles and traits that marked and will continue to mark successful, and unsuccessful, outcomes. Introduction Recent operations in Afghanistan and Iraq have forcibly highlighted the need to reexamine how we fight irregular conflicts, and especially insurgencies to find a strategy to address these emerging threats. Religious extremism, ethnic intolerance, and socio- economic imbalances have given birth to fanatical movements demanding radical change. Insurgencies, and the terrorism that accompanies them, pose complex challenges threatening political and social stability and defying military attempts to suppress or defeat them. Unfortunately, if the conceptual confusion emanating from the many debates over these conflicts is any indication, we seem to have forgotten the past while attempting to reinvent the future. The lack of an integrated and multi-dimensional approach to these new threats too often leads to confusion and disjointed responses and acrimonious debates not only over what needs to be done, but who- military or civilian- should do it. -
The Strategic Paradox of Truly Autonomous Weapons
The strategic paradox of autonomous weapons ZIPAR Policy Brief February 2018 Marko Kovic ZIPAR About ZIPAR The Zurich Institute of Public Aairs Research is devoted to identifying and addressing the major challenges for humankind in the short-term, in the medium- term, and in the long-term future. ZIPAR is an independent nonprot think tank based in Zurich, Switzerland. Recommended citation Marko Kovic (2018): The strategic paradox of autonomous weapons systems. ZIPAR Policy Brief. Zurich, Switzerland. Copyright This document is licensed under a Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International license. You can freely distribute this document and reference it in other works. For any questions about copyright, feel free to contact the author ([email protected]). 2 The strategic paradox of autonomous weapons ZIPAR Policy Brief Abstract Progress in articial intelligence makes the technology increasingly relevant to military applications. In particular, autonomous weapons could be of great military use: Autonomous weapons could achieve goals more ef- fectively and more eciently than humans or human-operated weapons. In this policy brief, the potential impact of implementing autonomous weapons on the behavior and decision-making of the military is discussed. The most probable positive impact, greater adherence to humanitarian law on the battleeld, is outweighed by the most probable negative impact, a disruption of the military chain of command and the security risks that follow from that disruption. This creates a strategic paradox: Even though autonomous weapons could help the military achieve goals more eectively and more eciently, autonomous weapons would strategically undermine the military by disrupting the chain of command and by creating a great security risk. -
Applying Irregular Warfare Principles to Cyber Warfare
Soldier from 3/187th Infantry, 101st Airborne Division, out of Fort Campbell, Kentucky, sets up SATCOM to communicate further with key rear elements as part of search and attack mission in area of Narizah, Afghanistan, July 23, 2002 (U.S. Army/Todd M. Roy) Applying Irregular Warfare Principles to Cyber Warfare By Frank C. Sanchez, Weilun Lin, and Kent Korunka he cyberspace threat exists in a cyberspace and cyberspace threats that and can foresee, rapidly respond to, realm that does not conform to are initiated by faceless, borderless, and and counter cyberspace threats, the T the physical limits of land, sea, sometimes nationless enemies. These U.S. military’s strategy and approach to air, and space. Unlike these traditional enemies manifest in a domain neither cyberspace must adapt and incorporate domains, cyberspace fosters an unpre- confined nor governed by the tradi- unconventional approaches and hybrid dictable threat that can adjust, morph, tional norms and rules of war, which warfare into its operational capability. and reproduce without a national the broader military has no experience Despite its importance, the Nation’s identity or face.1 The challenge of the undertaking. To ensure the United leaders, strategists, and military planners military is to posture its approach to States maintains cyberspace dominance struggle to understand how cyberspace operations (CO) fit into national security as an instrument of national policy. A Commander Frank C. Sanchez, USN, is an Action Officer on the Joint Staff J32, Intelligence, significant shortcoming is due to the Surveillance, and Reconnaissance Operations. Major Weilun Lin, USAF, is Chief of the Central and leaders’ lack of experience and basic South Asia Branch, Joint Cyberspace Center, U.S. -
Asymmetric Warfare Thematic Bibliography No
Public Diplomacy Division Room Nb123 B-1110 Brussels Belgium Tel.: +32(0)2 707 4414 / 5033 (A/V) Fax: +32(0)2 707 4249 E-mail: [email protected] Internet: http://www.nato.int/library Asymmetric Warfare Thematic Bibliography no. 10/10 Les guerres asymétriques Bibliographie thématique no. 10/10 Division de la Diplomatie Publique Bureau Nb123 B-1110 Bruxelles Belgique Tél.: +32(0)2 707 4414 / 5033 (A/V) Fax: +32(0)2 707 4249 E-mail: [email protected] Internet: http://www.nato.int/library How to borrow items from the list below : As a member of the NATO HQ staff you can borrow books (Type: M) for one month, journals (Type: ART) and reference works (Type: REF) for one week. Individuals not belonging to NATO staff can borrow books through their local library via the interlibrary loan system. How to obtain the Multimedia Library publications : All Library publications are available both on the NATO Intranet and Internet websites. Comment emprunter les documents cités ci-dessous : En tant que membre du personnel de l'OTAN vous pouvez emprunter les livres (Type: M) pour un mois, les revues (Type: ART) et les ouvrages de référence (Type: REF) pour une semaine. Les personnes n'appartenant pas au personnel de l'OTAN peuvent s'adresser à leur bibliothèque locale et emprunter les livres via le système de prêt interbibliothèques. Comment obtenir les publications de la Bibliothèque multimédia : Toutes les publications de la Bibliothèque sont disponibles sur les sites Intranet et Internet de l’OTAN. 2 Books Livres* 2010 355.1 /00058 Moral Dilemmas of Modern War : Torture, Assassination, and Blackmail in an Age of Asymmetric Conflict - Cambridge, UK : Cambridge University Press. -
Redalyc.Asymmetric Warfare: a State Vs Non-State Conflict
OASIS ISSN: 1657-7558 [email protected] Universidad Externado de Colombia Colombia Lele, Ajey Asymmetric Warfare: A State vs Non-State Conflict OASIS, núm. 20, julio-diciembre, 2014, pp. 97-111 Universidad Externado de Colombia Bogotá, Colombia Available in: http://www.redalyc.org/articulo.oa?id=53163822007 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Asymmetric Warfare: A State vs Non-State Conflict* Ajey Lele, Ph.D.1 Research Fellow at Institute for Defence Studies and Analyses (IDSA), India [email protected] ABSTRACT Key words: Asymmetric, warfare, strate- gy, non-state actor, terrorism. Asymmetry in warfare is not a new phenome- non. Historically, it has been observed that on various occasions there has been a marked Guerras asimétricas: difference in the relative military power and un conflicto entre Estado strategy of the warring states. However, in the post 9/11 era, it has been observed that the versus actores no estatales character and nature of war itself is changing particularly amid the wars between state and RESUMEN non-state actors. The usage of unconventio- nal tools and tactics, be it guerrilla warfare La asimetría en la guerra no es un fenómeno or terrorism or irregular warfare or any other nuevo. Históricamente, se ha observado que forms are becoming more synonymous with en varias ocasiones ha existido una marcada non-state entities. All this is leading to a com- diferencia en el relativo poder militar y estra- position of warfare in which a non-state actor tégico de Estados en guerra. -
Irregular Warfare
THEMATIC BIBLIOGRAPHIES NO. 6/2009 IRREGULAR WARFARE LA GUERRE IRRÉGULIÈRE Bibliographies thématiques No. 6/2009 · To contact us : · NATO Library Public Diplomacy Division Room Nb123 1110 Brussels Belgium Tel. : 32.2.707.44.14 Fax : 32.2.707.42.49 E-mail : [email protected] · Intranet : http://hqweb.hq.nato.int/oip/library/ · Internet : http://www.nato.int/library · How to borrow items from the list below : As a member of the NATO HQ staff you can borrow books (Type: M) for one month, journals (Type: ART) and reference works (Type: REF) for one week. Individuals not belonging to NATO staff can borrow books through their local library via the interlibrary loan system. · How to obtain the Library publications : All Library publications are available both on the NATO Intranet and Internet websites. -------------------------------------------------------------------------------------------------------------------------------------------- · Pour nous contacter : · Bibliothèque de l'OTAN Division de la Diplomatie Publique Bureau Nb123 1110 Bruxelles Belgique Tél. : 32.2.707.44.14 Télécopieur : 32.2.707.42.49 E-mail : [email protected] · Intranet : http://hqweb.hq.nato.int/oip/library/ · Internet : http://www.nato.int/library · Comment emprunter les documents cités ci-dessous : En tant que membre du personnel de l'OTAN vous pouvez emprunter les livres (Type: M) pour un mois, les revues (Type: ART) et les ouvrages de référence (Type: REF) pour une semaine. Les personnes n'appartenant pas au personnel d l'OTAN peuvent s'adresser à leur bibliothèque locale et emprunter les livres via le système de prêt interbibliothèques. · Comment obtenir les publications de la Bibliothèque : Toutes les publications de la Bibliothèque sont disponibles sur les sites Intranet et Internet de l’OTAN. -
AFDD 2-3.1 Foreign Internal Defense
FOREIGN INTERNAL DEFENSE Air Force Doctrine Document 3-22 15 September 2007 Interim Change 2 (Last Review), 1 November 2011 This document complements related discussion found in Joint Publication 3-22, Foreign Internal Defense. BY ORDER OF THE AIR FORCE DOCTRINE DOCUMENT 3-22 SECRETARY OF THE AIR FORCE 15 SEPTEMBER 2007 INCORPORATING INTERIM CHANGE 2, 1 NOVEMBER 2011 SUMMARY OF CHANGES The Air Force Doctrine Working Group has reviewed this document and recommended that it remains valid and will again be reviewed no later than September 2012. AFDD numbering has also been changed to correspond with the joint doctrine publication numbering architecture. AFDD titles and content remain unchanged until updated in the next full revision. A margin bar indicates newly revised material. Old Number New Number Title AFDD 2-1 changed to AFDD 3-1 Air Warfare AFDD 2-1.1 changed to AFDD 3-01 Counterair Operations AFDD 2-1.2 changed to AFDD 3-70 Strategic Attack AFDD 2-1.3 changed to AFDD 3-03 Counterland Operations AFDD 2-1.4 changed to AFDD 3-04 Countersea Operations AFDD 2-1.6 changed to AFDD 3-50 Personnel Recovery Operations AFDD 2-1.7 changed to AFDD 3-52 Airspace Control AFDD 2-1.8 changed to AFDD 3-40 Counter-CBRN AFDD 2-1.9 changed to AFDD 3-60 Targeting AFDD 2-10 changed to AFDD 3-27 Homeland Operations AFDD 2-12 changed to AFDD 3-72 Nuclear Operations AFDD 2-2 changed to AFDD 3-14 Space Operations AFDD 2-2.1 changed to AFDD 3-14.1 Counterspace Operations AFDD 2-3 changed to AFDD 3-24 Irregular Warfare AFDD 2-3.1 changed to AFDD 3-22 Foreign -
Examining the Suicide Terror Movement in Afghanistan Matthew Dearing1
The Culture & Conflict Review Vol. 2, No. 3, Summer 2008 Examining the Suicide Terror Movement in Afghanistan Matthew Dearing1 “When you do not have guns or bomber planes then your body is the only weapon that you use to resist people killing your families.”2 What is behind the surge of Improvised Explosive Devices (IED) and suicide attacks in Afghanistan? Suicide attacks in particular are a recent phenomenon in Afghanistan, increasing by 42 percent from 2006 to 2007.3 This article will examine some of the factors behind the increasing use of suicide and IED attacks as tactics of unconventional warfare in Afghanistan. It will analyze the strategic environment in which these types of operations are used and provide some policy recommendations for countering future IED attacks. It is important to understand that unconventional warfare is a “strategy of necessity” for the weaker side in an insurgency.4 As an asymmetric warfare tactic, suicide terrorism provides incentives for insurgents. In Afghanistan, IED and suicide missions are founded upon three fundamental aims – to compel the United States and ISAF to leave the perceived homeland of Pashtuns, to undermine the legitimacy of the U.S. backed government in Kabul, and to create a desperate environment that provides little alternative but to join the suicide jihad movement. While current evidence shows the Taliban have been only slightly successful in changing perceptions, the momentum could easily shift to their advantage. Current Events & Trends Recent attacks have been the most violent since U.S. operations began in 2001. On February 17, 2008, more than 100 Afghans were killed when a suicide bomber detonated his explosives vest at a dog-fighting match, targeting the chief 1 Matthew Dearing is a Research Associate with the Program for Culture & Conflict Studies. -
The New World Politics
The New World Politics Research Project “Is Terrorism a Legitimate Response to Asymmetric Warfare?” by Peita Davis Due: 11th November, 2004 1 Is Terrorism a Legitimate Response to Asymmetric Warfare? Terrorism: the new global threat. Just like fascism and communism before it, terrorism has gripped the world population with fear. The West is so spellbound with ‘The War on Terror’ that people see terrorists in every airport, every café and in every mosque. But what exactly is it that we fear? Is it that terrorism can strike at any time, any place? Or is it that we fear someone who does not play by the rules? “Terrorists” and “terrorist acts” get a great deal of media coverage today, but what do we know of their situation? By branding them terrorists do we immediately disregard all claim to legitimacy they might have? Many groups that we identify as terrorists are fighting against a more powerful enemy with military superiority and greater political might. In these circumstances, is it fair for the weaker side to use unorthodox methods to try and balance the scales? By analysing the Palestinian/Israeli conflict and the Beslan hostage crisis in Russia, this paper will determine whether terrorism is a legitimate response to asymmetric warfare. The complex nature of this topic requires a clear understanding of the terms that will be used. To establish the characteristics of a terrorist, terrorism must be defined as “the deliberate use of violence or the threat of such, directed upon civilians in order to achieve political objectives” (Kapitan in Sterba, 2003: 48).