SIEGE!! Introduction Demoralization

Total Page:16

File Type:pdf, Size:1020Kb

SIEGE!! Introduction Demoralization SIEGE!! Introduction Castles were primarily structures of war and were built in strife ridden lands. Thus, it was almost inevitable that they would come under attack. Because castles were made with such massive defense fortifications, it was extremely hard to destroy them. Thus, the goal of a siege army was not to destroy a castle, but to penetrate it. However, this task was also extremely hard. Sieges often lasted for months and could even last for years! Castles were protected by at least two walls, and often a moat. The defender's only hope was that either a friendly army would come to help them, or that they could somehow defeat the attackers by themselves. Demoralization The most effective offensive weapon was hunger and demoralization. Besieging forces would attempt to completely surround a castle and cut it off from the outside world. No supplies were allowed in or messages sent out. The situation often got very grim inside the castle. Even though large quantities of supplies were stored inside, they sometimes ran out. Then the defenders were forced to eat anything they could get their hands on. This included rats, grass, dogs, and anything else semi-edible. Essentially, the offending army would attempt to starve and discourage the defenders to the point of surrender. There were many tactics used to accomplish this. They did anything they could to decrease the enemy's morale. Because the defenders depended on reinforcements or a direct attack by allies from another castle, the attacking army almost always embarked on a campaign of misinformation. They would shout that the besieged army's allies were defeated. This was just another way of demoralizing the castle garrison that was cut off from the outside world. Offending armies would hurl insults and jeer at the enemy. They would throw dead animal and human body parts into the castle to spread disease and demoralize the defenders. In fact, the bubonic plague was originally spread by a besieging army. The offending army in this case used catapult machinery to launch dead bodies into a besieged town. This spread the bubonic plague which eventually killed one third of Europe. This was one of the earliest cases of biological warfare. Besiegers also often destroyed almost all crops and buildings for miles around the castle. They pillaged freely stealing animals and valuables. Harassment and the Trick Harassment was another way by which the attackers could break down the castle's defenses. Its effect was both psychological and physical. Many defenders were killed which lowered the number of men available to fight. Additionally, the other men inside the castle soon grew tired of seeing their fellow men in arms dying at their sides. The besieging army kept a constant stream of fire upon the castle and men manning its walls. They set up movable shields, essentially fences on wheels, that archers and crossbowmen could hide behind. The only problem with harassment is that it applied both ways: Attackers could easily become as harried as those defending. Attackers also often tried to trick the castle defenders to gain admittance to the castle. For example, the besieging army could take their weapons and march out of sight. Then, they could wait a couple days and send several soldiers disguised as peasants to the castle. These soldiers could then knife the castle guards in secret and open the main gate. The enemy army could then enter the gate and take the castle. Tactics for the Defense of the Castle Walls The defenders maintained their stronghold through various means. The only thing they could really do was react to the actions of the attackers. They sat tight and waited for the besieging army to leave or for help to arrive. They constantly maintained a steady fire of rocks, torches, arrows, oil, and boiling water on the attackers at the wall. Archers were positioned all over the battlement and the towers to help with this. By maintaining this constant barrage of missiles, they could make the attackers grow weary of fighting. They could also take a more active part in the defense. Occasionally, a detachment of troops was issued from the castle. This troops wood often force small skirmishes with the enemy. The garrison in the castle also did many things to prepare for the siege. Once word was sent of an impending siege, food was scavenged from the surrounding area. By increasing the food supply, they could sometimes hold out for as long at a year. Tactics for the Penetration of the Wall Psychological warfare was not the only warfare employed in a siege, however. Fighting was going on constantly among the two forces. The besieging army used a number of methods to gain access to the areas beyond the walls of the castle. Tunneling One of the methods that they might have used involved tunneling. In the middle of the night, workers would erect wooden palisades, a type of fence, next to the wall. They would also sometimes build a shed. They would then cover these with leather hides that helped to keep them from catching on fire. These fortifications helped to protect the men inside from the constant barrage of fire from above. Additionally, archers hurried in and around the tunnel entrance to help guard it and fire at defenders above. The archers were somewhat safe behind moveable screen erected to guard them. After sufficient defenses were set up, special diggers called sappers would dig a tunnel underneath the castle's walls. As they were digging they would support the tunnel with wooden beams. These men had to be on their guard, however. Defenders often tried to dump hot oil and boiling water down into the tunnel and onto the other soldiers' heads. Once the tunnel was long enough, the attackers had two choices: Continue digging until they broke into the castle courtyard or set the tunnel on fire. Setting the tunnel on fire would cause the surrounding earth to collapse into the tunnel, possibly knocking the castle wall down. To set the wall on fire, attackers would pile dry brush, leaves, wood, and occasionally pigs in the tunnel. They would then light it on fire and hope that it would weaken the wall to the point of buckling. If they chose to continue tunneling until they reached the inside of the castle, there were many risks as well. Defenders would place bottles of water around the castle. If they saw tremors in the water in certain places regularly, then they knew someone was digging there. The defenders could then dig a counter-tunnel to intercept the tunnel the attackers were creating. Then the defenders would engage the enemy below the castle walls and foundation. Siege Towers In addition to tunneling, besiegers often created a siege tower. It was a large structure built to the height of the castle wall. Ladders led up to a room at the top of it. The front and top of the siege tower was covered with leather hides to prevent defenders from catching it on fire. It was built well away from the wall and then rolled next to it during the night. It was positioned next to a wooden hoarding built by the defenders. Then the attack would begin. Defensive and offensive archers would both keep up a constant stream of fire on each other as soldiers attempted to cross over onto the castle wall. Sometimes, enough attackers would be able to enter the wall and take the nearest towers. Other times, they would be routed and the tower would be set ablaze. The Battering Ram The battering ram was another way of getting through a castle wall. During the night a shed was erected quickly next to the gate, or a weak point in the wall. The shed was also covered with fireproof leather. If a moat was there, it was filled most of the way with dirt, rocks, and logs. Then, a large tree trunk was hung from the shed's ceiling by chains. It was sometimes capped with iron. Teams of soldiers then rocked the trunk back and forth, knocking against the wall. This could eventually cause a weakness in the wall, possibly tumbling it. However, defenders once again kept a steady stream of fire on the shed and the men around it. Burning objects were thrown down on top of the shed in an attempt to catch it on fire. Siege Engines Siege engines were also often constructed to help attack the walls and the buildings inside. Catapults, ballista’s, and trebuchets are examples of these. Siege engines were machines, and as machines, they could be powered in many different ways. Catapults and ballista’s used the tension power in rope and wood. They were bent and twisted like giant rubber bands. The resulting tension, if suddenly released, could allow the operators to hurl large objects. Catapults were generally used to launch rocks or incendiaries high into the air, over the castle walls. Rocks were aimed at the walls, while the incendiaries were aimed at the wooden buildings within. Catapults could also be used to launch dead bodies or body parts inside the castle walls. Ballista’s were like giant crossbows and shot large arrows. They were antipersonnel weapons. They could be aimed at a group of enemies. Sometimes defenders also had ballista’s because they didn't take much room and could be placed on a castle tower. Trebuchets were powered by men pulling on one side of a swiveling beam. They pulled on a rope connected to the short end of the beam.
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • The Psychological Impact of Child Soldiering
    Chapter 14 The Psychological Impact of Child Soldiering Elisabeth Schauer and Thomas Elbert Abstract With almost 80% of the fighting forces composed of child soldiers, this is one characterization of the ‘new wars,’ which constitute the dominant form of violent conflict that has emerged only over the last few decades. The development of light weapons, such as automatic guns suitable for children, was an obvious pre- requisite for the involvement of children in modern conflicts that typically involve irregular forces, that target mostly civilians, and that are justified by identities, although the economic interests of foreign countries and exiled communities are usually the driving force. Motivations for child recruitment include children’s limited ability to assess risks, feelings of invulnerability, and shortsightedness. Child soldiers are more often killed or injured than adult soldiers on the front line. They are less costly for the respective group or organization than adult recruits, because they receive fewer resources, including less and smaller weapons and equipment. From a different per- spective, becoming a fighter may seem an attractive possibility for children and adolescents who are facing poverty, starvation, unemployment, and ethnic or polit- ical persecution. In our interviews, former child soldiers and commanders alike reported that children are more malleable and adaptable. Thus, they are easier to indoctrinate, as their moral development is not yet completed and they tend to listen to authorities without questioning them. Child soldiers are raised in an environment of severe violence, experience it, and subsequently often commit cruelties and atrocities of the worst kind. This repeated exposure to chronic and traumatic stress during development leaves the children with mental and related physical ill-health, notably PTSD and severe personality E.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Cognitive Warfare.Pdf
    1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. ​ ​ Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose.
    [Show full text]
  • Information Warfare on the Web in the Middle East
    Source: Vice INFORMATION WARFARE ON THE WEB IN THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION 1 BRINGING WEB SCIENCE TO THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Created in 2002 at Beirut’s Saint-Joseph University Faculty of Humanities KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Digital Transformation of Middle Eastern Societies New paradigms – Arab Spring – Conflicts – ISIS KEEWARD KNOWLEDGE & EDUCATION The Call For a Science of the Web Berners-Lee Interdisciplinarity (The 2 magics) Mixed methods (Data + Social) New tools to understand the impact of the Web on Society From power laws to people (Social Machines) KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Web Science 2010 – Raleigh, NC. Susan Halford, Cathy Pope, Leslie Carr KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Understanding the web requires knowledge and expertise from the social and human sciences KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Computer science is only one vantage point KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Co-constitution of technology and society The Web impacts society and society impacts the Web KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Heterogeneous actors (ANT – Latour) Radical symmetry between humans and non-humans. “the bureaucrat in the standards agency is just as important as the servers at Google or HTTP”. KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Social and cultural
    [Show full text]
  • 1.Russian Information Weapons; 2.Baltic Department of Defense, Or the US Defenses (Estonia, Latvia, Lithuania) Against Government
    Sponsor: USEUCOM Contract No.: W56KGU-17-C-0010 Project No.: 0719S120 The views expressed in this document are those of the author Three Discussions of Russian Concepts: and do not reflect the official policy or position of MITRE, the 1.Russian Information Weapons; 2.Baltic Department of Defense, or the US Defenses (Estonia, Latvia, Lithuania) against government. Russian Propaganda; and 3.Russia’s Development of Non-Lethal Weapons Author: Timothy Thomas March 2020 Approved for Public Release: Distribution Unlimited. Case Numbers 20-0235; 20-0050; 20-0051; 19-3194; and 20-0145. ©2020 The MITRE Corporation. All rights reserved. McClean, VA 1 FOREWORD Russia has long been captivated by the power of information as a weapon, most notably in a historical sense using propaganda to influence and persuade audiences. With the onset of the information age, the concept’s development and application increased dramatically. The power of information-technologies when applied to weaponry increased the latter’s capabilities due to increased reconnaissance and precision applications. The power of social media was used to influence populations both at home and abroad. Both developments fit perfectly into Russia’s information warfare concept, whose two aspects are information-technical and information-psychological capabilities. Information’s universality, covertness, variety of software and hardware forms and implementation, efficiency of use when choosing a time and place of employment, and, finally, cost effectiveness make it a formidable commodity when assessed as weaponry. Russian efforts to define and use IWes are well documented. In the 1990s there were efforts to define information weapons (IWes) at the United Nations, efforts that failed.
    [Show full text]
  • Terrorism - the Efinitd Ional Problem Alex Schmid
    Case Western Reserve Journal of International Law Volume 36 | Issue 2 2004 Terrorism - The efinitD ional Problem Alex Schmid Follow this and additional works at: https://scholarlycommons.law.case.edu/jil Part of the International Law Commons Recommended Citation Alex Schmid, Terrorism - The Definitional Problem, 36 Case W. Res. J. Int'l L. 375 (2004) Available at: https://scholarlycommons.law.case.edu/jil/vol36/iss2/8 This Article is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Journal of International Law by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. TERRORISM - THE DEFINITIONAL PROBLEM* Alex Schmidt "Increasingly, questions are being raised about the problem of the definition of a terrorist. Let us be wise and focused about this: terrorism is terrorism.. What looks, smells and kills like terrorism is terrorism." - Sir Jeremy Greenstock, British Ambassador to the UnitedNations, in post September 11, 2001 speech' "It is not enough to declare war on what one deems terrorism without giving a precise and exact definition." - PresidentEmile Lahoud,Lebanon (2004)2 "An objective definition of terrorism is not only possible; it is also indispensable to any serious attempt to combat terrorism." - Boaz Ganor,Director of the InternationalPolicy Institutefor Counter- Terrorism3 * Presented at the War Crimes Research Symposium: "Terrorism on Trial" at Case Western Reserve University School of Law, sponsored by the Frederick K. Cox International Law Center, on Friday, Oct. 8, 2004. t The views and opinions expressed in this paper are solely those of the author and do not represent official positions of the United Nations which has not yet reached a consensus on the definition of terrorism.
    [Show full text]
  • Principles of Modern American Counterinsurgency
    Mastering Counterinsurgency: A Workshop Report By Stephen P. Cohen, Senior Fellow, The Brookings Institution and Shuja Nawaz, Director, South Asia Center, The Atlantic Council Brookings Counterinsurgency and Pakistan Paper Series The Brookings Institution and the Pakistan National Defence University, with support from the U.S. National Defense University and the Embassy of Pakistan, Washington, held a three-day workshop that explored American and Pakistani approaches to counterinsurgency (COIN) and low-intensity conflict (LIC) from March 10 to March 12, 2009. The workshop consisted of two days’ discussion, a visit to the Marine Corps Base Quantico for discussions with resident experts, and a visit to the Pentagon for briefings by American civilian and military officials. Subsequently, in early May, the Pakistan army launched its biggest-ever counterinsurgency operation in Swat, which is likely to have had significant consequences for the Northwest Frontier Province (NWFP), the army, and Pakistan itself. The workshop anticipated and addressed many dimensions of this operation, although no one present asserted that it was imminent. The surprisingly rapid developments in Pakistan were, in retrospect, the biggest “takeaway” from the conference, and they should make us humble when it comes to prediction. This report highlights some dimensions of the workshop’s exploration of COIN and LIC, and notes areas of agreement and disagreement among and between American and Pakistani participants. It represents our own views, and not necessarily those of sponsors and participants. The conference papers are available on the Brookings website.1 COIN or LIC? Americans and Pakistanis come to counterinsurgency and low-intensity conflict from different backgrounds and different experiences.
    [Show full text]
  • Cyber Influence Operations: an Overview and Comparative Analysis
    CSS CYBER DEFENSE Cyber Influence Operations: An Overview and Comparative Analysis Zurich, October 2019 Cyber Defense Project (CDP) Center for Security Studies (CSS), ETH Zürich Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, Sean. (2019). Cyber Influence Operations: An Overview and Comparative Analysis, Cyberdefense Trend Analysis, Center for Security Studies (CSS), ETH Zürich. Table of Contents Executive Summary 4 1 Introduction 5 2 Summary of the Debate Around Influence Activities 6 2.1 Influence and Some Historical Examples 6 2.2 The Definition Conundrum of Influence Activities and Techniques 7 3 Cyber & Influence Operations 11 3.1 Definition and Scope of Cyber Influence Operations 11 3.2 Influence Operations and Cyber Influence Operations: Similarities and Differences 11 3.3 Potential & Strategic Implications 19 4 Comparative analysis: American and Russian Cyber Influence Operations 21 4.1 Methodology 21 4.2 Presentation of Results and Discussion 21 4.3 Additional Remarks 26 5 Conclusion 28 6 Glossary 30 7 List of Abbreviations 31 8 Bibliography 32 Cyber Influence Operations: An Overview and Comparative Analysis Executive Summary conflict, CIOs are increasingly also used in times of peace or in the context of mere rivalry.
    [Show full text]
  • Enablers of Hybrid Warfare: the Bulgarian Case
    Hadzhiev, B. (2020). Enablers of hybrid warfare: The Bulgarian case. Journal of Journal International Studies, 13(1), 28-43. doi:10.14254/2071-8330.2020/13-1/2 of International Studies © Foundation Enablers of hybrid warfare: of International Studies, 2020 The Bulgarian case © CSR, 2020 Papers Scientific Boyan Hadzhiev Department of International Relations, University of National and World Economy, Bulgaria [email protected] Abstract. Russian actions in the Crimea since 2014 have increased Central and Eastern Received: September, 2019 European countries concerns and strengthened their fears of becoming the next 1st Revision: target of hybrid attacks. The common understanding of hybrid war as such is January, 2020 usually related to the ambiguous boundaries between peace and war. But this view Accepted: February, 2020 is more about the reluctance of political leaders to recognize that hybrid warfare in its essence is a war with limited political aims carried out using a variety of DOI: military and non-military means. As in any war, the strategy of this warfare aims 10.14254/2071- to foster the sense of insecurity and uncertainty in the opponent. Disinformation, 8330. 2020/13-1/2 subversion, demoralization and division in society, political corruption, provocations and threats are some of the key tools that are being applied with different success in the hybrid warfare. The paper presents a theoretical model consisting of three groups of factors (socio-historical, governmental and international) that create an appropriate environment for conducting a hybrid warfare. Taken together, these prerequisites allow the assessment of the degree of vulnerability to hybrid threats. In Bulgaria, the ongoing debate about Russia's role is developing in the context of the alleged hybrid war that Moscow is conducting in the country.
    [Show full text]
  • Psychological Operations Principles and Case Studies
    Psychological Operations Principles and Case Studies Editor Frank L. Goldstein, Col, USAF Co-editor Benjamin F. Findley, Jr., Col, USAFR Air University. Press Maxwell Air Force Base, Alabama September 1996 Library of Congress Cataloging-in-Publication Data Psychological operations : principles and case studies j editor, Frank L. Goldstein ; co-editor, Benjamin F. Findley. p. cm. At head of t.p. : AU Shield. "September 1996 ." 1. Psychological warfare-United States . 2. Psychological warfare-Case studies . 1. Goldstein, Frank L., 1945- . 11. Findley, Benjamin F. UB276.P82 1996 355 .3'434-dc20 96-22817 CIP ISBN 1-58566-016-7 Disclaimer This publication was produced in the Department of Defense school environment in the interest of academic freedom and the advancement of national defense-related concepts . The views expressed in this publication are those of the authors and do not reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and policy review authorities and is cleared for public release . For Sale by the Superintendent of Documents US Government Printing Office Washington, DC 20402 Contents Essay Page DISCLAIMER -------------------- ii FOREWORD . Lx PREFACE ______________________ xi PART I Nature and Scope of Psychological Operations (PSYOP) Introduction . 3 1 Psychological Operations : An Introduction Col Frank L. Goldstein, USAF Col Daniel W. Jacobowitz, USAF, Retired 2 Strategic Concepts for Military Operations . , 17 Col Fred W. Walker, USAF, Retired 3 No More Tactical Information Detachments: US Military Psychological Operations in Transition . 25 Col Alfred H. Paddock, Jr., USA, Retired 4 Blending Military and Civilian PSYOP Paradigms .
    [Show full text]
  • Counterinsurgency and Its Implications for the Norwegian Special Operations Forces
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2008-06 Counterinsurgency and its implications for the Norwegian Special Operations Forces Hellesen, Petter. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/4131 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS COUNTERINSURGENCY AND ITS IMPLICATIONS FOR THE NORWEGIAN SPECIAL OPERATIONS FORCES by Petter Hellesen June 2008 Thesis Advisor: Hy S. Rothstein Second Reader: Doug Borer Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2008 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Counterinsurgency and Its Implications for the Norwegian Special Operations Forces 6. AUTHOR(S) Hellesen, Petter 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9.
    [Show full text]