The Future of Urban Warfare in the Age of Megacities
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How Technology Impacts Doctrine in Asymmetric Warfare
0 How Technology Impacts Doctrine in Asymmetric Warfare Jeremiah Rozman Northfield Vermont Bachelors of Arts, University of Vermont, 2014 A Thesis presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Master of Arts Department of Foreign Affairs University of Virginia May, 2016 1 Abstract How does technology impact military doctrine, and how does this in turn impact political support for offensive, preventative or preemptive military action?1 I study defensive weapons systems, specifically focusing on missile defense in the theoretical context of technology and defense-based strategies as a whole. Through the study of Israel’s use of Iron Dome, I aim to demonstrate that technology can be an exogenous factor affecting military doctrine. Through careful case study analysis, I demonstrate that operationally successful defensive technologies can lead to the adoption of a defensive military doctrine by decreasing the political cost of inaction to the extent that allowing attrition becomes politically less costly than launching an offensive. Introduction A comparison of Israel’s two recent wars in Gaza, Operation Cast Lead in 2008/9 and Operation Protective Edge in 2014, indicates that the tactical success of Iron Dome, as a defensive military technology, can effect a change in military doctrine. The goal of this study is to demonstrate the effect of an unexpectedly successful defensive military technology on military doctrine, an effect which leads to prioritizing defense, allowing attrition, and moving away from a long-standing offense-based doctrine, specifically when dealing with asymmetric conflict. This study focuses on Israel, specifically in the Gaza theater of conflict and not in the Northern theater of conflict where Israel’s adversary, Hezbollah is 1 Preemptive war is defined as actor A launching a first strike in order to gain advantage in a situation where an attack by actor B is anticipated to be imminent. -
Siege of Sarajevo Endangered Civilians
BALKAN January 8, 2004 Page 6 VIEW FROM THE HAGUE SIEGE OF SARAJEVO ENDANGERED CIVILIANS On 5 December this year, the International Criminal Tribunal for the former Yugoslavia sentenced General Stanislav Gali ć to 20 years in prison for spreading terror among the civilian population during the siege of Sarajevo. The city of Sarajevo was under siege for about three and a half years. For almost two years of that time, from September 1992 to August 1994, General Gali ć was the commander of a branch of the Army of Republika Srpska (VRS), called the Sarajevo Romanija Corps, or SRK, which had virtually encircled Sarajevo. Parts of the city were controlled by the Army of Bosnia and Herzegovina. The Prosecution alleged that the SRK under General Gali ć's command conducted a campaign of sniping and shelling attacks on civilians in Sarajevo. Under international humanitarian law war as such is not considered unlawful. However, certain principles of warfare apply that military commanders must respect. One such principle obliges military commanders to distinguish between military objectives, on the one hand, and civilians, on the other, and not to attack civilians under any circumstances. And yet, the SRK's campaign resulted in a large number of deaths and injuries to civilians. The Tribunal Prosecution alleged that the SRK, under General Gali ć's command deliberately killed and injured civilians in order to terrorize them. Terrorising civilians Terrorising civilians during armed conflict is specifically prohibited by Article 51 of Additional Protocol I to the Geneva Conventions of 1949. The former Yugoslavia ratified this protocol in 1978. -
The Foundations of US Air Doctrine
DISCLAIMER This study represents the views of the author and does not necessarily reflect the official opinion of the Air University Center for Aerospace Doctrine, Research, and Education (CADRE) or the Department of the Air Force. This manuscript has been reviewed and cleared for public release by security and policy review authorities. iii Library of Congress Cataloging-in-Publication Data Watts, Barry D. The Foundations ofUS Air Doctrine . "December 1984 ." Bibliography : p. Includes index. 1. United States. Air Force. 2. Aeronautics, Military-United States. 3. Air warfare . I. Title. 11. Title: Foundations of US air doctrine . III. Title: Friction in war. UG633.W34 1984 358.4'00973 84-72550 355' .0215-dc 19 ISBN 1-58566-007-8 First Printing December 1984 Second Printing September 1991 ThirdPrinting July 1993 Fourth Printing May 1996 Fifth Printing January 1997 Sixth Printing June 1998 Seventh Printing July 2000 Eighth Printing June 2001 Ninth Printing September 2001 iv THE AUTHOR s Lieutenant Colonel Barry D. Watts (MA philosophy, University of Pittsburgh; BA mathematics, US Air Force Academy) has been teaching and writing about military theory since he joined the Air Force Academy faculty in 1974 . During the Vietnam War he saw combat with the 8th Tactical Fighter Wing at Ubon, Thailand, completing 100 missions over North Vietnam in June 1968. Subsequently, Lieutenant Colonel Watts flew F-4s from Yokota AB, Japan, and Kadena AB, Okinawa. More recently, he has served as a military assistant to the Director of Net Assessment, Office of the Secretary of Defense, and with the Air Staff's Project CHECKMATE. -
Subterranean Warfare: a New-Old Challenge
Subterranean Warfare: A New-Old Challenge Yiftah S. Shapir and Gal Perel Subterranean warfare is not new in human history. Tunnels, which have been dug in all periods for various purposes, have usually been the weapon of the weak against the strong and used for concealment. The time required to dig tunnels means that they can be an important tool for local residents against an enemy army unfamiliar with the terrain. Tunnels used for concealment purposes (defensive tunnels) can be distinguished from tunnels used as a route for moving from one place to another. The latter include smuggling tunnels used to smuggle goods past borders (as in the Gaza Strip), escape routes from prisons or detention camps, offensive tunnels to move forces behind enemy lines, and booby-trapped tunnels planted with explosives !"#$%#!#&'%()*+,+-+#.%/)%-)*-+*% .#"%0'%1)&).23 Operation Protective Edge sharpened awareness of the strategic threat posed by subterranean warfare. The IDF encountered the tunnel threat long ago, and took action to attempt to cope with this threat, but the scope of -4#%54#!6&#!6!7%).%0#*)&#%)55)$#!-%+!%8 ,'9: ; .-%<=>?7%@).%56$-$)'#"% as a strategic shock, if not a complete surprise, requiring comprehensive reorganization to handle the problem. Some critics argued that an investigative commission was necessary to search for the roots of the failure and punish those to blame for it. This article will review subterranean warfare before and during Operation Protective Edge, and will assess the strategic effects of this mode of warfare. !"#$%&#'()#*+,-"../0"/0#1/.2/." A 0-#$$)!#)!%@)$()$#%4).%)55#)$#"%&)!'%-+&#.%+!%-4#%:$)09B.$)#,+%*6!-#C-7% and the IDF and the Ministry of Defense have dealt with various aspects of the phenomenon of subterranean warfare for many years. -
Worlds Apart: Bosnian Lessons for Global Security
Worlds Apart Swanee Hunt Worlds Apart Bosnian Lessons for GLoBaL security Duke university Press Durham anD LonDon 2011 © 2011 Duke University Press All rights reserved Printed in the United States of America on acid- free paper ♾ Designed by C. H. Westmoreland Typeset in Charis by Tseng Information Systems, Inc. Library of Congress Cataloging- in- Publication Data appear on the last printed page of this book. To my partners c harLes ansBacher: “Of course you can.” and VaLerie GiLLen: “Of course we can.” and Mirsad JaceVic: “Of course you must.” Contents Author’s Note xi Map of Yugoslavia xii Prologue xiii Acknowledgments xix Context xxi Part i: War Section 1: Officialdom 3 1. insiDe: “Esteemed Mr. Carrington” 3 2. outsiDe: A Convenient Euphemism 4 3. insiDe: Angels and Animals 8 4. outsiDe: Carter and Conscience 10 5. insiDe: “If I Left, Everyone Would Flee” 12 6. outsiDe: None of Our Business 15 7. insiDe: Silajdžić 17 8. outsiDe: Unintended Consequences 18 9. insiDe: The Bread Factory 19 10. outsiDe: Elegant Tables 21 Section 2: Victims or Agents? 24 11. insiDe: The Unspeakable 24 12. outsiDe: The Politics of Rape 26 13. insiDe: An Unlikely Soldier 28 14. outsiDe: Happy Fourth of July 30 15. insiDe: Women on the Side 33 16. outsiDe: Contact Sport 35 Section 3: Deadly Stereotypes 37 17. insiDe: An Artificial War 37 18. outsiDe: Clashes 38 19. insiDe: Crossing the Fault Line 39 20. outsiDe: “The Truth about Goražde” 41 21. insiDe: Loyal 43 22. outsiDe: Pentagon Sympathies 46 23. insiDe: Family Friends 48 24. outsiDe: Extremists 50 Section 4: Fissures and Connections 55 25. -
Adits, Caves, Karizi-Qanats, and Tunnels in Afghanistan: an Annotated Bibliography by R
Adits, Caves, Karizi-Qanats, and Tunnels in Afghanistan: An Annotated Bibliography by R. Lee Hadden Topographic Engineering Center November 2005 US Army Corps of Engineers 7701 Telegraph Road Alexandria, VA 22315-3864 Adits, Caves, Karizi-Qanats, and Tunnels In Afghanistan Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE 30-11- 2. REPORT TYPE Bibliography 3. DATES COVERED 1830-2005 2005 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER “Adits, Caves, Karizi-Qanats and Tunnels 5b. GRANT NUMBER In Afghanistan: An Annotated Bibliography” 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER HADDEN, Robert Lee 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT US Army Corps of Engineers 7701 Telegraph Road Topographic Alexandria, VA 22315- Engineering Center 3864 9.ATTN SPONSORING CEERD / MONITORINGTO I AGENCY NAME(S) AND ADDRESS(ES) 10. -
France and the Dissolution of Yugoslavia Christopher David Jones, MA, BA (Hons.)
France and the Dissolution of Yugoslavia Christopher David Jones, MA, BA (Hons.) A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy University of East Anglia School of History August 2015 © “This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with the author and that use of any information derived there from must be in accordance with current UK Copyright Law. In addition, any quotation or extract must include full attribution.” Abstract This thesis examines French relations with Yugoslavia in the twentieth century and its response to the federal republic’s dissolution in the 1990s. In doing so it contributes to studies of post-Cold War international politics and international diplomacy during the Yugoslav Wars. It utilises a wide-range of source materials, including: archival documents, interviews, memoirs, newspaper articles and speeches. Many contemporary commentators on French policy towards Yugoslavia believed that the Mitterrand administration’s approach was anachronistic, based upon a fear of a resurgent and newly reunified Germany and an historical friendship with Serbia; this narrative has hitherto remained largely unchallenged. Whilst history did weigh heavily on Mitterrand’s perceptions of the conflicts in Yugoslavia, this thesis argues that France’s Yugoslav policy was more the logical outcome of longer-term trends in French and Mitterrandienne foreign policy. Furthermore, it reflected a determined effort by France to ensure that its long-established preferences for post-Cold War security were at the forefront of European and international politics; its strong position in all significant international multilateral institutions provided an important platform to do so. -
Bosnia to War, to Dayton, and to Its Slow Peace – European Council On
REPORT BOSNIA TO WAR, TO DAYTON, AND TO ITS SLOW PEACE Carl Bildt January 2021 SUMMARY The international community was gravely unprepared for the conflicts that followed the dissolution of Yugoslavia. In particular, it neglected the challenge of Bosnia. Europe alone was not enough to bring peace, and the United States went from disinterested to disruptive and finally to decisive for a credible peace process. Russia in those days was a constructive actor. The war in Bosnia lasted years longer than it should have more because of the divisions between outside powers than because of the divisions within the country and the region itself. The fundamentals of the Dayton Agreement in 1995 were not too dissimilar from what had been discussed, but not pursued, prior to the outbreak of the war. It is a solution that is closer to the reality of Belgium than to the reality of Cyprus. After the war, many political leaders in Bosnia saw peace as the continuation of the war by other means, which has seriously hampered economic and social progress. Ultimately, it will be difficult to sustain progress for Bosnia or the region without a credible and clear EU accession process. INTRODUCTION It was a quarter of a century ago that the most painful conflict on European soil since the second world war came to an end. Peace agreements are rare birds. Most conflicts end either with the victory of one of the sides or some sort of ceasefire that is rarely followed by a true peace agreement. The map of Europe shows a number of such ‘frozen conflicts’. -
Asymmetric Warfare - the Siege of Fallujah
ASYMMETRIC WARFARE - THE SIEGE OF FALLUJAH Csér Orsolya Abstract: Asymmetric warfare is a tactical process based on policy objectives which can be used to force our will upon the enemy. The non-traditional, inexpensive actions involving material damage and human casualties (such as terrorism, deployment of weapons of mass destruction, threat of using them, information warfare); guerrilla- and partisan-type raids implemented with simple tools and techniques are considered its basic advantages. All these are usually the weapons of the party fighting in the occupied territories (eg. bombings, suicide attacks, actions against logistics, command posts, attacks against officers, command staff, destruction of supply routes and transportation routes). The detection of these weapons and the psychological preparation of the soldiers is very difficult, because the offenders do not comply with the conventions of warfare. The siege of Fallujah in Iraq, which wrote itself into the history books as one of the most infamous and serious insurgencies and in which the media and propaganda played a major role, is regarded as an example of asymmetric warfare. Keywords: asymmetry, insurgency, guerrilla, civilians, civilian victim, propaganda, military gain 1. Introduction Asymmetry doesn't mean anything other than the lack of symmetry between the belligerents, partially or wholly. Asymmetric warfare is: "A warfare for the sake of precisely outlined political aims, often based on ideological, religious, ethnic community of several organizations, implementing military and non-military operations, tactics and techniques building upon direct and indirect effects and intensifying each other's effects, endangering different dimensions of security, mainly tactical procedures, with whose effect altogether we may force our will upon the enemy." All of this is such an activity that can be connected to asymmetric challenges, when the executors - in most cases not even sparing their own lives - execute military actions, and is usually done against a belligerent on a higher technological level. -
Official Account of the Bombardment of Fort Mchenry
Official Account of the Bombardment of Fort McHenry. Copy of a letter from Lieut. Colonel Armistead, to the Secretary of War, dated Fort McHenry, Sept. 24th, 1814 A severe indisposition, the effect of great fatigue and exposure, has prevented me heretofore from presenting you with an account of the attack on this post. On the night of Saturday the 10th inst. the British fleet, consisting of ships of the line, heavy frigates, and bomb vessels, amounting in the whole to 30 sail, appeared at the mouth of the river Patapsco, with every indication of an attempt on the city of Baltimore. My own force consisted of one company of U.S. artillery, under Capt. Evans, and two companies of sea fencibles, under Capts. Bunbury and Addison. Of these three companies, 35 men were unfortunately on the sick list, and unfit for duty. I had been furnished with two companies of volunteer artillery from Baltimore, under Capt. Berry, and Lt. Commandant Pennington. --To these I must add another very fine company of volunteer artillerists, under Judge Nicholson, who had proffered their services to aid in the defense of this post whenever an attack might be apprehended; and also a detachment from Commodore Barney's flotilla under Lieut. Redman. Brig. Gen. Winder had also furnished me with about six hundred infantry, and Major Lane, consisting of detachments from the 12th, 14th, 36th, and 38th Regim. of U.S. troops - the total amounting to more than 1000 effective men. On Monday morning very early, it was perceived that the enemy was landing troops on the east side of the Patapsco, distant about ten miles. -
Tunnel Operations in the Israel Defense Forces: Adapting The
Original Manuscript Armed Forces & Society 1-21 ª The Author(s) 2020 Tunnel Operations in the Article reuse guidelines: sagepub.com/journals-permissions DOI: 10.1177/0095327X20924040 Israel Defense Forces: journals.sagepub.com/home/afs Adapting the Warrior Ethos to Post-Heroic Conflict Nehemia Stern1 , Uzi Ben-Shalom1, Niv Gold2, Corinne Berger1, Avishai Antonovsky3, and Dvir Peleg1 Abstract This study presents an empirically grounded account of tunnel combat operations in the Israel Defense Forces (IDF) within the context of “post-heroic” warfare. Cur- rent scholarship on “post-heroism” has viewed the technological and professional standards of contemporary military conflicts as distancing the individual combatant from the modern battlefield. Little attention has been given however to the ways in which soldiers themselves experience and adapt to post-heroic conditions. Findings based on in-depth semistructured interviews with 17 IDF tunnel combatants show these soldiers actively reinterpreting the strategic importance placed on distancing the warrior from the battlefield. This exploratory article suggests that an individual “warrior ethos” still resonates amid the professional and technological contours of post-heroic (underground) conflicts. By presenting a novel account of contemporary tunnel warfare from the perspective of the combatants themselves, this research sheds new light on the different personal dimensions that impact post-heroic military operations. 1 Department of Sociology and Anthropology, Ariel University, Israel 2 Clinical Branch, Department of Mental Health, Medical Corps, Israel Defense Force, Israel 3 Mental Fitness Branch, Department of Mental Health, Medical Corps, Israel Defense Forces, Israel Corresponding Author: Nehemia Stern, Department of Sociology and Anthropology, Ariel University, Ariel 40700, Israel. -
Space Weapons Earth Wars
CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. The monograph/report was a product of the RAND Corporation from 1993 to 2003. RAND monograph/reports presented major research findings that addressed the challenges facing the public and private sectors. They included executive summaries, technical documentation, and synthesis pieces. SpaceSpace WeaponsWeapons EarthEarth WarsWars Bob Preston | Dana J. Johnson | Sean J.A. Edwards Michael Miller | Calvin Shipbaugh Project AIR FORCE R Prepared for the United States Air Force Approved for public release; distribution unlimited The research reported here was sponsored by the United States Air Force under Contract F49642-01-C-0003.