Third-Generation Warfare
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II. -
Information Warfare, International Law, and the Changing Battlefield
ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? ............................. -
"Artillery Lends Dignity to What Otherwise Would Be a Common Brawl": an Essay on Post-Modern Warfare and the Classification of Captured Adversaries
Pace International Law Review Volume 14 Issue 1 Spring 2002 Article 5 April 2002 "Artillery Lends Dignity to What Otherwise Would Be a Common Brawl": An Essay on Post-Modern Warfare and the Classification of Captured Adversaries Ralph Michael Stein Pace University School of Law, [email protected] Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Ralph Michael Stein, "Artillery Lends Dignity to What Otherwise Would Be a Common Brawl": An Essay on Post-Modern Warfare and the Classification of Captured Adversaries, 14 Pace Int'l L. Rev. 133 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss1/5 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. "ARTILLERY LENDS DIGNITY TO WHAT OTHERWISE WOULD BE A COMMON BRAWL": AN ESSAY ON POST-MODERN WARFARE AND THE CLASSIFICATION OF CAPTURED ADVERSARIES Ralph Michael Stein* I. Introduction ....................................... 133 II. What is "War" in a Post-Modernist America? ...... 134 III. Warfare Moves in Two Contradictory Directions .. 140 IV. The Protection of Prisoners of War ................ 141 V. And Now, What Do We Do With the Taliban and Al Qaeda Fighters? ....... ......................... 148 1. INTRODUCTION As this essay is written many individuals believed to have adhered to the cause of terrorist activities against the United States, including participation in or support of the September 11, 2001 attacks in New York and at the Pentagon building, are in U.S. -
Lessons from Modern Warfare: What the Conflicts of the Post–Cold War Years Should Have Taught Us
FALL 2013 Vol. 7, No. 3 Commentaries The Need for a Strong US Nuclear Deterrent in the Twenty-First Century Franklin C. Miller Space: Tomorrow and Beyond Lt Gen Garry Trexler, USAF, Retired Lessons from Modern Warfare: What the Conflicts of the Post–Cold War Years Should Have Taught Us Benjamin S. Lambeth FALL 2013 FALL Missile Defenses and Nuclear Arms Reductions: Moving Deterrence Forward, or Backward? Stephen J. Cimbala Scramble in the South China Sea: Regional Conflict and US Strategy Lt Col Aaron W. Steffens, USAF Astroimpolitic: Organizing Outer Space by the Sword Maj Matthew Burris, USAF Book Essay Decade of War: No Lessons Endure Col Richard Szafranski, USAF, Retired Chief of Staff, US Air Force Gen Mark A. Welsh III Commander, Air Education and Training Command Gen Edward A. Rice Jr. Commander and President, Air University Lt Gen David S. Fadok Director, Air Force Research Institute Lt Gen Allen G. Peck, USAF, Retired Editorial Staff Col W. Michael Guillot, USAF, Retired, Editor CAPT Jerry L. Gantt, USNR, Retired, Content Editor Nedra O. Looney, Prepress Production Manager Tammi K. Dacus, Editorial Assistant Daniel M. Armstrong, Illustrator Advisors Gen Michael P. C. Carns, USAF, Retired Lt Gen Allen G. Peck, USAF, Retired Christina Goulter-Zervoudakis, PhD Colin S. Gray, DPhil Robert P. Haffa, PhD Charlotte Ku, PhD Benjamin S. Lambeth, PhD John T. LaSaine, PhD Allan R. Millett, PhD Contributing Editors Air Force Research Institute Panayotis Yannakogeorgos, PhD School of Advanced Air and Space Studies Stephen D. Chiabotti, PhD James W. Forsyth Jr., PhD The Spaatz Center Edwina S. Campbell, PhD Charles E. -
The Myth of the Learning Curve: Tactics and Training in the 12Th Canadian Infantry Brigade, 1916-1918
Canadian Military History Volume 14 Issue 4 Article 3 2005 The Myth of the Learning Curve: Tactics and Training in the 12th Canadian Infantry Brigade, 1916-1918 Mark Osborne Humphries University of Western Ontario Follow this and additional works at: https://scholars.wlu.ca/cmh Part of the Military History Commons Recommended Citation Humphries, Mark Osborne "The Myth of the Learning Curve: Tactics and Training in the 12th Canadian Infantry Brigade, 1916-1918." Canadian Military History 14, 4 (2005) This Article is brought to you for free and open access by Scholars Commons @ Laurier. It has been accepted for inclusion in Canadian Military History by an authorized editor of Scholars Commons @ Laurier. For more information, please contact [email protected]. Humphries: Myth of the Learning Curve The Myth of the Learning Curve Tactics and Training in the 12th Canadian Infantry Brigade, 1916-18 Mark Osborne Humphries anadian military historians generally accept subject in the historiography. In recent years Cthat during the First World War the Canadian historians such as such as Andrew Iarocci military improved over time. This idea of a and David Campbell have begun to re-examine “learning curve” suggests that Canadians began training as a means of measuring and evaluating the war as inexperienced colonial volunteers and, the learning curve.3 This paper builds on the as the Corps gained experience on the battlefield, work of previous scholars and extends some commanders and ordinary soldiers alike learned of their arguments while challenging others. from their mistakes and successes and improved It examines the training of the 12th Canadian combat tactics from battle to battle and from Infantry Brigade for the battles of the Somme and year to year.1 Several different approaches to Amiens, as well as the official training manuals, this argument are evident in the literature. -
Infantry Brigade Combat Team (IBCT) Mobility, Reconnaissance, and Firepower Programs
Infantry Brigade Combat Team (IBCT) Mobility, Reconnaissance, and Firepower Programs Andrew Feickert Specialist in Military Ground Forces Updated March 27, 2019 Congressional Research Service 7-.... www.crs.gov R44968 Infantry Brigade Combat Team (IBCT) Programs Summary Infantry Brigade Combat Teams (IBCTs) constitute the Army’s “light” ground forces and are an important part of the nation’s ability to project forces overseas. The wars in Iraq and Afghanistan, as well as current thinking by Army leadership as to where and how future conflicts would be fought, suggest IBCTs are limited operationally by their lack of assigned transport and reconnaissance vehicles as well as firepower against hardened targets and armored vehicles. There are three types of IBCTs: Light, Airborne, and Air Assault. Light IBCTs are primarily foot- mobile forces. Light IBCTs can move by foot, by vehicle, or by air (either air landed or by helicopter). Airborne IBCTs are specially trained and equipped to conduct parachute assaults. Air Assault IBCTs are specially trained and equipped to conduct helicopter assaults. Currently, the Army contends IBCTs face a number of limitations The IBCT lacks the ability to decisively close with and destroy the enemy under restricted terrains such as mountains, littorals, jungles, subterranean areas, and urban areas to minimize excessive physical burdens imposed by organic material systems. The IBCT lacks the ability to maneuver and survive in close combat against hardened enemy fortifications, light armored vehicles, and dismounted personnel. IBCTs lack the support of a mobile protected firepower capability to apply immediate, lethal, long-range direct fires in the engagement of hardened enemy bunkers, light armored vehicles, and dismounted personnel in machine gun and sniper positions; with all-terrain mobility and scalable armor protection; capable of conducting operations in all environments. -
The Time Value of Military Force in Modern Warfare the Airpower Advantage
The Time Value of Military Force in Modern Warfare The Airpower Advantage WALTER D. GIVHAN, Major, USAF School of Advanced Airpower Studies THESIS PRESENTED TO THE FACULTY OF THE SCHOOL OF ADVANCED AIRPOWER STUDIES, MAXWELL AIR FORCE BASE, ALABAMA, FOR COMPLETION OF GRADUATION REQUIREMENTS, ACADEMIC YEAR 1994–95. Air University Press Maxwell Air Force Base, Alabama March 1996 Disclaimer The author produced this paper in a Department of Defense school environment in the interest of academic freedom and the advancement of national defense-related concepts. The views expressed in this publication are those of the author and do not reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and policy review authorities and is cleared for public release. ii Contents Chapter Page DISCLAIMER . ii ABSTRACT . v ABOUT THE AUTHOR . vii ACKNOWLEDGMENTS . ix 1 INTRODUCTION . 1 Overview . 1 Methodology . 2 Definitions . 2 Limits of the Argument . 3 Notes . 3 2 TIME IN THE THEORY OF WAR . 5 War Theorists on Time . 6 Characteristics of Time in War . 7 Physical and Psychological Aspects of Time . 8 Political and Military Dynamics of Time . 9 Summary . 10 Notes . 11 3 THE ARAB-ISRAELI WAR OF 1967 . 13 The Course of the War . 13 Political Imperatives . 14 Military Imperatives . 15 The Time Problem . 15 Operational Consequences and Risk . 16 Airpower’s Role . 17 Summary . 19 Notes . 20 4 THE FALKLANDS WAR . 21 The Course of the War . 21 Political Imperatives . 22 Military Imperatives . 24 The Time Problem . 25 Operational Consequences and Risk . -
Information Operations, Information Warfare, and Computer Network Attack Their Relationship to National Security in the Information Age
IV Information Operations, Information Warfare, and Computer Network Attack Their Relationship to National Security in the Information Age Daniel T. Kuehl· Introduction hat is "information warfare"? Is it nothing more than a bumper W sticker, used as a "quick fix" rescue for budgets and programs that find it useful to attach themselves to the hot new concept? Is it such a revolu tionary new amalgam of technologies and concepts that old and traditional forms of warfare are soon slated to fall into the same receptacle in which out moded military technologies such as the catapult and war galley slumber? Is warfare as we understand it, featuring "blast, heat, and fragmentation," about to become obsolete?1 The intent of this brief introduction to information warfare (IW) and information operations (10) is to both explore these issues and present the thesis that they are best understood in light of the environment in which they take place-the information environment-and to explore the relation ship of that environment to the specific topic on which this book is focused, computer network attack. Information Operations, Inforntation Warfare, and Computer Network Attack What is Information Warfare? A useful starting place is to trace the evolution of the term information warfare itsel£ The earliest use of the term in the United States probably origi nated in the Office of Net Assessment, where in the 1970s Dr. Tom Rona was investigating the relationships among control systems, a field known as cyber netics. Dr. Rona described the competition between competing control systems as "information warfare," in the sense that control systems can be described as the means for gathering, processing, and disseminating information, processes which can be diagrammed and described with flow and feedback charts of mind-numbing dryness and complexity.2 In 1993 the Department of Defense published an official definition for the term, in a highly classified DoD Directive, TS3600.1. -
ATP 3-21.51 Subterranean Operations
ATP 3-21.51 Subterranean Operations 129(0%(5 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes ATP 3-21.51, dated 21 February 2018. Headquarters, Department of the Army This publication is available at the Army Publishing Directorate site (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard) *ATP 3-21.51 Army Techniques Publication Headquarters No. 3-21.51 Department of the Army Washington, DC, 1RYHPEHr 2019 Subterranean Operations Contents Page PREFACE..................................................................................................................... v INTRODUCTION ........................................................................................................ vii Chapter 1 SUBTERRANEAN ENVIRONMENT ......................................................................... 1-1 Attributes of a Subterranean System ........................................................................ 1-1 Functionality of Subterranean Structures .................................................................. 1-1 Subterranean Threats, Hazards, and Risks .............................................................. 1-2 Denial and Deception ................................................................................................ 1-6 Categories of Subterranean Systems ....................................................................... 1-9 Construction of Subterranean Spaces and Structures ........................................... -
Advanced Camp Cadet Handbook
U.S. ARMY CADET COMMAND ADVANCED CAMP CADET HANDBOOK DISTRIBUTION RESTRICTION: APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED. USACC, G3, CST Planning Branch, 2018. CADET CREED I am an Army Cadet. Soon I will take an oath and become an Army Officer committed to defending the values, which make this nation great. HONOR is my touchstone. I understand MISSION first and PEOPLE always. I am the PAST: the spirit of those WARRIORS who have made the final sacrifice. I am the PRESENT: the scholar and apprentice soldier enhancing my skills in the science of warfare and the art of leadership. But, above all, I am the FUTURE: the future WARRIOR LEADER of the United States Army. May God give me the compassion and judgment to lead and the gallantry to WIN. I WILL do my duty. Table of Contents Chapter 1 The Army Leader 1-1 SECTION I –LEADER DEVELOPMENT 1-1 SECTION II – CREEDS AND OATHS Error! Bookmark not defined. SECTION III - DUTIES AND RESPONSIBILITIES 1-6 Chapter 2 Mission Command 2-11 SECTION I: MISSION COMMAND INTRODUCTION 2-11 SECTION II – TROOP LEADING PROCEDURES 2-13 SECTION III – ORDERS 2-17 Chapter 3 – Operations 3-23 SECTION I – REPORTS 3-23 SECTION II – FIRE CONTROL AND DISTRIBUTION 3-24 SECTION III – WEAPONS 3-25 SECTION IV – RANGE CARDS AND SECTOR SKETCHES 3-26 Chapter 4 Communications 4-1 SECTION I – PROCEDURE WORDS (PROWORDS) 4-1 SECTION II – RADIO CALL PROCEDURES 4-5 SECTION III – BATTERIES AND LOADING FREQUENCY 4-8 Chapter 5 First Aid 5-12 SECTION I – PERFORM FIRST AID for BLEEDING 5-12 SECTION II – EVALUATE A CASUALTY (TACTICAL -
BREAK CONTACT SITUATION: the Squad Or Platoon Is Under Enemy Fire and Must Break Contact
BATTLE DRILL 2 BREAK CONTACT SITUATION: The squad or platoon is under enemy fire and must break contact. REQUIRED ACTIONS: See Figure 6-2. 1. The platoon/squad leader directs fire support for the disengagement. He accomplishes this by— • Directing one squad/fire team in contact to support the disengagement of the remainder of the unit. • Considering the use of indirect fires for breaking contact. • Clearing the location, task, purpose, and method of conducting the fire mission with the platoon FO. 2. The platoon/squad leader orders a distance and direction, a terrain feature, or last ORP for the movement of the first squad/fire team. In conjunction with the platoon FO, the leader maintains accurate battle tracking of all friendly elements to facilitate quick clearance of fires. 3. The base of fire squad/team continues to suppress the enemy. The platoon/squad leader directs the platoon FO to execute the fire mission, if needed. 4. The moving squad/team assumes the overwatch position. The squad/team should use M203 grenade launchers, throw fragmentation and concussion grenades, and use smoke grenades to mask movement. The platoon/squad leader directs the platoon FO to execute smoke mission to screen friendly elements movement, if needed. 5. The moving squad/team takes up the designated position and engages the enemy position. 6. The platoon leader directs the base-of-fire element to move to its next location. Based on the terrain and the volume and accuracy of the enemy’s fire, the moving fire team or squad may need to use fire and movement techniques. -
Vauban!S Siege Legacy In
VAUBAN’S SIEGE LEGACY IN THE WAR OF THE SPANISH SUCCESSION, 1702-1712 DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Jamel M. Ostwald, M.A. The Ohio State University 2002 Approved by Dissertation Committee: Professor John Rule, Co-Adviser Co-Adviser Professor John Guilmartin, Jr., Co-Adviser Department of History Professor Geoffrey Parker Professor John Lynn Co-Adviser Department of History UMI Number: 3081952 ________________________________________________________ UMI Microform 3081952 Copyright 2003 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ____________________________________________________________ ProQuest Information and Learning Company 300 North Zeeb Road PO Box 1346 Ann Arbor, MI 48106-1346 ABSTRACT Over the course of Louis XIV’s fifty-four year reign (1661-1715), Western Europe witnessed thirty-six years of conflict. Siege warfare figures significantly in this accounting, for extended sieges quickly consumed short campaign seasons and prevented decisive victory. The resulting prolongation of wars and the cost of besieging dozens of fortresses with tens of thousands of men forced “fiscal- military” states to continue to elevate short-term financial considerations above long-term political reforms; Louis’s wars consumed 75% or more of the annual royal budget. Historians of 17th century Europe credit one French engineer – Sébastien le Prestre de Vauban – with significantly reducing these costs by toppling the impregnability of 16th century artillery fortresses. Vauban perfected and promoted an efficient siege, a “scientific” method of capturing towns that minimized a besieger’s casualties, delays and expenses, while also sparing the town’s civilian populace.