Toward an Effective and Humane Counterinsurgency Adam Patrick Shilling Louisiana State University and Agricultural and Mechanical College, [email protected]

Total Page:16

File Type:pdf, Size:1020Kb

Toward an Effective and Humane Counterinsurgency Adam Patrick Shilling Louisiana State University and Agricultural and Mechanical College, Adam.P.Shilling@Us.Army.Mil Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2008 Toward an effective and humane counterinsurgency Adam Patrick Shilling Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the Human Resources Management Commons Recommended Citation Shilling, Adam Patrick, "Toward an effective and humane counterinsurgency" (2008). LSU Doctoral Dissertations. 1049. https://digitalcommons.lsu.edu/gradschool_dissertations/1049 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. TOWARD AN EFFECTIVE AND HUMANE COUNTERINSURGENCY A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy In The School of Human Resource Education and Workforce Development by Adam Patrick Shilling BSFS Georgetown University, 1989 MS Louisiana State University, 1996 MS Louisiana State University, 2001 December 2008 ©Copyright 2008 Adam P. Shilling All Rights Reserved ii Acknowledgements Writing a dissertation is challenging and sometimes difficult process. It helps to have a group of guides seeing one through the rough spots. My committee members served as guides for me. Dr. Krisanna Machtmes assumed leadership of the committee once it became apparent that a qualitative method was necessary to cope with the data that was available. She shared her expertise willingly and efficiently, always providing the right advice, in a timely manner, and without a great deal of preamble. I always appreciated her professionalism. Dr. Michael Burnett, who is the best living exemplar of a servant leader it has been my privilege to know, provided guidance and wisdom, always in a gentle, but no-nonsense fashion. Dr. Satish Verma, a consummate gentleman and scholar, listened quietly and spoke quietly, but it always benefitted me to listen. Dr. Curtis Friedel came along when I needed him and gave me the boost I needed to get over the last hurdle. I also want to thank Mr. Stephen Henthorne, who has been a mentor to me for several years, and who has helped me develop a humane view of the subject matter. He has never counted the cost to assist a friend, and I am better for knowing him. Finally, I’d like to acknowledge the contributions of key family members: My mother, Janis, who helped out with proofreading and table formatting; My father, Charles, who provided quiet support when I was frustrated; my son, Caleb, who picked up slack around the house so that I could focus; and my librarian friend, Sarah, who found articles for me, including some I did not have access to, but which were critical. Everyone was unstintingly supportive, and I could not have finished without them. iii Table of Contents ACKNOWLEDGEMENTS ……………………………………………………. iii ABSTRACT ……………………………………………………………………. vi CHAPTER 1. INTRODUCTION AND JUSTIFICATION …………………............ 1 What Is Nation-building? ………………………………………… 1 Where Are We Going? ……………………………………………. 3 Why Nation-build? ……………………………………………… 4 How Prevalent Is Nation-building? ……………………………... 6 What Are the Military’s Roles in Nation-building? …………….. 7 How Is Counterinsurgency Related to Nation-building? ……….. 9 What Is Counterinsurgency? ……………………………………... 10 Why Do Americans Do Nation-building and Counterinsurgency So Badly? …………..…………… 11 Is There Hope? ……………………………………..…………….. 15 Why Is This Study Significant? ………………….………………. 16 What Are the Research Questions? ……………………………… 17 What Are the Research Objectives ………………………………. 17 2. REVIEW OF LITERATURE ………………………………………… 20 Diversity of Literature ……………………………………………. 20 The Knowledge Gap and the Evolution of American Military Thought …………………………… 23 The American Way of War ………………………………………. 29 Evolution of a Theory ……………………………………………. 34 Small Warriors, Partisans, and Revolutionaries …………. 34 Imperial Wars: Callwell ………………………………….. 36 Class Struggle: Lenin ……………………………………. 43 A Sense of Self: Lawrence and the Arab Revolt ………… 44 Advent of People’s War: Mao Zedong …………………... 48 Tying the Loose Ends: Galula …………………………… 55 State of the Art: Guidance from Multinational Corps- Iraq (MNC-I) ..……..……... 67 Challenge of the 21st Century ……………………………………. 69 Know the Enemy, Understand the Social Environment …. 69 Urbanization …………………………………………….... 73 Global Insurgency, Most Serious Threat …………………. 75 Current Debates and Contemporary Practice …………….. 79 Some Tentative Syntheses ………………………………………... 82 iv 3. METHODOLOGY …………………………………………………… 84 Introduction ………………………………………………………. 84 Meta-Synthesis ………………………………………………….... 86 Problems with Meta-Synthesis …………………………………… 87 Overview of Method …………………………………………...… 88 Reliability and Validity ………………………………………...… 89 Preliminary Research and Researcher Perspective …………..….. 91 Instrument Development …………………………………..…….. 93 Population ……………………………………………………….. 95 Sample …………………………………………………………… 97 Data Management ………………………………………………... 101 4. FINDINGS OF THE STUDY ……………………………………….. 102 Stage 1: A Firm Foundation …………………………………….. 102 General Findings…………………………………………. 105 Examination of the Results by Principle ………………… 111 Stage 2: Update for the 21st Century: Understanding the Environment ………………………………………… 164 Changes in the Contemporary Environment ……………... 164 Changes in the Nature of Insurgency ……………………. 166 Implications of the Contemporary Environment for the Classical Principles ……………………… 170 A New Theoretical Insight? …………………………….. 179 Stage 3: Testing the Model Against Contemporary Experience… 187 5. SUMMARY AND RECOMMENDATIONS FOR FURTHER RESEARCH …………………………………. 203 Summary ………………………………………………………… 203 Recommendations for Further Research ..……………………….. 205 REFERENCES..…………………………………………………………….……. 207 APPENDIX: CODING SHEET..………………………………………………… 217 VITA..……………………………………………………………………………. 218 v Abstract Preliminary research isolated a set of thirteen candidate principles that military officers need to understand to conduct effective and humane counterinsurgency. A meta-synthesis of eight classical theorists of counterinsurgency sought support for and consensus on these principles and discovered considerable consensus on all of them. Therefore, this set could be considered a “classical” model of counterinsurgency for use in counterinsurgency campaign planning. The contemporary global political environment is very different from that the classical theorists faced. Therefore, additional research attempted to understand the changes in the environment and in the nature of insurgency to determine the changes necessary to update the classical model. The most important changes in the environment included the end of the Cold War and of superpower rivalry, the increase in the number and influence of important non-state actors, urbanization, and globalization of media and communications technologies. Corresponding changes in the nature of insurgency included the changed objectives of insurgent groups; the globalization of local national struggles; the formation of global terrorist groups that can be perceived as insurgencies; the advent of networked, rather than hierarchical, insurgent organizations; and increased emphasis on the use of media to generate support for insurgent causes and to spread fear. Nevertheless, analysis found the classical principles to be remarkably durable. While the tactics and techniques needed to put each principle into action might be very different from those of the 1950s and 1960s, the principles remain valid, and are still useful for campaign planning. vi Chapter 1 Introduction and Justification Nation-building is an activity that has been in the American news often since the intervention in Somalia in 1992, and it has engendered a good deal of debate over the appropriateness of U.S. involvement in nation-building efforts and over what means should be employed. Much debate centers on the commitment of military resources to the often-difficult and dangerous situations where opportunities for nation-building are found. Conspicuous failures, such as the deaths of American soldiers in Somalia in 1993, depicted in the book, Blackhawk Down (Bowden, 1999), and the 2001 movie of the same name, have convinced many Americans that we should not intervene in failed states because the prospects for success are too small or because these activities are inappropriate uses of military capability (Von Hippel, 2000). On the other hand, many persons and organizations have criticized the U.S. for failure to intervene in Rwanda and for permitting the genocide there to continue (U.S. Committee for Refugees, 2000). Bonner (1994) reports praise for French military peacekeepers that did intervene there. What Is Nation-building? Before beginning a lengthy discussion of nation-building, it is appropriate to seek a consensus on a definition of the term as it is used in professional and scholarly literature. Some have objected to the term, “nation-building” because it improperly uses the term “nation”— which refers to people and culture—when it really means “state”—the capacity of the government to govern. Fukuyama (2004a) put it this way: “What we are really talking about is state-building—that is, creating or strengthening such government institutions
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • The Psychological Impact of Child Soldiering
    Chapter 14 The Psychological Impact of Child Soldiering Elisabeth Schauer and Thomas Elbert Abstract With almost 80% of the fighting forces composed of child soldiers, this is one characterization of the ‘new wars,’ which constitute the dominant form of violent conflict that has emerged only over the last few decades. The development of light weapons, such as automatic guns suitable for children, was an obvious pre- requisite for the involvement of children in modern conflicts that typically involve irregular forces, that target mostly civilians, and that are justified by identities, although the economic interests of foreign countries and exiled communities are usually the driving force. Motivations for child recruitment include children’s limited ability to assess risks, feelings of invulnerability, and shortsightedness. Child soldiers are more often killed or injured than adult soldiers on the front line. They are less costly for the respective group or organization than adult recruits, because they receive fewer resources, including less and smaller weapons and equipment. From a different per- spective, becoming a fighter may seem an attractive possibility for children and adolescents who are facing poverty, starvation, unemployment, and ethnic or polit- ical persecution. In our interviews, former child soldiers and commanders alike reported that children are more malleable and adaptable. Thus, they are easier to indoctrinate, as their moral development is not yet completed and they tend to listen to authorities without questioning them. Child soldiers are raised in an environment of severe violence, experience it, and subsequently often commit cruelties and atrocities of the worst kind. This repeated exposure to chronic and traumatic stress during development leaves the children with mental and related physical ill-health, notably PTSD and severe personality E.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Cognitive Warfare.Pdf
    1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. ​ ​ Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose.
    [Show full text]
  • Information Warfare on the Web in the Middle East
    Source: Vice INFORMATION WARFARE ON THE WEB IN THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION 1 BRINGING WEB SCIENCE TO THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Created in 2002 at Beirut’s Saint-Joseph University Faculty of Humanities KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Digital Transformation of Middle Eastern Societies New paradigms – Arab Spring – Conflicts – ISIS KEEWARD KNOWLEDGE & EDUCATION The Call For a Science of the Web Berners-Lee Interdisciplinarity (The 2 magics) Mixed methods (Data + Social) New tools to understand the impact of the Web on Society From power laws to people (Social Machines) KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Web Science 2010 – Raleigh, NC. Susan Halford, Cathy Pope, Leslie Carr KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Understanding the web requires knowledge and expertise from the social and human sciences KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Computer science is only one vantage point KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Co-constitution of technology and society The Web impacts society and society impacts the Web KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Heterogeneous actors (ANT – Latour) Radical symmetry between humans and non-humans. “the bureaucrat in the standards agency is just as important as the servers at Google or HTTP”. KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Social and cultural
    [Show full text]
  • 1.Russian Information Weapons; 2.Baltic Department of Defense, Or the US Defenses (Estonia, Latvia, Lithuania) Against Government
    Sponsor: USEUCOM Contract No.: W56KGU-17-C-0010 Project No.: 0719S120 The views expressed in this document are those of the author Three Discussions of Russian Concepts: and do not reflect the official policy or position of MITRE, the 1.Russian Information Weapons; 2.Baltic Department of Defense, or the US Defenses (Estonia, Latvia, Lithuania) against government. Russian Propaganda; and 3.Russia’s Development of Non-Lethal Weapons Author: Timothy Thomas March 2020 Approved for Public Release: Distribution Unlimited. Case Numbers 20-0235; 20-0050; 20-0051; 19-3194; and 20-0145. ©2020 The MITRE Corporation. All rights reserved. McClean, VA 1 FOREWORD Russia has long been captivated by the power of information as a weapon, most notably in a historical sense using propaganda to influence and persuade audiences. With the onset of the information age, the concept’s development and application increased dramatically. The power of information-technologies when applied to weaponry increased the latter’s capabilities due to increased reconnaissance and precision applications. The power of social media was used to influence populations both at home and abroad. Both developments fit perfectly into Russia’s information warfare concept, whose two aspects are information-technical and information-psychological capabilities. Information’s universality, covertness, variety of software and hardware forms and implementation, efficiency of use when choosing a time and place of employment, and, finally, cost effectiveness make it a formidable commodity when assessed as weaponry. Russian efforts to define and use IWes are well documented. In the 1990s there were efforts to define information weapons (IWes) at the United Nations, efforts that failed.
    [Show full text]
  • Terrorism - the Efinitd Ional Problem Alex Schmid
    Case Western Reserve Journal of International Law Volume 36 | Issue 2 2004 Terrorism - The efinitD ional Problem Alex Schmid Follow this and additional works at: https://scholarlycommons.law.case.edu/jil Part of the International Law Commons Recommended Citation Alex Schmid, Terrorism - The Definitional Problem, 36 Case W. Res. J. Int'l L. 375 (2004) Available at: https://scholarlycommons.law.case.edu/jil/vol36/iss2/8 This Article is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Journal of International Law by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. TERRORISM - THE DEFINITIONAL PROBLEM* Alex Schmidt "Increasingly, questions are being raised about the problem of the definition of a terrorist. Let us be wise and focused about this: terrorism is terrorism.. What looks, smells and kills like terrorism is terrorism." - Sir Jeremy Greenstock, British Ambassador to the UnitedNations, in post September 11, 2001 speech' "It is not enough to declare war on what one deems terrorism without giving a precise and exact definition." - PresidentEmile Lahoud,Lebanon (2004)2 "An objective definition of terrorism is not only possible; it is also indispensable to any serious attempt to combat terrorism." - Boaz Ganor,Director of the InternationalPolicy Institutefor Counter- Terrorism3 * Presented at the War Crimes Research Symposium: "Terrorism on Trial" at Case Western Reserve University School of Law, sponsored by the Frederick K. Cox International Law Center, on Friday, Oct. 8, 2004. t The views and opinions expressed in this paper are solely those of the author and do not represent official positions of the United Nations which has not yet reached a consensus on the definition of terrorism.
    [Show full text]
  • Principles of Modern American Counterinsurgency
    Mastering Counterinsurgency: A Workshop Report By Stephen P. Cohen, Senior Fellow, The Brookings Institution and Shuja Nawaz, Director, South Asia Center, The Atlantic Council Brookings Counterinsurgency and Pakistan Paper Series The Brookings Institution and the Pakistan National Defence University, with support from the U.S. National Defense University and the Embassy of Pakistan, Washington, held a three-day workshop that explored American and Pakistani approaches to counterinsurgency (COIN) and low-intensity conflict (LIC) from March 10 to March 12, 2009. The workshop consisted of two days’ discussion, a visit to the Marine Corps Base Quantico for discussions with resident experts, and a visit to the Pentagon for briefings by American civilian and military officials. Subsequently, in early May, the Pakistan army launched its biggest-ever counterinsurgency operation in Swat, which is likely to have had significant consequences for the Northwest Frontier Province (NWFP), the army, and Pakistan itself. The workshop anticipated and addressed many dimensions of this operation, although no one present asserted that it was imminent. The surprisingly rapid developments in Pakistan were, in retrospect, the biggest “takeaway” from the conference, and they should make us humble when it comes to prediction. This report highlights some dimensions of the workshop’s exploration of COIN and LIC, and notes areas of agreement and disagreement among and between American and Pakistani participants. It represents our own views, and not necessarily those of sponsors and participants. The conference papers are available on the Brookings website.1 COIN or LIC? Americans and Pakistanis come to counterinsurgency and low-intensity conflict from different backgrounds and different experiences.
    [Show full text]
  • Cyber Influence Operations: an Overview and Comparative Analysis
    CSS CYBER DEFENSE Cyber Influence Operations: An Overview and Comparative Analysis Zurich, October 2019 Cyber Defense Project (CDP) Center for Security Studies (CSS), ETH Zürich Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, Sean. (2019). Cyber Influence Operations: An Overview and Comparative Analysis, Cyberdefense Trend Analysis, Center for Security Studies (CSS), ETH Zürich. Table of Contents Executive Summary 4 1 Introduction 5 2 Summary of the Debate Around Influence Activities 6 2.1 Influence and Some Historical Examples 6 2.2 The Definition Conundrum of Influence Activities and Techniques 7 3 Cyber & Influence Operations 11 3.1 Definition and Scope of Cyber Influence Operations 11 3.2 Influence Operations and Cyber Influence Operations: Similarities and Differences 11 3.3 Potential & Strategic Implications 19 4 Comparative analysis: American and Russian Cyber Influence Operations 21 4.1 Methodology 21 4.2 Presentation of Results and Discussion 21 4.3 Additional Remarks 26 5 Conclusion 28 6 Glossary 30 7 List of Abbreviations 31 8 Bibliography 32 Cyber Influence Operations: An Overview and Comparative Analysis Executive Summary conflict, CIOs are increasingly also used in times of peace or in the context of mere rivalry.
    [Show full text]
  • Enablers of Hybrid Warfare: the Bulgarian Case
    Hadzhiev, B. (2020). Enablers of hybrid warfare: The Bulgarian case. Journal of Journal International Studies, 13(1), 28-43. doi:10.14254/2071-8330.2020/13-1/2 of International Studies © Foundation Enablers of hybrid warfare: of International Studies, 2020 The Bulgarian case © CSR, 2020 Papers Scientific Boyan Hadzhiev Department of International Relations, University of National and World Economy, Bulgaria [email protected] Abstract. Russian actions in the Crimea since 2014 have increased Central and Eastern Received: September, 2019 European countries concerns and strengthened their fears of becoming the next 1st Revision: target of hybrid attacks. The common understanding of hybrid war as such is January, 2020 usually related to the ambiguous boundaries between peace and war. But this view Accepted: February, 2020 is more about the reluctance of political leaders to recognize that hybrid warfare in its essence is a war with limited political aims carried out using a variety of DOI: military and non-military means. As in any war, the strategy of this warfare aims 10.14254/2071- to foster the sense of insecurity and uncertainty in the opponent. Disinformation, 8330. 2020/13-1/2 subversion, demoralization and division in society, political corruption, provocations and threats are some of the key tools that are being applied with different success in the hybrid warfare. The paper presents a theoretical model consisting of three groups of factors (socio-historical, governmental and international) that create an appropriate environment for conducting a hybrid warfare. Taken together, these prerequisites allow the assessment of the degree of vulnerability to hybrid threats. In Bulgaria, the ongoing debate about Russia's role is developing in the context of the alleged hybrid war that Moscow is conducting in the country.
    [Show full text]
  • SIEGE!! Introduction Demoralization
    SIEGE!! Introduction Castles were primarily structures of war and were built in strife ridden lands. Thus, it was almost inevitable that they would come under attack. Because castles were made with such massive defense fortifications, it was extremely hard to destroy them. Thus, the goal of a siege army was not to destroy a castle, but to penetrate it. However, this task was also extremely hard. Sieges often lasted for months and could even last for years! Castles were protected by at least two walls, and often a moat. The defender's only hope was that either a friendly army would come to help them, or that they could somehow defeat the attackers by themselves. Demoralization The most effective offensive weapon was hunger and demoralization. Besieging forces would attempt to completely surround a castle and cut it off from the outside world. No supplies were allowed in or messages sent out. The situation often got very grim inside the castle. Even though large quantities of supplies were stored inside, they sometimes ran out. Then the defenders were forced to eat anything they could get their hands on. This included rats, grass, dogs, and anything else semi-edible. Essentially, the offending army would attempt to starve and discourage the defenders to the point of surrender. There were many tactics used to accomplish this. They did anything they could to decrease the enemy's morale. Because the defenders depended on reinforcements or a direct attack by allies from another castle, the attacking army almost always embarked on a campaign of misinformation. They would shout that the besieged army's allies were defeated.
    [Show full text]
  • Psychological Operations Principles and Case Studies
    Psychological Operations Principles and Case Studies Editor Frank L. Goldstein, Col, USAF Co-editor Benjamin F. Findley, Jr., Col, USAFR Air University. Press Maxwell Air Force Base, Alabama September 1996 Library of Congress Cataloging-in-Publication Data Psychological operations : principles and case studies j editor, Frank L. Goldstein ; co-editor, Benjamin F. Findley. p. cm. At head of t.p. : AU Shield. "September 1996 ." 1. Psychological warfare-United States . 2. Psychological warfare-Case studies . 1. Goldstein, Frank L., 1945- . 11. Findley, Benjamin F. UB276.P82 1996 355 .3'434-dc20 96-22817 CIP ISBN 1-58566-016-7 Disclaimer This publication was produced in the Department of Defense school environment in the interest of academic freedom and the advancement of national defense-related concepts . The views expressed in this publication are those of the authors and do not reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and policy review authorities and is cleared for public release . For Sale by the Superintendent of Documents US Government Printing Office Washington, DC 20402 Contents Essay Page DISCLAIMER -------------------- ii FOREWORD . Lx PREFACE ______________________ xi PART I Nature and Scope of Psychological Operations (PSYOP) Introduction . 3 1 Psychological Operations : An Introduction Col Frank L. Goldstein, USAF Col Daniel W. Jacobowitz, USAF, Retired 2 Strategic Concepts for Military Operations . , 17 Col Fred W. Walker, USAF, Retired 3 No More Tactical Information Detachments: US Military Psychological Operations in Transition . 25 Col Alfred H. Paddock, Jr., USA, Retired 4 Blending Military and Civilian PSYOP Paradigms .
    [Show full text]