Navy Irregular Warfare and Counterterrorism Operations: Background and Issues for Congress
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
1945 November 26-December 2 from Red Raider to Marine Raider
1 1945 November 26-December 2 From Red Raider to Marine Raider (La Crosse Tribune, 1945 December 2, page 13) (La Crosse Tribune, 1944 March 5, page 7) Julius Wittenberg of La Crosse was a kid from a broken home who made his mark as a high school athlete and went on to become a member of one of the elite fighting units of World War II. Julius C. Wittenberg was born on May 2, 1920, in La Crosse to Frank and Sylvia (Miles) Wittenberg.1 He was named after his grandfather, Julius Wittenberg.2 Frank Wittenberg was a painter and wallpaper hanger.3 Young Julius was just four years old when Sylvia Wittenberg filed for divorce in September 1924 from her husband of 18 years. She alleged that Frank Wittenberg had "repeatedly struck her, used abusive language toward her and failed to properly support her."4 2 Four years later, Frank Wittenberg was living in Waupun, Wisconsin.5 He had taken a job as a guard at the Wisconsin state prison in Waupun. Julius, and his brother, Frank Jr., who was two years older, lived with their father at Waupun, as did a 21-year-old housekeeper named Virginia H. Ebner.6 Sylvia Wittenberg had also moved on. In October 1929, she married Arthur Hoeft in the German Lutheran parsonage in Caledonia, Minnesota.7 Arthur Hoeft of La Crosse was a veteran of World War I.8 In 1924, he had started working for his sister, Helen Mae Hoeft, at the Paramount Photo Shop at 225 Main Street. Helen Hoeft and photographer Millard Reynolds had created the first mail-order photo finishing business in the nation, and she named it Ray's Photo Service. -
Somalia's Insurgents Embrace Twitter As a Weapon
Nxxx,2011-12-15,A,010,Bs-BW,E1 A10 N THE NEW YORK TIMES INTERNATIONAL THURSDAY, DECEMBER 15, 2011 Somalia’s Insurgents EmbraceTHURSDAY, Twitter DECEMBER 15, 2011 as a Weapon By JEFFREY GETTLEMAN NAIROBI, Kenya — Think of it as the Battle of the Tweets. Somalia’s powerful Islamist in- surgents, the Shabab, best known for chopping off hands and starv- ing their own people, just opened a Twitter account, and in the past week they have been writing up a storm, bragging about recent at- tacks and taunting their enemies. “Your inexperienced boys flee from confrontation & flinch in the face of death,” the Shabab wrote in a post to the Kenyan Army. It is an odd, almost downright hypocritical move from brutal militants in one of world’s most broken-down countries, where millions of people do not have enough food to eat, let alone a laptop. The Shabab have vehe- mently rejected Western prac- tices — banning Western music, movies, haircuts and bras, and even blocking Western aid for famine victims, all in the name of their brand of puritanical Islam — only to embrace Twitter, one of the icons of a modern, networked society. On top of that, the Shabab MOHAMED SHEIKH NOR/ASSOCIATED PRESS clearly have their hands full right The Shabab’s fighters are waging a war against Somalia’s interim government and peacekeepers. now, facing thousands of African Union peacekeepers, the Kenyan bab wrote. “Sure your comments lost only 10. African Union offi- statements. He added that the military, the Ethiopian military will invite derision but try to cials later conceded that the Sha- carefully composed e-mails and and the occasional American muster (or feign) courage at bab had been correct. -
Introduction 1 Introduction in a Recent Review of Guy Halsall's Warfare And
introduction 1 INTRODUCTION In a recent review of Guy Halsall’s Warfare and Society in the Barbarian West, 450-900, which is ostensibly meant to be a new standard in the field, Bryan Ward-Perkins approves of the author’s findings, summarizing of early medieval warfare that: It remains very difficult to imagine a seventh- or eighth-century army, except as a hairy and ill-equipped horde, or as a Beowulfian band of heroes, and almost impossible to envisage what such an army did when faced with an obstacle such as a walled town[.]1 Ward-Perkins is being willfully—not to say wonderfully—provocative. He is well aware of the substantial and growing body of scholarship on early medieval warfare that has rendered clichés of hairy barbarians obsolete.2 But quips aside, he highlights a serious gap in existing historiography. While many scholars recognize the similarity (and to varying extents con- tinuity) between Roman and high medieval siege warfare, this has never been demonstrated in any detail. Hence, a notable number of scholars favor a minimalist interpretation of warfare in which the siege is accorded little importance, especially in the West, arguing that post-Roman society lacked the necessary demographic, economic, organizational and even cultural prerequisites. Continuity of military institutions is unquestioned in the case of the East Roman, or Byzantine Empire, but Byzantine siege warfare has received only sporadic attention, and it has been even more marginal in explaining the Islamic expansion.3 This study seeks to examine the organization and practice of siege war- fare among the major successor states of the former Roman Empire: The 1 Ward-Perkins 2006, reviewing Halsall 2003. -
Living Under Drones Death, Injury, and Trauma to Civilians from US Drone Practices in Pakistan
Fall 08 September 2012 Living Under Drones Death, Injury, and Trauma to Civilians From US Drone Practices in Pakistan International Human Rights and Conflict Resolution Clinic Stanford Law School Global Justice Clinic http://livingunderdrones.org/ NYU School of Law Cover Photo: Roof of the home of Faheem Qureshi, a then 14-year old victim of a January 23, 2009 drone strike (the first during President Obama’s administration), in Zeraki, North Waziristan, Pakistan. Photo supplied by Faheem Qureshi to our research team. Suggested Citation: INTERNATIONAL HUMAN RIGHTS AND CONFLICT RESOLUTION CLINIC (STANFORD LAW SCHOOL) AND GLOBAL JUSTICE CLINIC (NYU SCHOOL OF LAW), LIVING UNDER DRONES: DEATH, INJURY, AND TRAUMA TO CIVILIANS FROM US DRONE PRACTICES IN PAKISTAN (September, 2012) TABLE OF CONTENTS ACKNOWLEDGMENTS I ABOUT THE AUTHORS III EXECUTIVE SUMMARY AND RECOMMENDATIONS V INTRODUCTION 1 METHODOLOGY 2 CHALLENGES 4 CHAPTER 1: BACKGROUND AND CONTEXT 7 DRONES: AN OVERVIEW 8 DRONES AND TARGETED KILLING AS A RESPONSE TO 9/11 10 PRESIDENT OBAMA’S ESCALATION OF THE DRONE PROGRAM 12 “PERSONALITY STRIKES” AND SO-CALLED “SIGNATURE STRIKES” 12 WHO MAKES THE CALL? 13 PAKISTAN’S DIVIDED ROLE 15 CONFLICT, ARMED NON-STATE GROUPS, AND MILITARY FORCES IN NORTHWEST PAKISTAN 17 UNDERSTANDING THE TARGET: FATA IN CONTEXT 20 PASHTUN CULTURE AND SOCIAL NORMS 22 GOVERNANCE 23 ECONOMY AND HOUSEHOLDS 25 ACCESSING FATA 26 CHAPTER 2: NUMBERS 29 TERMINOLOGY 30 UNDERREPORTING OF CIVILIAN CASUALTIES BY US GOVERNMENT SOURCES 32 CONFLICTING MEDIA REPORTS 35 OTHER CONSIDERATIONS -
Countering Terrorism in East Africa: the U.S
Countering Terrorism in East Africa: The U.S. Response Lauren Ploch Analyst in African Affairs November 3, 2010 Congressional Research Service 7-5700 www.crs.gov R41473 CRS Report for Congress Prepared for Members and Committees of Congress Countering Terrorism in East Africa: The U.S. Response Summary The United States government has implemented a range of programs to counter violent extremist threats in East Africa in response to Al Qaeda’s bombing of the U.S. embassies in Tanzania and Kenya in 1998 and subsequent transnational terrorist activity in the region. These programs include regional and bilateral efforts, both military and civilian. The programs seek to build regional intelligence, military, law enforcement, and judicial capacities; strengthen aviation, port, and border security; stem the flow of terrorist financing; and counter the spread of extremist ideologies. Current U.S.-led regional counterterrorism efforts include the State Department’s East Africa Regional Strategic Initiative (EARSI) and the U.S. military’s Combined Joint Task Force – Horn of Africa (CJTF-HOA), part of U.S. Africa Command (AFRICOM). The United States has also provided significant assistance in support of the African Union’s (AU) peace operations in Somalia, where the country’s nascent security forces and AU peacekeepers face a complex insurgency waged by, among others, Al Shabaab, a local group linked to Al Qaeda that often resorts to terrorist tactics. The State Department reports that both Al Qaeda and Al Shabaab pose serious terrorist threats to the United States and U.S. interests in the region. Evidence of linkages between Al Shabaab and Al Qaeda in the Arabian Peninsula, across the Gulf of Aden in Yemen, highlight another regional dimension of the threat posed by violent extremists in the area. -
The Silent Sentinel Would Like to Wish Our Jewish Readers L'shana Tova
The Silent Sentinel, October 2011 Page 1 American Submariners Inc. Non-Profit Org. 4370 Twain Ave. U.S. Postage Paid San Diego, CA 92120-3404 Permit No. 445 Chula Vista, CA RETURN SERVICE REQUESTED The Silent Sentinel October 2011 Our Creed and Purpose To perpetuate the memory of our shipmates who gave their lives in the pursuit of their duties while serving their country. That their dedication, deeds, and supreme sacrifice be a constant source of motivation toward greater accomplishments. Pledge loyalty and patriotism to the United States of America and its Constitution. In addition to perpetuating the memory of departed shipmates, we shall provide a way for all Submariners to gather for the mutual benefit and enjoyment. Our common heritage as Submariners shall be Strengthened by camaraderie. We support a strong U.S. Submarine Force. The organization will engage in various projects and deeds that will bring about the perpetual remembrance of those shipmates who have given the supreme sacrifice. The organization will also endeavor to educate all third parties it comes in contact with about the services our submarine brothers performed and how their sacrifices made possible the freedom and lifestyle we enjoy today. The Silent Sentinel would like to wish our Jewish readers L'Shana Tova. A Happy and Healthy New Year, 5772. Page 2 The Silent Sentinel, October 2011 U.S. Submarine Veterans San Diego Base Base Commander Membership -- Change of Address Treasurer Bob Bissonnette Ron Gorence David Ball 1525 Walbollen Street 2563 Roseview Place 3804 Wildwood Road Spring Valley, CA 91977 San Diego, CA 92105 San Diego, CA 92107-3750 (H) 619-644-8993 Home--(619) 264-6995. -
Winter 2019 Full Issue the .SU
Naval War College Review Volume 72 Article 1 Number 1 Winter 2019 2019 Winter 2019 Full Issue The .SU . Naval War College Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Naval War College, The .SU . (2019) "Winter 2019 Full Issue," Naval War College Review: Vol. 72 : No. 1 , Article 1. Available at: https://digital-commons.usnwc.edu/nwc-review/vol72/iss1/1 This Full Issue is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Naval War College: Winter 2019 Full Issue Winter 2019 Volume 72, Number 1 Winter 2019 Published by U.S. Naval War College Digital Commons, 2019 1 Naval War College Review, Vol. 72 [2019], No. 1, Art. 1 Cover Aerial view of an international container cargo ship. In “Ships of State?,” Christopher R. O’Dea describes how China COSCO Shipping Corporation Limited has come to control a rapidly expanding network of ports and terminals, ostensibly for commercial purposes, but has thereby gained the ability to project power through the increased physical presence of its naval vessels—turning the oceans that historically have protected the United States from foreign threats into a venue in which China can challenge U.S. interests. Credit: Getty Images https://digital-commons.usnwc.edu/nwc-review/vol72/iss1/1 2 Naval War College: Winter 2019 Full Issue NAVAL WAR COLLEGE REVIEW Winter 2019 Volume 72, Number 1 NAVAL WAR COLLEGE PRESS 686 Cushing Road Newport, RI 02841-1207 Published by U.S. -
News Release
HOT SPRINGS CONVENTION & VISITORS BUREAU 134 Convention Boulevard • Hot Springs National Park, Arkansas 71901 1-800-922-6478 • 501-321-2027 • FAX 501-620-5008 www.hotsprings.org ________________________________________________________________________ NEWS RELEASE March 2, 2011 FOR IMMEDIATE RELEASE CONTACT: Paul Johnson 501/225-5937 [email protected] New Details Discovered About Irish-immigrant War Hero Who Will Be Honored in Hot Springs Ceremony March 14 HOT SPRINGS NATIONAL PARK, Arkansas — New details have been discovered about the life of Irish immigrant John King, one of only 19 people who have received two Congressional Medals of Honor and who will be honored March 14 with a ceremony at his Hot Springs gravesite. Governor Mike Beebe and Irish Consul General Martin Rouine have been invited to attend the ceremony in Calvary Cemetery at 2 p.m. March 14. King was buried there after he died in May 1938 while being treated for pneumonia at the Army & Navy General Hospital. The March 14 ceremony is being coordinated by the Hot Springs Convention and Visitors Bureau with the assistance of the Thadeus H. Caraway Post 2278 of the Veterans of Foreign Wars and Post Commander Ralph Faresc. The VFW is coordinating the military portion of the event and several other local groups have asked to be involved with the ceremony. Calvary Cemetery, the local Catholic cemetery is located at the intersection of Greenwood Avenue and Third Street. The shortest route is to take Central Avenue to Greenwood and turn west. Details about King’s life and the circumstances surrounding his two Medals of Honor were extremely sketchy until Elizabeth Robbins, executive director of the Garland County Historical Society, began an intensive search for more information. -
The Jersey Bounce Fall 2009
USS New Jersey Veterans, Inc. “THE JERSEY BOUNCE” Fall 2009 Issue Email - WWW.USSNEWJERSEY.ORG LPD 21 USS NEW YORK The 22nd reunion was held at the Crowne Plaza Riverfront Hotel in Jacksonville, Florida, October 7th through October 11th, 2009. The organization enjoyed a very successful reunion. The Memorial Service, St. Augustine and Jacksonville tours, Dinner Cruise, Welcome Aboard Dinner, and a Dinner Dance Banquet were well at- tended. We want to thank the reunion committee for a job well done. The reunion committee worked hard in providing this annual opportunity for our shipmates to become reacquainted with old friends and shipmates. These reunions are a great opportunity to make new friends, or just reminisce sea stories of bygone days. The days of the battleship, the most feared dreadnaught on the high seas, are long gone, but the battleship sailors live on and on. Newer and more deadly ships are joining the fleet providing firepower that we can- not imagine only conjecture. USS New Jersey Veterans Inc Officer & Directors President / Director Vice President / Director Joe DiMaria Ernest Dalton 645 Brisa Ct. 7143 Rolling Hill Lane Chesapeake, VA 23322 San Antonio, Texas 78227 757-549-2178 210-275-7886 [email protected] [email protected] Secretary/Director Treasurer/Director Membership/Director A.J. Smith John Pete Vance Steve Sheehan 538 Kiddsville Road 1541 Hayden Rd 1209 Cumberland RD Fishersville, VA 22939 Deland, FL 32724 Abington, PA 19001 540-943-2862 386-736-3231 215-887-7583 [email protected] [email protected] [email protected] Master at Arms Liaison/Director Small Stores/Director Joe Porambo Mark Babcock John Pete Vance 1503 Elder Ave 5231 El Monte St. -
Woman As a Category / New Woman Hybridity
WiN: The EAAS Women’s Network Journal Issue 1 (2018) The American Woman Warrior: A Transnational Feminist Look at War, Imperialism, and Gender Agnieszka Soltysik Monnet ABSTRACT: This article examines the issue of torture and spectatorship in the film Zero Dark Thirty through the question of how it deploys gender ideologically and rhetorically to mediate and frame the violence it represents. It begins with the controversy the film provoked but focuses specifically on the movie’s representational and aesthetic techniques, especially its self-awareness about being a film about watching torture, and how it positions its audience in relation to these scenes. Issues of spectator identification, sympathy, interpellation, affect (for example, shame) and genre are explored. The fact that the main protagonist of the film is a woman is a key dimension of the cultural work of the film. I argue that the use of a female protagonist in this film is part of a larger trend in which the discourse of feminism is appropriated for politically conservative and antifeminist ends, here the tacit justification of the legally murky world of black sites and ‘enhanced interrogation techniques.’ KEYWORDS: gender; women’s studies; torture; war on terror; Abu Ghraib; spectatorship; neoliberalism; Angela McRobbie; Some of you will recognize my title as alluding to Maxine Hong Kingston’s The Woman Warrior (1975), a fictionalized autobiography in which she evokes the fifth-century Chinese legend of a girl who disguises herself as a man in order to go to war in the place of her frail old father. Kingston’s use of this legend is credited with having popularized the story in the United States and paved the way for the 1998 Disney adaptation. -
Ships!), Maps, Lighthouses
Price £2.00 (free to regular customers) 03.03.21 List up-dated Winter 2020 S H I P S V E S S E L S A N D M A R I N E A R C H I T E C T U R E 03.03.20 Update PHILATELIC SUPPLIES (M.B.O'Neill) 359 Norton Way South Letchworth Garden City HERTS ENGLAND SG6 1SZ (Telephone; 01462-684191 during my office hours 9.15-3.15pm Mon.-Fri.) Web-site: www.philatelicsupplies.co.uk email: [email protected] TERMS OF BUSINESS: & Notes on these lists: (Please read before ordering). 1). All stamps are unmounted mint unless specified otherwise. Prices in Sterling Pounds we aim to be HALF-CATALOGUE PRICE OR UNDER 2). Lists are updated about every 12-14 weeks to include most recent stock movements and New Issues; they are therefore reasonably accurate stockwise 100% pricewise. This reduces the need for "credit notes" and refunds. Alternatives may be listed in case some items are out of stock. However, these popular lists are still best used as soon as possible. Next listings will be printed in 4, 8 & 12 months time so please indicate when next we should send a list on your order form. 3). New Issues Services can be provided if you wish to keep your collection up to date on a Standing Order basis. Details & forms on request. Regret we do not run an on approval service. 4). All orders on our order forms are attended to by return of post. We will keep a photocopy it and return your annotated original. -
Applying Traditional Military Principles to Cyber Warfare
2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].