Leveraging Science in the Manoeuvrist Approach to Counterinsurgency Operations
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Department of Military Science 1
Department of Military Science 1 DEPARTMENT OF MILITARY SCIENCE Scholarships and Allowances Scholarships are available for two, three, or four years. Students enrolled in the Advanced Course receive a tax-free subsistence allowance each month. They also receive about $700 for attending a five-week Advanced Camp (between the junior and senior year). Total remuneration for the final two years is approximately $7,500. All uniforms and equipment are furnished at no cost to students. Military Science Extracurricular Activities In addition to ROTC classes, the Military Science Department offers unique opportunities in various activities. These activities are designed to create new and lasting friendships as well as to develop leadership skills. The extracurricular activities are: the Color Guard, Intramural Sports, and Ranger Challenge Team (the varsity sport of Cadet Command). For further information, contact the Military Science Department, Room 217, Gullickson Hall, or call 304-696-6450. Summer Training Opportunities In addition to the Leaders Training Course and the Leader Development and Assessment Course, ROTC offers other training opportunities to broaden experience and leadership. These include the Basic Airborne Course, Air Assault Course, Mountain Warfare, Northern Warfare, United Kingdom Officer Training Course, Cadet Troop Leadership Training, Drill Cadet Leadership Training, Army Science Board, Cadet Intern Program, Nurse Summer Training Program, JFK Special Warfare Internship Program and Cultural Leadership Program. Some of these programs are conducted outside of the continental United States and with foreign countries. All programs are competitive and require the approval of the Professor of Military Science. Some cadets may also elect to train with a local Army Reserve or National Guard unit, each with additional training opportunities and benefits. -
FUTURE WARFARE Anthology
FUTURE WARFARE Anthology Revised Edition Major General Robert H. Scales, Jr. U.S. Army War College Carlisle barracks, pennsylvania ***** The views expressed within this publication are those of the authors and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government. This report is cleared for public release; distribution is unlimited. ***** ISBN 1-58487-026-5 ii CONTENTS Foreword General Donn A. Starry U.S. Army, Retired ............................. v Prologue Major General Robert H. Scales, Jr . .............. ix Revised Acknowledgements ........................ xi Introduction to the First Edition Dr. Williamson Murray ....................... xiii Preface to the First Edition Major General Robert H. Scales, Jr. ............. xix 1. Speed and Power: Primal Forces in the New American Style of War .......................... 1 2. Cycles of War ................................. 9 3. Preparing For War in the 21st Century with Lieutenant General Paul K. Van Riper, USMC, Retired ............................... 23 4. Adaptive Enemies: Dealing with the Strategic Threat after 2010 ............................. 41 5. A Sword with Two Edges: Maneuver in 21st Century Warfare .............. 65 6. From Korea to Kosovo : How America’s Army Has Learned to Fight Limited Wars in the Precision Age: ......................... 89 7. Clashes of Visions: Sizing and Shaping Our Forces in a Fiscally Constrained Environment .......... 111 8. America’s Army: Preparing For Tomorrow’s Security Challenges ......................... 125 9. The Dawn of a New Age of Warfare: And the Clarion Call for Enhanced Maneuver Capabilities ........................ 145 iii 10. The Annual Report for The Army After Next Project to the Chief of Staff of the Army ......... 153 11. The Army After Next: Intertwining Military Art, Science, and Technology Out to the Year 2025 with Dr. -
Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II. -
The Relationship of Joint Vision 2010'S Concepts of Dominant Maneuver and Precision Engagement
CONTEMPORARY PROFESSIONAL MILITARY WRITING: SELECTED STUDENT PAPERS FROM THE U.S. ARMY'S PROFESSIONAL SCHOOLS Yin and Yang: The Relationship of Joint Vision 2010's Concepts of Dominant Maneuver and Precision Engagement by Major William D. Wunderle, USA Student, U.S. Army Command and General StaffCollege, AY 1997-98 No. 98-4 November 1998 The Contemporary Professional Military Writing series is designed to provide an outlet for original work done by students at the U.S. Army War College, Command and General Staff College and Sergeants Major Academy. The staff and faculty of the respective institutions select the papers, and the Institute of Land Warfare distributes them as submitted. The content represents the personal opinions of the author and not necessarily the position of the Association of the United States Army or its members. Distributed by The Institute of Land Warfare Association of the United States Army 2425 Wilson Boulevard, Arlington, Virginia 22201 YIN AND YANG: THE RELATIONSHIP OF JOINT VISION 2010'S CONCEPTS OF DOMINANT MANEUVER AND PRECISION ENGAGEMENT A MONOGRAPH BY Major William D. Wunderle Infantry School of Advanced Military Studies United States Army Command and General Staff College Fort Leavenworth, Kansas Second Term A Y 97-98 Approved for Public Release Distribution is Unlimited Abstract YIN AND YANG: TilE RELATIONSHIP OF JOINT VISION 20 lO'S CONCEPTS OF DOMINANT MANEUVER AND PRECISION ENGAGEMENT by Major William D. Wunderle, 51 pages. Throughout the history of warfare, there have been periods when technological developments have dramatically affected the balance between firepower and maneuver on the battlefield. When the new technology enhanced the effectiveness of firepower, the forces with this advantage tended to reexamine their military's doctrine and procedures to optimize the new technology. -
Applying Traditional Military Principles to Cyber Warfare
2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1]. -
Download (4MB)
https://theses.gla.ac.uk/ Theses Digitisation: https://www.gla.ac.uk/myglasgow/research/enlighten/theses/digitisation/ This is a digitised version of the original print thesis. Copyright and moral rights for this work are retained by the author A copy can be downloaded for personal non-commercial research or study, without prior permission or charge This work cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Enlighten: Theses https://theses.gla.ac.uk/ [email protected] The Emperor’s New Clothes” Manoeuvre Warfare and Operational Art Nils Jorstad Thesis submitted for the Degree of Master of Philosophy Department of Modem History University of Glasgow April 2004 ©Nils Jorstad 2004 ProQuest N um ber: 10390751 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 10390751 Published by ProQuest LLO (2017). C o pyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code Microform Edition © ProQuest LLO. -
American War and Military Operations Casualties: Lists and Statistics
American War and Military Operations Casualties: Lists and Statistics Updated July 29, 2020 Congressional Research Service https://crsreports.congress.gov RL32492 American War and Military Operations Casualties: Lists and Statistics Summary This report provides U.S. war casualty statistics. It includes data tables containing the number of casualties among American military personnel who served in principal wars and combat operations from 1775 to the present. It also includes data on those wounded in action and information such as race and ethnicity, gender, branch of service, and cause of death. The tables are compiled from various Department of Defense (DOD) sources. Wars covered include the Revolutionary War, the War of 1812, the Mexican War, the Civil War, the Spanish-American War, World War I, World War II, the Korean War, the Vietnam Conflict, and the Persian Gulf War. Military operations covered include the Iranian Hostage Rescue Mission; Lebanon Peacekeeping; Urgent Fury in Grenada; Just Cause in Panama; Desert Shield and Desert Storm; Restore Hope in Somalia; Uphold Democracy in Haiti; Operation Enduring Freedom (OEF); Operation Iraqi Freedom (OIF); Operation New Dawn (OND); Operation Inherent Resolve (OIR); and Operation Freedom’s Sentinel (OFS). Starting with the Korean War and the more recent conflicts, this report includes additional detailed information on types of casualties and, when available, demographics. It also cites a number of resources for further information, including sources of historical statistics on active duty military deaths, published lists of military personnel killed in combat actions, data on demographic indicators among U.S. military personnel, related websites, and relevant CRS reports. Congressional Research Service American War and Military Operations Casualties: Lists and Statistics Contents Introduction .................................................................................................................................... -
The American Military Experience the Principles of War
The American Military Experience The Principles of War Wayne E. Sirmon, M.A.Ed., M.A. Adjunct Assistant Professor of History University of Mobile The Nine Principles of War (As recognized by the U. S. Army) Objective Offensive Maneuver Mass Economy of Force Unity of Command Security Surprise Simplicity The Principles of War (As recognized by the U. S. Army) Objective DirectOffensive every military operation toward a clearly defined, decisive and attainable objective. The ultimateManeuver military purpose of war is the destruction of the enemy's ability to fight and will to fight.Mass Economy of Force Unity of Command Security Surprise Simplicity The Principles of War (As recognized by the U. S. Army) Objective Offensive Seize,Maneuver retain, and exploit the initiative. Offensive action is the most effective and decisive way to attain a clearlyMass defined common objective. Offensive operations are the means by which a military forceEconomy seizes and ofholds Force the initiative while maintainingUnity freedom of Command of action and achieving decisive results. This is fundamentally true across all levelsSecurity of war. Surprise Simplicity The Principles of War (As recognized by the U. S. Army) Objective Offensive Maneuver Place theMass enemy in a position of disadvantage through the flexible application of combat power. Maneuver isEconomy the movement of ofForce forces in relation to the enemy to gain positional advantage. Effective maneuverUnity keeps of Command the enemy off balance and protects the force.Security It is used to exploit successes, to preserve freedom of action, and to reduce vulnerability. SurpriseIt continually poses new problems for the enemy by rendering his actions ineffective, eventually leadingSimplicity to defeat. -
The Art of War in the Middle Ages, A.D. 378-1515
Digitized by the Internet Archive in 2007 with funding from IVIicrosoft Corporation http://www.archive.org/details/artofwarinmiddleOOomanuoft otl^xan: ^rt§e ^ssag 1884 THE ART OF WAR IN THE MIDDLE AGES PRINTED BY HORACE HART, PRINTER TO THE UNIVERSITY THE ART OF WAR [N THE MIDDLE AGES A.D. 37^—15^5 BY C. W. C. OMAN, B.A. FELLOW OF ALL SOULS COLLEGE WITH MAPS AND PLANS OXFORD B. H. BLACKWELL, 50 BROAD STREET LONDON T. FISHER UNWIN, 26 PATERNOSTER SQUARE 1885 [^// rights reserved '\ O/M The Author desires to acknowledge much kind help received in the revision and correction of this Essay from the Rev. H. B. George, of New College, and Mr. F. York Powell, of Christ Church. 6/ 37 05 , — — CONTENTS. PAGE ' Introduction . i CHAPTER 1. The Transition from Roman to Medieval forms in War (a.d. 378-582). Disappearance of the Legion.—Constantine's reorgajiization. The German tribes . — Battle of Adrianople.—Theodosius accepts its teaching.—Vegetius and the army at the end of the fourth century. —The Goths and the Huns. Army of the Eastern Empire.— Cavalry all-important . 3— 14 CHAPTER n. The Early Middle Ages (a.d. 476-1066). Paucity of Data for the period.—The Franks in the sixth cen- tury.—Battle of Tours.—^Armies of Charles the Great. The Franks become horsemen.—The Northman and the Magyar.—Rise of Feudalism.—The Anglo-Saxons and their wars.—The Danes and the Fyrd.—Military importance of the Thegnhood.—The House-Carles.—Battle of Hastings . Battle of Durazzo 15 — 27 W — VI CONTENTS. -
Lessons from Others for Future U.S. Army Operations in and Through the Information Environment
C O R P O R A T I O N Lessons from Others for Future U.S. Army Operations in and Through the Information Environment Christopher Paul, Colin P. Clarke, Michael Schwille, Jakub P. Hlávka, Michael A. Brown, Steven S. Davenport, Isaac R. Porche III, Joel Harding For more information on this publication, visit www.rand.org/t/RR1925z1 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9815-3 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2018 RAND Corporation R® is a registered trademark. Cover photos (clockwise from top left): Giorgio Montersino via Flickr (CC BY-SA 2.0); U.S. Air Force photo by Airman 1st Class Adawn Kelsey; U.S. Air Force photo by Tech Sgt John Gordinier; U.S. Air National Guard photo by Master Sgt Andrew J. Moseley; Russian Ministry of Defence (CC BY 4.0); North Korean national media Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
The Art of War: the Protection of Cultural Property During the "Siege" of Sarajevo (1992-95)
DePaul Journal of Art, Technology & Intellectual Property Law Volume 14 Issue 1 Special Section: Art and War, 2004 Article 5 The Art of War: The Protection of Cultural Property during the "Siege" of Sarajevo (1992-95) Megan Kossiakoff Follow this and additional works at: https://via.library.depaul.edu/jatip Recommended Citation Megan Kossiakoff, The Art of War: The Protection of Cultural Property during the "Siege" of Sarajevo (1992-95), 14 DePaul J. Art, Tech. & Intell. Prop. L. 109 (2004) Available at: https://via.library.depaul.edu/jatip/vol14/iss1/5 This Case Notes and Comments is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Journal of Art, Technology & Intellectual Property Law by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. Kossiakoff: The Art of War: TheCOMMENT Protection of Cultural Property during the "S THE ART OF WAR: THE PROTECTION OF CULTURAL PROPERTY DURING THE "SIEGE" OF SARAJEVO (1992-95) I. INTRODUCTION Throughout the night of August 25, 1992, shells from Serb gunners fell on the National and University Library of Bosnia and Herzegovina in Sarajevo. The attack set off a blaze fueled by a collection representing hundreds of years of Bosnian history and culture. Librarians and community members, risking sniper fire, formed a human chain to move books to safety.' Despite emergency efforts, ninety percent of the collection was ash by daybreak.2 Unfortunately, this incident was not unique. The destruction of cultural artifacts during the "Siege" of Sarajevo was a loss not only to Bosnia,3 but also to the heritage of the world which now suffers a gap that cannot be closed.