SAMS Monograph Body

Total Page:16

File Type:pdf, Size:1020Kb

SAMS Monograph Body Hybrid Threat: Is the HBCT Ready for Future Warfare? A Monograph by MAJ Eric N. Lindsay U.S. Army School of Advanced Military Studies United States Army Command and General Staff College Fort Leavenworth, Kansas AY 2009 Approved for Public Release; Distribution is Unlimited Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 3. DATES COVERED (From - To) 03-12-2009 SAMS Monograph 20 JAN- 03 DEC 2009 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Hybrid Threat: Is the HBCT Ready for Future Warfare 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Lindsay, Eric N., MAJ 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT U.S. Army Command and General Staff College NUMBER ATTN: ATZL-SWD-GD Fort Leavenworth, KS 66027- 2301 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; Distribution is unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This monograph analyzes a Heavy Brigade Combat Team’s (HBCT) preparedness to counter a hybrid threat. The analysis consists initially of developing broad understanding of hybrid warfare/ threat by reviewing numerous proposed definitions. With a general understanding of hybrid warfare/ threat determined, subsequent analysis identified six tenets of hybrid threat from the Joint Forces Command (JFCOM) approved definition. The author’s initial hypothesis is that an HBCT is prepared to confront a hybrid threat. Research supports this hypothesis. U.S. Army doctrine prescribing full spectrum operations is feasible. DOTMLPF analysis indicates that an HBCT is capable of countering an opponent that can simultaneously conduct major combat operations, irregular warfare and criminality, adapting to an HBCT’s actions, reactions and counter-reactions. This capability is however, limited by the scale of an HBCT’s size and capabilities. What is less clear is the validity of the theory of hybrid threat. As illustrated by the research in this monograph, an HBCT can adaptively and simultaneously counter major combat operations, irregular warfare, and criminal activity dependent on the scale of enemy activity. Theoretically, if an HBCT is constrained by scale it is logical that a hybrid threat is so limited. 15. SUBJECT TERMS Hybrid threat, hybrid warfare, DOTMLPF, HBCT, doctrine, contemporary operating environment 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON OF ABSTRACT OF PAGES Stephan J. Banach COL,USA a. REPORT b. ABSTRACT c. THIS PAGE UU 43 19b.US TELEPHONEA NUMBER (include area U U U code) 913-758-3302 Standard Form 298 (Rev . 8-98) Prescribed by ANSI Std. Z39.18 SCHOOL OF ADVANCED MILITARY STUDIES MONOGRAPH APPROVAL MAJ Eric N. Lindsay Title of Monograph: Hybrid Threat: Is the HBCT Ready for Future Warfare Approved by: __________________________________ Monograph Director Thomas A. Bruscino, Ph.D. ___________________________________ Director, Stefan Banach, COL, IN School of Advanced Military Studies ___________________________________ Director, Robert F. Baumann, Ph.D. Graduate Degree Programs ii Abstract HYBRID THREAT: IS THE HBCT READY FOR FUTURE WARFARE? by Major Eric N. Lindsay, U.S. Army 44 pages. This monograph analyzes the United States Army’s preparedness to counter a hybrid threat. The analysis consists initially with developing broad understanding of hybrid warfare/ threat by reviewing numerous proposed definitions. With a general understanding of hybrid warfare/ threat determined, subsequent analysis identified six tenets of hybrid threat from the Joint Forces Command (JFCOM) approved definition. These tenets are major combat operations, irregular warfare, criminality, terrorism, simultaneity and adaptability. Definitions of the hybrid threat tenets come principally from joint and U.S. Army doctrine. Subsequently an analysis of doctrine, organization, training, materiel, leadership & education, personnel, and facilities (DOTMLPF) analysis in accordance with the Joint Capabilities and Integration and Development System (JCIDS) is conducted of a heavy brigade combat team’s (HBCT) ability to counter the tenets of hybrid warfare/ threat. The author’s initial hypothesis is that an HBCT is prepared to confront a hybrid threat. Research supports this hypothesis. U.S. Army doctrine prescribing full spectrum operations is feasible. DOTMLPF analysis indicates that an HBCT is capable of countering an opponent that can simultaneously conduct major combat operations, irregular warfare and criminality, adapting to an HBCT’s actions, reactions and counter-reactions. This capability is however, limited by the scale of an HBCT’s size and capabilities. The review of doctrine relative to irregular warfare determined that the definitions of irregular warfare and terrorism are nearly synonymous. For the purposes of this monograph, terrorism is a tactic of irregular warfare, because doctrinally an HBCT does not conduct counterterrorism. This is problematic because if the concept of hybrid warfare/ threat is feasible; U.S. forces must maintain the capability to counter all its tenets. The HBCT’s capability to counter a hybrid threat is clear; full spectrum operations enable the heavy brigade combat team to respond to an antagonist employing hybrid warfare tactics. What is less clear is the validity of the theory of hybrid threat. Vast numbers of academics and military intellectuals have varying opinions each of which suggesting a hybrid threat can adaptively and simultaneously conduct major combat operations, irregular warfare and criminal activity. As illustrated by the research in this monograph, an HBCT can adaptively and simultaneously counter major combat operations, irregular warfare, and criminal activity dependent on the scale of enemy activity. Theoretically, if an HBCT is constrained by scale it is logical that a hybrid threat is so limited. iii Table of Contents Introduction ................................................................................................................................. 1 Major Combat Operations and Irregular Warfare ..................................................................... 13 Major Combat Operations ..................................................................................................... 14 Irregular Warfare ................................................................................................................... 16 Criminality and Terrorism ......................................................................................................... 23 Criminality ............................................................................................................................. 23 Terrorism ............................................................................................................................... 26 Simultaneity and Adaptability ................................................................................................... 28 Simultaneity ........................................................................................................................... 28 Adaptability ........................................................................................................................... 33 Conclusion ................................................................................................................................. 36 Feasibility .............................................................................................................................. 36 iv Introduction “We must train ourselves for the unexpected in place of training others for the cut and dried”.1 -Major General J.F.C. Fuller Generalship: Its Diseases and Their Cure, a Study of the Personal Factor in Command The United States Army has recently undergone transformational change. This change was a necessary and evolutionary development from a Cold War force oriented towards high intensity interstate warfare to a post-Cold War, full spectrum force. Was that change sufficient? In the absence of a peer or near-peer competitor, the United States Army has struggled to identify a threat on which to orient its doctrine, organization, training, materiel, leadership, personnel and facilities (DOTMLPF). The ambiguous nature of the post Cold War international security environment has resulted in a glut of theoretical classifications including military operations other than war (MOOTW), Fourth Generation
Recommended publications
  • Defining China's Political Warfare
    To Win without Fighting: Defining China’s Political Warfare Kerry K. Gershaneck Expeditions with MCUP, 2020, pp. 1-34 (Article) Published by Marine Corps University Press For additional information about this article https://muse.jhu.edu/article/795834/summary [ Access provided at 25 Sep 2021 18:32 GMT with no institutional affiliation ] This work is licensed under a Creative Commons Attribution 4.0 International License. To Win without Fighting Defining China’s Political Warfare Professor Kerry K. Gershaneck1 https://doi.org/10.36304/ExpwMCUP.2020.04 Abstract: The People’s Republic of China (PRC) is at war with the world. Chief among the PRC’s weapons in its fight against the United States and many of its allies and partner nations are complex, unrelenting political warfare campaigns, often waged with difficult-to-recognize strategies, tactics, techniques, and procedures. This article will underscore the terms and definitions needed to understand PRC political warfare and offer a historical overview of the PRC’s development of its political warfare capabilities. A solid understanding of both subjects will help American institutions and citizens alike strengthen their ability to identify, deter, counter, and defeat the PRC political warfare threat. Professor Kerry K. Gershaneck is a visiting scholar at the Graduate Institute of East Asian Studies, National Chengchi University in Taiwan; a senior research associate at the Thammasat University Faculty of Law in Thailand; and an adjunct professor with the University of Canberra’s Institute for Governance & Policy Analysis in Australia. He was the distinguished visiting professor at both Chulachomklao Royal Military Academy and the Royal Thai Naval Academy in Thailand for six years.
    [Show full text]
  • From Weapons of the Weak to War by Different Means Developments of Hybrid Warfare Cav. Capt. (NLD-A, OF-2) John G.L.J. Jacobs Se
    From Weapons of the Weak to War by Different Means Developments of Hybrid Warfare Cav. Capt. (NLD-A, OF-2) John G.L.J. Jacobs September 2017 (original) December 2019 (revision) [INTENTIONALLY LEFT BLANK] From Weapons of the Weak to War by Different Means Developments of Hybrid Warfare Cav. Capt John G.L.J. Jacobs S4477774 Radboud University, Nijmegen, NLD Master in Human Geography with a specialization in Conflict, Territories and Identities Supervisor: Dr R. Malejacq Research Internship at the Netherlands Defence Academy (NLDA), Breda, NLD Internship Supervisor: Prof Dr Ir G.E. Frerks Nijmegen, 14 September 2017 (original) Nijmegen, 02 December 2019 (revision) [INTENTIONALLY LEFT BLANK] i Acknowledgements When writing about asymmetrical warfare, T.E. Lawrence remarked that it was like eating soup with a knife, messy and slow. This master thesis is the outcome of the Human Geography Master from Radboud University Nijmegen, and its specialization in Conflicts, Territories and Identities. It is a product of an academic development combining Radboud University’s master in Human Geography and three independent standing academic interactions with the Netherlands Defence Academy (Breda/Den Helder) and three summer schools at Utrecht University, King’s College London and University of Cyprus respectively. Combined, they represent five years of studying and arguing about conflict and war. It goes without saying that this product is not achieved independently, and to the extent that the writing of this thesis was not like eating soup with a knife, I am thankful to many, and wish to highlight a few, and thank for their contributions over the past years.
    [Show full text]
  • Countering Hybrid Warfare So What for the Future Joint Force?
    Euromaidan demonstrations in Kiev in 2013. To prevent or discourage such "color revolutions" and maintain control over its arc of influence, Russia has developed a suite of sophisticated coercive and influence techniques often referred to as "hybrid." (Wikimedia/ Mstyslav Chernov). 82 | FEATURES PRISM 8, NO. 2 Countering Hybrid Warfare So What for the Future Joint Force? By Sean Monaghan We need to do three things. First, accept what is happening rather than pretend it is not happening. Second, understand the tactics being used. Third, act intelligently and consistently to defend Western states, values, and interests from this insidious form of conflict —Bob Seeley and Alya Shandra, 20181 f strategy, in whatever era, is “the art of creating power,” then so-called hybrid warfare is merely the latest attempt by revisionist actors to create and exploit a form of power to meet their ends.2 Successfully coun- tering these challenges will require careful thought and calibrated strategy. This article aims to generate Ithe conceptual clarity required for nations to, in the words of one member of Parliament, “act intelligently and consistently” to counter the rising challenge of hybrid warfare emanating from a variety of revisionist actors.3 More specifically, its purpose is to establish conceptual foundations for the contribution of defense forces to countering all hybrid challenges to national security. In doing so, it takes the perspective of the role of defense within a wider, whole-of-government approach, where defense will play a distinct but varying role, subordi- nate to national strategy. The article is divided into five parts. The first part addresses the language problem of hybrid challenges by briefly tracing the roots of the concept in Western military and strategic discourse to demonstrate that hybrid warfare and hybrid threats are different things.
    [Show full text]
  • Stuck in the Middle Without a Coherent Strategy: an Allusion to Future War
    STUCK IN THE MIDDLE WITHOUT A COHERENT STRATEGY: AN ALLUSION TO FUTURE WAR A Monograph by Major Andrew R. Nicklin British Army School of Advanced Military Studies United States Army Command and General Staff College Fort Leavenworth, Kansas AY 2014-001 Approved for Public Release; Distribution is Unlimited Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. (DD-MM-YYYY) (From - To) 1. REPORT DATE 2. REPORT TYPE 3. DATES COVERED 22 MAY 2014 Master’s Thesis JUN 2013-MAY 2014 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Stuck in the Middle without a Coherent Strategy: An Allusion to Future 5b. GRANT NUMBER War 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Major Andrew R Nicklin, British Army 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7.
    [Show full text]
  • The Dragon's Quantum Leap
    1 Cover China’s military leaders, breaking with their past reliance on the sheer mass of their mechanized armies, have decided to significantly transcend their current rules and regulations, organizational structures, and dated equipment with informatized concepts. This strategic redirection may well represent a “quantum-like” leap beyond their present-day military capabilities. The two dragons on the cover symbolize this explosive break with the mechanized past and their emergent future with an effectively more agile, multi-spectrum force. 2 3 The views expressed in this document are those of the author and do not reflect the official policy or position of the Department of Defense or the US government. The author works for the Foreign Military Studies Office (FMSO), Fort Leavenworth, Kansas. FMSO is a component of the US Army's Training and Doctrine Command (TRADOC). The office is charged with preparing studies and assessments based on the reading of foreign and domestic publications and through contacts with a network of foreign and US military and civilian security specialists. FMSO researches, writes, and publishes from unclassified sources about the military establishments, doctrines, and practices of selected foreign armed forces. It also studies a variety of civil-military and transnational security issues affecting the US and its military forces. FMSO products are prepared for the US Army and other services, the Department of Defense, as well as nonDoD organizations to include the Treasury and Justice Departments. 4 This book is dedicated to Western analysts studying China. 5 ACKNOWLEDGEMENT The author used only open-source translations for the construction of this document.
    [Show full text]
  • Stretching and Exploiting Thresholds for High-Order War How Russia, China, and Iran Are Eroding American Influence Using Time-Tested Measures Short of War
    C O R P O R A T I O N Stretching and Exploiting Thresholds for High-Order War How Russia, China, and Iran Are Eroding American Influence Using Time-Tested Measures Short of War Ben Connable, Jason H. Campbell, Dan Madden For more information on this publication, visit www.rand.org/t/rr1003 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN 978-0-8330-9044-7 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report describes how the United States has struggled to counter competing nation-states’ use of measures short of war and how these competitors are exploiting and stretching U.S.
    [Show full text]
  • International Law and the Use of Lawfare: an Argument for the U.S
    BearWorks MSU Graduate Theses Spring 2017 International Law and the Use of Lawfare: An Argument for the U.S. To Adopt a Lawfare Doctrine Trevor Michael Alfred Logan As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation Logan, Trevor Michael Alfred, "International Law and the Use of Lawfare: An Argument for the U.S. To Adopt a Lawfare Doctrine" (2017). MSU Graduate Theses. 3146. https://bearworks.missouristate.edu/theses/3146 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. INTERNATIONAL LAW AND THE USE OF LAWFARE: AN ARGUMENT FOR THE U.S. TO ADOPT A LAWFARE DOCTRINE A Masters Thesis Presented to The Graduate College of Missouri State University TEMPLATE In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Trevor Michael Alfred Logan May 2017 Copyright 2017 by Trevor Michael Alfred Logan ii INTERNATIONAL LAW AND THE USE OF LAWFARE: AN ARGUMENT FOR THE U.S.
    [Show full text]
  • Congressional Testimony: Beijing, Unrestricted Warfare, and Threat Potentials Robert J
    Claremont Colleges Scholarship @ Claremont CGU Faculty Publications and Research CGU Faculty Scholarship 1-1-2007 Congressional Testimony: Beijing, Unrestricted Warfare, and Threat Potentials Robert J. Bunker Claremont Graduate University Recommended Citation Bunker, R.J. “Congressional Testimony: Beijing, Unrestricted Warfare, and Threat Potentials.” Hearing on China’s Military Modernization and Its Impact on the United States and the Asia-Pacific, aP nel II: Beijing’s Doctrine on the Conduct of “Irregular Forms of Warfare” U.S.-China Economic and Security Review Commission website www.uscc.gov. Posted 29 March, 2007. In Final Report: HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED TENTH CONGRESS FIRST SESSION MARCH 29-30, 2007. www.uscc.gov UNITED STATES-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION WASHINGTON: MAY 2007. This Article is brought to you for free and open access by the CGU Faculty Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Faculty Publications and Research by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. China’s Military Modernization And Its Impact On The United States And The Asia-Pacific HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED TENTH CONGRESS FIRST SESSION _________ MARCH 29-30, 2007 _________ Printed for use of the United States-China Economic and Security Review Commission Available via the World Wide Web: www.uscc.gov UNITED STATES-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION WASHINGTON : MAY 2007 U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION CAROLYN BARTHOLOMEW, Chairman DANIEL BLUMENTHAL, Vice Chairman Commissioners: PETER T.R.
    [Show full text]
  • Recent Trends in Thinking About Warfare
    CRM D0014875.A1/Final September 2006 Recent Trends in Thinking about Warfare Albert A. Nofi 4825 Mark Center Drive • Alexandria, Virginia 22311-1850 Approved for distribution: September 2006 Ms. Maureen A. Wigge Director, Operational Policy Team Operations Evaluation Group This document represents the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the Department of the Navy. Approved for Public Release; Distribution Unlimited. Specific authority: N00014-05-D-0500. Copies of this document can be obtained through the Defense Technical Information Center at www.dtic.mil or contact CNA Document Control and Distribution Section at 703-824-2123. Copyright 2006 The CNA Corporation Contents Summary . 1 Overview . 5 Basic ideas . 7 Fourth-Generation warfare . 7 Information-age warfare . 11 The revolution in military affairs . 13 Effects-based operations . 16 Throw it all out? . 18 A vision of war in the future . 21 Critique . 25 Revolution or evolution?. 25 Some historical revolutions in military affairs . 27 The Romans. 28 The Gunpowder Revolution . 33 Some other real RMAs . 36 The trouble with RMAs . 39 Blitzkrieg: revolution or evolution? . 39 Critique of the foundations of the concept of 4GW . 45 Critique of some of the concepts of information-age warfare 62 Critique of some ideas behind EBO. 66 Should we fire the Baron? . 68 “Where's the beef?” . 73 The Irish War of Independence . 73 The Emancipation Proclamation . 75 Fighting the Fourth-Generation threat . 81 So, how do we “make war the 4GW way”? . 87 Coping with the threat . 90 How will we know when we've won? .
    [Show full text]
  • Defining Asymmetric Warfare
    TH E LA N D WAR FA R E PAP E R S No. 58 SEPTEMBER 2006 Defining Asymmetric War f a r e David L. Buffaloe A National Security Af fairs Paper Published on Occasion by THE INSTITUTE OF LAND WA R FA R E A S S O C I ATION OF T H E UNITED STATES A R M Y Arlington, Vi r g i n i a Defining Asymmetric Warfare by David L. Buffaloe The Institute of Land Warfare ASSOCIATION OF THE UNITED STATES ARMY AN AUSA INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of the editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper, but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER NO. 58, SEPTEMBER 2006 Defining Asymmetric Warfare by David L. Buffaloe David Buffaloe, an Infantry major in the U.S. Army, recently completed his Master of Policy Management degree at Georgetown University as part of the Army’s Office of the Secretary of Defense Internship Program and now serves as the Congressional Liaison for the Joint Improvised Explosive Device Defeat Organization.
    [Show full text]
  • Conflict in the 21St Century: the Rise of Hybrid Wars Potomac
    Conflict in the 21st Century: The Rise of Hybrid Wars Frank G. Hoffman Potomac Institute for Policy Studies Arlington, Virginia December 2007 About Potomac Institute for Policy Studies and the Center for Emerging Threats and Opportunities The Potomac Institute for Policy Studies is an independent, not-for-profit public policy research center. The Institute identifies key science, technology and national security issues, and aggressively follows through with focused research and policy advice. From this research and subsequent public discussions, the Potomac Institute has a track record for developing meaningful policy options and assisting their implementation at the intersection of both business and government. In partnership with the U.S. Marine Corps, the Potomac Institute established the Center for Emerging Threats and Opportunities (CETO) in 2001. The generous sponsorship of the Senate Armed Services Committee was instrumental in this initiative. In short order, CETO assisted the Marine Corps in identifying a number of potential operational challenges as well as a number of potential “game changer” technology solutions. In the last few years, CETO, as a part of the Marine Corps Warfighting Lab (Quantico, Virginia), has been on the front edge of advanced concept design and experimentation in distributed operations, urban reconnaissance and surveillance, counter-sniper and anti-improvised explosive device (IED) tactics and technologies. © Copyright 2007 Potomac Institute for Policy Studies All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from Potomac Institute for Policy Studies. Published 2007 by the Potomac Institute for Policy Studies 901 N.
    [Show full text]
  • Establishing Cyber Warfare Doctrine
    Journal of Strategic Security Volume 5 Number 1 Volume 5, No. 1: Spring 2012 Article 7 Establishing Cyber Warfare Doctrine Andrew M. Colarik Ph.D. The University of Auckland Lech Janczewski D.Eng The University of Auckland Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 31-48 Recommended Citation Colarik, Andrew M. Ph.D. and Janczewski, Lech D.Eng. "Establishing Cyber Warfare Doctrine." Journal of Strategic Security 5, no. 1 (2012) : 31-48. DOI: http://dx.doi.org/10.5038/1944-0472.5.1.3 Available at: https://scholarcommons.usf.edu/jss/vol5/iss1/7 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Establishing Cyber Warfare Doctrine Abstract Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national) cyber warfare doctrine (CWD). An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced.
    [Show full text]