Military Strategy and Doctrine Chinese

Total Page:16

File Type:pdf, Size:1020Kb

Military Strategy and Doctrine Chinese IDSA Monograph Series No. 49 March 2016 Changing Contexts of Chinese Military Strategy and Doctrine Prashant Kumar Singh Changing Contexts of Chinese Military Strategy and Doctrine | 1 IDSA Monograph Series No. 49 March 2016 Changing Contexts of Chinese Military Strategy and Doctrine Prashant Kumar Singh 2 | Prashant Kumar Singh Institute for Defence Studies and Analyses, New Delhi. All rights reserved. No part of this publication may be reproduced, sorted in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photo-copying, recording or otherwise, without the prior permission of the Institute for Defence Studies and Analyses (IDSA). ISBN: 978-93-82169-60-4 Disclaimer: The views expressed in this Monograph are those of the author and do not necessarily reflect those of the Institute or the Government of India. First Published: March 2016 Price: Rs. 325/- Published by: Institute for Defence Studies and Analyses No.1, Development Enclave, Rao Tula Ram Marg, Delhi Cantt., New Delhi - 110 010 Tel. (91-11) 2671-7983 Fax.(91-11) 2615 4191 E-mail: [email protected] Website: http://www.idsa.in Layout & Cover by: Vaijayanti Patankar Printed at: M/S Manipal Technologies Ltd. Changing Contexts of Chinese Military Strategy and Doctrine | 3 Contents Acknowledgements ............................................................................. 5 Abbreviations .......................................................................................... 7 Preface ...................................................................................................... 9 1. Introduction .................................................................................... 11 2. The Study of Chinese Military Strategy: Exploring Concepts ..................................................................... 15 3. People’s War and Three Stage Warfare: Mao’s Strategy and Doctrine ..................................................... 43 4. Maoist Strategy and Doctrine after the Liberation ............. 55 5. The China-Vietnam War and the Falklands War: Reminders for Change ................................................................ 70 6. People’s War under Modern Conditions ................................ 76 7. Military Strategy and Doctrine since the Mid-1980s ........... 92 8. The PLA Training in a Doctrinal Light ................................... 121 9. The Changing Doctrine and Capabilities of the PLA .........128 10. Military Strategy and Doctrine under Xi Jinping .................. 133 Conclusion ............................................................................................... 147 Tables ........................................................................................................ 154 Appendix ................................................................................................ 162 References ................................................................................................ 163 4 | Prashant Kumar Singh Changing Contexts of Chinese Military Strategy and Doctrine | 5 Acknowledgements I thank Dr. Arvind Gupta, former Director General,Institute for Defence Studies and Analyses (IDSA) and the present Deputy National Security Advisor (DNSA), Government of India, for encouraging me to write on this topic. I am also thankful to Brigadier (Retd.) Rumel Dahiya for supporting me in my endeavour. I am grateful to Lieutenant General (Retd.) Satish Nambiar, Professor Madhu Bhalla, Air Commodore (Retd.) R.V. Phadke, Colonel Rajeev Agarwal, Group Captain Naval Jagota, Captain (IN) S. S. Parmar, and Dr. Jabin Jacob for reading the draft monograph. I acknowledge the help I received from Colonel Agarwal, Group Captain Jagota and Captain (IN) Parmar in interpreting the PLA's assets and capabilities, discussed in chapter 9. I thank Dr M.S. Prathibha for comments on the draft monograph. I am thankful to Professor M. Taylor Fravel for granting me permission to not only for sharing his unpublished paper ‘China’s Military Strategies: An Overview of the 1956, 1980 and 1993 Military Strategic Guidelines’ but also allowing me to extensively cite it. I thank Professor Arthur Ding, Director, Institute of International Relations (IIR), NCCU, and the then Secretary-General of Chinese Council of Advanced Policy Studies (CAPS), Taipei (Taiwan) for inviting me to attend the 2013 International Conference on PLA Affairs by CAPS-NDU-RAND, Taipei, November 14-15, 2013 as an official attendee. The opportunity made a significant contribution to my understanding of the subject. I acknowledge the valuable comments I received from the two anonymous referees to improve the quality of the monograph. I received valuable editorial help from Vivek Kaushik, Associate Editor, to put the monograph through its paces. Surender Jagariya from the 6 | Prashant Kumar Singh Systems Support Cell, IDSA helped with the preparation of graphs and tables. Prashant Kumar Singh Associate Fellow, IDSA New Delhi Changing Contexts of Chinese Military Strategy and Doctrine | 7 Abbreviations A2/AD: Anti-Access/Area Denial AAM: Air-to-Air Missiles AD: Air Defence ADIZ: Air Defence Identification Zone AEWC: Airborne Early Warning & Control AIFV: Armoured Infantry Fighting Vehicle AJ: Anti-Jamming APC: Armoured Personnel Carrier ASCEL: Active Strategic Counterattacks on Exterior Lines ASEAN: Association of Southeast Asian Nations ATGM: Anti-Tank Guided Missile C4ISR: Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance CAGA: Combined Arms Group Armies CC: Central Committee CMC: Central Military Commission CPC: Communist Party of China DOD: Department of Defence ECM: Enterprise Content Management EFSA: Elite Forces and Sharp Arms EMP: Electromagnetic Pulse EW: Electronic Warfare EWS: Early Warning Systems FND: Flexible National Defence GPD: General Political Department GPS: Global Positioning System GSD: General Staff Department ISR: Intelligence, Surveillance, and Reconnaissance 8 | Prashant Kumar Singh IT: Information Technology IW: Informationised War KMT: Kuomintang LAN: Local-Area Networks LRBM: Long-range Ballistic Missiles MAC: Military Area Command MBT: Main Battle Tank MOD: Minister of Defence MOD: Ministry of Defence MOOTW: Military Operations Other Than War MSG: Military Strategic Guidelines NATO: North Atlantic Treaty Organisation NPC: National People's Congress PBSC: Politburo Standing Committee PCA: Permanent Court of Arbitration PLA: People's Liberation Army PLAA: People's Liberation Army Army PLAAF: People's Liberation Army Air Force PLAAN: People's Liberation Army Navy PMS: Preparation for Military Struggle RMA: Revolution in Military Affairs SACCS: Strategic Automated Command and Control System SAM: Surface-to-Air Missile SCO: Shanghai Cooperation Organisation SP: Self-Propelled T&EO: Training and Evaluation Outline UAS: Unmanned Aerial Systems UK: United Kingdom US: United States USAF: US Air Force USSR: Union of Soviet Socialist Republics WZC: War Zone Campaign Changing Contexts of Chinese Military Strategy and Doctrine | 9 Preface The study of Chinese military strategy in its various dimensions and facets is a continuous process. In May 2015, China’s State Council Information Office released China’s Defence White Paper (2014), titled ‘China’s Military Strategy’. This is the first White Paper issued during President Xi Jinping’s tenure. As its reading in the relevant section of the monograph would reveal, it exhibits some points of departure in China’s military strategy. The White Paper provides cues for future developments in China’s military and strategic affairs. It was released in the beginning of the third year of President Xi’s tenure. In the normal course, President Xi should remain in the post for ten years that is, two terms of five years each. Thus, the release of the White Paper also gives an opportunity to look back at the evolution of China’s military strategy that Xi Jinping has inherited. The purpose of this revisit is to identify the context under which China’s military strategy has evolved and to understand the possible evolution of China’s military strategy in the future. This monograph argues that China’s military strategy has been evolving through the interplay between Communist Party of China (CPC) and the People’s Liberation Army (PLA) or Party-Military relations as well as the Chinese leadership’s assessment of the international balance of power. In addition, the role of geography, technology, and the combat experiences of the People’s Liberation Army (PLA) and other militaries are taken into account. The interplay between the Party and military decides the role of the military in Chinese politics and the ruling ideology. However, the Party- Military relations model in China should not be compared with the Civil-Military relations model in liberal democracies. In China, the military is not a department attached to the Ministry of Defence (MoD) or only a part of the MoD. It is, rather, a part of the political structure or, more precisely, the Party leadership. Historically, the Party and the PLA have had a ‘symbiotic’ relationship, with overlapping leaderships. At 10 | Prashant Kumar Singh present, there is a high degree of separation between the two. However, the PLA continues to retain its political character and institutional links through representation in the Central Committee of the Party and through two Central Military Commissions (CMCs)—the State’s and the Party’s. China’s President, who also doubles as the Party General Secretary, is also
Recommended publications
  • The Foundations of US Air Doctrine
    DISCLAIMER This study represents the views of the author and does not necessarily reflect the official opinion of the Air University Center for Aerospace Doctrine, Research, and Education (CADRE) or the Department of the Air Force. This manuscript has been reviewed and cleared for public release by security and policy review authorities. iii Library of Congress Cataloging-in-Publication Data Watts, Barry D. The Foundations ofUS Air Doctrine . "December 1984 ." Bibliography : p. Includes index. 1. United States. Air Force. 2. Aeronautics, Military-United States. 3. Air warfare . I. Title. 11. Title: Foundations of US air doctrine . III. Title: Friction in war. UG633.W34 1984 358.4'00973 84-72550 355' .0215-dc 19 ISBN 1-58566-007-8 First Printing December 1984 Second Printing September 1991 ThirdPrinting July 1993 Fourth Printing May 1996 Fifth Printing January 1997 Sixth Printing June 1998 Seventh Printing July 2000 Eighth Printing June 2001 Ninth Printing September 2001 iv THE AUTHOR s Lieutenant Colonel Barry D. Watts (MA philosophy, University of Pittsburgh; BA mathematics, US Air Force Academy) has been teaching and writing about military theory since he joined the Air Force Academy faculty in 1974 . During the Vietnam War he saw combat with the 8th Tactical Fighter Wing at Ubon, Thailand, completing 100 missions over North Vietnam in June 1968. Subsequently, Lieutenant Colonel Watts flew F-4s from Yokota AB, Japan, and Kadena AB, Okinawa. More recently, he has served as a military assistant to the Director of Net Assessment, Office of the Secretary of Defense, and with the Air Staff's Project CHECKMATE.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • MILITARY DOCTRINE in INTERNATIONAL RELATIONS STRATEGY for the ARAB COUNTRIES and the BIG POWERS Dr. Mohamamd Salim Al-Rawashdeh
    International Journal of International Relations, Media and Mass Communication Studies Vol.2, No.1, pp.30-62, March 2016 ___Published by European Centre for Research Training and Development UK (www.eajournals.org) MILITARY DOCTRINE IN INTERNATIONAL RELATIONS STRATEGY FOR THE ARAB COUNTRIES AND THE BIG POWERS Dr. Mohamamd Salim Al-Rawashdeh Associated professor, International Relations, Al-Balqa’a Applied University, Jordan. The Royal College for Staff and Command and National Defense, Bahrain Defense Force, Kingdom of Bahrain. ABSTRACT: (All Life is readiness for a huge thing that may not happen at all). The military doctrine is the basic concept for the security of the State concerned, also seeks to formulate goals and tasks of the military policy of the state, and the identification of priority interests, and to express its position on issues of war and areas of use of military force and the drafting of combat missions assigned to the forces of the state in time of war or peace, and the diagnosis of the nature of the actual and potential military threats against the state, and the nature of future war that can be plugged in the state, as well as for characterization methods by which to repel any aggression by military means, and to develop new concepts of military strategies, and guidance of preparation of the State for the purpose of defending the territory of the State and the safety of its soil. The differences between religious belief and military doctrine. Some people who were not familiar with the term "military doctrine" that this term is given by a specific researcher or some academics or that the use of metaphor for the phrase "doctrine", or something else similar; but many interested readers know that the military doctrine or army dogma as it is known, in some countries in the world is the basis corner for the definition of a army and military force.
    [Show full text]
  • United States Tactical Nuclear Doctrine: Developing a Capability
    W&M ScholarWorks Dissertations, Theses, and Masters Projects Theses, Dissertations, & Master Projects 1979 United States tactical nuclear doctrine: Developing a capability Christopher Michael Cooke College of William & Mary - Arts & Sciences Follow this and additional works at: https://scholarworks.wm.edu/etd Part of the International Relations Commons, and the Military and Veterans Studies Commons Recommended Citation Cooke, Christopher Michael, "United States tactical nuclear doctrine: Developing a capability" (1979). Dissertations, Theses, and Masters Projects. Paper 1539625067. https://dx.doi.org/doi:10.21220/s2-zset-zj41 This Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Dissertations, Theses, and Masters Projects by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. United States Tactical Nuclear ii Doctrines Developing A Capability A Thesis Presented to The Faculty of the Department of Government The College of William and Mary in Virginia In Partial Fulfillmait Of the Requirements for the Degree of Master of Arts by Christopher Cooke 1979 APPROVAL SHEET This thesis is submitted in partial fulfillment of the requirements for the degree of Master of Arts Christopher Cooke Approved, August 1979 ar Magaret Hamilton ACKNOWLEDGMENTS The author wishes to express his appreciation to Professor Alan J. Ward, under whose guidance this study was conducted, for his very helpful advice and, especially, for his considerable editorial skill. The author is also indebted to Professors Margaret Hamilton and George Grayson for their careful reading and criticism of the manuscript. LIST OF TABLES Figure Page A.
    [Show full text]
  • Understanding Cyberwarfare Lessons from the Russia-Georgia War
    Understanding Cyberwarfare Lessons from the Russia-Georgia War Sarah P. White March 20, 2018 Understanding Cyberwarfare: Lessons from the Russia-Georgia War Capt. Sarah P. “Sally” White is a cyberspace operations officer in the US Army. She is currently pursuing her PhD in the Harvard Department of Government, where her research interests include military innovation and comparative cyberspace doctrine. She has served in the 82nd Airborne Division and the 780th Military Intelligence Brigade (Cyber). Following graduate school, she will serve as an instructor in the West Point Department of Social Sciences. Understanding Cyberwarfare: Lessons from the Russia-Georgia War Cyberattacks had become an established tool attacks, with the highest levels of online of statecraft by the time they were used against activity coinciding with the Russian invasion of the Republic of Georgia in the summer of South Ossetia on August 8, 9, and 10.3 Even the 2008, albeit one without a legal framework and National Bank of Georgia had to suspend all 4 whose long-term implications remained poorly electronic services from August 8–19. While 1 understood. Nevertheless, the war between there is strong political and circumstantial Russia and Georgia that took place in August of evidence that the attacks were encouraged by that year was remarkable for its inclusion of a the Russian state, definitive technical series of large-scale, overt cyberspace attacks attribution—and thus definitive legal that were relatively well synchronized with culpability—have remained elusive. conventional military operations. Conducted The cyberattacks had little effect on by an army of patriotic citizen hackers, the conventional forces and were not decisive to 5 cyber campaign consisted of distributed denial the outcome of the conflict, but they of service (DDoS) attacks and website nevertheless offer significant lessons on the defacements that were similar in nature but character of modern warfare for scholars of different in method to what had occurred in conflict and military studies.
    [Show full text]
  • China's Evolving Military Doctrine
    CHINA’S EVOLVING MILITARY DOCTRINE AFTER THE COLD WAR BEKİR İLHAN ANALYSIS JANUARY. 2020 NO.59 CHINA’S EVOLVING MILITARY DOCTRINE AFTER THE COLD WAR BEKİR İLHAN COPYRIGHT © 2020 by SETA All rights reserved. No part of this publication may be reprinted or reproduced or utilized in any form or by any electronic, mechanical or other means, without permission in writing from the publishers. ISBN: 978-625-7040-19-8 Layout: Erkan Söğüt Proofreading: Dr. Eva Stamoulou Oral SETA | SİYASET, EKONOMİ VE TOPLUM ARAŞTIRMALARI VAKFI FOUNDATION FOR POLITICAL, ECONOMIC AND SOCIAL RESEARCH Nenehatun Cd. No: 66 GOP Çankaya 06700 Ankara TÜRKİYE Tel: +90 312 551 21 00 | Faks: +90 312 551 21 90 www.setav.org | [email protected] | @setavakfi SETA | Istanbul Defterdar Mh. Savaklar Cd. Ayvansaray Kavşağı No: 41-43 Eyüpsultan İstanbul TÜRKİYE Tel: +90 212 395 11 00 | Faks: +90 212 395 11 11 SETA | Washington D.C. 1025 Connecticut Avenue, N.W., Suite 410 Washington D.C., 20036 USA Tel: 202-223-9885 | Faks: 202-223-6099 www.setadc.org | [email protected] | @setadc SETA | Cairo 21 Fahmi Street Bab al Luq Abdeen Flat No: 19 Cairo EGYPT Tel: 00202 279 56866 | 00202 279 56985 | @setakahire SETA | Berlin Französische Straße 12, 10117 Berlin GERMANY Tel: +49 30 20188466 SETA | Brussels Avenue des Arts 27, 1000 Brussels BELGIUM Tel: +3226520486 CHINA’S EVOLVING MILITARY DOCTRINE AFTER THE COLD WAR CONTENTS ABSTRACT 7 INTRODUCTION 8 MILITARY DOCTRINE 9 CHINA’S MILITARY: THE PEOPLE’S LIBERATION ARMY 10 CHINA’S EVOLVING CONVENTIONAL MILITARY DOCTRINE 12 THE 1993 DOCTRINE: WINNING LOCAL WARS UNDER HIGH-TECHNOLOGY CONDITIONS 13 THE 2004 DOCTRINE: WINNING LOCAL WARS UNDER INFORMATIONIZED CONDITIONS 14 THE 2014 DOCTRINE: WINNING INFORMATIONIZED LOCAL WARS 15 CONCLUSION 17 setav.org 5 ANALYSIS ABOUT THE AUTHOR Bekir İlhan Bekir İlhan is a PhD student in Political Science at the University of Cincinnati in Ohio, USA.
    [Show full text]
  • Strategy in the New Era of Tactical Nuclear Weapons
    STRATEGIC STUDIES QUARTERLY - PERSPECTIVE Strategy in the New Era of Tactical Nuclear Weapons COL JOSEPH D. BECKER, USA Abstract Post–Cold War strategic discourse, primarily among Russian strate- gists, has challenged the precept that nuclear weapons are not useful tools of warfare or statecraft. To reduce the likelihood that such ideas will ever be tested in practice, the US must openly address hard-case scenarios and develop a coherent strategy sufficient to give adversaries pause. This article posits that the key to successfully deterring the use of tactical nuclear weapons lies not in winning an arms race but in the clear articulation of a purpose and intent that directs all aspects of US policy toward the preven- tion of nuclear war and leaves no exploitable openings for opportunistic challengers. Further, an ideal strategy would be crafted to reduce—not increase—the salience of nuclear weapons in geopolitics. The article con- siders three possible approaches to a strategy for tactical nuclear weapons, but the most desirable and effective will be a “strategy of non-use” based upon credible and well- prepared alternatives to a nuclear response. ***** he end of the Cold War ushered in a new era suggesting the pos- sibility that nuclear weapons could become a relic of the past. Prominent leaders, including US president Barack Obama, cam- paigned vociferously for measures to abolish the world’s nuclear stock- T1 piles. However, instead of moving toward a world of “nuclear zero,” the US and Russia have proceeded with nuclear modernization and capability development, and even China is quietly expanding its nuclear arsenal.
    [Show full text]
  • Land Operations
    Land Operations Land Warfare Development Centre Army Doctrine Publication AC 71940 HANDLING INSTRUCTIONS & CONDITIONS OF RELEASE COPYRIGHT This publication is British Ministry of Defence Crown copyright. Material and information contained in this publication may be reproduced, stored in a retrieval system and transmitted for MOD use only, except where authority for use by other organisations or individuals has been authorised by a Patent Officer of the Defence Intellectual Property Rights whose details appear below. Crown copyright and Merchandise Licensing, Defence Intellectual Property rights, Central Legal Services, MOD Abbeywood South, Poplar 2 #2214, Bristol BS34 8JH, Email: [email protected] STATUS This publication has been produced under the direction and authority of the Chief of the General Staff by ACOS Warfare branch in his capacity as sponsor of Army Doctrine. It is the individual’s responsibility to ensure that he or she is using the latest version of this publication. If in doubt the individual should contact the Warfare Branch of HQ Field Army (details below). The contents constitute mandatory regulations or an MOD Approved Code of Practice (ACOP) and provide clear military information concerning the most up to date experience and best practice available for commanders and troops to use for operations and training. To avoid criminal liability and prosecution for a breach of health and safety law, you must follow the relevant provisions of the ACOP. Breaches or omissions could result in disciplinary action under the provisions of the Armed Forces Act. DISTRIBUTION As directed by ACOS Warfare. CONTACT DETAILS Suggestions for change or queries are welcomed and should be sent to Warfare Branch Editor, Headquarters Field Army, Land Warfare Development Centre, Imber Road, Warminster BA12 0DJ | i Foreword CGS Foreword to ADP Land Operations ADP Land Operations is the British Army’s core doctrine.
    [Show full text]
  • Some Principles of Cyber Warfare Using Corbett to Understand War in the Early Twenty–First Century
    Corbett Paper No 19 Some Principles of Cyber Warfare Using Corbett to Understand War in the Early Twenty–First Century Richard M. Crowell The Corbett Centre for Maritime Policy Studies January 2017 Some Principles of Cyber Warfare Using Corbett to Understand War in the Early Twenty–First Century Richard M. Crowell Key Points: Corbett’s theory of maritime warfare is used to illustrate how forces that move through cyberspace, content and code, have similar characteristics to forces moving through the maritime domain: fluidity of movement, omni–directional avenues of approach and the necessity to make shore (reach a human or machine destination) to be useable. • The relationship between the information environment (IE) and cyberspace as a key part of information-age war is described with a particular focus on how decision- making and control of machines takes place at the nexus of the dimensions of the IE. • The use, and rapid adaptation of, cyber force to influence human decision-making and compel machines to work independent of their owner’s intent is explored. • Cyberspace and cyber warfare are defined in ways that provide commanders, subordinates, and political leaders with a common framework. • Principles of cyber warfare are presented with examples from recent conflicts to illustrate the concepts of cyber control, cyber denial, and disputed cyber control. Dick Crowell is an associate professor in the Joint Military Operations Department at the US Naval War College. He specializes in information operations and cyberspace operations. A retired US Navy pilot, he served at sea and ashore for thirty years. He is a senior associate of the Center on Irregular Warfare and Armed Groups (CIWAG) and founding member of the Center for Cyber Conflict Studies (C3S).
    [Show full text]
  • Mutually Assured Stability: Establishing US-Russia Security Relations for a New Century
    Atlantic Council BRENT SCOWCROFT CENTER ON INTERNATIONAL SECURITY STRATEGICANALYSIS By Celeste A. Wallander Mutually Assured Stability: Establishing US-Russia Security Relations for a New Century The Obama administration’s goals for arms control and security cooperation with Russia are the right Beyond the Reset Series ones, but they cannot be achieved as long as US- from the Brent Scowcroft Center Russian strategic stability is in question. Unless on International Security leaders in both capitals confront the new requirements The Atlantic Council and Russia International Affairs Council have formed a partnership entitled will fail to seize the opportunity for further arms Beyond the Reset aimed at strengthening for strategic stability in the twenty-first century, they reductions and enhanced national security. relations between the United States, Europe, and Russia. The series focuses on changing the In the twentieth century, the two superpowers paradigm governing relations between the United sustained strategic stability through their respective States and Russia from the Cold War construct of strategies of Mutually Assured Destruction (MAD). Mutually Assured Destruction to Mutually Assured MAD facilitated a minimal but robust strategic Stability, and in fostering US-Russian cooperation stability that sustained the two antagonists through the Cold War and transformation of the international system in the last decade of the twentieth century. Thewith Atlantic other stakeholders Council’s Brent in the Scowcroft Asia-Pacific. Center on International Security continues the Council’s Though the logic of strategic stability may be timeless, long-standing focus on NATO and the transatlantic the right strategy to achieve it is not. Given the partnership, while also studying ‘over the horizon’ development of new military technologies that may regional and functional security challenges to the create fears of preemption, the emergence of Eurasia1 United States, its allies, and partners.
    [Show full text]
  • On Cyberwarfare
    DCAF HORIZON 2015 WORKING PAPER No. 7 On Cyberwarfare Fred Schreier DCAF HORIZON 2015 WORKING PAPER No. 7 On Cyberwarfare Fred Schreier Table of Contents On Cyberwarfare 7 1. The Basic Building Blocks: Cyberspace, Cyberpower, Cyberwarfare, and Cyberstrategy 10 2. The Difference between Information Warfare and Cyberwarfare 19 3. Understanding the Threats in Cyberspace 31 4. Cyber Vulnerabilities and how Cyber Attacks are Enabled 48 5. Major Issues, Ambiguities, and Problems of Cyberwar 68 Annex 1: In which Ways is Cyberwar different from the other Warfighting Domains? 93 Annex 2: Summary of major Incidents of Cyber Conflict 107 Glossary 116 Select Bibliography 121 DCAF HORIZON 2015 WORKING PAPER 5 6 DCAF HORIZON 2015 WORKING PAPER On Cyberwarfare The digital world has brought about a new type of clear and present danger: cyberwar. Since information technology and the internet have developed to such an extent that they have become a major element of national power, cyberwar has become the drumbeat of the day as nation-states are arming themselves for the cyber battlespace. Many states are not only conducting cyber espionage, cyber reconnaissance and probing missions; they are creating offensive cyberwar capabilities, developing national strategies, and engaging in cyber attacks with alarming frequency. Increasingly, there are reports of cyber attacks and network infiltrations that can be linked to nation-states and political goals. What is blatantly apparent is that more financial and intellectual capital is being spent figuring out how to conduct cyberwarfare than for endeavors aiming at how to prevent it.1 In fact, there is a stunning lack of international dialogue and activity with respect to the containment of cyberwar.
    [Show full text]
  • January 2005 GTM43295.E
    Home > Research > Responses to Information Requests RESPONSES TO INFORMATION REQUESTS (RIRs) New Search | About RIRs | Help 20 January 2005 GTM43295.E Guatemala: Update to GTM31626.E of 11 May 1999; whether the incidence of prosecution and penalties for desertion has changed (May 1999-January 2005) Research Directorate, Immigration and Refugee Board, Ottawa Information on whether the incidence of prosecution and penalties for desertion has changed was limited among the sources consulted by the Research Directorate. Two news sources in January 2005 reported that a new military code (codigo militar) would eventually replace the current code, which cam into effect 127 years ago (Siglo Veintiuno 3 Jan. 2005; CERIGUA 4 Jan. 2005). The new military code-recently approved by the Defence Commission of the Congress (Comision de Defensa del Congreso)-includes four laws: the Military Criminal Law (Ley Penal Militar), the Military Criminal Process Law (Ley Procesal Penal Militar), the Law of Organization and Functioning of Military Jurisdiction (Ley de Organizacion y Funcionamiento de la Jurisdiccion Militar) and the Military Penitentiary Law (Ley Penitenciaria Militar) (ibid.; Siglo Veintiuno 3 Jan. 2005). Although the articles did not outline the penalties for desertion, they did mention that the new Military Criminal Law establishes penalties for some 60 crimes, including rebellion, sedition, espionage, treason, and disobedience (ibid.; CERIGUA 4 Jan. 2005). Information about when this law would come into force could not be found within time constraints. Nevertheless, an April 1998 War Resisters' International (WRI) report noted that under the old military code the punishment for desertion ranged between two months and one year in prison, with "the death sentence during wartime" (30 Apr.
    [Show full text]