TRANSFORMATION: a BOLD CASE for UNCONVENTIONAL WARFARE By
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Military Guide to Terrorism in the Twenty-First Century
US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No. -
Dominant Land Forces for 21St Century Warfare
No. 73 SEPTEMBER 2009 Dominant Land Forces for 21st Century Warfare Edmund J. Degen A National Security Affairs aperP published on occasion by THE INSTITUTE OF LAND WARFARE ASSOCIATION OF THE UNITED STATES ARMY Arlington, Virginia Dominant Land Forces for 21st Century Warfare by Edmund J. Degen The Institute of Land Warfare ASSOCIATION OF THE UNITED STATES ARMY AN INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of ILW’s editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper, but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER NO. 73, September 2009 Dominant Land Forces for 21st Century Warfare by Edmund J. Degen Colonel Edmund J. Degen recently completed the senior service college at the Joint Forces Staff College and moved to the Republic of Korea, where he served as the U.S. Forces Korea (USFK) J35, Chief of Future Operations. He is presently the Commander of the 3d Battlefield Coordination Detachment–Korea. He previously served as Special Assistant to General William S. -
Nuclear Deterrence and Conventional Conflict
VIEW Sticks and Stones Nuclear Deterrence and Conventional Conflict DR. KATHRYN M.G. BOEHLEFELD n the night of 15 June 2020, Sino- Indian tensions flared into fighting along the disputed border in the region known as the Galwan Valley. The fighting led to the first casualties along the border in 45 years. However, Ono one on either side fired a single shot.1 Instead, soldiers threw rocks and used wooden clubs wrapped in barbed wire to attack one another. Two of the most powerful armies in the world, both of which possess nuclear weapons, clashed with one another using sticks and stones. Nuclear weapons prevent nuclear states from engaging in large-scale conven- tional war with one another, or at least, the existence of such advanced weapons has correlated with a significant decrease in conventional war between nuclear- armed adversaries over the past 80 years. Nuclear weapons tend to make nuclear adversaries wearier of engaging in conventional warfare with one another because they fear inadvertent escalation: that a war will spiral out of control and end in a nuclear exchange even if the war’s aims were originally fairly limited. However, this fear has not fully prevented the Chinese and Indian militaries from engaging in skirmishes, like the one that occurred in June 2020. Where does escalation to- ward nuclear war start, and what does this conflict teach both us and major world players about the dangers and opportunities associated with low levels of conflict between nuclear powers? Escalation to nuclear use may occur as a deliberate and premeditated choice or inadvertently as the result of a security dilemma, the offensive nature of militaries, and/or due to the fog of war.2 This article argues that the Sino- Indian border dispute demonstrates that the drivers of inadvertent escalation may be present even at exceptionally low levels of conflict. -
Unconventional Warfare: a Historical Perspective
Unconventional Warfare: A Historical Perspective NAGAO Yuichiro 1. Preface By definition, a war is fought between sovereign states, and this has become a normative concept when we talk about war. There was a historical background for this. It was the brainchild of political and intellectual leaders of the 17th and 18th centuries who sought to settle differences among people in a civilized manner, and other forms of armed conflict were severely restricted. As the years rolled on into the 20th century, however, unusual armed conflicts have steadily increased. Notwithstanding the paradigm of war between sovereign states has not yet lost its relevance. Meanwhile, the acts of terrorism committed in the United States on September 11 shook the world. Words such as “new war” and “asymmetric war” have since gained currency and have come to be used in various contexts. With these in mind, this paper will survey the history of wars between states and examine in light of these developments the significance that unconventional warfare takes on in armed conflict as a whole. 2. What is Unconventional Warfare? To start with, it is necessary to define the concept “unconventional warfare,” the subject of this paper, to clarify the points of argument contained herein. The antonym of unconventional warfare is conventional warfare, which means a battle between states’ regular armed forces. Therefore, unconventional warfare is a generic term that covers all military and quasi-military operations other than conventional warfare. More specifically, one dictionary lists under the heading “unconventional warfare” revolutionary wars and its constituents, subversion and guerrilla; command raids and other and special operations; terrorism and counter-terrorism. -
Applying Irregular Warfare Principles to Cyber Warfare
Soldier from 3/187th Infantry, 101st Airborne Division, out of Fort Campbell, Kentucky, sets up SATCOM to communicate further with key rear elements as part of search and attack mission in area of Narizah, Afghanistan, July 23, 2002 (U.S. Army/Todd M. Roy) Applying Irregular Warfare Principles to Cyber Warfare By Frank C. Sanchez, Weilun Lin, and Kent Korunka he cyberspace threat exists in a cyberspace and cyberspace threats that and can foresee, rapidly respond to, realm that does not conform to are initiated by faceless, borderless, and and counter cyberspace threats, the T the physical limits of land, sea, sometimes nationless enemies. These U.S. military’s strategy and approach to air, and space. Unlike these traditional enemies manifest in a domain neither cyberspace must adapt and incorporate domains, cyberspace fosters an unpre- confined nor governed by the tradi- unconventional approaches and hybrid dictable threat that can adjust, morph, tional norms and rules of war, which warfare into its operational capability. and reproduce without a national the broader military has no experience Despite its importance, the Nation’s identity or face.1 The challenge of the undertaking. To ensure the United leaders, strategists, and military planners military is to posture its approach to States maintains cyberspace dominance struggle to understand how cyberspace operations (CO) fit into national security as an instrument of national policy. A Commander Frank C. Sanchez, USN, is an Action Officer on the Joint Staff J32, Intelligence, significant shortcoming is due to the Surveillance, and Reconnaissance Operations. Major Weilun Lin, USAF, is Chief of the Central and leaders’ lack of experience and basic South Asia Branch, Joint Cyberspace Center, U.S. -
Asia Treads the Nuclear Path, Unaware That Self- Assured Destruction Would Result from Nuclear War
The Journal of Asian Studies Vol. 76, No. 2 (May) 2017: 437–456. © The Association for Asian Studies, Inc., 2017 doi:10.1017/S0021911817000080 Asia Treads the Nuclear Path, Unaware That Self- Assured Destruction Would Result from Nuclear War OWEN B. TOON, ALAN ROBOCK, MICHAEL MILLS AND LILI XIA F THE NINE COUNTRIES known to have nuclear weapons, six are located in Asia and Oanother, the United States, borders the Pacific Ocean. Russia and China were the first Asian nations with nuclear weapons, followed by Israel, India, Pakistan, and North Korea. Most of the world’s nuclear powers are reducing their arsenals or maintaining them at historic levels, but several of those in Asia—India, Pakistan, and North Korea— continue to pursue relentless and expensive programs of nuclear weapons development and production. Hopefully, the nuclear agreement reached in July 2015 between Iran, the European Union, and the five permanent members of the United Nations Security Council will be a step toward eliminating nuclear weapons throughout Asia and the rest of the world. As we will discuss below, any country possessing a nuclear arsenal is on a path leading toward self-assured destruction, and is a threat to people everywhere on Earth. Nuclear-armed countries are a threat to people everywhere partly because of the destructive power of single weapons—one weapon is enough to destroy a small city— and partly because of the growing ability of nations to launch missiles across the globe. Nuclear powers such as India and North Korea, the latter of which is thought currently to have a very small nuclear capability that is not in the form of useful weapons, are working on the means to deliver weapons globally. -
The Economic Foundations of Military Power
THE ECONOMIC FOUNDATIONS OF MILITARY POWER Emily O. Goldman and Leo J. Blanken University of California-Davis 2006-12 About the Matthew B. Ridgway Center The Matthew B. Ridgway Center for International Security Studies at the University of Pittsburgh is dedicated to producing original and impartial analysis that informs policymakers who must confront diverse challenges to international and human security. Center programs address a range of security concerns – from the spread of terrorism and technologies of mass destruction to genocide, failed states, and the abuse of human rights in repressive regimes. The Ridgway Center is affiliated with the Graduate School of Public and International Affairs (GSPIA) and the University Center for International Studies (UCIS), both at the University of Pittsburgh. This working paper is one of several outcomes of the Ridgway Working Group on the Political Economy of International Security chaired by Peter Dombrowski, Sue Eckert and William Keller. The Economic Foundations of Military Power Emily O. Goldman, University of California, Davis and Leo J. Blanken, University of California, Davis The fundamental premise of national security studies is the privileged position of the state as the key purveyor of violence. Commonly, the very form of the nation state is justified as the unit of political organization that achieves the most efficient economy of scale for generating violence (Bean 1973; Vries 2002, p. 144). Since the 1970s, advances in information, communication and transportation technologies, and the process of globalization they foster, have reduced the comparative advantages enjoyed by states in accumulating wealth and power, and monopolizing the means of destruction. Seen from this vantage point, the events of September 11 are one of the most vivid examples of the empowered non-state actor,1 particularly because the events fall within the security domain. -
The Rise of Cyber Warfare: the Digital Age and American Decline
The Rise of Cyber Warfare The Digital Age and American Decline Hanyu Chwe In May 2007, unknown attackers de- advantages in cyberspace; the increasing clared cyberwar on Estonia. Estonians importance of cyberwarfare will accelerate woke up to find that the websites of their the relative decline of American military banks, newspapers, and government agen- power. cies had been systematically dismantled. This was one of the world’s first cyberwar- For the purposes of this paper, I define fare attacks; I argue that it won’t be the cyberwarfare as the use of computer pro- last. grams to attack, disrupt, destroy, disable, In the future, the amount of cyberwar- or steal anything of military, economic or fare will increase drastically. First, the in- general strategic value or e↵orts to defend creased value of cyberspace increases the against such attacks. I am not considering incentives to wage cyberwarfare. Second, industrial corporate espionage, cyber at- the logic of cyberwarfare nullifies several tacks meant to aid the use of conventional mechanisms that constrain territorial war. military force, or the use of internet media Finally, the o↵ensive advantage inherent to organize social action. In my definition, in cyberwarfare exacerbates the security cyberwarfare is not intentionally accompa- dilemma. The United States lacks many nied by corresponding actions in the real of its traditional military and economic world. Cyberwarfare Incentives The strategic and economic value of state needs to guard its cyberspace in order cyberspace is huge. Facebook and to ensure stability. Google were worth 200 billion dollars It’s unlikely internet reliance will de- and 400 billion dollars in 2014 respec- crease. -
Moving Artillery Forward: a Concept for the Fight in Afghanistan
SMALL WARS JOURNAL smallwarsjournal.com Moving Artillery Forward: A Concept for the Fight in Afghanistan Joseph A. Jackson The United States Army is no stranger to mountainous and high-altitude war fighting. American history contains many instances of successfully executed mountain conflicts. Central to this success was the movement and use of artillery in direct support of those campaigns. The first notable American instance of moving artillery across mountainous terrain occurred when Colonel Henry Knox’s Continental Army soldiers wheeled, sledged, and levered the guns from Fort Ticonderoga across the Berkshire Mountains in the winter of 1776. These fifty-nine assorted cannon became the deciding factor in General George Washington’s siege of Boston. Other notable campaigns include the U.S. Army operations in the Italian Alps during WWII, the Taebaek Range of Korea, and the Annamite Range in Vietnam. Each of these locations and conditions provides ample instruction on artillery use in mountain warfare; yet this time fighting in the mountains of Afghanistan is proving to be a greater challenge than anticipated. Strategists and commanders who consider employment of artillery in Afghanistan should take a fresh look at history, doctrine, and tactical concepts. Doing so will ensure artillery can employ optimally, and in sufficient strength, and of the correct caliber to create the tactical conditions for success. Without a significant increase in firepower delivered by a correspondingly lightweight and maneuverable field howitzer, the long-range fight in Afghanistan will devolve into an even deadlier and protracted conflict. Solely relying on technology and precision munitions incrementally applied across the current arsenal will not achieve the conditions to exploit and pursue the insurgent fighters ever higher and farther into the mountains between Afghanistan and Pakistan. -
Restructuring the Tactical Russian Army for Unconventional Warfare
Restructuring the Tactical Russian Army for Unconventional Warfare Fort Leavenworth, KS Volume 5, Issue 2 FEB 2014 by Lester W. Grau, PhD, TRISA Foreign Military Studies Office (FMSO) Russian wars in Afghanistan (1979-1989) and Chechnya (1994-1996 and 1999-2006) reintroduced their ground forces to nonlinear warfare that lacked a clear front line and a rear area. Instead, combat was fragmented into close-combat fights, where the Afghan resistance launched sudden attacks against convoys, outposts and security elements or laid ambushes, heavily mined roadways and fought within urban centers or conducted long-range harassment fires. The Chechen resistance functioned under the concepts of “attack and withdraw” and “the attack of swarms of bees at night.” Often the Chechen resistance would form mobile firing groups. Two mortars with crews, each located in a cross- country vehicle, were accompanied by machine gunners, grenadiers, snipers and riflemen. The vehicles would drive into an area, fire a total of five to six mortar rounds accompanied by flat-trajectory fire from the supporting weapons, and then move quickly to a new firing area. Russian artillery would usually not be able to respond quickly enough to interdict theses grtoups. 1 The conventional battlefield with prepared lines of trenches and interlocking fields of fire had been supplanted by mobile strike groups, strongpoint defenses, and combatants who would exploit difficult terrain and blend into the civilian population when threatened. The Russian Army realized that it needed to increase its ability to respond and gain the initiative through agility, mobility, and independent action over a much larger area. -
Strategic Influence: Applying the Principles of Unconventional Warfare in Peace
Strategic Influence: Applying the Principles of Unconventional Warfare in Peace Title JUNE 2021 STRATEGIC MULTILAYER ASSESSMENT Author: COL (Ret.) Robert Jones, United States Special Operations Command Series Editor: Ali Jafri, NSI Inc. 1 This white paper presents the views and opinions of the contributing authors. This white paper does not represent official USG policy or position. COL (Ret.) Robert Jones, Senior Strategist, United States Special Operations Command Robert Jones is a retired Army Special Forces Colonel who has served for the past ten years as senior strategist at USSOCOM, with a focus on understanding the nature of the strategic environment, the impact on the character of conflict, and the implications for our Special Operations Forces. He is a core member of the Strategic Multilayer Assessment (SMA) team and a regular lecturer at the Joint Special Operations University and the Air War College. A Cold War and Gulf War vet, he stepped away for a bit to gain experiences as both an emergency manager and a deputy district attorney prior to returning to the Special Operations community to serve from Zamboanga to Kandahar and places in between. Editor’s note: The thoughts, concepts, and products included in this paper are the author’s own, developed in over 30 years as a Special Forces qualified officer both in uniform and during the past 10 years as a civilian strategist at USSOCOM. 2 Strategic Influence: Applying the Principles of Unconventional Warfare in Peace COL (Ret.) Robert Jones, Senior Strategist, United States Special Operations Command1 “The most important aspect of our containment strategy is that it serves to contain ourselves,” former President Dwight Eisenhower reportedly observed after he had left office. -
Guerrilla Warfare Tactics in Urban Environments
GUERRILLA WARFARE TACTICS IN URBAN ENVIRONMENTS A thesis presented to the Faculty of the US Army Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE General Studies by PATRICK D. MARQUES, MAJ, USA B.A., Indiana University, Bloomington, Indiana, 1990 Fort Leavenworth, Kansas 2003 Approved for public release; distribution is unlimited. REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burder for this collection of information is estibated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burder to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 3. DATES COVERED (FROM - TO) 06-06-2003 thesis 05-08-2002 to 06-06-2003 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER GUERRILLA WARFARE TACTICS IN URBAN ENVIRONMENTS 5b. GRANT NUMBER Unclassified 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Marques, Patrick, D 5e.