Military Adaptation in Complex Operations

Total Page:16

File Type:pdf, Size:1020Kb

Military Adaptation in Complex Operations U.S. Marine with Afghan boy during renovation planning visit at school in Helmand Province, Afghanistan, August 2009 DOD (William Greeson) DOD (William Military Adaptation in Complex Operations BY DAVID W. BARNO he U.S. military today is engaged globally in the most demanding set of combat and stabil- ity tasks seen in over a generation—a host of challenges that have been called complex Toperations. The military faces these challenges side by side with its partners in the diplo- matic and development communities—the Department of State and U.S. Agency for International Lieutenant General David W. Barno, USA (Ret.), is Director of the Near East South Asia Center for Strategic Studies at the National Defense University. From October 2003 to May 2005, General Barno served as overall commander of U.S. and coalition military operations in Afghanistan. PRISM 1, no. 1 FEATURES | 27 Development (USAID)—as well as a myriad of the evolving face of conflict and adapt our other interagency and international partners. highly structured military as an institution to Such operations demand integrated whole- complex operations that may be largely at odds of-government approaches to address the vex- with our innate military culture. ing problems of instability, insurgency, terror- ism, and irregular warfare. Unfortunately, these How We Got Where We Are requirements bear scant resemblance to the From soon after World War II until the worldview of military and security experts just end of the Cold War—a period of nearly half 10 years ago. This new set of requirements has a century—the U.S. military was animated by challenged the fundamentals of how the U.S. the specter of global war with the Soviet Union. military operates in the world—from an outlook For land forces, the primary battlefield was seen where some in the past argued, “We don’t do as Western Europe, where the threat was clear windows” to an approach where others today and present: Warsaw Pact armored formations may contend, “We own it all.” Inherent in this lined up along the borders that defined the “Iron Curtain” separating the occupied post- not only did the enemy have a name; it war satellites of the Soviet Union from the free also had observable military formations, states to the west. The danger was obvious: tens of thousands of Warsaw Pact tanks and armored advanced weaponry, and highly vehicles in readiness, thousands of combat air- developed doctrines of battle craft at the ready on airfields, and further to the east, intercontinental ballistic missile fields, tension is the overarching question of the pur- strategic bombers, and the Russian deep sea pose of military forces in a world much different fleet with nuclear-armed ships and submarines. from the 20th century. This threat not only included a visible adversary Do militaries now exist simply to deter of known intentions to energize what would conflict and fight nations’ wars when deterrence become the North Atlantic Treaty Organization fails? Or in an age of transnational terrorism, (NATO) and its defense planning, but also was nonstate actors, and irregular warfare, do larger utterly convincing to the taxpayers of the West purposes obtain? Is our present era truly a gen- who would have to foot the bill for some of the erational spell of “persistent conflict”?1 And if largest peacetime expenditures on defense in so, how does the military leverage its substan- modern memory. tial capacity to contribute effectively to what For the U.S. military during this 50-year has become unalterably a whole-of-government period, war was not hypothetical; the poten- fight? Finally, can the military move beyond the tial for a real war to be fought against a known core of its conventional warfare culture to grasp adversary on clearly defined terrain was ever the deeper security needs of this era and truly present. Moreover, not only did the enemy have deliver on the massive security investment that a name (the Warsaw Pact); it also had observ- it represents in ways relevant to this century? able military formations, advanced weaponry, These challenges are worthy of deep and highly developed doctrines of battle—all debate, and the consequences of error will be of which became the subject of intense study severe. At root, our challenge is to understand among the militaries of the United States and 28 | FEATURES PRISM 1, no. 1 its allies. Predictability and an unusual degree predictability attached to the Soviet threat dove- of certainty—in enemy, location, equipment, tailed well with the Army’s search for its cultural tactics—became an expected norm for mili- footing following its failure in Vietnam’s irregu- tary planning. Uncertainty was reduced to lar war. Refocusing on a major war in Europe nuances of when, where, and how to apply the offered to heal the painful scars of failed coun- “knowns” of doctrine, tactics, and equipment terinsurgency. A new doctrine called AirLand that the Warsaw Pact employed. Complex oper- Battle (ALB) became the conceptual driver of ations were no more than how to best employ the Army during the 1980s, a doctrine explicitly combined arms—infantry, tanks, and artillery developed to conventionally defeat a massive together with airpower—to defeat the Soviets Soviet armored invasion of Western Europe by on the European battlefield.2 attacking all echelons of the invading force in None of this should suggest that the U.S. the close and deep fight simultaneously.3 military in particular saw its NATO mission as With the advent of ALB doctrine, the Army the only potential zone of conflict. During the had found its concept of war. It also pioneered decades of the Cold War, the United States a system of integrating and embedding the ALB intervened with small forces in a number of doctrine into every aspect of the force, driving countries ranging from Lebanon in 1958 to everything from procurement of new equip- Panama in 1989. Major conflicts were also ment to training and leadership development. fought out on the periphery of the Cold War in This system remains deeply ingrained in the Korea (1950–1953) and Vietnam (1960–1973), Army’s institutional culture today. Typically, it is resulting in tens of thousands of casualties. Yet known by the particularly unwieldy acronym of each intervention was in fact viewed by the U.S. DOTLMP–F, which stands for doctrine, organiza- military as an excursion from the most danger- tion, training, leadership, materiel, personnel, and ous fight—an all-out war in central Europe. facilities. This was in many ways a revolutionary In the painful aftermath of failure in approach and went far in rationalizing all efforts Vietnam, irregular warfare and counterinsur- within the Army toward this common target. gency were simply tasks the Army no longer The rigorous, across-the-force application performed—or even thought about. Small-scale of the DOTLMP–F systems approach deeply contingencies were the purview of airborne institutionalized a capacity for large-scale con- troops and a growing force of special operators, ventional war in Europe into every corner of but “real Soldiers” rode to battle in armored Army culture. It not only ensured that the best vehicles—again, a massive reorientation toward weapons systems for conventional war against the central European battlefield. Complex oper- the Soviets got top priority, but it also matched ations involving host-nation forces (beyond them with organizational changes to optimize NATO), police, USAID, or diplomatic person- their performance in battle (a new infantry nel were beyond the ken of the military estab- and armor battalion organization), a rigorous lishment—certainly at the tactical level. self-critical training methodology (including The wars of 2009 and beyond exhibit few massive free-play armored force-on-force laser characteristics in common with the conflicts battles), advanced ranges and training simula- hardwired into the U.S. military’s DNA over the tors for mechanized warfare, and perhaps most last 50 years. The extended period of Cold War importantly, the recruitment and leadership PRISM 1, no. 1 FEATURES | 29 of extraordinarily high quality personnel who today is in a sense operating without a concept were bright, motivated, and superbly trained to of war and is searching desperately for the new make best use of the emerging new concepts “unified field theory” of conflict that will serve and high-tech equipment being fielded. These to organize and drive military doctrine and innovations that grew out of the massive infu- tactics, acquisition and research, training and sion of resources in the 1980s remain the cor- organization, leader development and educa- nerstone of the Army as an institution today. tion, materiel and weaponry, and personnel and Their long-term influence on Army culture and promotion policies in ways that could replace institutional preferences cannot be overstated. the legacy impact that Cold War structures still exert on all facets of the military. Today, no Today’s Conflicts agreed-upon theory of conflict drives all of these Yet conflict today has evolved dramati- critical vectors toward a commonly understood cally from the conventional “big war” environ- paradigm; the result is a profusion of disparate ment of the ALB world of the 1980s. Rather outlooks leading toward the risk of professional than a nation-state adversary armed with con- incoherence. The confidence of civilian leaders ventional military capabilities that very much and the population they serve that our military mirrored our own, today we are dealing with a will continue to prevail in conflicts regardless of world of asymmetrical threats—fighting shad- their complex nature may be in jeopardy. owy adversaries often operating at the murky Some characterize the nature of the nexus of terrorism, transnational crime, and nontraditional threat today as irregular war- illicit global money flows.
Recommended publications
  • Dominant Land Forces for 21St Century Warfare
    No. 73 SEPTEMBER 2009 Dominant Land Forces for 21st Century Warfare Edmund J. Degen A National Security Affairs aperP published on occasion by THE INSTITUTE OF LAND WARFARE ASSOCIATION OF THE UNITED STATES ARMY Arlington, Virginia Dominant Land Forces for 21st Century Warfare by Edmund J. Degen The Institute of Land Warfare ASSOCIATION OF THE UNITED STATES ARMY AN INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of ILW’s editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper, but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER NO. 73, September 2009 Dominant Land Forces for 21st Century Warfare by Edmund J. Degen Colonel Edmund J. Degen recently completed the senior service college at the Joint Forces Staff College and moved to the Republic of Korea, where he served as the U.S. Forces Korea (USFK) J35, Chief of Future Operations. He is presently the Commander of the 3d Battlefield Coordination Detachment–Korea. He previously served as Special Assistant to General William S.
    [Show full text]
  • Nuclear Deterrence and Conventional Conflict
    VIEW Sticks and Stones Nuclear Deterrence and Conventional Conflict DR. KATHRYN M.G. BOEHLEFELD n the night of 15 June 2020, Sino- Indian tensions flared into fighting along the disputed border in the region known as the Galwan Valley. The fighting led to the first casualties along the border in 45 years. However, Ono one on either side fired a single shot.1 Instead, soldiers threw rocks and used wooden clubs wrapped in barbed wire to attack one another. Two of the most powerful armies in the world, both of which possess nuclear weapons, clashed with one another using sticks and stones. Nuclear weapons prevent nuclear states from engaging in large-scale conven- tional war with one another, or at least, the existence of such advanced weapons has correlated with a significant decrease in conventional war between nuclear- armed adversaries over the past 80 years. Nuclear weapons tend to make nuclear adversaries wearier of engaging in conventional warfare with one another because they fear inadvertent escalation: that a war will spiral out of control and end in a nuclear exchange even if the war’s aims were originally fairly limited. However, this fear has not fully prevented the Chinese and Indian militaries from engaging in skirmishes, like the one that occurred in June 2020. Where does escalation to- ward nuclear war start, and what does this conflict teach both us and major world players about the dangers and opportunities associated with low levels of conflict between nuclear powers? Escalation to nuclear use may occur as a deliberate and premeditated choice or inadvertently as the result of a security dilemma, the offensive nature of militaries, and/or due to the fog of war.2 This article argues that the Sino- Indian border dispute demonstrates that the drivers of inadvertent escalation may be present even at exceptionally low levels of conflict.
    [Show full text]
  • Unconventional Warfare: a Historical Perspective
    Unconventional Warfare: A Historical Perspective NAGAO Yuichiro 1. Preface By definition, a war is fought between sovereign states, and this has become a normative concept when we talk about war. There was a historical background for this. It was the brainchild of political and intellectual leaders of the 17th and 18th centuries who sought to settle differences among people in a civilized manner, and other forms of armed conflict were severely restricted. As the years rolled on into the 20th century, however, unusual armed conflicts have steadily increased. Notwithstanding the paradigm of war between sovereign states has not yet lost its relevance. Meanwhile, the acts of terrorism committed in the United States on September 11 shook the world. Words such as “new war” and “asymmetric war” have since gained currency and have come to be used in various contexts. With these in mind, this paper will survey the history of wars between states and examine in light of these developments the significance that unconventional warfare takes on in armed conflict as a whole. 2. What is Unconventional Warfare? To start with, it is necessary to define the concept “unconventional warfare,” the subject of this paper, to clarify the points of argument contained herein. The antonym of unconventional warfare is conventional warfare, which means a battle between states’ regular armed forces. Therefore, unconventional warfare is a generic term that covers all military and quasi-military operations other than conventional warfare. More specifically, one dictionary lists under the heading “unconventional warfare” revolutionary wars and its constituents, subversion and guerrilla; command raids and other and special operations; terrorism and counter-terrorism.
    [Show full text]
  • Applying Irregular Warfare Principles to Cyber Warfare
    Soldier from 3/187th Infantry, 101st Airborne Division, out of Fort Campbell, Kentucky, sets up SATCOM to communicate further with key rear elements as part of search and attack mission in area of Narizah, Afghanistan, July 23, 2002 (U.S. Army/Todd M. Roy) Applying Irregular Warfare Principles to Cyber Warfare By Frank C. Sanchez, Weilun Lin, and Kent Korunka he cyberspace threat exists in a cyberspace and cyberspace threats that and can foresee, rapidly respond to, realm that does not conform to are initiated by faceless, borderless, and and counter cyberspace threats, the T the physical limits of land, sea, sometimes nationless enemies. These U.S. military’s strategy and approach to air, and space. Unlike these traditional enemies manifest in a domain neither cyberspace must adapt and incorporate domains, cyberspace fosters an unpre- confined nor governed by the tradi- unconventional approaches and hybrid dictable threat that can adjust, morph, tional norms and rules of war, which warfare into its operational capability. and reproduce without a national the broader military has no experience Despite its importance, the Nation’s identity or face.1 The challenge of the undertaking. To ensure the United leaders, strategists, and military planners military is to posture its approach to States maintains cyberspace dominance struggle to understand how cyberspace operations (CO) fit into national security as an instrument of national policy. A Commander Frank C. Sanchez, USN, is an Action Officer on the Joint Staff J32, Intelligence, significant shortcoming is due to the Surveillance, and Reconnaissance Operations. Major Weilun Lin, USAF, is Chief of the Central and leaders’ lack of experience and basic South Asia Branch, Joint Cyberspace Center, U.S.
    [Show full text]
  • Asia Treads the Nuclear Path, Unaware That Self- Assured Destruction Would Result from Nuclear War
    The Journal of Asian Studies Vol. 76, No. 2 (May) 2017: 437–456. © The Association for Asian Studies, Inc., 2017 doi:10.1017/S0021911817000080 Asia Treads the Nuclear Path, Unaware That Self- Assured Destruction Would Result from Nuclear War OWEN B. TOON, ALAN ROBOCK, MICHAEL MILLS AND LILI XIA F THE NINE COUNTRIES known to have nuclear weapons, six are located in Asia and Oanother, the United States, borders the Pacific Ocean. Russia and China were the first Asian nations with nuclear weapons, followed by Israel, India, Pakistan, and North Korea. Most of the world’s nuclear powers are reducing their arsenals or maintaining them at historic levels, but several of those in Asia—India, Pakistan, and North Korea— continue to pursue relentless and expensive programs of nuclear weapons development and production. Hopefully, the nuclear agreement reached in July 2015 between Iran, the European Union, and the five permanent members of the United Nations Security Council will be a step toward eliminating nuclear weapons throughout Asia and the rest of the world. As we will discuss below, any country possessing a nuclear arsenal is on a path leading toward self-assured destruction, and is a threat to people everywhere on Earth. Nuclear-armed countries are a threat to people everywhere partly because of the destructive power of single weapons—one weapon is enough to destroy a small city— and partly because of the growing ability of nations to launch missiles across the globe. Nuclear powers such as India and North Korea, the latter of which is thought currently to have a very small nuclear capability that is not in the form of useful weapons, are working on the means to deliver weapons globally.
    [Show full text]
  • The Economic Foundations of Military Power
    THE ECONOMIC FOUNDATIONS OF MILITARY POWER Emily O. Goldman and Leo J. Blanken University of California-Davis 2006-12 About the Matthew B. Ridgway Center The Matthew B. Ridgway Center for International Security Studies at the University of Pittsburgh is dedicated to producing original and impartial analysis that informs policymakers who must confront diverse challenges to international and human security. Center programs address a range of security concerns – from the spread of terrorism and technologies of mass destruction to genocide, failed states, and the abuse of human rights in repressive regimes. The Ridgway Center is affiliated with the Graduate School of Public and International Affairs (GSPIA) and the University Center for International Studies (UCIS), both at the University of Pittsburgh. This working paper is one of several outcomes of the Ridgway Working Group on the Political Economy of International Security chaired by Peter Dombrowski, Sue Eckert and William Keller. The Economic Foundations of Military Power Emily O. Goldman, University of California, Davis and Leo J. Blanken, University of California, Davis The fundamental premise of national security studies is the privileged position of the state as the key purveyor of violence. Commonly, the very form of the nation state is justified as the unit of political organization that achieves the most efficient economy of scale for generating violence (Bean 1973; Vries 2002, p. 144). Since the 1970s, advances in information, communication and transportation technologies, and the process of globalization they foster, have reduced the comparative advantages enjoyed by states in accumulating wealth and power, and monopolizing the means of destruction. Seen from this vantage point, the events of September 11 are one of the most vivid examples of the empowered non-state actor,1 particularly because the events fall within the security domain.
    [Show full text]
  • The Rise of Cyber Warfare: the Digital Age and American Decline
    The Rise of Cyber Warfare The Digital Age and American Decline Hanyu Chwe In May 2007, unknown attackers de- advantages in cyberspace; the increasing clared cyberwar on Estonia. Estonians importance of cyberwarfare will accelerate woke up to find that the websites of their the relative decline of American military banks, newspapers, and government agen- power. cies had been systematically dismantled. This was one of the world’s first cyberwar- For the purposes of this paper, I define fare attacks; I argue that it won’t be the cyberwarfare as the use of computer pro- last. grams to attack, disrupt, destroy, disable, In the future, the amount of cyberwar- or steal anything of military, economic or fare will increase drastically. First, the in- general strategic value or e↵orts to defend creased value of cyberspace increases the against such attacks. I am not considering incentives to wage cyberwarfare. Second, industrial corporate espionage, cyber at- the logic of cyberwarfare nullifies several tacks meant to aid the use of conventional mechanisms that constrain territorial war. military force, or the use of internet media Finally, the o↵ensive advantage inherent to organize social action. In my definition, in cyberwarfare exacerbates the security cyberwarfare is not intentionally accompa- dilemma. The United States lacks many nied by corresponding actions in the real of its traditional military and economic world. Cyberwarfare Incentives The strategic and economic value of state needs to guard its cyberspace in order cyberspace is huge. Facebook and to ensure stability. Google were worth 200 billion dollars It’s unlikely internet reliance will de- and 400 billion dollars in 2014 respec- crease.
    [Show full text]
  • Moving Artillery Forward: a Concept for the Fight in Afghanistan
    SMALL WARS JOURNAL smallwarsjournal.com Moving Artillery Forward: A Concept for the Fight in Afghanistan Joseph A. Jackson The United States Army is no stranger to mountainous and high-altitude war fighting. American history contains many instances of successfully executed mountain conflicts. Central to this success was the movement and use of artillery in direct support of those campaigns. The first notable American instance of moving artillery across mountainous terrain occurred when Colonel Henry Knox’s Continental Army soldiers wheeled, sledged, and levered the guns from Fort Ticonderoga across the Berkshire Mountains in the winter of 1776. These fifty-nine assorted cannon became the deciding factor in General George Washington’s siege of Boston. Other notable campaigns include the U.S. Army operations in the Italian Alps during WWII, the Taebaek Range of Korea, and the Annamite Range in Vietnam. Each of these locations and conditions provides ample instruction on artillery use in mountain warfare; yet this time fighting in the mountains of Afghanistan is proving to be a greater challenge than anticipated. Strategists and commanders who consider employment of artillery in Afghanistan should take a fresh look at history, doctrine, and tactical concepts. Doing so will ensure artillery can employ optimally, and in sufficient strength, and of the correct caliber to create the tactical conditions for success. Without a significant increase in firepower delivered by a correspondingly lightweight and maneuverable field howitzer, the long-range fight in Afghanistan will devolve into an even deadlier and protracted conflict. Solely relying on technology and precision munitions incrementally applied across the current arsenal will not achieve the conditions to exploit and pursue the insurgent fighters ever higher and farther into the mountains between Afghanistan and Pakistan.
    [Show full text]
  • Cyber Wars: a Paradigm Shift from Means to Ends
    Cyber Wars: A Paradigm Shift from Means to Ends Amit SHARMA a,1 a Institute for System Studies and Analysis (I.S.S.A), Defence Research and Development Organization (D.R.D.O), Ministry of Defence, India Abstract. The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commentators are terming this information age as a Revolution in Military Affairs (RMA). These advances have not only revolutionized the way in which wars are fought, but have also initiated a new battle for the control of a new dimension in the current contemporary world: The Cyber Space. Over time cyber warfare has assumed the shape of an elephant assessed by a group of blind people, with every one drawing different meanings based upon their perceptions. Under these circumstances there was a gradual paradigm shift in military thinking and strategies, from the strategic aspect to the tactical aspect of cyber warfare laying more emphasis on cyber attacks and counter measures. This resulted in the formation of a notion that cyber warfare or information warfare is a potent force multiplier, which in a sense downgraded the strategic aspects of cyber war to a low grade tactical warfare used primarily for a force enhancement effect. The author believes this is wrong, cyber war is a new form of warfare and, rather than cyber war merely being an enhancement of traditional operations, traditional operations will be force multipliers of cyber war.
    [Show full text]
  • New Technologies and Warfare
    New technologies and warfare Volume 94 Number 886 Summer 2012 94 Number 886 Summer 2012 Volume Volume 94 Number 886 Summer 2012 Editorial: Science cannot be placed above its consequences Interview with Peter W. Singer New capabilities in warfare: an overview [...] Alan Backstrom and Ian Henderson Cyber conflict and international humanitarian law Herbert Lin Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians Cordula Droege Some legal challenges posed by remote attack William Boothby Pandora’s box? Drone strikes under jus ad bellum, jus in bello, and international human rights law Stuart Casey-Maslen Categorization and legality of autonomous and remote weapons systems and warfare technologies New Humanitarian debate: Law, policy, action Hin-Yan Liu Nanotechnology and challenges to international humanitarian law: a preliminary legal assessment Hitoshi Nasu Conflict without casualties … a note of caution: non-lethal weapons and international humanitarian law Eve Massingham On banning autonomous weapon systems: human rights, automation, and the dehumanization of lethal decision-making Peter Asaro Beyond the Call of Duty: why shouldn’t video game players face the same dilemmas as real soldiers? Ben Clarke, Christian Rouffaer and François Sénéchaud Documenting violations of international humanitarian law from [...] Joshua Lyons The roles of civil society in the development of standards around new weapons and other technologies of warfare Brian Rappert, Richard Moyes, Anna Crowe and Thomas Nash The
    [Show full text]
  • U.S. Conventional Forces and Nuclear Deterrence: a China Case Study
    Order Code RL33607 CRS Report for Congress Received through the CRS Web U.S. Conventional Forces and Nuclear Deterrence: A China Case Study August 11, 2006 Christopher Bolkcom, Shirley A. Kan, and Amy F. Woolf Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress U.S. Conventional Forces and Nuclear Deterrence: A China Case Study Summary Congress and the Department of Defense (DOD) are engaged in an extended discourse over the future direction of U.S. defense strategy and military force structure. In the past, these discussions have focused almost exclusively on questions related to U.S. conventional military forces, with discussions about nuclear weapons held in separate fora. However, the 2005 Quadrennial Defense Review (QDR) examined both nuclear and conventional forces, a first in the QDR’s history. This indicates that analysts both inside and outside government are beginning to review and assess the potential deterrent and operational relationship between conventional and nuclear weapons. It appears that considerable pressure is building on DOD leaders to make strategy and force structure decisions with cost-effectiveness in mind. A key question for contemporary defense planners is what proportion of U.S. military capabilities should be focused on traditional military challenges and what proportion should be focused on non-traditional challenges, such as “irregular, disruptive and catastrophic” threats? To effectively analyze the desired size and characteristics of tomorrow’s military, some argue that we must take a hard look at feasible, real-world contingencies. A possible conflict with China attracts considerable attention from defense planners because it is a regional competitor today and could over time grow to be a “near-peer” competitor.
    [Show full text]
  • The Islamic State's Way of War in Iraq and Syria
    PERSPECTIVES ON TERRORISM Volume 13, Issue 1 The Islamic State’s Way of War in Iraq and Syria: From its Origins to the Post Caliphate Era By Ahmed S. Hashim Abstract This article examines the Islamic State’s way of warfare from its origins in the early 2000s to the present (2019), by analyzing and addressing the critical issues of how and why a state or non-state actor fights the way it does. Keywords: way of warfare, Islamic State, guerrilla war, Iraq, Syria Introduction Despite its defeats, which effectively ended its ‘caliphate’ in 2018, Islamic State (IS) continues to pose a threat to international security. It is therefore critical to understand IS’ way of warfare in order to defeat an “enemy that refuses to die”[1]. In 2016, IS ‘officials’ were already prepared for the possibility that they would lose territory and large numbers of personnel. Convoluted discussions about victory and defeat being part of a ‘Divine plan’ or of God’s judgment on His ‘flock,’ were rationalized by claiming that sometimes God’s favor smiles on them and sometimes it does not. However, they did not simply rely on the Divinity for explanations of their successes and setbacks; instead they took measures to lessen the impact of setbacks and to remain militarily effective much to the chagrin of their exhausted enemies. Purpose of Study Much has been written about IS’ ideology, social media operations, organization, finances, and brutality toward its foes. However, almost absent from these discussions are detailed analyses about how it fights and why it fights the way it does.
    [Show full text]