Airpower, Afghanistan, and the Future of Warfare an Alternative View
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How the Luftwaffe Lost the Battle of Britain British Courage and Capability Might Not Have Been Enough to Win; German Mistakes Were Also Key
How the Luftwaffe Lost the Battle of Britain British courage and capability might not have been enough to win; German mistakes were also key. By John T. Correll n July 1940, the situation looked “We shall fight on the beaches, we shall can do more than delay the result.” Gen. dire for Great Britain. It had taken fight on the landing grounds, we shall Maxime Weygand, commander in chief Germany less than two months to fight in the fields and in the streets, we of French military forces until France’s invade and conquer most of Western shall fight in the hills; we shall never surrender, predicted, “In three weeks, IEurope. The fast-moving German Army, surrender.” England will have her neck wrung like supported by panzers and Stuka dive Not everyone agreed with Churchill. a chicken.” bombers, overwhelmed the Netherlands Appeasement and defeatism were rife in Thus it was that the events of July 10 and Belgium in a matter of days. France, the British Foreign Office. The Foreign through Oct. 31—known to history as the which had 114 divisions and outnumbered Secretary, Lord Halifax, believed that Battle of Britain—came as a surprise to the Germany in tanks and artillery, held out a Britain had lost already. To Churchill’s prophets of doom. Britain won. The RAF little longer but surrendered on June 22. fury, the undersecretary of state for for- proved to be a better combat force than Britain was fortunate to have extracted its eign affairs, Richard A. “Rab” Butler, told the Luftwaffe in almost every respect. -
The Intelligence Community in Counterinsurgency
The Intelligence Community in Counterinsurgency: Historical Lessons and Best Practices A Report of the Bush School of Government & Public Service for the RAND Corporation’s Intelligence Policy Center (IPC) The Intelligence Community in Andrew C. Albers Samuel G. Binkley Counterinsurgency: Mariam F. Chaudhry Historical Lessons and Kimberly Craswell Jordan S. Freeman Best Practices Carrie E. Lytle Tristan L. Myers Rami Naser Peter T. Sloan The recently updated counterinsurgency (COIN) doctrine for the U.S. Army (FM 3-24) includes a lengthy discussion of the role of intelligence in COIN, but does not give the U.S. intelligence community useful guidelines for operations.1 Instead, the field manual provides an all-inclusive laundry list of information to be collected without any useful guidance on priorities and methods. The manual acknowledges the crucial role of the intelligence community in COIN, but leaves out an actionable set of standards to guide its operations. To lay the groundwork for an intelligence doctrine, or a set of best practices, for COIN, this report reviews the literature on both the role of intelligence and how counterinsurgency operations are fought and won. We use this literature to create a framework outlining how For helpful comments on this project the authors would like to thank William Rosenau, Kathi Webb, Michael Spirtas, Michael Hix, Roger Molander, and the other RAND researchers who engaged the research team, as well as the faculty and students of the Bush School of Government and Public Service at Texas A&M University. The authors would also like to thank John Parachini for his helpful suggestions, comments, and, especially, his generous support and sponsorship of this project. -
Operation Iraqi Freedom
Operation Iraqi Freedom: A First-Blush Assessment Andrew F. Krepinevich 1730 Rhode Island Avenue, NW, Suite 912 Washington, DC 20036 Operation Iraqi Freedom: A First-Blush Assessment by Andrew F. Krepinevich Center for Strategic and Budgetary Assessments 2003 ABOUT THE CENTER FOR STRATEGIC AND BUDGETARY ASSESSMENTS The Center for Strategic and Budgetary Assessments is an independent public policy research institute established to promote innovative thinking about defense planning and investment strategies for the 21st century. CSBA’s analytic-based research makes clear the inextricable link between defense strategies and budgets in fostering a more effective and efficient defense, and the need to transform the US military in light of the emerging military revolution. CSBA is directed by Dr. Andrew F. Krepinevich and funded by foundation, corporate and individual grants and contributions, and government contracts. 1730 Rhode Island Ave., NW Suite 912 Washington, DC 20036 (202) 331-7990 http://www.csbaonline.org ACKNOWLEDGMENTS The author would like to thank Steven Kosiak, Robert Martinage, Michael Vickers and Barry Watts, who reviewed several drafts of this report. Their comments and suggestions proved invaluable. Critical research assistance was provided by Todd Lowery. His support in chasing down numerous sources and confirming critical facts proved indispensable. Alane Kochems did a fine job editing and proofing the final report draft, while Alise Frye graciously helped craft the report’s executive summary. I am most grateful for their encouragement and support. Naturally, however, the opinions, conclusions and recommendations in this report are the sole responsibility of the author. CONTENTS EXECUTIVE SUMMARY .......................................................................................................... I I. INTRODUCTION ........................................................................................................ 1 II. STRATEGIC IMPLICATIONS ........................................................................................ -
Congressional Record—House H4644
H4644 CONGRESSIONAL RECORD — HOUSE June 21, 2004 GREENWOOD) came running up to me months he had in power before 9/11, Saudis or the Pakistanis or anyone else when he saw me and said, ‘‘How did you was, along with a few others, in a high to provide the leadership. It is up to know? How did you know?’’ Well, the level position to argue against, if not the people of the United States and our question is why did any of us not to change, the grotesquely mistaken leaders here to lead the way, and I have know? Why did we not know? Why did policies of the eighties and nineties, every confidence that our President those whom we have hired to protect but he failed to do so. In fact, we know will do and is doing just that. us not know? a few of the things that he did were ex- f It is time for those who made pos- actly in the wrong direction. sible the rise of the Taliban, the rise of If another 9/11 is to be avoided, we LEAVE OF ABSENCE bin Laden, and, yes, the tragedy of 9–11 need accountability. We do not need By unanimous consent, leave of ab- to be held personally accountable and the rearranging of a bureaucratic orga- sence was granted to: for us to understand the policies and nizational chart. There is nothing Mr. BECERRA (at the request of Ms. the people that caused 9–11. It was not wrong with our system that brought on PELOSI) for today on account of per- something that was ordained by God to 9/11, and there is nothing wrong with sonal reasons. -
Traces Volume 30, Number 4 Kentucky Library Research Collections Western Kentucky University, [email protected]
Western Kentucky University TopSCHOLAR® Traces, the Southern Central Kentucky, Barren Kentucky Library - Serials County Genealogical Newsletter Winter 2002 Traces Volume 30, Number 4 Kentucky Library Research Collections Western Kentucky University, [email protected] Follow this and additional works at: https://digitalcommons.wku.edu/traces_bcgsn Part of the Genealogy Commons, Public History Commons, and the United States History Commons Recommended Citation Kentucky Library Research Collections, "Traces Volume 30, Number 4" (2002). Traces, the Southern Central Kentucky, Barren County Genealogical Newsletter. Paper 121. https://digitalcommons.wku.edu/traces_bcgsn/121 This Newsletter is brought to you for free and open access by TopSCHOLAR®. It has been accepted for inclusion in Traces, the Southern Central Kentucky, Barren County Genealogical Newsletter by an authorized administrator of TopSCHOLAR®. For more information, please contact [email protected]. ISSN - 0882-2158 2002 VOLUME 30 ISSUE NO. 4 WINTER TR?iCES i -if •i i i FIRST PRESBYTERIAN CHURCH GLASGOW, KENTUCKY Quarterly Publication of THE SOUTH CENTRAL KENTUCKY HISTORICAL AND GENEALOGICAL SOCIETY, INCORPORATED P.O. Box 157 Glasgow, Kentucky 42142-0157 SOUTH CENTRAL KENTUCKY HISTORTrAT AND GENEALOGICAL SOCIETY Post Office Box 157 Glasgow, KY 42142-0157 OFFICERS AND DIRECTORS 2001-2002 PRESIDENT Joe DoDald Taylor l^'^VICE PRESIDENT Vacant 2"'* VICE PRESIDENT Kenneth Beard, Membenhiip 3'" VICE PRESIDENT Brice T. Leech RECORDING SECRETARY Gayle Berry CORRESPONDING SECRETARY/ TREASLHER Juanita Bardin ASSISTANT TREASURER Ruth Wood "TRACES" EDITOR Sandi Gorin BOARD OF DIRECTORS Hack Bertram Mary Ed Chamberlain Clorine Lawson Don Novosel Ann Rogers PAST PRESTDENTS Paul Bastien L. E. Calhoun Cecil Goode Kay Harbison Jerry Houchens Brice T. Leech John Mutter James Simmons * Katie M. -
The Politics of Security in Ninewa: Preventing an ISIS Resurgence in Northern Iraq
The Politics of Security in Ninewa: Preventing an ISIS Resurgence in Northern Iraq Julie Ahn—Maeve Campbell—Pete Knoetgen Client: Office of Iraq Affairs, U.S. Department of State Harvard Kennedy School Faculty Advisor: Meghan O’Sullivan Policy Analysis Exercise Seminar Leader: Matthew Bunn May 7, 2018 This Policy Analysis Exercise reflects the views of the authors and should not be viewed as representing the views of the US Government, nor those of Harvard University or any of its faculty. Acknowledgements We would like to express our gratitude to the many people who helped us throughout the development, research, and drafting of this report. Our field work in Iraq would not have been possible without the help of Sherzad Khidhir. His willingness to connect us with in-country stakeholders significantly contributed to the breadth of our interviews. Those interviews were made possible by our fantastic translators, Lezan, Ehsan, and Younis, who ensured that we could capture critical information and the nuance of discussions. We also greatly appreciated the willingness of U.S. State Department officials, the soldiers of Operation Inherent Resolve, and our many other interview participants to provide us with their time and insights. Thanks to their assistance, we were able to gain a better grasp of this immensely complex topic. Throughout our research, we benefitted from consultations with numerous Harvard Kennedy School (HKS) faculty, as well as with individuals from the larger Harvard community. We would especially like to thank Harvard Business School Professor Kristin Fabbe and Razzaq al-Saiedi from the Harvard Humanitarian Initiative who both provided critical support to our project. -
Address Before a Joint Session of the Congress on the Persian Gulf Crisis and the Federal Budget Deficit
Address before a joint session of the Congress on the Persian Gulf crisis and the federal budget deficit. Powers and Principalities This WordPress.com site is The tAhme ecraitc’as npsa jwamitha Ds isabilities Act Conspiracy Blog Stats 11,545 hits The American with Disabilities Act Conspiracy The American with Disabilities Act was not the social security disability retirement act, and the timing of the enactment of the legislation by President George HW Bush on July 26, 1990 was an “inclusion” fraud and conspiracy with me specifically in mind, my postal hiring (orientation) had been scheduled approximately at least two months prior to my starting date of July 30, 1990. George HW Bush was Congressman from Texas, Ambassador to China, Central Intelligence director, and Vice president of the United States for eight years and President for four years. The invasion into Kuwait on August 2, 1990 was an intentional scheme act. Jury duty beginning January 14, 1991 was an extension of the scheme, with Saddam Hussein’s deadline to withdraw troops from Kuwait being on January 16, 1991 and the declaration of Desert Storm, a name chosen from the bible…..Daniel chapter 11. The 9/11/90 New World Order speech was the first speech I watched the president make as a new Federal employee. A five point speech. The directions and recommendation to fill out an EEO after the Waco, Texas siege that ended April 19, 1993, had begun was a continuation with the War crimes tribunal for the former Yugoslavia. The timing of proposed resolutions and nominations and resolution passage and confirmations, with the presumed foresight of those involved of the conclusions of the motions. -
CRS Issue Brief for Congress Received Through the CRS Web
Order Code IB92117 CRS Issue Brief for Congress Received through the CRS Web Iraq: Weapons Programs, U.N. Requirements, and U.S. Policy Updated September 2, 2003 Kenneth Katzman Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress CONTENTS SUMMARY MOST RECENT DEVELOPMENTS BACKGROUND AND ANALYSIS History of Weapons Inspections 1997-1998 Crises Operation Desert Fox and Resolution 1284 “Axis of Evil” and U.S. Policy Resolution 1441 Wartime and Post-War WMD Search Post-War Fallout Nuclear Program Post-War Findings Chemical Weapons Post-War Findings Biological Weapons Post-War Findings Ballistic Missiles Post-War Findings Human Rights/War Crimes Issues Post-War Findings Support for International Terrorism Post-War Status Iraq-Kuwait Issues Border Issues/Kuwaiti Sovereignty Kuwaiti Detainees and Property Post-War Findings Reparations Payments Unwinding the Containment Policy Reconstruction and Ending the Oil-for-Food Program Changing U.S. Military Deployments Costs of Containment Fitting Iraq’s Ethnicities into the Post-War Political Structure Kurds/Operation Northern Watch (ONW) Shiite Muslims/Operation Southern Watch IB92117 09-02-03 Iraq: Weapons Programs, U.N. Requirements, and U.S. Policy SUMMARY After asserting that Iraq had failed to States has said it, not the United Nations, will comply with U.N. Security Council resolu- be responsible for post-war WMD searches. tions that require Iraq to rid itself of weapons of mass destruction (WMD), the Bush Admin- On November 10, 1994, Iraq accepted a istration began military action against Iraq on U.N.-designated land border with Kuwait March 19, 2003, and the regime of Saddam (confirmed by Resolution 833) as well as Hussein fell on April 9. -
Kamikazes! When Japanese Planes Attacked the U.S. Submarine Devilfish
KAMIKAZES! When Japanese Planes Attacked the U.S. Submarine Devilfish by NATHANIEL PATCH he image of desperate Japanese pilots purposely flying their Tplanes into American warships in the closing months of World War II figures prominently in American popular culture. When most people hear the term kamikaze, they think Fortunately, the Devilfish was close to the surface when of swarms of planes flying through a torrent of antiaircraft the explosion occurred, and the submarine took only mi fire and plowing into the decks of aircraft carriers, battle nor damage that the crew could control. ships, cruisers, and destroyers, taking the lives of sailors and The officers and crew in the control room took quick ac damaging or sinking the ships in this desperate act. tion to prevent the submarine from sinking and to mitigate Out of the hundreds of these attacks, one was quite un the damage done by the incoming saltwater. They leveled usual: the only kamikaze attack on an American subma off the submarine at 80 feet, and the drain pumps were rine, the USS Devilfish (SS 292). barely keeping up with the incoming water. The bilges of Why was this submarine attacked, and why was there the conning tower filled rapidly, and water began pouring only one attacker? The story of the attack on the Devilfish into the control room. A constant spray of saltwater from seems to be a fragment of a larger story, separated by time the conning tower splashed onto the electrical panels and and distance, occurring on March 20, 1945. If kamikazes consoles in the control room. -
Strange Victory: a Critical Appraisal of Operation Enduring Freedom and the Afghanistan War
30 JANUARY 2002 RESEARCH MONOGRAPH #6 Strange Victory: A critical appraisal of Operation Enduring Freedom and the Afghanistan war Carl Conetta PROJECT ON DEFENSE ALTERNATIVES COMMONWEALTH INSTITUTE, CAMBRIDGE, MASSACHUSETTS Contents Introduction 3 1. What has Operation Enduring Freedom accomplished? 4 1.1 The fruits of victory 4 1.1.1 Secondary goals 5 1.2 The costs of the war 6 1.2.1 The humanitarian cost of the war 7 1.2.2 Stability costs 7 2. Avoidable costs: the road not taken 9 3. War in search of a strategy 10 3.1 The Taliban become the target 10 3.2 Initial war strategy: split the Taliban 12 3.2.1 Romancing the Taliban 13 3.2.2 Pakistan: between the devil and the red, white, and blue 14 3.3 The first phase of the air campaign: a lever without a fulcrum 15 3.3.1 Strategic bombardment: alienating hearts and minds 15 3.4 A shift in strategy -- unleashing the dogs of war 17 4. A theater redefined 18 4.1 Reshuffling Afghanistan 19 4.2 Regional winners and losers 20 4.3 The structure of post-war Afghan instability 21 4.3.1 The Bonn agreement: nation-building or “cut and paste”? 22 4.3.2 Peacekeepers for Afghanistan: too little, too late 24 4.4 A new game: US and Afghan interests diverge 25 4.4.1 A failure to adjust 26 5. The tunnel at the end of the light 28 5.1 The path charted by Enduring Freedom 28 5.2 The triumph of expediency 29 5.3 The ascendancy of Defense 29 5.4 Realism redux 31 5.5 Bread and bombs 32 5.6 The fog of peace 34 Appendix 1. -
American War and Military Operations Casualties: Lists and Statistics
American War and Military Operations Casualties: Lists and Statistics Updated July 29, 2020 Congressional Research Service https://crsreports.congress.gov RL32492 American War and Military Operations Casualties: Lists and Statistics Summary This report provides U.S. war casualty statistics. It includes data tables containing the number of casualties among American military personnel who served in principal wars and combat operations from 1775 to the present. It also includes data on those wounded in action and information such as race and ethnicity, gender, branch of service, and cause of death. The tables are compiled from various Department of Defense (DOD) sources. Wars covered include the Revolutionary War, the War of 1812, the Mexican War, the Civil War, the Spanish-American War, World War I, World War II, the Korean War, the Vietnam Conflict, and the Persian Gulf War. Military operations covered include the Iranian Hostage Rescue Mission; Lebanon Peacekeeping; Urgent Fury in Grenada; Just Cause in Panama; Desert Shield and Desert Storm; Restore Hope in Somalia; Uphold Democracy in Haiti; Operation Enduring Freedom (OEF); Operation Iraqi Freedom (OIF); Operation New Dawn (OND); Operation Inherent Resolve (OIR); and Operation Freedom’s Sentinel (OFS). Starting with the Korean War and the more recent conflicts, this report includes additional detailed information on types of casualties and, when available, demographics. It also cites a number of resources for further information, including sources of historical statistics on active duty military deaths, published lists of military personnel killed in combat actions, data on demographic indicators among U.S. military personnel, related websites, and relevant CRS reports. Congressional Research Service American War and Military Operations Casualties: Lists and Statistics Contents Introduction .................................................................................................................................... -
Effects-Based Operations and the Law of Aerial Warfare
Washington University Global Studies Law Review Volume 5 Issue 2 January 2006 Effects-based Operations and the Law of Aerial Warfare Michael N. Schmitt George C. Marshall European Center for Security Studies Follow this and additional works at: https://openscholarship.wustl.edu/law_globalstudies Part of the Military, War, and Peace Commons Recommended Citation Michael N. Schmitt, Effects-based Operations and the Law of Aerial Warfare, 5 WASH. U. GLOBAL STUD. L. REV. 265 (2006), https://openscholarship.wustl.edu/law_globalstudies/vol5/iss2/2 This Article is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Global Studies Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Washington University Global Studies Law Review VOLUME 5 NUMBER 2 2006 EFFECTS-BASED OPERATIONS AND THE LAW OF AERIAL WARFARE MICHAEL N. SCHMITT* Law responds almost instinctively to tectonic shifts in warfare.1 For instance, the Fourth Geneva Convention of 1949 constituted a dramatic reaction to the suffering of civilian populations during World War II.2 Similarly, the 1977 Protocols Additional3 updated and expanded the law of armed conflict (LOAC) in response both to the growing prevalence of non-international armed conflicts and wars of national liberation and to the recognized need to codify the norms governing the conduct of hostilities.4 In light of this symbiotic relationship, it is essential that LOAC experts carefully monitor developments in military affairs, because such developments may well either strain or strengthen aspects of that body of law.5 As an example, the widespread use in Iraq of civilian contractors and * Professor of International Law and Director, Program in Advanced Security Studies, George C.