Recent Trends in Thinking About Warfare
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How Technology Impacts Doctrine in Asymmetric Warfare
0 How Technology Impacts Doctrine in Asymmetric Warfare Jeremiah Rozman Northfield Vermont Bachelors of Arts, University of Vermont, 2014 A Thesis presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Master of Arts Department of Foreign Affairs University of Virginia May, 2016 1 Abstract How does technology impact military doctrine, and how does this in turn impact political support for offensive, preventative or preemptive military action?1 I study defensive weapons systems, specifically focusing on missile defense in the theoretical context of technology and defense-based strategies as a whole. Through the study of Israel’s use of Iron Dome, I aim to demonstrate that technology can be an exogenous factor affecting military doctrine. Through careful case study analysis, I demonstrate that operationally successful defensive technologies can lead to the adoption of a defensive military doctrine by decreasing the political cost of inaction to the extent that allowing attrition becomes politically less costly than launching an offensive. Introduction A comparison of Israel’s two recent wars in Gaza, Operation Cast Lead in 2008/9 and Operation Protective Edge in 2014, indicates that the tactical success of Iron Dome, as a defensive military technology, can effect a change in military doctrine. The goal of this study is to demonstrate the effect of an unexpectedly successful defensive military technology on military doctrine, an effect which leads to prioritizing defense, allowing attrition, and moving away from a long-standing offense-based doctrine, specifically when dealing with asymmetric conflict. This study focuses on Israel, specifically in the Gaza theater of conflict and not in the Northern theater of conflict where Israel’s adversary, Hezbollah is 1 Preemptive war is defined as actor A launching a first strike in order to gain advantage in a situation where an attack by actor B is anticipated to be imminent. -
Epic of Saltpetre to Gunpowder
Indian Journal of History of Science, 40.4 (2005) 539-57 1 EPIC OF SALTPETRE TO GUNPOWDER (Received 17 March 2005) The article provides a very tentative contour of an epic which is yet to be written in completeness, even several details of which may not have been yet discovered. Whereas the development of the nuclear weapons has taken only a few decades of the 20th century, the epic of the development of saltpetre to gunpowder, and the associated knowledge proliferation across many countries, spanned over many centuries, in fact more than a millen- nium. The Chinese origin of this epic (with a faint Indian link) is more or less established. The story of guns and other firearms is outside the scope of this article. This dissertation highlights the contributions of eminent scholars like Needham, Sarton, Gode and lqtidar Alam Khan, and also emphasizes the cross-currents of the progress and clash of civilizations, as the grand saga went on unfolding itself over the ages. History of armament research and development inevitably ushers in the philosophical issue of ends and means in the human civilization. Key Words: Chinese gunpowder tradition, Firearms, Gunpowder, Indian gunpowder tradition, Pyrotechnics, Saltpetre, Transmission, Technical terms - Arabic, Persian, Sanskrit, Turkish, Urdu. The spirit of human civilization has never endorsed 'violence', and yet has encountered violence from the Nature, the animal world and diverse and hostile human traditions as facts of life, to be resisted by scientific knowledge and technological innovations. The knowledge regarding fire and its applica- tions, some of them catastrophic, cannot be unlearnt, even for the sake of the high ideals of peace and non-violence. -
Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II. -
Information Warfare, International Law, and the Changing Battlefield
ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? ............................. -
Asymmetric Warfare - the Siege of Fallujah
ASYMMETRIC WARFARE - THE SIEGE OF FALLUJAH Csér Orsolya Abstract: Asymmetric warfare is a tactical process based on policy objectives which can be used to force our will upon the enemy. The non-traditional, inexpensive actions involving material damage and human casualties (such as terrorism, deployment of weapons of mass destruction, threat of using them, information warfare); guerrilla- and partisan-type raids implemented with simple tools and techniques are considered its basic advantages. All these are usually the weapons of the party fighting in the occupied territories (eg. bombings, suicide attacks, actions against logistics, command posts, attacks against officers, command staff, destruction of supply routes and transportation routes). The detection of these weapons and the psychological preparation of the soldiers is very difficult, because the offenders do not comply with the conventions of warfare. The siege of Fallujah in Iraq, which wrote itself into the history books as one of the most infamous and serious insurgencies and in which the media and propaganda played a major role, is regarded as an example of asymmetric warfare. Keywords: asymmetry, insurgency, guerrilla, civilians, civilian victim, propaganda, military gain 1. Introduction Asymmetry doesn't mean anything other than the lack of symmetry between the belligerents, partially or wholly. Asymmetric warfare is: "A warfare for the sake of precisely outlined political aims, often based on ideological, religious, ethnic community of several organizations, implementing military and non-military operations, tactics and techniques building upon direct and indirect effects and intensifying each other's effects, endangering different dimensions of security, mainly tactical procedures, with whose effect altogether we may force our will upon the enemy." All of this is such an activity that can be connected to asymmetric challenges, when the executors - in most cases not even sparing their own lives - execute military actions, and is usually done against a belligerent on a higher technological level. -
Barbary Pirates Peace Treaty
Barbary Pirates Peace Treaty AllenIs Hernando still hinged vulval secondly when Alden while highlightpromissory lividly? Davidde When enraptures Emilio quirk that his exposes. mayoralties buffeted not deprecatingly enough, is Matthew null? Shortly after president now colombia, and mutual respect to be safe passage for all or supplies and crew sailed a fight? Free school at peace upon terms of barbary pirates peace treaty did peace. Also missing features; pirates in barbary powers wars. European states in peace treaty of pirates on and adams feared that his men managed to. Mediterranean sea to build a decade before he knew. From the treaty eliminating tribute? Decatur also meant to treaty with the american sailors held captive during the terms apply to the limited physical violence. As means of a lucrative trade also has been under the. Not pirates had treaties by barbary states had already knew it will sometimes wise man git close to peace treaty between their shipping free. The barbary powers wars gave jefferson refused to learn how should continue payment of inquiry into the settlers were still needs you. Perhaps above may have javascript disabled or less that peace. Tunis and gagged and at each one sent a hotbed of a similar treaties not? Yet to pirates and passengers held captive american squadron passed an ebrybody een judea. President ordered to. Only with barbary pirates peace treaty with their promises cast a hunt, have detected unusual traffic activity from. Independent foreign ships, treaty was peace with my thanks to end of washington to the harbor narrow and defense policy against american. -
Warfare in a Fragile World: Military Impact on the Human Environment
Recent Slprt•• books World Armaments and Disarmament: SIPRI Yearbook 1979 World Armaments and Disarmament: SIPRI Yearbooks 1968-1979, Cumulative Index Nuclear Energy and Nuclear Weapon Proliferation Other related •• 8lprt books Ecological Consequences of the Second Ihdochina War Weapons of Mass Destruction and the Environment Publish~d on behalf of SIPRI by Taylor & Francis Ltd 10-14 Macklin Street London WC2B 5NF Distributed in the USA by Crane, Russak & Company Inc 3 East 44th Street New York NY 10017 USA and in Scandinavia by Almqvist & WikseH International PO Box 62 S-101 20 Stockholm Sweden For a complete list of SIPRI publications write to SIPRI Sveavagen 166 , S-113 46 Stockholm Sweden Stoekholol International Peace Research Institute Warfare in a Fragile World Military Impact onthe Human Environment Stockholm International Peace Research Institute SIPRI is an independent institute for research into problems of peace and conflict, especially those of disarmament and arms regulation. It was established in 1966 to commemorate Sweden's 150 years of unbroken peace. The Institute is financed by the Swedish Parliament. The staff, the Governing Board and the Scientific Council are international. As a consultative body, the Scientific Council is not responsible for the views expressed in the publications of the Institute. Governing Board Dr Rolf Bjornerstedt, Chairman (Sweden) Professor Robert Neild, Vice-Chairman (United Kingdom) Mr Tim Greve (Norway) Academician Ivan M£ilek (Czechoslovakia) Professor Leo Mates (Yugoslavia) Professor -
The Vulnerabilities of Developed States to Economic Cyber Warfare
Working Paper The Vulnerabilities of Developed States to Economic Cyber Warfare Paul Cornish Head, International Security Programme and Carrington Professor of International Security, Chatham House June 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author and Chatham House should be credited, preferably with the date of the publication. Working Paper: The Vulnerabilities of Developed States to Economic Cyber Warfare INTRODUCTION The central features of the ‘cybered’ world of the early 21st century are the interconnectedness of global communications, information and economic infrastructures and the dependence upon those infrastructures in order to govern, to do business or simply to live. There are a number of observations to be made of this world. First, it is still evolving. Economically developed societies are becoming ever more closely connected within themselves and with other, technologically advanced societies, and all are becoming increasingly dependent upon the rapid and reliable transmission of ideas, information and data. Second, where interconnectedness and dependency are not managed and mitigated by some form of security procedure, reversionary mode or redundancy system, then the result can only be a complex and vitally important communications system which is nevertheless vulnerable to information theft, financial electronic crime, malicious attack or infrastructure breakdown. -
The Sixties Counterculture and Public Space, 1964--1967
University of New Hampshire University of New Hampshire Scholars' Repository Doctoral Dissertations Student Scholarship Spring 2003 "Everybody get together": The sixties counterculture and public space, 1964--1967 Jill Katherine Silos University of New Hampshire, Durham Follow this and additional works at: https://scholars.unh.edu/dissertation Recommended Citation Silos, Jill Katherine, ""Everybody get together": The sixties counterculture and public space, 1964--1967" (2003). Doctoral Dissertations. 170. https://scholars.unh.edu/dissertation/170 This Dissertation is brought to you for free and open access by the Student Scholarship at University of New Hampshire Scholars' Repository. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of University of New Hampshire Scholars' Repository. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. -
Applying Traditional Military Principles to Cyber Warfare
2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1]. -
"Artillery Lends Dignity to What Otherwise Would Be a Common Brawl": an Essay on Post-Modern Warfare and the Classification of Captured Adversaries
Pace International Law Review Volume 14 Issue 1 Spring 2002 Article 5 April 2002 "Artillery Lends Dignity to What Otherwise Would Be a Common Brawl": An Essay on Post-Modern Warfare and the Classification of Captured Adversaries Ralph Michael Stein Pace University School of Law, [email protected] Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Ralph Michael Stein, "Artillery Lends Dignity to What Otherwise Would Be a Common Brawl": An Essay on Post-Modern Warfare and the Classification of Captured Adversaries, 14 Pace Int'l L. Rev. 133 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss1/5 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. "ARTILLERY LENDS DIGNITY TO WHAT OTHERWISE WOULD BE A COMMON BRAWL": AN ESSAY ON POST-MODERN WARFARE AND THE CLASSIFICATION OF CAPTURED ADVERSARIES Ralph Michael Stein* I. Introduction ....................................... 133 II. What is "War" in a Post-Modernist America? ...... 134 III. Warfare Moves in Two Contradictory Directions .. 140 IV. The Protection of Prisoners of War ................ 141 V. And Now, What Do We Do With the Taliban and Al Qaeda Fighters? ....... ......................... 148 1. INTRODUCTION As this essay is written many individuals believed to have adhered to the cause of terrorist activities against the United States, including participation in or support of the September 11, 2001 attacks in New York and at the Pentagon building, are in U.S. -
Recasting Russia
georgi derluguian RECASTING RUSSIA midst the clouds of apocalyptic farrago surrounding the attacks of September 11, the most significant immediate Achange in world politics has been largely obscured. The American bombardment of Afghanistan has relocated Russia within the international geopolitical order. Putin’s accession to power on the last day of 1999 was welcomed by Western capitals from the start. Blair sped to embrace him on Clinton’s behalf before he had even been installed by the manipulated popular vote of spring 2000, while relations between Moscow and its creditors in Berlin and Washington were held on an even keel throughout. But the operation that secured Putin’s domestic victory at the polls—the unleashing of a murderous second war in Chechnya—remained something of a foreign embarrass- ment. Although Clinton could freely hail the ‘liberation of Grozny’, for European sensibilities—at any rate on the continent—the mass killings and torture of Chechens was a troubling spectacle. Germany did its best to smooth over such misgivings, pentito Foreign Minister Fischer acting in the best traditions of the Wilhelmstrasse during the Armenian massacres. But public opinion—even occasionally the European Parliament—remained uneasy. Republican victory in the Presidential elections of 2000 promised fur- ther difficulties. Where Clinton and Gore had been intimately connected to Yeltsin and protective of his successor, Bush’s programme was critical of American complicity with the kleptocracy in Russia, and dismissive of the need to save Moscow’s face, pressing ahead regardless with the new version of Star Wars on which Washington had already embarked. Between European humanitarian hand-wringing and American real- politiker cold-shouldering, Russia under its former KGB operative was little more than an uncomfortable guest at the banquets of the G7.