What Would You Do? Lesson Duration
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Anaconda Plan Questions
Name: edHelper The Anaconda Plan The first shots of the Civil War were fired on April 12, 1861. Within a week, President Lincoln proclaimed a blockade of Southern ports. This was the key to the North's strategy to win the war. The South's livelihood depended on selling its cash crops, mostly cotton and tobacco. If all Southern ports were blocked, it would stop the South's income from its export of crops. It would also keep the South from importing products it needed, including war supplies, medicine, and household goods. The North knew that the South had few factories and couldn't manufacture its own supplies. General Winfield Scott was the commander of the Union Army. His plan to defeat the Confederacy had three main parts: 1) Blockade all Eastern and Southern ports in the Confederate States. 2) Divide the South by taking control of the Mississippi River. 3) Control the Tennessee Valley and march through Georgia to the coast. Scott's "Anaconda Plan", as the press called it, was not well received at the time. Newspapers named the plan after a South American constricting snake. The anaconda kills by surrounding its victim and slowly crushing the life out of it. Newspapers and the public wanted an aggressive plan that would bring a quick end to the war. Scott's plan would take time. It was thought to be too passive. The press said that Scott wanted "to squeeze the South to military death." It was thought that the blockade would be an impossible task for the North to carry out. -
Stability and Arms Control in Europe: the Role of Military Forces Within a European Security System
Stability and Arms Control in Europe: The Role of Military Forces within a European Security System A SIPRI Research Report Edited by Dr Gerhard Wachter, Lt-General (Rtd) and Dr Axel Krohn sipri Stockholm International Peace Research Institute July 1989 Copyright © 1989 SIPRI All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN 91-85114-50-2 Typeset and originated by Stockholm International Peace Research Institute Printed and bound in Sweden by Ingeniörskopia Solna Abstract Wachter, G. and Krohn, A., eds, Stability and Arms Control in Europe: The Role of Military Forces within a European Security System, A SIPRI Research Report (SIPRI: Solna, Sweden, 1989), 113 pp. This report presents the outcome of a project which was initiated at SIPRI in 1987. It was supported by a grant from the Volkswagen Stiftung of the Federal Republic of Germany. The introductory chapter by the editors presents a scenario for a possible future European security system. Six essays by active NATO and WTO military officers focus on the role of military forces in such a system. Various approaches to the tasks and size of military forces in this regime of strict non-provocative defence are presented with the intent of providing new ideas for the debate on restructuring of forces in Europe. There are 3 maps, 7 tables and 11 figures. Sponsored by the Volkswagen Stiftung. Contents Preface vi Acknowledgements viii The role of military forces within a European security system 1 G. -
Chapter 11: the Civil War, 1861-1865
The Civil War 1861–1865 Why It Matters The Civil War was a milestone in American history. The four-year-long struggle determined the nation’s future. With the North’s victory, slavery was abolished. During the war, the Northern economy grew stronger, while the Southern economy stagnated. Military innovations, including the expanded use of railroads and the telegraph, coupled with a general conscription, made the Civil War the first “modern” war. The Impact Today The outcome of this bloody war permanently changed the nation. • The Thirteenth Amendment abolished slavery. • The power of the federal government was strengthened. The American Vision Video The Chapter 11 video, “Lincoln and the Civil War,” describes the hardships and struggles that Abraham Lincoln experienced as he led the nation in this time of crisis. 1862 • Confederate loss at Battle of Antietam 1861 halts Lee’s first invasion of the North • Fort Sumter fired upon 1863 • First Battle of Bull Run • Lincoln presents Emancipation Proclamation 1859 • Battle of Gettysburg • John Brown leads raid on federal ▲ arsenal at Harpers Ferry, Virginia Lincoln ▲ 1861–1865 ▲ ▲ 1859 1861 1863 ▼ ▼ ▼ ▼ 1861 1862 1863 • Russian serfs • Source of the Nile River • French troops 1859 emancipated by confirmed by John Hanning occupy Mexico • Work on the Suez Czar Alexander II Speke and James A. Grant City Canal begins in Egypt 348 Charge by Don Troiani, 1990, depicts the advance of the Eighth Pennsylvania Cavalry during the Battle of Chancellorsville. 1865 • Lee surrenders to Grant at Appomattox Courthouse • Abraham Lincoln assassinated by John Wilkes Booth 1864 • Fall of Atlanta HISTORY • Sherman marches ▲ A. -
Three Theories of Just War: Understanding Warfare As a Social Tool Through Comparative Analysis of Western, Chinese, and Islamic Classical Theories of War
THREE THEORIES OF JUST WAR: UNDERSTANDING WARFARE AS A SOCIAL TOOL THROUGH COMPARATIVE ANALYSIS OF WESTERN, CHINESE, AND ISLAMIC CLASSICAL THEORIES OF WAR A THESIS SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE DEGREE OF MASTER OF ARTS IN PHILOSOPHY MAY 2012 By Faruk Rahmanović Thesis Committee: Tamara Albertini, Chairperson Roger T. Ames James D. Frankel Brien Hallett Keywords: War, Just War, Augustine, Sunzi, Sun Bin, Jihad, Qur’an DEDICATION To my parents, Ahmet and Nidžara Rahmanović. To my wife, Majda, who continues to put up with me. To Professor Keith W. Krasemann, for teaching me to ask the right questions. And to Professor Martin J. Tracey, for his tireless commitment to my success. 1 ABSTRACT The purpose of this analysis was to discover the extent to which dictates of war theory ideals can be considered universal, by comparing the Western (European), Classical Chinese, and Islamic models. It also examined the contextual elements that drove war theory development within each civilization, and the impact of such elements on the differences arising in war theory comparison. These theories were chosen for their differences in major contextual elements, in order to limit the impact of contextual similarities on the war theories. The results revealed a great degree of similarities in the conception of warfare as a social tool of the state, utilized as a sometimes necessary, albeit tragic, means of establishing peace justice and harmony. What differences did arise, were relatively minor, and came primarily from the differing conceptions of morality and justice within each civilization – thus indicating a great degree of universality to the conception of warfare. -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
Landpower Essay Series
LANDPOWER ESSAY SERIES No. 92-3 August1992 THE UNITED STATES ARMY AT THE CROSSROADS TO THE 21st CENTURY by Colonel Wolf-Dietrich Kutter, USA Ret. Introduction This paper is intended to be provocative, to generate ideas for thought and to cross those invisible boundaries formed in our minds through years of professional concepts convergence. The U.S. Army is at a crossroads- conceptually, organizationally and institutionally- as it heads into the 21st century. The notion that we should examine fundamental premises is particularly important as we set the stage for Total Army Analysis (TAA) 1996-2001. Thus, this article seeks to foster rethinking. We are now at the beginning of an era that can be likened to the post-Napoleonic period. That era of strategic change, much like ours, marked England and reframed its focus from containment operations on the continent as the alliance leader, in concert with its Portuguese, Dutch and Prussian allies, to one of preeminent world power. The extraordinary growth of the Indian empire resulted, as well as economic growth in England which ushered in the industrial age. Paul Kennedy, in his The Rise and Fallof Great Powers, would have us believe that economic wealth and capital formation are essential to sustain great powers. One could positthat British senescence was avoided through the creative use of "trading companies" to expand Pax Britannica by minimizing its investment in standing forces. NATO's 40-year historical GNP contribution to containment and collective security ranged between three and four percent per annum, while the United States, as the alliance leader, contributed as much as six percent per annum to sustain that effort, and ultimately prevailed in the Cold War. -
Offensive Actions in Information Warfare
Strike Back: Offensive Actions in Information Warfare Donald J. Welch, Nathan Buchheit, and Anthony Ruocco Department of Electrical Engineering and Computer Science United States Military Academy West Point, New York 10996 seize the initiative from the enemy through offensive actions Introduction is doomed to defeat. In order to achieve victory we must first understand This paper is written in the context of Information Warfare our national goals and then determine what means we have being a serious and direct threat to our nation's security. The that allow us to attain them. We then identify what National Security Council defines such threats as ones that capabilities the enemy has of defeating us, thus thwarting our endanger our national goals and objectives. In general, these national goals. Information war also requires a clear include threats to the lives of American citizens and understanding of the national goals. And in fact, a residents, threats to our economy, and threats to our ability to distinguishable definition of victory becomes even more vital promulgate freedom, liberty, and the rule of law to the world. to success in information warfare since it more closely It is in our national interest to stop a terrorist organization resembles a war against terrorists, i.e. unconventional from bombing the World Trade Center. It is equally warfare, knowing enemy strengths and weaknesses than a important to our national interest to prevent Information war of armies clashing on the battlefield. Warriors from shutting down or threatening our essential In strategic terms this is referred to as identifying financial, health, or quality of life infrastructures. -
Anticipatory Self-Defense in the Cyber Context
Anticipatory Self-Defense in the Cyber Context Terry D. Gill and Paul A. L. Ducheine 89 INT’L L. STUD. 438 (2013) Volume 89 2013 International Law Studies 2013 Anticipatory Self-Defense in the Cyber Context Terry D. Gill and Paul A. L. Ducheine* I. INTRODUCTION T his article will examine the question of whether the right of self-defense under contemporary international law permits a State to react to an immi- nent or potential armed attack carried out by digital means in two circum- stances. First, as an attack occurring in conjunction with, or as an adjunct to, a conventional kinetic armed attack intended to neutralize the target State’s defensive and command and control systems. Second, as an at- tack—independent of any use of kinetic force—intended to cause signifi- cant human casualties, physical damage or large-scale disruption in the tar- get State. While the former scenario is probably considerably more likely than the latter scenario, both will receive attention. The applicable law is the same in either scenario, although there are some potentially significant differences in the modalities of its application, primarily in the identifica- tion of the attacking party and in gauging the level of the response if an attack was conducted wholly in the digital domain. * Terry D. Gill is Professor of Military Law, University of Amsterdam and Nether- lands Defence Academy. Paul A. L. Ducheine is Associate Professor of Cyber Operations, Netherlands Defence Academy, and Senior Guest Lecturer and Research Associate, Uni- versity of Amsterdam. © 2013 by Terry D. Gill and Paul A. -
The Time Value of Military Force in Modern Warfare the Airpower Advantage
The Time Value of Military Force in Modern Warfare The Airpower Advantage WALTER D. GIVHAN, Major, USAF School of Advanced Airpower Studies THESIS PRESENTED TO THE FACULTY OF THE SCHOOL OF ADVANCED AIRPOWER STUDIES, MAXWELL AIR FORCE BASE, ALABAMA, FOR COMPLETION OF GRADUATION REQUIREMENTS, ACADEMIC YEAR 1994–95. Air University Press Maxwell Air Force Base, Alabama March 1996 Disclaimer The author produced this paper in a Department of Defense school environment in the interest of academic freedom and the advancement of national defense-related concepts. The views expressed in this publication are those of the author and do not reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and policy review authorities and is cleared for public release. ii Contents Chapter Page DISCLAIMER . ii ABSTRACT . v ABOUT THE AUTHOR . vii ACKNOWLEDGMENTS . ix 1 INTRODUCTION . 1 Overview . 1 Methodology . 2 Definitions . 2 Limits of the Argument . 3 Notes . 3 2 TIME IN THE THEORY OF WAR . 5 War Theorists on Time . 6 Characteristics of Time in War . 7 Physical and Psychological Aspects of Time . 8 Political and Military Dynamics of Time . 9 Summary . 10 Notes . 11 3 THE ARAB-ISRAELI WAR OF 1967 . 13 The Course of the War . 13 Political Imperatives . 14 Military Imperatives . 15 The Time Problem . 15 Operational Consequences and Risk . 16 Airpower’s Role . 17 Summary . 19 Notes . 20 4 THE FALKLANDS WAR . 21 The Course of the War . 21 Political Imperatives . 22 Military Imperatives . 24 The Time Problem . 25 Operational Consequences and Risk . -
Russian Military Strategy: Core Tenets and Operational Concepts
August 2021 Russian Military Strategy: Core Tenets and Operational Concepts Michael Kofman, Anya Fink, Dmitry Gorenburg, Mary Chesnut, Jeffrey Edmonds, and Julian Waller With contributions by Kasey Stricklin and Samuel Bendett DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. DRM-2021-U-029755-Final Abstract This paper explores the core tenets of Russian military strategy and associated operational concepts, situating its role within the Russian system of knowledge on military security. Russian military leaders describe the prevailing strategy as ‘active defense,’ a strategic concept integrating preemptive measures to anticipate and prevent conflict, wartime concepts of operations that seek to deny an opponent decisive victory in the initial period of war, degrading and disorganizing their effort, while setting the conditions to attain war termination on acceptable terms. The strategy emphasizes integration of defensive and offensive operations, maneuver defense, sustained counterattack, disorganization of an opponent’s command and control, engagement of their forces throughout the theater of military action, including infrastructure in their homeland. Its theory of victory is premised on degrading the military-economic potential of opponents, focusing on critically important objects, to affect the ability and will of an adversary to sustain a fight, as opposed to ground offensives to seize territory or key terrain. The study also explores the content of Russian strategic operations, associated missions and tasks, the echelonment of Russian military concepts, together with Russian outlooks on the theory and practice of modern warfare. This document contains the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the sponsor Distribution DISTRIBUTION STATEMENT A. -
HST261 the American Civil War 1848-1865
WILLIAM RAINEY HARPER COLLEGE BUSINESS AND SOCIAL SCIENCE DIVISION GENERAL COURSE OUTLINE HST 261 The American Civil War 1848-1865 3-0 3 Course Course Course Title Lec-Lab Credit Prefix Number Hours COURSE DESCRIPTION Focuses on the causes, events, and immediate outcomes of the American Civil War during the period of 1848-1865. Political, military, and social history is presented so that students receive a comprehensive understanding of this seminal event in American history. TOPICAL OUTLINE I. Causes and Events Leading to the Civil War A. Why are Americans so Fascinated with the Civil War? 1. How does the Civil War live today? B. Causes of the Civil War 1. The political school of interpretation 2. The economic school of interpretation 3. The “irrepressible conflict” theory 4. The “repressible conflict” theory C. Events Leading to the Civil War 1. Differing interpretations of the Declaration of Independence 2. Differing views on the Constitution 3. The growth of slavery in the nineteenth century 4. The Missouri Compromise 5. The nullification crisis 6. The rise of the abolitionist movement 7. The increase in the proslavery movement 8. The Mexican War 9. The Wilmot Proviso 10. The Compromise of 1850 11. The 1850s: domestic conflict and violence over slavery 12. The publication of Uncle Tom’s Cabin 13. Bleeding Kansas 14. The Dred Scott decision 15. John Brown’s raid 16. Abraham Lincoln and the election of 1860 17. The Confederate attack on Fort Sumter II. On the Road to Total War, 1861-1862 A. Advantages and Disadvantages in the Resources of War 1. -
Anaconda Plan/Union Blockade/Confederate Blockade Runners
Anaconda Plan/Union Blockade/Confederate Blockade Runners By:Elishah and Gavin Interesting facts about The Anaconda plan Interesting facts about The Anaconda Plan ● The Anaconda plan is a name applied to a union Army outline strategy for suppressing the confederacy at the beginning of the American Civil War. ● The main purpose of the Anaconda plan was to defeat the rebellion by blockading southern parts and controlling the Mississippi river.This would isolate the south from the outside world. ● 90% was the confederate ships. They were able to break through the blockade in 1801 ● The plan had 3 Parts: ● Blockade of southern coastline. ● Take control of Mississippi river. ● Take richmond Virginia Interesting facts about The Union Blockade Interesting facts about The Union Blockade ● The Union blockade began just a few weeks after the start of the Civil War. Abraham Lincoln announced it on April 19, 1861. ● the Union continued to blockade the South throughout the Civil War until the war ended in 1865. ● The blockade idea was instituted by the Federal government just days after the firing on Fort Sumter which official started the Civil War. ● The Union Navy captured or destroyed around 1,500 blockade runner ships during the course of the Civil War. ● The blockade covered around 3,500 miles of coastline and 180 ports. Interesting facts about The Confederate Blockade Runners Interesting facts about The Confederate Blockade Runners ● On April 19, 1861, one week after Confederate forces attacked Fort Sumter, President Abraham Lincoln ordered the blockade. ● During the first two years of the Civil War, the blockade had very limited success.