Reflections on the Future of Warfare and Implications for Personnel Policies of the U.S. Department of Defense
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
MILITARY VEHICLES MILITARY VEHICLES Aitegrn N Al Approach
anNTE I GRAL APPROACH MILITARY VEHICLES MILITARY VEHICLES AI N NTEGRal APPROACH A CASE IN POINT THE CV9035NL INFANTRY FIGHTING VEHICLE At TNO, we are well aware of the difficulties − Protection: mine protection qualification connected with the acquisition of advanced test for accurate assessment of the load military systems. By this we mean any on the human body in case of a mine system, like the next generation Infantry attack. Fighting Vehicles. For one thing, this will − Firepower: target definition, munitions require you to look ahead, sometimes for lethality analysis, munitions develop- the next three or more decades. Which is, ment, and firing doctrine determination TNO.NL of course, a complicated matter. TNO has in connection with the gun system At TNO Defence, Safety and A military vehicle is always a compromise. been acting as a strategic partner to the calibre. Security more than 1,000 scientific A few extra inches of armour will provide Netherlands MoD for many years now. This − Mobility: operational analysis of mobility TNO researchers, engineers, IT and more safety. But it also means more weight is one of the reasons why we are confident requirements to support tracked or TNO is an independent innovation organisa- and less mobility. The ideal military vehicle operations research specialists and that we will be able to help you solve any wheeled solutions. tion that connects people and knowledge should always be custom-made for its problem in connection with protection, − Command & Control: 10 years of in order to create the innovations that countless other experts daily work anticipated mission. -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
Air Base Defense Rethinking Army and Air Force Roles and Functions for More Information on This Publication, Visit
C O R P O R A T I O N ALAN J. VICK, SEAN M. ZEIGLER, JULIA BRACKUP, JOHN SPEED MEYERS Air Base Defense Rethinking Army and Air Force Roles and Functions For more information on this publication, visit www.rand.org/t/RR4368 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0500-5 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2020 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface The growing cruise and ballistic missile threat to U.S. Air Force bases in Europe has led Headquarters U.S. -
Archie to SAM a Short Operational History of Ground-Based Air Defense
Archie to SAM A Short Operational History of Ground-Based Air Defense Second Edition KENNETH P. WERRELL Air University Press Maxwell Air Force Base, Alabama August 2005 Air University Library Cataloging Data Werrell, Kenneth P. Archie to SAM : a short operational history of ground-based air defense / Kenneth P. Werrell.—2nd ed. —p. ; cm. Rev. ed. of: Archie, flak, AAA, and SAM : a short operational history of ground- based air defense, 1988. With a new preface. Includes bibliographical references and index. ISBN 1-58566-136-8 1. Air defenses—History. 2. Anti-aircraft guns—History. 3. Anti-aircraft missiles— History. I. Title. 358.4/145—dc22 Disclaimer Opinions, conclusions, and recommendations expressed or implied within are solely those of the author and do not necessarily represent the views of Air University, the United States Air Force, the Department of Defense, or any other US government agency. Cleared for public re- lease: distribution unlimited. Air University Press 131 West Shumacher Avenue Maxwell AFB AL 36112-6615 http://aupress.maxwell.af.mil ii In memory of Michael Lewis Hyde Born 14 May 1938 Graduated USAF Academy 8 June 1960 Killed in action 8 December 1966 A Patriot, A Classmate, A Friend THIS PAGE INTENTIONALLY LEFT BLANK Contents Chapter Page DISCLAIMER . ii DEDICATION . iii FOREWORD . xiii ABOUT THE AUTHOR . xv PREFACE TO THE SECOND EDITION . xvii PREFACE TO THE FIRST EDITION . xix ACKNOWLEDGMENTS . xxi 1 ANTIAIRCRAFT DEFENSE THROUGH WORLD WAR II . 1 British Antiaircraft Artillery . 4 The V-1 Campaign . 13 American Antiaircraft Artillery . 22 German Flak . 24 Allied Countermeasures . 42 Fratricide . 46 The US Navy in the Pacific . -
Myths of Military Revolution: European Expansion and Eurocentrism
Myths of Military Revolution: European Expansion and Eurocentrism J.C. Sharman University of Cambridge Politics and International Studies Alison Richard Building, 7 West Rd Cambridge CB3 9DT, UK [email protected] This paper critiques explanations of the rise of the West in the early modern period premised on the thesis that military competition drove the development of gunpowder technology, new tactics, and the Westphalian state, innovations that enabled European trans-continental conquests. Even theories in International Relations and other fields that posit economic or social root causes of Western expansion often rely on this “military revolution” thesis as a crucial intervening variable. Yet the factors that defined the military revolution in Europe were absent in Europeans expeditions to Asia, Africa, and the Americas, and conventional accounts are often marred by Eurocentric biases. Given the insignificance of military innovations, Western expansion prior to the industrial revolution is best explained by Europeans’ ability to garner local support and allies, but especially by their deference to powerful non-Western polities. Keywords: European expansion, military revolution, Eurocentrism, early modern history, empire 1 Understandings of an early modern military revolution are crucial for fundamental International Relations (IR) concerns, including the rise of the sovereign state and the modern state system, as well as the European conquest of much of the rest of the world. This article re- examines the process of European overseas expansion in the early modern era. It critiques the military revolution thesis that recurring great power wars drove military innovation and state- building in Western Europe, which subsequently gave these states a competitive advantage they used to dominate non-European polities. -
The 'Criminology of War', What Is It Good For? Absolutely Nothing!
The ‘Criminology of War’, what is it good for? Absolutely nothing! Ross McGarry and Sandra Walklate, University of Liverpool Within this short article we intend to make some brief critical comments in response to a question we have previously posed elsewhere (see McGarry and Walklate, 2016b). As per the title of this article, we ask: ‘the criminology of war, what is it good for?’ In brief, and to complete the lyric by Edwin Starr through which we posed this question, our answer is: ‘absolutely nothing!’ (or at least, potentially). In what follows, we wish to explain our reasoning for this answer in relation to the precarious co-option of ‘war’ as a criminological ‘specialism’. It is the case that ‘criminological’ attention to ‘war’ has been intermittent during the past century, but it is not a ‘new’ object of study for social science. Our own previous work has suggested that the study of ‘war’ should be of more sustained concern to ‘criminologists’ than has previously been the case, given its existence on a complex continua of (gendered) violence, harm and victimisation (qua Cockburn, 2012); a lack of concern which (for us at least) typifies the mainstream centrefolds of criminological interests in ‘street’ crime, criminal justice processes, and so on. These interests were, and remain to be, informed by a rationale put forward by Jamieson (1998) advocating for a ‘criminology of war’. From our reading of this work however, the study of ‘war’ was not intended to be pursued as a criminological ‘specialism’; quite the opposite. A later paper, penned in Studi Sulla Questione Criminale, offers this position some additional clarity whereby Jamieson (2012) continues that, “the war/crime nexus is, or ought to be, an object of enquiry that belongs to no one, not even criminology”. -
MAPPING the DEVELOPMENT of AUTONOMY in WEAPON SYSTEMS Vincent Boulanin and Maaike Verbruggen
MAPPING THE DEVELOPMENT OF AUTONOMY IN WEAPON SYSTEMS vincent boulanin and maaike verbruggen MAPPING THE DEVELOPMENT OF AUTONOMY IN WEAPON SYSTEMS vincent boulanin and maaike verbruggen November 2017 STOCKHOLM INTERNATIONAL PEACE RESEARCH INSTITUTE SIPRI is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources, to policymakers, researchers, media and the interested public. The Governing Board is not responsible for the views expressed in the publications of the Institute. GOVERNING BOARD Ambassador Jan Eliasson, Chair (Sweden) Dr Dewi Fortuna Anwar (Indonesia) Dr Vladimir Baranovsky (Russia) Ambassador Lakhdar Brahimi (Algeria) Espen Barth Eide (Norway) Ambassador Wolfgang Ischinger (Germany) Dr Radha Kumar (India) The Director DIRECTOR Dan Smith (United Kingdom) Signalistgatan 9 SE-169 72 Solna, Sweden Telephone: +46 8 655 97 00 Email: [email protected] Internet: www.sipri.org © SIPRI 2017 Contents Acknowledgements v About the authors v Executive summary vii Abbreviations x 1. Introduction 1 I. Background and objective 1 II. Approach and methodology 1 III. Outline 2 Figure 1.1. A comprehensive approach to mapping the development of autonomy 2 in weapon systems 2. What are the technological foundations of autonomy? 5 I. Introduction 5 II. Searching for a definition: what is autonomy? 5 III. Unravelling the machinery 7 IV. Creating autonomy 12 V. Conclusions 18 Box 2.1. Existing definitions of autonomous weapon systems 8 Box 2.2. Machine-learning methods 16 Box 2.3. Deep learning 17 Figure 2.1. Anatomy of autonomy: reactive and deliberative systems 10 Figure 2.2. -
Sociology of War Sociology 40190 Spring 2015 John Levi Martin University of Chicago Fridays, 9:30 AM – 12:30 PM Classics 111
The Sociology of War Sociology 40190 Spring 2015 John Levi Martin University of Chicago Fridays, 9:30 AM – 12:30 PM Classics 111 Overview: War is a large scale social endeavor, often the most sophisticated coordination carried out by a polity. Here we investigate the nature of war, the sociological characteristics of the organizations developed for its pursuit, and its connection with different political forms. There will be a few brief forays into the consideration of the military as an occupational world, and perhaps one into quasi-war forms of political or economic violence, but the focus here will be on the organization of sustained conflict between armies and the preparation for same. This is not a class on violence, nor is it a class on military sociology. While we will bump into these topics, our focus is on war first and foremost, the preparations for and consequences of secondly, and only thirdly these other topics. However, I do bend to reach some of the more pivotal work in sociology. In some cases, that means using a somewhat less central source by a sociologist in preference to a more central one by a historian or political scientist. This is the first time I have taught this class; I am doing it to learn more about this topic. Class Format: Each class has a focal reading or set of related readings but usually only illustrating one portion of the topics to be covered in that day. Students whose work is related to these topics are encouraged to take unusual degrees of direction for these days. -
The Diffusion of Military Technologies to Foreign Nations Arms Transfers Can Preserve the Defense Technological and Industrial Base
The Diffusion of Military Technologies to Foreign Nations Arms Transfers Can Preserve the Defense Technological and Industrial Base WILLIAM J. DELGREGO, MAJOR, USAF School of Advanced Airpower Studies THESIS PRESENTED TO THE FACULTY OF THE SCHOOL OF ADVANCED AIRPOWER STUDIES, MAXWELL AIR FORCE BASE, ALABAMA, FOR COMPLETION OF GRADUATION REQUIREMENTS, ACADEMIC YEAR 1994–95. Air University Press Maxwell Air Force Base, Alabama March 1996 Disclaimer The author produced this paper in a Department of Defense school environment in the interest of academic freedom and the advancement of national defense-related concepts. The views expessed in this publication are those of the author and do not reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and policy review authorities and is cleared for public release. ii Contents Chapter Page DISCLAIMER . ii ABSTRACT . v ABOUT THE AUTHOR . vii ACKNOWLEDGMENTS . ix 1 PRESERVING THE DEFENSE TECHNOLOGICAL AND INDUSTRIAL BASE . 1 Notes . 6 2 ARMS TRANSFERS AS AN INSTRUMENT OF US FOREIGN POLICY . 7 Notes . 14 3 THE LABYRINTH OF CONTROL . 17 Notes . 27 4 MAINTAINING THE DTIB WITH US GOVERNMENT SUPPORT . 29 Notes . 34 GLOSSARY . 35 BIBLIOGRAPHY . 37 Illustrations Figure 1 US Arms Transfers—Focus on Europe, 1950–1960 . 9 2 US Arms Transfers—Focus on East Asia and the Pacific Region, 1960–1975 . 10 3 US Arms Transfers—Focus on the Near East and South Asia, 1973–1989 . 11 4 US Arms Transfers—Focus on a Two MRC Strategy, 1989–1993 . 13 5 The Labyrinth of Control . 22 6 Arms Transfers Can Help Preserve the DTIB in the Future . -
Tr-Avt-047-$$All
NORTH ATLANTIC TREATY RESEARCH AND TECHNOLOGY ORGANISATION ORGANISATION AC/323(AVT-047)TP/61 www.rta.nato.int RTO TECHNICAL REPORT TR-AVT-047 All Electric Combat Vehicles (AECV) for Future Applications (Les véhicules de combat tout électrique (AECV) pour de futures applications) Report of the RTO Applied Vehicle Technology Panel (AVT) Task Group AVT-047 (WG-015). Published July 2004 Distribution and Availability on Back Cover NORTH ATLANTIC TREATY RESEARCH AND TECHNOLOGY ORGANISATION ORGANISATION AC/323(AVT-047)TP/61 www.rta.nato.int RTO TECHNICAL REPORT TR-AVT-047 All Electric Combat Vehicles (AECV) for Future Applications (Les véhicules de combat tout électrique (AECV) pour de futures applications) Report of the RTO Applied Vehicle Technology Panel (AVT) Task Group AVT-047 (WG-015). The Research and Technology Organisation (RTO) of NATO RTO is the single focus in NATO for Defence Research and Technology activities. Its mission is to conduct and promote co-operative research and information exchange. The objective is to support the development and effective use of national defence research and technology and to meet the military needs of the Alliance, to maintain a technological lead, and to provide advice to NATO and national decision makers. The RTO performs its mission with the support of an extensive network of national experts. It also ensures effective co-ordination with other NATO bodies involved in R&T activities. RTO reports both to the Military Committee of NATO and to the Conference of National Armament Directors. It comprises a Research and Technology Board (RTB) as the highest level of national representation and the Research and Technology Agency (RTA), a dedicated staff with its headquarters in Neuilly, near Paris, France. -
Obeying Orders: Atrocity, Military Discipline, and the Law of War
California Law Review VOL. 86 OCTOBER 1998 No. 5 Copyright © 1998 by California Law Review, Inc. Obeying Orders: Atrocity, Military Discipline, and the Law of War Mark J. Osielt TABLE OF CONTENTS Introduction ..................................................................................... 944 General Background ......................................................................... 946 A. Genealogy of Terms ............................................................. 951 B. "Cracking the Culture" of the "Separate Community" ...... 953 C. Civilian and Military Approaches to Legal Error ................... 959 D. Current Law as Compromise ................................................. 961 E. Why Ever Excuse Obedience to Illegal Orders? ............ .. .......965 I. Obedience to Superior Orders: The Uncertain Scope of Manifest Illegality ....................................................................... 969 A. The Nature of the Defense .................................................... 971 Copyright © 1998 California Law Review, Inc. t Mark J. Osiel, Professor of Law, University of Iowa. J.D., Ph.D., Harvard University, 1987. For their helpful comments, I would like to thank Steven Burton, Eliot A. Cohen, Mary Dudziak, Sir Michael Howard, Kenneth Kress, Col. Howard Levie, Lt. Col. Mark Martins, John Norton Moore, Maj. Gen. A.P.V. Rogers, Tina Rosenberg, Col. Scott Silliman, Robert F. Turner, Detlev Vagts, Lea Vandervelde, and the participants in faculty seminars at Stanford and the University of Iowa. Conversations with several leading Judge Advocate General (hereinafter JAG) officers and civilian Defense Department lawyers, whose anonymity must be preserved, proved invaluable. Discussions with Carlos Nino and Jaime Malamud-Goti, while they were prosecuting officers for crimes arising from Argentina's "dirty war," were also very helpful. I am grateful to several members of legal academia who were willing, on condition of anonymity, to share some rather unflattering tales of their own military activities during World War II and the Korean War. -
The Army in Peace Time: the Social Status and Function of Soldiers
394 Rance Chapter 11 The Army in Peace Time: The Social Status and Function of Soldiers Philip Rance During the Late Roman and Middle Byzantine periods, the place of soldiers in society and their roles and activities when not at war embraced great variations of time, place and context. The evidence for soldiers’ status and function is chronologically and geographically uneven: documentation accu- mulates in late antiquity, owing to imperial law codes and Egyptian papyri, while corresponding Middle Byzantine source-material is comparatively meagre, especially during the 7th-/8th-century “dark age”. In both periods the problem of defining a “soldier” (stratiotes) arises. Although different sources employ this term with varying degrees of specificity, between c. 300 and c. 1200 its usage encompasses a spectrum of full- or part-time, indigenous or foreign servicemen, ancillary forces and semi-private retainers, ranging from an elite guardsman patrolling a palace in Constantinople to a paramilitary “irregular” on seasonal lookout duty at a frontier pass, while in 10th-/11th-century texts “soldier” can signify a landholder who personally performed no military ser- vice but contributed to the upkeep of a combatant. “Soldiers” therefore differed not merely by rank, seniority or unit-type, but in their terms and conditions of service, legal status and institutional identities, which variously reflected their environment, socio-economic background, mode of recruitment, regional affiliations and/or ethnicity. Within this diversity, different mechanisms and approximate levels of remuneration, along with fiscal and juridical immuni- ties, suggest that soldiers shared a relatively privileged position in society, even if Middle Byzantine sources record disparities in income and assets.