“Three Warfares”: People's Liberation Army
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Redalyc.Lawfare: the Colombian Case
Revista Científica General José María Córdova ISSN: 1900-6586 [email protected] Escuela Militar de Cadetes "General José María Córdova" Colombia Padilla, Juan Manuel Lawfare: The Colombian Case Revista Científica General José María Córdova, vol. 10, núm. 10, 2012, pp. 107-142 Escuela Militar de Cadetes "General José María Córdova" Bogotá, Colombia Available in: http://www.redalyc.org/articulo.oa?id=476248923006 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Estudios militares Revista Científica “General José María Córdova”, Bogotá D.C. (Colombia) Sección . Vol 10, Núm 10, Año 2012, Junio REVCGJMC.10(10): 107-142, 2012 Lawfare: The Colombian Case * Guerra jurídica: el caso colombiano La guerre juridique: le cas colombien Guerra jurídica: o caso colombiano Recibido: 20 de Febrero de 2012. Aceptado: 15 de Abril de 2012. Juan Manuel Padillaa * Researche monograph originally presented to the School of Advanced Military Studies of the United States Command and General Staff College, Fort Leavenworth, Kansas, approved for Revista Cientifica Public Release. “General José María Córdova”, Bogotá D.C. (Colombia) a Máster en Ciencias y Artes Militares , U.S. Army Command and General Staff College. Director Sección Estudios militares. de la Escuela Militar de Cadetes “General José María Córdova”. Comentarios a: jumapac@gmail. Vol 10 , Núm 10, Año 2012, com Junio, pp. 107-142 ISSN 1900- 6586 108 Juan Manuel Padilla Abstract. The terrorist groups in Colombia have applied Mao’s theory of protracted people’s war, seeking to use all available means of struggle to achieve their revolutionary goals by counteracting govemment policy. -
Information Warfare, International Law, and the Changing Battlefield
ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? ............................. -
Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer. -
2019 China Military Power Report
OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China ANNUAL REPORT TO CONGRESS Military and Security Developments Involving the People’s Republic of China 2019 Office of the Secretary of Defense Preparation of this report cost the Department of Defense a total of approximately $181,000 in Fiscal Years 2018-2019. This includes $12,000 in expenses and $169,000 in DoD labor. Generated on 2019May02 RefID: E-1F4B924 OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019 A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended Section 1260, “Annual Report on Military and Security Developments Involving the People’s Republic of China,” of the National Defense Authorization Act for Fiscal Year 2019, Public Law 115-232, which amends the National Defense Authorization Act for Fiscal Year 2000, Section 1202, Public Law 106-65, provides that the Secretary of Defense shall submit a report “in both classified and unclassified form, on military and security developments involving the People’s Republic of China. The report shall address the current and probable future course of military-technological development of the People’s Liberation Army and the tenets and probable development of Chinese security strategy and military strategy, and of the military organizations and operational concepts supporting such development over the next 20 years. -
The Curious Career of Lawfare, 43 Case W
Case Western Reserve Journal of International Law Volume 43 | Issue 1 2010 The urC ious Career of Lawfare Wouter G. Werner Follow this and additional works at: https://scholarlycommons.law.case.edu/jil Part of the International Law Commons Recommended Citation Wouter G. Werner, The Curious Career of Lawfare, 43 Case W. Res. J. Int'l L. 61 (2010) Available at: https://scholarlycommons.law.case.edu/jil/vol43/iss1/4 This Article is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Journal of International Law by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. File: Werner 2 Created on: 12/23/2010 9:05:00 PM Last Printed: 4/5/2011 8:14:00 PM THE CURIOUS CAREER OF LAWFARE Wouter G. Werner* This article discusses some different uses of the term „lawfare‟ since the 1970‟s. The main aim of the article is to explore how particular ways of framing the concept of “lawfare” affect questions of legal, moral, and polit- ical accountability. In particular, the article contrasts the way in which the term „lawfare‟ has been used in critical theory with the instrumentalization of the term in neoconservative thinking. While critical theory has used the term to rethink questions of accountability and to spur a process of self- critique, neoconservative thinking has mainly used to term to discredit an opponent‟s reliance on law and legal procedure. This has turned the use of the term „lawfare‟ itself into a strategic move—a move that could eventually undermine the integrity of law. -
Red Diamond Published by TRADOC G-2 Operational INSIDE THIS ISSUE Environment & Threat Analysis Directorate, Fort Leavenworth, KS
Operational Environment & Threat Analysis Volume 10, Issue 3 July - September 2019 Focus on CHINA Bits in the Wire: Advancing Threats in China’s the Cyber Domain Maritime Militia Also: Worldwide Equipment Guide (WEG) Showcase and Updates APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED OEE Red Diamond published by TRADOC G-2 Operational INSIDE THIS ISSUE Environment & Threat Analysis Directorate, Fort Leavenworth, KS Competition in 2035: Training for Multi-Domain Topic Inquiries: Operations in Competition with China .................... 3 Angela Williams (DAC), Branch Chief, Training & Support Jennifer Dunn (DAC), Branch Chief, Analysis & Production China’s Belt and Road Initiative and Its Infamous Debt: More of a Threat than a Trap ................................... 8 OE&TA Staff: Penny Mellies (DAC) Director, OE&TA [email protected] 913-684-7920 China’s Maritime Militia ........................................ 11 MAJ Megan Williams MP LO [email protected] WO2 Rob Whalley UK LO Bits in the Wire: Advancing Threats [email protected] 913-684-7994 in the Cyber Domain ........................................... 20 SGT Rodney Knox AU LO [email protected] 913-684-7928 The Combined Arms Battalion and Combined Arms Laura Deatrick (CTR) Editor Brigade: The New Backbone of the Chinese Army .. 27 [email protected] 913-684-7925 Keith French (CTR) Geospatial Analyst [email protected] 913-684-7953 INTERVIEW Interview: Dennis J. Blasko, LTC, USA (Ret) ............ 42 Angela Williams (DAC) Branch Chief, T&S [email protected] 913-684-7929 Film Review: Operation Red Sea ........................... 47 John Dalbey (CTR) Military Analyst [email protected] 913-684-7939 Jerry England (DAC) Intelligence Specialist [email protected] 913-684-7934 WEG Showcase .................................................. -
ISLAMIST LAWFARE: BRIEFS AS WEAPONS of MASS DISRUPTION by Lawrence A
Foreign Policy Research Institute E-Notes A Catalyst for Ideas Distributed via Email and Posted at www.fpri.org June 2010 ISLAMIST LAWFARE: BRIEFS AS WEAPONS OF MASS DISRUPTION By Lawrence A. Husick, Esq. Lawrence Husick is a Senior Fellow at FPRI’s Center on Terrorism and Counter-Terrorism. He concentrates on the study of terrorist tactics and counterterrorism strategies, with a particular focus on technology leverage as a defining characteristic of the modern terrorist. He is also co-director of the FPRI Wachman Center’s Program on Teaching the History of Innovation. He is a practicing intellectual property attorney. The 2009 Christmas-day bombing attempt on a commercial flight to Detroit was not the first time that terrorists have used briefs as a weapon. A recent presentation in Philadelphia by Daniel Huff, director of the Legal Project of the Middle East Forum, detailed the use of lawsuits by Islamic organizations as a method of silencing criticism and chilling free speech. “Lawfare” is the wrongful use of a legal process to silence and punish free speech critical of radical Islam, terrorism, or its sources of financing. Lawfare also seeks to enact or reinstate blasphemy laws, especially as applied to Islam and its prophet, Mohammad. Libel, defamation, and “hate speech” suits have been pressed in the United States, Great Britain, and elsewhere, with the intent of inflicting great expense on terrorism researchers, their sponsors and publishers. For those who publish primarily on the Internet, however, there may be a preemptive legal strategy available that strikes a blow at the heart of Islamist lawfare. -
Carl Schmitt and the Critique of Lawfare
Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2011 Carl Schmitt and the Critique of Lawfare David Luban Georgetown University Law Center, [email protected] Georgetown Public Law and Legal Theory Research Paper No. 11-33 This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/621 http://ssrn.com/abstract=1797904 43 Case W. Res. J. Int'l L. 457-471 (2010) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Human Rights Law Commons, Legal History Commons, and the Military, War, and Peace Commons CARL SCHMITT AND THE CRITIQUE OF LAWFARE David Luban (forthcoming, Case Western International Law Review, symposium on lawfare) ABSTRACT “Lawfare” is the use of law as a weapon of war against a military adversary. Lawfare critics complain that self-proclaimed “humanitarians” are really engaged in the partisan and political abuse of law—lawfare. This paper turns the mirror on lawfare critics themselves, and argues that the critique of lawfare is no less abusive and political than the alleged lawfare it attacks. Radical lawfare critics view humanitarian law with suspicion, as nothing more than an instrument used by weak adversaries against strong military powers. Casting suspicion on humanitarian law by attacking the motives of humanitarian lawyers, they undermine disinterested argument, and ultimately undermine the validity of their own critique. The paper then explores the vision of politics and law underlying the lawfare critique through a reading of the most significant theorist who defends that vision, the German theorist Carl Schmitt. -
3. Defining the Relationship Between China's “Three Wars” and Its Air
Air Power Studies Second Issue The Air Staff College Research Memo 3. Defining the Relationship between China’s “Three Wars” and its Air Power “Three Wars ” Case Study The Strategic Research Group Abstract This paper introduces the 2003 China People’s Liberation Army political ordinance defining the “Three Wars” and performing a case study on how it relates to their airpower. Main Points 1. Entire Nation will grapple with the Three Wars The Three Wars concept originally comes from SunTzu’s writings against war and yielding to your opponent. Furthermore, the realization that Mao Zedong’s leadership had caused damage to not only the military, but to the entire country, led them to advocate for a nationwide policy. 2. The Significance of the Three Wars The Three Wars are intended to distract the Chinese population from the domestic problems that are piling up, and to bring world attention to China’s increased capabilities. 3. The Truth of the Three Wars Since the Chinese Head of State called for the Three Wars in his strategic message, there have been many activities supporting the strategy. There has been news coverage of new weapons and of military activities, of the Prime Minister’s visit to Yasukuni Shrine and raising historical problems. They have - 114 - 3. Defining the Relationship between China’s “Three Wars” and its Air Power “Three Wars” Case Study laid territorial claim to the Senkaku Islands other territories. In addition, in terms of Airpower, they have also established an Air Defense Identification Zone, an act which can be tied to the Three Wars strategy. -
POLITICAL SPEECH, DOUBLESPEAK, and CRITICAL-THINKING SKILLS in AMERICAN EDUCATION by Doris E. Minin-White a Capstone Project
POLITICAL SPEECH, DOUBLESPEAK, AND CRITICAL-THINKING SKILLS IN AMERICAN EDUCATION by Doris E. Minin-White A capstone project submitted in partial fulfillment of the requirements for the degree of Masters of Arts in English as a Second Language. Hamline University Saint Paul, Minnesota December, 2017 Capstone Project Trish Harvey Content Expert: Joseph White 2 My Project In this project, I will attempt to identify and analyze common cases of doublespeak in selected samples of political discourse, delivered by the two most recent U. S. presidents: Barack Obama and Donald Trump. The sample will include the transcripts from two speeches and two debates for each of the speakers. The speeches chosen will be their inaugural addresses and their presidential nomination acceptance speeches. The debates will be the first and second debates held, as part of the presidential campaign, in which the selected speakers participated. I chose to include speeches from the presidential inaugural address because they represent, perhaps, the greatest opportunity for presidents to speak with impact to the people they represent and to their fellow lawmakers who are generally present at the inauguration. I also chose the speeches they made when accepting the presidential nominations of their respective parties, because it is their opportunity to outline what their party’s platform is, what they feel are the important issues of the day, and how they intend to pursue those issues. Finally, I chose presidential debates because political discourse in this context is more spontaneous. According to the Commission on Presidential Debates (2017), a non-partisan entity that has organized presidential debates in the United States since 1988, political debates are carefully prepared and organized. -
Lawfare Today
Color profile: Disabled Composite Default screen XII Lawfare Today . and Tomorrow Charles J. Dunlap, Jr.* AprincipalstrategictacticoftheTaliban...iseitherprovokingorexploiting civilian casualties. Secretary of Defense Robert Gates1 I. Introduction lthough he does not use the term “lawfare,” Secretary Gates’ observation Areflects what is in reality one of the most common iterations of lawfare in today’s conflicts. Specifically, the Taliban are aiming to achieve a particular military effect, that is, the neutralization of US and allied technical superiority, especially with respect to airpower. To do so they are, as Secretary Gates indicates, creating the perception of violations of one of the fundamental norms of the law of armed conflict (LOAC), that is, the distinction between combatants and civilians. While “provoking or exploiting civilian casualties” is clearly a type of lawfare, it is by no means its only form. Although the definition has evolved somewhat since its modern interpretation was introduced in 2001,2 today I define it as “the strategy of using—or misusing—law as a substitute for traditional military means to achieve a warfighting objective.”3 As such, it is ideologically neutral, that is, it is best conceptualized much as a weapon that can be wielded by either side in a belligerency. In fact, many uses of legal “weapons” and methodologies avoid the need to resort to physical violence * Major General, US Air Force (Ret.); Visiting Professor of the Practice of Law and Associate Di- rector, Center on Law, Ethics, and National Security, Duke University School of Law. Vol 87.ps C:\_WIP\_Blue Book\_Vol 87\_Ventura\Vol 87.vp Friday, June 10, 2011 9:03:32 AM Color profile: Disabled Composite Default screen Lawfare Today . -
Indian False Flag Operations
Center for Global & Strategic Studies Islamabad INDIAN FALSE FLAG OPERATIONS By Mr. Tauqir – Member Advisory Board CGSS Terminology and Genealogy The term false flag has been used symbolically and it denotes the purposeful misrepresentation of an actor’s objectives or associations. The lineage of this term is drawn from maritime affairs where ships raise a false flag to disguise themselves and hide their original identity and intent. In this milieu, the false flag was usually used by pirates to conceal themselves as civilian or merchant ships and to prevent their targets from escaping away or to stall them while preparing for a battle. In other cases, false flags of ships were raised to blame the attack on someone else. A false flag operation can be defined as follows: “A covert operation designed to deceive; the deception creates the appearance of a particular party, group, or nation being responsible for some activity, disguising the actual source of responsibility.” These operations are purposefully carried out to deceive public about the culprits and perpetrators. This phenomenon has become a normal practice in recent years as rulers often opt for this approach to justify their actions. It is also used for fabrication and fraudulently accuse or allege in order to rationalize the aggression. Similarly, it is a tool of coercion which is often used to provoke or justify a war against adversaries. In addition, false flag operations could be a single event or a series of deceptive incidents materializing a long-term strategy. A primary modern case of such operations was accusation on Iraqi President Saddam Hussain for possessing weapons of mass-destruction ‘WMD’, which were not found after NATO forces, waged a war on Iraq.