Exploring Potential Uses of Offensive Information Warfare

Total Page:16

File Type:pdf, Size:1020Kb

Exploring Potential Uses of Offensive Information Warfare Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1996-06 Attacking the infrastructure: exploring potential uses of offensive information warfare Elam, Donald Emmett. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/32073 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS ATTACKING THE INFRASTRUCTURE: EXPLORING POTENTIAL USES OF OFFENSIVE INFORMATION WARFARE by Donald Emmett Elam June, 1996 Thesis Co-Advisors: Dan Boger Vicente Garcia Approved for public release; distribution is unlimited. 19960801 082 l REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average I hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 1996 Master's Thesis 4. TITLE AND SUBTITLE: ATTACKING THE INFRASTRUCTURE: 5. FUNDING NUMBERS EXPLORING POTENTIAL USES OF OFFENSIVE INFORMATION WARFARE 6. AUTHOR(S) Elam, Donald E. 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING Naval Postgraduate School ORGANIZATION Monterey CA 93943-5000 REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING AGENCY REPORT NUMBER II. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION/AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited. 13. ABSTRACT (maximum 200 words) The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals ofthi~ paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned professionals throughout the country. This thesis helps to bridge the education gap. It presents a snapshot oflnformation Warfare today, exploring many different avenues and possibilities along the way. The first half of the document is focused on Information Warfare in general, and the second half deals specifically with the offensive side. The purpose of this thesis is not to present an all-encompassing view of Offensive Information War or eve of Information Warfare in general. The field of Information Warfare is too big for any one individual or organization to fully comprehend all of its intricacies. Indeed, due to the dynamic nature of this discipline, chances are that some, or maybe even all, of the material contained herein will be obsolescent upon publication The goal of the thesis is to present one view of Information Warfare, as seen through the eyes of many. The hope is that some benefit will be garnered by the reader, even if it only sparks an idea or helps to understand th( importance of this growing warfare dimension. 14. SUBJECT TERMS Information Warfare, Information, Warfare, Infrastructure, 15. NUMBER OF Offensive, Third Wave PAGES216 16. PRICE CODE 17. SECURITY CLASSIFI- 18. SECURITY CLASSIFI- 19. SECURITY CLASSIFICA- 20. LIMITATION OF CATION OF REPORT CATION OF THIS PAGE TION OF ABSTRACT ABSTRACT Unclassified Unclassified Unclassified UL NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 298-102 i ii Approved for public release; distribution is unlimited. ATTACKING THE INFRASTRUCTURE: EXPLORING POTENTIAL USES OF OFFENSIVE INFORMATION WARFARE Donald E. Elam Lieutenant, United States Navy B.S., United States Naval Academy, 1990 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN SYSTEMS TECHNOLOGY [COMMAND, CONTROL, AND COMMUNICATIONS (C3)] from the NAVAL POSTGRADUATE SCHOOL June 1996 Author: Donald E. Elam Approved by: Vicente Garcia, Thesis Co-Advisor Command, Control, and Communications Academic Group iii iv ABSTRACT The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information most effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large,. dynamic, and complex. The need exists for education among military officers and other concerned professionals throughout the country. This thesis helps to bridge the education gap. It presents a snapshot of Information Warfare today, exploring many different avenues and possibilities along the way. The first half of the document is focused on Information Warfare in general, and the second half deals specifically with the offensive side. The purpose ofthis thesis is not to present an all-encompassing view of Offensive Information War or even of Information Warfare in general. The field of Information Warfare is too big for any one individual or organization to fully comprehend all of its intricacies. Indeed, due to the dynamic nature of this discipline, chances are that some, or maybe even all, of the material contained herein will be obsolescent upon publication. The goal of the thesis is to present one view of Information Warfare, as seen through the eyes of many. The hope is that some benefit will be garnered by the reader, even if it only sparks an idea or helps to understand the importance of this growing warfare dimension. v vi TABLE OF CONTENTS I. INTRODUCTION ........................................................... 1 A. THE CHANGING FACE OF WARFARE ................................. 1 B. THE CHANGING PARADIGM ......................................... 3 1. The Future of Warfare ............................................ 3 2. The Third Wave ................................................ 5 C. WARFARE THEORY ................................................. 6 1. Traditional Views of Warfare ...................................... 6 2. Role of Technology in Warfare .................................... 7 3. Importance of the Cultural Dimension ............................... 8 4. Center of Gravity ............................................... 8 D. THE IMPORTANCE OF INFORMATION WARFARE ...................... 9 E. FRAMEWORK FOR INFORMATION WARFARE AS A WEAPON ........... 9 II. DEFINING INFORMATION WARFARE ...................................... 13 A. WHAT IS INFORMATION WARFARE? ................................ 13 B. TYPES OF INFORMATION WARFARE ................................ 14 1. Selected examples of different views ............. : . 14 a. National Level Decision Makers ............................. 15 b. Department of Defense .................................... 15 c. Academic Experts ........................................ 18 d. The Experts . 19 e. Miscellaneous Entities .................................... 21 2. Information Warfare versus Command and Control Warfare ............. 22 C. A CONSOLIDATED VIEW ........................................... 23 1. Coming To Grips With A Definition ............................... 23 2. A Possible Answer: Paradigm F ................................... 25 D. THE BOTTOM LINE ................................................ 33 III. INFORMATION WARFARE ORGANIZATIONS .............................. 35 A. INFORMATION WARFARE PLAYERS ................................ 35 Vll 1. International Level .......................................· ...... 37 2. National Level ................................................. 37 a. Public .................................................. 37 (1) Academia ........................................ 38 (2) Media ........................................... 38 b. Private ................................................. 39 (I) Industry ......................................... 39 (2) Subversive Elements ............................... 39 3. Federal Government ............................................ 40 a. Executive Branch ........................................ 40 b. Department of Defense .................................... 41 (I) Office ofthe Secretary ............................. 42 (2) Joint Chiefs of Staff ................................ 42 (3) Department of the Army ............................ 43 (4) Department of the Navy ............................ 44 ( 5) Department of Air Force ............................ 46 ( 6) Other Organizations ............................... 4 7 c. Legislative/Judicial ....................................... 49 d. Independent Establishments and Government .................. 49 4. State and Local Governments ..................................... 50 B. THE INFORMATION WARP ARE FIELD ............................... 50 IV. INFORMATION WARFARE AND TECHNOLOGY ............................ 53
Recommended publications
  • Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II.
    [Show full text]
  • Hard Offensive Counterterrorism
    Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2019 The Use of Force: Hard Offensive Counterterrorism Daniel Thomas Wright State University Follow this and additional works at: https://corescholar.libraries.wright.edu/etd_all Part of the International Relations Commons Repository Citation Thomas, Daniel, "The Use of Force: Hard Offensive Counterterrorism" (2019). Browse all Theses and Dissertations. 2101. https://corescholar.libraries.wright.edu/etd_all/2101 This Thesis is brought to you for free and open access by the Theses and Dissertations at CORE Scholar. It has been accepted for inclusion in Browse all Theses and Dissertations by an authorized administrator of CORE Scholar. For more information, please contact [email protected]. THE USE OF FORCE: HARD OFFENSIVE COUNTERTERRORISM A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts By DANIEL THOMAS B.A., The Ohio State University, 2015 2019 Wright State University WRIGHT STATE UNIVERSITY GRADUATE SCHOOL Defense Date: 8/1/19 I HEREBY RECOMMEND THAT THE THESIS PREPARED UNDER MY SUPERVISION BY Daniel Thomas ENTITLED The Use of Force: Hard Offensive Counterterrorism BE ACCEPTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Arts. _______________________ Vaughn Shannon, Ph.D. Thesis Director ________________________ Laura M. Luehrmann, Ph.D. Director, Master of Arts Program in International and Comparative Politics Committee on Final Examination: ___________________________________ Vaughn Shannon, Ph.D. School of Public and International Affairs ___________________________________ Liam Anderson, Ph.D. School of Public and International Affairs ___________________________________ Pramod Kantha, Ph.D. School of Public and International Affairs ______________________________ Barry Milligan, Ph.D.
    [Show full text]
  • The Uncertain Role of the Tank in Modern War: Lessons from the Israeli Experience in Hybrid Warfare
    No. 109 JUNE 2016 The Uncertain Role of the Tank in Modern War: Lessons from the Israeli Experience in Hybrid Warfare Michael B. Kim The Uncertain Role of the Tank in Modern War: Lessons from the Israeli Experience in Hybrid Warfare by Michael B. Kim The Institute of Land Warfare ASSOCIATION OF THE UNITED STATES ARMY AN INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of ILW’s editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER No. 109, June 2016 The Uncertain Role of the Tank in Modern War: Lessons from the Israeli Experience in Hybrid Warfare by Michael B. Kim Major Michael B. Kim currently serves as the Squadron Executive Officer for the 8th Squadron, 1st Cavalry Regiment, 2d Stryker Brigade Combat Team, 2d Infantry Division. Prior to his current position, he graduated from the Command and General Staff College (CGSC), Fort Leavenworth, Kansas, and completed the Art of War Scholars Program.
    [Show full text]
  • Tenth Quarterly Report Part 1 – Eastern Ghouta February
    Tenth Quarterly Report Part 1 – Eastern Ghouta February – April 2018 Colophon ISBN: 978-94-92487-29-2 NUR 689 PAX serial number: PAX/2018/05 Photo cover: “A raid killed my dream, and a raid killed my future, and a raid killed everything alive inside of me, while I was watching.” - Wael al-Tawil, Douma, 20 February 2018 About PAX PAX works with committed citizens and partners to protect civilians against acts of war, to end armed violence, and to build just peace. PAX operates independently of political interests. www.paxforpeace.nl / P.O. Box 19318 / 3501 DH Utrecht, The Netherlands / [email protected] This report was written by Valerie Szybala with support from the PAX team. It would not have been possible without the participation of Siege Watch’s voluntary network of reporting contacts on the ground. This past quarter, Siege Watch contacts from Eastern Ghouta continued to provide updates and information with the project during the darkest period of their lives. Thank you to everyone from Eastern Ghouta who communicated with the project team over the years, for your openness, generosity and patience. We have been inspired and humbled by your strength through adversity, and will continue to support your search for justice and peace. Siege Watch Tenth Quarterly Report Part 1 – Eastern Ghouta February – April 2018 PAX ! Siege Watch - Tenth Quarterly Report Part 1 – Eastern Ghouta 3 Table of Contents Executive Summary 06 Introduction 10 Eastern Ghouta 12 Background 12 Military Developments 14 Stages of the Final Offensive 18 Chemical Weapons
    [Show full text]
  • Preventing Terrorism and Countering Violent Extremism And
    Preventing Terrorism and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Community-Policing Approach Preventing Terrorism and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Community-Policing Approach Published by the Organization for Security and Co-operation in Europe Vienna, February 2014 © OSCE 2014 Designed in Warsaw by Homework Printed in Vienna by Stanzell Druck All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means — electronic, mechanical, photocopying, recording, or otherwise without the prior written permission of the publishers. This restriction does not apply to making digital or hard copies of this publication for internal use within the OSCE, and for personal or educational use when for non-profit and non-commercial purposes, providing that copies be accompanied by an acknowledgment of the OSCE as the source. ISBN 978–92–9235–023–9 Transnational Threats Department Office for Democratic Institutions OSCE Secretariat and Human Rights Wallnerstrasse 6, A-1010 Vienna, Austria Ul. Miodowa 10, 00–251 Warsaw, Poland http://www.osce.org/atu http://www.osce.org/odihr The publication of this guidebook was made possible thanks to generous contributions from the Australian Government, through its Department of Foreign Affairs and Trade, the Swiss Confederation, through its Federal Department of Foreign Affairs, the United States of Amer- ica, through its Department of State, and the Principality of Liechtenstein, through its Ministry of Foreign Affairs. The content of this publication, including the views, opinions, findings, inter- pretations and conclusions expressed herein do not necessarily reflect those of these donors.
    [Show full text]
  • Vauban!S Siege Legacy In
    VAUBAN’S SIEGE LEGACY IN THE WAR OF THE SPANISH SUCCESSION, 1702-1712 DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Jamel M. Ostwald, M.A. The Ohio State University 2002 Approved by Dissertation Committee: Professor John Rule, Co-Adviser Co-Adviser Professor John Guilmartin, Jr., Co-Adviser Department of History Professor Geoffrey Parker Professor John Lynn Co-Adviser Department of History UMI Number: 3081952 ________________________________________________________ UMI Microform 3081952 Copyright 2003 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ____________________________________________________________ ProQuest Information and Learning Company 300 North Zeeb Road PO Box 1346 Ann Arbor, MI 48106-1346 ABSTRACT Over the course of Louis XIV’s fifty-four year reign (1661-1715), Western Europe witnessed thirty-six years of conflict. Siege warfare figures significantly in this accounting, for extended sieges quickly consumed short campaign seasons and prevented decisive victory. The resulting prolongation of wars and the cost of besieging dozens of fortresses with tens of thousands of men forced “fiscal- military” states to continue to elevate short-term financial considerations above long-term political reforms; Louis’s wars consumed 75% or more of the annual royal budget. Historians of 17th century Europe credit one French engineer – Sébastien le Prestre de Vauban – with significantly reducing these costs by toppling the impregnability of 16th century artillery fortresses. Vauban perfected and promoted an efficient siege, a “scientific” method of capturing towns that minimized a besieger’s casualties, delays and expenses, while also sparing the town’s civilian populace.
    [Show full text]
  • ATP 3-01.8 Techniques for Combined Arms for Air Defense Headquarters
    ATP 3-01.8 Techniques for Combined Arms for Air Defense DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited Headquarters, Department of the Army This publication is available at the Army Publishing Directorate site (http://), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard) To receive publishing updates, please subscribe at (http://www.apd.army.mil/AdminPubs/new_subscribe.asp) *ATP 3-01.8 Field Manual ATP 3-01.8 Headquarters Department of the Army Washington, DC, Techniques for Combined Arms for Air Defense Contents Page PREFACE.............................................................................................................. iii INTRODUCTION ................................................................................................... iv SUMMARY OF CHANGES .................................................................................... v Chapter 1 AERIAL THREATS AND DEFENSIVE PLANNING .......................................... 1-1 Anticipate Aerial Threats .................................................................................... 1-1 Analyze Air Threat Capabilities .......................................................................... 1-4 Threat Application ............................................................................................... 1-7 Defensive Planning ............................................................................................. 1-9 Chapter 2 TECHNIQUES FOR WARNING AND CONTROL ............................................
    [Show full text]
  • Russian Strategic Intentions
    APPROVED FOR PUBLIC RELEASE Russian Strategic Intentions A Strategic Multilayer Assessment (SMA) White Paper May 2019 Contributing Authors: Dr. John Arquilla (Naval Postgraduate School), Ms. Anna Borshchevskaya (The Washington Institute for Near East Policy), Dr. Belinda Bragg (NSI, Inc.), Mr. Pavel Devyatkin (The Arctic Institute), MAJ Adam Dyet (U.S. Army, J5-Policy USCENTCOM), Dr. R. Evan Ellis (U.S. Army War College Strategic Studies Institute), Mr. Daniel J. Flynn (Office of the Director of National Intelligence (ODNI)), Dr. Daniel Goure (Lexington Institute), Ms. Abigail C. Kamp (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Roger Kangas (National Defense University), Dr. Mark N. Katz (George Mason University, Schar School of Policy and Government), Dr. Barnett S. Koven (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Jeremy W. Lamoreaux (Brigham Young University- Idaho), Dr. Marlene Laruelle (George Washington University), Dr. Christopher Marsh (Special Operations Research Association), Dr. Robert Person (United States Military Academy, West Point), Mr. Roman “Comrade” Pyatkov (HAF/A3K CHECKMATE), Dr. John Schindler (The Locarno Group), Ms. Malin Severin (UK Ministry of Defence Development, Concepts and Doctrine Centre (DCDC)), Dr. Thomas Sherlock (United States Military Academy, West Point), Dr. Joseph Siegle (Africa Center for Strategic Studies, National Defense University), Dr. Robert Spalding III (U.S. Air Force), Dr. Richard Weitz (Center for Political-Military Analysis at the Hudson Institute), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Prefaces Provided By: RDML Jeffrey J. Czerewko (Joint Staff, J39), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Editor: Ms.
    [Show full text]
  • PAD-78-21 Comparative Life Cycle Cost: a Case Study
    DOCUBENT RESUBE 06791 - [B23073841 Comparative Life Cycle Cost: a Case Study, PAD-78-21; B-163058. August 16, 1978. 18 pp. Staff st'dy by Sorton A. Myers, Acting Eirector, Prcrc-a Analysis Div. issue Area: Alternative Apprcaches or Sethods to Achieve Federal Program Objectives (3600). Contact: Program Analysis Div. ,.OAqet Function: natlonal Defanse: Weapon systems (057); a tional Defense: Department of Ceftnse - Procurenent & Contracts (056). Organization Concerned: Department of Defense; Department of the Arry. Congressional Relevance: House Committee cn Armsd Services; Senate Committee on Armed Services. A case study of the costs for two Army tanks, X1-1 and s60A3, demonstrated the importance of life-cycle cost comparisons. The XR-1 main battle tan). was developed tc succeed 160 series tankls which have been prodtced for 17 years. Findinqs/Conclusionv: Comparing only acquisition costs, the XI-1 is twice as expensive as the S60A3. When life-cycle costs (totals for buying, operating, and maintaining tanks) during a A0-year period are considered, the X1-1 costs about 20S oacre because of large, nearly equal maintenance and operaticm costs for the two tanks. Thus, the lX-1 need be only 201 sore cost effective, and the consensus of Army studies has been that its cost effectiveness compared to the B60A3 is considerably acre than this percentage. Cost estimates made before starting production are subject to uncertainty such as inflation and other factors. Cost estimate assumptions were examined, and the sensitivity of XIS- costs to these assumptions was reflected in life-cycle cost data. Weapon systems decisions are not made solely on cost or effectiveness data.
    [Show full text]
  • The Kerensky Offensive: a Desperate Operation That Backfired
    Xiuyuan Li 21H.467J Soviet and Post-Soviet Politics and Society The Kerensky Offensive: A desperate operation that backfired Executive Summary The Kerensky Offensive was the last Russian WWI offensive, whose name came from the Provisional Government's minister of war at the time. This operation was aimed not only at holding the Central Powers in the Eastern Front in coordination with the Allied forces in the west, but also at raising the morale of the Russian Army and people's faith in the government. Despite its initial suceess, the desperate offensive ended as a catastrophe: not only did it fail to achieve any of the goals, but it also gave an unrecoverable blow to the Russian military, and further undermined the Provisional Goverment's prestige and widened the gap between the ruling elite and general public. The event contributed to subsequent domestic unrests that eventually led to the seizure of power by the Bolshviks. Background - Turbulent days since the Feburary Revolution After the abdication of the Tsar Nicolas II in Febury 1917, a series of changes quickly swept Russia. The country, having been deeply entrenched in war for nearly three years, had suffered from huge human loss, severe economic distress, and large scale civil unrest. More deeply, the poverty and turmoil as the legacy by the old autocracy drove people desperately seeking new causes to attempt at revitalizing the country. The leadership was shared by the Provisional Government (originated from the State Duma in late Tsarist days) and the Petrograd Soviet of Workers' and Soldiers' Deputies (or the Soviet for short).
    [Show full text]
  • Beating International Terrorism an Action Strategy for Preemption and Punishment
    Beating International Terrorism An Action Strategy for Preemption and Punishment Revised Edition by S TEPHEN SLOAN Professor of Political Science University of Oklahoma Visiting Research Fellow Oklahoma City National Memorial Institute for the Prevention of Terrorism Air University Press Maxwell Air Force Base, Alabama April 2000 Library of Congress Cataloging-in-Publication Data Sloan, Stephen, 1936– Beating International Terrorism. Revised Edition. “April 2000.” Bibliography: p. 83 1. Terrorism. 2. Terrorism—Prevention—Government policy–United States. I. Title. ISBN 1-58566-079-5 Disclaimer Opinions, conclusions, and recommendations expressed or implied within are solely those of the author, and do not necessarily represent the views of Air University, the United States Air Force, the Department of Defense, or any other US government agency. Cleared for public release: distribution unlimited. Cover: Khobar Towers, Saudi Arabia, and the Alfred P. Murrah Federal Building, Oklahoma City, Oklahoma. For sale by the Superintendent of Documents US Government Printing Office Washington DC 20402 ii This edition is dedicated to: Col Donald D. Stevens, USAF, Retired A warrior, a scholar, a leader, and a gentleman who inspired and supported me in the continuing battle for innovation in the realm of doctrine, policy, and strategy against the forces of conventional wisdom. and To those who lost their lives in the Murrah Building attack, the survivors, and those who came to comfort and aid them. May the work of the Oklahoma City National Memorial Institute for the Prevention of Terrorism honor them by assisting democratic societies in combating terrorism. Contents Chapter Page DISCLAIMER . ii ABOUT THE AUTHOR . vii FOREWORD .
    [Show full text]
  • THE OFFENSE-DEFENSE BALANCE and WAR SINCE 1648∗ James D
    THE OFFENSE-DEFENSE BALANCE AND WAR SINCE 1648∗ James D. Fearon Department of Political Science University of Chicago 5828 S. University Ave. Chicago, IL 60615 email: [email protected] DRAFT - April 8, 1997 ∗This is a slightly revised version of a paper presented at the Annual Meetings of the Inter- national Studies Association, Chicago, Illinois, 21-25 February 1995. For helpful comments and discussions I wish to thank David Edelstein, Charles Glaser, Chaim Kaufmann, and Craig Koerner. 1 Introduction In one of the most influential articles on international relations written in the last 25 years, Robert Jervis argued that technological, geographical, and political factors that render of- fensive operations less costly and more effective tend to make security competition fiercer and wars more likely.1 While the basic idea that technology favoring the offense might foster war and have diverse other international effects was not new,2 Jervis made a more coherent and thorough theoretical argument than had been offered previously, and supported it with a range of suggestive and plausible historical examples. Since “Cooperation under the Se- curity Dilemma,” many international relations scholars (and neorealists in particular) have added the “offense-defense balance” to system polarity as one of the chief independent vari- ables used to explain international outcomes, especially the occurrence of war. And possibly because polarity does not vary much over time, the offense-defense balance has been doing a lot of explanatory and theoretical work in recent realist writings on international politics.3 1Jervis, “Cooperation under the Security Dilemma,” World Politics30, 2 (January 1978), 167-214.
    [Show full text]