Crafting Strategy for Irregular Warfare a Framework for Analysis and Action
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Highlights of Recent RAND Research on Counterinsurgency
Highlights of Recent RAND Research on Counterinsurgency For more information, contact Shirley Ruhe, Director of Congressional Relations, at 703-413-1100, x5632 or [email protected], or Kurt Card, National Security Legislative Analyst, at 703-413-1100 x5259 or [email protected] As the leading research authority on counterinsurgency, the RAND Corporation has developed a wide selection of materials for policy makers. With multiple insurgencies operating in several theaters this research was developed to provide a historical, geographical, and functional understanding of past and present insurgencies and counterinsurgency operations. Social Science for Counterterrorism Putting the Pieces Together Darcy Noricks et al., 2009 This report from an interdisciplinary project to survey and integrate the scholarly social- science literature relevant to counterterrorism answers questions related to why some individuals become terrorists, how terrorists generate public support, how terrorist organizations make decisions, and why individuals disengage. A Stability Police Force for the United States Justification and Options for Creating U.S. Capabilities Terrence K. Kelly et al., 2009 Establishing security is the sine qua non of stability operations, since it is a prerequisite for reconstruction and development. Security requires a mix of military and police forces to deal with a range of threats from insurgents to criminal organizations. This research examines the creation of a high-end police force, which the authors call a Stability Police Force. 1 Underkill Scalable Capabilities for Military Operations amid Populations David C. Gompert et al., 2009 The battle for Gaza revealed an extremist strategy: hiding in cities and provoking attack to cause civilian deaths that can be blamed on the attacking forces. -
National Strategy for Homeland Security 2007
national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 My fellow Americans, More than 6 years after the attacks of September 11, 2001, we remain at war with adversar- ies who are committed to destroying our people, our freedom, and our way of life. In the midst of this conflict, our Nation also has endured one of the worst natural disasters in our history, Hurricane Katrina. As we face the dual challenges of preventing terrorist attacks in the Homeland and strengthening our Nation’s preparedness for both natural and man-made disasters, our most solemn duty is to protect the American people. The National Strategy for Homeland Security serves as our guide to leverage America’s talents and resources to meet this obligation. Despite grave challenges, we also have seen great accomplishments. Working with our part- ners and allies, we have broken up terrorist cells, disrupted attacks, and saved American lives. Although our enemies have not been idle, they have not succeeded in launching another attack on our soil in over 6 years due to the bravery and diligence of many. Just as our vision of homeland security has evolved as we have made progress in the War on Terror, we also have learned from the tragedy of Hurricane Katrina. We witnessed countless acts of courage and kindness in the aftermath of that storm, but I, like most Americans, was not satisfied with the Federal response. We have applied the lessons of Katrina to thisStrategy to make sure that America is safer, stronger, and better prepared. -
Applying Traditional Military Principles to Cyber Warfare
2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1]. -
9110-9P Department of Homeland Security
This document is scheduled to be published in the Federal Register on 06/23/2021 and available online at federalregister.gov/d/2021-13109, and on govinfo.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY [Docket No. CISA-2020-0018] Agency Information Collection Activities: Proposed Collection; Comment Request; Cybersecurity and Infrastructure Security Agency (CISA) Visitor Request Form AGENCY: Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS). ACTION: 30-day notice and request for comments; reinstatement without change of information collection request: 1670-0036. SUMMARY: The Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Office of Compliance and Security (OCS), as part of its continuing effort to reduce paperwork and respondent burden, invites the general public to take this opportunity to comment on a reinstatement, without change, of a previously approved information collection for which approval has expired. CISA will submit the following Information Collection Request to the Office of Management and Budget (OMB) for review and clearance in accordance with the Paperwork Reduction Act of 1995. CISA previously published a notice about this ICR, in the Federal Register on February 17, 2021, for a 60-day public comment period. There were no comments received. The purpose of this notice is to allow additional 30-days for public comments. DATES: The comment period for the information collection request published on February 17, 2021 at 86 FR 9949. Comments must be submitted on or before [INSERT DATE 30 DAYS AFTER DATE OF PUBLICATION IN THE FEDERAL REGISTER]. ADDRESSES: Written comments and recommendations for the proposed information collection should be sent within 30 days of publication of this notice to www.reginfo.gov/public/do/PRAMain . -
Pointing Towards Clarity Or Missing the Point? a Critique of the Proposed "Social Group" Rule and Its Impact on Gender-Based Political Asylum
POINTING TOWARDS CLARITY OR MISSING THE POINT? A CRITIQUE OF THE PROPOSED "SOCIAL GROUP" RULE AND ITS IMPACT ON GENDER-BASED POLITICAL ASYLUM LOREN G. STEWART* From the beginning of the marriage, her husband abused her. He raped her almost daily, beating her before and during each rape. He once dislocated her jawbone because her menstrual period was fifteen days late. When she refused to abort a pregnancy, he kicked her violently in her spine. Once, he kicked her in her genitalia, causing her severe pain and eight days of bleeding. She fled the city with their children, but he tracked them down and beat her unconscious. He broke windows and mirrors with her head. He told her that if she left him, he would find her, cut off her arms and legs with a machete and leave her in a wheelchair. She attempted suicide, but was unsuccessful. She contacted the police three times, but they did not respond. A judge denied her protection, saying that the court "would not interfere in domestic disputes."' She finally left him, fled to the United States, and applied for political asylum. Should women like Rodi Alvarado Pefia, described above, be eligible to receive political asylum in the United States?2 To be J.D. Candidate 2005, University of Pennsylvania Law School. B.A. History, cum laude, Yale University 1999. The author wishes to express his gratitude to Professors Fernando Chang-Muy, Louis S. Rulli and Catherine Struve for their guidance, enthusiasm, and inspiration. ratience,In re R-A-, 22 I. & N. Dec. 906, 908-10 (BIA 1999, Att'y Gen. -
A Governor's Guide to Homeland Security
A GOVERNOR’S GUIDE TO HOMELAND SECURITY THE NATIONAL GOVERNORS ASSOCIATION (NGA), founded in 1908, is the instrument through which the nation’s governors collectively influence the development and implementation of national policy and apply creative leadership to state issues. Its members are the governors of the 50 states, three territories and two commonwealths. The NGA Center for Best Practices is the nation’s only dedicated consulting firm for governors and their key policy staff. The NGA Center’s mission is to develop and implement innovative solutions to public policy challenges. Through the staff of the NGA Center, governors and their policy advisors can: • Quickly learn about what works, what doesn’t and what lessons can be learned from other governors grappling with the same problems; • Obtain specialized assistance in designing and implementing new programs or improving the effectiveness of current programs; • Receive up-to-date, comprehensive information about what is happening in other state capitals and in Washington, D.C., so governors are aware of cutting-edge policies; and • Learn about emerging national trends and their implications for states, so governors can prepare to meet future demands. For more information about NGA and the Center for Best Practices, please visit www.nga.org. A GOVERNOR’S GUIDE TO HOMELAND SECURITY NGA Center for Best Practices Homeland Security & Public Safety Division FEBRUARY 2019 Acknowledgements A Governor’s Guide to Homeland Security was produced by the Homeland Security & Public Safety Division of the National Governors Association Center for Best Practices (NGA Center) including Maggie Brunner, Reza Zomorrodian, David Forscey, Michael Garcia, Mary Catherine Ott, and Jeff McLeod. -
Active Measures: the Secret History of Disinformation & Political
Active Measures: The Secret History of Disinformation & Political Warfare | Thomas Rid Philosophers have only interpreted the world. The point, May 25th, 2020 however, is to change it. — Karl Marx INTRODUCTION Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies. Rid’s latest book, Active Measures, a startling history of disinformation, was published in late April 2020 with Farrar, Straus and Giroux (also in Russian, Japanese, Polish). His most recent book, Rise of the Machines (2016), tells the sweeping story of how cybernetics, a late- 1940s theory of machines, came to incite anarchy and war (also in Chinese, Russian, German, Japanese, Turkish). His 2015 article “Attributing Cyber Attacks” was designed to explain, guide, and improve the identification of network breaches (Journal of Strategic Studies 2015). In 2013 he published the widely-read book Cyber War Will Not Take Place. Rid’s Ph.D. thesis, “War and Media Operations: The US Military and the Press from Vietnam to Iraq,” was the first academic analysis of the role of embedded media in the 2003 Iraq War, providing a concise history of US military public affairs management since Vietnam. Rid testified on information security in front of the U.S. Senate Select Committee on Intelligence as well as in the German Bundestag and the UK Parliament. From 2011 to 2016, Rid was a professor in the Department of War Studies at King’s College London. Between 2003 and 2010, he worked at major think tanks in Berlin, Paris, Jerusalem, and Washington, DC. Rid holds a PhD from Humboldt University in Berlin. -
Transnational Ethnic Communities and Rebel Groups' Strategies in a Civil Conflict
Transnational Ethnic Communities and Rebel Groups’ Strategies in a Civil Conflict The case of the Karen National Union rebellion in Myanmar Bethsabée Souris University College London (UCL) 2020 A thesis submitted for the degree of Doctor of Philosophy in Political Science I, Bethsabée Souris, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis 1 2 Abstract Few studies have systematically analysed how transnational ethnic kin groups affect the behaviour of domestic ethnic groups in an insurgency, in particular how they have an effect on the types of activities they conduct and their targets. The research question of this study is: What are the mechanisms through which transnational ethnic kin groups influence the domestic rebel ethnic group’s strategies? This thesis analyses the influence of transnational communities on domestic challengers to the state as a two-step process. First, it investigates under which conditions transnational ethnic kin groups provide political and economic support to the rebel ethnic group. It shows that networks between rebel groups and transnational communities, which can enable the diffusion of the rebel group’s conflict frames, are key to ensure transnational support. Second, it examines how such transnational support can influence rebel groups’ strategies. It shows that central to our understanding of rebel groups’ strategies is the cohesion (or lack thereof) of the rebel group. Furthermore, it identifies two sources of rebel group’s fragmentation: the state counter-insurgency strategies, and transnational support. The interaction of these two factors can contribute to the fragmentation of the group and in turn to a shift in the strategies it conducts. -
Counterinsurgency Operations
The Basics of Counterinsurgency By R. Scott Moore1 Abstract The study examines the basic characteristics of insurgencies and counterinsurgency campaigns conducted over the past century, strip away many of the prevailing assumptions. Based on detailed analysis of nearly sixty counterinsurgency campaigns, successful and unsuccessful, as well as the lessons learned by American and Coalition forces in Afghanistan and Iraq since 2001, the conclusions offer a historically grounded framework for thinking about counterinsurgency. While every conflict exhibited its own unique causes and conditions requiring tailored solutions, as a whole the many counterinsurgency campaigns exhibited fundamental characteristics that remained constant. If there were no immutable laws or empirical formulas for counterinsurgency, there existed certain basic principles and traits that marked and will continue to mark successful, and unsuccessful, outcomes. Introduction Recent operations in Afghanistan and Iraq have forcibly highlighted the need to reexamine how we fight irregular conflicts, and especially insurgencies to find a strategy to address these emerging threats. Religious extremism, ethnic intolerance, and socio- economic imbalances have given birth to fanatical movements demanding radical change. Insurgencies, and the terrorism that accompanies them, pose complex challenges threatening political and social stability and defying military attempts to suppress or defeat them. Unfortunately, if the conceptual confusion emanating from the many debates over these conflicts is any indication, we seem to have forgotten the past while attempting to reinvent the future. The lack of an integrated and multi-dimensional approach to these new threats too often leads to confusion and disjointed responses and acrimonious debates not only over what needs to be done, but who- military or civilian- should do it. -
The Strategic Paradox of Truly Autonomous Weapons
The strategic paradox of autonomous weapons ZIPAR Policy Brief February 2018 Marko Kovic ZIPAR About ZIPAR The Zurich Institute of Public Aairs Research is devoted to identifying and addressing the major challenges for humankind in the short-term, in the medium- term, and in the long-term future. ZIPAR is an independent nonprot think tank based in Zurich, Switzerland. Recommended citation Marko Kovic (2018): The strategic paradox of autonomous weapons systems. ZIPAR Policy Brief. Zurich, Switzerland. Copyright This document is licensed under a Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International license. You can freely distribute this document and reference it in other works. For any questions about copyright, feel free to contact the author ([email protected]). 2 The strategic paradox of autonomous weapons ZIPAR Policy Brief Abstract Progress in articial intelligence makes the technology increasingly relevant to military applications. In particular, autonomous weapons could be of great military use: Autonomous weapons could achieve goals more ef- fectively and more eciently than humans or human-operated weapons. In this policy brief, the potential impact of implementing autonomous weapons on the behavior and decision-making of the military is discussed. The most probable positive impact, greater adherence to humanitarian law on the battleeld, is outweighed by the most probable negative impact, a disruption of the military chain of command and the security risks that follow from that disruption. This creates a strategic paradox: Even though autonomous weapons could help the military achieve goals more eectively and more eciently, autonomous weapons would strategically undermine the military by disrupting the chain of command and by creating a great security risk. -
Applying Irregular Warfare Principles to Cyber Warfare
Soldier from 3/187th Infantry, 101st Airborne Division, out of Fort Campbell, Kentucky, sets up SATCOM to communicate further with key rear elements as part of search and attack mission in area of Narizah, Afghanistan, July 23, 2002 (U.S. Army/Todd M. Roy) Applying Irregular Warfare Principles to Cyber Warfare By Frank C. Sanchez, Weilun Lin, and Kent Korunka he cyberspace threat exists in a cyberspace and cyberspace threats that and can foresee, rapidly respond to, realm that does not conform to are initiated by faceless, borderless, and and counter cyberspace threats, the T the physical limits of land, sea, sometimes nationless enemies. These U.S. military’s strategy and approach to air, and space. Unlike these traditional enemies manifest in a domain neither cyberspace must adapt and incorporate domains, cyberspace fosters an unpre- confined nor governed by the tradi- unconventional approaches and hybrid dictable threat that can adjust, morph, tional norms and rules of war, which warfare into its operational capability. and reproduce without a national the broader military has no experience Despite its importance, the Nation’s identity or face.1 The challenge of the undertaking. To ensure the United leaders, strategists, and military planners military is to posture its approach to States maintains cyberspace dominance struggle to understand how cyberspace operations (CO) fit into national security as an instrument of national policy. A Commander Frank C. Sanchez, USN, is an Action Officer on the Joint Staff J32, Intelligence, significant shortcoming is due to the Surveillance, and Reconnaissance Operations. Major Weilun Lin, USAF, is Chief of the Central and leaders’ lack of experience and basic South Asia Branch, Joint Cyberspace Center, U.S. -
Billing Code 9111-28-P Department of Homeland
This document is scheduled to be published in the Federal Register on 04/21/2021 and available online at federalregister.gov/d/2021-08123,BILLING and on govinfo.gov CODE 9111-28-P DEPARTMENT OF HOMELAND SECURITY U.S. Immigration and Customs Enforcement [OMB Control Number 1653-0038] Agency Information Collection Activities: Student and Exchange Visitor Information System (SEVIS); Extension, With Change, of a Currently Approved Collection AGENCY: U.S. Immigration and Customs Enforcement, Department of Homeland Security. ACTION: 30-Day notice. SUMMARY: In accordance with the Paperwork Reductions Act (PRA) of 1995 the Department of Homeland Security (DHS), U.S. Immigration and Customs Enforcement (ICE) will submit the following Information Collection Request (ICR) to the Office of Management and Budget (OMB) for review and clearance. This information collection was previously published in the Federal Register on February 9, 2021, allowing for a 60-day comment period. ICE received one non-substantive comment. The purpose of this notice is to allow an additional 30 days for public comments. DATES: Comments are encouraged and will be accepted until [INSERT DATE 30 DAYS FROM AFTER DATE OF THE PUBLICATION IN THE FEDERAL RESIGTER]. ADDRESSES: Written comments and recommendations for the proposed information collection should be sent within 30 days of the publication of this notice to www.reginfo.gov/public/do/PRAMain. Find this particular information collection by selecting “Currently under 30-day Review – Open for Public Comments” or by using