Unconventional Warfare and the Principles of War
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Use of Helicopters Against Guerrillas the Israeli Model
JEMEAA - FEATURE The Use of Helicopters against Guerrillas The Israeli Model DR. TAL TOVY ince its establishment, the State of Israel has been facing a bloody struggle against terrorism and guerrilla warfare, in addition to four conventional wars.1 The Israeli war against guerrilla fighters or terrorists began almost Simmediately after the War of Independence. Palestinian terrorists attempted to infiltrate Israel from the surrounding Arab countries and perform sabotage ac- tions near the border, which were little more than lines drawn on a map and proved wholly inadequate in stopping the infiltrations. After the 1967 war, most terrorists crossed over from Jordan. Following the “Black September” conflict in 1970 and up until 1982 (Operation Peace for Galilee), most terrorists infiltrated through the Lebanese border. In the 1980s and 1990s, Israel fought against the Shiite Amal Movement and Hezbollah organization in Lebanon. Since October 2000, Israel has struggled against widespread military uprisings in the West Bank and the Gaza Strip. To counter these activities, the Israel Defense Forces (IDF) uses various opera- tional methods. Special Forces have raided known terrorist bases and routine se- curity activities have been conducted along the borders and in the major cities. A third method has been targeting specific terrorist leaders or installations in the Middle East and in Europe. Most operations of the first and third categories are still classified. The IDF has launched a few large attacks targeting terrorist infra- structure—for example Karameh and Litany—with the most extensive one being the Lebanon War (1982), at least initially. In these large-scale operations, Israel has deployed massive infantry, armor, and artillery forces. -
Military Guide to Terrorism in the Twenty-First Century
US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No. -
Law of Armed Conflict
Lesson 1 THE LAW OF ARMED CONFLICT Basic knowledge International Committee of the Red Cross Unit for Relations with Armed and Security Forces 19 Avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org Original: English – June 2002 INTRODUCTION TO THE LAW OF ARMED CONFLICT BASIC KNOWLEDGE LESSON 1 [ Slide 2] AIM [ Slide 3] The aim of this lesson is to introduce the topic to the class, covering the following main points: 1. Background: setting the scene. 2. The need for compliance. 3. How the law evolved and its main components. 4. When does the law apply? 5. The basic principles of the law. INTRODUCTION TO THE LAW OF ARMED CONFLICT 1. BACKGROUND: SETTING THE SCENE Today we begin a series of lectures on the law of armed conflict, which is also known as the law of war, international humanitarian law, or simply IHL. To begin, I’d like to take a guess at what you’re thinking right now. Some of you are probably thinking that this is an ideal opportunity to catch up on some well-earned rest. “Thank goodness I’m not on the assault course or on manoeuvres. This is absolutely marvellous. I can switch off and let this instructor ramble on for 45 minutes. I know all about the Geneva Conventions anyway – the law is part of my culture and our military traditions. I really don't need to listen to all this legal ‘mumbo jumbo’.” The more sceptical and cynical among you might well be thinking along the lines of a very famous orator of ancient Rome – Cicero. -
Unconventional Warfare: a Historical Perspective
Unconventional Warfare: A Historical Perspective NAGAO Yuichiro 1. Preface By definition, a war is fought between sovereign states, and this has become a normative concept when we talk about war. There was a historical background for this. It was the brainchild of political and intellectual leaders of the 17th and 18th centuries who sought to settle differences among people in a civilized manner, and other forms of armed conflict were severely restricted. As the years rolled on into the 20th century, however, unusual armed conflicts have steadily increased. Notwithstanding the paradigm of war between sovereign states has not yet lost its relevance. Meanwhile, the acts of terrorism committed in the United States on September 11 shook the world. Words such as “new war” and “asymmetric war” have since gained currency and have come to be used in various contexts. With these in mind, this paper will survey the history of wars between states and examine in light of these developments the significance that unconventional warfare takes on in armed conflict as a whole. 2. What is Unconventional Warfare? To start with, it is necessary to define the concept “unconventional warfare,” the subject of this paper, to clarify the points of argument contained herein. The antonym of unconventional warfare is conventional warfare, which means a battle between states’ regular armed forces. Therefore, unconventional warfare is a generic term that covers all military and quasi-military operations other than conventional warfare. More specifically, one dictionary lists under the heading “unconventional warfare” revolutionary wars and its constituents, subversion and guerrilla; command raids and other and special operations; terrorism and counter-terrorism. -
Revolutionary War, Guerilla Warfare, and International Law Charles R
Case Western Reserve Journal of International Law Volume 4 | Issue 2 1972 Revolutionary War, Guerilla Warfare, and International Law Charles R. King Follow this and additional works at: https://scholarlycommons.law.case.edu/jil Part of the International Law Commons Recommended Citation Charles R. King, Revolutionary War, Guerilla Warfare, and International Law, 4 Case W. Res. J. Int'l L. 91 (1972) Available at: https://scholarlycommons.law.case.edu/jil/vol4/iss2/2 This Article is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Journal of International Law by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. 1972] Revolutionary War, Guerrilla Warfare, and International Law Charles R. King* I. INTRODUCTION ( HERE IS ALMOST universal agreement among international jurists that international law is woefully inadequate in deal- ing with modern conditions of warfare.' As one distinguished writer has pointed out: For the laws of war to com- mand respect and obedience they THE AUTHOR: CHARLES R. KING must be adequate for their func- (A.B., The University of Michigan; tion. It is essential that these NDEA IV Fellow, Vanderbilt Univer- rules should be applicable to the sity; J.D., The University of Michigan circumstances of modern warfare Law School) is a member of the Wash- and clearly and closely defined in 2 ington and Federal bars and is associated their application. with a Seattle law firm. This article will focus on some of the present inadequa- cies of the rules of warfare as they relate to guerrilla warfare and revolutionary war. -
Principles of War and Their Application to Strategy and Tactics G
Naval War College Review Volume 3 Article 3 Number 8 October 1950 Principles of War and Their Application to Strategy and Tactics G. K. Carmichael U.S. Navy Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Carmichael, G. K. (1950) "Principles of War and Their Application to Strategy and Tactics," Naval War College Review: Vol. 3 : No. 8 , Article 3. Available at: https://digital-commons.usnwc.edu/nwc-review/vol3/iss8/3 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Carmichael: Principles of War and Their Application to Strategy and Tactics RESTRICTED PRINCIPLES OF WAR AND THEIR APPLICATION TO STRATEGY AND TACTICS A lecture delivered by Captain G. K. Carmichael, USN at the Naval War College. August 17, 1950 The task of the Naval War College mission is to further an understanding of the fundamentals of warfare, with. emphasis on their application to future naval warfare. Accordingly, it is my purpose this morning to examine some of the fundamental truths of war and to indicate how these so-called principles of war are ap plicable to strategy and tactics. Although exact definitions of the fields of war-strategy, tac tics, and logistics-are difficult to arrive at, and may create futile discussion as to semantic distinctions, some definitions are desirable as a basis for study and discussion. -
ISIS: the Terrorist Group That Would Be a State
U.S. Naval War College U.S. Naval War College Digital Commons CIWAG Case Studies 12-2015 ISIS: The Terrorist Group That Would Be a State Michael W.S. Ryan Follow this and additional works at: https://digital-commons.usnwc.edu/ciwag-case-studies Recommended Citation Ryan, Michael W.S., "IWS_02 - ISIS: The Terrorist Group That Would Be a State" (2015). CIWAG Irregular Warfare Studies. 2. https://digital-commons.usnwc.edu/ciwag-case-studies/4/ This Book is brought to you for free and open access by U.S. Naval War College Digital Commons. It has been accepted for inclusion in CIWAG Case Studies by an authorized administrator of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. CIWAG CIWAG IRREGULAR WARFARE STUDIES number 2 CENTER ON IRREGULAR WARFARE AND ARMED GROUPS I RREGULAR W ARFARE S TUDIES ISIS: The Terrorist Group That Would Be a State Michael W. S. Ryan number 2 U.S. Naval War College ISIS: The Terrorist Group That Would Be a State Irregular Warfare Studies In 2008, the U.S. Naval War College established the Center on Irregular Warfare and Armed Groups (CIWAG). The center’s primary mission is to bring together operators, practitioners, and scholars to share academic expertise and knowledge about and operational experience in violent and nonviolent irregular warfare chal- lenges, and to make this important research available to a wider community of interest. Our intent is also to include use of these materials within joint professional military educational (JPME) curricula to fulfill the needs of military practitioners preparing to meet the challenges of the post-9/11 world. -
Irregular Warfare
THEMATIC BIBLIOGRAPHIES NO. 6/2009 IRREGULAR WARFARE LA GUERRE IRRÉGULIÈRE Bibliographies thématiques No. 6/2009 · To contact us : · NATO Library Public Diplomacy Division Room Nb123 1110 Brussels Belgium Tel. : 32.2.707.44.14 Fax : 32.2.707.42.49 E-mail : [email protected] · Intranet : http://hqweb.hq.nato.int/oip/library/ · Internet : http://www.nato.int/library · How to borrow items from the list below : As a member of the NATO HQ staff you can borrow books (Type: M) for one month, journals (Type: ART) and reference works (Type: REF) for one week. Individuals not belonging to NATO staff can borrow books through their local library via the interlibrary loan system. · How to obtain the Library publications : All Library publications are available both on the NATO Intranet and Internet websites. -------------------------------------------------------------------------------------------------------------------------------------------- · Pour nous contacter : · Bibliothèque de l'OTAN Division de la Diplomatie Publique Bureau Nb123 1110 Bruxelles Belgique Tél. : 32.2.707.44.14 Télécopieur : 32.2.707.42.49 E-mail : [email protected] · Intranet : http://hqweb.hq.nato.int/oip/library/ · Internet : http://www.nato.int/library · Comment emprunter les documents cités ci-dessous : En tant que membre du personnel de l'OTAN vous pouvez emprunter les livres (Type: M) pour un mois, les revues (Type: ART) et les ouvrages de référence (Type: REF) pour une semaine. Les personnes n'appartenant pas au personnel d l'OTAN peuvent s'adresser à leur bibliothèque locale et emprunter les livres via le système de prêt interbibliothèques. · Comment obtenir les publications de la Bibliothèque : Toutes les publications de la Bibliothèque sont disponibles sur les sites Intranet et Internet de l’OTAN. -
JP 3-07 Joint Doctrine for Military Operations Other Than
Joint Pub 3-07 Joint Doctrine for Military Operations Other Than War 16 June 1995 The range of military operations, first established in Joint Pub 3-0, described military operations extending from war to military operations other than war (MOOTW). While we have historically focused on warfighting, our military profession is increasingly changing its focus to a complex array of military operations — other than war. This publication describes the basic tenets of MOOTW — from a general description of all types of operations to planning considerations necessary for effective execution. It serves as the springboard into a series of publications on tactics, techniques and procedures that provide additional detail on the more complex MOOTW. Participation in MOOTW is critical in the changing international security environment. Although the goals and endstates may not be crystal clear, you should spare no effort in planning and executing MOOTW. Your support of national security interests in today’s challenging environment is as crucial as it is in war. You should become familiar with the information contained herein — our Nation and its independence may depend upon your knowledge. JOHN M. SHALIKASHVILI Chairman of the Joint Chiefs of Staff PREFACE 1. Scope 3. Application This publication explains how military a. Doctrine and guidance established in operations other than war (MOOTW) this publication apply to the commanders differ from large-scale, sustained combat of combatant commands, subunified operations. It addresses purpose, principles, commands, joint task forces, and types of operations and planning subordinate components of these considerations. A doctrinal basis is commands. These principles and guidance provided for related joint tactics, also may apply when significant forces of techniques, and procedures (JTTP) one Service are attached to forces of another publications which address specific types Service or when significant forces of one of MOOTW. -
Restructuring the Tactical Russian Army for Unconventional Warfare
Restructuring the Tactical Russian Army for Unconventional Warfare Fort Leavenworth, KS Volume 5, Issue 2 FEB 2014 by Lester W. Grau, PhD, TRISA Foreign Military Studies Office (FMSO) Russian wars in Afghanistan (1979-1989) and Chechnya (1994-1996 and 1999-2006) reintroduced their ground forces to nonlinear warfare that lacked a clear front line and a rear area. Instead, combat was fragmented into close-combat fights, where the Afghan resistance launched sudden attacks against convoys, outposts and security elements or laid ambushes, heavily mined roadways and fought within urban centers or conducted long-range harassment fires. The Chechen resistance functioned under the concepts of “attack and withdraw” and “the attack of swarms of bees at night.” Often the Chechen resistance would form mobile firing groups. Two mortars with crews, each located in a cross- country vehicle, were accompanied by machine gunners, grenadiers, snipers and riflemen. The vehicles would drive into an area, fire a total of five to six mortar rounds accompanied by flat-trajectory fire from the supporting weapons, and then move quickly to a new firing area. Russian artillery would usually not be able to respond quickly enough to interdict theses grtoups. 1 The conventional battlefield with prepared lines of trenches and interlocking fields of fire had been supplanted by mobile strike groups, strongpoint defenses, and combatants who would exploit difficult terrain and blend into the civilian population when threatened. The Russian Army realized that it needed to increase its ability to respond and gain the initiative through agility, mobility, and independent action over a much larger area. -
Principles of War for Cyberspace
AIR WAR COLLEGE AIR UNIVERSITY PRINCIPLES OF WAR FOR CYBERSPACE by Steven E. Cahanin, Lt Col, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the Graduation Requirements 15 January 2011 ii DISCLAIMER The views expressed in this academic research paper are those of the author and do not reflect the official policy or position of the US government or the Department of Defense. In accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the United States government. i Contents Disclaimer……………………………………………………………………………………….....i Contents…………………………………………………………………………………………...ii Biography………………………………………………………………..……………………….iii Introduction…………………………………………………………………………………….….1 Assumptions………………………………………………..………..…....…………………….…3 Cultures of Strategy in Cyberspace………...……………………….………….…………............4 Clausewitzian Cyberthink………………….………………..….………………………....4 Sun Tzu Cyberthink……………………………………………………………………….6 Yin and Yang in Cyberspace……………………………...……….……………………………...7 Cyber Yin……………..…………………………….………………………………….….8 Cyber Yang……………...………………………………………………………….....…11 Recommendations………………………….……………………………………………….……13 ClauseTzu Cyberspace Doctrine…………………………………………………………14 Cyberspace Education……………………………………………………………………15 Conclusion………………………………………………………………………………...……..16 Bibliography……………………………………………………………...……………………...18 ii Biography Lieutenant Colonel Cahanin entered the Air Force in 1982 as an Airman Basic, Lackland AFB, Texas. While enlisted, he was an Avionics Technician on both analog and digital -
Strategic Influence: Applying the Principles of Unconventional Warfare in Peace
Strategic Influence: Applying the Principles of Unconventional Warfare in Peace Title JUNE 2021 STRATEGIC MULTILAYER ASSESSMENT Author: COL (Ret.) Robert Jones, United States Special Operations Command Series Editor: Ali Jafri, NSI Inc. 1 This white paper presents the views and opinions of the contributing authors. This white paper does not represent official USG policy or position. COL (Ret.) Robert Jones, Senior Strategist, United States Special Operations Command Robert Jones is a retired Army Special Forces Colonel who has served for the past ten years as senior strategist at USSOCOM, with a focus on understanding the nature of the strategic environment, the impact on the character of conflict, and the implications for our Special Operations Forces. He is a core member of the Strategic Multilayer Assessment (SMA) team and a regular lecturer at the Joint Special Operations University and the Air War College. A Cold War and Gulf War vet, he stepped away for a bit to gain experiences as both an emergency manager and a deputy district attorney prior to returning to the Special Operations community to serve from Zamboanga to Kandahar and places in between. Editor’s note: The thoughts, concepts, and products included in this paper are the author’s own, developed in over 30 years as a Special Forces qualified officer both in uniform and during the past 10 years as a civilian strategist at USSOCOM. 2 Strategic Influence: Applying the Principles of Unconventional Warfare in Peace COL (Ret.) Robert Jones, Senior Strategist, United States Special Operations Command1 “The most important aspect of our containment strategy is that it serves to contain ourselves,” former President Dwight Eisenhower reportedly observed after he had left office.