Sun Tzu in Contemporary Chinese Strategy JFQ 73, 2Nd Quarter 2014 the General Recited the Whole Passage in Table

Total Page:16

File Type:pdf, Size:1020Kb

Sun Tzu in Contemporary Chinese Strategy JFQ 73, 2Nd Quarter 2014 the General Recited the Whole Passage in Table Statue of Sun Tzu in Yurihama, Tottori, Japan un Tzu wrote 2,500 years ago during an agricultural age but S has remained relevant through both the industrial and information ages. When we think about security, Japan’s greatest strategic concern is China, and we cannot discuss Chinese strategy without first discussing Sun Tzu. In this article, I demonstrate how contemporary Chinese strategists apply the teachings of Sun Tzu and his seminal The Art of War.1 Why Sun Tzu? Europe first discovered Sun Tzu during the late 18th century. Wilhelm II, the emperor of Germany, supposedly stated, “I wish I could have read Sun Tzu before World War I.” General Douglas MacArthur once stated that he always kept Sun Tzu’s The Art of War and Walt Whitman’s Leaves of Grass on his desk. At the end of the Cold War, the United States borrowed from Sun Tzu when it created “competitive strategy,” which aimed to attack the Soviets’ weaknesses with American strengths.2 This is exactly Sun Tzu’s meaning when he said an “Army avoids strength and strikes weak- ness.” I have also heard that this idea is referred to as a “net assessment” strat- egy in the Pentagon. When I was a student at the National Defense University in Washington, DC, I studied Caspar Weinberger’s “six tests.” When I first considered his tests I imme- diately thought, “This is the teaching of Sun Tzu.” Let us consider Weinberger’s six tests and the comparable ideas found in The Art of War (see table). Sun Tzu in General Colin Powell added a few tests of his own with the so-called Powell Doctrine, and his tests also have compa- Contemporary rable passages in Sun Tzu. For instance, Powell’s questions “Is there a plausible exit strategy to avoid endless entangle- ment?” and “Have risks and costs been Chinese Strategy fully and frankly analyzed?” are similarly mentioned in chapter 2 of The Art of War. By Fumio Ota Contemporary Chinese Strategy In 2001 I had some conversations with Dr. Fumio Ota, Vice Admiral (Ret.), Japan Maritime Self-Defense Force, was the Director of the General Xiong Guankai, deputy chief Defense Intelligence Headquarters in the Japan Defense Agency. He is a graduate of the Industrial College of the Armed Forces and received his Ph.D. from the School of Advanced International of staff in Beijing. When I offered a Studies at The Johns Hopkins University. phrase from Sun Tzu in conversation, 76 Commentary / Sun Tzu in Contemporary Chinese Strategy JFQ 73, 2nd Quarter 2014 the general recited the whole passage in Table. Sun Tzu. I also visited the People’s Lib- eration Army (PLA) National Defense Weinberger’s “Six Tests” Passages from Sun Tzu’s The Art of War University (PLANDU), the highest The United States should not commit forces “War is a matter of vital importance to the to combat overseas unless the particular State; the province of life or death; the road to educational institute for the Chinese engagement or occasion is deemed vital to our survival or ruin” (chapter 1). military, and asked the vice president national interest or that of our allies. how PLANDU teaches Sun Tzu. He If we decide it is necessary to put combat “A victorious army wins its victories before answered that the ancient strategist troops into a given situation, we should do so seeking battle; an army destined to defeat is the centerpiece of the curriculum. wholeheartedly, and with the clear intention of fights in the hope of winning” (chapter 4). winning. According to the Chinese Information Bureau in 2006, the PLA decided to If we do decide to commit forces to combat “Now to win battles and take your objectives, overseas, we should have clearly defined political but to fail to exploit these achievements is use The Art of War as the educational and military objectives. ominous and may be described as wasteful textbook not only for officers but also delay” (chapter 12). for all enlisted soldiers and sailors. The relationship between our objectives and When I was invited by the PLA the forces we have committed—their size, composition, and disposition—must be continually University of Science and Technology reassessed and adjusted if necessary. (PLAUST) to the Symposium for Before we commit combat forces abroad, there “The people [must] be in harmony with their Presidents of Military Institutions in must be some reasonable assurance we will have leaders, so that they will accompany them in October 2011, I spoke to the president the support of the American people and their life and unto death without fear of moral peril” of PLAUST during the symposium. elected representatives in Congress. (chapter 1). Whenever I mentioned a phrase from Sun The commitment of forces to combat should be a Tzu’s writing, he too responded with the last resort. entire passage. He had memorized the strategist’s work. him. Attack where he is unprepared; sally 35 South. On its maps, China portrays a I also had an opportunity to visit out when he does not expect you” (The three-line configuration that includes the the PLA Army Command Academy in Art of War, chapter 1). Hawaiian Islands as the third–island chain. Nanjing where the academy’s motto Since all Chinese military personnel In 2012 a Chinese delegation insisted from a passage in chapter 5 of The Art seem to memorize Sun Tzu, it is possible on Hawaiian sovereignty to Secretary of of War appears on the library wall: “Use that Chinese strategy is based on The Art State Hillary Clinton. Admiral Timothy the normal force to engage; use the ex- of War. All Central Military Commission Keating, commander of U.S. Pacific traordinary to win.” An American scholar members except Xi Jinping are generals Command, was approached in 2007 by pointed out that the Chinese concept and admirals who have memorized his a Chinese admiral who advocated divid- of cyber attack is based on that phrase.3 work completely. Even though PLA weap- ing the Pacific. Due to the declaration There were other framed phrases from ons and tactics are not as sophisticated as that “China will never seek hegemony,” Sun Tzu in the library: “All warfare is those of the major Western powers, this Chinese strategy is clearly deceptive. based on deception,” and “There are comprehensive strategy—which includes We have to look at their real intentions. strategist’s keys to victory. It is not pos- nonmilitary means—is clever, and we must The latest China’s National Defense sible to discuss them beforehand.” understand how China has adopted Sun emphasizes “rapid assaults.”5 Military A phrase of Deng Xiaoping’s Tzu for its contemporary strategy. and Security Developments Involving 24-Character Plan (“Hide our capabili- What is Chinese contemporary the People’s Republic of China 2013 also ties and bide our time”), which was a strategy? It is not necessarily revealed states that the “PRC continues to pur- central tenant of Chinese strategy since in China’s National Defense, which is sue [the ability] to fight and win short the Tiananmen Square incident in 1989, published every 2 years. In the preface we duration [conflicts].”6 This is contextu- is derived from Jiang Ziya’s The Six read, “China will never seek hegemony.”4 ally similar to “while we have heard of Secret Teachings on the Way of Strategy, According to reports by the Center for blundering swiftness in war, we have one of China’s seven military classics. Strategic and Budgetary Assessments and not yet seen a clever operation that was Some of Mao Zedong’s characteristics RAND, by 2020 China will be well on prolonged,” which is found in chapter 2 of strategic secrets, such as “When an its way to having the means to achieve of The Art of War. enemy advances, we will retreat,” “When its first–island chain policy. In May 2013 an enemy stays, we will disturb them,” Chinese newspapers discussed possession “Three Warfares” “When an enemy is tired, we will strike of Okinawa. In 2012 a PLA think tank, In 2003 the Chinese Communist Party them,” and “When an enemy retreats, we the Military Science Academy, advocated Central Committee and the Central will chase them” are very similar to Sun a “strong military strategy” that insists Military Commission endorsed the Tzu’s “When he concentrates, prepare that the PLA Navy must protect national “three warfares” concept, reflecting against him; where he is strong, avoid interests west of 165 East and north of China’s recognition that as a global JFQ 73, 2nd Quarter 2014 Ota 77 Moreover, Beijing has legislated many internal maritime laws to justify its mari- time activities including: • Law of the People’s Republic of China Concerning the Territorial Sea and the Contiguous Zone (1992) • Proclamation of Territorial Base Line (1996) • Public Relation Marine Science Research Administrative Regulation (1996) • Law of the People’s Republic of China on the Exclusive Economic Zone and the Continental Shelf (1998) • Marine Environment Protection Law of the People’s Republic of China (1999) • Law of the People’s Republic of China on the Administration of the Use of Sea Areas (2001) • Desert Island Protection Usage Administrative Regulation (2003) • Law of the People’s Republic of Chinese bamboo copy of The Art of War with cover inscription suggesting it was either commissioned China on Island Protection (2009) or transcribed by Qianlong Emperor (UC Riverside) • National Mobilization Law (2010) Maritime Observation Forecast actor it would benefit from learning to Chinese leaders typically mention • Administrative Regulations (2012). use the tools of public opinion, particu- ideas such as “Chinese Military Buildup larly during the early stages of a crisis, No Threat to the World” (Defense Disintegration Warfare as these tools have a tendency to bolster Minister Liang Guanglie’s statement The PLA International Relations one another.7 The PLA issued 100 in November 2012), or “Peaceful Academy in Nanjing studied disintegra- examples each for psychological, media, Development” (China’s National tion warfare from 2003 to 2009.
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • The Psychological Impact of Child Soldiering
    Chapter 14 The Psychological Impact of Child Soldiering Elisabeth Schauer and Thomas Elbert Abstract With almost 80% of the fighting forces composed of child soldiers, this is one characterization of the ‘new wars,’ which constitute the dominant form of violent conflict that has emerged only over the last few decades. The development of light weapons, such as automatic guns suitable for children, was an obvious pre- requisite for the involvement of children in modern conflicts that typically involve irregular forces, that target mostly civilians, and that are justified by identities, although the economic interests of foreign countries and exiled communities are usually the driving force. Motivations for child recruitment include children’s limited ability to assess risks, feelings of invulnerability, and shortsightedness. Child soldiers are more often killed or injured than adult soldiers on the front line. They are less costly for the respective group or organization than adult recruits, because they receive fewer resources, including less and smaller weapons and equipment. From a different per- spective, becoming a fighter may seem an attractive possibility for children and adolescents who are facing poverty, starvation, unemployment, and ethnic or polit- ical persecution. In our interviews, former child soldiers and commanders alike reported that children are more malleable and adaptable. Thus, they are easier to indoctrinate, as their moral development is not yet completed and they tend to listen to authorities without questioning them. Child soldiers are raised in an environment of severe violence, experience it, and subsequently often commit cruelties and atrocities of the worst kind. This repeated exposure to chronic and traumatic stress during development leaves the children with mental and related physical ill-health, notably PTSD and severe personality E.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Cognitive Warfare.Pdf
    1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. ​ ​ Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose.
    [Show full text]
  • Sun Tzu and Modern Strategic Thought
    2016-005 13 Jan. 2016 Sun Tzu and Modern Strategic Thought Deciphering Sun Tzu: How to Read The Art of War by Derek M.C. Yuen. New York: Oxford Univ. Press, 2014. Pp. xii, 214. ISBN 978–0–19–937351–2. Sun Tzu and the Art of Modern Warfare by Mark R. McNeilly. Updated edition. New York: Oxford Univ. Press, 2015 [orig. 2001]. Pp. x, 216. ISBN 978–0–19–995785–9. Review by Larry A. Grant, Charleston, SC ([email protected]). “You know you never defeated us on the battlefield,” said the American colonel. The North Vietnam- ese colonel pondered this remark a moment. “That may be so,” he replied, “but it is also irrelevant.” —Conversation in Hanoi, April 1975 1 This exchange captures the principal thesis of both books under review here. Specifically, the require- ments for success in war transcend the simple application of force, and Sun Tzu’s statement of them remains the most insightful. Strategic theorist Derek Yuen (PhD, Univ. of Reading) 2 maintains that, “despite its popularity in the Western world, The Art of War has rarely been understood correctly with due understanding of its Chinese context and Taoist roots.” Instead, readers see only “facile references to short one- to two- sentence axioms, aphorisms, and phrases...” (4). He means Deciphering Sun Tzu to open “new avenues for further research that can play an essential role in enhancing the Western understanding of Chinese strategy” (7); to that end, he emphasizes • the foundations of Chinese strategic thought and strategic culture, • the Tao Te Ching as a strategic text, • Lao Tzu’s place in Chinese strategic thought, • Chinese military dialectics, • the epistemology of Chinese strategy, • the “Easternization” of Western strategic thought, • the future direction of the study of Chinese strategic thought and culture, • a new general theory of strategy transcending the East and West.
    [Show full text]
  • The Art of War in the Middle Ages, A.D. 378-1515
    Digitized by the Internet Archive in 2007 with funding from IVIicrosoft Corporation http://www.archive.org/details/artofwarinmiddleOOomanuoft otl^xan: ^rt§e ^ssag 1884 THE ART OF WAR IN THE MIDDLE AGES PRINTED BY HORACE HART, PRINTER TO THE UNIVERSITY THE ART OF WAR [N THE MIDDLE AGES A.D. 37^—15^5 BY C. W. C. OMAN, B.A. FELLOW OF ALL SOULS COLLEGE WITH MAPS AND PLANS OXFORD B. H. BLACKWELL, 50 BROAD STREET LONDON T. FISHER UNWIN, 26 PATERNOSTER SQUARE 1885 [^// rights reserved '\ O/M The Author desires to acknowledge much kind help received in the revision and correction of this Essay from the Rev. H. B. George, of New College, and Mr. F. York Powell, of Christ Church. 6/ 37 05 , — — CONTENTS. PAGE ' Introduction . i CHAPTER 1. The Transition from Roman to Medieval forms in War (a.d. 378-582). Disappearance of the Legion.—Constantine's reorgajiization. The German tribes . — Battle of Adrianople.—Theodosius accepts its teaching.—Vegetius and the army at the end of the fourth century. —The Goths and the Huns. Army of the Eastern Empire.— Cavalry all-important . 3— 14 CHAPTER n. The Early Middle Ages (a.d. 476-1066). Paucity of Data for the period.—The Franks in the sixth cen- tury.—Battle of Tours.—^Armies of Charles the Great. The Franks become horsemen.—The Northman and the Magyar.—Rise of Feudalism.—The Anglo-Saxons and their wars.—The Danes and the Fyrd.—Military importance of the Thegnhood.—The House-Carles.—Battle of Hastings . Battle of Durazzo 15 — 27 W — VI CONTENTS.
    [Show full text]
  • The Art of War: the Protection of Cultural Property During the "Siege" of Sarajevo (1992-95)
    DePaul Journal of Art, Technology & Intellectual Property Law Volume 14 Issue 1 Special Section: Art and War, 2004 Article 5 The Art of War: The Protection of Cultural Property during the "Siege" of Sarajevo (1992-95) Megan Kossiakoff Follow this and additional works at: https://via.library.depaul.edu/jatip Recommended Citation Megan Kossiakoff, The Art of War: The Protection of Cultural Property during the "Siege" of Sarajevo (1992-95), 14 DePaul J. Art, Tech. & Intell. Prop. L. 109 (2004) Available at: https://via.library.depaul.edu/jatip/vol14/iss1/5 This Case Notes and Comments is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Journal of Art, Technology & Intellectual Property Law by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. Kossiakoff: The Art of War: TheCOMMENT Protection of Cultural Property during the "S THE ART OF WAR: THE PROTECTION OF CULTURAL PROPERTY DURING THE "SIEGE" OF SARAJEVO (1992-95) I. INTRODUCTION Throughout the night of August 25, 1992, shells from Serb gunners fell on the National and University Library of Bosnia and Herzegovina in Sarajevo. The attack set off a blaze fueled by a collection representing hundreds of years of Bosnian history and culture. Librarians and community members, risking sniper fire, formed a human chain to move books to safety.' Despite emergency efforts, ninety percent of the collection was ash by daybreak.2 Unfortunately, this incident was not unique. The destruction of cultural artifacts during the "Siege" of Sarajevo was a loss not only to Bosnia,3 but also to the heritage of the world which now suffers a gap that cannot be closed.
    [Show full text]
  • Information Warfare on the Web in the Middle East
    Source: Vice INFORMATION WARFARE ON THE WEB IN THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION 1 BRINGING WEB SCIENCE TO THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Created in 2002 at Beirut’s Saint-Joseph University Faculty of Humanities KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Digital Transformation of Middle Eastern Societies New paradigms – Arab Spring – Conflicts – ISIS KEEWARD KNOWLEDGE & EDUCATION The Call For a Science of the Web Berners-Lee Interdisciplinarity (The 2 magics) Mixed methods (Data + Social) New tools to understand the impact of the Web on Society From power laws to people (Social Machines) KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Web Science 2010 – Raleigh, NC. Susan Halford, Cathy Pope, Leslie Carr KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Understanding the web requires knowledge and expertise from the social and human sciences KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Computer science is only one vantage point KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Co-constitution of technology and society The Web impacts society and society impacts the Web KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Heterogeneous actors (ANT – Latour) Radical symmetry between humans and non-humans. “the bureaucrat in the standards agency is just as important as the servers at Google or HTTP”. KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Social and cultural
    [Show full text]
  • A Study of Sun Tzu's Art of War and Clausewitz's On
    features 68 A Study of Sun Tzu’s Art of War and Clausewitz’s On War by LTC Ong Cher Howe Abstract: Sun Tzu and Clausewitz are both known to be most recognised and proficient writers on the subject of war and strategies. Although they wrote in different times and were from different backgrounds, their philosophies on war and strategy are still proven to be extremely helpful and effective in current times. This essay serves to compare both Sun Tzu and Clausewitz’s famous texts written on the subject of war: Art of War and On War, as well as prove how both works are not extremely different even when they were written in a divergent, historical, cultural and technological context. Instead, what both Sun Tzu and Clausewitz tried to express were not diametrically opposed. Hence, any contradiction arises from their own slightly unique points of analysis. While both of them defined war as means to rational policy ends, they were both well aware of the power of moral influence and the paradoxical trinity. This essay also studies how both their works can be applied to today’s military applications despite the advanced technology of the modern era. Keywords: Government, People, Philosophy, Technology, Doctrine, Law INTRODUCTION ‘different sides of the same coin.’ Instead of diametrically opposed, they advanced largely similar Sun Tzu’s Art of War and Clausewitz’s On War are the ideas that operate within degrees of contradiction. most studied philosophies on war and strategy. These Those apparent degrees of contradiction are the result two texts were written in eras more than 2,000 years of their different starting point of analysis.
    [Show full text]
  • Principles of War and Their Application to Strategy and Tactics G
    Naval War College Review Volume 3 Article 3 Number 8 October 1950 Principles of War and Their Application to Strategy and Tactics G. K. Carmichael U.S. Navy Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Carmichael, G. K. (1950) "Principles of War and Their Application to Strategy and Tactics," Naval War College Review: Vol. 3 : No. 8 , Article 3. Available at: https://digital-commons.usnwc.edu/nwc-review/vol3/iss8/3 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Carmichael: Principles of War and Their Application to Strategy and Tactics RESTRICTED PRINCIPLES OF WAR AND THEIR APPLICATION TO STRATEGY AND TACTICS A lecture delivered by Captain G. K. Carmichael, USN at the Naval War College. August 17, 1950 The task of the Naval War College mission is to further an understanding of the fundamentals of warfare, with. emphasis on their application to future naval warfare. Accordingly, it is my purpose this morning to examine some of the fundamental truths of war and to indicate how these so-called principles of war are ap­ plicable to strategy and tactics. Although exact definitions of the fields of war-strategy, tac­ tics, and logistics-are difficult to arrive at, and may create futile discussion as to semantic distinctions, some definitions are desirable as a basis for study and discussion.
    [Show full text]
  • The Weaponized Narrative, Sun Tzu, and the Essence of War
    Nine Links in the Chain: The Weaponized Narrative, Sun Tzu, and the Essence of War Jon Herrmann (/the-bridge/?author=59734f28c534a5ea5dcaaf14) · July 27, 2017 (/the- bridge/2017/7/27/nine-links-in-the-chain-the-weaponized-narrative-sun-tzu-and-the-essence-of- war) INTRODUCTION Decades ago, the unprecedented power of nuclear weapons required new adaptations of strategy. Now, the unprecedented power of weaponized narrative requires new adaptation of strategy. No one should mistake natural anthrax for weaponized anthrax designed for speed of transmission, virulence and exploitation of vulnerabilities in the body to destroy the ability to fight. Likewise, no one should mistake natural narrative for weaponized narrative designed for speed of transmission, virulence, and exploitation of vulnerabilities in the mind to destroy the will. Sadly, we often do mistake the deliberate and dangerous as the accidental but contagious; that must change. That all war is a conflict of narratives is a premise worth considering. Each side claims to be more powerful or morally better than the other, and military action is both an extension of politics by other means and an extension of “propaganda of the deed.”[1] Narratives around a conflict solidify when the winners get to write history.[2] Further, when a war is not won outright, both narratives survive. Sometimes, the losing side’s narrative dies off. Other times, it persists or regenerates to spark a new conflict.[3] To explain this premise, let us begin with some concepts. First, the concept of threat is generally understood to be comprised of intent and capability. War is ostensibly intended to counter perceived threats.
    [Show full text]
  • Han Fei's Ancient Chinese Strategies of Governance As Contrasted With
    $SULO $XWRFUDWLF%XUHDXFUDWLVP +DQ)HL¶V$QFLHQW&KLQHVH6WUDWHJLHV RI*RYHUQDQFHDV&RQWUDVWHGZLWK 0DFKLDYHOOL¶V3ROLWLFDO3KLORVRSK\ $FDQGSROLWWKHVLVLQSROLWLFDOVFLHQFH :ULWWHQE\/DUV7+HOOLNVHQ 6SULQJWHUP 'HSDUWPHQWRI3ROLWLFDO6FLHQFH 8QLYHUVLW\RI2VOR 7DEOHRI&RQWHQWV Preface...................................................................................................................................................iii Chapter 1. Introduction .......................................................................................................................... 1 Objectives and Outline ....................................................................................................................... 3 Some Methodological and Theoretical Reflections ........................................................................... 3 Translations and References............................................................................................................... 6 PART I: THE BACKGROUND OF HAN FEI ZI..................................................................................... 8 Chapter 2. The Historical Setting........................................................................................................... 8 From the Zhou Dynasty to the Warring States Period ....................................................................... 8 Legalism in Practice: The State and Empire of Qin......................................................................... 12 Chapter 3. Philosophical Background: Confucianism,
    [Show full text]