Gouws, Jacques J. (2019) the Impact of Asymmetric Warfare On

Total Page:16

File Type:pdf, Size:1020Kb

Gouws, Jacques J. (2019) the Impact of Asymmetric Warfare On INTERNATIONAL APPLIED MILITARY PSYCHOLOGY SYMPOSIUM (IAMPS) 2019 “THE STRENGTH OF AN ARMY IS NOT IN ITS WEAPONS, ITS STRENGTH IS IN ITS PEOPLE” SARAJEVO, BOSNIA AND HERZEGOVINA MAY 6 – 10, 2019 THE IMPACT OF ASYMMETRIC WARFARE ON SOLDIERS JACQUES J. GOUWS, D.PHIL., C.PSYCH., MMM1 ABSTRACT The term, Asymmetric warfare was first used in its current application around 1995 when the USA Department of Defense (DoD) expressed a growing recognition of the potential for asymmetric threats to the United States in a post-Cold War security environment. The DoD’s basic point of departure was that, since the global distribution of power had become asymmetric (i.e., no one country could engage the USA in combat), it followed naturally that asymmetric strategies would be required to counter the threat posed to specifically the USA by weaker opponents that will engage in asymmetric war activities. Following the 9/11 attacks on the USA, the term asymmetric war became a catch-all description for any and all individual and collective attempts designed to circumvent or undermine a country’s military strength through the exploitation of the targeted military’s weaknesses by employing methods that differ significantly from the expected method of operations during armed conflict with the targeted military. The list of what comprises asymmetric warfare now includes all actions ranging from terrorism to the use of weapons of mass destruction, to information and cyber warfare, etc. These are deemed to comprise unconventional tactics, means and methods of launching attacks on the USA and/or its allies. Against this background, the role of Military Psychology is broadly discussed with specific attention to the psycho-social mass impact of such actions on a country’s soldiers and its population. Note: The views expressed in this paper are those of the presenter, unless otherwise indicated in the quoted sources. 1 Jacques J. Gouws, D.Phil., C.Psych. Human & System Interface Inc. 137 Westmount Road, Guelph, Ontario, N1H 5J3, Canada. E-mail: [email protected]. Lt. Col. (Rt.) Dr. Gouws, C. Psych., MMM, is a former South African Air Force officer and retired military psychologist. Dr. Gouws both researched and gained extensive firsthand experience of the resourcefulness required from soldiers and their commanders when faced by the insurmountable obstacles posed by the stress of being deployed in combat zones (complicated by the pressures from the international political arena, the reactions of the civilian population to the casualties of battle, as well as the strain placed on society in general) during long term sustained military operations. He consults and lectures on the psychological effects and impact of war, and also provided specialised trauma treatment to military, veterans, and first line responders (e.g., police, firefighters, etc.). THE IMPACT OF ASYMMETRIC WARFARE ON SOLDIERS INTERNATIONAL APPLIED MILITARY PSYCHOLOGY SYMPOSIUM (IAMPS) 2019 MAY 8, 2019 INTRODUCTION The world has always been at war, this at least for as long as human history had been around. There was always one group or another fighting another group, whether for access to resources, territory, jealousy, or just plain “for the hell of it”. Whether they fought with bare hands, sticks, rocks, crudely moulded knives, spears, or even today with chemical, biological, nuclear, and other weapons of mass destruction, leaders’ goal has always been to muster the support from their followers and convince them of the necessity to annihilate the identified opposition - simply described as “the enemy”. The annihilation of the enemy through the means of war, has been labelled in a multitude of ways, ranging from conventional to unconventional to revolutionary warfare. Asymmetric warfare is not new, if anything, it is just a new title for the same old thing: how to wage war against a more powerful opposition with limited means, or the inverse: the means by which a more powerful opponent circumvents the tactics employed by a smaller opponent. Regardless of the terminology, war remains an ugly human endeavour that is perpetrated by the few in power on the many with no power, based on an authoritarian belief of own superiority that at best is warped and at its worst is brutally malevolent in its motives towards others who are depicted as inferior. That said, there should be no misunderstanding that real enemies do exist and that they are very dangerous to each other and the world. These identified real enemies indeed also possess the malevolent qualities attributed to them. The malevolent qualities over time become more entrenched by the negative images created of the enemy, and the enemy’s actions taken in its own defence. Ironically, opposing enemy sides hold the same belief systems about each other and so, as the conflict between them escalates, each more and more closely fit the negative descriptions they had given each other in the first place. Whether these original descriptions had reflected actual reality or had involved a significant degree of distortion, is irrelevant to the conflict, this simply because of a belief by both sides that “the enemy is depicted as the enemy is”. The enemy is described, depicted, and characterised by the negative connotations derived from stereotypes of the enemy culture, in the choice of language conveying the stereotypes, and most importantly, scapegoating the enemy for all that went wrong, regardless of whose fault it may be. It must always be remembered that the ultimate act of war is the killing of the enemy. No matter how indirect the method, how complex the chain of command, how intricate the team cooperation necessary to launch a particular weapon, how many of the enemy are killed at once, or what the casualties are, in the final analysis the act of killing is PAGE 2 OF 17 THE IMPACT OF ASYMMETRIC WARFARE ON SOLDIERS INTERNATIONAL APPLIED MILITARY PSYCHOLOGY SYMPOSIUM (IAMPS) 2019 MAY 8, 2019 perpetrated by a single person on another. It is against this background that one must attempt to understand the complexity of the impact of asymmetric warfare on soldiers on all sides of the conflict. War as a violent and destructive activity of organised groups must be understood in light of the group properties of the respective antagonists involved in conflict. While the conflict between antagonist groups had grown out of their negative interaction with each other, the onset and the course of the conflict cannot be adequately predicted from the characteristics of the individual members, nor from the groups’ own internal properties. Hence, the saying: It is easier to start a war than to end it.2 Acts of war, in the final analysis, are based on the anecdotal and stereotypical perceptions created by words that create images that form the basis of what would later become the supposedly valid and legal reasons for engaging in acts of war. This is a very important and serious factor to always keep in mind as one listens to the news, reviews political rhetoric, and most importantly, interprets what supposedly intelligent and mature world leaders are saying about other countries and their peoples. Such “wars of words” can rapidly lead to “wars of swords” with now, more than ever before, the potential to destroy the very fabric of modern civilisation. Unfortunately, from a psychological perspective this all-important factor in warfare is often overlooked and seldom if ever addressed by military psychologists. Yet it is this very aspect that affects individual soldiers most in what mostly politicians and some military commentators refer to as “asymmetric warfare”. ASYMMETRIC WARFARE 101 As soon as I attested in the permanent force as a pupil pilot in the South African Air Force, I was taught about the different types of war, and in particular the types of war in which South Africa was involved at the time. I learned about the differences between wars of insurgency and counterinsurgency, conventional and unconventional war, attritional warfare, manoeuvre warfare, and revolutionary warfare. There are as many types of war as books written about the subject and everyone who theorises about war has an opinion to offer, myself not excluded. If one were to define types of warfare, one could certainly come up with many more names than already mentioned above: civil war, guerrilla war, war of independence, religious wars, succession war, ethnic conflict war, people’s war, limited 2 Marquez G. G. (1967). One Hundred Years of Solitude. Harper Perennial Modern Classics; Reprint edition (February 21, 2006). Author’s Comment: A character in this novel, the rebel leader Aureliano Buendia, after 32 attempts at seizing power violently, finally expresses this life lesson after agreeing to give peace a chance. PAGE 3 OF 17 THE IMPACT OF ASYMMETRIC WARFARE ON SOLDIERS INTERNATIONAL APPLIED MILITARY PSYCHOLOGY SYMPOSIUM (IAMPS) 2019 MAY 8, 2019 war, proxy war, preemptive war, preventive war, defensive war, and of course total war and world war. And then there is psychological war, cyber war, hybrid war, nuclear war, chemical war, biological war, irregular war, and the multitude of other names that people come up with. In each instance I was left with more questions than answers as to me, warfare, regardless of its execution, entails one thing only: winning over the adversary by any means. In this context Asymmetric Warfare is but another perspective of war operations, rather than a definition that addresses a complex world with complex security demands. Given and the degree to which identified types of war are intertwined, someone had to come up with a more generic label to subsume all of the various types of warfare. This is well explained in the following quote from an article by Colonel M. R. Sudhir, then the Commanding Officer of an Engineer Regiment in the Indian Armed Forces: The definition of ‘asymmetric warfare’ is best borrowed from the US from where the term has originated.
Recommended publications
  • How Technology Impacts Doctrine in Asymmetric Warfare
    0 How Technology Impacts Doctrine in Asymmetric Warfare Jeremiah Rozman Northfield Vermont Bachelors of Arts, University of Vermont, 2014 A Thesis presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Master of Arts Department of Foreign Affairs University of Virginia May, 2016 1 Abstract How does technology impact military doctrine, and how does this in turn impact political support for offensive, preventative or preemptive military action?1 I study defensive weapons systems, specifically focusing on missile defense in the theoretical context of technology and defense-based strategies as a whole. Through the study of Israel’s use of Iron Dome, I aim to demonstrate that technology can be an exogenous factor affecting military doctrine. Through careful case study analysis, I demonstrate that operationally successful defensive technologies can lead to the adoption of a defensive military doctrine by decreasing the political cost of inaction to the extent that allowing attrition becomes politically less costly than launching an offensive. Introduction A comparison of Israel’s two recent wars in Gaza, Operation Cast Lead in 2008/9 and Operation Protective Edge in 2014, indicates that the tactical success of Iron Dome, as a defensive military technology, can effect a change in military doctrine. The goal of this study is to demonstrate the effect of an unexpectedly successful defensive military technology on military doctrine, an effect which leads to prioritizing defense, allowing attrition, and moving away from a long-standing offense-based doctrine, specifically when dealing with asymmetric conflict. This study focuses on Israel, specifically in the Gaza theater of conflict and not in the Northern theater of conflict where Israel’s adversary, Hezbollah is 1 Preemptive war is defined as actor A launching a first strike in order to gain advantage in a situation where an attack by actor B is anticipated to be imminent.
    [Show full text]
  • Stability and Arms Control in Europe: the Role of Military Forces Within a European Security System
    Stability and Arms Control in Europe: The Role of Military Forces within a European Security System A SIPRI Research Report Edited by Dr Gerhard Wachter, Lt-General (Rtd) and Dr Axel Krohn sipri Stockholm International Peace Research Institute July 1989 Copyright © 1989 SIPRI All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN 91-85114-50-2 Typeset and originated by Stockholm International Peace Research Institute Printed and bound in Sweden by Ingeniörskopia Solna Abstract Wachter, G. and Krohn, A., eds, Stability and Arms Control in Europe: The Role of Military Forces within a European Security System, A SIPRI Research Report (SIPRI: Solna, Sweden, 1989), 113 pp. This report presents the outcome of a project which was initiated at SIPRI in 1987. It was supported by a grant from the Volkswagen Stiftung of the Federal Republic of Germany. The introductory chapter by the editors presents a scenario for a possible future European security system. Six essays by active NATO and WTO military officers focus on the role of military forces in such a system. Various approaches to the tasks and size of military forces in this regime of strict non-provocative defence are presented with the intent of providing new ideas for the debate on restructuring of forces in Europe. There are 3 maps, 7 tables and 11 figures. Sponsored by the Volkswagen Stiftung. Contents Preface vi Acknowledgements viii The role of military forces within a European security system 1 G.
    [Show full text]
  • Asymmetric Warfare - the Siege of Fallujah
    ASYMMETRIC WARFARE - THE SIEGE OF FALLUJAH Csér Orsolya Abstract: Asymmetric warfare is a tactical process based on policy objectives which can be used to force our will upon the enemy. The non-traditional, inexpensive actions involving material damage and human casualties (such as terrorism, deployment of weapons of mass destruction, threat of using them, information warfare); guerrilla- and partisan-type raids implemented with simple tools and techniques are considered its basic advantages. All these are usually the weapons of the party fighting in the occupied territories (eg. bombings, suicide attacks, actions against logistics, command posts, attacks against officers, command staff, destruction of supply routes and transportation routes). The detection of these weapons and the psychological preparation of the soldiers is very difficult, because the offenders do not comply with the conventions of warfare. The siege of Fallujah in Iraq, which wrote itself into the history books as one of the most infamous and serious insurgencies and in which the media and propaganda played a major role, is regarded as an example of asymmetric warfare. Keywords: asymmetry, insurgency, guerrilla, civilians, civilian victim, propaganda, military gain 1. Introduction Asymmetry doesn't mean anything other than the lack of symmetry between the belligerents, partially or wholly. Asymmetric warfare is: "A warfare for the sake of precisely outlined political aims, often based on ideological, religious, ethnic community of several organizations, implementing military and non-military operations, tactics and techniques building upon direct and indirect effects and intensifying each other's effects, endangering different dimensions of security, mainly tactical procedures, with whose effect altogether we may force our will upon the enemy." All of this is such an activity that can be connected to asymmetric challenges, when the executors - in most cases not even sparing their own lives - execute military actions, and is usually done against a belligerent on a higher technological level.
    [Show full text]
  • The Rhetoric of Perpetual Warfare: a Political Discourse Analysis of the Obama Administration’S Legitimation of U.S
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Masters Theses Graduate School 8-2016 The Rhetoric of Perpetual Warfare: A Political Discourse Analysis of the Obama Administration’s Legitimation of U.S. Drone Strikes Douglas Ray Oeser University of Tennessee, Knoxville, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_gradthes Part of the Sociology Commons Recommended Citation Oeser, Douglas Ray, "The Rhetoric of Perpetual Warfare: A Political Discourse Analysis of the Obama Administration’s Legitimation of U.S. Drone Strikes. " Master's Thesis, University of Tennessee, 2016. https://trace.tennessee.edu/utk_gradthes/4013 This Thesis is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Masters Theses by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a thesis written by Douglas Ray Oeser entitled "The Rhetoric of Perpetual Warfare: A Political Discourse Analysis of the Obama Administration’s Legitimation of U.S. Drone Strikes." I have examined the final electronic copy of this thesis for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Master of Arts, with a major in Sociology. Lois Presser, Major Professor We have read this thesis and recommend its acceptance: Stephanie Bohon, Michelle Brown Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) The Rhetoric of Perpetual Warfare: A Political Discourse Analysis of the Obama Administration’s Legitimation of U.S.
    [Show full text]
  • Three Theories of Just War: Understanding Warfare As a Social Tool Through Comparative Analysis of Western, Chinese, and Islamic Classical Theories of War
    THREE THEORIES OF JUST WAR: UNDERSTANDING WARFARE AS A SOCIAL TOOL THROUGH COMPARATIVE ANALYSIS OF WESTERN, CHINESE, AND ISLAMIC CLASSICAL THEORIES OF WAR A THESIS SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE DEGREE OF MASTER OF ARTS IN PHILOSOPHY MAY 2012 By Faruk Rahmanović Thesis Committee: Tamara Albertini, Chairperson Roger T. Ames James D. Frankel Brien Hallett Keywords: War, Just War, Augustine, Sunzi, Sun Bin, Jihad, Qur’an DEDICATION To my parents, Ahmet and Nidžara Rahmanović. To my wife, Majda, who continues to put up with me. To Professor Keith W. Krasemann, for teaching me to ask the right questions. And to Professor Martin J. Tracey, for his tireless commitment to my success. 1 ABSTRACT The purpose of this analysis was to discover the extent to which dictates of war theory ideals can be considered universal, by comparing the Western (European), Classical Chinese, and Islamic models. It also examined the contextual elements that drove war theory development within each civilization, and the impact of such elements on the differences arising in war theory comparison. These theories were chosen for their differences in major contextual elements, in order to limit the impact of contextual similarities on the war theories. The results revealed a great degree of similarities in the conception of warfare as a social tool of the state, utilized as a sometimes necessary, albeit tragic, means of establishing peace justice and harmony. What differences did arise, were relatively minor, and came primarily from the differing conceptions of morality and justice within each civilization – thus indicating a great degree of universality to the conception of warfare.
    [Show full text]
  • Recipe for Perpetual War by Robert Wing and Coleen Rowley
    Originally published as “Recipe Concocted for Perpetual War is a Bitter One.” Consortium News. consortiumnews.com Recipe for Perpetual War by Robert Wing and Coleen Rowley Last October marked the 16th anniversary of our unending war – or military occupation – in Afghanistan, the longest conflict on foreign soil in U.S. history. The cost to human lives in our current cycle of U.S.-initiated “perpetual wars” throughout the Middle East and Africa is unthinkably high. It runs well into millions of deaths if one counts – as do the Nuremberg principles of international law – victims of spin-off fighting and sectarian violence that erupt after we destroy governance structures. Also to be counted are other forms of human loss, suffering, illness, and early mortality that result from national sanctions, destruction of physical, social, and medical infrastructure, loss of homeland, refugee flight, ethnic cleansing, and their psychological after-effects. One has to witness these to grasp their extent in trauma, and they all arise from the Nuremberg-defined “supreme crime” of initiating war. Waging aggressive war is something America is practiced in and does well, with justifications like “fighting terrorism,” “securing our interests,” “protecting innocents,” “spreading democracy,” etc. – as has every aggressor in history that felt the need to explain its aggressions. Yet few gathered across the country in October, much less gave a thought of lament to the harm we are doing. It’s a topic we’d like to forget. Recalling that domestic opposition to the Vietnam War grew exponentially over the similar (but far shorter) timespan of that aggression, one might wonder what has changed.
    [Show full text]
  • Redalyc.Covert Action and Its Necessity in 21St Century Counter
    UNISCI Discussion Papers ISSN: 1696-2206 [email protected] Universidad Complutense de Madrid España Díaz, Gustavo; Morave, Karov Covert Action and its Necessity in 21st Century Counter-Terrorism UNISCI Discussion Papers, núm. 11, mayo, 2006, pp. 99-114 Universidad Complutense de Madrid Madrid, España Available in: http://www.redalyc.org/articulo.oa?id=76701111 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative UNISCI DISCUSSION PAPERS Nº 11 (Mayo / May 2006) COVERT ACTION AND ITS NECESSITY IN 21 ST CENTURY COUNTER-TERRORISM AUTHOR:1 GUSTAVO DÍAZ UNISCI KAROV MORAVE 1. The Shortcomings of Passive Intelligence It can be said without doubt that today counter-terrorism has risen to become the greatest of priorities in terms of national security. Evidence of this is former Director of Central Intelligence (DCI) Porter J. Goss’s recent testimony to the US Senate Armed Services Committee that the global war on terrorism has become today’s dominant intelligence priority, with fundamental changes being made to the United States Intelligence Community to provide counter-terrorism and war-fighter support. These include the redirection of people and collection systems, as well as rapidly expanding programs, budgets, and capabilities. 2 An important element of this counter-terrorism war will inevitably be covert action (CA). Counter-terrorism though is neither a chess game against a single enemy, nor an attempt at completing a jigsaw puzzle, unless one accepts that the picture is fragmentary and dispersed, with many pieces that fit nowhere.
    [Show full text]
  • Civilians in Cyberwarfare: Conscripts
    Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION .............................................................
    [Show full text]
  • Landpower Essay Series
    LANDPOWER ESSAY SERIES No. 92-3 August1992 THE UNITED STATES ARMY AT THE CROSSROADS TO THE 21st CENTURY by Colonel Wolf-Dietrich Kutter, USA Ret. Introduction This paper is intended to be provocative, to generate ideas for thought and to cross those invisible boundaries formed in our minds through years of professional concepts convergence. The U.S. Army is at a crossroads- conceptually, organizationally and institutionally- as it heads into the 21st century. The notion that we should examine fundamental premises is particularly important as we set the stage for Total Army Analysis (TAA) 1996-2001. Thus, this article seeks to foster rethinking. We are now at the beginning of an era that can be likened to the post-Napoleonic period. That era of strategic change, much like ours, marked England and reframed its focus from containment operations on the continent as the alliance leader, in concert with its Portuguese, Dutch and Prussian allies, to one of preeminent world power. The extraordinary growth of the Indian empire resulted, as well as economic growth in England which ushered in the industrial age. Paul Kennedy, in his The Rise and Fallof Great Powers, would have us believe that economic wealth and capital formation are essential to sustain great powers. One could positthat British senescence was avoided through the creative use of "trading companies" to expand Pax Britannica by minimizing its investment in standing forces. NATO's 40-year historical GNP contribution to containment and collective security ranged between three and four percent per annum, while the United States, as the alliance leader, contributed as much as six percent per annum to sustain that effort, and ultimately prevailed in the Cold War.
    [Show full text]
  • Offensive Actions in Information Warfare
    Strike Back: Offensive Actions in Information Warfare Donald J. Welch, Nathan Buchheit, and Anthony Ruocco Department of Electrical Engineering and Computer Science United States Military Academy West Point, New York 10996 seize the initiative from the enemy through offensive actions Introduction is doomed to defeat. In order to achieve victory we must first understand This paper is written in the context of Information Warfare our national goals and then determine what means we have being a serious and direct threat to our nation's security. The that allow us to attain them. We then identify what National Security Council defines such threats as ones that capabilities the enemy has of defeating us, thus thwarting our endanger our national goals and objectives. In general, these national goals. Information war also requires a clear include threats to the lives of American citizens and understanding of the national goals. And in fact, a residents, threats to our economy, and threats to our ability to distinguishable definition of victory becomes even more vital promulgate freedom, liberty, and the rule of law to the world. to success in information warfare since it more closely It is in our national interest to stop a terrorist organization resembles a war against terrorists, i.e. unconventional from bombing the World Trade Center. It is equally warfare, knowing enemy strengths and weaknesses than a important to our national interest to prevent Information war of armies clashing on the battlefield. Warriors from shutting down or threatening our essential In strategic terms this is referred to as identifying financial, health, or quality of life infrastructures.
    [Show full text]
  • Anticipatory Self-Defense in the Cyber Context
    Anticipatory Self-Defense in the Cyber Context Terry D. Gill and Paul A. L. Ducheine 89 INT’L L. STUD. 438 (2013) Volume 89 2013 International Law Studies 2013 Anticipatory Self-Defense in the Cyber Context Terry D. Gill and Paul A. L. Ducheine* I. INTRODUCTION T his article will examine the question of whether the right of self-defense under contemporary international law permits a State to react to an immi- nent or potential armed attack carried out by digital means in two circum- stances. First, as an attack occurring in conjunction with, or as an adjunct to, a conventional kinetic armed attack intended to neutralize the target State’s defensive and command and control systems. Second, as an at- tack—independent of any use of kinetic force—intended to cause signifi- cant human casualties, physical damage or large-scale disruption in the tar- get State. While the former scenario is probably considerably more likely than the latter scenario, both will receive attention. The applicable law is the same in either scenario, although there are some potentially significant differences in the modalities of its application, primarily in the identifica- tion of the attacking party and in gauging the level of the response if an attack was conducted wholly in the digital domain. * Terry D. Gill is Professor of Military Law, University of Amsterdam and Nether- lands Defence Academy. Paul A. L. Ducheine is Associate Professor of Cyber Operations, Netherlands Defence Academy, and Senior Guest Lecturer and Research Associate, Uni- versity of Amsterdam. © 2013 by Terry D. Gill and Paul A.
    [Show full text]
  • Asymmetric Warfare Thematic Bibliography No
    Public Diplomacy Division Room Nb123 B-1110 Brussels Belgium Tel.: +32(0)2 707 4414 / 5033 (A/V) Fax: +32(0)2 707 4249 E-mail: [email protected] Internet: http://www.nato.int/library Asymmetric Warfare Thematic Bibliography no. 10/10 Les guerres asymétriques Bibliographie thématique no. 10/10 Division de la Diplomatie Publique Bureau Nb123 B-1110 Bruxelles Belgique Tél.: +32(0)2 707 4414 / 5033 (A/V) Fax: +32(0)2 707 4249 E-mail: [email protected] Internet: http://www.nato.int/library How to borrow items from the list below : As a member of the NATO HQ staff you can borrow books (Type: M) for one month, journals (Type: ART) and reference works (Type: REF) for one week. Individuals not belonging to NATO staff can borrow books through their local library via the interlibrary loan system. How to obtain the Multimedia Library publications : All Library publications are available both on the NATO Intranet and Internet websites. Comment emprunter les documents cités ci-dessous : En tant que membre du personnel de l'OTAN vous pouvez emprunter les livres (Type: M) pour un mois, les revues (Type: ART) et les ouvrages de référence (Type: REF) pour une semaine. Les personnes n'appartenant pas au personnel de l'OTAN peuvent s'adresser à leur bibliothèque locale et emprunter les livres via le système de prêt interbibliothèques. Comment obtenir les publications de la Bibliothèque multimédia : Toutes les publications de la Bibliothèque sont disponibles sur les sites Intranet et Internet de l’OTAN. 2 Books Livres* 2010 355.1 /00058 Moral Dilemmas of Modern War : Torture, Assassination, and Blackmail in an Age of Asymmetric Conflict - Cambridge, UK : Cambridge University Press.
    [Show full text]