Download or read book Asymmetric Warfare written by Rod Thornton and published by Polity. This book was released on 2007-02-12 with total page 253 pages. Available in PDF, EPUB and Kindle. Book excerpt: In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.
Download or read book How the Weak Win Wars written by Ivan Arreguín-Toft and published by Cambridge University Press. This book was released on 2005-12-08 with total page 275 pages. Available in PDF, EPUB and Kindle. Book excerpt: How do the weak win wars? The likelihood of victory and defeat in asymmetric conflicts depends on the interaction of the strategies weak and strong actors use. Using statistical and in-depth historical analyses of conflicts spanning two hundred years, in this 2005 book Ivan Arregúin-Toft shows that, independent of regime type and weapons technology, the interaction of similar strategic approaches favors strong actors, while opposite strategic approaches favors the weak. This approach to understanding asymmetric conflicts allows us to makes sense of how the United States was able to win its war in Afghanistan (2002) in a few months, while the Soviet Union lost after a decade of brutal war (1979–89). Arreguín-Toft's strategic interaction theory has implications not only for international relations theory, but for policy makers grappling with interstate and civil wars, as well as terrorism.
Download or read book Asymmetrical Warfare written by Roger W. Barnett and published by Potomac Books. This book was released on 2003 with total page 202 pages. Available in PDF, EPUB and Kindle. Book excerpt: Possible asymmetrical warfare scenarios include launching chemical, biological, or suicide attacks; taking indiscriminate actions against critical infrastructure; using hostages or human shields; deliberately destroying the environment; and targeting noncombatants.".
Download or read book What are Asymmetric Strategies written by Bruce W. Bennett and published by RAND Corporation. This book was released on 1999 with total page 34 pages. Available in PDF, EPUB and Kindle. Book excerpt: Examines the asymmetric strategies that future adversaries might employ and identify potential U.S. vulnerabilities and methods to address them.
Download or read book Rethinking Asymmetric Threats written by Stephen J. Blank and published by . This book was released on 2014-07-06 with total page 69 pages. Available in PDF, EPUB and Kindle. Book excerpt: Assessment of the threat environment is a critical element in the formulation of any state's strategy and defense doctrine. It also should be an inherently critical process that seeks to free policymakers from incorrect, antiquated, or misconceived perceptions about the threat. Consequently, the nature of the threat(s) the United States or any other government faces is the subject of a never-ending debate. For several years U.S. policymakers, officials, and writers on defense have employed the terms "asymmetric" or "asymmetry" to characterize everything from the nature of the threats we face to the nature of war and beyond. This monograph challenges the utility of using those terms to characterize the threats we face, one element of the broader debate over the nature of war, U.S. strategy, and the threats confronting us. As a work of critique, it aims to make an important contribution to the threat debate.
Download or read book The Complexity of Modern Asymmetric Warfare written by Max G. Manwaring and published by University of Oklahoma Press. This book was released on 2012-09-05 with total page 226 pages. Available in PDF, EPUB and Kindle. Book excerpt: Today more than one hundred small, asymmetric, and revolutionary wars are being waged around the world. This book provides invaluable tools for fighting such wars by taking enemy perspectives into consideration. The third volume of a trilogy by Max G. Manwaring, it continues the arguments the author presented in Insurgency, Terrorism, and Crime and Gangs, Pseudo-Militaries, and Other Modern Mercenaries. Using case studies, Manwaring outlines vital survival lessons for leaders and organizations concerned with national security in our contemporary world. The insurgencies Manwaring describes span the globe. Beginning with conflicts in Algeria in the 1950s and 1960s and El Salvador in the 1980s, he goes on to cover the Shining Path and its resurgence in Peru, Al Qaeda in Spain, popular militias in Cuba, Haiti, and Brazil, the Russian youth group Nashi, and drugs and politics in Guatemala, as well as cyber warfare. Large, wealthy, well-armed nations such as the United States have learned from experience that these small wars and insurgencies do not resemble traditional wars fought between geographically distinct nation-state adversaries by easily identified military forces. Twenty-first-century irregular conflicts blur traditional distinctions among crime, terrorism, subversion, insurgency, militia, mercenary and gang activity, and warfare. Manwaring’s multidimensional paradigm offers military and civilian leaders a much needed blueprint for achieving strategic victories and ensuring global security now and in the future. It combines military and police efforts with politics, diplomacy, economics, psychology, and ethics. The challenge he presents to civilian and military leaders is to take probable enemy perspectives into consideration, and turn resultant conceptions into strategic victories.
Download or read book Asymmetric Conflicts written by T. V. Paul and published by Cambridge University Press. This book was released on 1994-03-10 with total page 268 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book examines a question generally neglected in the study of international relations: why does a militarily and economically less powerful state initiate conflict against a relatively strong state? T. V. Paul analyses this phenomenon by focusing on the strategic and political considerations, domestic and international, which influence a weaker state to initiate war against a more powerful adversary. The key argument of deterrence theory is that the military superiority of the status quo power, coupled with a credible retaliatory threat, will prevent attack by challengers. The author challenges this assumption by examining six twentieth-century asymmetric wars, from the Japanese offensive against Russia in 1904 to the Argentine invasion of the Falkland Islands in 1982. The book's findings have wide implications for the study of war, power, deterrence, coercive diplomacy, strategy, arms races, and alliances.
Download or read book Asymmetry and U S Military Strategy written by Steven Metz and published by . This book was released on 2014-07-22 with total page 32 pages. Available in PDF, EPUB and Kindle. Book excerpt: In war, there are always differences between the opponents. At times these are insignificant, passing disparities with no bearing on the outcome. At other times, the differences between opponents are important, placing one in a position of advantage, the other at a disadvantage. This is a very simple observation, but from it flows one of the pressing issues faced by the United States today: strategic asymmetry. Strategic asymmetry is the use of some sort of difference to gain an advantage over an adversary. It is an idea as old as warfare itself, appearing under a number of guises. Among strategic theorists, Sun Tzu placed great stock in psychological and informational asymmetry, writing that: All warfare is based on deception. When confronted with an enemy one should offer the enemy a bait to lure him; feign disorder and strike him. When he concentrates, prepare against him; where he is strong. avoid him.
Download or read book New Battlefields Old Laws written by William C. Banks and published by Columbia University Press. This book was released on 2011-10-25 with total page 320 pages. Available in PDF, EPUB and Kindle. Book excerpt: An internationally-recognized authority on constitutional law, national security law, and counterterrorism, William C. Banks believes changing patterns of global conflict are forcing a reexamination of the traditional laws of war. The Hague Rules, the customary laws of war, and the post-1949 law of armed conflict no longer account for nonstate groups waging prolonged campaigns of terrorism—or even more conventional insurgent attacks. Recognizing that many of today's conflicts are low-intensity, asymmetrical wars fought between disparate military forces, Banks's collection analyzes nonstate armed groups and irregular forces (such as terrorist and insurgent groups, paramilitaries, child soldiers, civilians participating in hostilities, and private military firms) and their challenge to international humanitarian law. Both he and his contributors believe gaps in the laws of war leave modern battlefields largely unregulated, and they fear state parties suffer without guidelines for responding to terrorists and their asymmetrical tactics, such as the targeting of civilians. These gaps also embolden weaker, nonstate combatants to exploit forbidden strategies and violate the laws of war. Attuned to the contested nature of post-9/11 security and policy, this collection juxtaposes diverse perspectives on existing laws and their application in contemporary conflict. It sets forth a legal definition of new wars, describes the status of new actors, charts the evolution of the twenty-first-century battlefield, and balances humanitarian priorities with military necessity. While the contributors contest each other, they ultimately reestablish the legitimacy of a long-standing legal corpus, and they rehumanize an environment in which the most vulnerable targets, civilian populations, are themselves becoming weapons against conventional power.
Download or read book Strategic Theory for the 21st Century The Little Book on Big Strategy written by Harry R. Yarger and published by DIANE Publishing. This book was released on 2006 with total page 93 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book The Cambridge Handbook of the Just War written by Larry May and published by Cambridge University Press. This book was released on 2018-02-15 with total page 369 pages. Available in PDF, EPUB and Kindle. Book excerpt: A comprehensive exploration of contemporary debates in Just War Theory, addressing moral, political, and legal issues.
Download or read book Surrogate Warfare written by Andreas Krieg and published by Georgetown University Press. This book was released on 2019-06-01 with total page 257 pages. Available in PDF, EPUB and Kindle. Book excerpt: Surrogate Warfare explores the emerging phenomenon of “surrogate warfare” in twenty-first century conflict. The popular notion of war is that it is fought en masse by the people of one side versus the other. But the reality today is that both state and non-state actors are increasingly looking to shift the burdens of war to surrogates. Surrogate warfare describes a patron's outsourcing of the strategic, operational, or tactical burdens of warfare, in whole or in part, to human and/or technological substitutes in order to minimize the costs of war. This phenomenon ranges from arming rebel groups, to the use of armed drones, to cyber propaganda. Krieg and Rickli bring old, related practices such as war by mercenary or proxy under this new overarching concept. Apart from analyzing the underlying sociopolitical drivers that trigger patrons to substitute or supplement military action, this book looks at the intrinsic trade-offs between substitutions and control that shapes the relationship between patron and surrogate. Surrogate Warfare will be essential reading for anyone studying contemporary conflict.
Download or read book Terrorism Asymmetric Warfare and Weapons of Mass Destruction written by Anthony H. Cordesman and published by Bloomsbury Publishing USA. This book was released on 2001-11-30 with total page 462 pages. Available in PDF, EPUB and Kindle. Book excerpt: There is a wide spectrum of potential threats to the U.S. homeland that do not involve overt attacks by states using long-range missiles or conventional military forces. Such threats include covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals, and independent terrorist and extremist attacks by residents of the United States. These threats are currently limited in scope and frequency, but are emerging as potentially significant issues for future U.S. security. In this comprehensive work, Cordesman argues that new threats require new thinking, and offers a range of recommendations, from expanding the understanding of what constitutes a threat and bolstering Homeland defense measures, to bettering resource allocation and improving intelligence gathering and analysis. No pattern of actual attacks on U.S. territory has yet emerged that provides a clear basis for predicting how serious any given form of attack might be in the future, what means of attack might be used, or how lethal new forms of attack might be. As a result, there is a major ongoing debate over the seriousness of the threat and how the U.S. government should react. This work is an invaluable contribution to that debate.
Download or read book Nuclear Strategy in the Modern Era written by Vipin Narang and published by Princeton University Press. This book was released on 2014-05-25 with total page 356 pages. Available in PDF, EPUB and Kindle. Book excerpt: The world is in a second nuclear age in which regional powers play an increasingly prominent role. These states have small nuclear arsenals, often face multiple active conflicts, and sometimes have weak institutions. How do these nuclear states—and potential future ones—manage their nuclear forces and influence international conflict? Examining the reasoning and deterrence consequences of regional power nuclear strategies, this book demonstrates that these strategies matter greatly to international stability and it provides new insights into conflict dynamics across important areas of the world such as the Middle East, East Asia, and South Asia. Vipin Narang identifies the diversity of regional power nuclear strategies and describes in detail the posture each regional power has adopted over time. Developing a theory for the sources of regional power nuclear strategies, he offers the first systematic explanation of why states choose the postures they do and under what conditions they might shift strategies. Narang then analyzes the effects of these choices on a state's ability to deter conflict. Using both quantitative and qualitative analysis, he shows that, contrary to a bedrock article of faith in the canon of nuclear deterrence, the acquisition of nuclear weapons does not produce a uniform deterrent effect against opponents. Rather, some postures deter conflict more successfully than others. Nuclear Strategy in the Modern Era considers the range of nuclear choices made by regional powers and the critical challenges they pose to modern international security.
Download or read book Asymmetric Warfare in South Asia written by Peter R. Lavoy and published by Cambridge University Press. This book was released on 2009-11-12 with total page 427 pages. Available in PDF, EPUB and Kindle. Book excerpt: A unique account of military conflict under the shadow of nuclear escalation, with access to the soldiers and politicians involved.
Download or read book Strategies of Containment written by John Lewis Gaddis and published by Oxford University Press. This book was released on 2005-06-23 with total page 503 pages. Available in PDF, EPUB and Kindle. Book excerpt: When Strategies of Containment was first published, the Soviet Union was still a superpower, Ronald Reagan was president of the United States, and the Berlin Wall was still standing. This updated edition of Gaddis' classic carries the history of containment through the end of the Cold War. Beginning with Franklin D. Roosevelt's postwar plans, Gaddis provides a thorough critical analysis of George F. Kennan's original strategy of containment, NSC-68, The Eisenhower-Dulles "New Look," the Kennedy-Johnson "flexible response" strategy, the Nixon-Kissinger strategy of detente, and now a comprehensive assessment of how Reagan - and Gorbechev - completed the process of containment, thereby bringing the Cold War to an end. He concludes, provocatively, that Reagan more effectively than any other Cold War president drew upon the strengths of both approaches while avoiding their weaknesses. A must-read for anyone interested in Cold War history, grand strategy, and the origins of the post-Cold War world.
Download or read book Asymmetric Returns written by Alexander M. Ineichen and published by John Wiley & Sons. This book was released on 2011-07-12 with total page 383 pages. Available in PDF, EPUB and Kindle. Book excerpt: In Asymmetric Returns, financial expert Alexander Ineichen elevates the critical discussion about alpha versus beta and absolute returns versus relative returns. He argues that controlling downside volatility is a key element in asset management if sustainable positive compounding of capital and financial survival are major objectives. Achieving sustainable positive absolute returns are the result of taking and managing risk wisely, that is, an active risk management process where risk is defined in absolute terms and changes in the market place are accounted for. The result of an active risk management process-when successful-is an asymmetric return profile, that is, more and higher returns on the upside and fewer and lower returns on the downside. Ineichen claims that achieving Asymmetric Returns is the future of active asset management. Alexander M. Ineichen, CFA, CAIA, is Managing Director and Senior Investment Officer for the Alternative Investment Solutions team, a key provider within Alternative and Quantitative Investments, itself a business within UBS Global Asset Management. He is also on the Board of Directors of the Chartered Alternative Investment Analyst Association (CAIAA). Ineichen is the author of the two UBS research publications In Search of Alpha—Investing in Hedge Funds (October 2000) and The Search for Alpha Continues—Do Fund of Hedge Funds Add Value? (September 2001). As of 2006 these two reports were the most often printed research papers in the documented history of UBS. He is also author of the widely popular Absolute Returns—The Risk and Opportunities of Hedge Fund Investing, also published by John Wiley & Sons.