共查询到20条相似文献,搜索用时 0 毫秒
1.
Andrea Beccaro 《Small Wars & Insurgencies》2018,29(2):207-228
ISIS (the Islamic State of Iraq and Syria) has become a key political and military actor in the Middle East and in North Africa. This essay aims at outlining ISIS warfare through an analysis of its operations in the frame of hybrid warfare theory proposed by Frank Hoffman. Therefore, the paper deals with: the role of terrorist tactics in ISIS warfare and the relationship between terrorism and insurgency; ISIS use of technology, mainly with regard to suicide attacks and to drones; and the relevance of urban warfare. Finally, the paper highlights how ISIS operates and the most threatening features of its warfare. 相似文献
2.
Sibylle Scheipers 《Small Wars & Insurgencies》2014,25(5-6):879-899
This article argues that the history of irregular warfare provides a valuable analytical and critical perspective for the study of counterinsurgency campaigns and counterinsurgency doctrine. A focus on the history of irregular warfare highlights the close relationship between warfare in Europe and in the colonies. Moreover, it enables us to identify more exactly the intersection of multiple factors that lead to an escalation of violence in small wars. Finally, it also sheds light on the lack of strategic reflection on the use of irregular auxiliaries that is characteristic for many counterinsurgency campaigns. 相似文献
3.
This paper examines whether non-lethal weapons (NLWs) enhance the capability of the US armed forces to conduct irregular warfare (IW) operations. With expectations that the operational environment will only continue to become more complex in the future, NLWs may reduce the level of violence received, as well as dispensed, by US forces while performing tasks in the IW spectrum. We argue that NLWs increase the ability of US forces to address the long tail of warfare and their deployment should be increased in the near term. 相似文献
4.
Maria Ryan 《Small Wars & Insurgencies》2014,25(1):41-68
This article examines the evolution of US irregular warfare (IW) doctrine and practice from 2001 onwards. It argues that, after 9/11, top-tier civilian policymakers in the US Department of Defense (DoD) and across the US government developed a heightened awareness of asymmetric threats and non-conventional forms of warfare, especially those shaped by contemporary globalisation. The result was a gradual turn towards irregular warfare, led by Rumsfeld and the DoD, designed to ensure ‘full spectrum dominance’ across all modes of conflict. This pre-dated the insurgency in Iraq and the promotion of counterinsurgency in the US Army by General David Petraeus and others. Policymakers' reluctance to acknowledge the insurgency in Iraq was not down to a failure to understand the concept of IW, but because they had viewed Iraq in conventional terms for so many years and were reluctant to admit their mistake. 相似文献
5.
James Hasik 《Defense & Security Analysis》2013,29(3):203-217
Since the publication in 2002 of John Nagl's Learning to Eat Soup with a Knife, organizational learning has been widely presumed an important ingredient for success in counterinsurgency. But sampling the literature from before and after this time shows remarkably little analytical treatment of the issue of learning and even confusion over what it may mean. This article considers the theories, hypotheses, research strategies, threats to validity, methods of measurement, treatments of time, and general lack of statistical analysis in the work to date and recommends a course for future research. 相似文献
6.
7.
Riley M. Moore 《Small Wars & Insurgencies》2013,24(5):857-878
As a consequence of intervention in Iraq and Afghanistan, force ratio for counterinsurgency (COIN) has come under increased scrutiny. Reduced to its essence, the issue is simply, ‘How many troops does it take to get the job done?’ This answer has been sought by the US military, academia, and think tanks. There have been numerous responses, culminating in several ‘plug-and-play’ equations for minimum force ratios in COIN operations. Due to the impossibility of determining precisely how many insurgent forces there are, it has become common to base force ratios on the population of the country. In the realm of policy, the question above is posed as, ‘How many of our troops does it take to get the job done?’ 相似文献
8.
Douglas Mastriano 《Defense & Security Analysis》2017,33(1):68-76
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. 相似文献
9.
Andrea Beccaro 《Small Wars & Insurgencies》2016,27(1):154-178
Since the end of the Cold War, a huge debate over how war has been changing has emerged; a common feature is that modern conflicts are not state vs. state wars, but ‘irregular wars’. In order to better understand modern irregular warfare, it is important to analyse past authors and ideas. Carlo Bianco’s concept of Guerra per bande highlights elements of mobility with different cooperating units, of terror, and of complex terrain. The present study offers the first English analysis of Carlo Bianco and underlines the similarities of his work to the hybrid warfare concept. 相似文献
10.
Sarah Bidgood 《The Nonproliferation Review》2013,20(3-4):329-340
ABSTRACTDespite living in a nuclear-weapon state, young Americans are generally ill-informed about weapons of mass destruction (WMD) and their means of control. The result is both widespread apathy toward nonproliferation and disarmament decision making among the general public and a looming personnel crisis within government sectors that enact policy in these domains. Considering that 67 percent of high school graduates in the United States go on to pursue a bachelor’s degree, exposing more undergraduates to nonproliferation and disarmament issues could contribute to addressing both of these challenges. The present study analyzes how these issues are already being taught at select US colleges and universities and explores ways to introduce them to more students that align with current priorities in higher education, such as interdisciplinary learning, digital humanities, and data-science learning. It also proposes concrete steps that the WMD policy community can take to help institutions of higher education integrate these topics more broadly into their curricula. The anticipated result is greater support for education in this important issue area across different stakeholders in academia, as well as increased engagement with these critical issues among a more diverse population of young people. 相似文献
11.
Paolo Tripodi 《Small Wars & Insurgencies》2013,24(2):221-236
This study develops the concepts of fourth generation operations and the associated principles. First, the concept of fourth generation operations is introduced and defined. Fourth generation operations are the evolution and extension of third and fourth generation warfare based on a change of tactics, technology, and combatants. These operations are currently ongoing in Afghanistan and Iraq, and with the global war on terrorism. Based on the framework of US joint doctrine, the supporting principles of fourth generation operations are developed. This requires the introduction of the principle of Population Perception. 相似文献
12.
Hans-Georg Ehrhart 《Defense & Security Analysis》2017,33(3):263-275
Each age has its own wars and its own forms of warfare. In today’s evolving world risk society warfare has entered a new development stage. The states of the “global North” adapt their forms of intervention. They increasingly practice postmodern warfare characterized especially by the role of influencing the information space, networked approaches, the incorporation of indirect and covert actions, and the special quality of new technologies. This practice furthers an increasing grey zone between limiting and de-bounding of warfare. The phenomenon of postmodern warfare raises some tough questions and offers a rich research agenda. 相似文献
13.
Benjamin Armstrong 《Small Wars & Insurgencies》2013,24(1):171-193
Maritime interests in the twenty-first century are not immune to the growing number of irregular challenges and hybrid threats that have come to dominate land warfare. In order to better understand these challenges a study of naval history can help provide a vital foundation. In the early 1830s the United States Navy dispatched the frigate USS Potomac to Sumatra to investigate a pirate attack on the spice trader Friendship. Potomac's crew of sailors and Marines conducted a landing at the village Quallah Batoo and fought a pitched battle. As the navies of the world approach naval irregular warfare in the new century, studying past examples like Potomac's mission can help illuminate the principles of successful naval irregular warfare. 相似文献
14.
15.
Narushige Michishita 《战略研究杂志》2013,36(6):1015-1040
Since 1993 North Korea's response to US ‘hegemony’ has been a seemingly paradoxical attempt to bandwagon with the United States by means of military coercion. However, after more than a decade of effort, North Korea has failed to normalize its relations with the United States. In the years ahead, it can either pursue more proactively the strategy of bandwagoning with the United States, shift its strategic focus to China, or embark upon a policy of equidistance between the United States and Japan on the one hand and China on the other. 相似文献
16.
Matthew M. Aid 《战略研究杂志》2013,36(4):575-605
This paper demonstrates that US–Scandinavian intelligence relations in general, and Signals Intelligence (Sigint) relations in particular, during the period 1945 through 1960 were more extensive and complicated than had previously been believed. Bilateral US intelligence liaison relations with nominally neutral Sweden were of particular importance in the early years of the Cold War given its geographic location adjacent to the northwestern portion of the USSR. Moreover, the importance of Sigint received from the three principal Scandinavian countries covered by this paper (Norway, Denmark, and Sweden) proved to be quite important to the US intelligence community during the early years of the Cold War, when the US Sigint infrastructure was relatively weak and stretched thin by commitments in Asia and elsewhere. This paper covers the quantity, quality, and types of intelligence information provided to the US by each of the Scandinavian nations, demonstrating that the nature of US intelligence relations with these countries changed substantially as time went by. 相似文献
17.
网络空间越来越被世界各国公认为是继陆地、海洋、空中和太空之后的第五个作战域,为获得和保持像其它作战域那样世界领先的军事优势,美国正在大力进行网络空间作战能力建设。提出了美国网络空间作战能力建设框架,从战略规划、作战力量、作战理论、作战训练、武器装备、战场基础环境、人才培养和作战联盟八个方面全面总结了美国近年来在网络空间作战能力建设方面的主要做法。 相似文献
18.
Christine Sixta Rinehart 《Defense & Security Analysis》2017,33(1):45-56
The United States’ Air Force (USAF) has developed and used unmanned aerial vehicle (UAV) technology to monitor and assassinate dangerous terrorists in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen. Currently, there are few countries that possess armed UAV and since the US created much of this technology, the USAF is usually part of the training that automatically accompanies the purchase of its UAVs. The research question this article attempts to answer is, “What is the extent of the United States’ Air Force assistance in the training and proliferation of UAV technology to foreign militaries?” 相似文献
19.
Jonathan B. Tucker 《The Nonproliferation Review》2013,20(3):363-384
In 2003, Libyan leader Muammar Qaddafi agreed to eliminate his country's weapons of mass destruction (WMD) programs and long-range Scud missiles under strict verification by U.S. and British experts and international inspectors. This article examines the negotiation and implementation of Libya's WMD rollback, with a primary focus on its chemical weapons program, and draws some lessons for the future. Although the Libyan case was unique in many ways, some aspects have relevance for other countries, including the critical role played by multilateral nonproliferation organizations, the utility of economic sanctions and export controls, the importance of a flexible U.S. disarmament funding mechanism, the value of rotating technical assistance teams in and out of the country that is disarming, and the desirability of remaining politically engaged with a former proliferator after rollback is complete. 相似文献
20.
Peter M. Sales 《Small Wars & Insurgencies》2013,24(1):93-97
Recent counterinsurgency experiences in Iraq and Afghanistan have demonstrated that the local operating environment often is dominated by indigenous power-holders. As counterinsurgents seek to establish control over the local population, collaboration with these agents has become an essential aspect of contemporary counterinsurgency. Although the practice of constructing collaborative relationships with indigenous power-holders might be perceived as unconventional by today's counterinsurgents, the approach itself goes back to the colonial era in which modern counterinsurgency has its roots. This article explores the dynamics, benefits, and dangers of collaborative relationships with indigenous power-holders by analysing an infamous episode in Dutch colonial history, the case of the collaboration between Dutch colonial authorities and warlord Teuku Uma during the Aceh War (1873–1913). This relationship ended in disaster for the Dutch as Uma departed their side at the moment he had become their pivotal asset in the local political landscape. The article explains that the Dutch succeeded to co-opt Uma, but failed to control him as they lacked the will and means to do so. Furthermore this case study provides an insight in the way the Dutch colonial authorities dealt with the complex process of intelligence-gathering in a fragmented indigenous society. 相似文献