Army Asymmetric Warfare Office


Book Description




Army Asymmetric Warfare Office


Book Description







Army Asymmetric Warfare Office


Book Description




A Shot in the Dark: A History of the U.S. Army Asymmetric Warfare Group


Book Description

This book presents the U.S. Army Asymmetric Warfare Group (AWG) as an example of successful change by the Army in wartime. It argues that creating the AWG required senior leaders to create a vision differing from the Army’s self-conceptualization, change bureaucratic processes to turn the vision into an actual unit, and then place the new unit in the hands of uniquely qualified leaders to build and sustain it. In doing this, it considers the forces influencing change within the Army and argues the two most significant are its self-conceptualization and institutional bureaucracy. The work explores three major subject areas that provide historical context. The first is the Army’s institutional history from the early 1950s through 2001. This period begins with the Army seeking to validate its place in America’s national security strategy and ends with the Army trying to chart a path into the post-Cold War future. The Army’s history is largely one of asymmetric warfare. The work thus examines several campaigns that offered lessons for subsequent wars. Some lessons the Army took to heart, others it ignored. As the AWG was a direct outgrowth of the failures and frustrations the Army experienced in Afghanistan and Iraq, the book examines these campaigns and identifies the specific problems that led senior Army leaders to create the AWG. Finally, the work chronicles the AWG’s creation in 2006, growth, and re-assignment from the Army staff to a fully-fledged organization subordinate to the U.S. Army Training and Doctrine Command in 2011 to its deactivation. This action resulted not from the unit’s failure to adapt to a post-insurgency Army focusing on modernization. Rather, it resulted from the Army failing to realize that while the AWG was a product of counterinsurgency, it provided the capability to support the Army during a period of great strategic and institutional uncertainty.




Challenging the United States Symmetrically and Asymmetrically


Book Description

The concept of asymmetrical warfare is a popular and much discussed issue in U.S. defense literature these days. Joint Vision 2010 (JV 2010),2 the Quadrennial Defense Review (QDR),3 and the National Military Strategy (NMS)4 are just a few of the documents that express concern about it. Understandably, the Secretary of Defense has made addressing the phenomenon a central theme of his administration. All of that said, what exactly is meant by asymmetrical warfare? In broad terms it simply means warfare that seeks to avoid an opponent's strengths; it is an approach that tries to focus whatever may be one side's comparative advantages against its enemy's relative weaknesses.5 In a way, seeking asymmetries is fundamental to all warfighting. But in the modern context, asymmetrical warfare emphasizes what are popularly perceived as unconventional or nontraditional methodologies. For most potential adversaries, attacking the United States asymmetrically is the only warfighting strategy they might reasonably consider for the foreseeable future. The Gulf War was an object lesson to military planners around the globe of the futility of attempting to confront the United States symmetrically, that is, with like forces and orthodox tactics. In this essay I briefly examine how the West's cultural disposition and mindset affect its concept of asymmetrical warfare. I contend that the West's current focus may leave it vulnerable to asymmetrical challenges that arise from opponents whose cultural perspective differs significantly from that of the West.




How The North Vietnamese Won The War: Operational Art Bends But Does Not Break In Response To Asymmetry


Book Description

This monograph analyzes the effectiveness of operational campaign design against an asymmetrical threat during the 1968 Tet Offensive. The focus is on conceptual elements of campaign design that are derived from theory, which incorporate the particulars of military history to the general truth of warfare. Effective campaign execution is dependent, in part, on effective campaign design that set of theoretical and doctrinal precepts that define the concerns of the operational planner. The monograph identifies lessons learned from this period that are applicable to current U.S. Joint and Army doctrine as well as lessons for planners and executors of U.S. military action under the American system of civilian control of the military. First, the monograph demonstrated the complex nature of asymmetric warfare. Finding and creating vulnerabilities and attacking those vulnerabilities with inherent strengths is the key to asymmetric warfare. Secondly, the monograph discussed the elements of campaign design that are derived from theory, which incorporate the particulars of military history to the general truth of warfare. Some of the more common conceptual actions are to understand the type and scope of conflict, define the enemy and friendly center of gravity, identify possible culminating points, select lines of operation, determine decisive points, and understanding the dangers of paralysis commonly known as cyber shock. The third section identifies the strategy and identifies particular military objectives identified by the North Vietnamese.




Rethinking Asymmetric Threats


Book Description

For several years U.S. policymakers, officials, and writers on defense have employed the terms "asymmetric" or "asymmetry" to characterize everything from the nature of the threats we face to the nature of war and beyond. The author challenges the utility of using those terms to characterize the threats we face, one element of the broader debate over the nature of war, U.S. strategy, and the threats confronting us. As a work of critique, it aims to make an important contribution to the threat debate. A correct assessment of the nature of the threat environment is essential to any sound defense doctrine for the U.S. Army and the military as a whole. That correct assessment can only be reached through a process of critique and debate.




Asymmetric Warfare


Book Description

In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.




Warfighter Support


Book Description

Prior to the Joint Improvised Explosive Device Defeat Org. (JIEDDO) establishment in 2006, no single entity was responsible for coordinating DoD¿s counter-improvised explosive device (IED) efforts. JIEDDO was established to coordinate and focus all counter-IED efforts, including ongoing R&D, throughout DoD. This report assesses the extent to which: 1) capability gaps were initially identified in DoD's effort to defeat IEDs and how these gaps and other factors led to the development of JIEDDO; 2) JIEDDO has maintained visibility over all counter-IED efforts; 3) JIEDDO has coordinated the transition of JIEDDO-funded initiatives to the military services; and 4) JIEDDO has developed criteria for the counter-IED training initiatives it will fund. Illus.