Asymmetric Warfare


Book Description

In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.




How the Weak Win Wars


Book Description

How do the weak win wars? The likelihood of victory and defeat in asymmetric conflicts depends on the interaction of the strategies weak and strong actors use. Using statistical and in-depth historical analyses of conflicts spanning two hundred years, in this 2005 book Ivan Arregúin-Toft shows that, independent of regime type and weapons technology, the interaction of similar strategic approaches favors strong actors, while opposite strategic approaches favors the weak. This approach to understanding asymmetric conflicts allows us to makes sense of how the United States was able to win its war in Afghanistan (2002) in a few months, while the Soviet Union lost after a decade of brutal war (1979–89). Arreguín-Toft's strategic interaction theory has implications not only for international relations theory, but for policy makers grappling with interstate and civil wars, as well as terrorism.




What are Asymmetric Strategies?


Book Description

Examines the asymmetric strategies that future adversaries might employ and identify potential U.S. vulnerabilities and methods to address them.




The Complexity of Modern Asymmetric Warfare


Book Description

Today more than one hundred small, asymmetric, and revolutionary wars are being waged around the world. This book provides invaluable tools for fighting such wars by taking enemy perspectives into consideration. The third volume of a trilogy by Max G. Manwaring, it continues the arguments the author presented in Insurgency, Terrorism, and Crime and Gangs, Pseudo-Militaries, and Other Modern Mercenaries. Using case studies, Manwaring outlines vital survival lessons for leaders and organizations concerned with national security in our contemporary world. The insurgencies Manwaring describes span the globe. Beginning with conflicts in Algeria in the 1950s and 1960s and El Salvador in the 1980s, he goes on to cover the Shining Path and its resurgence in Peru, Al Qaeda in Spain, popular militias in Cuba, Haiti, and Brazil, the Russian youth group Nashi, and drugs and politics in Guatemala, as well as cyber warfare. Large, wealthy, well-armed nations such as the United States have learned from experience that these small wars and insurgencies do not resemble traditional wars fought between geographically distinct nation-state adversaries by easily identified military forces. Twenty-first-century irregular conflicts blur traditional distinctions among crime, terrorism, subversion, insurgency, militia, mercenary and gang activity, and warfare. Manwaring’s multidimensional paradigm offers military and civilian leaders a much needed blueprint for achieving strategic victories and ensuring global security now and in the future. It combines military and police efforts with politics, diplomacy, economics, psychology, and ethics. The challenge he presents to civilian and military leaders is to take probable enemy perspectives into consideration, and turn resultant conceptions into strategic victories.




Asymmetrical Warfare


Book Description

Possible asymmetrical warfare scenarios include launching chemical, biological, or suicide attacks; taking indiscriminate actions against critical infrastructure; using hostages or human shields; deliberately destroying the environment; and targeting noncombatants.".




Rethinking Asymmetric Threats


Book Description

Assessment of the threat environment is a critical element in the formulation of any state's strategy and defense doctrine. It also should be an inherently critical process that seeks to free policymakers from incorrect, antiquated, or misconceived perceptions about the threat. Consequently, the nature of the threat(s) the United States or any other government faces is the subject of a never-ending debate. For several years U.S. policymakers, officials, and writers on defense have employed the terms "asymmetric" or "asymmetry" to characterize everything from the nature of the threats we face to the nature of war and beyond. This monograph challenges the utility of using those terms to characterize the threats we face, one element of the broader debate over the nature of war, U.S. strategy, and the threats confronting us. As a work of critique, it aims to make an important contribution to the threat debate.




Asymmetry and U.S. Military Strategy


Book Description

In war, there are always differences between the opponents. At times these are insignificant, passing disparities with no bearing on the outcome. At other times, the differences between opponents are important, placing one in a position of advantage, the other at a disadvantage. This is a very simple observation, but from it flows one of the pressing issues faced by the United States today: strategic asymmetry. Strategic asymmetry is the use of some sort of difference to gain an advantage over an adversary. It is an idea as old as warfare itself, appearing under a number of guises. Among strategic theorists, Sun Tzu placed great stock in psychological and informational asymmetry, writing that: All warfare is based on deception. When confronted with an enemy one should offer the enemy a bait to lure him; feign disorder and strike him. When he concentrates, prepare against him; where he is strong. avoid him.




Surrogate Warfare


Book Description

Surrogate Warfare explores the emerging phenomenon of “surrogate warfare” in twenty-first century conflict. The popular notion of war is that it is fought en masse by the people of one side versus the other. But the reality today is that both state and non-state actors are increasingly looking to shift the burdens of war to surrogates. Surrogate warfare describes a patron's outsourcing of the strategic, operational, or tactical burdens of warfare, in whole or in part, to human and/or technological substitutes in order to minimize the costs of war. This phenomenon ranges from arming rebel groups, to the use of armed drones, to cyber propaganda. Krieg and Rickli bring old, related practices such as war by mercenary or proxy under this new overarching concept. Apart from analyzing the underlying sociopolitical drivers that trigger patrons to substitute or supplement military action, this book looks at the intrinsic trade-offs between substitutions and control that shapes the relationship between patron and surrogate. Surrogate Warfare will be essential reading for anyone studying contemporary conflict.




The Cambridge Handbook of the Just War


Book Description

A comprehensive exploration of contemporary debates in Just War Theory, addressing moral, political, and legal issues.