Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Asymmetric warfare contrasting conventional and irregular warfare
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Asymmetrical warfare has become a commonality throughout 20th and 21st century warfare; often, smaller groups use erratic, scattered, and non-linear methods to fight larger and much better equipped adversaries as a way to level out the playing field. Within these often non-linear, yet partially collective entities; to remain successful, it is necessary for each group align itself with a wide array of global funding and supply mechanisms. The three sources utilized: R.J. Godlewski’s journal article, “Financial Counterintelligence: Fractioning the Lifeblood of Asymmetrical Warfare”, the National Anti-Money Laundering report of Tanzania, and the African Poaching Crisis & America’s Responsibility and will present the idea that modern insurgent-based …show more content…
Much like attempting to define the concept of intelligence; attempts to create a readily available asymmetric warfare doctrine as utilized in conventional warfare, would turn into a never ending process. R.J. Godlewski does however define asymmetrical warfare in its simplest form “as a concept that leverages weaknesses against an often-superior enemy within conflict without rules, and fights combat without structure …show more content…
As the old saying goes, “Don’t keep all of your eggs in one basket,” this holds true for asymmetrical warfare practitioners. This concept alone accounts for the main cause, and perpetual struggle as to why disrupting terrorist and TCO financial networks are so difficult. North African and Middle Eastern terror networks often use trusted key persons that perform secretive financial transactions are referred to as a Hawala (4). What is also surprising, is the sheer amount of funds these groups receive via donations, and through allies. Al Qaida and Hamas have both received tens of millions of dollars from the bin Mahfouz and al- Rajhi families and Saudi Arabian/Iranian governments through charitable institutions, and other means (5). Again, if financial counterintelligence networks can isolate, and or freeze identifiable assets; the insurgent’s capacity to operate efficiently becomes greatly
Insurgency is defined as a rebellion against an indigenous government or a foreign occupier. In an asymmetric war there are two sides a strong and a weak side which have two strategies each. The French, who were the “stronger” side used “direct attack” which aimed at destroying the weak actor’s (Algeria) armed forces and thereby their capacity to offer violent resistance. During the seco...
...in technology and tactics have made Special Forces units more reliable. For example, the raid on Osama bin Laden’s compound in Abbottabad, Pakistan and the incident with the Somali pirates of the coast of Somalia show the capabilities of today’s Special Forces. The author asserts that, in the future the United States will shift away from major combat operations. These large engagements have proven to be costly in lives and treasure. For that reason, she infers that the US Military will choose the “go small, go long” model for future engagements in the Middle East. Special operation forces are uniquely suited for this model. Their conspicuous nature and low cost make them politically and strategically ideal. The author also suggests that future large scale operations may look like the conflicts in Libya and Somalia rather than the wars in Iraq and Afghanistan.
Thinking historically while conducting counterinsurgency in the 21st century poses questions regarding how to develop political and strategic plans. This bibliographic essay will examine the political and military aspect of fighting counterinsurgent warfare by 20th century theorists Galula’s, “Counterinsurgency Warfare Theory and Practice” and Trinquier’s, “Counterinsurgency Warfare Theory and Practice”. Strategy in fighting guerilla wars will be discussed by comparing conflicts in battles and ideologies from the past to current day. Moreover, ways to avoid the one size fits all war mentality when combating modern day insurgents will be recommended.
Tzu, Mo. Against Offensive Warfare. Ed. Michael Austin. Reading the World: Ideas that Matter. 2nd ed. New York: Norton, 2010. 254-255. Print.
In the presidency of Thomas Jefferson, continuing through Madison’s term, the United States initiated a policy to retaliate against the seizure of ships by the British and French. These three dominant nations entered a period between 1806-1810, known as Commercial Warfare. The Commercial War was a response by Americans to maintain their right of neutral commerce. The Acts by the United States, the Decrees by the powerful Napoleon I, and the Parliamentary orders, throughout the period of Commercial Warfare directly led to the start of the War of 1812, and helped build the commercial future of the United States.
The. All the Shah's Men: An American Coup and the Roots of Middle East Terror.
In this section, I will provide a brief history of U.S. military involvement on the African continent, starting with the Barbary Wars and working up through the current date. This historical documentation will highlight the change in the role the United States has played in Africa [post 9-11???]. Prior to 9-11, the United States’ interactions were mainly [capture summary here]. Since [?], however, the continent has faced a marked increase in violent extremism and terrorism leading the United States to partner with many African nations in counterterrorism initiatives. These, and other initiatives, mean an increasing number U.S. service members are deploying to Africa to take part in training, humanitarian issues and military operations. These military activities are run by United States African Command, a recently created combatant command.
The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause. Instantaneous and unpredictable, the technological advantages these terrorists have obtained from using the Internet includes
The Strengths and Weaknesses of Joint Warfare Armed with numerous studies, and intensive public hearings, Congress mandated far-reaching changes in DOD organization and responsibilities under the Goldwater-Nichols Department of Defense Reorganization Act of 1986. This landmark legislation significantly expanded the authority and responsibility of the chairman, Joint Chiefs of Staff. Included in this expanded authority and responsibility was the requirement for the chairman to develop a doctrine for the joint employment of armed forces. As operations Urgent Fury, Just Cause, and Desert Storm have vividly demonstrated, the realities of armed conflict in today's world make the integration of individual service capabilities a matter of success or failure, life or death. Furthermore, the operation Desert One demonstrated the need for a strengthened Joint Warfare Doctrine and the consequent change in Joint Warfare Employment.
a comprehensive research service. Retrieved May 2, 2004, from Terrorist Attack by Al Qaeda: http://www.fas.org/irp/crs/033104.pdf. Gunaratna, R. (2005, September). Retrieved September 2005, from http://strategicstudiesinstitute.army.mil/pubs/parameters/articles/05spring/henzel.pdf. Gunaratna, R. (n.d.).
Griffith, William E. “The Revial of Islamic Fundamentalism: the Case of Iran.” International Security. Volume 4, Issue 1, 1979, 132-138.
He suggests that this flaws from the past centuries are relevant and reflect into the modern use of counterinsurgency. This is taking a toll on the nations in which the US practices and in the US military. According to Porch these practices of modern counterinsurgency are generally racialized and evoke Asian or North African cultures, they set unreal expectations that military presence can make a difference on societies, they are often violent against civilians, we are often substituting strategy and politics for tactics, and civil-military relations are severed by the militarizing of policy and
	The pounding of shells, the mines, the death traps, the massive, blind destruction, the acrid stench of rotting flesh, the communal graves, the charred bodies, and the fear. These are the images of war. War has changed over the centuries from battles of legions of ironclad soldiers enveloped in glimmering armor fighting for what they believe to senseless acts of guerrilla warfare against those too coward to be draft-dodgers. Those who were there, who experienced the terror first hand were deeply effected and changed forever. In their retinas, images of blood and gore are burned for the rest of their life.
As a form of warfare insurgency can be harnessed to diverse political agendas, motivations, and grievances. The concept is most associated with communist but closely