ASYMMETRIC THREATS, TERRORISM AND THE CHANGING FACE OF WARFARE By Professor Richard Shultz Director, International Security Studies Program The Fletcher.

Slides:



Advertisements
Similar presentations
Gingrich- 21 st Century Contract Opportunity Government will not reform themselves 10 Items.
Advertisements

Foreign Policy of George W. Bush. Brief Biography July 6, rd President New Haven, CT Owns several failed businesses Purchases Texas Rangers Controversial.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Copyright © Allyn & Bacon 2010 Global Social Problems: War and Terrorism This multimedia product and its contents are protected under copyright law. The.
Lecture 6: Terrorism and Asymmetric Warfare  Rupal Mehta POL 12.
GISE April, 2014 Tran, Thi Thuy Vuong I35028.
Deterrence and Dissuasion for the 21st Century Ryan Henry Principle Deputy Under Secretary of Defense for Policy IFPA-Fletcher Conference December 14,
The Language of the Military Profession
INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection,
Hungarian Defence and Security Policy Mr. György RÁBAI Counsellor HU MoD, Defence Policy Department.
Threats to World Security Chapter 33 Section 3.
Defining Terrorism The History of Terrorism as a Strategy of Political Insurgency Section 1 SubmitAndPray.com It takes one to know one! SubmitAndPray.com.
TERRORISM And how to tackle it. TERRORISM: THE USUAL CONFUSIONS ‘A new threat…’ - and aimed at the West ‘One man’s terrorist is another man’s freedom.
Strategy Lsn 11.
Chapter Eighteen: Foreign Policy and National Security 1.
Geopolitics of Terrorism
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
Conceptual definition of the European Union as a security actor
Military Ethics in the New Millennium
The Changing Face of War. Introduction “If you want peace, understand war” Basil Lindell Hart You may not be interested in war, but war is interested.
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
Images of Terror. Terrorism and Globalization Globalization I Targets -- autocratic state, colonial state Methods: assassination Globalization II Targets.
Chapter 9 Pursuing Security. Causes of War 1.System-Level Causes: wars may be caused by a number of factors related to the general nature of the world’s.
Counterterrorismvs.Anti-terrorism. ► What are the goals of counterterrorism?
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
A War without Borders. What’s in a name? Challenges to society and people’s responses.
George W. Bush (43). Bush II, but with Divisions Realists vs. Idealists Balance vs.Hegemonists Neocons Of Power.
National Law Enforcement and Corrections Technology Center - West Combating Terrorism: Intelligence Preparation for Operations Matt Begert
Old and New Terrorism- patterns of terrorist activity Definition: "the calculated use of unlawful violence or threat of unlawful violence to inculcate.
3. Post-9/11 US Strategy How much has changed? How much has stayed the same?
Terrorism. Learning Topics Introduction Terrorism/Acts of war History of Terrorism Elements of Terrorism Types Media’s Role Objectives Tactics.
Fourth Generation Warfare The History of Terrorism as a Strategy of Political Insurgency Section 6.
International law and IR theories The invasion of Iraq, 2003.
THEME FOR 12 TH ARF HDUCIM NDU ISLAMABAD - PAKISTAN MILITARY OPERATIONS OTHER THAN WAR (MOOTW)
SeungJu Kim I Realism  State is the pre-eminent actor in the international system.  Self-help: state must build up its military power to ensure.
Strategic Implications of Virtual Warfare: by Captain Terry C. Pierce USN Explaining Virtual Warfare as a Strategic Disruptive Innovation Explaining Virtual.
World Conservation Congress Beyond Zoonoses: One World - One Health, The Threat of Emerging Diseases to Human Security and Conservation, and the Implications.
The Bush Doctrine US Foreign and Domestic Policy Into.
Section Outline 1 of 12 American Foreign Policy Section 3: Foreign Policy in Action I.Foreign Policy Through World War II II.The Cold War III.Today’s Challenges.
in the Contemporary Operational Environment (COE) Learning Activity 2
The Future of Terrorism
OUTLINE OF SECURITY PROPOSAL Malcolm Dando. 1. The Original Design of the EMR Web of Prevention – Intelligence, Export Controls, Arms Control The Biological.
A Military Guide to Terrorism in the Twenty-First Century
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
The 21st Century Security Environment: Weak States, Armed Groups, Irregular Conflicts Professor Richard. H. Shultz, Jr.
Copyright © 2014 Cengage Learning FOREIGN POLICY AND NATIONAL SECURITY Chapter Seventeen.
Foreign Policy: Protecting the American Way Chapter 17.
Chapter 8 War and Strife. Security Issues Global trends, see: –Human security.
Lecture 26: “Mission Accomplished” May 26, Bush: War on Terror (To joint session of Congress, 9/20/01)
THE 1990’S. QUESTIONS TO ANSWER 1. What signaled that Americans were ready for change in 1992? 2.What is NAFTA? 3.What were the two incidents of violence.
September 11 th, Global Terrorism and War on Terrorism.
Bringing Liberalism to the World To what extent has the imposition of liberalism affected people globally?
The International System after 9/11  The American strategic thinking post- 9/11  Re-evaluation of the UN international system  Transatlantic tensions.
Winning the Next War 1 Winning the Next War: Institutionalizing Lessons Learned from Today’s Regional Conflicts The American Institute of Engineers Conference.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Do-First Review Foreign Policy Notes. IE: 4 Major Reasons for US Involvement in affairs of other countries 1)Why does the United States get involved in.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Chapter 16 Terrorism and National Security.
GOVT Module 16 Defense Policy.
Chapter 18 War and Terrorism.
WEEK 4 September 11th, Global Terrorism and War on Terrorism
The Politics of United States Foreign Policy Chapter 6
Threats to World Security Chapter 33 Section 3.
War in the 21st Century Wars in the 20th century
UNIT FOUR| DEFENSE & SECURITY
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
TERRORISM Terrorism—the planned threat or use of violence, often against the civilian population, to achieve political or social ends, to intimidate opponents,
S&T Main Focus Areas Linkages to 2018 NDS
Presentation transcript:

ASYMMETRIC THREATS, TERRORISM AND THE CHANGING FACE OF WARFARE By Professor Richard Shultz Director, International Security Studies Program The Fletcher School of Law and Diplomacy Tufts University

ASSESSING TERRORISM BEFORE 9/11—KEY QUESTIONS –What is terrorism? Is it war or violence or crime? –What are the trends, targets, and types of operations? –Who are the terrorists and what are their objectives? –How do terrorists organizations function? –Do terrorist groups cooperate? Are there linkages among them? –Do states sponsor terrorism? –How important is sanctuary?

TERRORISM IN THE 1990s—KEY CONCLUSIONS –Terrorism was not a category one national security issue and it was not a form of warfare. –Terrorism did not fit the war paradigm but the judicial/legal/ criminal paradigm. –Trend lines—terrorist incidents were down, lethality was up and the U.S. was the target. –Terrorist use of WMD was low probability. –The ideology of terrorist organizations was increasingly religious based. This made terrorist operations more violent and indiscriminant.

(con’t) –Organizationally, terrorist groups were changing from hierarchical and professional to less cohesive and more amorphous (1993 WTC as an example). –The ranks of the professional terrorist were joined by the amateur. –There was no meaningful international terrorist linkages because of splits along national, ethnic, and religious fault lines. –State support was down. Non-state assistance was emerging but the extent of it was unclear.

–Martin van Creveld argued in the early 1990s that war was entering a post-modern phase. He asserted: “As war between states exits through one side of history’s revolving door, low intensity conflict among different organizations will enter through the other…National sovereignties are being undermined by organizations [non-state actors] that refuse to recognize the states monopoly over armed violence.” –Some analysts who agreed proposed that war in the post- modern era would take pre-modern forms. –Others wanted to know how non-state actors, who were in the midst of their own transformation, thought about transnational globalism, asymmetrical and unconventional operations, network-based organization, and information technology. 4th GENERATION WARFARE: AN ALTERNATIVE PERSPECTIVE

ELEMENTS OF 4 th GENERATION WARFARE –Warfare will be highly irregular, unconventional, and decentralized in approach. –Unconventional operations will be employed to bypass the superior military power of nation-states to attack and exploit political, economic, population, and symbolic targets. –Both the organization and operations of 4th generation warriors will be masked by deception, denial, stealth, and related techniques of intelligence tradecraft. –Terrorist organizations and operations will be profoundly affected by information age technologies which will provide these non-state actors with global reach.

(con’t) –Modern communications and transportation technologies will have a profound impact on this new battlefield. There will be no fronts and no distinctions between civilian and military targets. –Laws and conventions of war will not constrain terrorists and their state sponsors from seeking innovative means, to include WMD, to attack nonmilitary targets and inflict terrible carnage. –4th generation warriors, frequently in the name of religion, will be remorseless enemies for the states they challenge. Their operations will be marked by unlimited violence, unencumbered by compassion.

Al AQAEDA: WHAT WE NOW KNOW A.A Globally Networked Organization –Ideology –Structure –Linkages –Supporting States –Financial Base –Sanctuary

(con’t) B. Operational Profile –Targeting –Weapons –Technology –Weapons of Mass Destruction –Strategy C. The Quintessential Practitioner of 4th Generation Warfare

A. Remarks by the President at the 2002 USMA Graduation –Theme—“You graduate from the academy in a time of war…Our war on terror has only begun.” –Nature of that War—“We face a threat with no precedent…The gravest danger lies at the perilous crossroads of radicalism and technology.” –Describes the enemy in 4th Generation terms. IMPLICATIONS FOR AMERICAN NATIONAL SECURITY POLICY

(con’t) –Cold War Strategic Concepts—Deterrence and Containment are necessary but not sufficient. “New threats require new thinking.” –Deterrence and Containment are inherently defensive. “The war will not be won on the defensive. We must take the battle to the enemy.” –Transformation is essential—“Our security will require transforming the military.” It must “be ready for preemptive action.”

(con’t) B. The Bush Doctrine: Premised on Preemption –An actual armed attack is not a necessary precondition for using force. –Will use force to preempt terrorists and “states that harbor, finance, train or equip the agents of terror.” –21 st Century security requirements are different from those during the Cold War. –Here is what’s new: 1) Self-help is the only realistic alternative; 2) Intelligence can provide evidence of a state or group’s hostile intentions; 3) WMD availability to terrorists and hostile regimes; 4) the global reach and networks of terrorism and their state supporters.

(con’t) –Criteria for preemption: 1) An adversary has attacked the U.S. in the past and/or has a manifest intent to do so in the future; 2) Is actively planning operations to attack; 3) Seeks to magnify the lethality of the attack. C.The National Security Strategy of the United States— September 2002 D. The Rumsfeld Rules for the Use of Force E.Military Transformation