Rethinking Asymmetric Threats

Rethinking Asymmetric Threats

Author: Stephen Blank

Publisher:

Published: 2003

Total Pages: 0

ISBN-13: 9781584871392

DOWNLOAD EBOOK

For several years U.S. policymakers, officials, and writers on defense have employed the terms "asymmetric" or "asymmetry" to characterize everything from the nature of the threats we face to the nature of war and beyond. The author challenges the utility of using those terms to characterize the threats we face, one element of the broader debate over the nature of war, U.S. strategy, and the threats confronting us. As a work of critique, it aims to make an important contribution to the threat debate. A correct assessment of the nature of the threat environment is essential to any sound defense doctrine for the U.S. Army and the military as a whole. That correct assessment can only be reached through a process of critique and debate.


Rethinking Asymmetric Threats

Rethinking Asymmetric Threats

Author: Stephen Blank

Publisher:

Published: 2003

Total Pages: 74

ISBN-13:

DOWNLOAD EBOOK

For several years U.S. policymakers, officials, and writers on defense have employed the terms "asymmetric" or "asymmetry" to characterize everything from the nature of the threats we face to the nature of war and beyond. The author challenges the utility of using those terms to characterize the threats we face, one element of the broader debate over the nature of war, U.S. strategy, and the threats confronting us. As a work of critique, it aims to make an important contribution to the threat debate. A correct assessment of the nature of the threat environment is essential to any sound defense doctrine for the U.S. Army and the military as a whole. That correct assessment can only be reached through a process of critique and debate.


Rethinking Asymmetric Threats

Rethinking Asymmetric Threats

Author: Stephen J. Blank

Publisher:

Published: 2014-07-06

Total Pages: 69

ISBN-13: 9781312335035

DOWNLOAD EBOOK

Assessment of the threat environment is a critical element in the formulation of any state's strategy and defense doctrine. It also should be an inherently critical process that seeks to free policymakers from incorrect, antiquated, or misconceived perceptions about the threat. Consequently, the nature of the threat(s) the United States or any other government faces is the subject of a never-ending debate. For several years U.S. policymakers, officials, and writers on defense have employed the terms "asymmetric" or "asymmetry" to characterize everything from the nature of the threats we face to the nature of war and beyond. This monograph challenges the utility of using those terms to characterize the threats we face, one element of the broader debate over the nature of war, U.S. strategy, and the threats confronting us. As a work of critique, it aims to make an important contribution to the threat debate.


Reconsidering Asymmetric Warfare (Joint Force Quarterly, Issue 36).

Reconsidering Asymmetric Warfare (Joint Force Quarterly, Issue 36).

Author:

Publisher:

Published: 2004

Total Pages: 8

ISBN-13:

DOWNLOAD EBOOK

A new security concept emerged on the American defense-planning scene several years ago. Asymmetric warfare was worked into the 1997 National Security Strategy. Analysts and major defense documents have since described the more vexing and menacing security challenges as asymmetric. The term is used in connection with threats, strategies, and warfare. Asymmetry typically describes an enemy that thinks or acts differently from America, especially when faced with conventionally superior U.S. forces. Asymmetric threats are most often associated with nuclear, biological, and chemical weapons of mass destruction (WMD) and unfamiliar capabilities such as those displayed in the attacks of September 11, 2001. Such weapons leverage vulnerabilities we either overlook or tolerate. And these asymmetric approaches can generate dramatic outcomes for a weaker power. Yet this concept has lost its usefulness in part because it means different things to different people. Moreover, when joined with warfare or threats, the term asymmetric adds little to the strategic thinking of ages past. Observations that weak and clever enemies can bring a stronger power to its knees by exploiting vulnerabilities or can brazenly challenge muscle-bound modern militaries with a surprise use of frightening weapons or unfamiliar maneuvering simply restate the obvious: strategy matters. So what does the concept of asymmetry add to an understanding of warfare and the threat? Is it a useful defense planning or policy analysis tool in this post-Cold War, post-9/11 world?


The Revenge Of The Melians

The Revenge Of The Melians

Author: Kenneth McKenzie

Publisher:

Published: 2005-01-01

Total Pages: 124

ISBN-13: 9781410219411

DOWNLOAD EBOOK

CONTENTS Foreword Introduction What is Asymmetric Warfare? Defining Asymmetry -- Characteristics: Disparity of Interest -- Targeting the Will of the Opponent -- Attaining Strategic Effect on All Levels of War -- The Importance of Effectiveness -- The Threat-Response Dynamic -- A Final Example: The Gulf Tanker War -- Conclusions A Typology of Asymmetry: What, Who, and When? The What: The Range of Potential Asymmetric Threats -- The Who: Regional, Rogue, and Nonstate Actors -- The When: Likelihood During Phases of a Crisis --Conclusions Looking in the Mirror: Where Are Our Asymmetric Vulnerabilities? Measuring Conventional Military Superiority --Examining the Homeland --Quantifying the Homeland: What Are the Targets? --Examining Potential Vulnerabilities Categorizing the Threats What Are the Ten Asymmetric Threats? --Conclusions An Option of Difficulties --Countering Asymmetric Threats Current Initiatives: The State of Play Today -- Summarizing Current Initiatives -- Doing Better: Beginning with Three Ideas -- Policy Recommendations -- An Option of Difficulties? Conclusions: The Uneasy Athenians Endnotes


What Are Asymmetric Strategies

What Are Asymmetric Strategies

Author:

Publisher:

Published: 1999

Total Pages: 21

ISBN-13:

DOWNLOAD EBOOK

The 1997 Quadrennial Defense Review (QDR) evaluated future U.S. strategy and force structure. It paid particular attention to a set of threats referred to as asymmetric challenges or asymmetric means. This documented briefing provides a brief description of the asymmetric strategies that employ these challenges. Today, U.S. forces appear capable of defeating the normally postulated military threats, including those associated with major theater wars. But many of these postulated threats are relatively symmetric in character, directly seeking to combat U.S. strengths. Future adversaries appear more likely to attack U.S. vulnerabilities and to do so using largely asymmetric means, in part because they cannot afford military forces and capabilities comparable to those of the United States.


What Are Asymmetric Strategies

What Are Asymmetric Strategies

Author:

Publisher:

Published: 1999

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK

The 1997 Quadrennial Defense Review (QDR) evaluated future U.S. strategy and force structure. It paid particular attention to a set of threats referred to as asymmetric challenges or asymmetric means. This documented briefing provides a brief description of the asymmetric strategies that employ these challenges. Today, U.S. forces appear capable of defeating the normally postulated military threats, including those associated with major theater wars. But many of these postulated threats are relatively symmetric in character, directly seeking to combat U.S. strengths. Future adversaries appear more likely to attack U.S. vulnerabilities and to do so using largely asymmetric means, in part because they cannot afford military forces and capabilities comparable to those of the United States.


The Revenge of the Melians

The Revenge of the Melians

Author: Kenneth F.. McKenzie

Publisher:

Published: 2000

Total Pages: 104

ISBN-13:

DOWNLOAD EBOOK

This essay is a product of the Quadrennial Defense Review (QDR) 2001 Working Group, a project of the Institute for National Strategic Studies at the National Defense University, Sponsored by the Chairman of the Joint Chiefs of Staff, the working group is an independent, honest-broker effort intended to build intellectual capital for the upcoming QDR. More specifically, it aims to frame issues, develop options, and provide insights for the Chairman, the services, and the next administration in three areas: defense strategy, criteria for sizing conventional forces, and force structure for 2005-2010. One of the group's initial tasks was to assess the future security environment to the year 2025. This was pursued by surveying the available literature to identify areas of consensus and debate and by deepening knowledge of asymmetric threats to the United States both at home and abroad, given their potential appeal to likely adversaries in view of America's conventional military superiority. The essay that follows grew out of that latter effort and reflects a growing consensus that the issues posed by asymmetric threats should occupy a more prominent place in defense strategy and force planning. This essay makes a unique contribution to the growing literature on asymmetric threats by providing a conceptual framework for thinking about such threats, offering an approach to determining which threats should receive the greatest attention from defense planners, and suggesting concrete steps that the Nation should take to address them.