13.07.2015 Views

Science, Strategy and War The Strategic Theory of ... - Boekje Pienter

Science, Strategy and War The Strategic Theory of ... - Boekje Pienter

Science, Strategy and War The Strategic Theory of ... - Boekje Pienter

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

strikes, maneuver, planning, communication, <strong>and</strong> supply’ 129 . And in postmodern war, ‘timewill be the key element. Postmodern militaries will attempt to use speed <strong>and</strong> knowledge tobring the conflict to quick resolution 130 . Boyd would not care much about those whoemphasize the technological aspect <strong>of</strong> post-modern war, but he certainly would agree withthe doctrinal <strong>and</strong> organizational tenets <strong>and</strong> the operational <strong>and</strong> strategic benefits accruingfrom it.<strong>The</strong> asymmetric responseBoyd would however also have agreed with those who argue that, precisely because the Westhas unsurpassed conventional military power, future opponents will revert to unconventional- asymmetrical - methods. <strong>War</strong> is a contest <strong>of</strong> ideas, <strong>and</strong> the highly visible western pattern <strong>of</strong>operations make the West predictable. In dialectic fashion a response can be expected, <strong>and</strong> infact one author discerns a counter-revolution in militaire affairs. Not only will trusted tacticssuch as camouflage <strong>and</strong> dispersion be vigorously employed to negate the advantage <strong>of</strong>precision st<strong>and</strong>-<strong>of</strong>f weapons, but opponents are likely to turn the Western conceptualization<strong>of</strong> war against itself. If civilian casualties are to be avoided by Western militaries, opponentswill aim to cause the West to inflict massive <strong>and</strong> highly visible civilian casualties. <strong>The</strong> use <strong>of</strong>human shields <strong>and</strong> using schools, mosques, cultural objects <strong>and</strong> hospitals as hiding places formilitary equipment are examples <strong>of</strong> this mode <strong>of</strong> thinking that have been witnessed duringDesert Storm, Allied Force, Enduring Freedom, Iraqi Freedom <strong>and</strong> the ensuing stabilizationoperations. Additionally, adversaries can employ non-military forms <strong>of</strong> combat such asinformation war, extortion, bribery, etc.This asymmetric countering <strong>of</strong> the West is developing into a deliberate attempt touse the Clausewitzian paradigm against the West. To illustrate this, in a remarkable bookpublished in China, titled Unrestricted <strong>War</strong>fare 131 the authors, serving senior <strong>of</strong>ficers <strong>of</strong> theChinese armed forces, unveiled their view on how to counter the Western style <strong>of</strong> warfare. Itbegins with a thorough examination <strong>of</strong> the way the West, <strong>and</strong> in particular the US, hasfought wars in the past decade. <strong>The</strong>y recognize the pattern. In response their approach ismulti-dimensional <strong>and</strong> deliberately not confined to the military dimension. In the followingtable are listed the domains in which war can be waged according to the authors.<strong>The</strong>y advocate nonmilitary means such as Information <strong>War</strong>fare related concepts,such as the use <strong>of</strong> hackers, the mass media <strong>and</strong> financial information terrorism. Rules <strong>and</strong>conventions, such as the Laws <strong>of</strong> Armed Combat are not adhered to, while the West’spolitical, moral <strong>and</strong> military restraints that fighting according to these rules imply, are fullyexploited. <strong>The</strong> key is the unique alignment <strong>and</strong> integration <strong>of</strong> psychological, diplomatic,resource <strong>and</strong> other warfare techniques. Weapons <strong>and</strong> combat methods are not necessarilyrelated to military hardware or military organizations.129 Steven Metz, Armed Conflict in the 21 st Century: <strong>The</strong> Information Revolution <strong>and</strong> Post-Modern <strong>War</strong>fare (USArmy <strong>Strategic</strong> Studies Institute, Carlisle Barracks, April 2000), p.24.130 Ibid, p.87.131 Qiao Liang <strong>and</strong> Wang Xiangsui, Unrestricted <strong>War</strong>fare (Beijing, 1999), p.156. In the past decade, <strong>and</strong>in particular in the past five years a large number <strong>of</strong> papers have been published on asymmetricwarfare. See for instance Robert Scales, ‘Adaptive Enemies: Dealing With the <strong>Strategic</strong> Threat after2010’, <strong>Strategic</strong> Review, vol.27, no.1, 1999; <strong>and</strong> Daniel Byman, Kenneth Polak <strong>and</strong> Matthew Waxman:‘Coercing Saddam Hussein: Lessons from the Past’, Survival, vol. 40, no.3, 1998. For an overview <strong>of</strong>the debate on this topic <strong>and</strong> some notable studies, see Frans Osinga, ‘Asymmetric <strong>War</strong>fare;Rediscovering the Essence <strong>of</strong> <strong>Strategy</strong>’ in Olson (2002).311

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!