scholarly journals Civil Preparation of the Battlespace - Necessity in the Irregular or Hybrid Warfare

2017 ◽  
Vol 23 (1) ◽  
pp. 265-270
Author(s):  
Aurelian Rațiu

Abstract The lessons learned from the most recent conflicts or theatres of operations in Iraq, Afghanistan, Ukraine, or Syria prove that the Intelligence Preparation of the Battlefield (IPB) process is no longer sufficient. Why? Because in the irregular and hybrid conflicts the centre of gravity is represented by the civilian population, which requires precise understanding of the operational environment, including aspects about the local communities, and profound knowledge of the people, their social structures, their culture, their customs, and their way of thinking and reacting to certain internal and external stimuli. In such an operational environment, protecting the civilian population becomes the main mission of the armed forces. Consequently, we present the most important stages through which the Civil Preparation of the Battlespace (CPB) can be accomplished.

2022 ◽  
Author(s):  
Christopher J Scheiber ◽  
Lemar M Simmons ◽  
Richard D Neading ◽  
Casey F Becker ◽  
Tyler R Scarborough ◽  
...  

ABSTRACT The coronavirus 2019 (COVID-19) pandemic continues to be a threat to global health, including the health of deployed armed forces. Servicemembers had to adjust to the “new normal” while maintaining the interests of the nation’s security as well as that of our host nation partners. This commentary examines how Special Operations Forces operating within four different regions worldwide leveraged the challenges presented by the onset of this pandemic in maintaining stability, sustaining a ready force, and operating forward deployed. Deployed forces face constant difficulties with logistical support, varied medical resources access and a medical system predominantly focused on trauma care. At the onset of the COVID-19 pandemic there was little guidance specific to these circumstances which required an improvised adaptation of the recommendations set by national and Department of Defense medical authorities. Plans were constantly revised to match the ever changing medical and operational environment. Strategies such as the “Bubble Philosophy” and tiered force protection measures helped our units to maintain a rigorous training cycle. New methods of communication and training with our host nation partners such as the use of Unmanned Aerial Systems (UAS) platforms to survey host nation training became standard. Through these measures all of our forces were able to maintain operational capacity, protect the force, and maintain rapport with the host nations. We hope these experiences will provide a rough framework for future forces faced with a similar struggle. We also want to stress that challenges vary depending on the area of operations and the pathogen responsible for the pandemic. Any feedback and collaboration that may come from this work is appreciated and encouraged.


Author(s):  
Volodymyr Kotsiuruba ◽  
Ivan Datsenko ◽  
Volodymyr Dachkovsky ◽  
Mykola Tkach ◽  
Oleksandr Holda ◽  
...  

In the opposition of the people of Ukraine to the aggressive policy of the Russian Federation, the question of studying the experience of combat operations in the east of our state is relevant. Analysis of the losses suffered by the Armed Forces of Ukraine and the civilian population during the operation. The Joint Forces (anti-terrorist operation) in Donetsk and Luhansk region clearly point to the need to study the issue of creating safe shelters, especially for the civilian population with limited time and resources. This can be realized provided that explosive methods of underground construction are used alongside traditional earthworks. The construction of such structures must be strong and have a sufficient internal volume and ensure the safety of the people there and allow the placement of various household and sanitary equipment. Based on the above, it should be noted that the article considers the topical issue of arrangement of underground structures and shelters in one of the ways, namely explosive. The essence of the explosive method of arranging underground workings is that a well is arranged in the soil, in which the appropriate charge of the explosive is installed and detonation is carried out. Due to the explosion of the charge, a camouflet cavity is formed, which is used for the construction of an underground protective structure or its elements. The use of this method can significantly reduce and sometimes completely eliminate time-consuming and unproductive work on the development and removal of soil from the slaughter. Accordingly, the conditions of camouflage of buildings are significantly improved and the terms of their construction are reduced. The purpose of the article is to highlight the methodological approach to substantiate the requirements for the main indicators of construction of protective structures by arranging underground workings in an explosive manner. The considered methodical approach can be used both at planning of actions for the fortification equipment of shelters for the civilian population and during carrying out scientific researches for the purpose of substantiation of requirements to the basic indicators of construction of protective constructions by arrangement of underground workings by explosive way. As a direction of further research in the subject area is the improvement of scientific and methodological approach to the calculation of a multilayer underground protective structure.


2017 ◽  
Vol 40 (3) ◽  
pp. 639-645
Author(s):  
Ghislain Manet ◽  
Gabriel Bédubourg ◽  
Guillaume Velut ◽  
Franck de Laval ◽  
Aurélie Mayet ◽  
...  
Keyword(s):  

2019 ◽  
Vol 18 (1) ◽  
pp. 118-135
Author(s):  
Henrichas Šostakas ◽  
Jūratė Guščinskienė

The purpose of this scientific article is to identify the most persistent motivational measures of conscripts applied at General Adolf Ramanauskas Combat Training Center. The article discusses motivation, motivating and motivation measures applied in contemporary civil organizations and the Lithuanian Armed Forces. The empirical part of the article is based on the authentic investigation of conscripts, which was carried out in the spring of 2018 in the “Vanagas” Operational Environment Company. The results of the research revealed that the most significant motivating factors for a conscript are such as the need for personal accomplishments and respect. What concerns the group of material motivation measures, the conscripts are best motivated by provision of health care services and social guarantees. In case of intangible values, they are most motivated by the opportunity to develop and pursue a career. Priority motivating measures that could encourage soldiers to serve better could be likewise: commanders’ support and trust, a friendly team, clear and interesting tasks, increase of cash benefits and organization of leisure time activities. DOI: http://dx.doi.org/10.5755/j01.ppaa.18.1.23132


2021 ◽  
Vol 26 (3) ◽  
pp. 183-192
Author(s):  
Ionel Cotoarbă ◽  
Ion Mituleţu

Abstract The future conflicts will take place in increasingly complex operational environments and will largely include conventional, asymmetric or hybrid opponents. The battle space that has acquired new valences and the asymmetrical nature of the current operational environment require the perpetual reconfiguration of the rules of engagement. Within the asymmetric actions, the enemy will focus their efforts on attacking vulnerable military structures, which have a degree of protection inadequate for the operational situation. Therefore, the protection of force is a key element in the effective management of situations, maintaining the pace of actions and the ability to fight in the development of asymmetric operations. From the range of asymmetric actions that manifests itself globally, we aim to conduct an analysis focused on force protection measures specific to counterinsurgency, counter-guerrilla and counter-terrorism operations. The place and role of force protection in asymmetric operations attest to the fact that specific measures are aimed in particular at maintaining the morale and combat capability of their own forces throughout the range of missions performed, as well as protecting the civilian population in the area of action.


Author(s):  
Andrea Ghiselli

How did the Chinese People’s Liberation Army (PLA) react to the securitization act initiated by the civilian leadership? This chapter shows that the PLA was relatively hesitant to accept a more inclusive understanding of security beyond traditional territorial defense, and therefore of a broader role for itself in China’s peacetime foreign policy. The PLA’s approach to non-traditional missions was similar to that of other countries’ armed forces, as they did not look favorably on so-called interventionist uses of force. It was in the aftermath of the 2011 Libyan crisis that the position of the PLA changed in an unequivocal way and the soldiers’ attitude towards the expansion of their peacetime portfolio became very similar to that of the civilians. While the soldiers’ natural desire to contribute to the security of the people played an important role in this process, it is important to emphasize how crucial the establishment of a causal link between non-traditional security threats and inter-state conflict was in the debate within the PLA.


Author(s):  
David Kilcullen

This chapter draws on key concepts from evolutionary theory, anthropology, and social science to explore how adaptive enemies evolve and adapt under conditions of conflict. It identifies four key mechanisms of evolution in irregular warfare—social learning, natural selection, artificial selection (including both unconscious artificial selection and predator effects), and institutional adaptation—and gives examples of each. It also examines forms of conscious military innovation by states, and draws a distinction between peacetime (concept led) and wartime (reactive) modes of innovation. The chapter argues that domination of the operational environment by Western armed forces since the end of the Cold War has created evolutionary pressure to which all adversaries—state and non-state—have responded, and that this response is shaping new approaches to war.


Author(s):  
Oscar M. Rodriguez-Elias ◽  
Ana I. Martinez-Garcia ◽  
Aurora Vizcaino ◽  
Jesús Favela ◽  
Mario Piattini

Knowledge sharing is a collective process where the people involved collaborate with others in order to learn from them (Huysman & de Wit, 2000). This kind of collaboration creates groups of people with common interest called communities of practice where each member contributes knowledge about a common domain (Wenger, 1998). Communities of practice enable its members to benefit from the knowledge of each other (Fontaine & Millen, 2004). To achieve this, different techniques and technologies can be used, such as shared documentation, groupware tools, lessons learned systems, and so forth. Therefore, to increase and improve knowledge sharing in communities of practice, it is important to study the mechanisms used by a particular community and understand how the knowledge flows through its members (Guizzardi, Perini & Dignum, 2003). This article presents a qualitative approach for studying and understanding how knowledge flows in communities of practice within organizations. The goal is to provide a methodological guide for obtaining useful information for the development of knowledge management tools for supporting knowledge flows in these communities. The content of the article is organized as follows. First the importance of supporting knowledge flows in communities of practice is highlighted. Then, a qualitative methodology for identifying knowledge flows in communities of practice is described, followed by some examples from a study conducted in the field of software maintenance. Finally, we present our conclusions of this work and future research.


2012 ◽  
Vol 94 (886) ◽  
pp. 533-578 ◽  
Author(s):  
Cordula Droege

AbstractCyber warfare figures prominently on the agenda of policymakers and military leaders around the world. New units to ensure cyber security are created at various levels of government, including in the armed forces. But cyber operations in armed conflict situations could have potentially very serious consequences, in particular when their effect is not limited to the data of the targeted computer system or computer. Indeed, cyber operations are usually intended to have an effect in the ‘real world’. For instance, by tampering with the supporting computer systems, one can manipulate an enemy's air traffic control systems, oil pipeline flow systems, or nuclear plants. The potential humanitarian impact of some cyber operations on the civilian population is enormous. It is therefore important to discuss the rules of international humanitarian law (IHL) that govern such operations because one of the main objectives of this body of law is to protect the civilian population from the effects of warfare. This article seeks to address some of the questions that arise when applying IHL – a body of law that was drafted with traditional kinetic warfare in mind – to cyber technology. The first question is: when is cyber war really war in the sense of ‘armed conflict’? After discussing this question, the article goes on to look at some of the most important rules of IHL governing the conduct of hostilities and the interpretation in the cyber realm of those rules, namely the principles of distinction, proportionality, and precaution. With respect to all of these rules, the cyber realm poses a number of questions that are still open. In particular, the interconnectedness of cyber space poses a challenge to the most fundamental premise of the rules on the conduct of hostilities, namely that civilian and military objects can and must be distinguished at all times. Thus, whether the traditional rules of IHL will provide sufficient protection to civilians from the effects of cyber warfare remains to be seen. Their interpretation will certainly need to take the specificities of cyber space into account. In the absence of better knowledge of the potential effects of cyber warfare, it cannot be excluded that more stringent rules might be necessary.


1996 ◽  
Vol 146 ◽  
pp. 443-463 ◽  
Author(s):  
Nan Li

Defence doctrine is an important indicator of armed forces′ intentions and capabilities. Since the policy of defence modernization was introduced in China in 1973, the war-fighting doctrine and strategic principles of the People′s Liberation Army (PLA) have undergone two major changes. The first change came in the late 1970s. The Maoist doctrine of the “people′s war,” which had been prevalent in the late 1960s and 1970s, was replaced by a new doctrine of the “people′s war under modern conditions.”


Sign in / Sign up

Export Citation Format

Share Document