Pub Date : 2022-07-29DOI: 10.1080/03071847.2022.2133741
H. Larsen
NATO has reaffirmed crisis management as one of its ‘core tasks’, even as it strengthens collective defence amid Russia’s invasion of Ukraine, and specifically refers to the need to learn from Afghanistan. Henrik Larsen argues that NATO needs to face the uncomfortable realities that can explain the failure of its most ambitious and deadliest operation in its history. Given that the Afghanistan experience makes a strong case against crisis management, he argues that NATO should refine its definition: ‘crisis’ synonymous with the prevention of inter-state conflict rather than diffuse threats such as global terrorism; and ‘management’ synonymous with over-the-horizon rather than open-ended operations or the supply of weapons like the case of Ukraine. ◼
{"title":"Afghanistan’s Significance for NATO Strategy","authors":"H. Larsen","doi":"10.1080/03071847.2022.2133741","DOIUrl":"https://doi.org/10.1080/03071847.2022.2133741","url":null,"abstract":"NATO has reaffirmed crisis management as one of its ‘core tasks’, even as it strengthens collective defence amid Russia’s invasion of Ukraine, and specifically refers to the need to learn from Afghanistan. Henrik Larsen argues that NATO needs to face the uncomfortable realities that can explain the failure of its most ambitious and deadliest operation in its history. Given that the Afghanistan experience makes a strong case against crisis management, he argues that NATO should refine its definition: ‘crisis’ synonymous with the prevention of inter-state conflict rather than diffuse threats such as global terrorism; and ‘management’ synonymous with over-the-horizon rather than open-ended operations or the supply of weapons like the case of Ukraine. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-29DOI: 10.1080/03071847.2022.2156234
Julia Ryng, Guillemette Guicherd, J. Saman, Priyanka Choudhury, Angharad Kellett
The internet is a double-edged sword: civilians can mobilise it to assemble and voice dissent, but illiberal regimes can also weaponise it to consolidate power and suppress any form of opposition. Internet shutdowns – intentional disruptions of internet services – represent one method used to limit citizens’ freedom of expression, information, peaceful assembly and other associated rights in the name of national security. Julia Ryng, Guillemette Guicherd, Judy Al Saman, Priyanka Choudhury and Angharad Kellett examine the cases of Myanmar and Belarus: two distinct political regimes that nonetheless converge on similar strategies of repression. Through this comparative analysis, the authors highlight how future repression is likely to work and how compelling policy responses can be formulated. ◼
互联网是一把双刃剑:平民可以利用它集会并表达不同意见,但不自由的政权也可以利用它来巩固权力并压制任何形式的反对。互联网关闭——故意中断互联网服务——是以国家安全的名义限制公民言论自由、信息自由、和平集会自由和其他相关权利的一种方法。Julia ryung, Guillemette Guicherd, Judy Al Saman, Priyanka Choudhury和Angharad Kellett研究了缅甸和白俄罗斯的案例:两个截然不同的政治政权,却采取了相似的镇压策略。通过这种比较分析,作者强调了未来的压制可能如何发挥作用,以及如何制定令人信服的政策回应。◼
{"title":"Internet Shutdowns","authors":"Julia Ryng, Guillemette Guicherd, J. Saman, Priyanka Choudhury, Angharad Kellett","doi":"10.1080/03071847.2022.2156234","DOIUrl":"https://doi.org/10.1080/03071847.2022.2156234","url":null,"abstract":"The internet is a double-edged sword: civilians can mobilise it to assemble and voice dissent, but illiberal regimes can also weaponise it to consolidate power and suppress any form of opposition. Internet shutdowns – intentional disruptions of internet services – represent one method used to limit citizens’ freedom of expression, information, peaceful assembly and other associated rights in the name of national security. Julia Ryng, Guillemette Guicherd, Judy Al Saman, Priyanka Choudhury and Angharad Kellett examine the cases of Myanmar and Belarus: two distinct political regimes that nonetheless converge on similar strategies of repression. Through this comparative analysis, the authors highlight how future repression is likely to work and how compelling policy responses can be formulated. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-29DOI: 10.1080/03071847.2022.2148557
Henry P. Thompson, Jack Watling
This article examines the scale and significance of Iranian technology transfer to Ansar Allah in Yemen in underpinning the Houthi way of war. Henry Thompson and Jack Watling consider how Iran balances the transfer of manufacturing capabilities versus the provision of complete systems to exercise influence over the Houthis’ strikes on their adversaries. The article argues that the provision of key components gives Iran intimate access to Houthi planning, and therefore extensive indirect influence over how the Houthis fight. This structural dependence enables Iran to exercise command decisions without the need to intrusively exercise control. ◼
{"title":"Assessing Dynamics of Control Through Iranian Technology Transfer to Yemen’s Houthis","authors":"Henry P. Thompson, Jack Watling","doi":"10.1080/03071847.2022.2148557","DOIUrl":"https://doi.org/10.1080/03071847.2022.2148557","url":null,"abstract":"This article examines the scale and significance of Iranian technology transfer to Ansar Allah in Yemen in underpinning the Houthi way of war. Henry Thompson and Jack Watling consider how Iran balances the transfer of manufacturing capabilities versus the provision of complete systems to exercise influence over the Houthis’ strikes on their adversaries. The article argues that the provision of key components gives Iran intimate access to Houthi planning, and therefore extensive indirect influence over how the Houthis fight. This structural dependence enables Iran to exercise command decisions without the need to intrusively exercise control. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-29DOI: 10.1080/03071847.2022.2150418
Ehud Eilam
The Israel Defense Forces (IDF) have been at war with Hizbullah and Hamas, two powerful non-state actors, several times throughout Israel’s history. In the next war, the IDF will seek to gain a decisive and quick victory, by launching a large-scale offensive, and strive to destroy military targets, such as rockets. It will continue to rely heavily on firepower, mostly from the air, while carrying out a limited manoeuvre on the ground to reduce its casualties. Yet, Ehud Eilam argues, a massive ground offensive might be needed with such a buildup being based on the air force, infantry and intelligence. ◼
{"title":"How the Israel Defense Forces Seek to Defeat Non-State Actors","authors":"Ehud Eilam","doi":"10.1080/03071847.2022.2150418","DOIUrl":"https://doi.org/10.1080/03071847.2022.2150418","url":null,"abstract":"The Israel Defense Forces (IDF) have been at war with Hizbullah and Hamas, two powerful non-state actors, several times throughout Israel’s history. In the next war, the IDF will seek to gain a decisive and quick victory, by launching a large-scale offensive, and strive to destroy military targets, such as rockets. It will continue to rely heavily on firepower, mostly from the air, while carrying out a limited manoeuvre on the ground to reduce its casualties. Yet, Ehud Eilam argues, a massive ground offensive might be needed with such a buildup being based on the air force, infantry and intelligence. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124403809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-29DOI: 10.1080/03071847.2022.2126387
A. Livsey
Sir Julian Stafford Corbett (1854–1922) is perhaps the UK’s most influential maritime thinker, but how influential has he been with the Royal Navy of the past 30 years, and how important should he be? Andrew Livsey shows that the answer to the first question is only slightly. He played a major role in the early editions of Book of Reference 1806, British Maritime Doctrine, but less thereafter. His influence elsewhere is difficult to find and his place in naval tuition has been limited. For the second question, Corbett has a role, but the Royal Navy has much else to consider. ◼
{"title":"The Royal Navy and Julian Corbett, 1990–2020","authors":"A. Livsey","doi":"10.1080/03071847.2022.2126387","DOIUrl":"https://doi.org/10.1080/03071847.2022.2126387","url":null,"abstract":"Sir Julian Stafford Corbett (1854–1922) is perhaps the UK’s most influential maritime thinker, but how influential has he been with the Royal Navy of the past 30 years, and how important should he be? Andrew Livsey shows that the answer to the first question is only slightly. He played a major role in the early editions of Book of Reference 1806, British Maritime Doctrine, but less thereafter. His influence elsewhere is difficult to find and his place in naval tuition has been limited. For the second question, Corbett has a role, but the Royal Navy has much else to consider. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124580258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-29DOI: 10.1080/03071847.2022.2154473
A. Colasanti
When it comes to cyber, it is common to hear calls for interdisciplinary approaches, be it in the private sector, policy circles or academia. Daniel Moore is someone capable of marrying technical knowledge on information security with strategic studies proficiency. His Offensive Cyber Operations: Understanding Intangible Warfare is an authoritative account of the tactical exploitation of computer technologies and networks in interstate conflicts. The book is a welcome addition to the broader literature on cyber studies as it successfully moves beyond the many hyperbolic narratives of a debate prone to the technological determinism of the revolutions in military affairs. The central argument of the book is that computer network exploitation represents the latest stage in the evolution of ‘intangible warfare’, all those non-kinetic ‘efforts to undermine transmission, reception, and processing of data’ (p. 8) in the larger theatre of operations. In his account of the tactics of warfare that do not have a physical manifestation, Moore explains that the targeting of information and communication technologies (ICTs) for military and intelligence purposes is the result of gradual counter-innovations to military technologies during the 20th century, from the First World War to the Gulf War.
{"title":"Offensive Cyber Operations: Understanding Intangible Warfare","authors":"A. Colasanti","doi":"10.1080/03071847.2022.2154473","DOIUrl":"https://doi.org/10.1080/03071847.2022.2154473","url":null,"abstract":"When it comes to cyber, it is common to hear calls for interdisciplinary approaches, be it in the private sector, policy circles or academia. Daniel Moore is someone capable of marrying technical knowledge on information security with strategic studies proficiency. His Offensive Cyber Operations: Understanding Intangible Warfare is an authoritative account of the tactical exploitation of computer technologies and networks in interstate conflicts. The book is a welcome addition to the broader literature on cyber studies as it successfully moves beyond the many hyperbolic narratives of a debate prone to the technological determinism of the revolutions in military affairs. The central argument of the book is that computer network exploitation represents the latest stage in the evolution of ‘intangible warfare’, all those non-kinetic ‘efforts to undermine transmission, reception, and processing of data’ (p. 8) in the larger theatre of operations. In his account of the tactics of warfare that do not have a physical manifestation, Moore explains that the targeting of information and communication technologies (ICTs) for military and intelligence purposes is the result of gradual counter-innovations to military technologies during the 20th century, from the First World War to the Gulf War.","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122997367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-29DOI: 10.1080/03071847.2022.2144431
M. Crilly
The ubiquity and pervasiveness of digital technologies in modern societies portend a new type of conflict, a hyper-war of conflicting narratives, concepts and ideas. This multi-dimensional physical, virtual and cognitive battlespace is challenging the Westphalian model of multi-domain but mono-dimensional physical battle: it is moving conflict beyond the digital augmentation of Industrial Age platforms, into a new post-digital era. In this think piece, Martin Crilly reflects on how UK Defence will require imagination, ingenuity and inspiring leaders to successfully navigate this transition. ◼
{"title":"Prosecuting the Post-Digital Hyper-War","authors":"M. Crilly","doi":"10.1080/03071847.2022.2144431","DOIUrl":"https://doi.org/10.1080/03071847.2022.2144431","url":null,"abstract":"The ubiquity and pervasiveness of digital technologies in modern societies portend a new type of conflict, a hyper-war of conflicting narratives, concepts and ideas. This multi-dimensional physical, virtual and cognitive battlespace is challenging the Westphalian model of multi-domain but mono-dimensional physical battle: it is moving conflict beyond the digital augmentation of Industrial Age platforms, into a new post-digital era. In this think piece, Martin Crilly reflects on how UK Defence will require imagination, ingenuity and inspiring leaders to successfully navigate this transition. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132163978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-18DOI: 10.1080/03071847.2022.2072764
L. Risso
Abstract By collecting and destroying the weapons that had been handed over by rebel Albanian fighters, Operation Essential Harvest ended violence in North Macedonia and paved the way for constitutional change. Through interviews with political and military leaders, and analysis of official sources published by NATO at the time, Linda Risso demonstrates how early diplomatic intervention, the personal commitment of key leaders and a perfectly executed military operation achieved the expected goals within the given timeframe, and contributed significantly to the prevention of another ethnic conflict in the Western Balkans.◼
{"title":"A Forgotten Success","authors":"L. Risso","doi":"10.1080/03071847.2022.2072764","DOIUrl":"https://doi.org/10.1080/03071847.2022.2072764","url":null,"abstract":"Abstract By collecting and destroying the weapons that had been handed over by rebel Albanian fighters, Operation Essential Harvest ended violence in North Macedonia and paved the way for constitutional change. Through interviews with political and military leaders, and analysis of official sources published by NATO at the time, Linda Risso demonstrates how early diplomatic intervention, the personal commitment of key leaders and a perfectly executed military operation achieved the expected goals within the given timeframe, and contributed significantly to the prevention of another ethnic conflict in the Western Balkans.◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131586327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-17DOI: 10.1080/03071847.2022.2072763
B. Murphy
In an era where the exchange of information has been radically transformed by new technologies, Brian Murphy argues that states should no longer be considered the imagined communities that underpin dominant concepts of national security. He contends that national security experts should think in terms of ‘imagined tribes’ instead.◼
{"title":"Decaying National Security and the Rise of Imagined Tribalism","authors":"B. Murphy","doi":"10.1080/03071847.2022.2072763","DOIUrl":"https://doi.org/10.1080/03071847.2022.2072763","url":null,"abstract":"In an era where the exchange of information has been radically transformed by new technologies, Brian Murphy argues that states should no longer be considered the imagined communities that underpin dominant concepts of national security. He contends that national security experts should think in terms of ‘imagined tribes’ instead.◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}