Review: The Complexity of Modern Asymmetric Warfare

5 Star, Asymmetric, Cyber, Hacking, Odd War
Amazon Page

Max Manwaring

5.0 out of 5 stars A Capstone Book — Still a Disconnect Between What We Know and What We Do, October 20, 2012

John Fishel opens the book with a valuable contextual overview that reminds us of the preceding volumes that Max has put together:
Insurgency, Terrorism, and Crime: Shadows from the Past and Portents for the Future (International and Security Affairs)
Gangs, Pseudo-Militaries, and Other Modern Mercenaries: New Dynamics in Uncomfortable Wars (International and Security Affairs Series, Vol. 6)

John is modest in not mentioning two very important works, certainly relevant here, that he and Max put together:
Toward Responsibility in the New World Disorder: Challenges and Lessons of Peace Operations (Small Wars and Insurgencies)
Uncomfortable Wars Revisited (International and Security Affairs)

Continue reading “Review: The Complexity of Modern Asymmetric Warfare”

Reference: Max Manwaring on Strategy & Insurgency

Monographs

SHADOWS OF THINGS PAST AND IMAGES OF THE FUTURE: LESSONS FOR THE INSURGENCIES IN OUR MIDST

Max G. Manwaring, November 2004, Strategic Studies Institute

Phi Beta Iota: Every passing day reminds us that Dr. Col Max Manwaring has made so many extraordinary contributions to our strategic understanding across so many fronts, and yet his work does not appear to have been appreciated to the degree that we consider warranted.  Below is one small portion of his teachings from this reference.

This monograph concludes with the idea that the complex realities of contemporary political-insurgency wars must be understood as holistic processes that rely on various civilian and military agencies and contingents working together in an integrated fashion to achieve mutually agreed political-strategic ends. In this connection, at a minimum, three strategic-level imperatives are needed to begin to deal effectively with unconventional conflict situations. They are:

(1) civil-military and military-to-military dialogue regarding viable security and stability,

(2) fundamental education and understanding requirements, and

(3) the strategic application of U.S. military power.

The associated  recommendations take us beyond doing “something” for something’s sake to the cooperative, holistic, and long-term planning and implementation of the strategic ends, ways, and means that directly support the achievement of a political endgame.

Who’s Who in Peace Intelligence: Dr. Col Max Manwaring, US Army Strategic Studies Institute

Alpha M-P, Peace Intelligence
Dr. Col Max Manwaring

Dr. Max G. Manwaring is a Professor of Military Strategy in the Strategic Studies Institute (SSI) of the U.S. Army War College (USAWC). He has held the General Douglas MacArthur Chair of Research at the USAWC, and is a retired U.S. Army colonel. He has served in various civilian and military positions, including the U.S. Southern Command, the Defense Intelligence Agency, Dickinson College, and Memphis University. Dr. Manwaring is the author and coauthor of several articles, chapters, and books dealing with Latin American security affairs, political-military affairs, and insurgency and counterinsurgency. His most recent book is Insurgency, Terrorism, and Crime: Shadows from the Past and Portent for the Future, University of Oklahoma Press, 2008. His most recent article is “Sovereignty under Siege: Gangs and Other Criminal Organizations in Central America and Mexico,” in Air & Space Power Journal (in Spanish), forthcoming. His most recent SSI monograph is A Contemporary Challenge to State Sovereignty: Gangs and Other Illicit Transnational Criminal Organizations in Central America, El Salvador, Mexico, Jamaica, and Brazil. Dr. Manwaring holds an M.A. and a Ph.D. in Political Science from the University of Illinois, and is a graduate of the U.S. Army War College.

The Manwaring Trilogy

Review: The Search for Security–A U.S. Grand Strategy for the Twenty-First Century

Review: Environmental Security and Global Stability–Problems and Responses

Review: Uncomfortable Wars Revisited (International and Security Affairs Series) (Hardcover)

Other Interventions

2004 SHADOWS OF THINGS PAST AND IMAGES OF THE FUTURE: LESSONS FOR THE INSURGENCIES IN OUR MIDST

2003 Manwaring (US) War & Conflict: Six Generations

2002 Manwaring (US) Asymmetry, Conflict, and the Need to Achieve Both Vertical and Horizonal Integration

Graphic: Information Operations (IO) Eras

Other Publications

Search: The Future of OSINT [is M4IS2-Multinational]

Analysis, Budgets & Funding, Collaboration Zones, Communities of Practice, Ethics, InfoOps (IO), Key Players, Methods & Process, Mobile, Policies, Policy, Real Time, Reform, Searches, Strategy, Technologies, Threats, Tools
COIN20 Trip Report
Paradise Found

The future of OSINT is M4IS2.

The future of Open Source Intelligence (OSINT) is Multinational, Multifunctional, Multidisciplinary, Multidomain Information-Sharing & Sense-Making (M4IS2).

The following, subject to the approval of Executive and Congressional leadership, are suggested hueristics (rules of thumb):

Rule 1: All Open Source Information (OSIF) goes directly to the high side (multinational top secret) the instant it is received at any level by any civilian or military element responsive to global OSINT grid.  This includes all of the contextual agency and mission specific information from the civilian elements previously stove-piped or disgarded, not only within the US, but ultimately within all 90+ participating nations.

Rule 2: In return for Rule 1, the US IC agrees that the Department of State (and within DoD, Civil Affairs) is the proponent outside the wire, and the sharing of all OSIF originating outside the US IC is at the discretion of State/Civil Affairs without secret world caveat or constraint.  OSIF collected by US IC elements is NOT included in this warrant.

Continue reading “Search: The Future of OSINT [is M4IS2-Multinational]”

Graphic: Information Operations (IO) Eras

Advanced Cyber/IO, ICT-IT, Innovation, Leadership-Integrity, Processing, Strategy-Holistic Coherence
Information Operation (IO) Eras
Information Operation (IO) Eras

Col Dr. Max Manwaring defined the first six generations of warfare, Robert Steele converted those to information operaitons (IO) eras, and added the 7th era, which is easiy to achieve with leadership integrity, virtually impossible to achieve as long as any government persists in retaining legacy systems that are stovepipes within stovepipes surrounded by security and legal and personality strait-jackets from earlier eras and totally ignorant of modern possibilities.

Threat Archives on Public Intelligence (1992-2006)

Threats

2004

NO

Threat Bjorgo Root Causes of Terrorism

2004

US

Threat Kaplan The Saudi Connection to Terrorism

2004

US

Threat Knapp Al Qaeda and the Mass Media (PSYOP Briefing)

2004

US

Threat Knapp Al Qaeda and the Mass Media (Reference)

2004

US

Threat Knapp Distortion in Islam and Jihad

2004

US

Threat Knapp Diversity in Islam

2006

US

Threat Daly Al Qaeda Against Saudi Oil

2006

US

Threat Johnson Battle of Algiers and Its Lessons

2006

US

Threat Seagraves Gold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

Threat Seagraves Gold Warriors New Chapter Seventeen

2006

US

Threat Steele Who Is to Blamce?  The Vice President and Us

2006

US

Threat Stern Al Qaeda Approach to US Muslims

2006

UK

Threat Story Crunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

Threat Ellis Scenarios for Next Generation Crises in Latin America

2005

US

Threat GAO GAO Report: US Not Addressing Islamic Fundamentalism

2005

US

Threat OSS Somalia Piracy Quick Report

2005

US

Threat OSS Report on Remote Detonation of Improvised Explosive Devices

2005

US

Threat OSS PRC Trade in Latin America

2005

US

Threat Ray & Gross The Perfect Storm

2005

US

Threat Steele Worksheet for Book Review on Crossing the Rubicon

2005

US

Threat Steele Mother Nature as Terrorist

2005

US

Threat Steele 9-11: Who’s To Blame?  One Man’s Opinion

2005

US

Threat Thompson Is the Terrorism Threat Over-Rated?

2004

US

Threat Daly Globalization & National Defense (Ecological Economics)

2004

US

Threat Louisiana Pre-Hurricane Katrina Study and Conclusions

2004

US

Threat Palmer The Real Axis of Evil: 44 Dictators

2004

US

Threat Peters Early Warning of Disease From Pattern Analysis

2004

US

Threat Seagrave Transcript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

Threat Vlahos Attachment to the Muslim Renovatio Memorandum

2004

US

Threat Vlahos The Muslim Renovatio and U.S. Strategy

2004

US

Threat Vlahos The Muslims Are Coming

2004

US

Threat Vlahos Insurgency Within Islam

2003

US

Threat Danzip Countering Traumatic Attacks

2003

PRC

Threat OSS PRC Treaty & Trade Penetration of Latin America

2002

US

Threat Emerson & Steele American Jihad Map

2002

US

Threat Steele ACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

Threat Steele Georgetown/AWC: Non-Traditional Threats

1998

US

Threat Steele TAKEDOWN: Targets, Tools, & Technocracy

1994

US

Threat Steele 6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

Threat NGO Changing Face of Global Violence

2005

NGO

Threat NGO Human Security Audit

2004

US

Threat Pelton Robert Young Pelton on Dangerous World

2004

US

Threat Steele Three Book Review Relevant to Global War on Terror (GWOT)

2003

US

Threat Copeland Analysis of the New Paradigm for Terrorism

2003

US

Threat Manwaring Street Gangs: New Urban Insurgency

2003

US

Threat Manwaring War & Conflict: Six Generations

2003

US

Threat Pelton Summary of Presentation on World’s Most Dangerous Places

2002

US

Threat Betts The Next Intelligence Failure: The Limits of Prevention

2002

NL

Threat Jongman World Conflict and Human Rights Map 2001-2002

2002

US

Threat Wheaton Transitions from Authoritarian Rule: A Model

2002

US

Threat Wheaton Virtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

Threat Godson Governments and Gangs

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

Threat Transnational Enemies: Threats Without Names

1998

US

Threat Glaebus Metaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

Threat Fialka War by Other Means: Economic Espionage In (Against) America

1997

US

Threat Schwartau Information Warfare: The Weapons of the Information Age

1997

US

Threat Tenney Cyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

Threat Keuhl School of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

Threat O’Malley Countering the Business Intelligence Threat

1996

US

Threat Strassmann U.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

Threat Winkler Electronic Industrial Espionage: Defining Ground Zero

1994

US

Threat Whitney-Smith Refugees: Weapon of the Post Cold War World–Counter Offensive: IW