SlideShare a Scribd company logo
1 of 45
Centre of Excellence - Defence Against Terrorism 
FFoouurrtthh GGeenneerraattiioonnss ooff 
MMooddeerrnn WWaarrffaarree 
((44GGWW)) 
COL Engr. JÁNOS TOMOLYA Ph.D. 
HUN Army 
UNCLASSIFIED 1/26 
Chief of Capabilities
Agenda : 
1. Introduction; 
2. Different classification of war (epochs, waves, 
forms); 
3. Asymmetric Warfare; 
4. Military cultures; 
5. Fourth Generation of modern warfare; 
2/26
3/26 
The Next War? 
How can we avoid being like the French knights at 
the Battle of Agincourt?
4/26 
Future Warfare
5/26 
Or this one?
UNCLASSIFIED 6/26
7/26 
Number of terrorist attacks 
2003-2011
8/26 
Military Expenditure 
UNCLASSIFIED SIPRI: 1531 billions USD in 2009
9/26
10/26 
1. Different classification of war: 
Epochs 
Dr T. Lindsay Moore and Robert J. Bunker : 
4 epochs, based on energy sources 
 human energy 
 animal-based energy 
 mechanical energy 
 post-mechanical energy: 
UNCLASSIFIED 
Advanced 
technology 
warfare 
Non-Western 
warfare
Alvin and Heidi Toffler developed a theory of warfare 
based on the economic and societal changes of 
civilization. 
11/26 
Waves 
Agricultural war 
Industrial-based war (late of 17th century) 
Knowledge-based war (from 1980s) 
UNCLASSIFIED
12/26 
Forms of warfare 
Symmetric 
Dissymmetric 
Asymmetric 
/Eric Walters/ 
After WWII more than 160 armed conflicts; 
75% of them were asymmetric 
UNCLASSIFIED
13/26 
Symmetric 
In symmetric conflicts, the two opposing 
adversaries dispose of armed forces that are 
similar in all aspects such as force structure, 
doctrine and assets and have comparable 
tactical, operational and strategic objectives. 
UNCLASSIFIED
A conflict is dissymmetric when one of the 
opposing forces is superior by means of force 
structure, doctrine and assets, but both 
parties are striving for similar political 
and military objectives. 
14/26 
Dissymmetric 
UNCLASSIFIED
UNCLASSIFIED 15/26
16/26 
2. Asymmetric Warfare (AW) 
One of the opponents is unable or unwilling to wage 
the war with comparable force structure, doctrine 
and assets and has different political and military 
objectives than his adversary.
17/26 
Asymmetric Warfare (AW) 
 What is it? 
David and Goliath warfare 
Unsophisticated vs. the sophisticated (technologically) 
Poor countries or entities against rich countries or rich entities 
Threat can be internal or external (i.e. Israel, Vietnam or 
Afghanistan) 
Often state sponsored/supported 
Attacking opponent via indirect means such as 
Terrorism 
Critical infrastructures 
Avoids combat w/ conventional forces 
Tends to have a purpose that focuses on a force, but not always 
the case 
Misc. unconventional means i.e., poisoning water/food supplies, 
exploitation of media by staging scenes to sway public opinion.
18/26 
3. Military cultures 
Clausewitz: „War is an act of force, and there 
is no logical limit to the application of that 
force.” 
The way of application of force depends on the 
UNCLASSIFIED 
military culture.
19/26 
Kinds of Military Cultures 
Material-centric; 
Movement-centric; 
Guerilla warfare 
Forms: terrorism, guerilla warfare, orthodox 
warfare; 
 Types: anarchism; equality-based; tradition-based; 
pluralist; secessionist; divider; reformer; 
Used methods: coup d’état; exhausting, focus 
on military, warfare in build-up areas; 
UNCLASSIFIED 
Orthodox warfare
Material-centric 
Strategy of „indirect 
approach” 
Characteristics: 
Daggering wars; 
Defence; 
Strategic objective: 
exhausting of enemy 
Indirect warfare- not only 
with military means 
Main services: air force, 
navy 
Preferred by: maritime 
powers UNCLASSIFIED 
20/26 
Indirect approach
21/26 
Movement-centric 
UNCLASSIFIED 
Strategy of „direct 
approach” 
Characteristics: 
Blitzkrieg; 
Offence; 
Strategic objective: 
destroy the enemy 
Direct warfare- decisive 
maneuvers 
Main services: land force, 
Preferred by: continental 
powers
22/26 
Guerilla warfare 
UNCLASSIFIED 
Strategy of „indirect 
approach in irregular 
form” 
Supported by people 
Characteristics: 
Hit and run actions; 
Offence; 
Strategic objective: 
exhausting of enemy, 
provoke a collapse 
internally 
Media 
Indirect warfare- not 
only with military 
means 
Main services: land 
force
23/26 
4. Generations of Warfare 
COL BOYD 
Non-linear warfare 
Focuses on moral-mental-physical 
portions of enemy & as single entity 
Focus on the enemy and environment 
Knowledge of strategic environment 
Interact w/ environment 
appropriately 
UNCLASSIFIED
24/26 
New dimensions 
UNCLASSIFIED
25/26 
Trinity 
Clausewitz: „the war is 
monopoly of the state” 
UNCLASSIFIED 
people 
government 
army 
society
26/26 
1GW= 
Age of Napoleon 
Massed 
manpower 
UNCLASSIFIED
27/26 
2 GW= Age of Firepower 
UNCLASSIFIED 
Massed 
firepower... 
But still in 
lines
28/26 
3 GW= Age of Maneuver 
UNCLASSIFIED
4 GW= Age of Independent 
Action Cells 
Asymmetric 
warfare in 
irregular form 
UNCLASSIFIED 29/26
30/26 
4 GW= Age of Independent 
Action Cells
31/26 
Role of Technology in 4GW 
UNCLASSIFIED
The “generations of war” model 
Peace of 
Westphalia 
Precursor activities – 
going back to Alexander 
& Sun Tzu (and before) 
States & 
non-states 
wage war 
Fall of 
USSR 
3 GW 
state vs. 
state 
New commo & 
transport networks 
4 GW 
States & 
non-states 
wage war 
Nuclear 
Weapons 
Proliferate 
New 
2 GW 
weapons 
& 
concepts 
State-vs-state— 
only “legal” form 
of war 
Nonstate armed groups: 
partisans, insurgents, 
anarchists, criminal 
organizations, etc. 
1 
GW 
1600 1700 1800 1900 2000 
UNCLASSIFIED 32/26
4GW can be defined as a method of warfare that 
uses the following to achieve a moral victory: 
33/26 
Definition 
Formless and most deadly kind of war 
Undermines enemy strengths (this may seem 
obvious, but most of modern warfare has involved 
direct attacks on enemy strengths -- find the 
enemy army and destroy it). 
Exploits enemy weaknesses. 
Uses asymmetric operations (weapons and 
techniques that differ substantially from 
opponents). 
UNCLASSIFIED
The rise of 4GW is both a product and a driver of the 
following: 
The loss of the nation-state's 
34/26 
Drivers 
UNCLASSIFIED 
monopoly on 
violence. 
The rise of cultural, 
ethnic, and religious 
conflict. 
Globalization (via 
technological 
integration).
35/26 
Characteristics 
Violent non-state actor (VNSA) fighting the 
state. 
lacks hierarchal authority 
lack of formal structure 
patience and flexibility 
ability to keep a low profile when needed 
small size 
VNSA’s forces are decentralized
36/26 
Tactics 
4GW is fought on the tactical level via: 
Rear area operations -- 4GW 
warriors do not confront a 
nation-state's military but 
rather it society. 
Psychological operations -- 
terror. 
Ad-hoc innovation -- use of 
the enemy's strengths against 
itself 
Human shields
37/26 
Tactics of 4GW 
Ethnic cleansing 
Attacking C4I networks 
Exploitation of rules of engagement (ROEs) 
and International laws of war (ILOW) 
Exploitation of humanitarian relief 
organizations i.e. Red Crescent, CAIR, etc… 
Shift in focus from enemy’s front to his 
rear; 
Use the enemy’s strength against him
Many of the methods used in 4GW aren't new and 
have robust historical precedent. However, there are 
important differences in how it is applied today. 
These include: 
38/26 
Differences 
Global -- modern technologies and economic 
integration enable global operations. 
Pervasive -- the decline of nation-state warfare has 
forced all open conflict into the 4GW mold. 
Granularity -- extremely small viable groups and 
variety of reasons for conflict. 
Vulerability -- open societies and economies. UNCLASSIFIED
39/26 
Differences II. 
Technology -- new technologies have 
dramatically increased the productivity of 
small groups of 4GW warriors. 
Media -- global media saturation makes 
possible an incredible level of manipulation. 
Networked -- new organizational types 
made possible by improvements in 
technology are much better at learning, 
surviving, and acting. 
UNCLASSIFIED
4th Generation Warfare (4GW) 
Formless and most deadly kind of war 
4GW ops are intelligence driven. 
Requires constant preparation and 
resourcefulness 
Distinguishing a combatant from a non-combatant 
40/26 
(civil) can be extremely difficult 
Can hit anytime, anywhere, anything and 
anyone
Victory in 4GW warfare is won in the moral sphere. The aim 
of 4GW is to destroy the moral bonds that allows the organic 
whole to exist -- cohesion. This is done by reinforcing the 
following (according to Boyd): 
41/26 
Winning a 4GW conflict 
Menace. Attacks that undermine or threaten 
basic human survival instincts. 
Mistrust. Increases divisions between 
groups (ie. conservatives and liberals in the 
US). 
Uncertainty. Undermine economic activity 
by decreasing confidence in the future. 
UNCLASSIFIED
42/26 
Center of Gravity Is The People 
Leverage unconventional capabilities 
against insurgents. Become cellular like 
“them”. Defeat a networked threat with a 
network. 
Develop small independent action forces 
(SIAF). 
Establish disciplined, well trained and 
highly mobile, counter guerrilla forces. 
UNCLASSIFIED
Power of Perception & Influence As 
43/26 
“Ammo” 
Money is ammunition 
Food is ammunition 
Medicine is ammunition 
Education is ammunition 
Fuel is ammunition 
Employment is ammunition 
Recognition is ammunition 
Respect is ammunition 
Information and knowledge is ammunition
44/26 
Summary 
UNCLASSIFIED
Questions? 
UNCLASSIFIED 45/26

More Related Content

What's hot

Civil – military relations in india a perspective
Civil – military relations in india   a perspectiveCivil – military relations in india   a perspective
Civil – military relations in india a perspectiveUmong Sethi
 
071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation OverlayMintcho Mintchev
 
Sun tzu presentation
Sun tzu presentationSun tzu presentation
Sun tzu presentationleftax
 
The Soviet-Afghan war
The Soviet-Afghan warThe Soviet-Afghan war
The Soviet-Afghan warSayedModassir
 
Coercive diplomacy, 26 11-2012 22h38
Coercive diplomacy, 26 11-2012 22h38Coercive diplomacy, 26 11-2012 22h38
Coercive diplomacy, 26 11-2012 22h38Paulina Méndez
 
Catino pdf from ancient to modern war: An Overview of Fourth Generation Warfare
Catino pdf from ancient to modern war: An Overview of Fourth Generation WarfareCatino pdf from ancient to modern war: An Overview of Fourth Generation Warfare
Catino pdf from ancient to modern war: An Overview of Fourth Generation Warfaremartincatino
 
Theories of war
Theories of warTheories of war
Theories of warmrlile
 
Civil military relation
Civil military relationCivil military relation
Civil military relationaungkokotoe
 
War and Warfare - An Overview
War and Warfare - An Overview War and Warfare - An Overview
War and Warfare - An Overview Nilendra Kumar
 
Sun Tzu\'s The Art of War
Sun Tzu\'s The Art of WarSun Tzu\'s The Art of War
Sun Tzu\'s The Art of WarRod Medallion
 
Cooperation under the security dilemma
Cooperation under the security dilemmaCooperation under the security dilemma
Cooperation under the security dilemmaSamin Mohebbi
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Eisenhower foreign policy
Eisenhower foreign policyEisenhower foreign policy
Eisenhower foreign policykellycrowell
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysisatrantham
 
Carl von clausewitz
Carl von clausewitzCarl von clausewitz
Carl von clausewitzShafiq Ridz
 
Ops Terms And Graphics
Ops Terms And GraphicsOps Terms And Graphics
Ops Terms And GraphicsRobertmoe
 
Diplomacy today and tomorrow. The role of public diplomacy
Diplomacy today and tomorrow. The role of public diplomacyDiplomacy today and tomorrow. The role of public diplomacy
Diplomacy today and tomorrow. The role of public diplomacyKatarzyna Rybka-Iwańska
 
National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implicationsrajaram.muthukrishnan
 

What's hot (20)

Civil – military relations in india a perspective
Civil – military relations in india   a perspectiveCivil – military relations in india   a perspective
Civil – military relations in india a perspective
 
071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay
 
Sun tzu presentation
Sun tzu presentationSun tzu presentation
Sun tzu presentation
 
The Soviet-Afghan war
The Soviet-Afghan warThe Soviet-Afghan war
The Soviet-Afghan war
 
Coercive diplomacy, 26 11-2012 22h38
Coercive diplomacy, 26 11-2012 22h38Coercive diplomacy, 26 11-2012 22h38
Coercive diplomacy, 26 11-2012 22h38
 
Catino pdf from ancient to modern war: An Overview of Fourth Generation Warfare
Catino pdf from ancient to modern war: An Overview of Fourth Generation WarfareCatino pdf from ancient to modern war: An Overview of Fourth Generation Warfare
Catino pdf from ancient to modern war: An Overview of Fourth Generation Warfare
 
Theories of war
Theories of warTheories of war
Theories of war
 
Civil military relation
Civil military relationCivil military relation
Civil military relation
 
War and Warfare - An Overview
War and Warfare - An Overview War and Warfare - An Overview
War and Warfare - An Overview
 
Non-military dimension of the hybrid war in Ukraine
Non-military dimension of the hybrid war  in UkraineNon-military dimension of the hybrid war  in Ukraine
Non-military dimension of the hybrid war in Ukraine
 
Sun Tzu\'s The Art of War
Sun Tzu\'s The Art of WarSun Tzu\'s The Art of War
Sun Tzu\'s The Art of War
 
Cooperation under the security dilemma
Cooperation under the security dilemmaCooperation under the security dilemma
Cooperation under the security dilemma
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Eisenhower foreign policy
Eisenhower foreign policyEisenhower foreign policy
Eisenhower foreign policy
 
Causes of war
Causes of warCauses of war
Causes of war
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
Carl von clausewitz
Carl von clausewitzCarl von clausewitz
Carl von clausewitz
 
Ops Terms And Graphics
Ops Terms And GraphicsOps Terms And Graphics
Ops Terms And Graphics
 
Diplomacy today and tomorrow. The role of public diplomacy
Diplomacy today and tomorrow. The role of public diplomacyDiplomacy today and tomorrow. The role of public diplomacy
Diplomacy today and tomorrow. The role of public diplomacy
 
National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implications
 

Viewers also liked

Justness of war on terror
Justness of war on terrorJustness of war on terror
Justness of war on terrorsteffz
 
Effect based operation
Effect based operationEffect based operation
Effect based operationWahid haque
 
Effects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For PractitionersEffects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For PractitionersDouglas Webster
 
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...IBMGovernmentCA
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni
 
Social media for the Military
Social media for the MilitarySocial media for the Military
Social media for the MilitaryUlrich Janßen
 
9/11 Afghanistan War
9/11 Afghanistan War 9/11 Afghanistan War
9/11 Afghanistan War Zauq Akhtar
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfareLex Pit
 
Government and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use StudyGovernment and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use StudyNativa
 
Military Operations and Social Media
Military Operations and Social MediaMilitary Operations and Social Media
Military Operations and Social MediaInfo Ops HQ
 
Effect of war against terrorism on pakistan
Effect of war against terrorism on pakistanEffect of war against terrorism on pakistan
Effect of war against terrorism on pakistanMuhammad-Usman-Sabir
 
Indian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity ConflictsIndian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity ConflictsNilendra Kumar
 
War in Afghanistan
War in AfghanistanWar in Afghanistan
War in Afghanistanmrbruns
 
Improvised Explosive Devices(IED)
Improvised Explosive Devices(IED) Improvised Explosive Devices(IED)
Improvised Explosive Devices(IED) Akshad Veer
 
In-depth IED Awareness Training
In-depth IED Awareness TrainingIn-depth IED Awareness Training
In-depth IED Awareness TrainingChris Fearnley
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
National Security College 29 August 2013
National Security College 29 August 2013National Security College 29 August 2013
National Security College 29 August 2013Bob Crawshaw
 

Viewers also liked (20)

Coming To America2004
Coming To America2004Coming To America2004
Coming To America2004
 
Justness of war on terror
Justness of war on terrorJustness of war on terror
Justness of war on terror
 
Effect based operation
Effect based operationEffect based operation
Effect based operation
 
Clausewitz and terrorism
Clausewitz and terrorismClausewitz and terrorism
Clausewitz and terrorism
 
Effects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For PractitionersEffects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For Practitioners
 
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealed
 
Social media for the Military
Social media for the MilitarySocial media for the Military
Social media for the Military
 
9/11 Afghanistan War
9/11 Afghanistan War 9/11 Afghanistan War
9/11 Afghanistan War
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfare
 
Government and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use StudyGovernment and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use Study
 
Military Operations and Social Media
Military Operations and Social MediaMilitary Operations and Social Media
Military Operations and Social Media
 
Effect of war against terrorism on pakistan
Effect of war against terrorism on pakistanEffect of war against terrorism on pakistan
Effect of war against terrorism on pakistan
 
Indian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity ConflictsIndian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity Conflicts
 
War in Afghanistan
War in AfghanistanWar in Afghanistan
War in Afghanistan
 
Improvised Explosive Devices(IED)
Improvised Explosive Devices(IED) Improvised Explosive Devices(IED)
Improvised Explosive Devices(IED)
 
In-depth IED Awareness Training
In-depth IED Awareness TrainingIn-depth IED Awareness Training
In-depth IED Awareness Training
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
National Security College 29 August 2013
National Security College 29 August 2013National Security College 29 August 2013
National Security College 29 August 2013
 

Similar to 4GW

IWAR Briefing Maltz
IWAR Briefing MaltzIWAR Briefing Maltz
IWAR Briefing Maltzrichardmaltz
 
Victory Amongst People - Mills- Richards - Ewen McLay
Victory Amongst People - Mills- Richards - Ewen McLayVictory Amongst People - Mills- Richards - Ewen McLay
Victory Amongst People - Mills- Richards - Ewen McLayEwen McLay
 
The Sharpest Knife in a Gunfight
The Sharpest Knife in a GunfightThe Sharpest Knife in a Gunfight
The Sharpest Knife in a GunfightTed Middleton
 
US Pol-Mil Presence in the Asia-Pacific.8
US Pol-Mil Presence in the Asia-Pacific.8US Pol-Mil Presence in the Asia-Pacific.8
US Pol-Mil Presence in the Asia-Pacific.8Michael Kraig
 
Military aspect of politics
Military aspect of politicsMilitary aspect of politics
Military aspect of politicsaungkokotoe
 
A Good Answer to an Obsolete Question
A Good Answer to an Obsolete QuestionA Good Answer to an Obsolete Question
A Good Answer to an Obsolete QuestionSteadman1005
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...runningman825
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...runningman825
 
Strategies for the war on terrorism [compatibility mode]
Strategies for the war on terrorism [compatibility mode]Strategies for the war on terrorism [compatibility mode]
Strategies for the war on terrorism [compatibility mode]MoonKJun
 
Beyond Pain Coercing Violent Non-State Actors By Troy .docx
Beyond Pain Coercing Violent Non-State Actors  By Troy .docxBeyond Pain Coercing Violent Non-State Actors  By Troy .docx
Beyond Pain Coercing Violent Non-State Actors By Troy .docxhartrobert670
 
Deren_CRO_PSO NATO doctrine v02
Deren_CRO_PSO NATO doctrine v02Deren_CRO_PSO NATO doctrine v02
Deren_CRO_PSO NATO doctrine v02Jerzy Deren
 
Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Vic Artiga
 
The Kennedy Doctrine of Flexible Response Flexible Response.docx
The Kennedy Doctrine of Flexible Response Flexible Response.docxThe Kennedy Doctrine of Flexible Response Flexible Response.docx
The Kennedy Doctrine of Flexible Response Flexible Response.docxoreo10
 
Dissertation_(Final)
Dissertation_(Final)Dissertation_(Final)
Dissertation_(Final)Conor Powell
 
UNITED STATES ARMY SPECIAL OPERATIONS COMMAND USASOC.docx
UNITED STATES ARMY SPECIAL OPERATIONS COMMAND USASOC.docxUNITED STATES ARMY SPECIAL OPERATIONS COMMAND USASOC.docx
UNITED STATES ARMY SPECIAL OPERATIONS COMMAND USASOC.docxouldparis
 

Similar to 4GW (20)

4 g wfinal (2)
4 g wfinal (2)4 g wfinal (2)
4 g wfinal (2)
 
IWAR Briefing Maltz
IWAR Briefing MaltzIWAR Briefing Maltz
IWAR Briefing Maltz
 
Victory Amongst People - Mills- Richards - Ewen McLay
Victory Amongst People - Mills- Richards - Ewen McLayVictory Amongst People - Mills- Richards - Ewen McLay
Victory Amongst People - Mills- Richards - Ewen McLay
 
The Sharpest Knife in a Gunfight
The Sharpest Knife in a GunfightThe Sharpest Knife in a Gunfight
The Sharpest Knife in a Gunfight
 
War
WarWar
War
 
US Pol-Mil Presence in the Asia-Pacific.8
US Pol-Mil Presence in the Asia-Pacific.8US Pol-Mil Presence in the Asia-Pacific.8
US Pol-Mil Presence in the Asia-Pacific.8
 
FGAW
FGAWFGAW
FGAW
 
Military aspect of politics
Military aspect of politicsMilitary aspect of politics
Military aspect of politics
 
A Good Answer to an Obsolete Question
A Good Answer to an Obsolete QuestionA Good Answer to an Obsolete Question
A Good Answer to an Obsolete Question
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
 
Strategies for the war on terrorism [compatibility mode]
Strategies for the war on terrorism [compatibility mode]Strategies for the war on terrorism [compatibility mode]
Strategies for the war on terrorism [compatibility mode]
 
Beyond Pain Coercing Violent Non-State Actors By Troy .docx
Beyond Pain Coercing Violent Non-State Actors  By Troy .docxBeyond Pain Coercing Violent Non-State Actors  By Troy .docx
Beyond Pain Coercing Violent Non-State Actors By Troy .docx
 
Subject index
Subject indexSubject index
Subject index
 
491
491491
491
 
Deren_CRO_PSO NATO doctrine v02
Deren_CRO_PSO NATO doctrine v02Deren_CRO_PSO NATO doctrine v02
Deren_CRO_PSO NATO doctrine v02
 
Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...
 
The Kennedy Doctrine of Flexible Response Flexible Response.docx
The Kennedy Doctrine of Flexible Response Flexible Response.docxThe Kennedy Doctrine of Flexible Response Flexible Response.docx
The Kennedy Doctrine of Flexible Response Flexible Response.docx
 
Dissertation_(Final)
Dissertation_(Final)Dissertation_(Final)
Dissertation_(Final)
 
UNITED STATES ARMY SPECIAL OPERATIONS COMMAND USASOC.docx
UNITED STATES ARMY SPECIAL OPERATIONS COMMAND USASOC.docxUNITED STATES ARMY SPECIAL OPERATIONS COMMAND USASOC.docx
UNITED STATES ARMY SPECIAL OPERATIONS COMMAND USASOC.docx
 

More from Janos Tomolya

Developed western countries ds 2020 (1)
Developed western countries ds   2020 (1)Developed western countries ds   2020 (1)
Developed western countries ds 2020 (1)Janos Tomolya
 
Neo weberian model (2) ds - 2020 (1)
Neo weberian model (2) ds - 2020 (1)Neo weberian model (2) ds - 2020 (1)
Neo weberian model (2) ds - 2020 (1)Janos Tomolya
 
Post communist countries ds - 2020 (1)
Post communist countries ds - 2020 (1)Post communist countries ds - 2020 (1)
Post communist countries ds - 2020 (1)Janos Tomolya
 
al Qaeda and its affiliates 2020.
al Qaeda and its affiliates 2020.al Qaeda and its affiliates 2020.
al Qaeda and its affiliates 2020.Janos Tomolya
 
Si 4th lecture - 2020 (b)
Si   4th lecture - 2020 (b)Si   4th lecture - 2020 (b)
Si 4th lecture - 2020 (b)Janos Tomolya
 
State and religion (2) 2020 (1)
State and religion (2)   2020 (1)State and religion (2)   2020 (1)
State and religion (2) 2020 (1)Janos Tomolya
 
State and religion (1) 2020 (1)
State and religion (1)   2020 (1)State and religion (1)   2020 (1)
State and religion (1) 2020 (1)Janos Tomolya
 
Si 4th lecture - 2020 (1)
Si   4th lecture - 2020 (1)Si   4th lecture - 2020 (1)
Si 4th lecture - 2020 (1)Janos Tomolya
 
Si 3rd lecture 2020 (1)
Si   3rd lecture 2020 (1)Si   3rd lecture 2020 (1)
Si 3rd lecture 2020 (1)Janos Tomolya
 
Si 2nd lecture - 2020 (1)
Si   2nd lecture - 2020 (1)Si   2nd lecture - 2020 (1)
Si 2nd lecture - 2020 (1)Janos Tomolya
 
Si 1st lecture 2020 (1)
Si   1st lecture 2020 (1)Si   1st lecture 2020 (1)
Si 1st lecture 2020 (1)Janos Tomolya
 
Islamic fundamentalism and radical islam 2020 (1)
Islamic fundamentalism and radical islam 2020 (1)Islamic fundamentalism and radical islam 2020 (1)
Islamic fundamentalism and radical islam 2020 (1)Janos Tomolya
 
Crisis of modernization in the islamic word 2020 (1)
Crisis of modernization in the islamic word   2020 (1)Crisis of modernization in the islamic word   2020 (1)
Crisis of modernization in the islamic word 2020 (1)Janos Tomolya
 
Basic facts of islam
Basic facts of islamBasic facts of islam
Basic facts of islamJanos Tomolya
 
Islam and history of development Islamic states
Islam and history of development Islamic statesIslam and history of development Islamic states
Islam and history of development Islamic statesJanos Tomolya
 
Crisis in the Middle East Hezbollah
Crisis in the Middle East HezbollahCrisis in the Middle East Hezbollah
Crisis in the Middle East HezbollahJanos Tomolya
 
Crisis in the middle east hamas 2017
Crisis in the middle east hamas 2017Crisis in the middle east hamas 2017
Crisis in the middle east hamas 2017Janos Tomolya
 

More from Janos Tomolya (20)

Developed western countries ds 2020 (1)
Developed western countries ds   2020 (1)Developed western countries ds   2020 (1)
Developed western countries ds 2020 (1)
 
Neo weberian model (2) ds - 2020 (1)
Neo weberian model (2) ds - 2020 (1)Neo weberian model (2) ds - 2020 (1)
Neo weberian model (2) ds - 2020 (1)
 
Post communist countries ds - 2020 (1)
Post communist countries ds - 2020 (1)Post communist countries ds - 2020 (1)
Post communist countries ds - 2020 (1)
 
Isis 2020
Isis   2020Isis   2020
Isis 2020
 
al Qaeda and its affiliates 2020.
al Qaeda and its affiliates 2020.al Qaeda and its affiliates 2020.
al Qaeda and its affiliates 2020.
 
Si 4th lecture - 2020 (b)
Si   4th lecture - 2020 (b)Si   4th lecture - 2020 (b)
Si 4th lecture - 2020 (b)
 
State and religion (2) 2020 (1)
State and religion (2)   2020 (1)State and religion (2)   2020 (1)
State and religion (2) 2020 (1)
 
State and religion (1) 2020 (1)
State and religion (1)   2020 (1)State and religion (1)   2020 (1)
State and religion (1) 2020 (1)
 
Si 4th lecture - 2020 (1)
Si   4th lecture - 2020 (1)Si   4th lecture - 2020 (1)
Si 4th lecture - 2020 (1)
 
Si 3rd lecture 2020 (1)
Si   3rd lecture 2020 (1)Si   3rd lecture 2020 (1)
Si 3rd lecture 2020 (1)
 
Si 2nd lecture - 2020 (1)
Si   2nd lecture - 2020 (1)Si   2nd lecture - 2020 (1)
Si 2nd lecture - 2020 (1)
 
Si 1st lecture 2020 (1)
Si   1st lecture 2020 (1)Si   1st lecture 2020 (1)
Si 1st lecture 2020 (1)
 
Islamic fundamentalism and radical islam 2020 (1)
Islamic fundamentalism and radical islam 2020 (1)Islamic fundamentalism and radical islam 2020 (1)
Islamic fundamentalism and radical islam 2020 (1)
 
Crisis of modernization in the islamic word 2020 (1)
Crisis of modernization in the islamic word   2020 (1)Crisis of modernization in the islamic word   2020 (1)
Crisis of modernization in the islamic word 2020 (1)
 
Basic facts of islam
Basic facts of islamBasic facts of islam
Basic facts of islam
 
Islam and history of development Islamic states
Islam and history of development Islamic statesIslam and history of development Islamic states
Islam and history of development Islamic states
 
Crisis in the Middle East Hezbollah
Crisis in the Middle East HezbollahCrisis in the Middle East Hezbollah
Crisis in the Middle East Hezbollah
 
Col Tomolya ISIS
Col Tomolya ISISCol Tomolya ISIS
Col Tomolya ISIS
 
Crisis in the middle east hamas 2017
Crisis in the middle east hamas 2017Crisis in the middle east hamas 2017
Crisis in the middle east hamas 2017
 
9_11
9_119_11
9_11
 

Recently uploaded

well logging & petrophysical analysis.pptx
well logging & petrophysical analysis.pptxwell logging & petrophysical analysis.pptx
well logging & petrophysical analysis.pptxzaydmeerab121
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubaikojalkojal131
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuinethapagita
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naJASISJULIANOELYNV
 
PROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalPROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalMAESTRELLAMesa2
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...D. B. S. College Kanpur
 
Biological classification of plants with detail
Biological classification of plants with detailBiological classification of plants with detail
Biological classification of plants with detailhaiderbaloch3
 
bonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girlsbonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girlshansessene
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 
Quarter 4_Grade 8_Digestive System Structure and Functions
Quarter 4_Grade 8_Digestive System Structure and FunctionsQuarter 4_Grade 8_Digestive System Structure and Functions
Quarter 4_Grade 8_Digestive System Structure and FunctionsCharlene Llagas
 
Organic farming with special reference to vermiculture
Organic farming with special reference to vermicultureOrganic farming with special reference to vermiculture
Organic farming with special reference to vermicultureTakeleZike1
 
Servosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by PetrovicServosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by PetrovicAditi Jain
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...Universidade Federal de Sergipe - UFS
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptxpallavirawat456
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringPrajakta Shinde
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPirithiRaju
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 

Recently uploaded (20)

well logging & petrophysical analysis.pptx
well logging & petrophysical analysis.pptxwell logging & petrophysical analysis.pptx
well logging & petrophysical analysis.pptx
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by na
 
PROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalPROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and Vertical
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
 
Biological classification of plants with detail
Biological classification of plants with detailBiological classification of plants with detail
Biological classification of plants with detail
 
bonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girlsbonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girls
 
Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
Quarter 4_Grade 8_Digestive System Structure and Functions
Quarter 4_Grade 8_Digestive System Structure and FunctionsQuarter 4_Grade 8_Digestive System Structure and Functions
Quarter 4_Grade 8_Digestive System Structure and Functions
 
Organic farming with special reference to vermiculture
Organic farming with special reference to vermicultureOrganic farming with special reference to vermiculture
Organic farming with special reference to vermiculture
 
Servosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by PetrovicServosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by Petrovic
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptx
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical Engineering
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 

4GW

  • 1. Centre of Excellence - Defence Against Terrorism FFoouurrtthh GGeenneerraattiioonnss ooff MMooddeerrnn WWaarrffaarree ((44GGWW)) COL Engr. JÁNOS TOMOLYA Ph.D. HUN Army UNCLASSIFIED 1/26 Chief of Capabilities
  • 2. Agenda : 1. Introduction; 2. Different classification of war (epochs, waves, forms); 3. Asymmetric Warfare; 4. Military cultures; 5. Fourth Generation of modern warfare; 2/26
  • 3. 3/26 The Next War? How can we avoid being like the French knights at the Battle of Agincourt?
  • 7. 7/26 Number of terrorist attacks 2003-2011
  • 8. 8/26 Military Expenditure UNCLASSIFIED SIPRI: 1531 billions USD in 2009
  • 10. 10/26 1. Different classification of war: Epochs Dr T. Lindsay Moore and Robert J. Bunker : 4 epochs, based on energy sources  human energy  animal-based energy  mechanical energy  post-mechanical energy: UNCLASSIFIED Advanced technology warfare Non-Western warfare
  • 11. Alvin and Heidi Toffler developed a theory of warfare based on the economic and societal changes of civilization. 11/26 Waves Agricultural war Industrial-based war (late of 17th century) Knowledge-based war (from 1980s) UNCLASSIFIED
  • 12. 12/26 Forms of warfare Symmetric Dissymmetric Asymmetric /Eric Walters/ After WWII more than 160 armed conflicts; 75% of them were asymmetric UNCLASSIFIED
  • 13. 13/26 Symmetric In symmetric conflicts, the two opposing adversaries dispose of armed forces that are similar in all aspects such as force structure, doctrine and assets and have comparable tactical, operational and strategic objectives. UNCLASSIFIED
  • 14. A conflict is dissymmetric when one of the opposing forces is superior by means of force structure, doctrine and assets, but both parties are striving for similar political and military objectives. 14/26 Dissymmetric UNCLASSIFIED
  • 16. 16/26 2. Asymmetric Warfare (AW) One of the opponents is unable or unwilling to wage the war with comparable force structure, doctrine and assets and has different political and military objectives than his adversary.
  • 17. 17/26 Asymmetric Warfare (AW)  What is it? David and Goliath warfare Unsophisticated vs. the sophisticated (technologically) Poor countries or entities against rich countries or rich entities Threat can be internal or external (i.e. Israel, Vietnam or Afghanistan) Often state sponsored/supported Attacking opponent via indirect means such as Terrorism Critical infrastructures Avoids combat w/ conventional forces Tends to have a purpose that focuses on a force, but not always the case Misc. unconventional means i.e., poisoning water/food supplies, exploitation of media by staging scenes to sway public opinion.
  • 18. 18/26 3. Military cultures Clausewitz: „War is an act of force, and there is no logical limit to the application of that force.” The way of application of force depends on the UNCLASSIFIED military culture.
  • 19. 19/26 Kinds of Military Cultures Material-centric; Movement-centric; Guerilla warfare Forms: terrorism, guerilla warfare, orthodox warfare;  Types: anarchism; equality-based; tradition-based; pluralist; secessionist; divider; reformer; Used methods: coup d’état; exhausting, focus on military, warfare in build-up areas; UNCLASSIFIED Orthodox warfare
  • 20. Material-centric Strategy of „indirect approach” Characteristics: Daggering wars; Defence; Strategic objective: exhausting of enemy Indirect warfare- not only with military means Main services: air force, navy Preferred by: maritime powers UNCLASSIFIED 20/26 Indirect approach
  • 21. 21/26 Movement-centric UNCLASSIFIED Strategy of „direct approach” Characteristics: Blitzkrieg; Offence; Strategic objective: destroy the enemy Direct warfare- decisive maneuvers Main services: land force, Preferred by: continental powers
  • 22. 22/26 Guerilla warfare UNCLASSIFIED Strategy of „indirect approach in irregular form” Supported by people Characteristics: Hit and run actions; Offence; Strategic objective: exhausting of enemy, provoke a collapse internally Media Indirect warfare- not only with military means Main services: land force
  • 23. 23/26 4. Generations of Warfare COL BOYD Non-linear warfare Focuses on moral-mental-physical portions of enemy & as single entity Focus on the enemy and environment Knowledge of strategic environment Interact w/ environment appropriately UNCLASSIFIED
  • 24. 24/26 New dimensions UNCLASSIFIED
  • 25. 25/26 Trinity Clausewitz: „the war is monopoly of the state” UNCLASSIFIED people government army society
  • 26. 26/26 1GW= Age of Napoleon Massed manpower UNCLASSIFIED
  • 27. 27/26 2 GW= Age of Firepower UNCLASSIFIED Massed firepower... But still in lines
  • 28. 28/26 3 GW= Age of Maneuver UNCLASSIFIED
  • 29. 4 GW= Age of Independent Action Cells Asymmetric warfare in irregular form UNCLASSIFIED 29/26
  • 30. 30/26 4 GW= Age of Independent Action Cells
  • 31. 31/26 Role of Technology in 4GW UNCLASSIFIED
  • 32. The “generations of war” model Peace of Westphalia Precursor activities – going back to Alexander & Sun Tzu (and before) States & non-states wage war Fall of USSR 3 GW state vs. state New commo & transport networks 4 GW States & non-states wage war Nuclear Weapons Proliferate New 2 GW weapons & concepts State-vs-state— only “legal” form of war Nonstate armed groups: partisans, insurgents, anarchists, criminal organizations, etc. 1 GW 1600 1700 1800 1900 2000 UNCLASSIFIED 32/26
  • 33. 4GW can be defined as a method of warfare that uses the following to achieve a moral victory: 33/26 Definition Formless and most deadly kind of war Undermines enemy strengths (this may seem obvious, but most of modern warfare has involved direct attacks on enemy strengths -- find the enemy army and destroy it). Exploits enemy weaknesses. Uses asymmetric operations (weapons and techniques that differ substantially from opponents). UNCLASSIFIED
  • 34. The rise of 4GW is both a product and a driver of the following: The loss of the nation-state's 34/26 Drivers UNCLASSIFIED monopoly on violence. The rise of cultural, ethnic, and religious conflict. Globalization (via technological integration).
  • 35. 35/26 Characteristics Violent non-state actor (VNSA) fighting the state. lacks hierarchal authority lack of formal structure patience and flexibility ability to keep a low profile when needed small size VNSA’s forces are decentralized
  • 36. 36/26 Tactics 4GW is fought on the tactical level via: Rear area operations -- 4GW warriors do not confront a nation-state's military but rather it society. Psychological operations -- terror. Ad-hoc innovation -- use of the enemy's strengths against itself Human shields
  • 37. 37/26 Tactics of 4GW Ethnic cleansing Attacking C4I networks Exploitation of rules of engagement (ROEs) and International laws of war (ILOW) Exploitation of humanitarian relief organizations i.e. Red Crescent, CAIR, etc… Shift in focus from enemy’s front to his rear; Use the enemy’s strength against him
  • 38. Many of the methods used in 4GW aren't new and have robust historical precedent. However, there are important differences in how it is applied today. These include: 38/26 Differences Global -- modern technologies and economic integration enable global operations. Pervasive -- the decline of nation-state warfare has forced all open conflict into the 4GW mold. Granularity -- extremely small viable groups and variety of reasons for conflict. Vulerability -- open societies and economies. UNCLASSIFIED
  • 39. 39/26 Differences II. Technology -- new technologies have dramatically increased the productivity of small groups of 4GW warriors. Media -- global media saturation makes possible an incredible level of manipulation. Networked -- new organizational types made possible by improvements in technology are much better at learning, surviving, and acting. UNCLASSIFIED
  • 40. 4th Generation Warfare (4GW) Formless and most deadly kind of war 4GW ops are intelligence driven. Requires constant preparation and resourcefulness Distinguishing a combatant from a non-combatant 40/26 (civil) can be extremely difficult Can hit anytime, anywhere, anything and anyone
  • 41. Victory in 4GW warfare is won in the moral sphere. The aim of 4GW is to destroy the moral bonds that allows the organic whole to exist -- cohesion. This is done by reinforcing the following (according to Boyd): 41/26 Winning a 4GW conflict Menace. Attacks that undermine or threaten basic human survival instincts. Mistrust. Increases divisions between groups (ie. conservatives and liberals in the US). Uncertainty. Undermine economic activity by decreasing confidence in the future. UNCLASSIFIED
  • 42. 42/26 Center of Gravity Is The People Leverage unconventional capabilities against insurgents. Become cellular like “them”. Defeat a networked threat with a network. Develop small independent action forces (SIAF). Establish disciplined, well trained and highly mobile, counter guerrilla forces. UNCLASSIFIED
  • 43. Power of Perception & Influence As 43/26 “Ammo” Money is ammunition Food is ammunition Medicine is ammunition Education is ammunition Fuel is ammunition Employment is ammunition Recognition is ammunition Respect is ammunition Information and knowledge is ammunition

Editor's Notes

  1. Why we have military science and theory of war? Just because the humanıty spent much more time in war then in peace. So the war is quite loyal phenomen escorting the humanity. What we are waiting from the military science?
  2. Whom future wars will be fought, what they will be about, how they will be fought, what wars will be fought for and why people will participate in it.
  3. How we will fight the next war?
  4. Lets see a little bit the statistics.
  5. AW IS JUST A FANCY WAY OF SAYING “SUCKER PUNCH”. IF THE ENEMY EXPECTS YOU TO HIT W/ A RIGHT HOOK, HIT W/ THE LEFT HOOK INSTEAD. In Sun Tzu’s terms, AW is a way of maintaining “formlessness” Hannibal crossed the Alps on elephants Russia invaded by Napoleon. Japan’s attack on Pearl Harbor. Vietnamese & United States’ lack of will (as a Nation) to win.
  6. Fourth generation warfare(4GW) is a concept defined by William S. Lind and expanded by Thomas X. Hammes, used to describe the decentralized nature of modern warfare. The simplest definition includes any war in which one of the major participants is not a state but rather a violent ideological network. Fourth Generation wars are characterized by a blurring of the lines between war and politics, soldier and civilian, conflict and peace, battlefield and safety.
  7. Clausewitzian trinitarian paradigm the western conceptualization of nation-state warfare,
  8. Second Generation Warfare was based on massed firepower. Tactics relied on fire and movement, with heavy reliance on indirect fire from artillery. It was different, but still essentially linear.
  9. Third Generation Warfare was based on maneuver and real time communications. It was best exemplified by World War II's "Blitzkrieg". The attack relied on infiltration to bypass, cut off and collapse the enemy's main combat forces rather than seeking to close with and destroy them.
  10. Fourth Generation Warfare is based on dispersion and communications that remove the battle front entirely. Attackers rely on cultural/media attack and coordinated violent actions to and paralyze or collapse the enemy's political will, rather than seeking decisive combat. Fourth Generation war is the greatest change since the Peace of Westphalia, because it marks the end of the state’s monopoly on war. Once again, as before 1648, many different entities, not states, are fighting war. They use many different means, including "terrorism" and immigration, not just formal armies. Differences between cultures, not just states, become paramount, and other cultures will not fight the way we fight.
  11. the Western rules and conventions guiding and constraining the conduct of war do not apply at all. There are no fronts, no campaigns, no bases, no uniforms, no publicly displayed honors, and no respect for the territorial limits of states.
  12. This chart plays well as a slide show. As Echevarria rightly notes, 4GW does not lie in the logical sequence of 1/2/3 GW. In fact, the two vertical red lines on the right imply that that sequence has played itself out as state-vs-state warfare fades in significance. 4GW rises from the swamp at the bottom of the figure. The reason that 4GW is sometimes confused with guerrilla warfare is that violent transnational entities often use terrorism and guerrilla warfare methods - the classical way for militarily weak forces to defeat stronger ones. What defines 4GW is - as Lind and van Creveld insist - who fights and what they’re fighting for. Hammes observed that the transnational nature of 4GW means that networking (as in “social networking”) will be an important tool – see The Sling and the Stone – and so successful 4GW groups may resemble political parties that also have an armed component. Hezbullah fits this model, and the events of July 2006 shows how effective it can be. In this chart, “insurgents” are fighting the established government of a state, and “partisans” are fighting occupiers. Clearly there is a lot of overlap and both often use terrorism and guerrilla warfare at various stages of their campaigns. States also employ terrorism against their state and nonstate opponents and often against their own citizens (e.g., Reign of Terror, Halabja, the Holocaust, etc.) Nobody is exactly sure what “anarchists” were fighting for.
  13. While this term is similar to terrorism and asymmetric warfare, it is much narrower. Classical insurgencies and the Indian Wars are examples of Pre-Modern War, not 4GW. Fourth generation warfare usually has the insurgency group or non-state side trying to implement their own government or reestablish an old government over the one currently running the territory. The blurring of lines between state and non-state is further complicated in a democracy by the power of the media.
  14. Fourth generation warfare is normally characterized by a violent non-state actorr (VNSA) fighting a state. This fighting can be physically done, such as by modern examples Hezbollah or the Liberation Tigers of Tamil Eelam (LTTE). In this realm the VNSA uses all three levels of fourth generation warfare. These are the physical (actual combat; it is considered the least important), mental (the will to fight, belief in victory, etc.) and moral (the most important, this includes cultural norms, etc.) levels. Another characteristic of fourth generation warfare is that as with third generation, the VNSA’s forces are decentralized. With fourth generation warfare there may even be no single organisation and that smaller groups organize into impromptu alliances to target a bigger threat (that being the state armed forces or another faction). As a result these alliances are weak and if the state’s military leadership is smart enough they can split their enemy and cause them to fight amongst themselves
  15. ETHNIC CLEANSING: FORMER YUGO, PARTS OF AFRICA HUMAN SHIELDS: IRAQ, SOMALIA, TALIBAN? EXPLOITATION OF POVERTY: I.E. FORMER USSR’S WMD SCIENTISTS MAKING A LIVING BY PROSTITUTING THEIR DEADLY SKILLS/KNOWLEDGE. RUSSIAN MAFIA PROCURING WEAPONS AND WMD TO SELL TO TERRORISTS AND ORGANIZED CRIMINAL ELEMENTS THROUGHOUT THE WORLD. REST IS SELF EXPLANATORY. EXAMPLE OF EXPLOITATION OF U.S. LAWS/U.S. CONSTITUTION ----- Original Message -----> From: XXXXX> To: <undisclosed-recipients:>> Sent: Sunday, June 16, 2002 6:26 AM> Subject: MILINET: I accuse the media in the United States oftreason--Dennis> Pluchinsky>>> >> > washingtonpost.com> >> > They Heard It All Here, And That's the Trouble> >> > By Dennis Pluchinsky> >> > Sunday, June 16, 2002; Page B03> >> >> > I accuse the media in the United States of treason.> >> > I have been analyzing terrorism for the U.S. government for 25 years. My> > specialty is "threat analysis." This is a rather difficult field that> > requires the imagination of Walt Disney, the patience of a kindergarten> > teacher, the mind-set of a chess player, the resolve of a Boston Red Sox> fan,> > the mental acuity of a river boat gambler, and the forecasting abilityof> a> > successful stock market analyst.> >> > While the media have, over the past several weeks, written extensivelyon> > alleged intelligence "failures" surrounding the events of Sept. 11, Iwant> to> > address the media's common-sense "failures." As a terrorism analyst, Iam> > both appalled and confused by many of the post-9/11 articles publishedat> > home and abroad, in newspapers, news magazines and academic journals, as> well> > as on the Internet.> >> > Many of these articles have clearly identified for terrorist groups the> > country's vulnerabilities -- including our food supply, electricalgrids,> > chemical plants, trucking industry, ports, borders, airports, special> events> > and cruise ships. Some of these articles have been lengthy and have> provided> > tactical details useful to terrorist groups. No terrorist group that Iam> > aware of has the time and manpower to conduct this type of extensive> research> > on a multitude of potential targets. Our news media, and certain think> > tankers and academicians, have done and continue to do the target> > vulnerability research for them.> >> > Imagine that you are a supporter or sympathizer of a terrorist group and> you> > have been tasked to identify and collect tactical information onpotential> > U.S. targets. Consider some of the following headlines that haveappeared> > since 9/11: "Private Plane Charters: One Way Around Air Security,"> "Suicidal> > Nuclear Threat Is Seen At Weapons Plants," "Priority Required for> Protecting> > Utilities," "NRC Warns of Missing Radioactive Materials," "Freight> Transport:> > Safe from Terror?" "Chemical Plants Are Feared As Targets," "America's> Roads> > May Be Just As Vulnerable As Its Skies," "Study Assesses Risk of Attackon> > Chemical Plants," "Terror Risk Cited for Cargo Carried on PassengerJets:> 2> > Reports List Security Gaps," and "Truck Terrorism Possible, U.S. Says:> > Investigation Finds Lack of Licensing Safeguards."> >> > I do not understand the media's agenda here. This country is at war. Do> you> > honestly believe that such stories and headlines, pointing out our> > vulnerabilities for Japanese and Nazi saboteurs and fifth columnists,> would> > have been published during World War II? Terrorists gather targeting> > information from open sources and field surveillance. What other sources> do> > they have? Do they have a multibillion-dollar intelligence communitywith> > thousands of employees? Do they have telecommunications satellites to> > intercept communications?> >> > If there's one thing terrorists have been open about, it's theirreliance> on> > open information. In the mid-1980s there was a Belgian left-wingterrorist> > group called the Communist Combatant Cells, or CCC. At the time, it was> > carrying out a series of bombings against American targets in Belgium.The> > media there were speculating that the CCC had plants or spies inside> various> > Belgian agencies to be able to carry out attacks so efficiently. "NATO> > Pipelines Sabotaged: Military Secrets in the Hands of the CCC?" read a> > headline in the Dec. 12, 1984, edition of the Belgian newspaper Le Soir.> > Finally, in a written communiqué disseminated in April 1985, the CCC> > explained how it acquired its targeting information. The communiqué> stated:> > "Being methodical types and having considered the relative accessibility> of> > the pipeline, we consulted the top-secret telephone book where, under> > 'Ministry of Defense,' every pumping station in the entire country is> listed.> > We drew up our lists of all the towns these stations were located in,and> > decided to explore them during long walks in the countryside."> >> > Terrorist groups continue to rely on open sources to come up with> targeting> > ideas and tactical information. This is why the Internet has become so> > valuable to terrorist groups. Richard Clarke, head of the White House's> > Office of Cyber defenses and probably the most knowledgeable high-level> > government official on terrorism, testified to Congress on Feb. 13 that,> > based on evidence found in the caves of Afghanistan, al Qaeda "was using> the> > Internet to do at least reconnaissance of American utilities andAmerican> > facilities." Furthermore, he noted, "if you put all the unclassified> > information together, sometimes it adds up to something that ought to be> > classified."> >> > So why do the research for the terrorists? For example, "vulnerability"> > articles appearing in the media always contain interviews or commentsfrom> > three or four experts or specialists. It could be the former head of the> > National Highway Traffic Safety Administration, an American Trucking> > Associations official, a union leader, technician or consultant. These> > experts will talk to reporters. None of them would ever talk to a> terrorist.> > Therefore, if not for the media, terrorist groups would have no accessto> the> > insights and wisdom of these people. What also infuriates me is when the> > media publish follow-up reports noting that security measures or> procedures> > around a specific target or system still have not been implemented. Not> only> > do the media identify potential target vulnerabilities for theterrorists> but> > they also provide our foes with progress reports!> >> > In a war situation, it is not business as usual. Use some common sense.> > Certainly, if a reporter or academician believes that he or she has> > discovered a vulnerability or flaw in one of our sectors or systems, itis> > important to let others know. It seems reasonable to me that a process> should> > be established where such articles are filtered through a government> agency> > such as the proposed Department of Homeland Security. A skeptic wouldcall> > this censorship; a patriot would call it cooperation. This type of> > cooperation existed during World War II and believe me, this current war> is a> > "world war" also.> >> > I also am concerned about the many articles detailing how the 9/11> terrorists> > were able to come and live in the United States. These articles havenoted> > which mannerisms of the terrorists aroused the suspicion of their> landlords,> > acquaintances, neighbors, flight instructors and others. Articles have> > pointed out what mistakes the terrorists made and how we failed to pickup> on> > those mistakes. Al Qaeda terrorists now know to pay a speeding ticket> > promptly. They now know not to pay for things with large amounts ofcash.> > They now know to buy some furniture for their apartments or rooms. They> now> > know that they have to act friendly and not surly or antagonistic intheir> > dealings with neighbors and other locals. They know now that they should> have> > a phone installed in their apartments or rooms.> >> > The U.S. media's autopsy of the movements and interactions of earlier> > terrorists may have helped the 9/11 hijackers and others seeking to come> to> > the United States to do us harm. In a March 23 article entitled "The> Jackals> > of Islam" that was published on an Islamic Web site, Abu-Ubaydal-Qurashi,> > believed to be a close aide to Osama bin Laden, commenting on the 9/11> > operatives, stated that "the suicide hijackers studied the lives of> > Palestinian Yehiya Ayash [a Hamas bomb maker who was himselfassassinated]> > and Ramzi Yousef [operational planner of the 1993 World Trade Center> bombing]> > and the security mistakes that led to their downfall while they were> > preparing for the September 11 operation." How did al Qaeda know aboutthe> > security mistakes that led to the death of Ayash and the capture of> Yousef?> > The media, at home and abroad.> >> > Courtrooms can also give terrorists windows into our thinking andmethods.> In> > the 1980s when German terrorists from the leftist Red Army Faction (RAF)> were> > tried in Germany, the prosecution had to detail all of the evidence,> > including how they linked the terrorists to specific attacks. Forensic> > experts from the German BKA (comparable to the FBI) described in theopen> > courtroom how they extracted fingerprints from items left at the attack> > sites. At the time, there were RAF sympathizers and supporters in the> > courtroom who took notes. It did not take long for the RAF terrorists> still> > at large to change their methods -- wearing gloves and spraying their> hands> > with latex so that they would not leave any fingerprints.> >> > The U.S. media are providing a similar service for al Qaeda. I am sure> that> > al Qaeda will fix its mistakes and mannerisms before its next attack in> the> > United States. I say the following with a heavy heart, but if there were> an> > "Osama bin Laden" award given out by al Qaeda, I believe that it wouldbe> > awarded to the U.S news media for their investigative reporting. Thistype> of> > reporting -- carrying specifics about U.S. vulnerabilities -- must be> stopped> > or censored.> >> > I propose that the Department of Homeland Security establish a program> where> > academicians, reporters, think tankers or any citizen could contact the> > department and inform them of security vulnerabilities. If thedepartment> > determined that these vulnerabilities indeed existed, then it couldaward> > "Homeland Security Protective Security" certificates to individuals or> > "Homeland Security Gold Stars" to newspaper or Internet sites that putthe> > country first during a time of war. If displayed on its banner, thisstar> > might increase circulation.> >> > During World War II, there was a security slogan that went: "Loose lips> sinks> > ships." Maybe the current security slogan should be: "Prolific pens> propagate> > terrorist plots." The president and Congress should pass lawstemporarily> > restricting the media from publishing any security information that canbe> > used by our enemies. This was necessary during World War II, it is> necessary> > now. These restrictions were backed by the American public during World> War> > II, and I believe the public would support them now.> >> > As for "treason," well, maybe that accusation against the media is not> > justified. Webster's dictionary defines treason as violation ofallegiance> > toward one's country and lists one of its characteristics as"consciously> and> > purposely acting to aid its enemies." I know the media have not> consciously> > and purposely aided al Qaeda. Therefore, J'accuse the media of lacking> common> > sense. As a concerned terrorism analyst, I say the following to themedia:> > You are making the jobs of terrorism analysts, intelligence officers and> law> > enforcement officials very difficult. Help us, don't hinder us from> defeating> > our enemies.> >> > Dennis Pluchinsky is a senior intelligence analyst with the Diplomatic> > Security Service in the U.S. Department of State. His opinions are> personal> > ones and do not necessarily reflect the views or policies of the State> > Department or any other branch of the U.S. government.> >> >> >> > © 2002 The Washington Post Company
  16. 22 countries of Arab League 300 – 330 millions 5 % of the world population has the youngest 40% under 14. From this population 60 million people is illiterate. Number of translated books from foreign language to Arab in the Arab world is 4.4 / 1 million people this figure in western world is around 900. Poor access to the knowledge!!!