Hybrid Warfare: Konfliktform der Zukunft?
In: Strategie & Technik: Streitkräfte, Rüstung, Sicherheit, Band 53, Heft [4], S. 51-53
ISSN: 1860-5311
20 Ergebnisse
Sortierung:
In: Strategie & Technik: Streitkräfte, Rüstung, Sicherheit, Band 53, Heft [4], S. 51-53
ISSN: 1860-5311
World Affairs Online
In: Strategie & Technik: Streitkräfte, Rüstung, Sicherheit, Band 53, Heft [2], S. 18-21
ISSN: 1860-5311
World Affairs Online
In: Joint force quarterly: JFQ ; a professional military journal, Band 1st Quarter, Heft 52
ISSN: 1070-0692
In: Armed forces journal: AFJ, S. 34-37
ISSN: 0004-220X, 0196-3597
In: Air & space power journal, Band 23, Heft 4, S. 13-18
Virtualization is a technique used to model and simulate the cyber domain, as well as train and educate. Different types of virtualization techniques exist that each support a unique set of benefits and requirements. This research proposes a novel design that incorporates host and network virtualization concepts for a cyber warfare training platform. At the host level, hybrid virtualization combines full and operating system virtualization techniques in order to leverage the benefits and minimize the drawbacks of each individual technique. Network virtualization allows virtual machines to connect in flexible topologies, but it also incurs additional processing overhead. Quantitative analysis falls into two sets of experiments. The first set of experiments evaluates traditional virtualization techniques against the hybrid approach. Results indicate that in some cases, performance of hybrid virtualization exceeds that of full virtualization alone while still providing an identical feature set. The second set of experiments examines the amount of overhead involved with network virtualization with respect to bandwidth and latency. Results indicate that performance over a local area network incurs two to four times the performance cost compared to physical connections. The benefit of this additional overhead is an increased flexibility in defining network topologies at the software level independent of the underlying physical topology.
BASE
In: Occasional paper
The Israel Defense Forces have gained much experience against hybrid opponents -- Hezbollah and Hamas -- in the recent conflicts in Lebanon and Gaza. The lessons from these Israeli experiences are relevant to understanding the capabilities the U.S. Army and the joint force will require in the future. Principal findings include the following. The basics of combined arms fire and maneuver are necessary for successful operations against sophisticated hybrid opponents who, like Hezbollah and Hamas, have a modicum of training, organization, and advanced weapons, particularly if they are operating "among the people." Additionally, precision, standoff fires are critical, but not sufficient, to cope with sophisticated hybrid opponents. Furthermore, responsive and adequate air, artillery, and unmanned aerial system support are critical components of the combined arms fight against hybrid opponents. Finally, heavy forces -- based on tanks and infantry fighting vehicles -- are key elements of any force that will fight sophisticated irregular opponents, because they reduce operational risk and minimize friendly casualties
In: Orbis: FPRI's journal of world affairs, Band 54, Heft 3, S. 441-455
ISSN: 0030-4387
In: Naval forces: international forum for maritime power, Band 28, Heft 4, S. 8-17
ISSN: 0722-8880
In: Sicherheit und Frieden: S + F = Security and Peace, Band 28, Heft 3, S. 145-151
ISSN: 0175-274X
World Affairs Online
In: Policy review: the journal of American citizenship, Heft 157
ISSN: 0146-5945
Examines the rise of hybrid wars that combine elements of conventional & guerilla warfare & the models required for Western democracies to apply to the kind of urban fighting becoming so common in the 21st century. The 2006 Israeli-Hezbollah war & Israel's 2008 Operation Cast Lead in Gaza are described, highlighting problems with the former & improvements in the latter. In Gaza, military operations proceeded better, but Israel had trouble with the political & information dimensions; further, in both campaigns, much criticism leveled against Israel centered on the notion of proportionality. It is argued that these two conflicts illustrate the need to change the laws of war. D. Edelman
Since the recent focus on the Global War on Terror, both military and civilian theorists have begun to "relearn" the intricacies of counterinsurgency warfare. We face difficult challenges when confronting non-state actors that tend to attack in the time between conventional battles and the establishment of stable governments. This research compares and contrasts current counterinsurgency strategies (Hearts and Minds and Cost Benefit Theory) by applying System Dynamics to provide insight into the influences and emergent behavior patterns of counterinsurgency systems. The information gained from the development of the models and from their simulation behaviors is used to construct a System Dynamics model of a Hybrid Counterinsurgency Strategy that combines the influential elements and behaviors from each of the previous models to obtain a more comprehensive model of the counterinsurgency system. This process yields behavior patterns that suggest that security operations, critical during the short-term, are key to disrupting insurgent organizational mechanisms that strongly influence the population's support for the host government and the coalition. The models also demonstrate the strength of the influence of information operations on the counterinsurgency system. Finally, the construction of the models and simulation behaviors propose that harvesting host nation capacity throughout the counterinsurgency is the most influential factor for maintaining long-term stability.
BASE
There has been much research in recent years within the general field of mobile ad hoc networks (MANET) with many proposals submitted to the IETF for consideration. Delay or Disruption Tolerant Networking (DTN) is a relatively new field for routing, concerned with networks that experience long transmission delay or periods of disruption. Military forces around the globe have applied one or the other networking paradigms with varying degrees of success to their own problems of mobility at the lower tactical level (Brigade and below). The fundamental reason for this limited success is that many of the desired tactical scenarios at this level require a network that is not exclusively ad hoc or exclusively disrupted, but rather a network that dynamically adapts to a variety of mobility situations ranging from relatively stable, almost enterprise like, to completely disrupted. Synchronous MANET protocols have limited disruption tolerance at layer 3, and DTN routing protocols, which are further up the network stack, implement hop by hop asynchronous protocols that are unable to take advantage of prolonged network stability. The primary contribution of this thesis is NOMAD, a new hybrid routing protocol for military mobile ad hoc and disrupted networks. NOMAD is unique in that it operates as a proactive synchronous link state MANET protocol when the network is connected, but is able to seamlessly transition into asynchronous DTN mode when required. The results outlined in this thesis indicate that the hybrid NOMAD protocol provides a substantial improvement over standard synchronous MANET protocols. This thesis also makes a significant contribution with respect to synthetic mobility model generation. Mobility models are essential for the correct evaluation of any routing protocol. A mobility modelling tool called SWarMM (Synthetic Warfare Mobility Modelling) was also developed as part of this thesis. SWarMM provides an agent based simulation tool for generating credible synthetic mobility models for use with the ...
BASE
Concepts, Models, and Tools for Information Fusion; Contents v; Foreword xiii; Chapter 1 Introduction 1; Chapter 2 Decision-Making Models 11; Chapter 3 Situation Awareness and Analysis Models 27; Chapter 4 Data- and Information-Fusion Models 69; Chapter 5 Situation Analysis and Decision-Support Systems 119; Chapter 6 Knowledge, Belief, and Uncertainty 141; Chapter 7 Qualitative and Symbolic Approaches 151; Chapter 8 Quantitative Approaches 169; Chapter 9 Hybrid and Graphical Approaches 211; Computational Aspects of Information Fusion 231
In: International review of the Red Cross: humanitarian debate, law, policy, action, Band 91, Heft 873, S. 21-34
ISSN: 1607-5889
AbstractProgressive democratization, the presence of a military superpower and the dream of an international order maintained by an international authority do not enhance the appearance of conventional armed conflicts. However, the discovery of new frailties that can be exploited by aggressors, the proliferation of motives – including ideological motives – for waging war, and the spread of technologies that can be used in new forms of warfare have led to war and armed conflicts breaking out of their classic mould, becoming hybrid and going beyond their previous boundaries. The author argues for an updated polemology which endeavours to explain the mechanisms of these new types of warfare.