Search results for: military operations
2220 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria
Authors: Emmanuela Ngozi Maduka
Abstract:
In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force
Procedia PDF Downloads 1412219 Implications of Private Military Security Companies on Stewardship of the Profession of Arms
Authors: Kevin Krupski
Abstract:
Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.Keywords: stewardship, military profession, civil-military, security
Procedia PDF Downloads 2482218 The Importance of Information in Psychological Operations for Counterterrorism
Authors: Abbas Fazelinia
Abstract:
Terrorism is not a new phenomenon to the world, yet it remains difficult to define and to counter. Countering terrorism requires several measures that must be taken at the same time. Counterterrorism strategies of most countries depend on military measures. However, those strategies should also focus on nonlethal measures, such as economic, political, and social measures. The psychological dimensions of terrorism must be understood, evaluated, and used in countering terrorism. This study suggests that psychological operations, as nonlethal military operations, can be used to influence individuals not to join terrorist organizations and to facilitate defections from terrorist organizations. However, in order to implement effective psychological operations, one has to have appropriate intelligence about terrorist organizations. Examining terrorist organizations help us to identify their vulnerabilities and obtain this intelligence. This article concludes that terrorists’ motivations, terrorist organizations’ radicalization, recruitment, and conversion processes, ideology, goals, strategies, and general structure form the intelligence requirement for psychological operations in counterterrorism. The methodology used in this article is a mixed method.Keywords: psychological operations, terrorist, counterterrorism, terrorism
Procedia PDF Downloads 3302217 Western and Eastern Ways of Special Warfare: The Strategic History of Special Operations from Western and Eastern Sources
Authors: Adam Kok Wey Leong
Abstract:
Special operations were supposedly a new way of irregular warfare that was officially formed during World War 2. For example, the famous British Special Operations Executive (SOE) and the Americans’ Office for Strategic Services (OSS) – the forerunners of modern day CIA were born in World War 2. These special operations units were tasked with the conduct of sabotage and subversion activities behind enemy lines, placing great importance in forming Fifth Column activities and supporting resistance movements. This pointed to a paradoxical argument that modern day special operations is a product of Western modern military innovation but utilizing Eastern ways of ‘ungentlemanly’ warfare. This thesis is superfluous as special operations had been well practised by both ancient Western empires such as the Greeks and Romans, and around the same time in the East, such as in China, and Japan. This paper will describe the practice of special operations, first from the Western military history of the Greeks during the Peloponnesian war. It will then highlight the similar practice of special operations by the Near Eastern Assassins and Eastern militaries by using examples from the Chinese and the Japanese. This paper propounds that special operations, or ways of warfare as a whole, has no cultural and geographical divide, but rather very similarly practiced by men from all over the world. Ideas of fighting, killing and ultimately winning a war have similar undertones – attempts to find ways to win economically and at the least time.Keywords: special operations, strategic culture, ways of warfare, Sun Tzu, Frontinus
Procedia PDF Downloads 4712216 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom
Authors: John Hardy
Abstract:
The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing
Procedia PDF Downloads 1422215 Military Use of Artificial Intelligence under International Humanitarian Law: Insights from Canada
Authors: Mahshid TalebianKiakalayeh
Abstract:
As AI technologies can be used by both civilians and soldiers, it is vital to consider the consequences emanating from AI military as well as civilian use. Indeed, many of the same technologies can have a dual-use. This paper will explore the military uses of AI and assess its compliance with international legal norms. AI developments not only have changed the capacity of the military to conduct complex operations but have also increased legal concerns. The existence of a potential legal vacuum in legal principles on the military use of AI indicates the necessity of more study on compliance with International Humanitarian Law (IHL), the branch of international law which governs the conduct of hostilities. While capabilities of new means of military AI continue to advance at incredible rates, this body of law is seeking to limit the methods of warfare protecting civilian persons who are not participating in an armed conflict. Implementing AI in the military realm would result in potential issues, including ethical and legal challenges. For instance, when intelligence can perform any warfare task without any human involvement, a range of humanitarian debates will be raised as to whether this technology might distinguish between military and civilian targets or not. This is mainly because AI in fully military systems would not seem to carry legal and ethical judgment, which can interfere with IHL principles. The paper will take, as a case study, Canada’s compliance with IHL in the area of AI and the related legal issues that are likely to arise as this country continues to develop military uses of AI.Keywords: artificial intelligence, military use, international humanitarian law, the Canadian perspective
Procedia PDF Downloads 1842214 PTSD in Peacekeepers: A Systematic Review
Authors: Laura Rodrigues Carmona, Maria José Chambel, Vânia Sofia Carvalho
Abstract:
Background: In peacekeeping operations, military personnel are often exposed to the same traumatic stress factors found during conventional war and may also be subject to the physical risks and psychological stressors associated with posttraumatic stress disorder (PTSD). Objectives: To discuss the prevalence of PTSD among peacekeepers as well as the risks of and protective factors against this disorder and its comorbidities and/or consequences. Methods: A systematic literature search was performed with relevant keywords, and 53 articles were identified for this review. Results and conclusions: Military personnel deployed in peacekeeping operations have a higher prevalence of PTSD than nonmilitary personnel, a prevalence similar to that of military personnel deployed in war situations. Concerning the salient risk factors, the contextual factors are highlighted, and in regard to the protective factors, the individual factors are highlighted. This study thus demonstrates that there are factors in which the role of the military is essential, via both its selection and monitoring of peacekeepers during and after their deployment, to protect deployed personnel’s mental health.Keywords: peacekeepers, peacekeeping, military, PTSD, post-traumatic stress disorder, posttraumatic stress disorder
Procedia PDF Downloads 842213 Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population
Authors: Colette Faucher
Abstract:
In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population.Keywords: military psychological operations, social identity, social network, emotion propagation
Procedia PDF Downloads 4092212 Identifying the Strength of Cyclones and Earthquakes Requiring Military Disaster Response
Authors: Chad A. Long
Abstract:
The United States military is now commonly responding to complex humanitarian emergencies and natural disasters around the world. From catastrophic earthquakes in Haiti to typhoons devastating the Philippines, U.S. military assistance is requested when the event exceeds the local government's ability to assist the population. This study assesses the characteristics of catastrophes that surpass a nation’s individual ability to respond and recover from the event. The paper begins with a historical summary of military aid and then analyzes over 40 years of the United States military humanitarian response. Over 300 military operations were reviewed and coded based on the nature of the disaster. This in-depth study reviewed the U.S. military’s deployment events for cyclones and earthquakes to determine the strength of the natural disaster requiring external assistance. The climatological data for cyclone landfall and magnitude data for earthquake epicenters were identified, grouped into regions and analyzed for time-based trends. The results showed that foreign countries will likely request the U.S. military for cyclones with speeds greater or equal to 125 miles an hour and earthquakes at the magnitude of 7.4 or higher. These results of this study will assist the geographic combatant commands in determining future military response requirements.Keywords: military, natural disasters, earthquakes, cyclone
Procedia PDF Downloads 1192211 Exploring Military Crime in the Australian Imperial Force by Officers During The First World War
Authors: Des Lambley
Abstract:
The scope and scale of crime in the AIF is a subject largely overlooked by historians preferring to narrate the macro-scale topics. This examination exposes some 17,000 military criminals, 414 of them officers and illustrates how military law imposed itself. This subjective sociological perspective humanises the impacts of war upon soldiers. Examples of the crimes, their seriousness, punishments and military justice tell of cause and effect linkages between crime, stress and illness. The discourse is derived from original official military sources in the Australian Archives.Keywords: Australia, AIF, Military Crime, WW1, Officers
Procedia PDF Downloads 1302210 The Relationship between Military Expenditure, Military Personnel, Economic Growth, and the Environment
Authors: El Harbi Sana, Ben Afia Neila
Abstract:
In this paper, we study the relationship between the military effort and pollution. A distinction is drawn between the direct and indirect impact of the military effort (military expenditure and military personnel) on pollution, which operates through the impact of military effort on per capita income and the resultant impact of income on pollution. Using the data of 121 countries covering the period 1980–2011, both the direct and indirect impacts of military effort on air pollution emissions are estimated. Our results show that the military effort is estimated to have a positive direct impact on per capita emissions. Indirect effects are found to be positive, the total effect of military effort on emissions is positive for all countries.Keywords: military endeavor, income, emissions of CO2, panel data
Procedia PDF Downloads 3422209 Decision Traps of Military Leaders
Authors: Ahmet Ali Turk, Muhterem Bayram
Abstract:
In this study, it is intended to determine that what kind of traps military leaders fall into during the decision making and how they make take a measure against them. In the study, the domestic and foreign literature on the military leadership has been reviewed and military decision-making process of the different countries has been introduced and study has been designed by making interviews as a sample with 50 people who had made military leadership. The issues resulting from the literature review that led to wrong decisions of military leaders and the points obtained as a result of interview have been evaluated by comparing. As a result, it has been emerged that the personnel who have made especially military leadership are in tendency of making the wrong decision due to decision traps such as excessive self-confidence, lack of experience, unplanned movement, hasty decision making and prohibitive conditions and also the need for increased situational awareness about this condition has been emerged.Keywords: military leadership, decision making, military decision making, military decision making traps
Procedia PDF Downloads 3522208 Promoting Gender Diversity in the UN Peacekeeping Operations: An Analysis of Factors Influencing Female Military Troops Deployment
Authors: Rahab Kisio
Abstract:
The persistent underrepresentation of female miltary in United Nations (UN) peacekeeping missions remains a critical concern for addressing the multifaceted challenges in conflict-affected regions. This research explores the factors influencing countries’ decisions to deploy female military troops to UN peacekeeping operations, examining data ranging from 2010 to 2020. The study highlights the urgent need for policymakers and international organizations to recognize gender equality as key instrument in dealing with sexual exploitation and abuse within these missions. The study suggests three reasons for the low female military troops deployment. Firstly, countries actively breaking down barriers for women in the workforce are more likely to send female military troops. Secondly, nations supporting women in politics are more likely to deploy female military troops, showing their value for gender equality. Lastly, countries with a history of conflict may send more female military troops to align with the UN's call and potentially gain international support in future conflicts. Theoretical approaches are presented to explore these motivations further, and the study uses negative binomial regression with country-year as the unit of analysis to test various explanations for a country's contribution of female military troops to UN peacekeeping missions. Findings shows that there is a connection between troop contributing countries’ gender equality and the participation of female military troops in peacekeeping operations. Nations that prioritize gender equality and empower women have a higher likelihood of deploying more female military personnel. The study emphasizes the significance of women in political leadership, indicating that countries actively addressing barriers to women's political representation are more willing to contribute higher numbers of female military troops to peacekeeping missions. While the research supports hypotheses related to gender equality and political representation, it finds no significant evidence that a country's history of conflict directly influences the deployment of female military troops in other conflict-ridden nations. This research contributes valuable insights into gender equality within peacekeeping forces, shedding light on factors influencing the deployment of female military personnel. The implications underscore the importance of actively addressing discrimination, promoting women's political participation, and understanding the influence of a nation's conflict history. The interdisciplinary nature of this work calls for collaborative efforts from policymakers, international organization, and researchers to formulate strategies for effectively increasing female military troops participation in UN peacekeepingKeywords: UN peacekeeping, gender diversity, female military troops, discrimination
Procedia PDF Downloads 502207 The Lethal Autonomy and Military Targeting Process
Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk
Abstract:
The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)
Procedia PDF Downloads 4272206 Personality of Military Professionals (Commanders) and Their Way of Leading and Commanding Today and in Historical Context
Authors: Petra Hurbišová, Monika Davidová
Abstract:
The article deals with the personality of military professionals (commanders) and their way of leading and commanding today and in historical context. The first part focuses on the leadership skills of Alexander the Great, who introduced strategic innovations and even from today's perspective he excelled in efficient work with people. This paper focuses on the way which he achieved his goals. Further attention is paid to approaches to commander´s personality by other great generals. The paper is also focused on personality traits of military professionals necessary for successful management and leadership in today's variable and challenging environment. Finally, attention is paid to the effective and ineffective ways of behavior of commanders and determined what styles of leadership is appropriate for a given situation, whether in peacetime or when commander is deployed in overseas operations or the state of war.Keywords: authority, commander, leader, leadership, military professional, personality
Procedia PDF Downloads 2832205 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses
Authors: John Hardy, Paul Lushenko
Abstract:
he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.Keywords: gray zone, international security, military operations, national security, strategy
Procedia PDF Downloads 1562204 Pakistan’s Counterinsurgency Operations: A Case Study of Swat
Authors: Arshad Ali
Abstract:
The Taliban insurgency in Swat which started apparently as a social movement in 2004 transformed into an anti-Pakistan Islamist insurgency by joining hands with the Tehrik-e-Taliban Pakistan (TTP) upon its formation in 2007. It quickly spread beyond Swat by 2009 making Swat the second stronghold of TTP after FATA. It prompted the Pakistan military to launch a full-scale counterinsurgency military operation code named Rah-i-Rast to regain the control of Swat. Operation Rah-i-Rast was successful not only in restoring the writ of the State but more importantly in creating a consensus against the spread of Taliban insurgency in Pakistan at political, social and military levels. This operation became a test case for civilian government and military to seek for a sustainable solution combating the TTP insurgency in the north-west of Pakistan. This study analyzes why the counterinsurgency operation Rah-i-Rast was successful and why the previous ones came into failure. The study also explores factors which created consensus against the Taliban insurgency at political and social level as well as reasons which hindered such a consensual approach in the past. The study argues that the previous initiatives failed due to various factors including Pakistan army’s lack of comprehensive counterinsurgency model, weak political will and public support, and states negligence. Also, the initial counterinsurgency policies were ad-hoc in nature fluctuating between military operations and peace deals. After continuous failure, the military revisited its approach to counterinsurgency in the operation Rah-i-Rast. The security forces learnt from their past experiences and developed a pragmatic counterinsurgency model: ‘clear, hold, build, and transfer.’ The military also adopted the population-centric approach to provide security to the local people. This case Study of Swat evaluates the strengths and weaknesses of the Pakistan's counterinsurgency operations as well as peace agreements. It will analyze operation Rah-i-Rast in the light of David Galula’s model of counterinsurgency. Unlike existing literature, the study underscores the bottom up approach adopted by the Pakistan’s military and government by engaging the local population to sustain the post-operation stability in Swat. More specifically, the study emphasizes on the hybrid counterinsurgency model “clear, hold, and build and Transfer” in Swat.Keywords: Insurgency, Counterinsurgency, clear, hold, build, transfer
Procedia PDF Downloads 3632203 Performance of LTE Multicast Systems in the Presence of the Colored Noise Jamming
Authors: S. Malisuwan, J. Sivaraks, N. Madan, N. Suriyakrai
Abstract:
The ever going evolution of advanced wireless technologies makes it financially impossible for military operations to completely manufacture their own equipment. Therefore, Commercial-Off-The-Shelf (COTS) and Modified-Off-The-Shelf (MOTS) are being considered in military mission with low-cost modifications. In this paper, we focus on the LTE multicast systems for military communication systems under tactical environments with jamming condition. We examine the influence of the colored noise jamming on the performance of the LTE multicast systems in terms of the average throughput. The simulation results demonstrate the degradation of the average throughput for different dynamic ranges of the colored noise jamming versus average SNR.Keywords: performance, LTE, multicast, jamming, throughput
Procedia PDF Downloads 4152202 Knowledge Management in a Combined/Joint Environment
Authors: Cory Cannon
Abstract:
In the current era of shrinking budgets, increasing amounts of worldwide natural disasters, state and non-state initiated conflicts within the world. The response has involved multinational coalitions to conduct effective military operations. The need for a Knowledge Management strategy when developing these coalitions have been overlooked in the past and the need for developing these accords early on will save time and help shape the way information and knowledge are transferred from the staff and action officers of the coalition to the decision-makers in order to make timely decisions within an ever changing environment. The aim of this paper is to show how Knowledge Management has developed within the United States military and how the transformation of working within a Combined/ Joint environment in both the Middle East and the Far East has improved relations between members of the coalitions as well as being more effective as a military force. These same principles could be applied to multinational corporations when dealing with cultures and decision-making processes.Keywords: civil-military, culture, joint environment, knowledge management
Procedia PDF Downloads 3632201 Values Education in Military Schools and Işıklar Air Force High School Sample
Authors: Mehmet Eren Çelik
Abstract:
Values are notions that help people to decide what is good or not and to direct their attitude. Teaching values has always been very important throughout the history. Values should be thought in younger ages to get more efficiency. Therefore military schools are the last stop to learn values effectively. That’s why values education in military schools has vital importance. In this study the military side of values education is examined. The purpose of the study is to show how important values education is and why military students need values education. First of all what value is and what values education means is clearly explained and values education in schools and specifically in military schools is stated. Then values education in Işıklar Air Force High School exemplifies the given information.Keywords: Işıklar Air Force High School, military school, values, values education
Procedia PDF Downloads 3852200 Military Role of Russia beyond Its National Boundary
Authors: Nipuli Gajanayake
Abstract:
The Russian military role beyond its national frontier has become a debatable hot topic in the international political arena. It’s advanced, and strategic responses in combating regional and international security problems have always been a factor to debate and criticize. Under such critical circumstances, Russia is attentive to play its military role according to the provisions of the Military Doctrine of the Russian Federation. Most importantly, the legal basis of the doctrine has also consisted with the generally recognized principles and norms of international law. Therefore, Russian international military assistances are pledged to accomplish international peace and security. The expansion of Russian military participation in the United Nations Peacekeeping operations, and military- political, and technical cooperation have largely evident the great effort of Russia in maintaining and restoring international peace and security. Moreover, the conflict management diplomacy and the development of dialogue with nation states to confront military risks and threats can also identify as a part of preserving international peace and security. In addition, Russia strives to strengthen the system of collective security with regional and international organizations through the legal framework of the Collective Security Treaty Organization (CSTO). Maintaining cooperative ties with the Commonwealth of Independent States (CIS), the Organization for Security and Cooperation in Europe (OSCE) and the Shanghai Cooperation Organization (SCO) have highlighted the Russian deliberation on maintaining regional peace and security. Nevertheless, the extension of cordial relations with nation states and providing of military assistances during tensions and conflicts on their territories can also underscore as Russians commitments on maintaining international peace and security. Observing and recognizing the disparity between the West portrayed terms like ‘illegal Russian interventions’ and the comprehensive reality behind the ‘Russian military assistances’ are important to understand. However, a lopsided vision or a perspective towards the Russian international military role would not present a clear understanding about its valued and also dedicated hard work on maintaining international peace and security.Keywords: collective security, diplomacy, international military role of Russia, international peace and security
Procedia PDF Downloads 3002199 The Relationship Between Soldiers’ Psychological Resilience, Leadership Style and Organisational Commitment
Authors: Rosita Kanapeckaite
Abstract:
The modern operational military environment is a combination of factors such as change, uncertainty, complexity and ambiguity. Stiehm (2002) refers to such situations as VUCA situations. VUCA is an acronym commonly used to describe the volatility, uncertainty, complexity and ambiguity of various situations and conditions. Increasingly fast-paced military operations require military personnel to demonstrate readiness and resilience under stressful conditions in order to maintain the optimum cognitive and physical performance necessary to achieve success. Military resilience can be defined as the ability to cope with the negative effects of setbacks and associated stress on military performance and combat effectiveness. In the volatile, uncertain, complex and ambiguous modern operational environment, both current and future operations require and place a higher priority on enhancing and maintaining troop readiness and resilience to win decisively in multidimensional combat. This paper explores the phenomenon of soldiers' psychological resilience, theories of leadership, and commitment to the organisation. The aim of the study is to examine the relationship between soldiers' psychological resilience, leadership style and commitment to the organisation. The study involved 425 professional soldiers, the research method was a questionnaire survey. The instruments used were measures of psychological resilience, leadership styles and commitment to the organisation. Results: transformational leadership style predicts higher psychological resilience, and psychologically resilient professional servicemen are more committed to the organisation. The study confirms the importance of soldiers' psychological resilience for their commitment to the organisation. The paper also discusses practical applications.Keywords: resilience, commitment, solders, leadership style
Procedia PDF Downloads 732198 Understanding Tacit Knowledge and Its Role in Military Organizations: Methods of Managing Tacit Knowledge
Authors: M. Erhan Orhan, Onur Ozdemir
Abstract:
Expansion of area of operation and increasing diversity of threats forced the military organizations to change in many ways. However, tacit knowledge still is the most fundamental component of organizational knowledge. Since it is human oriented and in warfare human stands at the core of the organization. Therefore, military organizations should find effective ways of systematically utilizing tacit knowledge. In this context, this article suggest some methods for turning tacit knowledge into explicit in military organizations.Keywords: tacit knowledge, military, knowledge management, warfare, technology
Procedia PDF Downloads 4862197 Cyber Operational Design and Military Decision Making Process
Authors: M. Karaman, H. Catalkaya
Abstract:
Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation.Keywords: cyber operational design, military decision making process (MDMP), operation planning, end state
Procedia PDF Downloads 5872196 Civil-Military Relations in Turkey, Europe, and Middle East
Authors: Dorsa Bakhshandehgeyazdi
Abstract:
This article tries to comprehend the change of Turkish common military relations in an analogical viewpoint. The investigation is taking into account two criteria: institutional / legitimate systems and political oversight of the military's self-sufficiency. Examination of European furthermore, Middle Eastern common military relations models to the Turkish ideal model discloses grave contrasts in the middle of Turkish and Middle Eastern common military relations. The Turkish model in change for not less than 10 years is closer to the European show in both lawful and political perspectives. However, the article underscores that Turkish common military relations are still in change and despite the fact that the EU increase procedure has continuously democratized the legitimate arrangement of the nation, law based combining obliges further advances in the political area. A the result, stabilization in Turkey depends not just on withdrawing of the military from the political domain, additionally on the best possible civilization of the administration in hypothesis and practice.Keywords: Turkish common military, institutional, legitimate systems, political oversight, middle Eastern common military
Procedia PDF Downloads 4682195 The Evolution of Strike and Intelligence Functions in Special Operations Forces
Authors: John Hardy
Abstract:
The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations.Keywords: counterinsurgency, counterterrorism, intelligence, irregular warfare, military operations, special operations forces
Procedia PDF Downloads 2672194 Displacement Situation in Federally Administered Tribal Areas of Pakistan: Issues and Challenges
Authors: Sohail Ahmad, Inayat Kaleem
Abstract:
Federally Administered Tribal Area(FATA) of Pakistan is one of the most neglected regions in the world as far as development is concerned. It has been the hub of all sorts of illegal activities including militancy and export of terrorism. Therefore, it became inevitable for the government of Pakistan to take action against militants through military operations. Small and large scale military operations are being taken against the non-state actors in FATA with continuity. Over the years, hundreds of thousands have been displaced from the tribal areas of the country. Moreover, military operation Zarb-e-Azb has been launched in North Waziristan Agency in June 2014 to counter militancy across the Af-Pak border region. Though successful in curbing militancy, the operation has displaced around 0.5 million people from the area. Most of them opt to take shelter in the government installed shelter camps, some of them take refuge outside tent villages in the country while some of them prefer to cross into Afghanistan rather their own country Pakistan. This paper will evaluate how the influx of these internally displaced persons in the country is influencing the socio-economic situation of not only the displaced but of the hosting areas as well. Secondly, attention would be given to gauge the impact of such a huge number of displaced population on the law and order and security situation in the host areas.Keywords: Af-Pak, federally administered tribal area, IDPs, internal displacement, Pakistan
Procedia PDF Downloads 3122193 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach
Authors: Bilal Zubair
Abstract:
In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.Keywords: counter-terrorism, terrorism, sectarianism, securitizing
Procedia PDF Downloads 2972192 Hybrid Collaborative-Context Based Recommendations for Civil Affairs Operations
Authors: Patrick Cummings, Laura Cassani, Deirdre Kelliher
Abstract:
In this paper we present findings from a research effort to apply a hybrid collaborative-context approach for a system focused on Marine Corps civil affairs data collection, aggregation, and analysis called the Marine Civil Information Management System (MARCIMS). The goal of this effort is to provide operators with information to make sense of the interconnectedness of entities and relationships in their area of operation and discover existing data to support civil military operations. Our approach to build a recommendation engine was designed to overcome several technical challenges, including 1) ensuring models were robust to the relatively small amount of data collected by the Marine Corps civil affairs community; 2) finding methods to recommend novel data for which there are no interactions captured; and 3) overcoming confirmation bias by ensuring content was recommended that was relevant for the mission despite being obscure or less well known. We solve this by implementing a combination of collective matrix factorization (CMF) and graph-based random walks to provide recommendations to civil military operations users. We also present a method to resolve the challenge of computation complexity inherent from highly connected nodes through a precomputed process.Keywords: Recommendation engine, collaborative filtering, context based recommendation, graph analysis, coverage, civil affairs operations, Marine Corps
Procedia PDF Downloads 1242191 Usage of Military Continuity Management System for Supporting of Emergency Management
Authors: Radmila Hajkova, Jiri Palecek, Hana Malachova, Alena Oulehlova
Abstract:
Ensuring of continuity of business is the basic strategy of every company. Continuity of organization activities includes comprehensive procedures that help in solving unexpected situations of natural and anthropogenic character (for example flood, blaze, economic situations). Planning of continuity operations is a process that helps identify critical processes and implement plans for the security and recovery of key processes. The aim of this article demonstrates application of system approach to managing business continuity called business continuity management systems in military issues. This article describes the life cycle of business continuity management which is based on the established cycle PDCA (plan-do-check-act). After this is carried out by activities which are making by the University of Defence during activation of forces and means of the Integrated rescue system in case of emergencies - accidents at a nuclear power plant in Czech republic. Activities of various stages of deployment earmarked forces and resources are managed and evaluated by using MCMS application (military continuity management system).Keywords: business continuity management system, emergency management, military, nuclear safety
Procedia PDF Downloads 454