Keystones of Irregular Warfare

Open access

Abstract

The current security environment is evolving towards a global complexity of unpredictable events. The risk of state and non-state actors attempting to achieve their goals through destabilization exists. In the operating environment, this implies a blurring of the boundaries between state and nonstate actors (such as insurgents, terrorists and criminals) and NATO may confront an adversary who uses traditional (conventional), irregular warfare or both (hybrid warfare). The aim of the article is to find, analyze and describe the key elements that fundamentally different irregular of traditional (conventional) and hybrid warfare.

[1] AJP-01 Allied Joint Doctrine. Edition E. Version 1. Ratification Draft 1. NATO Standardization Office (NSO), 2016.

[2] Nečas, P., Andrassy, V., Information, technology and human security: new approach requested. In: Military communications and information systems conference - MCC 2009: CIS Technologies Supporting Military Transformation: Prague, September, 2009. ISBN 978-80-7231-678-6.

[3] White, J., B. Some Thoughts on Irregular Warfare. A Different Kind of Threat, Studies in Intelligence [online]: Volume 39, Number 5, 1996.

[4] FM 3-24 Insurgencies and Countering Insurgencies. Washington, DC : Headquarters, Department of the Army. 2014.

[5] AFDD 3-2 Irregular Warfare. Center for Doctrine Development and Education, 2013.

[6] Hybrid warfare. 2010. Washington, DC : United States Government Accountability Office. 2010.

[7] Spilý, P., Military Art Versus Contemporary Security Threats. In: Národná a medzinárodná bezpečnosť 2013 [elektronický zdroj] : zborník vedeckých a odborných prác, pp. 421 - 428, Liptovský Mikuláš, Slovakia, 2013. ISBN 978-80-8040-475-8.

[8] Spilý, P., Hrnčiar, M. Vojenská taktika. Liptovský Mikuláš, Akadémia ozbrojených síl generála Milana Rastislava Štefánika, 2013. ISBN 978-80-8040-471-0.

[9] Majchút, I. Identifikácia podstaty protipovstaleckého boja. In: Národná a medzinárodná bezpečnosť 2011 [elektronický zdroj] : zborník vedeckých a odborných prác., pp. 178- 185, Liptovský Mikuláš, Slovakia, October, 2011. ISBN 978-80-8040-429-1.

[10] AJP-3.4.4 Allied Joint Doctrine for Counterinsurgency (COIN). Edition A Version 1. NATO Standardization Office (NSO), 2016.

[11] Varecha, J. Possible View on the Combat Potential Parameters. In: Národná a medzinárodná bezpečnosť 2016 [elektronický zdroj] : zborník vedeckých a odborných prác, pp. 569-577, Liptovský Mikuláš, Slovakia, October, 2016. ISBN 978-80-8040- 534-2.

[12] Majchút, I., Spilý, P. Insurgency as an Actual Security Challenge. In: Bezpečnostní management a společnost: Sborník z mezinárodní konference, pp. 365-370, Brno, Czech Republic, 2011. ISBN 978-80-7231-790-5.

[13] Trnka, M., Bučka, P. Comparison of Terrorism, Guerrillas and the Conventional War. In: Národná a medzinárodná bezpečnosť 2016 [elektronický zdroj] : zborník vedeckých a odborných prác, pp. 544 - 550, Liptovský Mikuláš, Slovakia, 2016. ISBN 978-80- 8040-534-2.

[14] LIND, W. S. et al. The Changing Face of War: Into the Four Generation. In: Marine Corps Gasette. 1989.

[15] Hrnčiar, M. Spilý, P., Insurgency According to Alliance Doctrines. In: Národná a medzinárodná bezpečnosť 2015 [elektronický zdroj] : zborník vedeckých a odborných prác., pp. 185 - 193, Liptovský Mikuláš, Slovakia, October, 2015. ISBN 978-80-8040- 515-1.

Journal Information

Target Group researchers in the fields of political and financial law

Metrics

All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 89 69 8
PDF Downloads 47 42 6