Vojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 15-26
Asymmetric WarfareNonreviewed - Other
Most adversaries of our western civilization recognize the information advantage and military superiority of the United States and Euroatlantic area. Rather than acquiesce to any potential Western military domination, they will try to circumvent or minimize US strengths and exploit perceived weaknesses. IT-driven globalization will significantly increase interaction among terrorists, narcotraffickers, weapons proliferators, and organized criminals, who in a networked world will have greater access to information, to technology, to finance, to sophisticated deception-and-denial techniques and to each other. Such asymmetric approaches-whether undertaken by states or nonstate actors-will become the dominant characteristic of most threats to both American homeland and Europe. They will be a challenge for our strategy, operations, force development, and they will require that strategy to maintain focus on traditional, low-technology threats as well as the capacity of potential adversaries to harness elements of proliferating advanced technologies. Among others, the author states 15 variations of plausible asymmetries.
Keywords: asymmetric threat,security environment,theory,asymetric war
Published: September 15, 2007 Show citation
This is an open access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0), which permits non-comercial use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.


