DOC PREVIEW
SU PSC 124 - Use of Force
Type Lecture Note
Pages 3

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

PSC 124 1st Edition Lecture 12 Outline of Last Lecture I. Ethnic conflict and intractability (conflict of ideas)II. Religion (conflict of ideas)III. Ideology (conflict of ideas)IV. Territorial disputes (conflict of interests)V. Control of governments (conflict of interests)VI. Economic conflict (conflict of interests)Outline of Current LectureI. Use of force – achieving leverageII. Configuring forces: Military economics and capabilitiesIII. Types of forces IV. Command V. Terrorism VI. Evolving technologies – RMA, cyberwar, electronic warfareCurrent LectureI. Use of force – achieving leverage- diplomacy- trade- international organizations- militaryThese notes represent a detailed interpretation of the professor’s lecture. GradeBuddy is best used as a supplement to your own notes, not as a substitute.- weaponsII. Configuring forces: Military economics and capabilities- states allot parts of the national budget to the military based on their economic health and their goals- choosing weapons and capabilities requires trading off and not spending money on other things- power projection: other states’ perception of how much power a country has. III. Types of forces - types of forces: conventional forces; weapons of mass destruction, encryption and intelligence- conventional forces: armies, navies, air forces, logistics (food, fuel, supplies), intelligence and surveillance- encryption and intelligence: NSA, encrypting and breaking codes, spyingIV. Command - coordination of people and equipment, maintaining control and ensuring smooth operations (group cohesion, discipline, patriotic and professional attitudes)- failure of command: My Lai massacre. 1968, Charlie company, 11th Brigade destroyed a Vietnamese village and killed the inhabitants with no strategic purpose or orders from higher up in the chainV. Terrorism - terrorism: the use of violence and threats to intimidate or coerce- “the calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.”- Political violence that targets civilians deliberately and indiscriminately- Goal is to draw attention to a “cause”, attempt to force governments to change policies- One person’s terrorist is another’s freedom fighter- Primary effect is psychological- Violation of norms of the international system- Criminal act that influences an audience beyond the immediate victims- Targets chosen to symbolize what terrorist group opposes- Terrorist groups often are loosely organized in cells – difficult to find- State sponsored terrorism: use of terrorist groups by states, or actions by states defined as terrorist (Libya- Pan Am flight 103)VI. Evolving technologies – RMA, cyberwar, electronic warfare- electronic warfare: use of electromagnetic spectrum to support war effort (using electronic weapons on the battlefield)- cyberwar: The use of computing systems and the Internet to conduct warfare in cyberspace (hacking, viruses)- RMA – revolution in military affairs (a period when there is a basic transformation in military


View Full Document

SU PSC 124 - Use of Force

Type: Lecture Note
Pages: 3
Download Use of Force
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Use of Force and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Use of Force 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?