final Flashcards

1
Q

What is radar?

A

Radio detection and Ranging: system that permits the detection of an object by emitting electromagnetic pulses and capturing echos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is air defence?

A

Air defence, as its name implies, is the act of safeguarding some protected asset or assets—specifically against threats from the air domain. More broadly, air defense plays a key role in providing some countries with the capacity to deny access to their proximity to adversaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between localized and integrated air defence?

A

IADS: structure, equipment, personnel, procedures, and weapons used to counter the enemy’s airborne penetration of one’s own claimed territory. Rather than a single weapon or person, it is an amalgamation of elements, organized to minimize threats in the air domain. Thus, an effective IADS performs three functions—air surveillance, battle management, and weapons control. Of these, air surveillance alone includes five specific sub-functions: detect, initiate, identify, correlate, and maintain. ​​A radar will “detect” an aircraft entering an IADS’s area of coverage, while the “initiate” function transforms radar returns into “tracks.” The “identify” function examines the track and categorizes it as friend, foe, or unknown. Finally, the “maintain” function allows for specific tracks to be continuously monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the radar cross section?

A

The radar cross section (RCS) is a measure of how much a target reflects radar waves back to the radar antenna. It is a complex concept that depends on various factors such as the shape, size, and material properties of the target, as well as the frequency and polarization of the radar signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is stealth and why is it important?

A

Stealth, or aircraft signature reduction, ​​ simply means an object, in this case an aircraft, that is difficult to detect or can only be detected at short range.
Stealth is difficult to defend against because it reduces the enemy’s ability to detect attackers; this complicates air defence efforts and reduces the time for adversaries to react effectively. In addition to increasing the crafts’ survivability, it reduced risk and losses of non-stealthy assets, surprised the enemy, and significantly improved the economy of force by allowing aircraft that would have been tasked for support operations to strike other targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the main ways to reduce observability to radar?

A

Stealth, (especially for land-based radars)concealment, either behind obstacles or behind earth’s curvature-> low altitude flying, jamming, chaff, spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is jamming? What is spoofing?

A

Jamming is about interference while spoofing is creating a vast emission of electromagnetic signals to ‘max up’ the capacity of the radar and its operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are airborne radars important?

A

Not subjected to earth curvature and obstacles that allow low flying crafts to be undetected; longer range (land based ~400 km; airborne ~600-700 km)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the main difference between long wavelength (or low frequency) and short wavelength (or high frequency) radar waves?

A

Low-frequency radar waves travel long distance (but they have low resolution). This is
identifcal to acoustics: basses (which have low frequency) travel much longer than
high pitches (this is why after you have left a concert, you can steal hear the basses far
from it).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is sonar?

A

SOund Navigation And Ranging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is underwater acoustics so important?

A

Before the advent of sonar, detecting submarines was very difficult. Submarines
before WWII submarines were actually “submersible”, they were very slow
underwater, which meant that could not scout the ocean for targets, and they could
spend only limited amount of time underwater (batteries had limited endurance).
Hence, they had to resurface periodically to recharge their batteries by running their
diesel engines.
When on the surface, submarines were more vulnerable. To limit such vulnerability,
during World War II, submarines would generally be underwater during the day, to
avoid visual detection, and they would cruise on the surface at night to look for
targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is anti-submarine warfare?

A

Anti-submarine warfare (ASW) is a branch of underwater warfare that uses surface warships, aircraft, submarines, or other platforms to find, track, and deter, damage, or destroy enemy submarines. The primary goal of ASW is to protect friendly shipping and coastal facilities from submarine attacks and to overcome blockades.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between active and passive sonar?

A

Passive sonar works like the human ear: it listen the environment in search for cues. Because it caputres all the sounds, it captures also low frequency ones, which can travel at very long distance, in particular because of the deep sound channel (or sound fixing and ranging channel), which essentially traps acoustic waves (in deep water) and let them travels potentially thousands of kilometers.
The fielding of active sonar durign World War II changed underwater warfare, and it permitted to scan the waters for a couple of km from the source to look for potential enemy submarines. Active sonar worsk like radar, but rather than emitting electro-magnetic pulses it emits acoustic pulses and capture their echo (return) after encountering an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between attack and ballistic-missile submarines

A

attack - more direct action + cruise missiles
ballistic - deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are submarines considered the first “stealth” weapon system?

A

not visible by radar or sight which were the most prominent, effective and available detection methods of the time->
The answer, in a nutshell, is because they are stealthy: the challenge of detecting through human sight and sensors that are very effective in the atmosphere (radar, laser, thermal, infrared, etc.) makes them an a very effective threat, and hence an ideal platform for a multitude of tasks (coastal defense, conventional deterrent, nuclear deterrent, espionage missions, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do modern submarines maintain their stealth and why is it important?

A

flow noise→ the noise that water/air makes when moved by the object. To avoid you either go slow (operational cost) or increase aerodynamics→ hydrodynamic shape to reduce flow noise
Cavitation→ propeller by rotating produce pressure→ bubbles that travel up→ can be detected→ An increasing number of more geometrically complex blades in propellers to reduce cavitation (cavitation is speed-dependent) and the replacement of propellers with pumpjets
Noise by the machinery inside→ need to reduce it and isolate from outside and the hull, especially for nuclear submarines (ex:Electric subs can be shut down, which means they make no noise. Nuclear cannot be shut down)
Personnel noise→ made by the people→ need to be isolated as well as devices to reduce noise (ex: rubber shoes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the main ways to reduce observability to sonar?

A

reduce turbulence, reduce caviation,
reduce personnel noise, propellor shape, nuclear reactors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What’s the main difference between low-frequency and active-frequency sound waves?

A

passive sonar in the SOFAR (deep sea sound channel) where low frequency are transmitted for thousands of km; active frequency sound for active sonar-> they’re the ‘ping’ which then

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is has the evolution submarine technology gone hand in hand with the evolution of unconventional (asymmetric?) strategies at sea?

A

Because before submarines, the dominant forces for strategies at sea were those of battle ships, submarines allowed for the weaker opponents (Germany) to prevent potential attacks by the British navy because they feared the presence of German submarines. The stealth aspect of submarines work to the advantage of asymmetric warfare because they allow for a weaker opponent to mount an attack on a more significant force using stealth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are competence-enhancing and competence-destroying innovations?

A

Some types of technological change reward existing skills, expertise, and production capabilities, thus reinforcing the leadership of incumbents, while other types of technological change require completely different skills, expertise, and production capabilities, thus allowing for the entry of new actors.
Conversely, competence-destroying technological change cancels out the advantage of dominant actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does it mean that technological change has distributional effects?

A

That technological change has a distributional effect is of central importance for IR, because it questions one of the key premises of the Offense-Defense Balance, namely that the state of technology is a systemic variable, and hence constant across countries This means that technological change can significantly weaken some countries, while strengthening others, economically, politically, or militarily, and hence possibly also affect the system as a whole.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why and how is technological change related to uncertainty?

A

As technology opens up new opportunities, it is difficult to understand and to identify the timing, the type, the direction, and the magnitude of technological change and of its implication—i.e., who will benet and who will lose, as well as when and to what degree. This is a key factor given that, since the 1990s at least, the dominant narrative has pushed private and public organisations alike to adopt new innovations. In fact, under some circumstances, it might be safer not to adopt an innovation, or to postpone its adoption until it is reliable and effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why are some grand-strategic goals dependent on the state of technology?

A

Grand strategies are generally based on assumptions about what the state of technology allows and do not allow us to do. For this reason, technological change can render some grand-strategic goals obsolete.
Some grand-strategic goals such as primacy and latency are contingent on the state of technology, commercial or military.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are dissuasion strategies?

A

Diplomatic efforts: Engaging in diplomatic talks and negotiations to persuade the opponent to reconsider their stance.
Economic sanctions: Imposing economic penalties or restrictions to pressure the opponent to change their behavior.
Military deterrence: Displaying military power or capabilities to deter the opponent from taking a particular action.
Psychological operations: Using propaganda, disinformation, or psychological manipulation to influence the opponent’s perceptions and attitudes.
International pressure: Building a coalition of international support to pressure the opponent to change their behavior.
Offering incentives: Providing rewards or benefits to the opponent to encourage them to abandon their goals or intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the difference between dissuasion, deterrence and compellence?

A

dissuasion can be viewed as a kind of “pre-deterrence” in which the target—which may be an opponent or even an ally—is discouraged, not from employing the military capabilities it possesses, but from creating such capabilities in the first place

deterrence is about deterring your adversary from using any capabilities they already have

compellence ???

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What was the principle behind the “cost-imposing” strategy of the US?

A

An adversary’s perception of the estimated cost of developing or expanding a threatening capability can also be increased by diverting its available resource stream into higher priority areas. This indirect means of dissuasion was a central feature of the “competitive strategies” approach to long-term competition with the Soviet Union during the Cold War.
It is important to remember, however, that when crafting dissuasion strategies that impose costs on an adversary, it is necessary to do so in a way that keeps the rival in the competition, rather than driving him out. In this way dissuasion differs from deterrence, where the higher the cost, the better the deterrent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the difference between technological and conceptual innovation?

A

technological - creation without thought
conceptual - innovation to understand the purpose of the tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why was the Soviet Union ahead of the US?

A

because they had already developed a cohesive theory on the revolution of military affairs, which allowed them to use all of the developments of the US tech to their full advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Why did the Soviet Union, in its documents, attribute its conceptual innovation to the US?

A

they wouldn’t be able to do the advancements that sensors brought without the sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the AirLand Battle

A

you cannot have power on land if you do not have air supremacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the “system of systems”?

A

an integrated triad of (1) ground, air,
and space reconnaissance, surveillance, and target acquisition assets;
(2) direct fire elements and deep-strike weaponry; and (3) advanced
command-and-control that ensured the delivery of strikes close to real
time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the “reconnaissance strike concept”?

A

there was an acute need to develop
an architecture that would consolidate the reconnaissance systems with high precision, fire-destruction elements, linked through the command and control channels
The manifestation of the new concept on the operational level was dubbed the reconnaissance strike complex (RUK) and its tactical expression known as the reconnaissance fire complex (ROK). This combination of sensors and weapons was designed to permit conduct of the war over much greater distances and with greater precision, coordination and pace than ever before.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is creative destruction?

A

Recent accounts of innovation in the civilian economy—the
creation, commercialization (i.e., marketplace introduction), and
diffusion of new goods, services, and organizational practices—commonly embody perspectives associated with Joseph Schumpeter and
the phenomenon he described of “creative destruction,” in which
newly produced goods and services sweep away their predecessors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is uncertainty?

A

In the context of class, uncertainty represents an indeterminate future in which current weapons are being built. The uncertainty is the anticipated but ultimately unknown future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Why does Alic believe that “early design choices largely determine ultimate performances and costs”?

A

For military systems, whether complex or simple, and likewise for
commercial products, early design choices largely determine ultimate
performance and costs. During preliminary design, engineers work
though alternatives, which come in literally uncountable profusion.
Some are kept, others discarded. Analytical tools offer limited support at this stage, which is open-ended and fluid. Because there are
too many permutations to be explored with even the most powerful
computer-based methods, designers rely, as they always have, on tacit
know-how and experience-based judgment. As the design takes on
more concrete form, it becomes increasingly difficult to revisit the
overall concept for reasons including the risk that even the appearance of difficulty or delay could invite political attack. Yet once the
overall “architecture” has been defined, no amount of analysis, modification, and refinement can salvage a deficient concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the difference between the commercial and the defense industry?

A

business vs technological risk

assessment of risks and the projection of the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the difference between the commercial and the defense industry in terms of “risk”?

A

The primary distinction between the commercial and defense industries lies in their approach to risk assessment. Commercial ventures benefit from market mechanisms that quickly resolve uncertainties surrounding innovation, while defense investments lack such immediacy, relying on actual combat tests to determine effectiveness. In the commercial sector, businesses primarily encounter market-driven risks, such as product success, competition, and consumer demand. In contrast, the defense industry deals with technological risks, involving the development and integration of complex systems fraught with uncertainties and technical challenges.

According to John Alic, the main difference between the commercial industry and the defence industry is that the commercial industry regards technological risks as controllable while involving greater business risk, while the defence industry regards business risks as controllable while involving greater technological risk. In the context of US defence acquisition, the risks of technological failure are significantly higher due to the Department ofDefence’s (DoD) tendency to over-reach or impose incompatible requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Why is imitation of modern advanced weapon systems more difficult than in the past?

A

We have argued that the dramatic increase in the complexity of military
technology observed over the twentieth century has signiªcantly shrunk the
advantage of backwardness described by Gerschenkron. On the one hand,
the requirements for imitating modern weapon systems have become harder
to meet. On the other, the technological knowledge of how to design, develop,
and produce modern weapon systems has become less likely to diffuse. As
a result, compared to the pre–World War I period, today imitating foreign
weapon systems is more difªcult. Countries cannot simply free ride on the
research and development of the most advanced states: they ªrst have to develop the industrial, scientiªc, and technological capabilities required for
becoming ªrst-tier weapons manufacturers; then, they must go through extensive trial and error to address the multitude of extremely small but challenging
problems that weapons development entails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is complexity?
Why is complexity relevant?

A

Complexity generates incompatibilities and vulnerabilities. As complexity
increases, the number and significance of incompatibilities and vulnerabilities also increase—exponentially. Anticipating, detecting, identifying, understanding, and addressing all possible technical problems when designing,
developing, and manufacturing an advanced weapon system pose major challenges. Addressing them without creating new problems is an even greater
challenge. More challenging still is the need for weapons producers to design
platforms that can incorporate cutting-edge and yet-to-be-developed technologies, and to limit their vulnerability to subtle and effective enemy countermeasures and counter-systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is absorbtive capacity?

A

The increase in technological complexity over the past 150 years has exponentially raised the requirements to assimilate and imitate foreign military technology, thus cancelling the first necessary condition for states to enjoy the advantage of imitation—relatively low entry barriers for the imitation of state-of-the-art weapon systems. To free-ride on the R&D of a foreign country, a country must be able “to identify, assimilate, and exploit knowledge from the environment.” But as scholarship from other disciplines shows, knowledge and experience are not
public goods that can be easily and cheaply appropriated. An imitator must possess an adequate absorptive capacity: material and nonmaterial capabilities such as laboratories, research centers, testing and production facilities, a skilled workforce, and a cumulative technological knowledge base (the stock of knowledge acquired through previous projects).82 Without such absorptive capacity, the imitator will have to develop an advanced industrial, technological, and scientific base before it can copy foreign technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What does it mean that absorptive capacity is specific?

A

By “specific,” we mean that the laboratories, research centers, testing and production facilities, skilled workforce, and the
cumulative technological knowledge base developed for a particular type of
production cannot be easily redeployed for assimilating and exploiting foreign
know-how and experience in weapon systems.

42
Q

What is tacit knowledge?
Why is experience tacit?

A

tacit knowledge comes from lived experiences because it cannot be conveyed through writing etc

43
Q

What is the problem with Chinese engines?

A

they “lag one to two generations behind leading international competitors, and the near-term prospects of narrowing this gap are poor.

44
Q

Why would it be so difficult for the US to re-start production of the F-22?

A

the same country that created the F-22 would have to spend $10 billion to restart the production of its ªfth-generation ªghter—equivalent to 25 percent of the total procurement cost for 194 aircraft

path dependency

45
Q

What are turbine-blades?

A

In a jet
engine, air is taken in and compressed,
then fuel is added and combusted to
heat the air, which then turns the rotor
blades of a turbine. The hot exhaust is
then expelled through a nozzle to create
thrust

46
Q

Why are some turbine blades so important (compare with the article of mine assigned)? And why are they so difficult to produce?

A

These turbine blades have had their surfaces etched with acid to reveal their inner structure.
The pair at left are single crystals, whereas the pair in the middle are directionally solidified,
with all the crystal boundaries going in one direction. The pair at right are made up of small
crystal grains, with numerous boundaries. Blades of single crystal have significantly increased
life spans under extreme temperature conditions.

single crystal blades are difficult to produce because as the single-crystal structure forms, onedimensional heat conduction must be maintained as the mold is withdrawn from the temperature-controlled enclosure. Any heat conducted to the mold’s
lateral surfaces can cause localized crystallization, which disrupts the single crystal structure with secondary grains.

47
Q

Why did the US Navy struggle so much with replicating “FOGBANK”?

A

They had let go basically everyone who had worked on it before, they didn’t have the production capabilities anymore

tacit knowledge + path dependence

48
Q

What are transistors?

A

A transistor is a type of semiconductor device that can be used to conduct and insulate electric current or voltage. It acts as a switch and an amplifier, allowing it to control or regulate the flow of electronic signals. A transistor is composed of semiconductor material, usually with at least three terminals for connection to an electronic circuit

49
Q

What are semiconductors?

A

A semiconductor is a material that has an electrical conductivity value falling between that of a conductor, such as copper, and an insulator, such as glass. Its resistivity generally falls as its temperature rises; metals behave in the opposite way.

50
Q

What are (micro)chips?

A

A microchip is a small electronic device made up of multiple interconnected electronic components such as transistors, resistors, and capacitors, etched onto a small piece of semiconductor material, usually silicon. These components are used to perform specific functions, such as processing information, storing data, or controlling the flow of electrical signals.

51
Q

Why are microchips so important? And why are they so difficult to produce?

A

The design and manufacturing processes have become extremely long, complex and costly, requiring ever more specialist equipment and knowledge.
they power basically all tech these days

52
Q

What are “costly signals”? What is cheap talk?

A

The core of our argument is that terrorist violence is a form of costly signaling. Terrorists are too weak to impose their will directly by force of arms. They are sometimes strong enough, however, to persuade audiences to do as they wish by altering the audience’s beliefs about such matters as the terrorist’s ability to impose costs and their degree of commitment to their cause. Given the conflict of interest between terrorists and their targets, ordinary communication or “cheap talk” is insufficient to change minds or influence behaviour

53
Q

Why do the authors claim that terrorism is a form of signaling? Why is that important?

A

because they don’t have the resources and are committed to committed atrocities to achieve their goals

54
Q

What are the key aspects behind each of the five strategic logics the authors identify?

A

Attrition
Indimidation
Provocation
Spoiling
Outbidding

55
Q

What are the key aspects of each of the goals that terrorist groups pursue?

A

Regime change
Territorial change
Policy change
Social control
Status quo maintenance

56
Q

What was the strategy of Muhammad Alì against George Foreman?

A

Ali used asymmetric strategies, and psychological torment to let the fight drag on and then deliver the final blow

57
Q

For weak actors, successful defence against strong actors depends on an
indirect strategy.

A

This analysis suggests key policy implications for both weak and strong actors. Because indirect strategies such as GWS rely on social support, weak actors must work tirelessly to gain and maintain the sympathy or
acquiescence of a majority of the population in question. Given the risks involved in either aiding or taking part in a guerrilla resistance, this in itself is no
mean feat. Additionally, weak actors must have or gain access to the physical or political sanctuary necessary to make an indirect strategy a viable choice.
For strong actors, the strategic interaction thesis suggests that weak adversaries employing an indirect defence will be difficult to defeat.

The United States must be prepared to fight and win both conventional and asymmetric or “small” wars. The strategic interaction thesis shows why the
two missions demand two kinds of armed forces: one to defend U.S. interests in conventional wars, and one to defend them in asymmetric wars. If the
United States, in other words, is to win future “boxing matches” against light-weight opponents who use their own version of the rope-a-dope, it will need
ªghters with more initiative than discipline, and more endurance than punching power.

58
Q

What is the main argument (summarized by Arreguin-Toft) of the article by Andrew Mack?

A

Andrew Mack argues that an actor’s relative resolve or interest explains success or failure in asymmetric conflicts. In essence, the actor with the most resolve wins, regardless of material power resources. Mack contends that this resolve can be derived a priori by assessing the structure of the conflict relationship.
Power asymmetry explains interest asymmetry: The greater the gap in relative power, the less resolute and hence more politically vulnerable strong actors
are, and the more resolute and less politically vulnerable weak actors are. Big nations therefore lose small wars because frustrated publics (in democratic regimes) or countervailing elites (in authoritarian regimes) force a withdrawal short of military victory. This seems true of some conflicts but not of others.

59
Q

First, relative power is a poor predictor of relative interest or resolve in peace or war.

A

In peacetime, a strong state may act as if its survival is at stake when it is not. Second, the operation of political vulnerability, which Mack uses to explain weak-actor success, presupposes a span of time. But nothing in the interest asymmetry thesis explains why some asymmetric conflicts end quickly, yet others drag on.16 Third, if the interest asymmetry thesis is right, there should be little or no variation over time in the
distribution of asymmetric conflict outcomes when relative power is held constant.

60
Q

What is the difference between direct attack and barbarism?

A

Direct attack means the use of the military to capture or eliminate an adversary’s armed forces, thereby gaining control of that opponent’s values. The main goal is to win the war by destroying the adversary’s
capacity to resist with armed forces. Both attrition and blitzkrieg are direct attack strategies.

Barbarism is the systematic violation of the laws of war in pursuit of a military or political objective. Although this definition includes the
use of prohibited weapons such as chemical and biological agents, its most important element is depredations against noncombatants (viz., rape, murder, and torture). Unlike other strategies, barbarism has been used to destroy an adversary’s will and capacity to fight. When will is the target in a strategic bombing campaign, for example, the strong actor seeks to coerce its weaker opponent into changing its behavior by inflicting pain (destroying its values). When will is the target in a counterinsurgency (COIN) campaign, the strong actor attempts to deter would-be insurgents through, for instance, a policy of
reprisals against non-combatants. Strong actors can also target a weak actor’s capacity to sustain an insurgency by, for example, the use of concentration
camps.

61
Q

What is the difference between direct defense and guerrilla warfare?

A

Direct defense refers to the use of armed forces to thwart an adversary’s attempt to capture or destroy values such as territory, population, and strategic resources. Like direct-attack strategies, these strategies target an opponent’s military. The aim is to damage an adversary’s capacity to attack by crippling its advancing or proximate armed forces. Examples include limited aims strategies, static defense, forward defense, defense in depth, and mobile defense.

Guerrilla warfare strategy (GWS) is the organization
of a portion of society for the purpose of imposing costs on an adversary using armed forces trained to avoid direct confrontation. These costs include the
loss of soldiers, supplies, infrastructure, peace of mind, and most important, time. Although GWS primarily targets opposing armed forces and their
support resources, its goal is to destroy not the capacity but the will of the attacker. GWS requires two elements: (1) physical sanctuary (e.g., swamps, mountains, thick forest, or jungle) or political sanctuary (e.g., weakly defended border areas or border areas controlled by sympathetic states), and (2) a supportive population (to supply ªghters with intelligence and logistical support, as well as replacements).

62
Q

What is Biddle’s criticism of the literature in International Relations, in general?

A

either rigorous or narrow, or broad and un rigorous
it rests on proxies for war capability which are not necessarily representative and bias the theory

they are imply mutually consistent policies and therefore cannot maximize technological sophistication and numerical preponderance simultaneously

63
Q

What is his criticism of the preponderance argument?

A

Assessments focusing solely on materiel will radically overestimate well-equipped but poorly handled armies

64
Q

What is his criticism of the technological argument (both the systemic and the dyadic versions)?

A

Though influential, neither systemic nor dyadic technology theories have been extensively tested empirically. Offense-defense theory has long suffered
from a lack of systematic empirical work. Official capability models are almost wholly untested empirically. Most models in widespread use by the Defense Department are far too complex for determinate testing: the Joint Chiefs of Staff ’s TACWAR model, for example, uses more than a thousand independent variables, almost none of which are included in standard historical databases,
making systematic empirical work effectively impossible. Attempts to test simplified versions have been inconclusive; in more than a dozen studies dating back to the 1950s, the basic Lanchester equations have generally failed to correspond
with available historical data, but since modern models use extended versions of the equations, this failure has usually not been considered decisive.

65
Q

what are the systemic and the dyadic version of the technology argument?

A

“state of the art” in the international system at any given time, rather than the particulars of individual states’ holdings.
the difference between the era of the tank and the era of the horse, for example, is the key, not which side’s tanks are better than the other’s.
Offense-defense theory is the best known of these views. It holds that changing technology shifts the relative ease of attack and defense (the “offense-defense balance”) for all states in the international system.

Dyadic: if A enjoys a technological edge over B, then A prevails—whether A attacks or defends. Whereas systemic technology theorists see technology as
favoring attack or defense across the international system, dyadic theorists see its chief effect as favoring individual states over others, depending on their particular holdings

66
Q

What is the modern system of force employment?

A

The modern system is a tightly interrelated complex of cover, concealment, dispersion, suppression, small-unit independent maneuver, and combined arms
at the tactical level, and depth, reserves, and differential concentration at the operational level of war. Taken together, these techniques sharply reduce vulnerability to even twenty-first century weapons and sensors. Where fully implemented, the modern system damps the effects of technological change and insulates its users from the full lethality of their opponents’ weapons.

67
Q

What is the difference between destructive and suppressive fire?

A

destructive fire is meant to kill, suppressive fire is not—it merely keeps the defender from firing while other attackers maneuver into position to kill. Defenders forced to duck, to cower in deep dugouts, or to reposition to an unspotted location cannot fire in the meantime, and thus their weapons, whatever their nominal lethality, are temporarily harmless.

Suppression’s central advantage is its tremendous efficiency relative to destructive fires against dug-in targets: even in 1977, to destroy a dug-in infantry
platoon required over forty rounds of 155 mm howitzer fire; to suppress the same position can require fewer than four. The destructive barrage at Messines in 1917 required 383,000 rounds per mile of front to pulverize the German trenches; the suppressive barrage at Amiens the following year used fewer than 43,000 per mile, or about 10 percent as many. This in turn restored surprise to the battlefield: suppression, unlike destruction, could be achieved without weeks-long bombardments that gave away the point of attack.

68
Q

What does the modern system of force employment at the operational level?

A

The modern system is a tightly interrelated complex of cover, concealment, dispersion, suppression, small-unit independent maneuver, and combined arms
at the tactical level, and depth, reserves, and differential concentration at the operational level of war.

69
Q

What is battle transparency? **

A

Battle transparency refers to the openness and clarity of an organization’s or individual’s actions, decisions, and motivations during a conflict or competition. It involves being transparent about one’s goals, strategies, and methods, as well as the reasoning behind them. This can include sharing information about the decision-making process, the data used to inform those decisions, and the potential biases or conflicts of interest that may influence those decisions.

70
Q

What were the main components of the approach that Israel used to defeat Syrian air defenses in 1982?

A

two-way voice communications real-time
striking known locations - maximum speed
lots of practice
mock jamming drills
not going after any target unnecessarily

71
Q

what is the second firepower revolution?

A

It is the result of concomitant developments in electronics, materials, and propulsion that have brought about dramatic improvements in detection, communication, precision, and destruction. The resulting unforgiving lethality, in turn, has led to a hider-finder competition between air forces and air defenses, which entails hiding from enemy sensors while finding enemy targets. This hider-finder competition rewards those who can masterfully employ the tactics, techniques, procedures, technologies, and capabilities that limit exposure to enemy fire while successfully detecting and targeting the enemy. In comparison to land warfare, the
modern system of force employment is much more challenging in air warfare, for both air defense and even more for air penetration.

72
Q

what is the modern system of force employment in air warfare?

A

the lethality of air warfare has led to a “hider-finder” competition between air defense and air penetration. This competition imposes high costs on those who fail to master the set of tactics, techniques, procedures, technologies, and capabilities necessary to limit exposure to enemy fire and to detect enemy targets—borrowing on Biddle’s work, we call it the modern system of force employment in air warfare. Rather than representing a rupture with the past, our framework suggests that drones are part of the evolution of air warfare, whose fundamental principle remains to avoid exposure to enemy fire. We maintain that drones do not by themselves produce the revolutionary effects that many have attributed to them.

73
Q

what does modern system force employment entail for air defense?

A

Air defense must detect, locate, identify, track, and, if needed, engage intruders, while avoiding being degraded by an enemy’s cyber and electronic countermeasures (e.g., hacking, jamming, or spoofing) and being targeted by an enemy’s suppression of enemy air defense assets. Detecting targets while avoiding detection is very challenging for two sets of reasons.

74
Q

why is the modern system of force employment more difficult in air warfare than in land warfare?

A

tech needs are greater
its harder to hide in the sky

74
Q

what does it entail for air penetration?

A

The modern system of force employment is even more daunting for penetrating aircraft than for air defense. Critically, the air domain does not offer opportunities for cover from enemy. Because aircraft can tolerate little structural damage, they need to avoid detection altogether. Moreover, in contrast to the land domain, the air domain offers only limited opportunities for concealment. To radar systems,
aircraft appear significantly different from the background in which they operate, the sky. As a result, penetrating aircraft are generally easier to detect and target than land-based air defense systems because of the differences between
their surrounding environments—simple for aircraft and complex for ground-based systems. Finally, air penetration is heavily dependent on technologies
that reduce an aircraft’s exposure to enemy firepower, both for limiting detection and for avoiding interception once detected

75
Q

why is it more technology-intensive in air warfare than in land warfare?

A

air defense requires advanced technologies for detecting, locating, identifying, tracking, and engaging enemy aerial intruders—such as early-warning and target acquisition radars, as well as antiaircraft guns and surface-to-air missiles

76
Q

What is the function of collecting intelligence about enemy air defenses?

A

Specifically, intelligence, surveillance, and reconnaissance (ISR) platforms
must detect and locate an enemy’s air defense outposts and share the latter’s
exact coordinates in a timely manner with mission planners. In this way, mission planners can identify path profiles that minimize the risk for penetrating aircraft, by either exploiting existing gaps in radar coverage or creating them through suppression of enemy air defense systems and electronic warfare assets that target and degrade critical nodes in the enemy’s network

77
Q

What is the function of cyber attacks?

A

cyberattacks to interfere with either the whole defense network or part of it, decoys and spoofing to deceive radars, jamming to degrade radars and communications, specific tactics such as flying at very low altitude to delay or reduce the chance of detection, and suppression assets to destroy radars or to force them to limit emissions and/or to relocate

78
Q

What is the function of decoys? (and why do they need to have a “radar return” that is similar to specific aircraft?)

A

to deceive an enemy’s air defense systems into activating their acquisition radars and thus revealing their positions, which allows suppression assets to detect and target them

79
Q

What is the function of suppression of air defenses (SEAD)

A

airland battle

80
Q

What are anti-radiation missiles?

A

Anti-radiation missiles are guided missiles designed to detect and home in on an enemy radio emission source, typically targeting enemy radar systems. They are employed to identify and neutralize sources of enemy radio emissions, primarily used against enemy radar systems.

81
Q

What is the function of electronic warfare? And why do you need advanced electronic warfare systems?

A

The purpose of EW is to deny the opponent the advantage of—and ensure friendly unimpeded access to—the EM spectrum. EW can be used to attack an enemy’s ability to use the EM spectrum, disrupt their communication and radar systems, and gain an advantage in battle.

frequency-hopping and
low-probability-of-intercept capabilities “to see without being seen

for electronic countermeasures to be effective, they need to be more advanced than the enemy’s electronic countermeasures, which entails taking part in a never-ending technological race

82
Q

What is the function of stealth (low observable) aircraft?

A

to achieve air supremacy

83
Q

What is the role of operational planning?

A

use the resources not stupidly

84
Q

How do you scan the sky without exposing yourself to enemy suppression/destruction?

A

use early warning aircraft/systems
not super precise
succession of different systems
redundancy

85
Q

How can you detect both low-flying and high-flying targets?

A

integrated air defence systems
multiple radar systems that compensate for each-others weaknesses/blind spots

86
Q

Why are advanced radar systems needed?

A

to detect objects early
track and finish the kill chain of stealth tech

87
Q

Why are advanced electronic counter-countermeasures needed?

A

the electronic counter-countermeasures are effectiuve to the point where you need to counter them as well

88
Q

Why is it important to have a library of radar returns?

A

to know who you’re looking at

89
Q

Why are redundant and reliable communications important?

A

you need to be able to communicate effectively at an operational level
need backups

90
Q

What were the strategic implications of Israeli success again Soviet-made air defenses?

A

superior leadership, organization, tactical adroitness, adaptability

front and back radars

91
Q

How did the Soviet Union react?

A
92
Q

Why is SEAD difficult?

A
93
Q

What is the difference between early warning and fire-control radar?

A

In summary, early warning radar is designed for strategic surveillance and detection, while fire control radar is focused on precise tracking and guidance for weapon systems.

94
Q

Why could NATO not target early warning radars(Kosovo)?

A

limitations to airspace availability typically made for high predictability on the part of attacking NATO
aircraft, and prohibitions against collateral damage frequently prevented the use of the most
tactically advantageous attack headings

they did not get the clearance to hit them

95
Q

What was the problem with targeting fire-control radars

A
96
Q

What is a “bowtie” shaped aircraft?, What is a “packman” shaped aircraft? What is a “fuzzball” shaped aircraft? That is, what are their key differences?

A

a bowtie - typical reduced rcs signature type
The hypothetical signature type may still be smaller
in front and rear aspects,and larger from the side.That would
form something like a Bowtie,as shown at left.
To capture this concept in simplified form,the theoretical
Bowtie shape has a 15 dBSM reduction in RCS over front and
rear aspects.

packman - front-aspect reduction
The Pacman signature type is a simplified approximation
of a conventional aircraft that has been retrofitted to reduce
its signature in the front aspect only

fuzzball - theoretical signature type The Fuzzball shape is a theoretical signature that is reduced evenly,from all angles. It is representative of the magnitude of detection reductions that are possible with a perfect shape—a perfect shape that probably would not conform to any actual aircraft design.

97
Q

What are the implications of the different shapes in dealing with air penetration missions?

A

In practical terms, this means an LO aircraft can reduce its RCS for early warning radars. But it may great‑
ly reduce the RCS for fire control radars that direct SAM shots, for example. This difference means that although the enemy air defense network may know a stealth aircraft is present, the network may not have the means to track and engage it with fire control radars.

98
Q

What are the differences, for given a shape (bowtie, packman, fuzzbal), between a conventional aircraft, low observable and a very low observable aircraft?

A
99
Q

What is the effect of decoys on air penetration missions?

A

trickingthe defence system to show itself