<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Thomas Rid</title>
	<atom:link href="https://ridt.co/feed/" rel="self" type="application/rss+xml" />
	<link>https://ridt.co</link>
	<description></description>
	<lastBuildDate>Mon, 18 Apr 2022 14:41:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Penquin’s Moonlit Maze</title>
		<link>https://ridt.co/penquins-moonlit-maze/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Sat, 08 Apr 2017 00:27:23 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://ridt.co/?p=1935</guid>

					<description><![CDATA[<p>Juan Andres Guerrero-Saade, Daniel Moore, Costin Raiu, Thomas Rid, &#8220;Penquin’s Moonlit Maze. The Dawn of Nation-State Digital Espionage,&#8221; Securelist, Kaspersky Lab, 3 April 2017, 65p. Full report (65 pages) This paper offers a fresh take on MOONLIGHT MAZE, the world&#8217;s first known state-on-state espionage campaign. Our source: previously undiscovered original intercepts from 1998–1999. The intercepts enabled a [&#8230;]</p>
<p>The post <a href="https://ridt.co/penquins-moonlit-maze/">Penquin’s Moonlit Maze</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Juan Andres Guerrero-Saade, Daniel Moore, Costin Raiu, Thomas Rid, &#8220;<a href="/d/jags-moore-raiu-rid.pdf">Penquin’s Moonlit Maze. The Dawn of Nation-State Digital Espionage</a>,&#8221; <em>Securelist</em>, Kaspersky Lab, 3 April 2017, 65p.</p>
<p><a href="/d/jags-moore-raiu-rid.pdf">Full report</a> (65 pages)</p>
<p>This paper offers a fresh take on MOONLIGHT MAZE, the world&#8217;s first known state-on-state espionage campaign. Our source: previously undiscovered original intercepts from 1998–1999. The intercepts enabled a detailed historical log- and binary-analysis.</p>
<p>Covered, among others, in <a href="https://www.wired.com/2017/04/russian-hackers-used-backdoor-two-decades/">WIRED</a>, <em><a href="https://motherboard.vice.com/en_us/article/moonlight-maze-turla-link">Motherboard</a></em>, and <a href="https://twitter.com/RidT/status/850715961732861952">Россия-24</a>.</p><p>The post <a href="https://ridt.co/penquins-moonlit-maze/">Penquin’s Moonlit Maze</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Testimony, US Senate Select Committee on Intelligence</title>
		<link>https://ridt.co/ssci/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Thu, 30 Mar 2017 21:05:28 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://ridt.co/?p=1949</guid>

					<description><![CDATA[<p>“Disinformation. A Primer in Russian Active Measures and Influence Campaigns,” Testimony, United States Senate Select Committee on Intelligence, Washington, DC, 30 March 2017, 15p.</p>
<p>The post <a href="https://ridt.co/ssci/">Testimony, US Senate Select Committee on Intelligence</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>“<a href="https://www.intelligence.senate.gov/sites/default/files/documents/os-trid-033017.pdf">Disinformation. A Primer in Russian Active Measures and Influence Campaigns</a>,” Testimony, United States Senate Select Committee on Intelligence, Washington, DC, 30 March 2017, 15p.</p>
<p><iframe loading="lazy" src="https://www.c-span.org/video/standalone/?c4667048" width="768" height="495" frameborder="0"></iframe></p><p>The post <a href="https://ridt.co/ssci/">Testimony, US Senate Select Committee on Intelligence</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Rise of the Machines</title>
		<link>https://ridt.co/machines/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Mon, 08 Feb 2016 05:50:21 +0000</pubDate>
				<category><![CDATA[Books]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=1655</guid>

					<description><![CDATA[<p>Published in 2016 in the United States with W. W. Norton, in Australia and in the UK with Scribe; in German as Maschinendämmerung with Propyläen Ullstein. In 2017 Machines will be out in paperback, as well as in Mandarin with China Machine Press; in Russian with Eksmo; in Japanese with Sakuhin Sha; and in Turkish with Siyah [&#8230;]</p>
<p>The post <a href="https://ridt.co/machines/">Rise of the Machines</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Published in 2016 in the United States with W. W. Norton, in Australia and in the UK with Scribe; in German as <em>Maschinendämmerung</em> with Propyläen Ullstein. In 2017 <em>Machines</em> will be out in paperback, as well as in Mandarin with China Machine Press; in Russian with Eksmo; in Japanese with Sakuhin Sha; and in Turkish with Siyah Kitap. <a href="http://www.audible.com/pd/Nonfiction/Rise-of-the-Machines-Audiobook/B01GF59UJK">Recorded Books is doing the audiobook</a>.</p>
<p><img loading="lazy" class="aligncenter" title="Alfred Crimi sketch of a ball turret for Sperry Corp, 1943" src="/i/crimi.png" alt="Alfred Crimi sketch of a ball turret for Sperry Corp, 1943" width="426" height="351" /></p>
<p>“A common theme connects war machines, computer networks, social media, ubiquitous surveillance, and virtual reality. For fifty years or more the same people and the same ideas weave through these innovations united by the term ‘cyber,’ as in cyberspace and cybernetics. Read this amazing history and you’ll go: ‘Aha!’”<br />
— Kevin Kelly, founder of <em>Wired</em> magazine, author of <em>What Technology Wants</em> and <em>The Inevitable</em></p>
<p>“Sometimes the most important things are hiding in plain sight. At least that’s what I concluded from <em>Rise of the Machines</em>, Thomas Rid’s masterful blending of the art of a storyteller, the discipline of an historian, and the sensitivity of a philosopher. <em>Machines</em> unmasks how really disruptive this &#8216;cyber thing&#8217; has been and will continue to be to nearly all aspects of human experience. It’s more than food for thought. It’s a banquet.”<br />
— General Michael Hayden, former director of NSA and CIA</p>
<p>“<em>Rise of the Machines</em> isn&#8217;t just an insightful history of cybernetics but also a fascinating journey with the twentieth-century thinkers—from tech giants and eccentric mathematicians to science fiction writers and counterculture gurus—who have shaped how we understand machines and ourselves.”<br />
— P. W. Singer, author of <em>Cybersecurity and Cyberwar: What Everyone Needs to Know</em> and <em>Ghost Fleet: A Novel of the Next World War</em></p>
<p>“<em>Rise of the Machines</em> is a fascinating history of cybernetics, and of the visionaries like Norbert Wiener who first imagined the potential—and peril—of machines that would begin to replicate the capabilities of the human mind.”<br />
— Martin Ford, author of <em>Rise of the Robots</em></p>
<p>&#8220;Thomas Rid has provided a gripping account of how after the Second World War, cybernetics, a theory of machines, came to incite anarchy and war half a century later. Thanks to his extensive research we can now read for the first time the real story of ᴍᴏᴏɴʟɪɢʜᴛ ᴍᴀᴢᴇ, the first big state-on-state cyber attack, setting a new narrative standard for historians and journalists alike.&#8221;<br />
— Sir David Omand, Director of GCHQ (when ᴍᴏᴏɴʟɪɢʜᴛ ᴍᴀᴢᴇ began), former UK Security and Intelligence Coordinator</p>
<p>&#8220;<em>Rise of the Machines</em> is strikingly original, compellingly written and deeply topical. It is a guide to our hopes and fears of robotics and computers. Thomas Rid weaves together technological innovation, social change and popular culture in a way that is both surprising and approachable.&#8221;<br />
— Gordon Corera, BBC Security Correspondent, author of <em>Intercept</em></p>
<p>“Everyone I know should read this book. It will be a classic.”<br />
— Robert Lee, former U.S. Air Force Cyber Warfare Operations officer and SANS instructor</p>
<p>&#8220;Technology at once defines and exceeds our hopes for the future; it transforms and escapes us. As Thomas Rid makes clear, we live in a world riddled with technological mythologies; where our relationships both with and through machines mould not only daily experience, but our collective unconscious. There can be few finer guides to the geographies of human fear and dreaming within our machine age.&#8221;<br />
— Tom Chatfield, author of <em>Live This Book</em></p>
<p><img class="aligncenter size-large wp-image-1844" src="https://ridt.co/i/rises.jpg" alt="Spines" width="1008" /></p>
<p>&#8220;An ingenious look at how brilliant and not-so-brilliant thinkers see—usually wrongly but with occasional prescience—the increasingly intimate melding of machines and humans &#8230; suberbly recounted&#8221;<br />
— <a href="https://www.kirkusreviews.com/book-reviews/thomas-rid/rise-of-the-machines/">Kirkus Reviews (starred)</a>, issue 15 May 2016</p>
<p>Reviewed in <a href="/d/rid-rise-booklist.pdf"><em>Booklist</em></a>, <a href="/d/rid-rise-ct.pdf"><i>c&#8217;t Magazin</i></a>, <a href="https://cosmosmagazine.com/society/rise-of-the-machines-the-lost-history-of-cybernetics"><em>Cosmos</em></a>, <a href="/d/rid-rise-esquire.pdf"><em>Esquire</em></a>, <a href="https://www.ft.com/content/bad714c4-6493-11e6-8310-ecf0bddad227"><em>Financial Times</em></a>, <a href="/d/rid-rise-faz.pdf"><em>Frankfurter Allgemeine Zeitung</em></a>, <a href="/d/rid-rise-hochschulanzeiger.pdf"><em>FAZ Hochschulanzeiger</em></a>, <a href="https://www.freitag.de/autoren/christine-kaeppeler/die-scheu-verlieren"><em>Der Freitag</em></a>, <em><a href="https://www.theguardian.com/technology/2016/sep/11/cybernetics-cybersex-thomas-rid-interview-rise-machines">The Guardian/The Observer</a></em>, <a href="http://onlinelibrary.wiley.com/doi/10.1111/1468-2346.12762/full" class="broken_link" rel="nofollow"><em>International Affairs</em></a>, <em><a href="https://www.kirkusreviews.com/book-reviews/thomas-rid/rise-of-the-machines/">Kirkus</a></em>, <a href="http://go.nature.com/2a9yTjb"><em>Nature</em></a>, <a href="http://www.nzz.ch/feuilleton/buecher/thomas-rids-geschichte-der-kybernetik-der-unaufhaltsame-aufstieg-der-maschinen-ld.116539"><em>Neue Zürcher Zeitung</em></a>, <em><a href="https://www.newscientist.com/article/mg23130874-700-how-the-cyber-age-gave-peace-a-chance/">New Scientist</a>,</em> <a href="http://nyti.ms/2acMfJU" class="broken_link" rel="nofollow"><em>The New York Times</em></a>, <a href="http://www.prospectmagazine.co.uk/magazine/i-feedback-therefore-i-am-cybernetics-robots-technology"><em>Prospect Magazine</em></a>, <a href="http://www.scientificamerican.com/article/essays-celebrate-the-centennial-of-america-s-national-parks/"><em>Scientific American</em></a>, <a href="http://www.spectator.co.uk/2016/09/artificial-intelligence-has-become-the-next-big-thing-again/" class="broken_link" rel="nofollow"><em>The Spectator</em></a>, <a href="http://www.spektrum.de/rezension/buchkritik-zu-maschinendaemmerung/1413783"><em>Spektrum der Wissenschaft</em></a>, <em><a href="http://www.pressreader.com/austria/der-standard/20160713/282029031563978">Der Standard</a></em>, <a href="http://www.sueddeutsche.de/kultur/kybernetik-wiezukunft-entsteht-1.3040795"><em>Süddeutsche Zeitung</em></a>, <em><a href="http://www.taz.de/!t5295996/" class="broken_link" rel="nofollow">tageszeitung</a>, Technology Review (Germany), Universum, <a href="/d/rid-rise-wsj.pdf">Wall Street Journal</a>, <a href="http://warontherocks.com/2016/07/digging-into-the-archeology-of-the-future/">War on the Rocks</a>; </em><a href="https://radio.abc.net.au/programitem/pg0JGO12xV?play=true">ABC</a> (Australia), Bayrischer Rundfunk, <a href="http://www.deutschlandfunk.de/kybernetik-wenn-mensch-und-maschine-verschmelzen.700.de.html?dram:article_id=361932">Deutschlandfunk</a>, Deutschlandradio Kultur, NPR Marketplace, WDR, <a href="https://youtu.be/CvVUtVl8k9o">3sat</a>.</p>
<p>Listed as one of the best books of 2016 by <em>MIT Technology Review</em>, <em>Esquire</em>, and <em>Fortune</em>. Shortlisted as &#8220;<a href="http://www.wissenschaftsbuch.at/">Wissenschaftsbuch des Jahres 2017</a>.&#8221;</p>
<p><iframe loading="lazy" width="1008" height="567" src="https://www.youtube.com/embed/zSrjkWDXSS8?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p><iframe loading="lazy" src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/265029596&amp;color=000000&amp;auto_play=false&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false" width="754" height="166" frameborder="no" scrolling="no"></iframe></p><p>The post <a href="https://ridt.co/machines/">Rise of the Machines</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cryptopolitik and the Darknet</title>
		<link>https://ridt.co/cryptopolitik/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Tue, 19 Jan 2016 17:10:37 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<guid isPermaLink="false">https://ridt.co/?p=1702</guid>

					<description><![CDATA[<p>“Cryptopolitik and the Darknet,” with Daniel Moore, Survival, 2016, February/March, vol 57, iss 1, 7–38, DOI 10.1080/00396338.2016.1142085 Encryption policy is becoming a crucial test of the values of liberal democracy in the twenty-first century. The trigger is a dilemma: the power of ciphers protects citizens when they read, bank and shop online — and the power of ciphers [&#8230;]</p>
<p>The post <a href="https://ridt.co/cryptopolitik/">Cryptopolitik and the Darknet</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>“Cryptopolitik and the Darknet,” with Daniel Moore, <em>Survival</em>, 2016, February/March, vol 57, iss 1, 7–38, <a href="http://www.tandfonline.com/doi/abs/10.1080/00396338.2016.1142085" target="_blank">DOI 10.1080/00396338.2016.1142085</a></p>
<p><img loading="lazy" class="alignleft" src="/i/survival.png" alt="" width="270" height="370" />Encryption policy is becoming a crucial test of the values of liberal democracy in the twenty-first century. The trigger is a dilemma: the power of ciphers protects citizens when they read, bank and shop online — and the power of ciphers protects foreign spies, terrorists and criminals when they pry, plot and steal. Encryption bears directly on today’s two top threats, militant extremism and computer-network breaches — yet it enables prosperity and privacy. Should the state limit and regulate the fast-growing use of cryptography? If so, how?</p>
<p>[&#8230;] Crypto systems are not politically neutral; they embody political choices. In some cases, the costs incurred by establishing a specific cryptographically enabled service may outweigh the benefits. We test and establish this argument by critically assessing one of the most sophisticated and controversial encryption platforms today: the Tor Project. If there is a line that demarcates liberal from illiberal cryptographic architectures, it runs right through Tor. To be more precise, it runs right through hidden services.</p>
<p><a href="http://www.tandfonline.com/doi/abs/10.1080/00396338.2016.1142085" target="_blank">Read more</a></p>
<p><a href="https://ridt.co/d/moore-rid-technical-annex.pdf" target="_blank">Technical annex</a> and discussion on Tor Hidden Services (requires Tor Browser) at http://35oktenzdrt2v4o5.onion</p>
<p>On <a href="http://routledge.altmetric.com/details/5072735" target="_blank">Altmetric</a></p>
<p><a href="https://www.iiss.org/en/events/events-s-calendar/encryption-policy-and-darknet-b234" target="_blank">Launched at IISS on 3 February</a>.</p>
<p>Covered in <em><a href="http://motherboard.vice.com/en_uk/read/study-claims-dark-web-sites-are-most-commonly-used-for-crime" target="_blank">Motherboard</a></em>, <em><a href="http://www.telegraph.co.uk/technology/2016/02/02/dark-web-browser-tor-is-overwhelmingly-used-for-crime-says-study/" target="_blank">Telegraph</a></em>, <em><a href="http://www.sueddeutsche.de/digital/anonymitaet-im-internet-das-dark-web-quillt-ueber-vor-illegalen-angeboten-1.2845256" target="_blank">Süddeutsche Zeitung</a></em>, <em><a href="http://www.tecmundo.com.br/web/94891-indexaram-parte-deep-web-confirmado-tudo-ilegal.htm" target="_blank">Tecmundo</a></em>, <em><a href="http://en.farsnews.com/newstext.aspx?nn=13941113000368" target="_blank" class="broken_link" rel="nofollow">Fars</a>, <a href="http://www.bbc.co.uk/programmes/p03gpj43" target="_blank">BBC Newsday</a></em>, <em><a href="https://nakedsecurity.sophos.com/2016/02/03/dark-web-is-mostly-illegal-say-researchers/" target="_blank">Naked Security</a>, <a href="https://www.schneier.com/blog/archives/2016/02/survey_of_the_d.html" target="_blank">Schneier on Security</a>, BBC 5 Live, BBC World Service, Sky News, <a href="http://www.zeit.de/digital/datenschutz/2016-02/apple-iphone-fbi-verschluesselung-ist-lebensrisiko/komplettansicht" target="_blank">Die Zeit</a>, Herald Sun, The Telegraph (Australia), Quartz, Nextgov, more</em></p><p>The post <a href="https://ridt.co/cryptopolitik/">Cryptopolitik and the Darknet</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attributing Cyber Attacks</title>
		<link>https://ridt.co/attributing-cyber-attacks/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Tue, 10 Nov 2015 09:53:46 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=1615</guid>

					<description><![CDATA[<p>“Attributing Cyber Attacks,” with Ben Buchanan, Journal of Strategic Studies, 2015, February, vol 39, iss 1, p. 4-37, DOI:10.1080/01402390.2014.977382 Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, [&#8230;]</p>
<p>The post <a href="https://ridt.co/attributing-cyber-attacks/">Attributing Cyber Attacks</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>“Attributing Cyber Attacks,” with<em> </em>Ben Buchanan, <em>Journal of Strategic Studies</em>, 2015, February, vol 39, iss 1, p. 4-37, <a href="https://www.tandfonline.com/doi/abs/10.1080/01402390.2014.977382" target="_blank" rel="noopener">DOI:10.1080/01402390.2014.977382</a></p>
<p><em><img loading="lazy" class="alignleft wp-image-1680" src="/wp-content/uploads/2015/11/q-cn-1024x892.png" alt="q-cn" width="220" height="191" srcset="https://ridt.co/wp-content/uploads/2015/11/q-cn-1024x892.png 1024w, https://ridt.co/wp-content/uploads/2015/11/q-cn-300x261.png 300w, https://ridt.co/wp-content/uploads/2015/11/q-cn-768x669.png 768w, https://ridt.co/wp-content/uploads/2015/11/q-cn-1008x878.png 1008w, https://ridt.co/wp-content/uploads/2015/11/q-cn.png 1118w" sizes="(max-width: 220px) 100vw, 220px" /></em>Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution.</p>
<p><a href="//www.tandfonline.com/doi/pdf/10.1080/01402390.2014.977382" target="_blank" rel="noopener nofollow" class="broken_link">Read more</a></p>
<p>In Japanese: Thomas Rid and Ben Buchanan (translated by Motohiro Tsuchiya), “Cyber Kogeki wo Okonau no ha Dare ka (Attributing Cyber Attacks),” <a href="https://web.archive.org/web/20210507111025/http://j-sss.org/hakko/kikan.html"><em>Senryaku Kenkyu</em></a> (<em>Journal of Strategic Studies</em>), 18, 2016, 59-98. (<a href="/d/rid-buchanan-japanese.pdf">Japanese PDF</a>)</p>
<p>In Chinese: translated by a government-affiliated entity in Beijing (<a href="/wp-content/uploads/2015/11/rid-buchanan-attribution-CN.pdf" target="_blank" rel="noopener">Chinese PDF</a>).</p>
<p>On <a href="https://scholar.google.co.uk/citations?view_op=view_citation&amp;hl=en&amp;user=PQUA11sAAAAJ&amp;citation_for_view=PQUA11sAAAAJ:JdL-Xu2nR38C" target="_blank" rel="noopener">Google Scholar</a><br />
On <a href="http://routledge.altmetric.com/details/3009337" target="_blank" rel="noopener">Altmetric</a></p>
<p>Coverage and mentions by <em><a href="http://qz.com/317405/why-its-so-hard-to-tell-if-the-sony-hack-was-north-koreas-doing/" target="_blank" rel="noopener">Quartz</a></em>, <em><a href="http://time.com/3653625/sony-hack-obama-sanctions-north-korea/" target="_blank" rel="noopener">TIME</a></em>, <em>Heise</em>, <em>Telegraph</em>, <a href="https://www.schneier.com/blog/archives/2015/01/attributing_cyb.html?utm_source=twitterfeed&amp;utm_medium=twitter" target="_blank" rel="noopener">Bruce Schneier</a>, <a href="https://twitter.com/e_kaspersky/status/552486789970014209" target="_blank" rel="noopener">Eugene Kaspersky</a>, <a href="https://twitter.com/taosecurity/statuses/634059759478378496" target="_blank" rel="noopener">Richard Bejtlich</a> (<a href="https://web.archive.org/web/20180921091338/https://intelligence.house.gov/sites/intelligence.house.gov/files/documents/bejtlichsfr03192015.pdf" target="_blank" rel="noopener">before the Permanent Select Committee on Intelligence</a> in the US House of Representatives).</p>
<p>Launched at RUSI in London on 11 February 2015.</p>
<p>Briefed at the US Department of Defense, OSD, and a PLA workshop in Beijing, among others.</p><p>The post <a href="https://ridt.co/attributing-cyber-attacks/">Attributing Cyber Attacks</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber War Will Not Take Place</title>
		<link>https://ridt.co/cyber-war-will-not-take-place/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Sun, 10 Mar 2013 21:29:10 +0000</pubDate>
				<category><![CDATA[Books]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=1204</guid>

					<description><![CDATA[<p>Rid, T. Cyber War Will Not Take Place, London: Hurst/Oxford University Press (2013) 256p  ‘This book will be welcomed by all those who have struggled to get the measure of the “cyber war” threat. As Thomas Rid takes on the digital doomsters he also provides a comprehensive, authoritative and sophisticated analysis of the strategic quandaries created by new [&#8230;]</p>
<p>The post <a href="https://ridt.co/cyber-war-will-not-take-place/">Cyber War Will Not Take Place</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T. <em>Cyber War Will Not Take Place,</em> London: Hurst/Oxford University Press (2013) 256p </code></p>
<div title="Page 1">
<p style="padding-left: 30px;">‘This book will be welcomed by all those who have struggled to get the measure of the “cyber war” threat. As Thomas Rid takes on the digital doomsters he also provides a comprehensive, authoritative and sophisticated analysis of the strategic quandaries created by new technologies.’<br />
<em>Sir Lawrence Freedman, Professor of War Studies, King’s College London and author of </em>Strategy: A History</p>
<p style="padding-left: 30px;">‘Thomas Rid provides an unusually level-headed view of where we are in the cyber arms race. This book nips in the bud the loose talk of cyber war and illustrates what’s really happening. Anyone involved in building defences against future attacks should read this book first.’<br />
<em>Mikko Hypponen, virus analyst and Chief Research Officer, F-Secure </em></p>
<p style="padding-left: 30px;">‘We’re in the early years of a cyber war arms race, one fuelled both by fear and ignorance. This book is a cogent counterpoint to both the doomsayers and profiteers, and should be required reading for anyone concerned about our national security policy in cyberspace.’<br />
<em>Bruce Schneier, security guru and author of </em>Liars and Outliers: Enabling the Trust Society Needs to Thrive</p>
<p style="padding-left: 30px;">‘With news of cyber war, terrorism and espionage seemingly everywhere, separating hype from reality is not always easy. Many agencies and companies stand to gain by inflating cyber security fears. Thomas Rid takes a razor to the evidence and carefully dissects the evolution of conflict and espionage in the cyber age. The result is a compelling and authoritative take on war and strategy in cyberspace, one that will surely be seminal in this area for years to come.’<br />
<em>Ronald J. Deibert, Citizen Lab Director, Professor of Political Science, University of Toronto and author of </em>Black Code: Inside the Battle for Cyberspace</p>
<p style="padding-left: 30px;"><a href="http://amzn.to/W26L3p  " target="_blank">Amazon.com</a> | <a href="http://amzn.to/VO7cyP" target="_blank" class="broken_link" rel="nofollow">Amazon.co.uk</a> | <a href="http://amzn.to/ZDXcXo" target="_blank">Amazon.fr</a> | <a href="http://amzn.to/ZDX8qt" target="_blank">Amazon.de</a></p>
</div>
<p>‘Cyber war is coming,’ announced a landmark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the ‘fifth domain’ of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain?</p>
<p><em>Cyber War Will Not Take Place</em> cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways.</p>
<p>The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country’s critical infrastructure? How serious is the threat of ‘pure’ cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?</p>
<p>(<a href="http://www.flickr.com/photos/boulainvilliers/9314545042/sizes/l/" target="_blank">Cover in high resolution</a>)</p>
<p><span style="color: #888888;">Coverage (selection)</span></p>
<p><a href="http://www.foreignaffairs.com/articles/140160/thomas-rid/cyberwar-and-peace">&#8220;Cyberwar and Peace,&#8221; Excerpt in <em>Foreign Affairs</em>, December 2013</a></p>
<p style="padding-left: 30px;"><a href="http://bit.ly/1dNQ06G " class="broken_link" rel="nofollow">In Japanese</a><br />
<a href="http://bit.ly/1dNQ71X" class="broken_link" rel="nofollow">In German</a><br />
<a href="http://bit.ly/1dNQbio" class="broken_link" rel="nofollow">In French</a></p>
<p><a href="http://on.ft.com/11XPqqA" target="_blank">&#8220;Digital Destruction,&#8221; <em>Fincancial Times</em>, 10 May 2013</a></p>
<p><a href="http://econ.st/19y2fBO" target="_blank">&#8220;Digital Doomsters,&#8221; <em>The Economist</em>, 27 June 2013</a></p>
<p><a href="http://bit.ly/176HFBR" target="_blank" class="broken_link" rel="nofollow">&#8220;Cyberspace is not a Combat Zone,&#8221; <em>The Globe and Mail</em>, 6 July 2013</a></p>
<p><a href="http://b.globe.com/1aLgdBk" target="_blank">&#8220;Is Cyberwar Really War?&#8221; <em>Boston Globe</em>, 15 September 2013</a></p>
<p><em><a href="http://www.smh.com.au/national/public-service/the-fanciful-world-of-cyber-warfare-20130831-2sy3f.html" target="_blank">&#8220;The fanciful world of cyber warfare,&#8221; <em>The Sydney Morning Herald</em>, 3 September 2013</a></em></p>
<p><a href="/wp-content/uploads/2014/01/ia-review.pdf" target="_blank"><em>International Affairs</em>, 90, 1, 2014, p. 203-204</a></p>
<p><a href="/wp-content/uploads/2014/01/rusi-review.pdf" target="_blank"><em>The RUSI Journal</em>, December 2013, p. 106-107</a></p>
<p><a href="/wp-content/uploads/2013/10/tertrais-rid-review.pdf" target="_blank"><em>Survival</em>, September/October 2013, p. 221-223</a></p>
<p><a href="/wp-content/uploads/2013/10/hazane-review.pdf" target="_blank"><i>Politique Étrangère</i>, 3/2013, 196-97</a></p>
<p><a href="http://www.sicurezzanazionale.gov.it/sisr.nsf/letture/la-guerra-cyber-non-avra-luogo.html" target="_blank">&#8220;La guerra cyber non avrà luogo,&#8221; <em>sicurezzanazionale.gov.it</em>, 7 August 2014</a></p>
<p><a href="http://www.h-net.org/~diplo/ISSF/PDF/RE17.pdf" target="_blank"><em>H-Diplo</em>, 10 October 2013</a></p>
<p><a href="https://www.schneier.com/blog/archives/2013/10/book_review_cyb_1.html" target="_blank"><em>Schneier on Security</em>, 25 October 2013</a></p>
<p><a href="http://reason.com/archives/2013/08/16/cyberwar-is-mostly-bunk" target="_blank">&#8220;Cyber war is mostly bunk,&#8221; <em>Reason.com</em>, 16 August 2013</a></p>
<p>Interview, <a href="http://www.bbc.co.uk/news/business-21768897" target="_blank">2.34 mins</a>, <em>BBC Today, Radio 4</em>, 13 March 2013</p>
<p><object width="560" height="315"><param name="movie" value="//www.youtube.com/v/iiRq87Cmlo0?t=11m40s version=3&amp;hl=en_GB" /><param name="allowFullScreen" value="true" /><param name="allowscriptaccess" value="always" /><embed src="//www.youtube.com/v/iiRq87Cmlo0?version=3&amp;hl=en_GB" type="application/x-shockwave-flash" width="560" height="315" allowscriptaccess="always" allowfullscreen="allowfullscreen" /></object></p>
<p><a href="/no-cyber-war/">More</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p><p>The post <a href="https://ridt.co/cyber-war-will-not-take-place/">Cyber War Will Not Take Place</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deterrence Beyond the State</title>
		<link>https://ridt.co/deterrence-beyond-the-state/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Fri, 13 Apr 2012 16:35:28 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Containment]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Gaza]]></category>
		<category><![CDATA[Hamas]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Political Violence]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=1153</guid>

					<description><![CDATA[<p>Rid, T (2012) “Deterrence Beyond the State. The Israeli Experience” Contemporary Security Policy, April, vol 33, iss 1,  p. 124-147, DOI:10.1080/13523260.2012.659593 Israel’s experience with deterrence is unique: it is older, more diverse, and more experimental than that of any other state. How did Israel’s strategy of deterrence evolve? How was it adapted to fit the non-state threat? [&#8230;]</p>
<p>The post <a href="https://ridt.co/deterrence-beyond-the-state/">Deterrence Beyond the State</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T (2012) “Deterrence Beyond the State. The Israeli Experience” <em>Contemporary Security Policy</em>, April, vol 33,<br />
iss 1,  p. 124-147, <a href="http://perma-archives.org/warc/37MC-RMAR/http://www.tandfonline.com/doi/pdf/10.1080/13523260.2012.659593" target="_blank" rel="noopener nofollow" class="broken_link">DOI:10.1080/13523260.2012.659593</a></code></p>
<blockquote><p>Israel’s experience with deterrence is unique: it is older, more diverse, and more experimental than that of any other state. How did Israel’s strategy of deterrence evolve? How was it adapted to fit the non-state threat? And what is its utility? This article argues that Israel’s experience with deterrence beyond the state can best be understood through the conceptual lenses provided by the other grand deterrence debate, that in the philosophy of law, not international relations. Israel’s use of military force against non-state enemies doesn’t fit the classic concepts of strategy: it is not just one act of force to compel one actor to fulfill one specific political goal at one given time; deterrence consists of a series of acts of force to create — and maintain — general norms of behavior for many political actors over an extended period of time. Using force, consequently, doesn’t represent a principal failure of deterrence but its maintenance through swift, certain, but measured responses. The inquiry concludes by identifying the method’s limitations.</p></blockquote>
<div>
<p>Deterrence is as old as fear. Punishing offenders is a common theme in the Bible. Threatening potential aggressors with costly consequences has been a subject of political philosophy for centuries, especially in the theory of law. Yet in the history of strategy and international relations, deterrence received remarkably little attention before the mid 20th century. None of the masters of strategy of the 19th century has left much worthy of note about the age-old practice of administering threats by military means. Only in the Cold War were deterrence and retaliation explored in theory and elevated to policy. ‘The twentieth century is not the first century in which “retaliation” has been part of our strategy’, observed Thomas Schelling in the 1960s, ‘but it is the first in which we have systematically recognized it.’ [&#8230;]</p>
</div>
<p><a href="http://perma-archives.org/warc/37MC-RMAR/http://www.tandfonline.com/doi/pdf/10.1080/13523260.2012.659593" class="broken_link" rel="nofollow">Read more</a></p>
<p>Covered by</p>
<p>&#8220;<a href="http://warstudies.podomatic.com/player/web/2012-03-18T10_27_04-07_00" target="_blank" rel="noopener nofollow" class="broken_link">Deterrence &#8212; The Israeli Experience</a>&#8221; (27min) <em>War Studies Podcast</em>, 18 March 2012</p>
[audio:http://warstudies.podomatic.com/enclosure/2012-03-18T10_27_04-07_00.mp3]<p>The post <a href="https://ridt.co/deterrence-beyond-the-state/">Deterrence Beyond the State</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		<enclosure url="http://warstudies.podomatic.com/enclosure/2012-03-18T10_27_04-07_00.mp3" length="26753121" type="26753121" />

			</item>
		<item>
		<title>Cyber-Weapons</title>
		<link>https://ridt.co/cyber-weapons/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Wed, 29 Feb 2012 18:01:16 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Peter McBurney]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=1137</guid>

					<description><![CDATA[<p>Rid, T and P McBurney (2012) "Cyber-Weapons" The RUSI Journal, vol 157, iss 1, February, 6-13, DOI:10.1080/03071847.2012.664354  What are cyber-weapons? Instruments of code-borne attack span a wide spectrum, from generic but low-potential tools to specific but high-potential weaponry. This distinction brings into relief a two-pronged hypothesis that stands in stark contrast to some of the [&#8230;]</p>
<p>The post <a href="https://ridt.co/cyber-weapons/">Cyber-Weapons</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T and P McBurney (2012) "Cyber-Weapons" <em>The RUSI Journal</em>, vol 157, iss 1, February, 6-13, <a href="http://www.tandfonline.com/doi/pdf/10.1080/03071847.2012.664354" target="_blank" class="broken_link" rel="nofollow">DOI:10.1080/03071847.2012.664354</a> </code></p>
<p><em>What are cyber-weapons? Instruments of code-borne attack span a wide spectrum, from generic but low-potential tools to specific but high-potential weaponry. This distinction brings into relief a two-pronged hypothesis that stands in stark contrast to some of the received wisdom on cyber-security. Maximising the destructive potential of a cyber-weapon is likely to come with a double effect: it will significantly increase the resources, intelligence and time required for development and deployment – and more destructive potential is likely to decrease the number of targets, the risk of collateral damage and the political utility of cyber-weapons.</em></p>
<p>Read more (<a href="http://www.tandfonline.com/doi/pdf/10.1080/03071847.2012.664354" target="_blank" class="broken_link" rel="nofollow">PDF</a> | <a href="http://www.tandfonline.com/doi/full/10.1080/03071847.2012.664354#tabModule" target="_blank">html</a>)</p>
<p>Covered by</p>
<p>&#8220;Ansteckende Neugier,&#8221; <em>Der Spiegel</em>, 23/2012, p. 124</p>
<p><a href="/wp-content/uploads/2012/05/rid-bbc5-flame.mp3">BBC Radio 5</a>, 31 May 2012</p>
[audio:/wp-content/uploads/2012/05/rid-bbc5-flame.mp3]
<p><a href="http://podcasts.rusi.org/cyber-weapons" target="_blank" class="broken_link" rel="nofollow">RUSI podcast</a>, 23 April 2012</p>
[audio:http://traffic.libsyn.com/rusi/RUSIAnlysis_CyberSecurity_Apr2012.mp3]
<p>&#8220;<a href="http://www.schneier.com/blog/archives/2012/03/on_cyberwar_hyp.html" target="_blank">On Cyberwar Hype</a>&#8221; <em>Schneier on Security</em>, 14 March 2012</p>
<p>&#8220;<a href="http://www.infosecisland.com/blogview/20653-What-are-Cyber-Weapons.html" target="_blank" class="broken_link" rel="nofollow">What are Cyber Weapons?</a>&#8221; <em>Infosec Island</em>, 14 March 2012, reposted from <em>Cyber Arms</em></p>
<p><a href="/audio/rid-monocle.mp3">Radio interview</a> (7.47min), <em>Monocle 24</em>, 6 March 2012</p>
[audio:/audio/rid-monocle.mp3]
<p>&#8220;<a href="http://jerrybrito.com/2012/02/27/why-anonymous-will-never-be-able-to-take-down-the-power-grid/" target="_blank" class="broken_link" rel="nofollow">Why Anonymous will never be able to take down the power grid</a>,&#8221; <em>Jerry Brito</em>, 27 February 2012</p>
<p>&#8220;<a href="http://www.theregister.co.uk/2012/02/24/cyber_weapons/" target="_blank">The cyber-weapons paradox</a>,&#8221; <em>The Register</em>, 24 February 2012</p>
<p>&nbsp;</p><p>The post <a href="https://ridt.co/cyber-weapons/">Cyber-Weapons</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		<enclosure url="http://ridt.co/audio/rid-monocle.mp3" length="9336984" type="audio/mpeg" />
<enclosure url="http://traffic.libsyn.com/rusi/RUSIAnlysis_CyberSecurity_Apr2012.mp3" length="0" type="audio/mpeg" />
<enclosure url="http://ridt.co/wp-content/uploads/2012/05/rid-bbc5-flame.mp3" length="6444430" type="audio/mpeg" />

			</item>
		<item>
		<title>战争2.0</title>
		<link>https://ridt.co/war20-cn/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Mon, 07 Nov 2011 16:09:20 +0000</pubDate>
				<category><![CDATA[Books]]></category>
		<category><![CDATA[Marc Hecker]]></category>
		<category><![CDATA[Thomas Rid]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=1071</guid>

					<description><![CDATA[<p>War 2.0 is available in paperback in Chinese, published by the People&#8217;s Liberation Army Press. 战争2.0 信息时代的非常规战, 托马斯 里德 (作者), 马克 海克 (作者), 金苗 (译者), 出版社: 解放军出版社; 第1版 (2011年5月1日), 302页</p>
<p>The post <a href="https://ridt.co/war20-cn/">战争2.0</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><em>War 2.0</em> is available <a href="http://www.amazon.cn/gp/product/B005QISHBU" target="_blank">in paperback in Chinese</a>, published by the People&#8217;s Liberation Army Press.</p>
<p><code>战争2.0 信息时代的非常规战, 托马斯 里德 (作者), 马克 海克 (作者), 金苗 (译者), 出版社: 解放军出版社; 第1版 (2011年5月1日), 302页</code></p><p>The post <a href="https://ridt.co/war20-cn/">战争2.0</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber War Will Not Take Place</title>
		<link>https://ridt.co/no-cyber-war/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Mon, 10 Oct 2011 08:31:16 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Cyber attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber war isn't real]]></category>
		<category><![CDATA[cyber war will not happen]]></category>
		<category><![CDATA[Cyber war won't happen]]></category>
		<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[Stuxnet]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=1016</guid>

					<description><![CDATA[<p>Rid, T (2012) "Cyber War Will Not Take Place" Journal of Strategic Studies, vol 35, no 1, 5–32, February, https://perma.cc/U7QZ-UQ58* Out soon: significantly expanded and updated version as a book. For almost two decades, experts and defense establishments the world over have been predicting that cyber war is coming. But is it? This article argues in [&#8230;]</p>
<p>The post <a href="https://ridt.co/no-cyber-war/">Cyber War Will Not Take Place</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T (2012) "Cyber War Will Not Take Place"<em> Journal of Strategic Studies</em>, vol 35, no 1, 5–32, February,<br />
<a href="https://perma-archives.org/warc/U7QZ-UQ58/http://www.tandfonline.com/doi/pdf/10.1080/01402390.2011.608939" class="broken_link" rel="nofollow">https://perma.cc/U7QZ-UQ58</a>*</code></p>
<p><strong>Out soon</strong>: <a href="/cyber-war-will-not-take-place/">significantly expanded and updated version as a book</a>.</p>
<blockquote><p>For almost two decades, experts and defense establishments the world over have been predicting that cyber war is coming. But is it? This article argues in three steps that cyber war has never happened in the past, that cyber war does not take place in the present, and that it is unlikely that cyber war will occur in the future. It first outlines what would constitute cyber war: a potentially lethal, instrumental, and political act of force conducted through malicious code. The second part shows what cyber war is not, case-by-case. Not one single cyber offense on record constitutes an act of war on its own. The final part offers a more nuanced terminology to come to terms with cyber attacks. All politically motivated cyber attacks are merely sophisticated versions of three activities that are as old as warfare itself: sabotage, espionage, and subversion.</p></blockquote>
<p>In the mid-1930s, inspired by the lead-up to World War I, the French dramatist Jean Giraudoux wrote a famous play, <em>La guerre de Troie n’aura pas lieu</em>, the Trojan War will not take place. The English playwright Christopher Fry translated the two acts in 1955 as Tiger at the Gates. The plot is set inside the gates of the city of Troy. Hector, a disillusioned Trojan commander, tries to avoid in vain what the seer Cassandra has predicted to be inevitable: war with the Greeks. Giraudoux was a veteran of 1914 and later worked in the French foreign office. His tragedy is an eloquent critique of Europe’s leaders, diplomats, and intellectuals who were, again, about to unleash the dogs of war. The play premiered in November 1935 in the Théâtre de l&#8217;Athénée in Paris, almost exactly four years before the dramatist’s fears would come true.</p>
<p>Judging from present pronouncements about cyber war, the world seems to be facing another 1935-moment. ‘Cyberwar is Coming!’ declared the RAND Corporation’s John Arquilla and David Ronfeldt in 1993. It took a while for the establishment to catch on. ‘Cyberspace is a domain in which the Air Force flies and fights’, announced Michael Wynne, a US Air Force Secretary, in 2006. Four years later the Pentagon leadership joined in. ‘Although cyberspace is a man-made domain’, wrote William Lynn, America’s Deputy Secretary of Defense, in a 2010 Foreign Affairs article, it has become ‘just as critical to military operations as land, sea, air, and space’. In the same year, Richard Clarke, the White House’s former cyber tsar, invoked calamities of a magnitude that make 9/11 pale in comparison and urged taking a number of measures ‘simultaneously and now to avert a cyber war disaster’.4 In February 2011, then-Central Intelligence Agency Director Leon Panetta warned the House Permanent Select Committee on Intelligence: ‘The next Pearl Harbor could very well be a cyber attack.’ That year a highly sophisticated computer worm may have significantly damaged the Iranian nuclear enrichment program at Natanz. One much-noted investigative article in Vanity Fair concluded that the event foreshadowed the destructive new face of twenty-first century warfare, ‘Stuxnet is the Hiroshima of cyber-war.’</p>
<p>But is it? Are the Cassandras of cyber warfare on the right side of history? Is cyber war really coming?</p>
<p><a href="https://perma-archives.org/warc/U7QZ-UQ58/http://www.tandfonline.com/doi/pdf/10.1080/01402390.2011.608939" class="broken_link" rel="nofollow">Read more</a></p>
<div id="attachment_1108" style="width: 470px" class="wp-caption alignnone"><a href="/wp-content/uploads/2011/10/rid-fco-cyber-war-will-not-take-place.jpg"><img aria-describedby="caption-attachment-1108" class="size-full wp-image-1108" title="rid-fco-cyber-war-will-not-take-place" src="/wp-content/uploads/2011/10/rid-fco-cyber-war-will-not-take-place.jpg" alt="" width="470" srcset="https://ridt.co/wp-content/uploads/2011/10/rid-fco-cyber-war-will-not-take-place.jpg 4058w, https://ridt.co/wp-content/uploads/2011/10/rid-fco-cyber-war-will-not-take-place-300x112.jpg 300w, https://ridt.co/wp-content/uploads/2011/10/rid-fco-cyber-war-will-not-take-place-1024x383.jpg 1024w" sizes="(max-width: 4058px) 100vw, 4058px" /></a><p id="caption-attachment-1108" class="wp-caption-text">Presenting the argument at the British Foreign and Commonwealth Office, 23 January 2012</p></div>
<p>Covered by:</p>
<p>&#8220;La cyberguerre n’aura pas lieu, mais il faut s’y préparer&#8221; <em>Politique étrangère</em>, 2/2012, p. 305-316</p>
<p>&#8220;War and Peace&#8221; Joel Brenner, <em>Foreign Policy</em>, May/June 2012</p>
<p>&#8220;<a href="http://www.slate.fr/story/52107/cyberguerre-est-un-mythe" target="_blank" rel="noopener">La cyberguerre est un mythe</a>&#8221; <em>Slate.fr</em>, 10 April 2012</p>
<p>&#8220;<a href="http://standpointmag.co.uk/node/4390/full" target="_blank" rel="noopener nofollow" class="broken_link">Web Worriers</a>&#8221; <em>Standpoint</em>, April 2012</p>
<p>&#8220;On cyberwar hype&#8221; <em>Patch Monday</em> (ZDNet), 2 April 2012</p>
[audio:http://media.cnetnetworks.com.au/audio/musiccentre/patch_monday/patch_monday_ep132_01.mp3]
<p>&#8220;<a href="http://www.cfr.org/cybersecurity/fp-think-again-cyberwar/p27493" target="_blank" rel="noopener nofollow" class="broken_link">Must-read</a>&#8221; <em>Council on Foreign Relations</em>, March/April 2012</p>
<p>&#8220;<a href="http://nakedsecurity.sophos.com/2012/03/20/cyber-war-hype-or-reality/" target="_blank" rel="noopener">Hype or Reality?</a>&#8221; <em>Naked Security</em> (Sophos), 20 March 2012</p>
<p>&#8220;<a href="http://blog.foreignpolicy.com/posts/2012/03/14/xinhua_borrows_a_foreign_policy_article" target="_blank" rel="noopener nofollow" class="broken_link">Xinhua &#8216;borrows&#8217; a Foreign Policy article</a>&#8221; <em>Foreign Policy</em>, 14 March 2012</p>
<p>&#8220;<a href="http://www.schneier.com/blog/archives/2012/03/on_cyberwar_hyp.html" target="_blank" rel="noopener">On Cyberwar Hype</a>&#8221; <em>Schneier on Security</em>, 14 March 2012</p>
<p>&#8220;<a href="http://world.people.com.cn/GB/157278/17344585.html" target="_blank" rel="noopener">网络战难成现实威胁</a>&#8221; <em>People&#8217;s Daily</em>, 10 March 2012, reprinted in <em><a href="http://news.xinhuanet.com/world/2012-03/11/c_122803854_3.htm" target="_blank" rel="noopener nofollow" class="broken_link">Xinhua</a></em></p>
<p>&#8220;<a href="http://www.foreignpolicy.com/articles/2012/02/27/cyberwar_is_already_upon_us" target="_blank" rel="noopener nofollow" class="broken_link">Cyber War Is Already Upon Us</a>,&#8221; John Arquilla, <em>Foreign Policy</em>, March/April 2012</p>
<p>&#8220;<a href="http://www.foreignpolicy.com/articles/2012/02/27/cyberwar" target="_blank" rel="noopener">Think Again: Cyberwar</a>&#8221; the author, <em>Foreign Policy</em>, March/April 2012</p>
<p>&#8220;<a href="http://www.wilsonquarterly.com/article.cfm?AID=2066" target="_blank" rel="noopener">The empty threat of cyber war</a>,&#8221; <em>The Wilson Quarterly</em>, Winter 2012</p>
<p>&#8220;<a href="/wp-content/uploads/2011/10/Rid-KCL-comment.pdf" target="_blank" rel="noopener">Cyber war may not happen</a>,&#8221; <em>Comment</em>, iss 198, January 2012</p>
<p>&#8220;<a href="http://www.zdnet.de/news/41558064/experten-auch-cyberangriffe-koennen-menschen-toeten.htm" target="_blank" rel="noopener">Rid hat eine philosophisch-technische Diskussion ausgelöst</a>&#8221;  <em>ZDNet </em>(Germany), 17 November 2011</p>
<p>&#8220;Not theoretical, can actually kill&#8221; <em>ZDNet </em>(Asia), 17 November 2011</p>
<p>&#8220;<a href="http://www.stdaily.com/papergroup/content/2011-11/02/content_365723.htm" target="_blank" rel="noopener">网络战争还不会发生</a>&#8221; <em>Science and Technology Daily</em> (China), 4 November 2011</p>
<p>&#8220;<a href="http://www.kcl.ac.uk/ikings/index.php?id=626" target="_blank" rel="noopener nofollow" class="broken_link">War and freedom</a>&#8221; <em>KCL Comment </em>(podcast), 4 November 2011</p>
[audio:http://podcast.ulcc.ac.uk/accounts/kings/KCL_PR_podcasts/cyberspace_final.mp3]
<p><a href="http://www.schneier.com/blog/archives/2011/11/journal_article.html" target="_blank" rel="noopener">Recommended</a> by<em> Schneier on Security</em>, 3 November 2011</p>
<p>&#8220;<a href="http://www.forbes.com/sites/richardstiennon/2011/11/03/there-is-no-cyber-war-the-same-way-there-is-no-nuclear-war/" target="_blank" rel="noopener">No cyber war, no nuclear war</a>&#8221; <em>Forbes</em>, 3 November 2011</p>
<p>&#8220;<a href="http://jetzt.sueddeutsche.de/texte/anzeigen/532447" target="_blank" rel="noopener">Wahl der Waffen</a>&#8221; <em>Süddeutsche Zeitung</em>, 2 November 2011</p>
<p>&#8220;Cyber war (is not)&#8221; <em>Department of War Studies&#8217; Podcast</em>, 27 October 2011</p>
[audio:http://warstudies.podomatic.com/enclosure/2011-10-27T09_31_22-07_00.mp3]
<p>&#8220;<a href="http://www.forbes.com/sites/seanlawson/2011/10/26/cyber-war-and-the-expanding-definition-of-war/" target="_blank" rel="noopener">Rid’s essay has added fuel to the debate</a>&#8221; <em>Forbes</em>, 26 October 2011</p>
<p>&#8220;<a href="http://www.computerweekly.com/Articles/2011/10/25/248255/Japanese-Defence-Ministry-raises-concerns-about-cyber-breach-at-Mitsubishi.htm" target="_blank" rel="noopener">no lethal act of force</a>&#8221; <em>Computer Weekly</em>, 25 October 2011</p>
<p>&#8220;<a href="http://jeffreycarr.blogspot.com/2011/10/clausewitz-and-cyber-war.html">Clausewitz and Cyber War</a>&#8221; <em>Digital Dao</em>, 23 October 2011</p>
<p>&#8220;<a href="http://reason.com/blog/2011/10/21/cyber-war-still-not-a-thing">Still not a thing</a>&#8221; <em>Reason.com</em>, 21 October 2011</p>
<p>&#8220;<a href="http://www.theregister.co.uk/2011/10/20/cyber_war_wont_be_real/"><em>Die Hard 4</em> is just a movie, kids</a>&#8221; <em>The Register</em>, 20 October 2011</p>
<p>&#8220;<a href="http://www.securitylab.ru/news/408895.php" target="_blank" rel="noopener">Миру не грозит война в киберпространстве</a>&#8221; SecurityLab, 20 October 2011</p>
<p>&#8220;<a href="https://www.infosecisland.com/blogview/17381-Cyber-War-Will-Not-Take-Place.html" class="broken_link" rel="nofollow">an exceptional read</a>&#8221; <em>Infosec Island</em>, 20 October 2011, cross-posted from <em><a href="http://cyberarms.wordpress.com/2011/10/11/cyber-war-will-not-take-place/">Cyber Arms</a></em></p>
<p>&#8220;<a href="http://tachesdhuile.blogspot.com/2011/10/war-is-about-death-and-destruction.html">convincing</a>&#8221; <em>Ink Spots</em>, 20 October 2011</p>
<p>&#8220;<a href="http://inkings.org/2011/10/17/cyber-war-myth-or-reality/" target="_blank" rel="noopener nofollow" class="broken_link">myth or reality?</a>&#8221; <em>InKings</em>, 17 October 2011</p>
<p>&#8220;Hollywood producers short on ideas should talk to Rid&#8221; (.pdf) <em>InTouch</em>, Autumn 2011, p. 20-23</p>
<p>* Published with iFirst in the JSS in early October 2011.</p><p>The post <a href="https://ridt.co/no-cyber-war/">Cyber War Will Not Take Place</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		<enclosure url="http://podcast.ulcc.ac.uk/accounts/kings/KCL_PR_podcasts/cyberspace_final.mp3" length="11796114" type="audio/mpeg" />
<enclosure url="http://warstudies.podomatic.com/enclosure/2011-10-27T09_31_22-07_00.mp3" length="38292131" type="audio/mpeg" />
<enclosure url="http://media.cnetnetworks.com.au/audio/musiccentre/patch_monday/patch_monday_ep132_01.mp3" length="34250125" type="audio/mpeg" />

			</item>
		<item>
		<title>Abschreckung zwecklos?</title>
		<link>https://ridt.co/abschreckung-zwecklos/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Thu, 25 Aug 2011 08:42:20 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=962</guid>

					<description><![CDATA[<p>Rid, T. (2011) "Abschreckung zwecklos?" Internationale Politik 66/5 September-Oktober, p. 80-88 An analysis of different deterrence scenarios that should be discussed if Iran acquired nuclear weapons.* Arabischer Frühling und weltweite Schuldenkrise haben das iranische Atomprogramm während der vergangenen Monate beinahe in Vergessenheit geraten lassen. Dabei strebt das Regime in Teheran trotz schärferer Sanktionen mit noch größerem Ehrgeiz nach [&#8230;]</p>
<p>The post <a href="https://ridt.co/abschreckung-zwecklos/">Abschreckung zwecklos?</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T. (2011) "Abschreckung zwecklos?" <em>Internationale Politik </em>66/5 September-Oktober, p. 80-88</code></p>
<p><code></code>An analysis of different deterrence scenarios that should be discussed if Iran acquired nuclear weapons.*</p>
<div>
<div>
<blockquote><p>Arabischer Frühling und weltweite Schuldenkrise haben das iranische Atomprogramm während der vergangenen Monate beinahe in Vergessenheit geraten lassen. Dabei strebt das Regime in Teheran trotz schärferer Sanktionen mit noch größerem Ehrgeiz nach der nuklearen Waffe. Je näher der Iran seinem Ziel kommt, desto dringlicher wird eine neue Abschreckungsstrategie des Westens. Doch wie könnte eine solche Strategie aussehen?</p>
<p>Drei Szenarien sind zu berücksichtigen: Eine iranische Atombombe führt zu einem Wettrüsten im Mittleren Osten; ein nuklear bewaffneter Iran würde auf konventionellem sowie subnuklearem Niveau – also ohne die Waffe direkt einzusetzen – aggressiver auftreten; der Iran oder ein nach ihm die nukleare Schwelle überschreiten- der Staat könnte die Bombe offensiv einsetzen. Erst nach einer solchen Risikoanalyse ist eine mögliche Abschreckungsstrategie abzustecken und zu bewerten. Diese Überlegungen haben natürlich spekulativen Charakter, das liegt im Wesen der Abschreckung.  [&#8230;]</p></blockquote>
<p>Read more (<a href="/wp-content/uploads/2011/08/rid-abschreckung-zwecklos.pdf" target="_blank">PDF</a> | <a href="https://zeitschrift-ip.dgap.org/de/article/getFullPDF/19156" target="_blank" class="broken_link" rel="nofollow">html</a>)</p>
<p>* Korrektur: auf Seite 84, rechte Spalte, in der in dritten Zeile von unten geht es um das Szenario eines <em>Erstschlages</em>, nicht eines Zweitschlages. Entschuldigung.</p>
</div>
</div><p>The post <a href="https://ridt.co/abschreckung-zwecklos/">Abschreckung zwecklos?</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Risse im Dschihad</title>
		<link>https://ridt.co/risse-im-dschihad/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Mon, 02 May 2011 10:52:21 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[al-Qaeda]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[Counterterrorism]]></category>
		<category><![CDATA[Cracks in the Jihad]]></category>
		<category><![CDATA[Jihad]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=739</guid>

					<description><![CDATA[<p>Rid, T. (2011) "Risse im Dschihad" Internationale Politik 66/1 Januar-Februar, p. 10-19. The article was republished online with a new introduction after Bin Laden&#8217;s death on 2 May 2011. Osama Bin Laden ist tot. Bedeutet das den Sieg im Kampf gegen den Terrorismus, womöglich das Ende der Dschihad-Bewegung? Nein. Der Heilige Krieg wird wohl noch unübersichtlicher. Das könnte seine [&#8230;]</p>
<p>The post <a href="https://ridt.co/risse-im-dschihad/">Risse im Dschihad</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><em><a href="/wp-content/uploads/2011/01/ip-cover.jpg"><img loading="lazy" class="alignright size-full wp-image-741" title="ip-cover" src="/wp-content/uploads/2011/01/ip-cover.jpg" alt="" width="189" height="278" srcset="https://ridt.co/wp-content/uploads/2011/01/ip-cover.jpg 300w, https://ridt.co/wp-content/uploads/2011/01/ip-cover-204x300.jpg 204w" sizes="(max-width: 189px) 100vw, 189px" /></a></em><code>Rid, T. (2011) "Risse im Dschihad"<em> Internationale Politik</em> 66/1 Januar-Februar, p. 10-19.</code></p>
<p>The article was <a href="https://zeitschrift-ip.dgap.org/de/article/getFullPDF/17565" target="_blank" class="broken_link" rel="nofollow">republished online with a new introduction</a> after Bin Laden&#8217;s death on 2 May 2011.</p>
<blockquote><p>Osama Bin Laden ist tot. Bedeutet das den Sieg im Kampf gegen den Terrorismus, womöglich das Ende der Dschihad-Bewegung? Nein. Der Heilige Krieg wird wohl noch unübersichtlicher. Das könnte seine Eindämmung erschweren.</p></blockquote>
<p>Osama Bin Ladens Tod ist ein herber Rückschlag für Al-Kaida und die breitere Dschihad-Bewegung, psychologisch wie organisatorisch. Das Timing der amerikanischen verdeckten Operation im pakistanischen Abbottabad ist dabei ein zusätzliches Problem für die Gotteskrieger: Erst die arabischen Frühjahrsrevolten, bei denen Al-Kaida durch Abwesenheit glänzte, und jetzt das Ende ihrer Gallionsfigur. Zudem mussten die extremsten Taliban im pakistanisch-afghanischen Grenzgebiet in den vergangenen Monaten weitere Rückschläge einstecken.</p>
<p>Doch ist Vorsicht geboten. Jetzt könnte die Gefahr wachsen, dass Terroristen, mit dem Rücken zur Wand, verzweifelten Tatendrang entwickeln. Auch könnten sie das revolutionäre Chaos in einigen Ländern ausnutzen, etwa im Jemen. Pakistan bleibt in höchstem Maße instabil. Die Identitätskrise in muslimischen Diaspora-Gemeinden bleibt akut, gerade in den USA. Der globale Dschihad wird sich weiterhin in drei Strömungen aufspalten.</p>
<p>Da sind zum einen lokal agierende islamische Aufständische, die sich aus dem Unmut über den autoritären Führungsstil, die Korruption oder die Zusammenarbeit angeblich „abtrünniger“ arabischer Regime mit „ungläubigen“ äußeren Mächten rekrutieren. Aus Sicht mancher Extremisten ist eine Hinwendung zur Demokratie nur ein anderes Übel. Die zweite Strömung formiert sich aus einem mit organisiertem Verbrechen kombinierten Terrorismus, der vor allem in Afghanistan und Indonesien, aber auch in Europa zu beobachten ist und der sich unter anderem durch Drogenhandel und Erpressung finanziert. Die Mitglieder der dritten Strömung lassen sich schwerer als einheitliche Gruppe definieren. Es handelt sich dabei vornehmlich um junge Muslime, die in der zweiten oder dritten Generation in der Diaspora leben und sich in einem anhaltenden Zustand des Heiligen Krieges wähnen. Deren Motivation zum Kampf speist sich aus ihrer eigenen Unzufriedenheit, die sich auf eine Vielzahl von Gründen zurückführen lässt. Für die Al-Kaida-Führung heißt das zweierlei: Die Legitimität eines radikalen Islamismus nimmt in den Augen des „Mainstream“ der Muslime ab, und die Ränder der militanten Bewegung fransen aus.</p>
<p>Read more (<a href="/wp-content/uploads/2011/01/rid-risse-im-dschihad.pdf" target="_blank">PDF</a> | html)</p><p>The post <a href="https://ridt.co/risse-im-dschihad/">Risse im Dschihad</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Nineteenth Century Origins of Counterinsurgency Doctrine</title>
		<link>https://ridt.co/origins/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Fri, 22 Oct 2010 08:55:32 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Algeria]]></category>
		<category><![CDATA[Ann Marlowe]]></category>
		<category><![CDATA[Austin Long]]></category>
		<category><![CDATA[Bruno Reis]]></category>
		<category><![CDATA[civil-military relations]]></category>
		<category><![CDATA[COIN]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[David Galula]]></category>
		<category><![CDATA[Etienne de Durand]]></category>
		<category><![CDATA[French military]]></category>
		<category><![CDATA[Gian Gentile]]></category>
		<category><![CDATA[Hubert Lyautey]]></category>
		<category><![CDATA[Joseph-Simon Gallieni]]></category>
		<category><![CDATA[Madagascar]]></category>
		<category><![CDATA[razzia]]></category>
		<category><![CDATA[Stéphane Taillat]]></category>
		<category><![CDATA[Stephanie Pezard]]></category>
		<category><![CDATA[Thomas-Robert Bugeaud]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=684</guid>

					<description><![CDATA[<p>Rid, T. (2010) "The Nineteenth Century Origins of Counterinsurgency Doctrine" The Journal of Strategic Studies 33/5 October, p. 727-758. Counterinsurgency is a military activity centered on civilians. The counterinsurgent competes against the insurgent for the trust and the support of the uncommitted, civilian population. These assumptions have become a core conceptual foundation of today’s counterinsurgency debate and doctrine. The publication of a much-discussed [&#8230;]</p>
<p>The post <a href="https://ridt.co/origins/">The Nineteenth Century Origins of Counterinsurgency Doctrine</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><!-- p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 11.0px Times} --><code>Rid, T. (2010) "The Nineteenth Century Origins of Counterinsurgency Doctrine" <em>The Journal of Strategic Studies </em>33/5 October, p. 727-758.</code></p>
<p><cite><a href="/wp-content/uploads/2010/10/galula.jpg"><img loading="lazy" class="alignright size-full wp-image-685" title="galula" src="/wp-content/uploads/2010/10/galula-e1287734766133.jpg" alt="" width="140" height="181" srcset="https://ridt.co/wp-content/uploads/2010/10/galula-e1287734766133.jpg 250w, https://ridt.co/wp-content/uploads/2010/10/galula-e1287734766133-232x300.jpg 232w" sizes="(max-width: 140px) 100vw, 140px" /></a></cite></p>
<p>Counterinsurgency is a military activity centered on civilians. The counterinsurgent competes against the insurgent for the trust and the support of the uncommitted, civilian population. These assumptions have become a core conceptual foundation of today’s counterinsurgency debate and doctrine. The publication of a much-discussed US manual in December 2006, so-called FM 3-24 <em>Counterinsurgency</em>, prepared the ground for a fundamental reorientation of the use and the utility of force. Then, in 2008, the United States Army updated its most elemental capstone doctrine, Field Manual 3-0 Operations. It recognized and consolidated a ‘revolutionary departure from past doctrine’, its foreword announced. Modern wars are ‘increasingly fought ‘‘among the people’’’, General William Wallace wrote there. In more detail:</p>
<blockquote><p>Previously, we sought to separate people from the battlefield so that we could engage and destroy enemies and seize terrain. While we recognize our enduring requirement to fight and win, we also recognize that people are frequently part of the terrain and their support is a principal determinant of success in future conflicts</p></blockquote>
<p>Wallace’s carefully pronounced ‘previously’ hints at a historical trend that is as old as modern, industrial-age armies: the professionalization of military organizations, so succinctly described in Samuel Huntington’s <em>The Soldier and the State</em>. Officers became specialists in planning, equipping, training, and using industrial force to fight one another. The battlefield, in Winston Churchill’s words, turned into ‘a common professional meeting ground between military men’. Political affairs, be it in capitals or in theater, ceased to be the prerogative of officers who were trained as apolitical experts in the ‘management of violence’, not public administration. Against this background, the current shift appears remarkable and perhaps indeed revolutionary. So it is highly desirable to better understand the emergence of the military focus on the civilian population in theater. What are the roots of population-centric operations?</p>
<p>Read more (<a href="http://www.informaworld.com/smpp/ftinterface~content=a928462367~fulltext=713240930~frm=content" target="_blank" class="broken_link" rel="nofollow">PDF</a> | <a href="http://www.tandfonline.com/doi/abs/10.1080/01402390.2010.498259" target="_blank">html</a> | <a href="http://www.worldcat.org/title/the-nineteenth-century-origins-of-counterinsurgency-doctrine/oclc/4634810957&amp;referer=brief_results" target="_blank">in a library</a>)</p><p>The post <a href="https://ridt.co/origins/">The Nineteenth Century Origins of Counterinsurgency Doctrine</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stratégies et politiques de communication des belligérants non-étatiques</title>
		<link>https://ridt.co/non-etatiques/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Fri, 30 Apr 2010 07:28:46 +0000</pubDate>
				<category><![CDATA[Policy Papers]]></category>
		<category><![CDATA[al-Qaeda]]></category>
		<category><![CDATA[Counterterrorism]]></category>
		<category><![CDATA[Hamas]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[IDF]]></category>
		<category><![CDATA[Ifri]]></category>
		<category><![CDATA[Insurgency]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Jihad]]></category>
		<category><![CDATA[Marc Hecker]]></category>
		<category><![CDATA[Taliban]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=587</guid>

					<description><![CDATA[<p>with Marc Hecker, “Stratégies et politiques de communication des belligérants non-étatiques,” Centre d’Etudes en Sciences Sociales de la Défense (C2SD), Paris, Les Thématiques du C2SD, n° 21, 192 pages [&#8230;] Le constat de faiblesse pourrait conduire les « belligérants non-étatiques » àne pas se lancer dans la lutte. Tel n&#8217;est pas le cas. Combattre est en effet perçu [&#8230;]</p>
<p>The post <a href="https://ridt.co/non-etatiques/">Stratégies et politiques de communication des belligérants non-étatiques</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>with Marc Hecker, “Stratégies et politiques de communication des belligérants non-étatiques,” Centre d’Etudes en Sciences Sociales de la Défense (C2SD), Paris, Les Thématiques du C2SD, n° 21, 192 pages</p>
<p>[&#8230;]</p>
<p>Le constat de faiblesse pourrait conduire les « belligérants non-étatiques » àne pas se lancer dans la lutte. Tel n&#8217;est pas le cas. Combattre est en effet perçu par ces derniers comme une obligation éthique, résultant de la supériorité morale de la cause qu&#8217;ils défendent. L&#8217;origine de cette supériorité varie selon les situations. Les deux cas de figure les plus fréquents sont les luttes de libération nationale et les soulèvements à caractère religieux. Dans le premier, les insurgés combattent pour l&#8217;indépendance, la liberté et l&#8217;égalité, contre un adversaire étatique décrit comme un tyran impérialiste déniant au peuple son indépendance et ses droits civiques. Dans le second, ils considèrent comme un devoir religieux de mener une guerre contre un ennemi impie. L&#8217;exemple des jihadistes est, à cet égard, éloquent. Abdallah Azzam, perçu par certains comme le père spirituel d&#8217;Oussama Ben Laden, distinguait ainsi le « jihad offensif » du « jihad défensif ». Le « jihad offensif », qui consiste à « attaquer les infidèles dans leur pays », est considéré comme une « obligation collective » à laquelle il est possible, sous certaines conditions, de déroger. Le « jihad défensif » est en revanche une « obligation individuelle » et même « le plus important devoir individuel » lorsque « les infidèles pénètrent dans l&#8217;un des territoires musulmans » ou encore lorsqu&#8217;ils « font prisonniers des musulmans ».</p>
<p>Que ce soit dans le cadre d&#8217;une lutte de libération nationale ou d&#8217;une confrontation religieuse, le statu quo est si inconcevable pour les « belligérants non-étatiques» qu&#8217;ils sont prêts à mourir pour modifier la situation. L&#8217;importance de l&#8217;enjeu transparaît dans les slogans révolutionnaires. Le bataillon de Ngo Van Chieu avait par exemple choisi comme mot d&#8217;ordre « Mieux vaut mourir pour l&#8217;indépendance que de vivre en esclave ». Dans le même esprit, Amilcar Cabral, chef de la guérilla en Guinée et au Cap-Vert, ponctua son discours à la première conférence tricontinentale des peuples d&#8217;Asie, d&#8217;Afrique et d&#8217;Amérique latine (janvier 1966) en reprenant une devise chère aux guérilleros cubains : « Patria o Muerte ! Venceremos ! ».</p>
<p><a href="/wp-content/uploads/2010/04/hecker-rid-non-etatiques.pdf">Read more</a> (.pdf)</p><p>The post <a href="https://ridt.co/non-etatiques/">Stratégies et politiques de communication des belligérants non-étatiques</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Das Militär verdient Gehör</title>
		<link>https://ridt.co/das-militar-verdient-gehor/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Tue, 13 Apr 2010 08:09:25 +0000</pubDate>
				<category><![CDATA[Op-Eds]]></category>
		<category><![CDATA[Bundeswehr]]></category>
		<category><![CDATA[civil-military relations]]></category>
		<category><![CDATA[Kunduz]]></category>
		<category><![CDATA[Martin Zapfe]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=567</guid>

					<description><![CDATA[<p>With Martin Zapfe, Financial Times Deutschland, 13 April 2010, p. 24. In der Debatte über den Afghanistaneinsatz fehlt es oft an militärischem Sachverstand. Daher sollten sich Soldaten häufiger zu Wort melden &#8212; und auch mal Widerspruch wagen. Die Bundeswehr steht im politischen Gefecht. Die Meldungen aus Afghanistan sowie die Kundus-Debatte haben das Verhältnis von militärischer [&#8230;]</p>
<p>The post <a href="https://ridt.co/das-militar-verdient-gehor/">Das Militär verdient Gehör</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>With <a href="http://www.exc16.de/cms/zapfe.html" target="_blank">Martin Zapfe</a>, <cite>Financial Times Deutschland</cite>, 13 April   2010, p. 24.</p>
<p><em>In der Debatte über den Afghanistaneinsatz fehlt es oft an militärischem Sachverstand. Daher sollten sich Soldaten häufiger zu Wort melden &#8212; und auch mal Widerspruch wagen.</em></p>
<p>Die Bundeswehr steht im politischen Gefecht. Die Meldungen aus Afghanistan sowie die Kundus-Debatte haben das Verhältnis von militärischer und politischer Führung ins Scheinwerferlicht gerückt. Sind die zivil-militärischen Beziehungen in Deutschland dem Afghanistaneinsatz angemessen?</p>
<p>Die deutsche Haltung zum Einsatz militärischer Gewalt ist aus historischen Gründen besonders sensibel: Die Politik allein definiert das nationale Interesse und die Aufgaben der Streitkräfte, nicht Soldaten. Das Militär bleibt also immer Instrument. Es kann nichts anderes sein. Aber das Instrument agiert nicht immer militärisch.</p>
<p>[&#8230;]</p>
<p>Das Instrument Militär ist nicht mehr nur stumpfer Hammer, sondern ein scharfes Allzwecktaschenmesser. Soldaten müssen alles können: kämpfen, aufbauen, verhandeln. Das bleibt jedoch schwierig für eine Organisation, die dazu nicht ausgebildet wurde. Aber um als Allzweckwerkzeug zu funktionieren, braucht die Bundeswehr scharfsinnige &#8212; und manchmal scharfzüngige &#8212; Offiziere, die risikobereit sind und improvisieren können. Der Wetzstein für dieses Allzweckmesser kann nur die öffentliche Debatte sein. Und die braucht den Sachverstand der Soldaten.</p>
<p><a href="/wp-content/uploads/2010/04/rid-zapfe-gehor.pdf">Read more</a> (.pdf)</p><p>The post <a href="https://ridt.co/das-militar-verdient-gehor/">Das Militär verdient Gehör</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Understanding Counterinsurgency</title>
		<link>https://ridt.co/understanding-counterinsurgency/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Thu, 08 Apr 2010 07:25:20 +0000</pubDate>
				<category><![CDATA[Books]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[civil-military relations]]></category>
		<category><![CDATA[COIN]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[Counterterrorism]]></category>
		<category><![CDATA[David Galula]]></category>
		<category><![CDATA[Doctrine]]></category>
		<category><![CDATA[Field Manual 3-24]]></category>
		<category><![CDATA[Insurgency]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[population-centric operations]]></category>
		<category><![CDATA[Special Operations]]></category>
		<category><![CDATA[Surge]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://ridt.co/?p=538</guid>

					<description><![CDATA[<p>Rid, T. and T. Keaney (eds) Understanding Counterinsurgency London: Routledge (2010) 280p This textbook offers an accessible introduction to counterinsurgency operations, a key aspect of modern warfare. Featuring essays by some of the world’s leading experts on unconventional conflict, both scholars and practitioners, the book discusses how modern regular armed forces react, and should react, [&#8230;]</p>
<p>The post <a href="https://ridt.co/understanding-counterinsurgency/">Understanding Counterinsurgency</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T. and T. Keaney (eds) <em>Understanding Counterinsurgency</em><br />
London: Routledge (2010) 280p</code></p>
<p>This textbook offers an accessible introduction to counterinsurgency operations, a key aspect of modern warfare. Featuring essays by some of the world’s leading experts on unconventional conflict, both scholars and practitioners, the book discusses how modern regular armed forces react, and should react, to irregular warfare. The volume is divided into three main sections:</p>
<ol>
<li>Doctrinal Origins: analysing the intellectual and historical roots of modern Western theory and practice</li>
<li>Operational Aspects: examining the specific role of various military services in counterinsurgency, but also special forces, intelligence, and local security forces</li>
<li>Challenges: looking at wider issues, such as governance, culture, ethics, civil-military cooperation, information operations, and time.</li>
</ol>
<p><em>Understanding Counterinsurgency</em> is the first comprehensive textbook on counterinsurgency, and will be essential reading for all students of small wars, counterinsurgency and counterterrorism, strategic studies and security studies, both in graduate and undergraduate courses as well as in professional military schools.</p>
<p><iframe loading="lazy" style="border: 0px;" src="http://books.google.com/books?id=BVbg4UFhdvgC&amp;lpg=PP1&amp;dq=inauthor%3A%22Thomas%20Rid%22&amp;pg=PR5&amp;output=embed" frameborder="0" scrolling="no" width="500" height="500"></iframe></p>
<p>To request a copy for review, please contact:<br />
Jessica Plummer, jessica.plummer@taylorandfrancis.com, +1 212 216 7897</p>
<p>* Cover image <a href="http://www.flickr.com/photos/soldiersmediacenter/3322114115/" target="_blank">courtesy of the U.S. Army</a>.</p><p>The post <a href="https://ridt.co/understanding-counterinsurgency/">Understanding Counterinsurgency</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mehr Köche als Diplomaten</title>
		<link>https://ridt.co/mehr-koche-als-diplomaten/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Sat, 06 Feb 2010 21:28:34 +0000</pubDate>
				<category><![CDATA[Op-Eds]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Auswärtiges Amt]]></category>
		<category><![CDATA[Bundeswehr]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Guido Westerwelle]]></category>
		<category><![CDATA[Timo Noetzel]]></category>
		<category><![CDATA[Vernetzte Sicherheit]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=451</guid>

					<description><![CDATA[<p>With Timo Noetzel, Financial Times Deutschland, 5 February 2010, p. 26. Die Bundesregierung behauptet zwar, mit Militär allein sei Afghanistan nicht zu gewinnen &#8212; tatsächlich aber entsendet sie fast nur Soldaten. Fünf Vorschläge für mehr ziviles Engagement. Erfolg in Afghanistan kann nicht mit militärischen Mitteln allein herbeigeführt werden. Diese Feststellung ist zum parteiübergreifenden Mantra geworden. [&#8230;]</p>
<p>The post <a href="https://ridt.co/mehr-koche-als-diplomaten/">Mehr Köche als Diplomaten</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>With Timo Noetzel, <cite><a href="/d/noetzel-rid-mehr-koeche.pdf" target="_blank">Financial Times Deutschland</a></cite>, 5 February 2010, p. 26.</p>
<p><cite>Die Bundesregierung behauptet zwar, mit Militär allein sei Afghanistan nicht zu gewinnen &#8212; tatsächlich aber entsendet sie fast nur Soldaten. Fünf Vorschläge für mehr ziviles Engagement.</cite></p>
<div>
<div>
<p>Erfolg in Afghanistan kann nicht mit militärischen Mitteln allein herbeigeführt werden. Diese Feststellung ist zum parteiübergreifenden Mantra geworden. Doch in der Praxis bleibt die Bundeswehr der entscheidende Akteur. Um dies zu ändern, muss nun vor allem Außenminister Guido Westerwelle Worten Taten folgen lassen.</p>
<p>Nicht gute Absichten sind entscheidend. Die neue Strategie will umgesetzt und implementiert werden &#8211; und das kann nur das entsprechende Personal vor Ort leisten. Das heißt: nicht nur Soldaten, sondern auch Diplomaten; nicht nur mehr Truppen, sondern auch Entwicklungshelfer.</p>
<p>Die Bundeswehr hat derzeit eine Mandatsgrenze von 4500 Soldaten. Die Bundesregierung plant, nun bis zu 850 weitere Einsatzkräfte nach Afghanistan zu schicken. Zum Vergleich: Derzeit arbeiten insgesamt drei Mitarbeiter des höheren Dienstes des Auswärtigen Amts im Norden Afghanistans &#8212; in den Wiederaufbauteams in Kundus und Faisabad sowie beim Regionalkommandeur Nord in Masar-i-Scharif &#8212; sowie noch drei im gehobenen Dienst. Deutschland hat wohl mehr Köche als Diplomaten im Einsatz im Norden Afghanistans.</p>
<p><a href="/d/noetzel-rid-mehr-koeche.pdf" target="_blank">Read more</a> (.pdf)</p>
</div>
</div><p>The post <a href="https://ridt.co/mehr-koche-als-diplomaten/">Mehr Köche als Diplomaten</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lessons of War</title>
		<link>https://ridt.co/lessons/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Tue, 02 Feb 2010 13:07:47 +0000</pubDate>
				<category><![CDATA[Review]]></category>
		<category><![CDATA[Clausewitz]]></category>
		<category><![CDATA[Jena]]></category>
		<category><![CDATA[Napoleon]]></category>
		<category><![CDATA[Peter Paret]]></category>
		<category><![CDATA[Prussia]]></category>
		<category><![CDATA[The Cognitive Challenge of War]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=442</guid>

					<description><![CDATA[<p>“What the Prussians learned at the hands of Napoleon,” The Weekly Standard, 8 February, vol 15, no 20, review of Peter Paret’s The Cognitive Challenge of War. Prussia 1806. Princeton, 2009 It must have been an eerie Monday afternoon, on October 13, 1806. Napoleon rode through Jena, where French troops had already started looting. Hegel, [&#8230;]</p>
<p>The post <a href="https://ridt.co/lessons/">Lessons of War</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>“<a href="/d/rid-paret.pdf" target="_blank">What the Prussians learned at the hands of Napoleon</a>,” <cite>The Weekly Standard</cite>, 8 February, vol 15, no 20, review of Peter Paret’s <cite><a href="https://www.amazon.com/dp/0691135819?tag=kinofwar-20&amp;camp=213381&amp;creative=390973&amp;linkCode=as4&amp;creativeASIN=0691135819&amp;adid=0Q77RR6QQ8BDS544QDYR&amp;" target="_blank">The Cognitive Challenge of War. Prussia 1806</a></cite>. Princeton, 2009</p>
<p>It must have been an eerie Monday afternoon, on October 13, 1806. Napoleon rode through Jena, where French troops had already started looting. Hegel, in his study, was working on the last pages of his <cite>Phenomenology of Spirit</cite>. From a window the philosopher was able to spot “the Emperor” ride out of town: “Truly it is a remarkable sensation to see such an individual on horseback, raising his arm over the world and ruling it,” he later wrote to a friend. Europe was on the eve of one of the most momentous battles of its bloody history. Before sunrise on the next day, the fields still covered by mist, Bonaparte ordered an attack.</p>
<p>[&#8230;]</p>
<p>Prussia’s reaction to what could not be imagined, the shock of 1806, is the subject of <cite>The Cognitive Challenge of War</cite>. In what turned out to be a spectacularly productive quest, Germany’s greatest minds &#8212; among them artists, writers, and military intellectuals &#8212; went to work and wrestled with the consequences of France’s revolutionary wars. Paret is at his best when he deciphers some of the paintings and engrav- ings that depict the battle. Perhaps the most impressive is Caspar David Friedrich’s The Chasseur in the Forest. It is an elaborate allusion to Prussia’s defeat. On a narrow opening framed by a stand of firs, a <cite>chasseur à cheval</cite>, his horse and strength vanished, walks slowly into the dark forest. Watching is a raven on a tree stump, symbols of death.</p>
<p><a href="/d/rid-paret.pdf" target="_blank">Read more</a></p><p>The post <a href="https://ridt.co/lessons/">Lessons of War</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cracks in the Jihad</title>
		<link>https://ridt.co/cracks-in-the-jihad/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Sat, 09 Jan 2010 07:45:29 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[al-Qaeda]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[Counterterrorism]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[Gaza]]></category>
		<category><![CDATA[Insurgency]]></category>
		<category><![CDATA[Jihad]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=413</guid>

					<description><![CDATA[<p>Rid, T. (2010) "Cracks in the Jihad" The Wilson Quarterly 34/1 Winter, p. 40-48 “Get ready for all Muslims to join the holy war against you,” the jihadi leader Abd el-Kader warned his Western enemies. The year was 1839, and nine years into France’s occupation of Algeria the resistance had grown self-confident. Only weeks earlier, Arab fighters had wiped [&#8230;]</p>
<p>The post <a href="https://ridt.co/cracks-in-the-jihad/">Cracks in the Jihad</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><em><img loading="lazy" class="alignright size-full wp-image-614" title="WQ-cover" alt="" src="/wp-content/uploads/2010/01/WQ-cover.jpg" width="179" height="240" /></em><code>Rid, T. (2010) "Cracks in the Jihad" <em>The Wilson Quarterly</em> 34/1 Winter, p. 40-48</code></p>
<p>“Get ready for all Muslims to join the holy war against you,” the jihadi leader Abd el-Kader warned his Western enemies. The year was 1839, and nine years into France’s occupation of Algeria the resistance had grown self-confident. Only weeks earlier, Arab fighters had wiped out a convoy of 30 French soldiers en route from Boufarik to Oued-el-Alèg. Insurgent attacks on the slow-moving French columns were steadily increasing, and the army’s fortified blockhouses in the Atlas Mountains were under frequent assault.</p>
<p>[&#8230;]</p>
<p>Later that year, a well-known military thinker from Prussia traveled to Algeria to observe Bugeaud’s new approach. Major General Carl von Decker, who had taught under the famed Carl von Clausewitz at the War Academy in Berlin, was more forthright than his French counterpart. The fight against fanatical tribal warriors, he foresaw, “will throw all European theory of war into the trash heap.”</p>
<p>One hundred and seventy years later, jihad is again a major threat—and Decker’s dire analysis more relevant than ever. War, in Clausewitz’s eminent theory, was a clash of collective wills, “a continuation of politics by other means.” When states went to war, the adversary was a political entity with the ability to act as one body, able to end hostilities by declaring victory or admitting defeat. Even Abd el-Kader eventually capitulated. But jihad in the 21st century, especially during the past few years, has fundamentally changed its anatomy: Al Qaeda is no longer a collective political actor. It is no longer an adversary that can articulate a will, capitulate, and be defeated. But the jihad’s new weakness is also its new strength: Because of its transformation, Islamist militancy is politically impaired yet fitter to survive its present crisis.</p>
<p>In the years since late 2001, when U.S. and coalition forces toppled the Taliban regime and all but destroyed Al Qaeda’s core organization in Afghan istan, the bin Laden brand has been bleeding popularity across the Muslim world. The global jihad, as a result, has been torn by mounting internal tensions. Today, the holy war is set to slip into three distinct ideological and organizational niches. The U.S. surge in Afghanistan, whether successful or not, is likely to affect this development only marginally.</p>
<p>Read more (<a href="/wp-content/uploads/2013/05/rid-cracks-in-the-jihad.pdf" target="_blank">PDF</a> | <a href="http://wilsonquarterly.com/article.cfm?aid=1523" target="_blank">html</a> | <a href="http://www.worldcat.org/title/cracks-in-the-jihad-the-global-jihad-is-fragmenting-and-thats-not-good-news-for-the-west/oclc/506152664&amp;referer=brief_results" target="_blank">in a library</a>)</p><p>The post <a href="https://ridt.co/cracks-in-the-jihad/">Cracks in the Jihad</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Terror Fringe</title>
		<link>https://ridt.co/the-terror-fringe/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Tue, 01 Dec 2009 16:57:55 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[al-Qaeda]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[Counterterrorism]]></category>
		<category><![CDATA[Galula]]></category>
		<category><![CDATA[Insurgency]]></category>
		<category><![CDATA[Jihad]]></category>
		<category><![CDATA[Mao]]></category>
		<category><![CDATA[Marc Hecker]]></category>
		<category><![CDATA[Marx]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=387</guid>

					<description><![CDATA[<p>Rid, T. and M. Hecker (2009) "The Terror Fringe" Policy Review 158 December-January, p. 3-19 The Afghan-Pakistan border region is widely identified as a haven for jihadi extremists. But the joint between local insurgencies and global terrorism has been dislocated. A combination of new technologies and new ideologies has changed the role of popular support: In local insurgencies [&#8230;]</p>
<p>The post <a href="https://ridt.co/the-terror-fringe/">The Terror Fringe</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T. and M. Hecker (2009) "The Terror Fringe" <em>Policy Review</em> 158 December-January, p. 3-19</code></p>
<p>The Afghan-Pakistan border region is widely identified as a haven for jihadi extremists. But the joint between local insurgencies and global terrorism has been dislocated. A combination of new technologies and new ideologies has changed the role of popular support: In local insurgencies the population may still be the “terrain” on which resistance is thriving — and counterinsurgency, by creating security for the people, may still succeed locally. But Islamic violent extremism in its global and ambitious form is attractive only for groups at the outer edge, the flat end of a popular support curve. Jihad failed to muster mass support, but it is stable at the margin of society. Neither the West nor its enemies can win — or lose — a war on terror. [&#8230;]</p>
<p>The linkage between terrorism and insurgency has been altered in the early 21st century. Instead of seeing high-volume popular support in an insurgency as the “soil” on which resistance and terrorism are flourishing — and counterinsurgency as a competition for that support — an additional paradigm is needed: the “tail.”</p>
<p>Read more (<a href="/wp-content/uploads/2009/12/rid-hecker-terror-fringe.pdf">PDF</a> | <a href="http://www.hoover.org/publications/policyreview/71912517.html" class="broken_link" rel="nofollow">html</a> | <a href="http://www.worldcat.org/title/the-terror-fringe-the-deterritorialized-tail-of-jihad/oclc/503336578&amp;referer=brief_results" target="_blank">in a library</a>)</p><p>The post <a href="https://ridt.co/the-terror-fringe/">The Terror Fringe</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Counterinsurgency and the Allies</title>
		<link>https://ridt.co/counterinsurgency-and-the-allies/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Tue, 24 Nov 2009 17:00:47 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Anbar Awakening]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[Gian Gentile]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Organizational Learning]]></category>
		<category><![CDATA[Philipp Rotmann]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=299</guid>

					<description><![CDATA[<p>Forum: Progress, Dissent and Counter-Insurgency: An Exchange, Gian P. Gentile;  Thomas Rid;  Philipp Rotmann;  David Tohn; Jaron Wharton, Survival, vol 51, iss 6, p. 189-202 In the August-September 2009 issue of Survival (vol. 51, no. 4, pp. 31-48), Philipp Rotmann, David Tohn and Jaron Wharton argued that the US military&#8217;s change to a counterinsurgency posture in the on-going [&#8230;]</p>
<p>The post <a href="https://ridt.co/counterinsurgency-and-the-allies/">Counterinsurgency and the Allies</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.informaworld.com/smpp/content~db=all~content=a917062983" target="_blank" class="broken_link" rel="nofollow">Forum: Progress, Dissent and Counter-Insurgency: An Exchange</a>, Gian P. Gentile;  Thomas Rid;  Philipp Rotmann;  David Tohn; Jaron Wharton, <a href="http://www.informaworld.com/smpp/content~db=all~content=a917062983" target="_blank" class="broken_link" rel="nofollow">Survival</a>, vol 51, iss 6, p. 189-202</p>
<p>In the August-September 2009 issue of <cite>Survival</cite> (vol. 51, no. 4, pp. 31-48), Philipp Rotmann, David Tohn and Jaron Wharton argued that the US military&#8217;s change to a counterinsurgency posture in the on-going conflicts in Afghanistan and Iraq was catalysed by two products of an institutional culture that strove to be self-learning: the response of junior leadership to tactical problems and senior institutional dissidents driving deep, controversial changes in doctrine and culture. In this Survival Exchange two experts offer US and European perspectives on the authors&#8217; argument and recommendations to preserve and advance this dynamic in anticipation of future requirements for rapid change. A response from Rotmann, Tohn and Wharton concludes the debate.</p>
<p><a href="/wp-content/uploads/2009/11/gentile-rid-rotmann-tohn-wharton.pdf">Read more</a> (.pdf)</p><p>The post <a href="https://ridt.co/counterinsurgency-and-the-allies/">Counterinsurgency and the Allies</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Germany&#8217;s Options in Afghanistan</title>
		<link>https://ridt.co/afghan-option/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Wed, 30 Sep 2009 07:32:38 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[Counterterrorism]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[ISAF]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Timo Noetzel]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=249</guid>

					<description><![CDATA[<p>Noetzel, T. and T Rid "Germany's Options in Afghanistan" Survival 51/5, October-November, p. 71-90 Germany&#8217;s military mission in Afghanistan has become increasingly politicised in the eight years since it was launched. Political and ideological differences between parties and even between ministries are becoming more pronounced, not less. This trend narrows the room for manoeuvre and limits the [&#8230;]</p>
<p>The post <a href="https://ridt.co/afghan-option/">Germany’s Options in Afghanistan</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Noetzel, T. and T Rid "Germany's Options in Afghanistan" <em>Survival</em> 51/5, October-November, p. 71-90</code></p>
<p>Germany&#8217;s military mission in Afghanistan has become increasingly politicised in the eight years since it was launched. Political and ideological differences between parties and even between ministries are becoming more pronounced, not less. This trend narrows the room for manoeuvre and limits the strategic debate. Greater instability in Kunduz province, at the heart of Germany&#8217;s area of regional responsibility in Afghanistan, has two immediate effects: it both increases the need to act decisively and it heightens the risk of political paralysis in Berlin. This article argues that the latter is likely to prevail.</p>
<p>Read more (<a href="/wp-content/uploads/2009/11/noetzel-rid-afghan-options1.pdf" target="_blank">PDF</a> | <a href="http://www.informaworld.com/openurl?genre=article&amp;issn=0039-6338&amp;volume=51&amp;issue=5&amp;spage=71" target="_blank" class="broken_link" rel="nofollow">html</a> |<a href="http://www.worldcat.org/title/germanys-options-in-afghanistan/oclc/442025202&amp;referer=brief_results" target="_blank"> in a library</a>)</p><p>The post <a href="https://ridt.co/afghan-option/">Germany’s Options in Afghanistan</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Razzia</title>
		<link>https://ridt.co/razzia/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Fri, 11 Sep 2009 05:17:44 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Algeria]]></category>
		<category><![CDATA[bureaux arabes]]></category>
		<category><![CDATA[civil-military relations]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[David Galula]]></category>
		<category><![CDATA[French military]]></category>
		<category><![CDATA[population-centric operations]]></category>
		<category><![CDATA[razzia]]></category>
		<category><![CDATA[Thomas-Robert Bugeaud]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=239</guid>

					<description><![CDATA[<p>Rid, T. (2009) “Razzia. A Turning Point in Modern Strategy” Terrorism and Political Violence 21/4, p. 617-635 10.1080/03071847.2014.969932 The razzia, a tactic of swift and brutal raids used by the French military against recalcitrant tribes in Algeria in the 1840s, was a necessary step in modern military thought. At first glance the destructive and violent razzias stand [&#8230;]</p>
<p>The post <a href="https://ridt.co/razzia/">Razzia</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T. (2009) “Razzia. A Turning Point in Modern Strategy” <em>Terrorism and Political Violence</em> 21/4, p. 617-635 <a href="http://perma-archives.org/warc/4DS3-MRJU/http://www.tandfonline.com/doi/pdf/10.1080/03071847.2014.969932" class="broken_link" rel="nofollow">10.1080/03071847.2014.969932</a></code></p>
<p style="padding-left: 30px;">The razzia, a tactic of swift and brutal raids used by the French military against recalcitrant tribes in Algeria in the 1840s, was a necessary step in modern military thought. At first glance the destructive and violent razzias stand in stark contrast to the constructive and non-violent bureaux arabes &#8212; an institutional ancestor of Provincial Reconstruction Teams. But both were developed in the same conflict and by the same men. These two innovations, this article argues, were also flipsides of the same coin: what today is called war “among the people.” The razzia consequently appears as a necessary historic precursor for contemporary counterinsurgency doctrine.</p>
<p>Algiers in the 1840s was tantalizing. Seen from the deck of an approaching Alexandrian steamer, the “Pirate’s Daughter” &#8212; as contemporary travelers nicknamed the city &#8212; appeared like a triangular shape of chalk on a slope of green hills, the dark Atlas mountains rising menacingly in the distance behind. In 1837, just after the French had taken Algeria’s last Ottoman city in Constantine, it was the muezzin’s monotonous cry from a towering minaret that roused the traveler from his morning sleep. Such observed Thomas Campbell, a poet and one of the first Britons to describe Algeria after the French conquest. Ten years later, the sound that made sleep fragile in the mornings was the “irritating rattle of the regimental drums,” noted a later traveler from England. A “lively masquerade” awaited European visitors: narrow streets winding steeply up the hills, more like staircases than roads, spilling into public squares with porcelain pavement, framed by pillars and arches and palm trees. There they found French women wearing white aprons and handkerchiefs, Minorcan laborers returning from lush gardens, dark-skinned Kabyles offering fresh fruits, Berbers with embroidered coats, Jewish dandies with blue turbans, dark-eyed girls with bright sashes, old men playing chess. As bewildering as the peculiar smells and sounds were military men in their harlequin uniforms: zouaves with red pantaloons and white jackets; indigènes with black instead of yellow gaiters; spahis with red jackets and blue pantaloons; the chasseurs d’Afrique mounted on formidable Arab horses.</p>
<p>It was alien territory that awaited Major General Carl von Decker, a military thinker who had taught under Clausewitz at the Kriegsschule in Berlin. “Hopefully you left all your European ideas over there in Toulon,” a French officer greeted the Prussian general as he debarked from his vessel in Algiers. Decker came to Africa to observe the ongoing French campaign against Abd el-Kader’s insurrection. But the study of European warfare and its history was of limited use on the Mediterranean’s southern shores. Decker soon discovered that the essential elements of war as he knew it were missing in Algeria: There were no enemy positions that could be attacked, no fortifications, no operationally relevant locations, no strategic deployments, no lines of communication, no army, no decisive battles &#8212; in a word: there was “no center of gravity,” he noted in a direct, puzzled hint at Clausewitz. “The finest gimmicks of our newest theoreticians of war lose their magic power [in Africa].” One new element of war that baffled European observers was that territory could not be held. If a soldier “can’t even remain on the square-inch of land which he fought for with his own blood, then indeed the most sublime ‘Theory of Great War’ will be obsolete and one has &#8230; to come up with a new one,” Decker concluded.</p>
<p>How did that new theory of war emerge? &#8230;</p>
<p><a href="http://perma-archives.org/warc/4DS3-MRJU/http://www.tandfonline.com/doi/pdf/10.1080/03071847.2014.969932" class="broken_link" rel="nofollow">Read more</a></p><p>The post <a href="https://ridt.co/razzia/">Razzia</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Virtueller Erfolg</title>
		<link>https://ridt.co/virtueller-erfolg/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Wed, 01 Jul 2009 12:03:23 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[al-Qaeda]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Insurgency]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=184</guid>

					<description><![CDATA[<p>With Marc Hecker, Internationale Politik, Juli-August, p. 46-53 Die Afghanistan-Strategie der amerikanischen Regierung sowie der NATO geht von der Annahme aus, das Problem des Terrorismus werde an der Wurzel gepackt. Diese Prämisse – nämlich den Kampf gegen den Terrorismus in Afghanistan zu führen, um ihn nicht in Amerika führen zu müssen – hat Präsident Barack [&#8230;]</p>
<p>The post <a href="https://ridt.co/virtueller-erfolg/">Virtueller Erfolg</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>With Marc Hecker, Internationale Politik, Juli-August, p. 46-53</p>
<p>Die Afghanistan-Strategie der amerikanischen Regierung sowie der NATO geht von der Annahme aus, das Problem des Terrorismus werde an der Wurzel gepackt. Diese Prämisse – nämlich den Kampf gegen den Terrorismus in Afghanistan zu führen, um ihn nicht in Amerika führen zu müssen – hat Präsident Barack Obama von seinem Vorgänger George W. Bush übernommen. In der deutschen Afghanistan-Politik baut Bundes-kanzlerin Angela Merkel ebenfalls auf dem griffigen Diktum ihrer Vorgängerregierung auf, dass Deutschland auch am Hindukusch verteidigt werde. Eine ernsthafte Auseinandersetzung mit den Schwächen dieser Sichtweise blieb jedoch aus. Welche Wirkung hätte es auf den globalen Terrorismus, wenn die NATO in Afghanistan erfolgreich wäre? Dass dieses Szenario derzeit unwahrscheinlich ist, macht die Frage nur noch dringlicher. Denn stimmen die Annahmen überhaupt, auf denen die Aufstandsbekämpfung und die Afghanistan-Strategie der westlichen Verbündeten beruhen? Oder haben moderne Informationstechnologien, im Verbund mit neuen Ideologien, nicht vielmehr veränderte Voraussetzungen für politische Gewalt geschaffen?</p>
<p><a href="/wp-content/uploads/2009/11/rid-hecker-virtueller-erfolg.pdf">Read more</a> (.pdf)</p><p>The post <a href="https://ridt.co/virtueller-erfolg/">Virtueller Erfolg</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Jihadistes de tous les pays, dispersez-vous !</title>
		<link>https://ridt.co/jihadistes-de-tous-les-pays/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Tue, 16 Jun 2009 13:10:18 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[al-Qaeda]]></category>
		<category><![CDATA[Insurgency]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=159</guid>

					<description><![CDATA[<p>Hecker, M. and T. Rid (2009) "Jihadistes de tous les pays, dispersez-vous !" Politique Internationale, 123 printemps, p. 175-189 Le terrorisme est souvent considéré, de nos jours, comme la menace numéro un planant sur les sociétés occidentales. Il suffit, pour s&#8217;en rendre compte, de comparer deux documents français : le Livre Blanc sur la Défense de 1994 et [&#8230;]</p>
<p>The post <a href="https://ridt.co/jihadistes-de-tous-les-pays/">Jihadistes de tous les pays, dispersez-vous !</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Hecker, M. and T. Rid (2009) "Jihadistes de tous les pays, dispersez-vous !" <em>Politique Internationale</em>, 123 printemps, p. 175-189</code></p>
<p>Le terrorisme est souvent considéré, de nos jours, comme la menace numéro un planant sur les sociétés occidentales. Il suffit, pour s&#8217;en rendre compte, de comparer deux documents français : le Livre Blanc sur la Défense de 1994 et le Livre Blanc sur la Défense et la Sécurité nationale de 2008. Dans ce dernier, contrairement à celui de 1994, le terrorisme est omniprésent, à tel point que cette forme de conflictualité semble éclipser la menace de la guerre. [&#8230;]</p>
<p>Où en est l&#8217;organisation jihadiste aujourd&#8217;hui ? A-t-on raison de l&#8217;ériger en menace suprême ? Comment la mouvance jihadiste internationale a-t-elle évolué depuis une dizaine d&#8217;années ? Et selon quels scénarios pourrait-elle décliner à l&#8217;avenir ?</p>
<p>Read more (<a href="/wp-content/uploads/2009/11/hecker-rid-jihadistes.pdf" target="_blank">PDF</a> | <a href="http://www.politiqueinternationale.com/revue/article.php?id_revue=123&amp;id=807&amp;content=synopsis" target="_blank" class="broken_link" rel="nofollow">html</a> | <a href="http://www.worldcat.org/title/jihadistes-de-tous-les-pays-dispersez-vous/oclc/401221359&amp;referer=brief_results" target="_blank">in a library</a>)</p><p>The post <a href="https://ridt.co/jihadistes-de-tous-les-pays/">Jihadistes de tous les pays, dispersez-vous !</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Roots of Germany&#8217;s Russia Policy</title>
		<link>https://ridt.co/russia/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Wed, 25 Mar 2009 17:04:45 +0000</pubDate>
				<category><![CDATA[Journal Articles]]></category>
		<category><![CDATA[Christopher Chivvis]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[German Foreign Policy]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[SAIS]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=138</guid>

					<description><![CDATA[<p>Chivvis, C. and T. Rid (2009) "The Roots of Germany's Russia Policy" Survival 51/2 April-May, p. 105-122 10.1080/00396330902860850 In the aftermath of the Cold War, many American observers expected that the new Germany would more or less follow in the strong Atlanticist tradition of the old West Germany and its Conservative leadership in particular. A rejuvenated, reunited [&#8230;]</p>
<p>The post <a href="https://ridt.co/russia/">The Roots of Germany’s Russia Policy</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Chivvis, C. and T. Rid (2009) "The Roots of Germany's Russia Policy" <em>Survival</em> 51/2 April-May, p. 105-122 <a href="//perma-archives.org/warc/K5TT-L26W/http://www.tandfonline.com/doi/pdf/10.1080/00396330902860850" class="broken_link" rel="nofollow">10.1080/00396330902860850</a></code></p>
<p>In the aftermath of the Cold War, many American observers expected that the new Germany would more or less follow in the strong Atlanticist tradition of the old West Germany and its Conservative leadership in particular. A rejuvenated, reunited Germany is now seeking a more prominent role in international affairs, but its foreign policy is evolving away from the staunch Atlanticism that predominated during the Cold War. Two decades after the fall of the Berlin Wall, Germany unquestionably sees the United States as a crucial ally, but also sees Russia as an inevitable partner for the stability of the European order. The bottom line for most German leaders is that the isolation of Russia is unacceptable and must be avoided at all costs. It would deprive the West of its few remaining economic levers over Russian policy and leave Europe and the United States with only cruder means of influencing Russian behaviour. Meanwhile, Russian nationalism and even militarism could accelerate. The sense that Germany has become Russia&#8217;s last strong link with the West only intensifies German concern, driving German leaders to redouble their efforts to maintain good relations.</p>
<p><a href="//perma-archives.org/warc/K5TT-L26W/http://www.tandfonline.com/doi/pdf/10.1080/00396330902860850" class="broken_link" rel="nofollow">Read more</a></p><p>The post <a href="https://ridt.co/russia/">The Roots of Germany’s Russia Policy</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>War 2.0</title>
		<link>https://ridt.co/war-20/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Wed, 04 Feb 2009 18:33:28 +0000</pubDate>
				<category><![CDATA[Books]]></category>
		<category><![CDATA[al-Qaeda]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[IDF]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[Insurgency]]></category>
		<category><![CDATA[Marc Hecker]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[War 2.0]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=64</guid>

					<description><![CDATA[<p>Rid, T. and M. Hecker War 2.0: Irregular Warfare in the Information Age Westport: Praeger (2009) 280p New: War 2.0 in Chinese by the People’s Liberation Army Press, as &#8220;战争2.0&#8220; War 2.0: Irregular Warfare in the Information Age, co-authored with Marc Hecker, argues that two intimately connected trends are putting modern armies under huge pressure to [&#8230;]</p>
<p>The post <a href="https://ridt.co/war-20/">War 2.0</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T. and M. Hecker <em>War 2.0: Irregular Warfare in the Information Age</em> Westport: Praeger (2009) 280p</code></p>
<p><em>New:</em> <a href="/war20-cn/" target="_blank">War 2.0 <em>in </em></a><em><a href="/war20-cn/" target="_blank">Chinese</a> by the People’s Liberation Army Press, as &#8220;</em>战争2.0<em>&#8220;</em></p>
<p><a href="http://www.amazon.com/War-2-0-Irregular-Warfare-Information/dp/0313364702" target="_blank"><em>War 2.0: Irregular Warfare in the Information Age</em></a>, co-authored with <a href="http://www.ifri.org/?page=research_fellow_detail&amp;id=53" target="_blank">Marc Hecker</a>, argues that two intimately connected trends are putting modern armies under huge pressure to adapt: the rise of insurgencies and the rise of the Web. Both in cyberspace and in warfare, a public dimension has assumed increasing importance in recent years. After the dot-com bubble burst in 2000, Web 2.0 rose from the ashes. This newly interactive and participatory form of the Web promotes and enables offline action. Similarly, after an attempt to transform the U.S. military into a lean, lethal, computerized force faltered in Iraq in 2003, counterinsurgency rose from the ashes. Counterinsurgency is a social form of war &#8212; indeed, the U.S. Army calls it “armed social work” &#8212; in which the local population becomes the center of gravity and public opinion at home the critical vulnerability.</p>
<p><em>War 2.0</em> traces the contrasting ways in which insurgents and counterinsurgents have adapted irregular conflict. It examines the public affairs policies of the U.S. land forces, the British Army, and the Israel Defense Forces. Then it compares the media-related counterinsurgency methods of these conventional armies to the more diverse methods devised by their asymmetric adversaries, showing how such organizations as al-Qaeda, the Taliban, and Hezbollah use the Web not merely to advertise their political agenda and influence public opinion, but to mobilize a following and put insurgent operations into action. But the same technology that tends to level the operational playing field in irregular warfare also incurs heavy costs on terrorists and insurgents. (<a title="Amazon.com" href="http://www.amazon.com/War-2-0-Irregular-Warfare-Information/dp/0313364702" target="_blank">hardback</a>)</p>
<p style="padding-left: 30px; text-align: left;">Thematically rich and masterfully constructed, this book shows how our wired-up world has changed the operational environment, making both war and insurgency more complex, decentralised, and bottom-up. Few other books have grasped so effectively the seismic change in the character of war. War 2.0 is Clausewitz rebooted for the 21st century.<br />
&#8212; <strong>Christopher Coker</strong>, Professor of International Relations, The London School of Economics, author of <a title="Humane Warfare at Google Books" href="http://books.google.com/books?id=Zc9s-v08L64C&amp;dq=humane+warfare&amp;printsec=frontcover&amp;source=bn&amp;hl=en&amp;sa=X&amp;oi=book_result&amp;resnum=4&amp;ct=result" target="_blank">Humane Warfare</a></p>
<p style="padding-left: 30px;">War, flowing from society as a whole, is constantly evolving. Winning wars requires understanding the changing environment and adapting faster than the enemy. Rid and Hecker provide powerful case studies on how our primary enemies have understood and adapted to the changes Web 2.0 is driving. It would behoove professionals to read and understand this remarkable book.<br />
&#8212; <strong>T.X. Hammes</strong>, Colonel (Ret), U.S. Marine Corps, author of <a title="The Sling and the Stone" href="http://www.amazon.com/Sling-Stone-War-21st-Century/dp/0760320594" target="_blank">The Sling and the Stone</a></p>
<p style="padding-left: 30px;">High-tech revolutions are rocking the military and the media, toppling hierarchies, and upending traditional players. Until now, no one has shown how these twin upheavals are linked&#8211;and feeding one an-other. War 2.0 reveals how the old ways of war and communications are coming apart, and what the chaotic, self-organizing, networked future is likely to be.<br />
&#8212; <strong>Noah Shachtman</strong>, Wired magazine, editor of Danger Room, a security blog</p>
<p style="padding-left: 30px;">The public, more than ever before, has become the center of gravity in irregular warfare. Sharp and testing, <em>War 2.0</em> probes the burgeoning impact of the new media.<br />
&#8212; <strong>Gérard Chaliand</strong>, author of <a title="History of Terrorism at Google Books" href="http://books.google.com/books?id=YmpfgNqmVXYC&amp;printsec=frontcover" target="_blank">History of Terrorism. From Antiquity to Al Qaida</a>.</p>
<p>For review copies, contact <span class="Text"><a href="mailto:reviewcopies@abc-clio.com">reviewcopies@abc-clio.com</a></span></p>
<p><strong>Reviews</strong></p>
<blockquote><p>Jem Thomas, <em><a href="http://mwc.sagepub.com/cgi/reprint/3/1/114?etoc" target="_blank" class="broken_link" rel="nofollow">Media, War, and Conflict</a></em>, Vol 3; Iss 1, 2010, p. 114-115 (<a href="http://mwc.sagepub.com/cgi/reprint/3/1/114.pdf" target="_blank" class="broken_link" rel="nofollow">.pdf</a>)</p>
<p>George Michael, <em><a href="http://www.informaworld.com/smpp/content~db=all~content=a919760761" target="_blank" class="broken_link" rel="nofollow">Terrorism and Political Violence</a></em>, Vol 22, 2 April 2010, 332-334</p>
<p>Robert Cassidy, &#8220;War in the Information Age,&#8221; <em>Parameters</em>, winter 2009/2010, 117-122 (<a href="http://www.carlisle.army.mil/usawc/parameters/Articles/09winter/cassidy%20review%20essay.pdf" target="_blank" class="broken_link" rel="nofollow">.pdf</a>).</p>
<p>A. C. Tuttle, <em>Choice </em>(Association of College &amp; Research Libraries), February 2010</p>
<p>Stéphane Taillat, <em>Revue Française de Sciences Politiques,</em> No 6, Vol 59, Décembre 2009 (<a href="/wp-content/uploads/2010/01/war20-review-taillat.pdf">.pdf</a>)</p>
<p><em>Défense et Sécurité Internationale</em>, No 51, décembre 2009, p. 98 (<a href="/wp-content/uploads/2010/03/dsi-review-war20.pdf">.pdf</a>)</p>
<p>Jacques Perriault, <em><a href="http://www.iscc.cnrs.fr/spip.php?article697" target="_blank">Hermès</a></em>, No 55, décembre 2009</p></blockquote><p>The post <a href="https://ridt.co/war-20/">War 2.0</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>War and Media Operations</title>
		<link>https://ridt.co/war-and-media-operations/</link>
		
		<dc:creator><![CDATA[Thomas Rid]]></dc:creator>
		<pubDate>Wed, 28 Jan 2009 00:28:00 +0000</pubDate>
				<category><![CDATA[Books]]></category>
		<category><![CDATA[adaptation]]></category>
		<category><![CDATA[Counterinsurgency]]></category>
		<category><![CDATA[Media-Military Relations]]></category>
		<category><![CDATA[Military adaptation]]></category>
		<category><![CDATA[Nonaka]]></category>
		<category><![CDATA[Organizational adaptation]]></category>
		<category><![CDATA[Organizational Learning]]></category>
		<guid isPermaLink="false">http://thomasrid.wordpress.com/?p=72</guid>

					<description><![CDATA[<p>Rid, T. War and Media Operations. The US Military and the Press from Vietnam to Iraq London: Routledge (2007) 229p In late summer 2002 the Pentagon considered giving the press an inside view of the upcoming invasion of Iraq. The decision that followed seemed to contradict earlier more restrictive policies, and the innovative “embedded media program” itself [&#8230;]</p>
<p>The post <a href="https://ridt.co/war-and-media-operations/">War and Media Operations</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><code>Rid, T. <em>War and Media Operations. The US Military and the Press from Vietnam to Iraq</em> London: Routledge (2007) 229p</code></p>
<p>In late summer 2002 the Pentagon considered giving the press an inside view of the upcoming invasion of Iraq. The decision that followed seemed to contradict earlier more restrictive policies, and the innovative “embedded media program” itself received intense coverage in the media. Many observers denounced the program as a new and sophisticated form of propaganda. The critics implicit assumption was that the Pentagon had become better at its news management and that the American military had learned to co-opt the media. <a title="Read" href="http://www.amazon.com/gp/reader/0415416590/ref=sib_dp_ptu#reader-link" target="_blank"><em>War and Media Operations</em></a> tests this assumption. It introduces a model of organizational learning and military innovation, redraws the US military’s cumbersome learning curve in public affairs from Vietnam, Grenada, Panama, the Persian Gulf, Somalia, and the Balkans to Afghanistan, and finally examines whether the lessons of the past were implemented during the invasion of Iraq in 2003.</p>
<p style="padding-left: 30px;">“War and Media Operations is must-reading for anyone who wants to understand how modern wars are sold to public opinion.”<br />
&#8212; Jamie Shea, Director of Policy Planning at NATO, alliance spokesman during the Kosovo War</p>
<p style="padding-left: 30px;">“Those who support or oppose ‘embedded’ journalism will find ammunition here but Rid himself doesn’t take shots.”<br />
&#8212; Steven Komarow, USA TODAY, embedded with the US Army’s V Corps during the Iraq War</p>
<p style="padding-left: 30px;">“thought-provoking, insightful, and deeply engaging”<br />
&#8212; Ikujiro Nonaka, Graduate School of International Corporate Strategy, Hitotsubashi University, Tokyo, author of <em>The Knowledge Creating Company</em></p>
<p style="padding-left: 30px;">“The best analysis I have yet seen of the role of Public Affairs within the wider context of Information Operations.”<br />
Philip Taylor, University of Leeds, UK, author of<em><a title="Munitions of the Mind" href="http://www.amazon.com/Munitions-Mind-History-Propaganda-Third/dp/0719067677" target="_blank"> Munitions of the Mind: A History of Propaganda</a></em></p>
<p>Reviews</p>
<blockquote><p>Naveen Sharma, Pointer, 2011, vol 36, no 3-4, p. 74-75 (<a href="/wp-content/uploads/2011/04/sharma-review.pdf" target="_blank">.pdf</a>)</p>
<p>Politique étrangère, 2007, no. 3, p.674-675</p>
<p>British Journalism Review, vol. 18, no. 3, 2007, p.89-91</p>
<p>Steve Tatham, The War and Media Network, April 2008</p></blockquote>
<p style="padding-left: 30px;"><p>The post <a href="https://ridt.co/war-and-media-operations/">War and Media Operations</a> first appeared on <a href="https://ridt.co">Thomas Rid</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
