StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Military Security in Modern Warfare - Essay Example

Cite this document
Summary
The paper "Military Security in Modern Warfare" states that military engagements are more similar to each other than to conventional warfare; once the bases are established in a foreign nation, a guerrilla war usually ensues much similar to a local insurgency…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Military Security in Modern Warfare
Read Text Preview

Extract of sample "Military Security in Modern Warfare"

? Military Security 16-2 A nation’s capability to defend itself, more commonly known as military security, has expanded from conventional warfare to more complex form of engagements like nuclear & biological warfare to the fourth generation warfare that is between the state and insurgents. Since prehistoric era, as Paleri (2008) states, the war has been influencing human psyche and until the limitations of war are properly understood, the importance of military security in conventional terms will remain a priority. As a result of such change in warfare, the two kinds of engagements common in the 21st century are the projected power to another nation and encountering insurgents in the homeland. Both these military engagements are more similar to each other than to conventional warfare; once the bases are established in a foreign nation, a guerrilla war usually ensues much similar to a local insurgency. Military security can further be categorized in respect of its needs in and outside a military base. This categorization is based on the security dynamics of defending a stronghold and escorting a moving vehicle, crowd or even protecting civilian infrastructure. Both are essential for a military force to dominate; having a secure military base is not enough for a military to be considered successful when it is being harassed by a much smaller force in hit and run attacks. Bloody, city wide, offensives often cause millions to displace. Though this helps secure the city, the consequences are not pleasant for the security in the long term. Once the population returns to the war struck region, it is easy for the insurgents to mix up in the civilian population to infiltrate. This is a significant security challenge for the military. Wadhams reports in The Cincinnati Post, in 2004, of an insurgent infiltrating a fully guarded US security base that was protected by barbed wires and blast walls at Mosul and setting of one of the deadliest explosions. Under such circumstances, security measures often keep on changing to meet the dynamic needs. Adaptability is an essential in ‘fluid situations’, 1st Sgt. Steve Valley is reported to have said in the same report. Suicide attacks change the whole nature of security dynamics as the attacker aims to kill himself in the attack. For the conventional and nuclear warfare, the security of the personnel and equipment is foreseeable but for terrorist attacks, knowing what the enemy is capable of is solely dependent upon previous encounters and intelligence. Pappalardo (2004) reports in “National Defense” about US military as bases being equipped with chemical and biological detectors as a precaution against attacks from weapons of mass destruction. Security of military bases in the current situation is much sophisticated, especially when it comes to the smaller installations; they rely on first responders and outside help unlike the major ones which have coordination with the local authorities, be it in an occupied territory or in the home country. As the requirement puts it, smaller bases are much more in number and raise the need for sufficient security for undisrupted operations so that they can continue to operate in balance with survival and mission success. Kemp (2008) lists a series of security measures used in protecting the bases in his report on base protection in Armada International. With sufficiently trained personnel, the security measures can range from deploying simple sandbags, screens to disrupt direct line of sight, barriers and fortifications to all weather sensors, patrolling systems, anti personnel mines, counter rocket and mortar systems (C-Ram) and a command and control system. Intruder alarms and alertness is the key to defusing any grave situations in event of an attack. Dunigan (2011) highlights the peak utilization of private military security contractors in Victory for Hire: Private Security Companies' Impact on Military Effectiveness. This takes off the load of training and recruiting from the military and allows the military to focus personnel to more demanding tasks but huge deployments of private contractors also constitute problems. Outsourcing of violence to mercenaries to avoid political consequences and lowering expenditure might be tempting to the military but the risk is far greater. Dunigan assess the lack of coordination, tensions and even hostilities in scenarios where military and private contractors have been co-deployed alongside each other for military security purposes. To remedy this setback, more accountability should be expected from the private contractors who work with professional soldiers. The resentment over differences in salaries of professional soldiers and mercenaries, friendly fire incidents, and soldiers’ lack of knowledge about the extent to which private security contractors are present and being used in missions only pile up to complications. Since it is very less likely to not use private contractors any time in the near future, it is important that this coordination should be established and the problems be alleviated. The military security outside the base is a whole different story. Military vehicles have often been ambushed or targeted with prepositioned improvised explosive devices (IEDs). Forging of explosive devices by the use of commonly available materials is hard to prevent and is very versatile. The use of IEDs not only is a nuisance and disrupts operations but also has psychological implications. A bomb under every other car, an ambush set up at every other corner and hit and run raids on convoys are extremely defeating towards the general morale of the military and causes hesitation in the soldiers not only at the frontline but also those at the supply line. IEDs have become one of the favorite weapons of guerrillas over the time. Maoists in India, Taliban in Pakistan, Viet Cong in Vietnam as per History.navy.mil and al-qaeda and other terrorists such as Timothy McVeigh and Terry Nichols as reported by Shariat et. al (1998) and Rimer (1995) respectively, have been reported to have used IEDs for their targets. Military branches such as RAF have specially trained their teams in counter insurgent operations that specialize in defusing IEDs and preventing attacks based on improvised explosive devices. As per a 2010 newswire from US Fed News Service, IEDs have been killing a large number of Afghan and UK forces and no particular solution can be applied to resolve the IED attacks. To counter this, bomb disposal squads to find IEDs on the frontline and supply routes would be the best dynamic mechanism. Per the newswire, about 300 IEDs go off around the world annually. While attacking the insurgents’ bases where IEDs might be constructed and playing offensive would decrease the attacks significantly, the fear of unknown has still to be countered by actually remedying these attacks. Modern militaries use robots (autonomous or remotely operated) and unmanned machinery to locate and disarm IEDs in addition to sniffer dogs. No matter how much expertise a person can have, the dangerousness of defusing IEDs remains high. Hukam Khan, a Pakistani bomb disposal officer responsible for defusing hundreds of IEDs per year, was reported by Dawn News (2012) to have been killed by a second IED explosion while he was securing the first one he defused. Military security, both internally in a base or in a hostile terrain, has evolved to a much complex and dynamic task. To successfully attain perfect security in the modern warfare, alertness and training is the key even when equipped with the most modern technology. References Prabhakaran Paleri (2008). National Security: Imperatives And Challenges. New Delhi: Tata McGraw-Hill. pp. 521. ISBN 978-0-07-065686-4. Nick Wadhams, Associated Press (December 23, 2004). MILITARY EXAMINES SECURITY AT BASES. The Cincinnati Post (Cincinnati, OH). Joe Pappalardo (July 1, 2004). Military bases getting protection against WMD attacks. National Defense. Kemp, Ian. Armada International. 2008. Retrieved February 16, 2013 from HighBeam Research:http://www.highbeam.com/doc/1G1-188276241.html Molly Dunigan (2011). Victory for Hire: Private Security Companies' Impact on Military Effectiveness. Stanford Security Studies. Mine Warfare in South Vietnam. History.navy.mil. Sheryll Shariat, Sue Mallonee and Shelli Stephens-Stidham (December 1998). Summary of Reportable Injuries in Oklahoma. Oklahoma State Department of Health. Archived from the original on January 10, 2008. Sara Rimer (May 28, 1995). The Second Suspect -- A special report.; With Extremism and Explosives, A Drifting Life Found a Purpose. New York Times. Retrieved April 11, 2010. (February 4, 2010). BRITISH RAF COUNTER-IMPROVISED EXPLOSIVE DEVICE TEAM PREPARE FOR FIRST AFGHAN DEPLOYMENT. US Fed News Service, Including US State News Editorial (30 September 2012). Bomb disposal hero. Dawn News. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“MILITARY SECURITY Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
MILITARY SECURITY Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/law/1468227-military-security
(MILITARY SECURITY Essay Example | Topics and Well Written Essays - 1250 Words)
MILITARY SECURITY Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/law/1468227-military-security.
“MILITARY SECURITY Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/law/1468227-military-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Military Security in Modern Warfare

Classical Theorists and Warfare

Several of the theories related to warfare in the old times have undergone some changes and are dissimilar and unlike to the modern warfare as the social, political, cultural, economic and technological factors alters with the passage of time and thus, have a great deal of influence on the articulation of the warfare4.... This paper ''Classical Theorists and warfare'' tells us that classical theories and warfare have been in association to each other for centuries, as they both lay the foundation on the extent and proportions of human political features and temperament therefore, they tend to have a constant and persistent relationship....
6 Pages (1500 words) Essay

Use of Satellites by the US Military to Improve Battlefield Awareness

The outlook on the future regarding satellite technology and security in preparation for any eventualities, in future must be considered.... It is more evident from the works of various researches that the American military rely heavily in satellite technology in the warfare.... Another aspect will be that of information warfare.... Other theorists have made attempts to predict how information warfare has capabilities of providing dominant information awareness about the battle space....
4 Pages (1000 words) Essay

Warfare, Welfare and Citizenship

This paper ''warfare, Welfare and Citizenship'' tells us that nations have been fighting to obtain freedom and democracy.... This led to a series of warfare as people struggled to improve their welfare.... This led to a series of warfare as people struggled to improve their welfare.... This paper will therefore discuss warfare, welfare, pluralism and citizenship from both the historical and modern perspective. ... he three terms warfare, welfare and citizenship largely influence each other, making it hard to analyse one without discussing the others....
11 Pages (2750 words) Essay

The Impact Of Technology On Modern Warfare

In this respect, it will be critical to highlight the history of modern technology in modern warfare.... echnological Vulnerabilities in Modern WarfareAmid the above-highlighted advantages of technology in modern warfare, critical technological vulnerabilities are evident.... In light of both World War I and II, key changes have been made in regards to warfare The Impact of Technology on modern warfare Introduction The emergence of new and advanced technologies has revolutionized warfare practices in the contemporary times....
2 Pages (500 words) Research Proposal

India Strategic Military

"India Strategic Military" paper argues that shortly India will have the capability of providing adequate security in the South Asia region as well as the Indian Ocean region.... In the near future India will have the capability of providing adequate security in the South Asia region as well as the Indian Ocean region.... The navy has to enhance its anti submarine warfare capabilities by inducing the most appropriate platforms, arms and sensors....
4 Pages (1000 words) Book Report/Review

Political Science behind War

Political Science Section Have drones represented a technological revolution in warfare?... As has been evident in the recent wars and the virility of drone technology use, it is sufficient to state that robotics, inclusive of drone warfare, represent technological revolution in warfare and global security.... This justifies that warfare has undergone significant revolution unlike ancient times when rivals blindly went into battlefields with the least idea of what awaited them. ...
8 Pages (2000 words) Assignment

Maritime Forces in Future Warfare

There is wide agreement that today, the world is under the fourth generation of warfare and the reasoning behind this is that, because the US military is now so preternaturally strong, the strategies and tactics that must be adopted by future adversaries will have to be so radically different from those employed hitherto as to constitute a completely new generation of warfare.... Since 1648 up to the present, the nation-states became the primary and prominent actors of warfare....
24 Pages (6000 words) Essay

What Is the Hybrid Warfare and What Challenges Does It Present

"What Is the Hybrid warfare and What Challenges Does It Present" paper focus on hybrid warfare which is the rise in insurgency and terrorism threat posed by state and non-state actors.... The term HYBRID warfare is increasingly used to describe current and future conflict; what is it and what challenges does it present?... dditionally, the redefinition of these security strategies has reinforced the debate regarding the notion of contemporary conflict scenarios falling within the model of “hybrid” warfare and the focus of this paper is to critically evaluate the increasing use of the term “hybrid warfare”....
7 Pages (1750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us