Skip to main content

Descriptions of Unconventional Conflict

  • Chapter
  • First Online:
Unconventional Conflict

Part of the book series: Understanding Complex Systems ((UCS))

  • 553 Accesses

Abstract

In this chapter, we expand on the definition of unconventional conflict given in the introduction (Chapter 1) by enumerating the many types of operations that are contained in this domain, presenting the results of some relevant analyses, and citing numerous works on the various parts of the domain. The earlier accounts of various types of operations cited in this chapter are more frequently purely descriptive. Later accounts incorporate analysis and some modeling, indicating a growth in understanding.

Before modeling takes place, understanding should be required.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Alberts, D. S., & Hayes, R. (1995). Command arrangements for peace operations. Washington, DC: National Defense University.

    Google Scholar 

  • Allard, K. C. (2002). Somalia operations: Lessons learned. Oregon: University Press of the Pacific.

    Google Scholar 

  • Avruch, K., Narel, J. L., & Combelles-Siegel, P. (1999). Information campaigns for peace operations. Washington, DC: CCRP.

    Google Scholar 

  • Bar, S. (2013). A toolbox for countering extremist religious doctrines. In D. M. Nicholson & D. D. Schmorrow (Eds.), Advances in design for cross-cultural activities, Part II (pp. 386–397). Boca Raton, FL: CRC Press.

    Google Scholar 

  • Berg, S. T., & Hamby, L. B. (1995). Regional stability assessment: Recognizing opportunities, identifying threats, and managing risk in emerging countries. McLean, VA: Booz-Allen & Hamilton.

    Google Scholar 

  • Berman, E., & Kuznar, L. A. (2010). Economic theories of conflict for COIN/STTR. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 30–33). Washington, DC: National Defense University.

    Google Scholar 

  • Blanco, R. J. (1994). Counter-insurgency in Cuba: Why did Batista fail? AD-A284 697. Ft Leavenworth, KS: US Army CGSC.

    Google Scholar 

  • Bond, D., & Vogele, W. B. (1995). Profiles of international “Hotspots”. Cambridge, MA: Center for International Affairs, Harvard.

    Google Scholar 

  • Brundage, B., et al. (1998). Analysis of U.S. involvement in multiple small scale contingencies—Failed state. Washington, DC: OSD (PA&E).

    Google Scholar 

  • Burkle, F. M. (1995a). Complex, humanitarian emergencies: I. Concepts and participants. Prehospital and Disaster Medicine, 10(1), 36–42.

    Article  Google Scholar 

  • Burkle, F. M. (1995b). Complex, humanitarian emergencies: III. Measures of effectiveness. Prehospital and Disaster Medicine, 10(1), 48–56.

    Article  Google Scholar 

  • Burkle, F. M. (1996). Civil-military relations in complex humanitarian emergency response. USPACOM Workshop: Modeling & Simulation Requirements for LRCs and Other Military Operations. Monterey, CA.

    Google Scholar 

  • Cababa, R. R. (1991). Nation assistance—A misunderstood mission, AD-A240 519. Newport, RI: Naval War College.

    Google Scholar 

  • Carment, D., Prest, S., St. Jean, L., Samy, Y., & Wyjad, K. (2010). Approaches to country risk analysis and early warning. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 33–64). Washington, DC: National Defense University.

    Google Scholar 

  • Cassani, L., Caglayan, A., Alavedra, J., Das, S., Morgan, W., & Mooney, L. (2013). Population sentiment modeling in support of ISAF joint command. In D. M. Nicholson & D. D. Schmorrow (Eds.), Advances in design for cross-cultural activities, Part II (pp. 437–446). Boca Raton, FL: CRC Press.

    Google Scholar 

  • Chairman of the Joint Chiefs of Staff. (1995). Joint doctrine for military operations other than war, joint publication 3-07. Washington, DC: Chairman of the Joint Chiefs of Staff.

    Google Scholar 

  • Chairman of the Joint Chiefs of Staff. (2001). Joint tactics, techniques, and procedures for joint special operations task force operations, joint publication 3-05.1. Washington, DC: Chairman of the Joint Chiefs of Staff.

    Google Scholar 

  • Clair, C. D. (1993). Humanitarian assistance and the elements of operational design, AD-293 291. Ft Leavenworth, KS: US Army CGSC.

    Google Scholar 

  • Clark, R. L. (1995). Noncombatant evacuation operations: Major considerations for the operational commander, AD-A293 291. Newport, RI: Naval War College.

    Google Scholar 

  • Combelles-Siegel, P. (1998). Target Bosnia: Integrating information activities in peace operations. Washington, DC: CCRP.

    Google Scholar 

  • Cowan, J. W. (1995). Operation provide comfort: Operational analysis for operations other than war, AD-A297 852. Newport, RI: Naval War College.

    Google Scholar 

  • Coyle, R. G., & Alexander, M. W. (1997). Two approaches to qualitative modelling of a Nation’s drug trade. System Dynamics Review, 13(3), 205–222.

    Article  Google Scholar 

  • Coyle, R. G., & Millar, C. J. (1996). A methodology for understanding military complexity: The case of the Rhodesian counter-insurgency campaign. Small Wars & Insurgencies, 7(3), 360–378.

    Article  Google Scholar 

  • Davis, D. F. (1996). Peace operations analysis with bayesian belief networks. 13th International Symposium on Military Operational Research (ISMOR). England.

    Google Scholar 

  • Davis, P. K. (Ed.). (2011). Dilemmas of intervention: Social science for stabilization and reconstruction. Santa Monica, CA: RAND.

    Google Scholar 

  • Davis, P. K., & Cragin, K. (Eds.). (2009). Social science for counterterrorism: Putting the pieces together. Santa Monica, CA: RAND.

    Google Scholar 

  • Davis, C., & Farnsworth, K. (1990). After-action report of the Hurricane Hugo OFDA disaster relief team, PB91-210096. Washington, DC: Agency for International Development.

    Google Scholar 

  • Deckro, R. F. (2010). Issues in stability, security, transition, and reconstruction operations. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 381–401). Washington, DC: National Defense University.

    Google Scholar 

  • Dell, R. F., & Sparling, S. J. (2008). Optimal distribution of resources for non-combatant evacuation. 76th Military Operations Research Society Symposium. New London, CT: MORS.

    Google Scholar 

  • Durante, J., & Fox, W. P. (2015). Modeling violent acts in the Philippines. Journal of Mathematical Sciences, 2, 127–140.

    Google Scholar 

  • Durch, W. J. (Ed.). (1993). The evolution of UN peacekeeping—Case studies and comparative analysis. New York: St. Martin’s Press.

    Google Scholar 

  • Dworken, J. T. (1993). Military relations with humanitarian relief organizations: Observations from restore hope, CRM 93-140. Alexandria, VA: Center for Naval Analyses.

    Google Scholar 

  • Dworken, J. T. (1996). Improving marine coordination with relief organizations in humanitarian assistance operations, CRM 95-161. Alexandria, VA: Center for Naval Analyses.

    Google Scholar 

  • Farnsworth, K., D’Silva, B., Lynch, L., Sullivan, E., Carroll, F., Little, M., et al. (1992). Southern Africa drought assessment: March 24–April 29, 1992, PB93-237949. Washington, DC: OFDA.

    Google Scholar 

  • Fellman, P. V. (2015). The landscape of maritime piracy and the limits of statistical prediction. In P. V. Fellman, Y. Bar-Yam, & A. A. Minai (Eds.), Conflict and complexity: Countering terrorism, insurgency, ethnic and regional violence (pp. 199–220). New York: Springer.

    Google Scholar 

  • Fellman, P. V., Bar-Yam, Y., & Minai, A. A. (Eds.). (2015). Conflict and complexity: Countering terrorism, insurgency, ethnic and regional violence. New York: Springer.

    Google Scholar 

  • Ferleman, T., & Walters, D. (2010). The Middle East in 2040: A forecast of drivers of instability. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 116–135). Washington, DC: National Defense University.

    Google Scholar 

  • Flynn, M. T., & Ledeen, M. (2016). The field of fight. New York: St. Martin’s Press.

    Google Scholar 

  • Geis, M. (1996). Logistics and engineering requirements for humanitarian assistance operations, CRM 95-152. Alexandria, VA: Center for Naval Analyses.

    Google Scholar 

  • General Accounting Office. (1992). United Nations: US participation in peacekeeping operations, GAO/NSIAD-92-247. Washington, DC: GAO.

    Google Scholar 

  • Goldstone, J. A. (2010). Principles for modeling to guide counterinsurgency operations. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 347–362). Washington, DC: National Defense University.

    Google Scholar 

  • Gorka, S. (2016). Defeating Jihad: The winnable war. Washington, DC: Regnery Publishing.

    Google Scholar 

  • Guermantes, L. (2010). Terrorism and counterterrorism M&S. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (p. 278). Washington, DC: National Defense University.

    Google Scholar 

  • Gupta, D. K. (2010). Modeling the dynamics of terrorist movements: A macro interactive perspective. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 300–332). Washington, DC: National Defense University.

    Google Scholar 

  • Hartley, D. S. (1996b). Operations other than war: Requirements for analysis tools research report, K/DSRD-2098. Oak Ridge, TN: Lockheed Martin Energy Systems.

    Book  Google Scholar 

  • Hartley, D. S. (1999). PACOM instability indicators workshop, Y/DSRD-3134. Oak Ridge, TN: Lockheed Martin Energy Systems.

    Google Scholar 

  • Hartley, D. S., Bell, R., & Packard, S. (1999). OOTW force design tools, Y/DSRD-3117. Oak Ridge, TN: Lockheed Martin Energy Systems.

    Google Scholar 

  • Hartley, D. S., & Packard, S. L. (1998a). OOTW cost tools, Y/DSRD-3099. Oak Ridge, TN: Lockheed Martin Energy Systems.

    Book  Google Scholar 

  • Hartley, D. S., & Packard, S. L. (1998b). OOTW tool requirements in relation to JWARS, Y/DSRD-3076. Oak Ridge, TN: Lockheed Martin Energy Systems.

    Book  Google Scholar 

  • Haut, D. G. (1994). OOTW (D. S. Hartley, Interviewer)

    Google Scholar 

  • Haut, D. G. (1995). Progress in computer-assisted training simulations for lesser regional contingencies. JUORS VII, 28 November–1 December 1995. Tokyo, Japan.

    Google Scholar 

  • Hayes, B. C., & Sands, J. I. (1997). Doing windows: Non-traditional military responses to complex emergencies. Washington, DC: CCRP.

    Google Scholar 

  • Hayes, M. D., & Wheatley, G. F. (1996). Interagency and political-military dimensions of peace operations: Haiti—A case study. Washington, DC: National Defense University.

    Google Scholar 

  • Hoffman, B. (1994). Responding to terrorism across the technological spectrum, AD-A283 936. Ft Leavenworth, KS: US Army War College.

    Google Scholar 

  • Hogg, D. R. (1993). A military campaign against gangs: Internal security operations in the United States by active duty forces, AD-A274 041. Ft Leavenworth, KS: US Army CGSC.

    Google Scholar 

  • HQ DA. (1969). Special forces operations, FM 31-21. Washington, DC.

    Google Scholar 

  • HQ DA. (2008b, October). Stability operations, FM 3-07. Washington, DC: Headquarters Department of the Army.

    Google Scholar 

  • Institute for Defense Analyses. (1998). Contingency operations support tool web site. Retrieved 1998, from http://www.ida.org/COST

  • Johnson, N. F., Zheng, M., Vorobyeva, Y., Gabriel, A., Qi, H., Velasquez, N., et al. (2016). New online ecology of adversarial aggregates: ISIS and beyone. Science, 352(6292), 1459–1463.

    Article  Google Scholar 

  • King, M. L., Hering, A. S., & Aguilar, O. M. (2016, October). Building predictive models of counterinsurgent deaths using robust clustering and regression. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 13(4), 449–465.

    Google Scholar 

  • King, M. L., Hering, A. S., & Newman, A. M. (2014). Evaluating counterinsurgency classification schemes. Military Operations Research, 19(3), 5–25.

    Article  Google Scholar 

  • Lidy, A. M. (1998). United States military role in smaller scale contingencies, D2166. Alexandria, VA: Institute for Defense Analyses.

    Google Scholar 

  • Lobban, R. A. (2010). Marrying modeling with empiricism: The case and context of Sudan. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 184–214). Washington, DC: National Defense University.

    Google Scholar 

  • McGrady, K. A., et al. (1995). CNA’s humanitarian assistance operations game: A summary report, CIM 392. Alexandria, VA: Center for Naval Analyses.

    Google Scholar 

  • McKenna, P. (2010). The deterrence analytic challenge. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 287–297). Washington, DC: National Defense University.

    Google Scholar 

  • Metz, S. (1993). The future of insurgency, AD-A274 395. Carlisle Barracks, PA: US Army War College.

    Google Scholar 

  • Metz, S. (1994). Disaster and intervention in sub-Saharan Africa: Learning from Rwanda, AD-A285 320. Carlisle Barracks, PA: US Army War College.

    Google Scholar 

  • Moore, W. H. (2010). Cross-national correlates of terror: Empirical analyses of the late 20th century. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 65–82). Washington, DC: National Defense University.

    Google Scholar 

  • National Simulation Center. (1996). What simulations are available now? Retrieved April 27, 2016, from http://www.ibrarian.net/navon/paper/PART_III_WHAT_SIMULATIONS_ARE_AVAILABLE_NOW__Chap.pdf?paperid=9972164

  • Newett, S. (1996). Planning for humanitarian assistance operations, CRM 95-151. Alexandria, VA: Center for Naval Analyses.

    Google Scholar 

  • Newett, S., et al. (1996). Emerald express ′95: Analysis report, CRM 95-156. Alexandria, VA: Center for Naval Analyses.

    Google Scholar 

  • Post, J. M. (2010). When hatred is bred in the bone: Psycho-cultural foundations of contemporary terrorism. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (pp. 147–163). Washington, DC: National Defense University.

    Google Scholar 

  • Rosbolt, P. K. (1995). Islamic fundamentalism: Considerations for the operational commander, AD-A298 118. Newport, RI: Naval War College.

    Google Scholar 

  • Rose, G., & Lambert, N. (1996). Operational analysis in the front line (Five Go Camping in Bosnia!). The Thirteenth International Symposium on Military Operational Research (13 ISMOR). Shrivenham, UK: The Royal Military College of Science.

    Google Scholar 

  • Shaw, E. J. (1995). The U.S. Southern command and the Andean drug war, AD-A293 436. Newport, RI: Naval War College.

    Google Scholar 

  • Shedlowski, D. J. (1995). Peacekeeping Operations (PEKO). In The Japan-US Operations Research Seminar VII (JUORS VII) (pp. 60–91). Tokyo, Japan: JUORS.

    Google Scholar 

  • Siegel, A. B. (1995). Requirements for humanitarian assistance and peace operations: Insights from seven case studies, CRM 94-74. Alexandria, VA: Center for Naval Analyses.

    Google Scholar 

  • SimCity 2000. (1994). Retrieved May 30, 2016, from Wikipedia: https://en.wikipedia.org/wiki/SimCity_2000

  • Sokolowski, J. (2010). Counter-insurgency modeling. In A. Woodcock, M. Baranick, & A. Sciarretta (Eds.), The human social culture behavior modeling workshop (p. 278). Washington, DC: National Defense University.

    Google Scholar 

  • Sovereign, M. (1998). Humanitarian assistance and disaster relief in the next century: Workshop report. Arlington, VA: National Defense University.

    Google Scholar 

  • Stahl, D. T. (1992). Noncombatant evacuation operations in support of the national military strategy, ADA-255 136. Ft Leavenworth, KS: School of Advanced Military Studies.

    Google Scholar 

  • Staniec, C., & Hartley, D. S. (1999). OOTW Analysis and Modeling Techniques (OOTWAMT) Workshop Proceedings, January 1997. Alexandria, VA: MORS.

    Google Scholar 

  • The Dupuy Institute. (1995). Peacekeeping in Bosnia: Fatality estimates. McLean, VA: The Dupuy Institute.

    Google Scholar 

  • Unal, M. C. (2016). Counterinsurgency and military strategy: An analysis of the Turkish army’s COIN strategies/doctrines. Military Operations Research, 21(1), 55–88.

    Google Scholar 

  • Wentz, L. (Ed.). (1997). Lessons from Bosnia: The IFOR experience. Vienna, VA: CCRP.

    Google Scholar 

  • Woodcock, A. E. (1996). Modeling and analysis of societal dynamics: The Deployable Exercise Support (DEXES) System. In A. Woodcock & D. Davis (Eds.), Analytical approaches to the study of future conflict (pp. 255–279). Clementsport, Canada: The Canadian Peacekeeping Press.

    Google Scholar 

  • Yohai, I., McCormack, R., Sidman, J., Galantowicz, J., Borden, C., & Pritchett, S. (2013). Combining social and environmental models. In D. M. Nicholson & D. D. Schmorrow (Eds.), Advances in design for cross-cultural activities, Part II (pp. 74–83). Boca Raton, FL: CRC Press.

    Google Scholar 

  • Zvijac, D. J., & McGrady, K. A. (1994). Operation restore hope: Summary report. Alexandria, VA: Center for Naval Analyses.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Hartley, D.S. (2017). Descriptions of Unconventional Conflict. In: Unconventional Conflict. Understanding Complex Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-51935-7_2

Download citation

Publish with us

Policies and ethics