I STRATEGY RESEARCH PROJECT

2y ago
15 Views
2 Downloads
1.82 MB
54 Pages
Last View : 30d ago
Last Download : 3m ago
Upload by : Asher Boatman
Transcription

———IThe views expressed in this paper are those of theauthor and do not necessarily reflect the views of theDepartment of Defense or any of its agencies. Thisdocument may not be released for open publication untilit has been cleared by the appropriate military service orgovernment agency.STRATEGYRESEARCHPROJECTASYMMETRIC WARFARE:AN HISTORICAL PERSPECTIVEBYFRANKLIN B. MILESDISTRIBUTION STATEMENT A:Approved for public release.Distribution is unlimited.USAWC CLASS OF 1999U.S. ARMY WAR COLLEGE, CARLISLE BARRACKS, PA 170135050mC*" INSPECTED*

ÜSAWC STRATEGY RESEARCH PROJECTAsymmetric Warfare: An Historical PerspectiveByFranklin B. MilesDOD CivilianDr. R. Craig NationProject AdvisorThe views expressed in this academic researchpaper are those of the author and do notnecessarily reflect the official policy orposition of the U.S. Government, theDepartment of Defense, or any of itsagencies.U.S. Army War CollegeCARLISLE BARRACKS, PENNSYLVANIA 17 013DISTRIBUTION STATEMENT A:Approved for public release.Distribution is unlimited.

11

ABSTRACTAUTHOR:Franklin B. MilesTITLE:Asymmetric Warfare: An Historical PerspectiveFORMAT:Strategy Research ProjectDATE:17 March 1999PAGES: 40CLASSIFICATION:UnclassifiedThere has been a great deal of discussion over the past fewyears among defense officials regarding the likelihood that theUnited States military will face a multitude of asymmetricchallenges in the 21st Century. Senior government officials,members of the academic community, and military leaders havewarned us repeatedly about these threats and the possibleconsequences.When reviewing their statements and the availableliterature pertaining to asymmetric warfare, however, one getsthe sense that this type of warfare is a new phenomenon. Thisperception is false.Weaker belligerents have used asymmetricmethods, tactics, and techniques during conflicts with strongeror technologically superior enemies throughout recorded history.The critical question is whether US military and governmentleaders are aware of the history of asymmetric warfare and areusing that knowledge to adequately prepare our nation andsoldiers, or to tailor our force structure, to successfullyengage and defeat asymmetric enemies in future conflicts.in

XV

TABLE OF CONTENTSDefinitions2Goals and Desired Effects of Asymmetric Warfare4Why US is likely to Encounter Asymmetric ChallangesAsymmetric Threats and Methods516Guerrilla Warfare16Terrorism20Domestic Terrorism22International Extremists and State Sponsored Terrorism24Weapons of Mass Destruction29Information Warfare33Urban Warfare36Concluding Thoughts39ENDNOTES43BIBLIOGRAPHY45v

VI

ASYMMETRIC WARFARE: AN HISTORICAL PERSPECTIVEThere has been a great deal of discussion over the pastfew years regarding the likelihood that the United Statesmilitary will face a multitude of asymmetric challenges in the21st Century. Senior government officials, members of theacademic community, and military leaders have warned usrepeatedly about these threats and the possible consequences.When reviewing their statements and the available literaturepertaining to asymmetric warfare, however, one gets the sensethat this type of warfare is a new phenomenon. This, of course,is not the case; with the exception of the use of nuclear weaponsby non-state actors, all of the generally accepted asymmetricthreats facing the United States military have a historicalprecedent.Asymmetric warfare, tactics and weapons have been usedthroughout recorded history.In 500 BC, Sun Tzu wrote,enemy is superior in strength, evade him.united, separate them."If theIf his forces areAttack him where he is unprepared.Appear where you are not expected.""Exploiting an adversary'sweaknesses while exploiting one's own strengths is the heart ofthe "'art of war' .It has been written about and taught tomilitary leaders for more than 2,500 years.A successfulasymmetric tactic that allows one's adversary to prevail on thebattlefield is always a concern to a military commander."1

In this paper I will address some of the reasons why theUnited States is now the likely target of asymmetric threats, aswell as the types of threats we will probably face in the nearfuture.I will touch on the goals and desired effects ofasymmetric tactics and warfare.Throughout the course of thissurvey I will provide historical examples of the use ofasymmetric tactics, methods, and weapons to demonstrate thatasymmetric warfare is not a new phenomenon. By understanding thatasymmetric warfare is not a new phenomenon, current and futuremilitary leaders will be better prepared to face these sorts ofthreats because they can study how other commanders havesuccessfully, or unsuccessfully, dealt with asymmetric challengesin earlier conflicts.DefinitionsBefore entering into the above topics, it will be usefulto provide some definitions of asymmetric warfare.There arenumerous definitions presently being used to describe asymmetricwarfare, however, I have chosen to utilize the definitionscurrently used by the Department of Defense (DOD) and the CentralIntelligence Agency (CIA).The DOD and CIA definitions ofasymmetric warfare are presently the two most widely accepted andused definitions throughout the US defense establishment.The following is the DOD definition of asymmetric warfare,which was created by the Joint Staff:"Attempts to circumvent orundermine an opponent's strengths while exploiting his weaknesses

using methods that differ significantly from the opponent's usualmode of operations."2The CIA defines asymmetric warfare as "The use of innovativestrategies, tactics, and technologies by a 'weaker' state or substate adversary that are intended to avoid the strengths andexploit the potential vulnerabilities of larger andtechnologically superior opponents.This includes:1. The selective use of weapons or military resourcesby a state or sub-state group to counter, deter, orpossibly defeat a numerically or technologicallysuperior force.2. The use of diplomatic and other non-militaryresources or tactics by a state or sub-state groupto discourage or constrain military operations by asuperior force."3There are several common threads to be found in DOD and theCIA views of asymmetric warfare.Some of the generic pointsregarding asymmetric warfare found in each organization'sliterature include: Pitting one's strengths against selected enemyweaknesses. Using unexpected, unconventional, or innovativemethods of attack or defense. Offering a disproportionate effect in terms ofoutcome to the military or financial investment.

Asymmetrie threats can be either technologically orculturally based.4Goals and Desired Effects of Asymmetric WarfareThere are two primary goals of an opponent who may utilizeasymmetric methods against the US.The first is to raise thelevel of risk and cost to the point that the United States willelect not to intervene militarily in a situation, or onceintervention has begun, to cause us to disengage due tounacceptable losses or financial costs.5The second is to forcea change in US foreign policy.There are numerous results or effects that a future opponentmay desire to achieve through the use of asymmetric warfare.Afew of these results include: To prevent or delay the deployment of US militaryforces into a region. To degrade US military effectiveness, especially bylimiting US application of superior technologybefore or during combat operations. To limit the United States from forming effectivecoalitions or obtaining basing support.6 To attempt to breakup a US led coalition once it hasbeen formed.The Iraqis attempted this duringOPERATION DESERT STORM by shooting SCUD missiles atIsrael.Their hope was that Israel would enter into

the conflict, causing the Arab coalition againstIraq to fall apart. To erode American public support for the conflict. To gain political prestige within the belligerent'scountry, region, or the world.This is especially-true of leaders in the Arab world.Both Anwar Sadatand Saddam Hussein gained considerable prestigeamong specific segments of countries throughout theMiddle East. To cause a significant psychological impact on anopponent through actions which will shock or confusethem, and cause them to lose the initiative, freedomof action, or will to continue the fight. To cause a disproportionate amount of casualties orfinancial losses through attrition, etc.Why the United States is Likely to Encounter AsymmetricChallenges in the 21st CenturyThroughout our history the US military has primarily foughtenemies who challenged us via conventional, force-on-force,methods.Our Armed Forces have been preparing for the past fiftyyears to fight a major conventional/nuclear war with traditionalenemies such as the former Soviet Union and North Korea.Sincethe mid 1990s, however, our senior government and militaryleaders, as well as many in the academic community, have raisedthe likelihood that future armed challenges against the United

States will involve asymmetric methods.In the followingparagraphs I will discuss some of the reasons and conditionswhich have brought about this change.The stunning victory of US and coalition forces in OPERATIONDESERT STORM in 1991 was viewed by many in the US defenseestablishment as confirmation of the validity of the "Air-LandBattle Doctrine"1970s.which US forces have been training to since theIn addition, the victory in the Gulf War also proved thesupremacy of American military equipment and technology over thatprovided by the former Soviet Union.These points, as well asother lessons learned from the Gulf War did not go unnoticed byour potential enemies around the world.Most of the world nowrealizes that at this point in time the US military is virtuallyunbeatable in a conventional conflict.It is therefore unlikelythat a future opponent will choose to pick a fight with the USand fight us in the same manner as Saddam Hussein did.(Aconventional fight on open terrain where he allowed us the luxuryof sufficient time and space to establish a logistical base ofoperation and a defensive foothold before making our attack.)Future enemies are unlikely to allow us to exercise all of ourstrengths the way Saddam did.The demise of the former Soviet Union is another majorcontributor for explaining the increasing threat of asymmetricwarfare for US forces.Ironically, the bipolar world whichexisted when the Soviet Union was a military superpower and peercompetitor of the United States caused a level of uneasystability throughout the developing world.During the Cold War,

many countries which are now likely to pose a threat, orchallenge, to US interests and policies abroad were more or lessforced to choose to be in either the US or Soviet camp if theywere to receive the foreign aid and military assistance theydesired.Now that the Cold War is over, much of that aid hasdisappeared, leaving these countries to contend with theirproblems on their own.Many of these states have poor economiesand corrupt or inefficient governments, thus they are ripe forinternal unrest and power struggles between the factionalized anddisenfranchised segments of their populations.The UnitedStates, being the only remaining superpower, is then likely tobecome the external threat, or ''cause of their misfortunes',which these disenfranchised segments will target in order torally domestic support for their cause.The US military's growing dependence on high technologyequipment and weapons may also contribute to an enemy's decisionto challenge us asymmetrically.In addition, since the end ofthe Gulf War, the US Armed Forces and government have been in anear constant state of downsizing, both in personnel and budgets.The result has been that the Army, for example, is focusing oncreating a digitally focused force.combat logistical support.)(To include 'just in time'This will reportedly help improvecommand and control and battlefield management; as well as allowour smaller force to fight the battles and wars of the future.The problem is that the focus of this new digital force isprimarily centered on fighting a peer competitor in aconventional conflict, rather than against a foe utilizing

asymmetrical methods.High technology equipment and weapons mayprove ill suited, or useless, in an asymmetric conflict due tothe combat environments which an asymmetrical opponent may forceus to fight in.The other problem is that a digital army will bevery dependent on satellite systems, computer networks, advancedelectronics, etc.; all of which utilize centralized nodes, groundstations, or other very, vulnerable facilities. A worthy opponentwill certainly attempt to destroy these sorts of 'high payofftargets because by destroying them they will disable many of thehigh-tech systems we are so dependent on, thus reducing thetechnological edge enjoyed by US forces.Imagine, for example,the effect on US guidance systems and precision guided weaponssystems, etc., should an opponent succeed in disabling our GlobalPositioning Satellite (GPS) system, or if a satellite imageryground station was destroyed.Numerous nations, including theUS, are currently developing laser, microwave, and other radiofrequency (RF) based weapons which will be capable of disablingsatellites and electronics from a significant distance. Whiledigitalization and the dependency on high technology will, inmany circumstances, improve the US military's combat performance;it also will leave us even more vulnerable to an opponent whoopts to utilize asymmetric methods against us.Since the Korean War, US military deployments overseas havebeen characterized by limited objectives.These limitedobjectives have generally been imposed upon our military by ourcivilian leadership. Having limited objectives, however, is notalways a bad thing.The problem occurs when the United States

enters into a conflict with only limited objectives in mind, butto our enemy, the conflict is a matter of national, personal, ortribal survival.Such was the case during the Vietnam War,Somalia, and during the current situation in Kosovo.Duringthese conflicts, our enemies were willing to endure asubstantially higher level of casualties, misery, and privationthan the US was willing to sustain because their survival was atstake and ours was not.The same could be said for the Spanishguerrillas who fought against Napoleon's forces during thePeninsular War (1808-1814), and the Russian population duringtheir struggle against the Germans in WWII.The strength of anyenemy's will should never be underestimated. It is equallyimportant to fully understand the limits of your own will toengage in a conflict on equal terms with an enemy.If the willisn't there, than it is a mistake to commit US troops orresources to the conflict.Unfortunately, the perception exists in many countries thatone of the major vulnerabilities and weaknesses of the UnitedStates is a serious lack of national will to endure casualties ora prolonged conflict.For this reason, a potential enemy mayutilize asymmetric tactics and methods to exploit our weakness inthis area.The availability and proliferation of relatively low costhigh technology weapons and technology, as well as thewillingness of several nations to arm any rogue-nation orextremist group, also makes the prospects of waging anasymmetrical conflict against the United States more palatable

and feasible for a potential opponent.For the past 50 years,Russian, Chinese and North Korean weaponry has been used by ourfoes around the globe. With the dismemberment of the formerSoviet Union, however, a greater variety of sophisticated weaponsand military technology have become available to whoever iswilling to pay for them.The dismal state of the Russian economyhas driven many in the Russian defense establishment to sellanything they can get their hands on; in some cases just so theycan feed their families.Besides weapons and technology, many unemployed, unpaid, ordesperate Russian and Eastern European scientists, military, andintelligence officers are also offering their services to othercountries, and potentially to non-state actors or groups as well.In addition, several developed countries such as France, Germany,and Japan have provided technical assistance or technology tocountries like Iraq, Libya, and Iran which assists them in theirattempt to produce Weapons of Mass Destruction (WMD).Conventional weapons sales to rogue-states by some of thesecountries are also common.For example, Germany sold ninediesel-powered submarines to the Iranians a few years ago.TheFrench have sold the Iranians Exocet missiles, and The NorthKoreans and Chinese sell SCUD missiles to all three of theserogue nations.In addition, before the demise of communism,Czechoslovakia sold over 50 tons of Semtex plastic explosives toLibya and Iraq.The list goes on and on.The point is that awide variety of potent, high-tech weapons are now available,often at bargain-basement prices, to whoever wants to buy them.10

It is only a matter of time until terrorist groups utilizeshoulder-fired surface-to-air missiles (SAM) to shoot down UScivil aircraft.(SAMs have already been used by insurgent groupsin the Congo and elsewhere against civilian jetliners.)Theavailability of these weapons, technology, and expertise willgive potential adversaries the means to feel more confidant inattacking US citizens and interests abroad and possibly withinthe borders of the United States.The growth of poverty, extremism, and organized crime in thedeveloping world, as well as the growing disparity of wealthbetween nations and between the elite's and working classeswithin nations, have contributed to making the US a prime targetfor asymmetric challenges.The poor, undereducated, anddisenfranchised have historically been the primary source forrecruits by extremist groups because they are generally thesegment of a population who is suffering the most from thefailings of their governments, and because they have the leastinvested in the status quo.In short, they have the least tolose, and the most to gain by engaging in anti-governmentactivities.Extremist groups throughout the developing world routinelyutilize religious or ethnic ties and issues to legitimizethemselves and their cause to the disenfranchised. They alsoattempt to convince them that their government, another ethnicgroup, or external entities such as the United States are thecause of their poverty, misery, or lack of equal politicalrepresentation. These masses then become willing participants in11

what is often labeled as a "Holy War", or just cause against theperceived source of their problems.Since the 1970s organized crime organizations have poseddirect threats to legitimate governmental control, economicgrowth, and general stability in several developing nations.Theinternational reach and criminal operations of theseorganizations impacts directly on the United States, and placesus in the position where we must attempt to combat them.The twomost powerful organized crime organizations which the US mustcurrently contend with are international drug cartels and theRussian Mafia.These organizations have the financial resourcesand strength of will to enable them to conduct asymmetric attacksagainst the US government or US military if they reach the pointwhere they feel seriously threatened by US counternarcotics oranti-crime efforts.The globalization of transportation, communications, andbanking have made the United States and most of the developedworld more vulnerable to asymmetric threats.Intercontinentaltravel in the past decade has become easier, cheaper, and moreavailable than at any other time in the history of the world.With the millions of people crossing international borders everyday it has become increasingly difficult to scrutinize or monitorthem all.It is impossible today for immigrations and customsservices to intercept every criminal or terrorist transitingtheir airports, ports, and border crossings.The signing of theSchengen Accords a few years ago has also made it even easier forterrorists to transit European borders.12These accords eliminated

most border controls between selected European Union (EU)countries.Non-EU visitors to an EU country now only undergocustoms checks at their initial port of entry.Once they havecleared that port or airport, they are free to travel unmonitoredacross the borders of most Western and Central Europeancountries.So a would-be terrorist can pick their entry point inthe country with the most lax security checks (or a country withsympathies for their cause,) and then travel on unmolested toanother EU country to carry out their terrorist acts.In addition, since the 1960s, the opportunities for peoplefrom the developing world to immigrate to developed nations haveincreased substantially.In the United States, for example,prior to the mid 1960s we had severe immigration quotas whichfavored people from European countries, while limiting the numberof new immigrants from developing nations.During the 1960s and1970s several European countries opened their doors to immigrantsfrom the developing world as well.For example, Germany took inmillions of Turkish ''Guest Workers'; thousands of Indians,Pakistanis, and African immigrated to Great Britain; and manyArabs and Senegalese moved to France.a great "melting pot".The world has truly becomeWhile there are many positive aspects ofthis mass migration, there are also negative points.These newimmigrants often establish enclaves in their adopted country andresist assimilation into their new cultures.Because theseunassimilated immigrants often maintain a greater sense ofloyalty to their old country or their religious affiliation thantheir new country, they are routinely targeted for recruitment by13

extremist groups who have an ethnic or religious connection withthem.Foreign intelligence organizations, criminal syndicates,and terrorist groups all attempt to play on religious, ethnic,family, clan, or cultural ties they have with these newimmigrants in order to co-opt them as active members or as asupport mechanism for their nefarious activities.The Israeliintelligence service "Mossad" for example, regularly seeks theassistance of members of the American Jewish community(Especially lawyers) to perform such functions as renting 'safehouses' which they utilize for meetings with clandestine agentshere in the United States.The Irish Republican Army (IRA) andthe Hizballah terrorist organization both have establishedsupport 'cells' here in the US to conduct fund raisingactivities.Irish pubs and Mosques in US cities are often thefavorite locations for these two groups to do their recruiting ofnew members and fund raising activities. In most cases, the UScitizens supporting these groups will not engage in illegalactivities nor be asked to carry out actual terrorist acts intheir country of residence.(Although US citizens did assist inthe World Trade Center bombing in New York City.)The point of the above two examples is that a future foe whois planning an asymmetrical campaign against the United States orother developed country, will find it relatively easy to travel,and is likely to be able to establish a support base within thetarget country to assist them in carrying out their activities.Other contributors to our vulnerability to asymmetric warfareare our inherent openness, laws, and national character and14

endemic Western beliefs.A vast amount of information isavailable in open sources in the US, which can assist our enemiesin identifying and targeting key installations, personnel,technology, or strategic centers of gravity. There would likelybe a public outcry from the American public, however, if the USgovernment or military started taking actions to deny the publicaccess to this information. A foe could cause significant unrestamong the American civilian population by forcing the USgovernment to take actions which added more secrecy; moresurveillance of US citizens, or caused the government to imposemartial law or other restrictions to civil liberties.The American public is also relatively unaccustomed to andintolerant of disruptions in public services. An enemy utilizingasymmetric methods is likely to capitalize on these facts bystriking at the most vulnerable and critical parts of ourinfrastructure; the goal being to cause the American public tostop supporting the conflict.Lastly, since the Vietnam War, many of our enemies haveviewed America's strategic center of gravity to be the lack ofwill by the American public and government to sustain largenumbers of casualties, or to endure a protracted conflict whereour national survival is not at stake.This proved to be thecase in several instances, such as during the US Marine Corpsdeployment to Beirut in 1982-84 and Somalia in 1993.It can beargued that Saddam Hussein and Slobodan Milosevic are banking onAmerica's lack of long-term national will in our conflicts withIraq and Serbia today.15

In any case, future foes are certainly likely to expendconsiderable efforts in attacking or exploiting our nationalwill.North Vietnamese leader Ho Chi Minh put it aptly when hesaid (referring to Americans) "They will kill many of us and wewill kill a few of them, and they will tire first."In manycases, an asymmetric foe doesn't need to win every battle; hemust only avoid losing the war.Asymmetric Threats and MethodsGuerrilla WarfareGuerrilla warfare is generally characterized as conflictwaged by small, irregular, formations that utilize unconventionalmethods and tactics against a numerically or technologicallysuperior conventional foe.For the purpose of this paper, I willinclude "insurgencies", "unconventional warfare", and "irregularwarfare" within the same general category as guerrilla warfare.Guerrilla warfare is certainly one of the oldest forms ofasymmetric combat.Hebrew tribes fought guerrilla actionsagainst Roman Legions in the days before Christ.The Gauls andCeltic tribes also used guerrilla tactics (such as ambushes anddeception) against the Romans during the Roman invasion andoccupations of Germany and Britain.The Germanic chieftainArminius, for example, ambushed and destroyed three elite Romanlegions in the Teutenburg Forest in 9 AD.16

The modern concept of guerrilla or insurgent warfare,however, can be traced to the struggle carried out by the Spanishpeople against Napoleon's army during the Peninsular War of 18081814.In fact, the term "guerrilla" originated during thatconflict.Guerrilla warfare has also been used effectively by majorworld powers in conjunction with the framework of a conventionaltotal war.During WWII, the Soviet Union utilized huge numbersof partisans behind German lines.These partisans conducted aguerrilla campaign which effectively tied-up nearly one third ofthe approximately 2 60 German divisions engaged on the EasternFront.In an excellent example of the effective use ofguerrillas, Soviet partisans conducted literally thousands ofattacks prior to the 1943 battle of Kursk, causing the Germans toredirect many combat formations to the task of rear area securityrather than taking part in the general assault.Guerrilla warfare has been present in the American militaryexperience throughout or history.American Indian tribes foughteach other in this fashion long before the white man ever setfoot on the continent.Early European settlers and later USmilitary forces engaged in a nearly constant state of counterguerrilla, or counter-insurgency, operations against variousnative tribes until the 1890s.Roger's Rangers fought as aguerrilla force against the French during the French and IndianWar.During the American War of Independence, American patriotssuch as Francis Marion and several others conducted significantguerrilla campaigns against British forces and their Tory allies.17

Confederate cavalry commanders such as Colonel John Mosby,General Bedford Forrest, and irregular forces like WilliamQuantril's Raiders, engaged in guerrilla operations against theUnion Army during the American Civil War.In 18 98 the AmericanArmy found itself engaged in protracted counter-guerrillaoperations against Filipino nationalists and Moro tribesmen inthe Philippines.In the 1920s, small groups of US Marines wereused to track down and harass the numerically superior insurgentforces of the famous Nicaraguan socialist Augusto Sandino.During WWII bands of American and Filipino forces fought aguerrilla campaign against Japanese forces occupying thePhilippine Islands.The 1000 day Vietnam War proved to be thelongest counter-guerrilla conflict fought by the US militaryduring the 20th Century, it was also the first time atechnologically superior US force was defeated, in a strategicsense, asymmetrically.Prior to the 20th Century, most guerrilla or insurgentmovements were generally 'home-grown' movements which receivedlittle or no support from outside sources. During the 20thCentury, however, it became common (especially during WWII andthe Cold War) for guerrilla movements to receive supplies,weapons, training, and even guidance from third parties notactively or overtly engaged in the conflict.An exception tothis was The New People's Army (NPA); a communist insurgentmovement in the Philippines which waged a guerrilla war againstthe Filipino Government from the 1970s through the early 1990s.

The NPA received little or no known outside support throughouttheir many years of armed conflict.The post-Vietnam Cold War saw US military forces and AmericanIntelligence officers engaged directly, or as advisors, innumerous insurgencies throughout the developing world.USMarines were deployed to war-torn Beirut in 1982-1984, the CIAhelped Afghani guerrillas defeat Soviet troops during the war inAfghanistan from 197 9 to 198 9, and Army Special Forces advisorsassisted the El Salvadorian Army during operations against thecommunist FMLN insurgents from 1981-1992.There are scores of examples of

Guerrilla Warfare 16 Terrorism 20 . Information Warfare 33 Urban Warfare 36 Concluding Thoughts 39 ENDNOTES 4 3 BIBLIOGRAPHY 45 v . VI . ASYMMETRIC WARFARE: AN HISTORICAL PERSPECTIVE There has been a great deal of discussion over the past . Asymmetric warfare, tactics and

Related Documents:

Texts of Wow Rosh Hashana II 5780 - Congregation Shearith Israel, Atlanta Georgia Wow ׳ג ׳א:׳א תישארב (א) ׃ץרֶָֽאָּהָּ תאֵֵ֥וְּ םִימִַׁ֖שַָּה תאֵֵ֥ םיקִִ֑לֹאֱ ארָָּ֣ Îָּ תישִִׁ֖ארֵ Îְּ(ב) חַורְָּ֣ו ם

Unit-V Generic competitive strategy:- Generic vs. competitive strategy, the five generic competitive strategy, competitive marketing strategy option, offensive vs. defensive strategy, Corporate strategy:- Concept of corporate strategy , offensive strategy, defensive strategy, scope and significance of corporate strategy

1.2.2 The purpose of strategy-, mission, vision, values and objectives 7 1.2.3 Strategy statements 8 1.2.4 Levels of strategy 10 1.3 The Exploring Strategy Framework 11 1.3.1 Strategie position 12 1.3.2 Strategie choices 13 1.3.3 Strategy in action 14 1.4 Working with strategy 16 1.5 Studying strategy

Best Strategy for Trading Penny Stock Alerts 68 Strategy #7. Best Strategy for Trading The Penny Stock Pump & Dump 76 Strategy #8. Best Time to Buy or Sell a Penny Stock 82 Strategy #9. Best Strategy for Making Profits With .0001 Penny Stocks 87 Strategy #10. Best Penny Stock Exit Strategy for Maximum Risk Reduction 91 i. Introduction ii.

b) Pull strategy c) Blocking strategy d) Integrated strategy 30. Which of the following strategies is usually followed by B2B companies wit h respect to promotion strategy? a) Push strategy b) Pull strategy c) Blocking strategy d) Integrated strategy 31. Marketing management must make four important deci sions when developing an

Good Strategy Good Strategy Execution Good Management 17 Illustration Capsules 1.1. Starbucks' Strategy in the Specialty Coffee Industry 8 1.2. Microsoft and Red Hat: Two Contrasting Business Models 16 2. Leading the Process of Crafting and Executing Strategy 22 What Does the Strategy-Making, Strategy-Executing Process Entail? 24

strategy, strategy at the highest levels of the nation-state. It is applicable to grand strategy, national security strategy, national military strategy, and regional or theater strategy. The monograph does not propose a strategy for the United States; rather, it provides a framework for considering

The Data Conversion & Migration strategy document aims to provide an overview of the BearingPoint . 1 The data conversion & migration strategy for the MTS project is heavily related to the cutover strategy, aswell as to the interface strategy. For both, a strategy document and detail plan will be produced (which are separate deliverables). .