The Ultimate War Game Might Be….War

This is an interesting yarn from Michael Ledeen over Bridge and its role as a cerebral activity for commanders. But the problem is that it reminds me a bit too much of the Weiqi/Go model of Chinese strategy. I think there’s an inherent limitation to “X is the real…


Iraq, Analogies, and Exemplars

Jennifer Rubin argues that its time to move past the “would I have invaded Iraq?” hypothetical:

This does not excuse Jeb Bush’s lack of preparedness to answer the Iraq question, which I have criticized. It does, however, say something about the inane…

Proxies and Operational Control

Good stuff at SWJ. In my opinion, this also depends a great deal on how much the patron’s aims are served by varying degrees of control and autonomy.

The US strategy of selecting reliable proxies against the Islamic State of Iraq and Syria (ISIS)…

The Work That Bob Work Is Up To Part II: The Work That Needs To Be Done

So, in my last entry, I expressed my opinion about why I thought quantitative social science god (despite a lot of the harsh things I said, intellectual honesty obliges to me to note that Schrodt is the…


Further Reflections on Terrorism and Risk

I will add a small addendum to the post on terrorism and risk communication.

First, Cheryl Rofer, a contact with an advanced understanding of the risk communication literature and a large amount of practical experience with public…


The One Great Taboo of Our Wars: Asking “Why?”

In the years since I first got to know him, Kelsey D. Atherton has become not only an excellent defense and technology reporter but also an astute observer of some of the contradictions and paradoxes of our wars. Today, he said something quite…


The Purpose of the Military

EDIT: see this apology to the Major. I do not think that this was my best hour, and I’m sorry for that.

Critics will counter with Clausewitz, dismissing my argument as the naïve, “kind-hearted” words of someone that misguidedly believes there is “some…
Rethinking Security
Rethinking Security
Rethinking Security is a blog on states, communities, and organizations in conflict by Adam Elkus. Older content can be found at rethinkingsecurity.tumblr.com, this blog’s last incarnation. Header image is trademark of Introversion/Ambrosia software (DEFCON game).
More information
Followers
234
Elsewhere