Download Free Tactics Of The Crescent Moon Book in PDF and EPUB Free Download. You can read online Tactics Of The Crescent Moon and write the review.

Tactics of the Crescent Moon shows for the first time in any detail how Muslim militants fight at short range. From the vast quantities of intelligence available, its author extracts the small-unit tactical trends. While the enemy's combat method may seem amateurish, they are nonetheless very effective in a 4th-generation-warfare environment. Those methods have already forced the Israeli Army out of Southern Lebanon and the Soviet Army out of Afghanistan. To make matters worse, they may be improving. In the book's forward, Maj. Gen. Ray L. Smith warns that the current crop of irregulars have flexible and adaptable training techniques and tactical methods. This book will help the reader to counter them.
The greater the emphasis on building these capabilities now, the faster indigenous air forces will be able to operate independently - and the faster the operational demands on the U.S. Air Force will diminish."--BOOK JACKET.
Christopher Matthew's new edition is based on the 1616 edition but written in modern English with new renditions of all its accompanying figures. It has the original 1616 notes as well as comprehensive new notes and cross references to the other ancient manuals (such as Arrian and Leo) that drew upon it.
In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.
A historian of military intelligence presents a revelatory account of ancient Greek battle tactics, including the use of espionage and irregular warfare. There are two images of warfare that dominate Greek history. The better known is that of Achilles, the Homeric hero skilled in face-to-face combat and outraged by deception on the battlefield. The alternative model, also taken from Homeric epic, is Odysseus, ‘the man of twists and turns’ who saw no shame in winning by stealth, surprise or deceit. It is common for popular writers to assume that the hoplite phalanx was the only mode of warfare used by the Greeks. The fact is, however, that the use of spies, intelligence gathering, ambush, and surprise attacks at dawn or at night were also a part of Greek warfare. While such tactics were not the supreme method of defeating an enemy, they were routinely employed when the opportunity presented itself.
The Iraqi Triangle of Death, south of Baghdad, was a raging inferno of insurgent activity in August of 2006; by November 2007, attacks had been suppressed to such an extent as to return the area to near obscurity. In the intervening months, the U.S. Army 4th Battalion, 31st Infantry ("Polar Bears") employed a counterinsurgency approach that set the conditions for a landmark peace agreement that has held to the present. With a focus on counterinsurgency, this book is the first to look at the breadth of military operations in Yusifiyah, Iraq, and to analyze the methods the Polar Bears employed. It is a story not of those who fought in the Triangle of Death, but of how they fought.