Skip to main content

Non-kinetic Capabilities: Complementing the Kinetic Prevalence to Targeting

  • Chapter
  • First Online:
Targeting: The Challenges of Modern Warfare

Abstract

Targeting is used in military doctrine to describe a military operational way, using (military) means to influence a target (or addressee) in order to achieve designated political and/or military goals. The four factors italicized are used to analyse non-kinetic targeting, thereby complementing our knowledge and understanding of the prevalent kinetic targeting. Paradoxically, non-kinetic targeting is not recognized as a separate concept; kinetic and non-kinetic are intertwined facets of targeting. Kinetic targeting refers to the targeted application of military force based on the release or concentration of kinetic energy against opposing forces or objects with (primarily) lethal effects in the physical domain, whereas non-kinetic targeting describes the targeted application of (other military and non-military) capabilities against addressees to generate (additional) non-kinetic effects in the non-physical and physical domain . This chapter attempts to provide a better demarcation between kinetic and non-kinetic targeting, first by reviewing recent developments in military operations and targeting and introducing a ‘full spectrum approach ’. It then enumerates and analyses a number of typical non-kinetic capabilities : information activities, key leader engagement, lawfare, criminal legal action, security detention, assets freezes, and cyber operations. The chapter concludes that although non-kinetic targeting does not exist as a stand-alone concept, it is vitally important in contemporary military operations. It provides opportunities to engage and affect additional target audiences (including supporters) with less devastating effects (including constructive effects) by offering additional means to conduct operations, stressing the crucial role of non-kinetic elements like information, perception, cohesion, understanding, and will.

The author would like to thank Colonel (RNLAF) dr. Joop Voetelink, Lieutenant-Colonels (RNLA) Edwin de Ronde and Peter Pijpers LL.M. MA, Major dr. Eric Pouw LL.M. and Captain (RNLMC) Mark Roorda LL.M. for their suggestions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Kilcullen 2009, p. 300.

  2. 2.

    See Chap. 4, Pratzner, in this volume.

  3. 3.

    Sun Tzu 1994, p. 177.

  4. 4.

    US Army 2010a, p. B-1.

  5. 5.

    Kitzen 2012b based on: Lynn 2003, p. xix; Hanson 1989, 2001; Smith 2005, p. 152.

  6. 6.

    In its Allied Joint Doctrine for Joint Targeting, NATO defines joint targeting as ‘the process of determining the effects necessary to achieve the commander’s objectives, identifying the actions necessary to create the desired effects based on means available, selecting and prioritizing targets, and the synchronization of fires with other military capabilities and then assessing their cumulative effectiveness and taking remedial action if necessary.’ NATO 2008, p. 1. See also US Air Force 2014, p. 3: ‘Targeting is the process of selecting and prioritizing targets and matching the appropriate response to them, considering operational requirements and capabilities.’

  7. 7.

    Canada 2008, pp. 5–33.

  8. 8.

    This element involves inter alia ‘weaponeering’, defined in the US Army Field Manual as ‘the process of determining the quantity of a specific type of lethal or nonlethal weapons required to achieve a specific level of damage to a given target, considering target vulnerability, weapons characteristics and effects, and delivery parameters (JP 3-60).’ US Army 2010a, pp. 2–17.

  9. 9.

    NATO 2008, p. 1–1. See also US Air Force 2014, p. 4: ‘A target is an entity or object considered for possible engagement or other actions.’

  10. 10.

    See e.g. NATO (2005) Allied Joint Publication AJP-3.9.2 Land targeting.

  11. 11.

    Operational process is used to refer to the application of this process in operations. This should not be mixed up with the command levels (strategic, operational and tactical).

  12. 12.

    See the Canadian Land Operations breakdown which distinguishes between allied, supportive, friendly, neutral, unsupportive, inactive hostile and enemy audiences:

    ‘This approach requires a cultural understanding and stems in part from the need to engender support from local populations and to engage other elements of an environment. In order to support this approach the knowledge base must gain insight into the psychological plane and the intent, motivations, and relationships of elements in the battlespace in order to out manoeuvre them or to move them, through an effect of influence to a position of acceptance, cooperation, or even support. The assessment and analysis that leads to this categorization supports the targeting process, for each of the audiences on the spectrum of relative interest is assessed with respect to how they may be influenced and moved to a position of support or acceptance.’

    Canada 2008, p. 43 [Emphasis added]

    .

  13. 13.

    Canada 2008, p. 43, footnote 99.

  14. 14.

    US Army 2010a, pp. 1–2.

  15. 15.

    US Army 2010a, pp. 2-8. [Emphasis added].

  16. 16.

    US Army 2010a, pp. 2-1.

  17. 17.

    See Kruif, in his Foreword to this volume.

  18. 18.

    Not to be confused with ‘effect based operations’, see: US Department of Defence, US Joint Forces Command, ‘Assessment of Effects Based Operations’ (14 August 2008, Gen Mattis).

  19. 19.

    See Chap. 4, Pratzner, in this volume.

  20. 20.

    See the Strategic notion of DIME on the strategic level, and the Comprehensive Approach at the operational level, e.g. NATO, Lisbon Summit Declaration, Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Lisbon, 20 November 2010. www.nato.int/cps/en/natolive/official_texts_68828.htm. Accessed 2 April 2014.

  21. 21.

    As defined in the law of armed conflict.

  22. 22.

    NATO 2008, p. 1. See also US Air Force 2014, p. 4.

  23. 23.

    Ducheine and Haaster 2014.

  24. 24.

    See NATO 2008, pp. 1–5, Targeting Principles: ‘b. Effects. Targeting is concerned with supporting the creation of effects to achieve the JFC’s objectives’; and NATO 2008, pp. 1–9, para 0119: ‘The effects-based approach to operations (EBAO) is an evolving philosophy that is defined as ‘the coherent and comprehensive application of the various instruments of the Alliance, combined with the practical cooperation along with involved non-NATO actors, to create the effects necessary to achieve planned objectives and ultimately the NATO end state.’

  25. 25.

    NATO 2008, pp. 1–9, para 0119: ‘At the operational level, an effects based approach involves the selective combination of actions, coordinated with the activities of other organizations to create lethal and non-lethal effects in order to achieve operational objectives in support of this end state.’

  26. 26.

    See Chaps. 2, Coker, and 4, Pratzner in this volume.

  27. 27.

    Ducheine and Pouw 2012, p. 33.

  28. 28.

    See Sun Tzu 1994.

  29. 29.

    NATO 2008, p. 1 [Emphasis added].

  30. 30.

    NATO 2008 throughout.

  31. 31.

    NATO 2008, pp. 3–6, A-10.

  32. 32.

    US Department of Defense 2013. See also US Air Force 2014 and US Army 2010a.

  33. 33.

    UK Ministry of Defence 2009, p. iv [Emphasis added].

  34. 34.

    UK Ministry of Defence 2009, pp. 3–5.

  35. 35.

    UK Ministry of Defence 2009, pp. 3–6, para 317 [Emphasis added].

  36. 36.

    Ministerie van Defensie 2013, p. 103. See also Canada 2008, pp. iii, 5-2 ff.

  37. 37.

    Ministerie van Defensie 2013, p. 104.

  38. 38.

    Canada 2008, pp. 4–24.

  39. 39.

    Cheng Hang 2010.

  40. 40.

    Note the US reservation made to the NATO Allied Joint Doctrine for Information Operations: ‘Kinetic and non-kinetic activities have no defined meaning in NATO doctrine. Kinetic is a scientific idea commonly applied to motion and energy related descriptions. Kinetic and non-kinetic (non-motion or non-energy activities) do not fit the context of the publication.’ NATO 2009, p. xi.

  41. 41.

    It remains to be seen whether this dichotomy should be complemented with ‘neutral’ effects for the target/addressee.

  42. 42.

    A comprehensive approach, as it is used within NATO, the EU and member States. See Allied Command Operations (NATO) 2010; European Commission 2013; Smith-Windsor 2008.

  43. 43.

    See Canada 2008, p. 43 and also note 12 supra.

  44. 44.

    Murphy 2009, p. 2.

  45. 45.

    US Department of Defense 2013, p. II-16.

  46. 46.

    US Army 2010a, p. 2-1.

  47. 47.

    US Army 2010a, pp. 3–7.

  48. 48.

    UK Ministry of Defence 2009, p. 3B-7.

  49. 49.

    US Army 2010a, p. B-1.

  50. 50.

    Matthijssen 2010, p. 521.

  51. 51.

    Murphy 2009, p. 2.

  52. 52.

    Kilcullen 2009, p. 300.

  53. 53.

    Caldwell et al. 2009.

  54. 54.

    See e.g. NATO 2008, pp. 1-2–1-3: ‘From the strategic to the tactical level and across the range of military operations, information plays a vital role in the manner in which decisions are made. In military operations the ability to defeat adversaries or potential adversaries may rest on the perception of all actors involved, particularly the local population. There is therefore considerable benefit to be gained by affecting the flow of information through a decision-maker and his understanding of that information.’. See also US Department of Defense 2012, p. II-1 (stating, ‘[i]nfluence is at the heart of diplomacy and military operations’); UK Ministry of Defence 2009, pp. 3–5, 3A-2; Canada 2008, p. 2-2; Koninklijke Landmacht 2014, pp. 2–9 (in Dutch). For the ramifications and complications of effectively countering insurgents’ information campaigns, see Pijpers 2014.

  55. 55.

    Taking a slightly different (enemy centric) approach, the US defines it as: ‘the integrated employment, during military operations, of [information-related capabilities] in concert with other lines of operation, to influence, disrupt, corrupt or usurp the decision making of adversaries and potential adversaries while protecting our own.’ US Department of Defense 2012, p. iii.

  56. 56.

    NATO 2009, p. 1-5.

  57. 57.

    NATO 2009, pp. 1–7.

  58. 58.

    Andres 2009, p. 74.

  59. 59.

    NATO 2009, pp. 1–8 (maintaining that the enumeration also contains doctrine as a constraint for information activities). The present author rejects this reading, as doctrine is meant to provide guidance for commanders and staff officers/planners, not be a constraint.

  60. 60.

    NATO 2009, p. 1-8.

  61. 61.

    NATO 2009, pp. 1-8–1-9.

  62. 62.

    NATO 2009, pp. II-3 to II-4.

  63. 63.

    Wilner 2011, p. 26.

  64. 64.

    Wilner 2011, p. 30.

  65. 65.

    NATO 2009, p. II-5; Matthijssen 2010.

  66. 66.

    NATO 2009, p. II-5.

  67. 67.

    US Joint Forces Command 2010, p. III-7.

  68. 68.

    US Joint Forces Command 2010, p. III-7.

  69. 69.

    NATO 2009, p. II-13.

  70. 70.

    In general, Key Leader Engagement, entails generating constructive effects, although theoreticaly one could also aim at disruptive effects vis-avis selected stakeholders.

  71. 71.

    NATO 2009, p. II-13. See also Andres 2009, p. 74.

  72. 72.

    US Army Center for Army Lessons Learned 2009, p. i. See also the role of CERP (Commander’s Emergency Response Program) at p. 13 ff, arguably signalling particular advantages for this capability in counterinsurgencies, as it ‘is defeating COIN targets without creating collateral damage’.

  73. 73.

    Kitzen 2012a, p. 716.

  74. 74.

    Kitzen 2012a, pp. 727–728; Haaster 2014. See also US Army 2010a, pp. 2–8, 2–1, and the text accompanying footnotes 15–16 supra.

  75. 75.

    US Army 2010a, pp. 3–7.

  76. 76.

    Dunlap 2001, 2009, 2010.

  77. 77.

    Dunlap 2008, p. 146.

  78. 78.

    The present author also rejects the neo-conservative view that even the legitimate use of (international) law by opponents qualifies as ‘lawfare’. See, e.g. Goldstein and Meyer 2009; Goldstein 2014.

  79. 79.

    Dunlap 2001.

  80. 80.

    See NATO’s response to questions from the UN’s Human Rights Council related to Operation Unified Protector (Libya, 2011) in UN Human Rights Council 2012.

  81. 81.

    Banks 2011.

  82. 82.

    Wright 2011.

  83. 83.

    For a manipulated impression of a battlefield situation, see the Valhalla incident in Iraq (2006) as described by Dauber 2009, p. 13 ff and Dungan 2008.

  84. 84.

    For examples of the potential use of lawfare, see e.g. Shirbon 2014; Liljas 2014. See also UK House of Commons 2013.

  85. 85.

    Haaretz 2014.

  86. 86.

    Wright 2011.

  87. 87.

    Operational or tactical goals are used in contrast to strategic goals (i.e. goals at strategic command levels in operations).

  88. 88.

    Govern 2012.

  89. 89.

    Berlin 2010.

  90. 90.

    Voetelink 2013; Herrera 2013.

  91. 91.

    See for instance the discussion on the legality to target (kill) individuals that could be related to the narcotic industry in Afghanistan: Pouw 2013, p. 288–289; Koelbi 2009; Schmitt 2009.

  92. 92.

    Govern 2012, p. 477.

  93. 93.

    Based on the consent by the sovereign Host Nation, as expressed in i.a. Status of Forces Agreements (SOFAs).

  94. 94.

    Regulations Respecting the Laws and Customs of War on Land, annexed to Convention No. IV Respecting the Laws and Customs of War on Land, 18 October 1907, 36 Stat. 2227, Article 42 [hereinafter Hague IV Regulations].

  95. 95.

    Based on the Hague IV Regulations, idem., Article 43. See e.g. Pouw 2013; Dinstein 2009.

  96. 96.

    Chesney 2011, p. 477.

  97. 97.

    Herrera 2013.

  98. 98.

    Evidence-based operations ‘are operations where Afghan law enforcement authorities, supported by ISAF, effectively investigate, apprehend, search and seize criminal suspects and affiliated property in accordance with Afghan law’. Voetelink 2013, p. 198.

  99. 99.

    And vice versa.

  100. 100.

    European arrest warrant: European Union 2002.

  101. 101.

    Rome Statute of the International Criminal Court, 17 July 1998, 2187 UNTS 90, Article 58 Rome Statute (Statute of the International Criminal Court).

  102. 102.

    Voetelink 2013, p. 195.

  103. 103.

    Govern 2012, p. 484.

  104. 104.

    See US Army 2010b; US Army Center for Army Lessons Learned 2010.

  105. 105.

    Neuteboom 2014.

  106. 106.

    Govern 2012, p. 484.

  107. 107.

    See e.g. Voetelink 2013, p. 199 and Herrera 2013, pp. 94–108.

  108. 108.

    Herrera 2013, p. 94.

  109. 109.

    These are often referred to as ‘detention’ operations. This term however, will be reserved for ‘security detention’ (see infra).

  110. 110.

    Berlin 2010, pp. 2, 8 (referring to ‘prosecution support teams’ that should be established).

  111. 111.

    Pouw 2013, p. 18.

  112. 112.

    The term ‘operational detention’ is also used.

  113. 113.

    See Convention (III) relative to the Treatment of Prisoners of War (Geneva, 12 August 1949) 75 UNTS 135.

  114. 114.

    See Pejic 2005, p. 375. For ‘operational detention’, see Kleffner 2010, p. 465.

  115. 115.

    In general, see: Cole et al. 2009; Gill and Fleck 2010, p. 465. For a specific operation: Innenriks 29 January 2004.

  116. 116.

    Or when s/he fulfils a ‘continuous combat function’, resulting in a loss of protection from attack throughout that period.

  117. 117.

    Kleffner 2010, pp. 469–470, mentioning a Security Council Resolution, LOAC, self-defence, the prevention of breaches of international (criminal) law; and Agreements with the Host Nation.

  118. 118.

    Noorda 2014.

  119. 119.

    See the model presented by Brooks 2002, p. 19; Drezner 2011.

  120. 120.

    See the activities of the UK based NGO Global Witness, www.globalwitness.org/campaigns/corruption/oil-gas-and-mining/Afghanistan. Accessed 25 May 2014.

  121. 121.

    See UK Government, Current List of Designated Persons, Terrorism and Terrorist Financing (update 11 April 2014). www.gov.uk/government/publications/current-list-of-designated-persons-terrorism-and-terrorist-financing. Accessed on 25 May 2014.

  122. 122.

    See Barrett 2012, p. 723; Basile 2004.

  123. 123.

    Ducheine 2015, based on Schmitt 2013, p. 258, referring to this notion as ‘cyber warfare’: ‘employment of cyber capabilities with the primary purpose of achieving [military] objectives in or by the use of cyberspace’ [Emphasis added].

  124. 124.

    Ducheine and Haaster 2014, pp. 309–310.

  125. 125.

    Ducheine 2015. See also Andres 2009, p. 74.

  126. 126.

    Ducheine and Haaster 2014, pp. 313–314.

  127. 127.

    Ducheine and Haaster 2014, pp. 320–323.

  128. 128.

    Dauber 2009, pp. v–x.

  129. 129.

    Dauber 2009, pp. v–x.

  130. 130.

    Dauber 2009, pp. v–x.

  131. 131.

    Dauber 2009, pp. v-x.

  132. 132.

    US Department of Defense 2013, p. II-16.

  133. 133.

    It goes beyond the focus of the chapter to elaborate on the notion of strategic communication. See e.g., NATO Military Concept for Strategic Communications 2010, p. 1, defining strategic communication as ‘the coordinated and appropriate use of NATO communications activities and capabilities—Public Diplomacy, Public Affairs, Military Public Affairs, Info Ops and PsyOps—in support of Alliance policies, operations and activities, and in order to advance NATO’s aims’.

  134. 134.

    Cyber operations, however, are partially different.

  135. 135.

    US Department of Defense 2013, p. II-15.

References

  • Allied Command Operations (NATO) (2010) Comprehensive Operations Planning Directive (COPD). V1.0 Mons: Supreme Headquarters Allied Power Europe, 7 Dec 2010

    Google Scholar 

  • Andres RB (2009) Deep attack against Iraq. In: Mahnken TG, Keaney TA (eds) War in Iraq: planning and execution (strategy and history). Routledge, London, pp 69–96

    Google Scholar 

  • Banks WC (2011) New battlefields/old laws: critical debates on asymmetric warfare. Columbia University Press, New York

    Google Scholar 

  • Barrett R (2012) Preventing the financing of terrorism. Case West Reserv J Int Law 44(3):719–736

    Google Scholar 

  • Basile M (2004) Going to the source: why al qaeda’s financial network is likely to withstand the current war on terrorist financing. Stud Confl Terror 27(3):169–185

    Article  Google Scholar 

  • Berlin SD (2010) Conviction-focused targeting: targeting violent extremists while developing rule of law capacity. Small Wars J

    Google Scholar 

  • Brooks RA (2002) Santions and regime type: what works, and when? Secur Stud 11(4):1–50

    Article  Google Scholar 

  • Caldwell WBI, Murphy DM, Menning A (2009) Learning to leverage new media: the Israelian Defense Forces in recent conflicts. Mil Rev 89(3):2–10

    Google Scholar 

  • Canada ND (2008) B-GL-300-001/FP-001 Land Operations

    Google Scholar 

  • Cheng Hang T (2010) Non-kinetic warfare: the reality and the response. Point J Singap Armed Forces 36(1):45–57

    Google Scholar 

  • Chesney R (2011) Iraq and the military detention debate: firsthand perspectives from the other war, 2003–2010. Va J Int Law 51(3):549–636

    Google Scholar 

  • Cole A, Drew P, McLaughlin R, Mandsager D (eds) (2009) Rules of engagement handbook. International Institute of Humanitarian Law, San Remo

    Google Scholar 

  • Dauber C (2009) YouTube war: righting in a world of cameras in every cell phone and photoshop on every computer. Strategic Studies Institute, U.S. Army War College, Carlisle

    Google Scholar 

  • Dinstein Y (2009) The international law of belligerent occupation. University Press, Cambridge

    Book  Google Scholar 

  • Drezner DW (2011) Sanctions sometimes smart: targeted sanctions in theory and practice. Int Stud Rev 13(1):96–108

    Article  Google Scholar 

  • Ducheine PAL (2015) The notion of cyber operations in international law. In: Tsagourias N, Buchan R (eds) Reseach handbook on international law and cyber space. Edwar Elgar Publishing, Cheltenham, pp 211–232

    Google Scholar 

  • Ducheine PAL, Haaster Jv (2014) Fighting power, targeting and cyber operations. In: Proceedings of the 6th International Conference on Cyber Conflict, CCDCOE, Tallinn, pp 303–327

    Google Scholar 

  • Ducheine PAL, Pouw EH (2012) Legitimizing the use of force: legal bases for Operation Enduring Freedom and ISAF. In: Meulen Jvd, Vogelaar A, Beeres R, Soeters J (eds) Mission Uruzgan: collaborating in multiple coalitions for Afghanistan. Amsterdam University Press, Amsterdam, pp 33–46

    Google Scholar 

  • Dungan P (2008) Fighting lawfare at the special operations task force level. Spec Warf 21(2):10–15

    Google Scholar 

  • Dunlap CJ (2001) Law and military interventions: preserving humanitarian values in 21st conflicts. Humanitarian Challenges in Military Intervention Conference, Carr Center for Human Rights Policy, Kennedy School of Government, Harvard University Washington, D.C., 29 Nov 2001

    Google Scholar 

  • Dunlap CJ (2008) Lawfare today: a perspective. Yale J Int Aff (Winter):146–154

    Google Scholar 

  • Dunlap CJ (2009) Lawfare: a decisive element of 21st century conflicts? Joint Forces Q 54:34–39

    Google Scholar 

  • Dunlap CJ (2010) Does lawfare need an apologia? Case West Reserv J Int Law 43:121–143

    Google Scholar 

  • European Commission (2013) Joint Communication to the European Parliament and the Council. The EU’s comprehensive approach to external conflict and crises. JOIN (2013) 30 final, Brussels, 11 Dec 2013

    Google Scholar 

  • European Union (2002) Council Framework Decision 2002/584/JHA of 13 June 2002 on the European Arrest Warrant and the Surrender Procedures Between Member States, 2002 O.J. (L 190/2) 1 (EU)

    Google Scholar 

  • Gill TD, Fleck D (2010) The handbook of the international law of military operations. Oxford University Press, Oxford

    Google Scholar 

  • Goldstein B (2014) What is lawfare? www.thelawfareproject.org. Accessed 15 April 2014

  • Goldstein B, Meyer AE (2009) Legal jihad: how Islamist lawfare tactics are targeting free speech. ILSA J Int Comp Law 15:395–410

    Google Scholar 

  • Govern KH (2012) Warrant-based targeting: prosecution-oriented capture and detention as legal and moral alternative to targeted killing. Ariz J Int Comp Law 29(3):477–516

    Google Scholar 

  • Haaretz (2014) Twitter suspends account of Hamas’ military wing (14 January 2014)

    Google Scholar 

  • Haaster Jv (2014) Key-leader engagement in or through cyberspace. Essay, Netherlands Defence Academy (on file with the author)

    Google Scholar 

  • Hanson VD (1989) The western way of war—infantry battle in Classical Greece. Hodder & Stoughton, London

    Google Scholar 

  • Hanson VD (2001) Why the west has won: carnage and culture from Salamis to Vietnam. Anchor Books, New York

    Google Scholar 

  • Herrera P (2013) Evidence based operations: a guide for intelligence professionals to operate in conjunction with the rule of law in Afghanistan. NATO Operational Headquarters (on file with author)

    Google Scholar 

  • Innenriks (2004) The rules of engagement: stridsreglene. http://www.nrk.no/nyheter/innenriks/3462304.html. Accessed 22 April 2014

  • Kilcullen D (2009) The accidental guerilla. University Press, Oxford

    Google Scholar 

  • Kitzen M (2012a) Close encounters of the tribal kind: the implementation of co-option as a tool for de-escalation of conflict: the case of the Netherlands in Afghanistan’s Uruzgan Province. J Strateg Stud 35(5):713–734

    Article  Google Scholar 

  • Kitzen M (2012b) Western military culture and counter-insurgency, an ambigious reality. Sci Mil S Afr J Mil Stud 40(1):123–134

    Google Scholar 

  • Kleffner J (2010) Operational detention and the treatment of detainees. In: Gill TD, Fleck D (eds) The handbook of the international law of military operations. Oxford University Press, Oxford, pp 465–479

    Google Scholar 

  • Koelbi S (2009) Battling Afghan drug dealers: NATO High Commander issues illegitimate order to kill (28 January 2009). Der Spiegel

    Google Scholar 

  • Koninklijke Landmacht (2014) Doctrinepublicatie Landoptreden. www.defensie.nl/binaries/defensie/documenten/publicaties/2014/02/11/militaire-doctrine-voor-het-landoptreden/DP+3.2.pdf. Accessed 29 April 2014

  • Liljas P (2014) Top U.K. defense officials accused of war crimes: International Criminal Court receives huge dossier of allegations relating to British conduct during war in Iraq (13 January 2014). Time. http://world.time.com/2014/01/13/top-u-k-defense-officials-accused-of-war-crimes/. Accessed 16 May 2014

  • Lynn J (2003) Battle: a history of combat and culture from ancient Greece to modern America. Westview Press, Boulder

    Google Scholar 

  • Matthijssen CJ (2010) Strategic communication. Mil Spect 179(10):517–531

    Google Scholar 

  • Ministerie van Defensie (2013) Netherlands defence doctrine. http://www.defensie.nl/binaries/defensie/documenten/publicaties/2013/11/20/defence-doctrine-en/defensie-doctrine_en.pdf. Accessed 16 March 2014

  • Morris VR (2010) Battlefield forensics: dynamic adaptation of the company-level task force. Infantery 99(Nov/Dec):6

    Google Scholar 

  • Murphy DM (2009) Talking the talk: why warfighters don’t understand information operations. Issue Paper, Center for Strategic Leadership, US Army War College

    Google Scholar 

  • NATO (2008) Allied joint doctrine for joint targeting (AJP-3.9)

    Google Scholar 

  • NATO (2009) Allied joint doctrine for information operations (AJP-3.10)

    Google Scholar 

  • NATO (2010) NATO military concept for strategic communications (27 July), enclosure 1 to MCM-0085-2010 revised, dated 11 August 2010. http://www.docstoc.com/docs/136613988/NATO-Military-Concept-for-Strategic-Communications

  • Neuteboom P (2014) Beyond borders: the role of the Netherlands Army in public security during crisis management operations (diss. University of Tilburg). Wolf Legal Publishers, Nijmegen

    Google Scholar 

  • Noorda H (2014) Preventive deprivations of liberty: asset freezes and travel bans. Amsterdam Law School Research Paper No 2014-20. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2400390. Accessed 25 May 2014

    Google Scholar 

  • Pejic J (2005) Procedural principles and safeguards for internment/administrative detention in armed conflict and other situations of violence. Int Rev Red Cross 87(858):376

    Article  Google Scholar 

  • Pijpers PBMJ (2014) De twitterende tegenstanders: een discours over de rol van mediaculturen in het conflict (org. Dutch). Mil Spect 183(6):300–314

    Google Scholar 

  • Pouw EH (2013) International human rights law and the law of armed conflict in the context of counterinsurgency—with a particular focus on targeting and operational detention (diss. UvA)

    Google Scholar 

  • Schmitt MN (2009) Targeting narcoinsurgents in Afghanistan: the limits of international humanitarian law. Yearb Int Humanit Law 12:301–320

    Article  Google Scholar 

  • Schmitt MN (ed) (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press,

    Google Scholar 

  • Shirbon E (2014) Campaigners ask ICC to investigate alleged UK war crimes in Iraq (12 January 2014). Reuters

    Google Scholar 

  • Smith-Windsor B (2008) Hasten slowly: NATO’s effects based and comprehensive approach to operations. NATO Research Paper 38 (NATO Defence College)

    Google Scholar 

  • Smith R (2005) The utility of force. Allen Lane, London

    Google Scholar 

  • Sun Tzu (1994) The art of war (trans: Sawyer R). Westview Press, Boulder

    Google Scholar 

  • UN Human Rights Council (2012) Report of the International Commission of Inquiry on Libya (UN Doc nr. A/HRC/19/68)

    Google Scholar 

  • UK House of Commons DC (2013) UK armed forces personnel and the legal framework for future operations. Twelfth Report of Session 2013-14, HC 931, Published on 2 April 2013

    Google Scholar 

  • UK Ministry of Defence (2009) Joint doctrine publication 3-00 (JDP 3-00), 3rd Edn. Campaign Execution. Development, Concepts and Doctrine Centre (DCDC). https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/33697/20111130jdp001_bdd_Ed4.pdf. Accessed 17 March 2014

  • US Air Force (2014) Annex 3–60 Targeting https://doctrine.af.mil/download.jsp?filename=3-60-Annex-TARGETING.pdf. Accessed 6 April 2014

  • US Army Center for Army Lessons Learned (2009) Commanders Guide to Money as a Weapon System. Handbook 09-27 (March)

    Google Scholar 

  • US Army, Center for Army Lessons Learned (2010) Forensics and Warrant-Based Targeting, pp 10–35 (March)

    Google Scholar 

  • US Army (2010a) Field manual (FM 3-60) the targeting process (November 2010), Department of the Army

    Google Scholar 

  • US Army (2010b) Site exploitation operations ATTP No. 3-90.15 (FM 3-90.15)

    Google Scholar 

  • US Department of Defense (2012) Joint publication information operations (JP 3-13). Joint Chiefs of Staff. http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf. Accessed 6 April 2014

  • US Department of Defense (2013) Joint publication targeting (JP 3-60). Joint Chiefs of Staff. http://cfr.org/content/publications/attachments/Joint_Chiefs_of_Staff-Joint_Targeting_31_January_2013.pdf. Accessed 6 April 2014

  • US Joint Forces Command (2010) Commander’s handbook for strategic communication and communication strategy. U.S. Joint Warfighting Center, Suffolk

    Google Scholar 

  • Voetelink JED (2013) Evidence-based operations: how to remove the bad guys from the battlefield. J Int Law Peace Armed Confl 4:194–201

    Google Scholar 

  • Wilner AS (2011) Deterring the undeterrable: coercion, denial, and delegitimization in counterterrorism. J Strateg Stud 34(1):3–37

    Article  Google Scholar 

  • Wright A (2011) Lawfare: Israeli-AIPAC attack on the Gaza Freedom Flotilla (13 June 2011). http://sabbah.biz/mt/archives/2011/06/13/aipac-israel-attack-gaza-flotilla/. Accessed 29 April 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul A. L. Ducheine .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 T.M.C. Asser Press and the authors

About this chapter

Cite this chapter

Ducheine, P.A.L. (2016). Non-kinetic Capabilities: Complementing the Kinetic Prevalence to Targeting. In: Ducheine, P., Schmitt, M., Osinga, F. (eds) Targeting: The Challenges of Modern Warfare. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-072-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-94-6265-072-5_10

  • Published:

  • Publisher Name: T.M.C. Asser Press, The Hague

  • Print ISBN: 978-94-6265-071-8

  • Online ISBN: 978-94-6265-072-5

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics

Societies and partnerships