Peer adversary and near-peer adversary (as well as peer competitor/near-peer competitor and peer rival/near-peer rival) are terms used predominantly by the United States to refer to non-allied foreign countries with significant military power which might engage in a hostile conflict with the US on close to equal terms. These terms may be used within a framework that contrasts them with the terms peer adversary/rival, rogue state, and/or VEO (violent extremist organization). They are typically used in reference to China and Russia.

Overview edit

The US Department of Defense does not have a formal definition for "near-peer",[1] though it can be informally defined by its relation to the term "peer adversary", which is described as[note 1]

"a nation or rival coalition with the motivation and capabilities to contest US interests on a global scale".[2][3]

Thus, a RAND paper defines a near-peer or "proto-peer" as

"a state that is not yet a peer but has the potential to become one"[4]

while also further fleshing out the DoD's definition of peer adversary as

"a state or collection of challengers with the power and motivation to confront the United States on a global scale in a sustained way and to a sufficient level where the ultimate outcome of a conflict is in doubt even if the United States marshals its resources in an effective and timely manner".[5]

However, even the definition of peer competitor is not agreed upon.[note 1] Others have defined peer competitor to be a state which has the will and ability to "gain regional dominance in Europe or Asia" or confront the United States in a regional conflict, overcoming the United States' power projection capabilities in the region (rather than the DoD or RAND definition which specify contesting the US on a global scale).[1][3][6]

These definitions do, however, typically agree upon the non-friendly relationship between the peer adversary/rival/competitor and the US. So, while they are typically used to describe China and Russia,[7][8] they are not used to refer to powerful nations like the United Kingdom or France which are allied with the United States.[2][3]

The terms peer and near-peer have been used in relation to the terms rogue state and violent extremist organization (VEO) along a gradient of power. Peer and near-peer are used for more powerful adversaries, like Russia and China, which could challenge the US; rogue state is used for militarily powerful Third World states which represent significant regional threats and has, at times, been applied to North Korea, Iran, Iraq, Libya, and Syria; violent extremist organization is used for terrorist organizations like Al Qaeda, ISIS, Al Shabaab, etc.[9][10][11]

History edit

The first use of peer and near-peer emerged after the end of the Cold War.[12] After the collapse of the Soviet Union, there did not initially appear to be any nation or group which could realistically compete with the United States. The concept of peer/near-peer was envisioned but no countries were seen as being close to achieving the status at the time. As a result, much of the focus in the 1990s was on the threats posed by rogue states like Iraq, North Korea, Iran, etc. However, as the new millennium approached, thought had shifted back toward the threat of peer and near-peer threats.[13][14][15] After 2001, though, American interests were mostly focused on the war in Iraq and the war in Afghanistan, then the rise of ISIS. Only toward the latter 2010s did attention shift toward the emergence of Russia and China as peer/near-peer adversaries.[8][16] Ukraine and the South China Sea (particularly Taiwan) were seen as likely locations for conflict. Warnings were raised that the US, which had been focused on COIN operations in the Middle East for the past two decades, would be ill-equipped to confront peer/near-peer threats in either of those regions.[1][9]

The United States and its allies have identified multiple industries and technologies to improve upon to counter peer/near peer capabilities, including: night vision, multi-spectral signature reduction, ISR (including wide area motion imagery to provide persistent surveillance),[17] bomber aircraft, UAVs and drone swarming technologies, microelectronics, cyber warfare, autonomous weapons, missile defense, directed energy weapons, and hypersonic propulsion.[7][18][8] Counterproliferation efforts, like ITAR, have also been used to prevent sensitive technologies being accessed by hostile nations.[19][20] Observers have also noted the importance of using these capabilities to counter the irregular warfare strategies and tactics used by specific peer/near-peer adversaries, like Russia's cyber warfare, China's economic warfare, and both Chinese information warfare and Russian disinformation.[9][18][21]

Attention has also been paid to changes in training as commentators have remarked on the fact that for much of the 2000s and 2010s, the US was engaged in conflicts where they enjoyed complete air dominance. As a result, most use of JTACs, TACPs, and CCTs was in coordinating close air support. If fighting against a peer/near-peer, air dominance is not guaranteed and those specialists would have to utilize other skills which were infrequently used/practiced during the Global War on Terror.[16][17][1] Changes would also need to be made to tactics, techniques, and procedures for using night vision as peer/near-peer adversaries have their own night vision capabilities.[19]

See also edit

Notes edit

  1. ^ a b Byorick notes that the 2001 RAND study cited the listed definition for peer competitor as the official definition used by the US DoD but did not provide a reference.[6] The earliest found use of the definition cited is from Goldman and Halbert's 1998 essay which mentioned this as an alternate definition but did not specify it was the official DoD definition.[3]

References edit

  1. ^ a b c d Hanson, Nicholas (24 December 2021). "In a Fight Over Taiwan, China Is No 'Near Peer' Adversary". National Interest. Archived from the original on 24 December 2021. Retrieved 7 August 2022.
  2. ^ a b Szayna et al. 2001, p. 8.
  3. ^ a b c d Goldman & Halbert 1998, p. 2.
  4. ^ Szayna et al. 2001, p. 3.
  5. ^ Szayna et al. 2001, p. 7-8.
  6. ^ a b Byorick 2017, p. 5.
  7. ^ a b Senate Armed Services Committee (21 September 2021). NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2022 REPORT TO ACCOMPANY S. 2792 (Report). U.S. Government Publishing Office. {{cite report}}: Cite has empty unknown parameter: |authors= (help)
  8. ^ a b c Cronk, Terri Moon (4 May 2018). "Near-Peer Adversaries Work to Surpass U.S. In Technology, Official Says". United States Department of Defense. Archived from the original on 26 January 2022. Retrieved 10 August 2022.
  9. ^ a b c Cole, Reyes (28 March 2019). "The Myths of Traditional Warfare: How Our Peer and Near-Peer Adversaries Plan to Fight Using Irregular Warfare Small Wars Journal". Small Wars Journal. Archived from the original on 28 March 2019.
  10. ^ Pellerin, Cheryl (23 May 2017). "DIA Director Testifies on Top Five Global Military Threats". Department of Defense. Archived from the original on 8 January 2022. Retrieved 15 August 2022.
  11. ^ "TURNING POINT A New Comprehensive Strategy for Countering Violent Extremism". Center for Strategic and International Studies. 14 November 2016. Archived from the original on 5 May 2022. Retrieved 15 August 2022.
  12. ^ Garamone, Jim (17 August 2015). "Dempsey: U.S. Forces Must Adapt to Deal With Near-Peer Competitors". United States Department of Defense. Archived from the original on 1 March 2022. Retrieved 10 August 2022.
  13. ^ Klare, Michael (November 1997). "ROGUE STATES AND "PEER COMPETITORS" A new military strategy for Washington?". Le Monde diplomatique. Archived from the original on 2 July 2002. Retrieved 10 August 2022.
  14. ^ Klare, Michael (Fall 1998). "The Rise and Fall of the "Rogue Doctrine"". Middle East Report. 208. Middle East Research and Information Project. Archived from the original on 25 April 2022. Retrieved 10 August 2022.
  15. ^ Szayna et al. 2001, p. 1-2.
  16. ^ a b Urquhart, Cameron (15 February 2022). "Maneuver Combat and the Integration of Air Force Special Warfare: Leveraging TACP Expertise Against a Near-Peer Threat". Air Land Sea Application Center. Archived from the original on 15 February 2022. Retrieved 10 August 2022. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 17 February 2022 suggested (help)
  17. ^ a b Phillips, Heath; Taylor, Troy; Vincent, Robert (2020). "FIGHTING TODAY'S PEER/NEAR-PEER FIGHT WITH TODAY'S TECHNOLOGY PE-310-A" (PDF). DTIC. Air Command and Staff College. Archived from the original (PDF) on 10 August 2022. Retrieved 10 August 2022.
  18. ^ a b "What are Near Peer Weapons?". BAE Systems. Archived from the original on 7 August 2022. Retrieved 10 August 2022.
  19. ^ a b Tishman, Jon; Schoen, Dan (22 January 2021). "WE DON'T OWN THE NIGHT ANYMORE". Modern War Institute at West Point. Archived from the original on 22 January 2022. Retrieved 4 June 2022. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 22 January 2021 suggested (help)
  20. ^ "Summary of the Open General License Pilot Program". Directorate of Defense Trade Controls. 20 July 2022. Archived from the original on 20 July 2022. Retrieved 10 August 2022.
  21. ^ Dobbins, James; Shatz, Howard J.; Wyne, Ali (2019). "Russia Is a Rogue, Not a Peer; China Is a Peer, Not a Rogue PE-310-A". RAND Corporation. doi:10.7249/PE310. Archived from the original on 2 August 2022. Retrieved 10 August 2022.
Cite error: A list-defined reference named "air ng training" is not used in the content (see the help page).

Works cited edit


Category:United States military stubs Category:Military terminology of the United States Category:United States Department of Defense