The D Day Attack Map
The American approach to Military Tactics and Strategy involves a combination of linear and daoist approaches. Let us consider the American invasion of Europe from Great Britain during World War II against Nazi Germany. Eisenhower and his staff were perceptive enough to realize that a conventional approach to war would not work. They also knew that it was likely that the SHAEF (Supreme Headquarter Allied Expeditionary Force) Staff had British Nazi spys and Soviet KGB spys in place who could potentially give top secret information to the German Nazis which would destroy the American Invasion Plan. Also, there is a certain military strategy which takes the approach that you always assume that there is a spy or traitor in your camp, and plan accordingly. Additionally, the enemy is typically used to doing linear planning in a fixed way. Thus, the Wise American Commander developes 7 different, but complementary plans to invade Europe (or elsewhere), and then allocates a certain amount of resources to the commander for each plan, but, also holds in reserve enough resources, such that only one of the plans will be fully implemented at the last minute. In this way, the enemy will have to allocate resources in relation to all 7 plans, in strength, in order to counter each potential plan. In fact, the American Commander may even be able to put resources into 2 of the plans, not just one. Thus, the American plans for the invasion of Europe involved the potential American landings at Calais Beach, Normandy Beach, but also, LeHarve Harbor. Antwerp Harbor, Amsterdam Harbor, Marseilles Harbor, and Hamburg Harbor. In fact, the Wise American Commander will leak to the Germans the general idea of each potential plan, and then engage in feints, to suggest to the German Commander, typically Rommel, that one or two of the plans were being favored over the others. Then, the Wise American Commander will sit back and scout the enemy to see how he is allocating his resources, and then respond in such a way that those enemy resources will be rendered ineffectual.
(C)Copyright 2011 by Anthony J. Fejfar
(C)Copyright 2011 by Anthony J. Fejfar
No comments:
Post a Comment