Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Political Science, 2005. / Includes bibliographical references (leaves 83-85). / Operational surprise attacks are large-scale, theater-level intrawar attacks, which result from a country misestimating the capabilities and intentions of its enemies. This thesis analyzes how these massive surprise attacks occur during war when countries should be especially wary of their enemies and vigilant for any evidence of attack. Three hypotheses may explain the frequency and success of operational surprise attacks including operational secrecy, strategic deception, and intelligence failure. Using the Battle of the Bulge in World War II and the Chinese counteroffensive in the Korean War as case studies, this analysis illustrates these three elements and evaluates their relative causal weight in these attacks. This study concludes that each hypothesis is a contributing element to the surprise attack, but that a failure of intelligence is the critical factor. Moreover, this failure stems from a "victory disease" - a belief held by military leaders and their intelligence staff when victory appears near that one's enemy is too weak or has allowed the opportunity to mount a successful counterattack pass. / (cont.) Thus, precisely when one's enemy becomes most desperate on the battlefield countries run a greater risk of surprise attack by failing to accurately estimate an enemy's strategic intentions and military capabilities. / by Lonn Augustine Waters. / S.M.
Identifer | oai:union.ndltd.org:MIT/oai:dspace.mit.edu:1721.1/33710 |
Date | January 2005 |
Creators | Waters, Lonn Augustine |
Contributors | Barry Posen., Massachusetts Institute of Technology. Dept. of Political Science., Massachusetts Institute of Technology. Dept. of Political Science. |
Publisher | Massachusetts Institute of Technology |
Source Sets | M.I.T. Theses and Dissertation |
Language | English |
Detected Language | English |
Type | Thesis |
Format | 85 leaves, 5006999 bytes, 5010499 bytes, application/pdf, application/pdf, application/pdf |
Rights | M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission., http://dspace.mit.edu/handle/1721.1/7582 |
Page generated in 0.0869 seconds