ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Book Review: Asymmetric Warfare

Updated on June 10, 2010

Asymmetric Warfare

Many people offer thoughtful theories that are often wordy and primarily founded on other theories to the point that they can’t stand alone. For a long time there were a lot of words that described the exclusive attributes of unconventional warfare or military operation other than war and non-state opponents. Roger W. Barnett does propose a theory on asymmetric warfare, and successfully puts his finger on the drop of mercury that defines it. He explains asymmetric warfare as: “those actions that an adversary can exercise that you either cannot or will not.” (Barnett, 15) Barnett teaches at the Naval War College in Newport Rhode Island. He served in the U.S. Navy where he attained the rank of Captain before retiring. While on active duty, he headed the Strategic Concepts Branch and while working for the Chief of Naval Operations, he headed the Extended Planning Branch. He has proven himself both experienced and capable and therefore a dependable source of information on asymmetric warfare.

Barnett says that, “the central concern is neither to advocate avoidance of the use of force nor to remove all constraints on the use of force” (Barnett, 22). He is of the persuasion that force should be readily available and effective to keep the enemy “honest.” In creating this state of affairs, one also makes military force unnecessary. Such a mentality is common among martial artists who are very much capable of defeating most anyone in a fight and yet seek to resolve differences peacefully. A more historical case in point is Roosevelt’s advice to speak quietly but carry a big stick.

Barnett shifts away from the commonly accepted definition of asymmetric warfare, which is generally explained as opponents seeking to exploit each other’s weaknesses, and hit where it hurts (think a kick to the groin); a historically effective and common sense strategy. His theory is more comparable to hitting someone where they can’t hit back; imagine a woman slapping a man in the face. He summarizes asymmetric warfare as taking calculated risks to capitalize on an adversary’s inability or unwillingness to prevent or counter certain courses of action. For example, the U.S. could use nuclear weapons on Afghanistan, as well as Peshawar and Quetta in Pakistan, all Taliban hotbeds and strongholds. However, the collateral damage would make us perpetrators of genocide. We could start beheading Taliban and Al Qaeda commanders on, but that would make us no better than the enemy we seek to defeat. The thing is that while these tactics would be effective, as a nation, we will not resort to them.

There are many constraints that force America into an asymmetric position by tipping the scales to favor the insurgents and terrorists that we combat today. Barnett covers the operational, organizational, legal and moral constraints, as they exist in U.S. and for Americans abroad. Furthermore, he goes on to discuss the impacts of and remedies for these constraints on the political situation

The constraints that the U.S. imposes on itself in an attempt to maintain its image in the court of public opinion and the world stage should be reviewed and limited because we are tying our own hands knowing full well that we’ll be walking into a massacre yet again. In his concluding statement, Barnett states that, “When the defensive use of force, however, is clearly called for, U.S. decision makers and practitioners of the employment of military force must be granted at least a level field of operations and the ability to reduce the risks that must be run” (Barnett, 156).

Asymmetric Warfare is written in a slightly elevated language that requires the reader to have a diverse vocabulary or a good thesaurus readily accessible. There is a hint of a “know-it-all” tone. Other than that, the vibe is very much pro-American, though it does have the attitude of a frustrated patriot when Barnett starts to talk about the constraints that American has created for herself, causing so many problems as we continue the Global War on Terrorism.

This book is useful to newcomers and old salts in the intelligence field as it challenges contemporary thinking and the commonly accepted opinion of what asymmetric warfare is. The general definition of asymmetric warfare seems insufficient when compared to this writing, which should be read in conjunction with other works on the matter for the sake of comparison. It would probably be most beneficial if it were read early on in one’s studies of insurgencies, after the reader has a grasp of conventional opinions and definitions, but before they become stuck in their ways and unwilling to entertain new ideas.

This book provides an unconventional approach to unconventional warfare that provides some mental stretches for people who have preconceptions about asymmetric warfare and offers up a new theory that seems to be very much valid. The nearly half page of footnotes at the bottom of most pages indicates that Barnett did his homework and put a great deal of research into developing and supporting his theory. Asymmetric Warfare is term that is often used as an empty buzzword. Barnett succeeds in giving it meaning through thorough analysis of U.S. strategy and offers advice on how to effectively counter the strengths of asymmetric opponents that make it so effective against our conventional forces.


Barnett, Roger W. 2003. Asymmetric Warfare: Today’s Challenge to U.S. Military Power. Washington, DC: Brassey’s, Inc.

Should you be interested in more

Asymmetrical Warfare: Today's Challenge to U.S. Military Power (Issues in Twenty-First Century Warfare)
Asymmetrical Warfare: Today's Challenge to U.S. Military Power (Issues in Twenty-First Century Warfare)

Barnett shifts away from the commonly accepted definition and offering his own theory, putting his finger on the drop of mercury that defines Asymmetric Warfare



    0 of 8192 characters used
    Post Comment

    • Lance Crowe profile imageAUTHOR

      Lance Crowe 

      8 years ago


      Thanks for voting and thanks even more for posting. You’re right, most of us would have qualms with beheading anyone without a really good reason, and even then, it would likely be with reservations if we could somehow go through with it. people are starting to build a mold around asymmetric warfare and essentially equating it to insurgency and terrorism. The thing is that it’s asymmetric because we are unable or unwilling to reciprocate. The Gulf has exposed us to the more primitive versions of asymmetric warfare. China, who seeks to be a word power in direct competition with America by 2015, will show us the high-end of it. They are very skilled at reverse engineering any technology they come across and finding ways to exploit or neutralize the tools that make us such a force to be reckoned with. They will come to the table with information warfare as their equalizer.

    • K9keystrokes profile image

      India Arnold 

      8 years ago from Northern, California

      Asymmetric Warfare has become the downfall, to some degree, in our current Gulf experiences. The majority of us are unwilling to behead an adversary for any reason. This in my military opinion is what seperates us from the monsters who lurk in the shadows of tin shacks and mud caves.

      I prefer to retain my humanity until my duty calls for a revision in mind-set.

      Fantastic hub. I will continue to follow and vote up happily!


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)