Rhizome manoeuvre

A rhizome manoeuvre is a surprise attack in a built environment, made from an unexpected direction, such as through a wall or floor. It is a key concept in contemporary warfare tactics, techniques, and procedures.

Using a rooftop as an unexpected direction of attack

The name derives from plant rhizomes, stem structures which grow horizontally underground through soil, allowing new shoots to grow upwards in other places.[1]

Definition

A rhizome manoeuvre is a combat technique, specifically designed to achieve surprise, as a tactical effect.[2]

  • It is a tactical technique used in urban combat, to effectively strike a sudden blow at the opponent from an unexpected direction.[3]
  • A rhizome manoeuvre is the application of an urban combat technique, that is performed by moving forces, and has been called a strategy of "walking through walls".[4]
  • Conceptually, it treats the built environment as a flexible, almost liquid medium, forever-in-flux.[5]

However, the criticism of writers such as Eyal Weizman,[6] and Flaherty,[7] emphasize the realities of moving through the urban built environment executing a rhizome manoeuvre, requires a force to assemble behind walls, under floors, or overhead on rooftops (using explosives, drills or hammers if necessary) in order to break through.

Key concepts

The key concepts of a rhizome manoeuvre, involve small decentralized forces:[8]

  • Moving at speed
  • Through the three-dimensional urban space as if it were without walls, floors, or ceilings outside of the normal linear routes, such as streets, doors, windows, and stairs that make up buildings

In essence, a rhizome manoeuvre is movement unobserved, and unexpected, and is based on tactical concepts such as:

Historical origin

Infiltration tactics, used in World War I, by assault parties have been identified as an early development of rhizome manoeuvres.[11] As this involved small units of troops moving toward, and through opposing trenches, through infiltration of various weak points, in order to launch surprise attacks overwhelming the defenders. During the Battle of Ortona, the Canadian Army developed a tactic known as "mouse-holing", which involved using anti-tank weapons to blast holes through walls of adjacent buildings, allowing the assaulting forces to advance through the hole into the adjacent space. In 1997, the US Army began to identify future warfare concepts, such as rhizome manoeuvres, describing: "Future land combat units will exploit terrain by maneuvering for tactical advantage within the folds and undulations of the earth's surface without suffering the restrictions imposed on mobility by contact with the ground."[12]

Use by the Israel Defense Forces

Various applications of rhizome manoeuvres, have been developed by the Israel Defense Forces (IDF), during its operations; these have been the subject of critical analysis by Eyal Weizman, in particular his essay on lethal theory, which appeared as a chapter in his 2007 book Hollow Land: Israel's Architecture of Occupation, as "Urban Warfare: Walking Through Walls" (pp 185–221).[13] In this work, Weizman interviewed senior IDF officers, involved in the Nablus manoeuvre (April 2002), where they described IDF tactical concepts such as rhizome manoeuvres; as well, Weizman collected accounts from civilians who experienced these events. This work, was first presented in Weizman's 2006 article "Lethal Theory".[14][15][16]

Application in urban combat

The application of rhizome maneuvering, by a combat forces has been likened to:

See also

References

  1. Flaherty, C. (2010) Command, Influence and Information in 3D Tactics. Journal of Information Warfare. (9)1: 18-31.
  2. Sullivan, J.P. Elkus, A. (2009) Postcard From Mumbai: Modern Urban Siege. Small Wars Journal (16 February 2009). URL: http://smallwarsjournal.com/jrnl/art/postcard-from-mumbai
  3. Flaherty, C. (2010) Command, Influence and Information in 3D Tactics. Journal of Information Warfare. (9)1: 18-31.
  4. EIPCO: European Institute for Progressive Cultural Policies. (2007) Eyal Weizman: Walking Through Walls. URL: http://eipcp.net/transversal/0507/weizman/en
  5. Sullivan, J.P. Elkus, A. (2009) Postcard From Mumbai: Modern Urban Siege. Small Wars Journal (16 February 2009). URL: http://smallwarsjournal.com/jrnl/art/postcard-from-mumbai
  6. Eyal Weizman. (2007) Hollow Land: Israel's Architecture of Occupation. Verso.
  7. Flaherty, C. (2012) Dangerous Minds: A Monograph on the Relationship Between Beliefs –Behaviours – Tactics. Published by OODA LOOP (7 September 2012). URL: http://www.oodaloop.com/security/2012/09/07/dangerous-minds-the-relationship-between-beliefs-behaviors-and-tactics/
  8. Flaherty, C. (2010) Command, Influence and Information in 3D Tactics. Journal of Information Warfare. (9)1: 18-31.
  9. Flaherty, C. (2009) 2D Verses 3D Tactical Supremacy in Urban Operations. Journal of Information Warfare. (8)2: 13-24.
  10. Flaherty, C. (2009) 2D Verses 3D Tactical Supremacy in Urban Operations. Journal of Information Warfare. (8)2: 13-24.
  11. Flaherty, C. (2010) Command, Influence and Information in 3D Tactics. Journal of Information Warfare. (9)1: 18-31.
  12. The Annual Report on The Army After Next (AAN) Project, July 1997 (August 1, 1997).
  13. Eyal Weizman. (2007) Hollow Land: Israel's Architecture of Occupation. Verso. URL: https://www.amazon.co.uk/Hollow-Land-Israels-Architecture-Occupation/dp/1844678687
  14. Eyal Weizman. Lethal Theory. URL: https://web.archive.org/web/20141231214157/http://www.skor.nl/_files/Files/OPEN18_P80-99%281%29.pdf
  15. EIPCO: European Institute for Progressive Cultural Policies. (2007) Eyal Weizman: Walking Through Walls. URL: http://eipcp.net/transversal/0507/weizman/en
  16. Sullivan, J.P. Elkus, A. (2009) Postcard From Mumbai: Modern Urban Siege. Small Wars Journal (16 February 2009). URL: http://smallwarsjournal.com/jrnl/art/postcard-from-mumbai
  17. Flaherty, C. (2008) 3D Tactics and Information Deception. Journal of Information Warfare. (7)2: 49- 58.
  18. Flaherty, C. (2009) 2D Verses 3D Tactical Supremacy in Urban Operations. Journal of Information Warfare. (8)2: 13-24.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.