FREE BOOKS

Author's List




PREV.   NEXT  
|<   110   111   112   113   114   115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134  
135   136   137   138   139   140   141   142   143   144   145   146   147   148   149   150   151   152   153   154   155   156   157   158   159   >>   >|  
the maxim of "Seeking out the enemy's fleet." Secondly, there are the operations which become necessary when no decision is obtainable and our war plan demands the immediate control of communications. Under this head it will be convenient to treat all forms of blockade, whether military or commercial, although, as we shall see, certain forms of military, and even commercial, blockade are primarily concerned with forcing the enemy to a decision. Our second main group covers operations to which we have to resort when our relative strength is not adequate for either class of operations to secure command. In these conditions we have to content ourselves with endeavouring to hold the command in dispute; that is, we endeavour by active defensive operations to prevent the enemy either securing or exercising control for the objects he has in view. Such are the operations which are connoted by the true conception of "A fleet in being." Under this head also should fall those new forms of minor counter-attack which have entered the field of strategy since the introduction of the mobile torpedo and offensive mining. In the third main group we have to deal with the methods of exercising control of passage and communication. These operations vary in character according to the several purposes for which the control is desired, and they will be found to take one of three general forms. Firstly, the control of the lines of passage of an invading army; secondly, the control of trade routes and trade terminals for the attack and defence of commerce; and thirdly, the control of passage and communication for our own oversea expeditions, and the control of their objective area for the active support of their operations. For clearness we may summarise the whole in tabulated analysis, thus:-- 1. Methods of securing command: (a) By obtaining a decision. (b) By blockade. 2. Methods of disputing command: (a) Principle of "the fleet in being." (b) Minor counter-attacks. 3. Methods of exercising command: (a) Defence against invasion. (b) Attack and defence of commerce. (c) Attack, defence, and support of military expeditions. * * * * * CHAPTER TWO METHODS OF SECURING COMMAND * * * * * I. ON OBTAINING A DECISION Whatever the nature of the war in which we are engaged, whether it be limited or unlimited,
PREV.   NEXT  
|<   110   111   112   113   114   115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130   131   132   133   134  
135   136   137   138   139   140   141   142   143   144   145   146   147   148   149   150   151   152   153   154   155   156   157   158   159   >>   >|  



Top keywords:

control

 

operations

 

command

 

military

 

exercising

 

Methods

 

defence

 

passage

 

blockade

 

decision


securing

 

commercial

 

counter

 

commerce

 

active

 

support

 

communication

 

attack

 
expeditions
 

Attack


character

 
oversea
 

terminals

 

thirdly

 

Firstly

 

general

 

purposes

 

desired

 

invading

 
routes

obtaining
 

SECURING

 

COMMAND

 

METHODS

 
invasion
 
CHAPTER
 
engaged
 

limited

 
unlimited
 

nature


Whatever

 

OBTAINING

 

DECISION

 

Defence

 

summarise

 

tabulated

 

clearness

 

analysis

 

attacks

 

Principle