Irregular Warfare: Counterterrorism Forces in Support of Counterinsurgency Operations
|
|
|
- Emory Washington
- 10 years ago
- Views:
Transcription
1 No. 91 September 2012 Irregular Warfare: Counterterrorism Forces in Support of Counterinsurgency Operations William B. Ostlund
2 Irregular Warfare: Counterterrorism Forces in Support of Counterinsurgency Operations by William B. Ostlund The Institute of Land Warfare association of the United states army
3 AN INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of ILW s editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER NO. 91, September 2012 Irregular Warfare: Counterterrorism Forces in Support of Counterinsurgency Operations by William B. Ostlund Colonel William B. Ostlund is the commander of the 3d Brigade Combat Team, 1st Infantry Division, Fort Knox, Kentucky. He is the former deputy commander of the 75th Ranger Regiment, Fort Benning, Georgia with whom he served as the Counterterrorism Task Force (CT TF) Commander in Afghanistan on two occasions. Prior to serving as the CT TF Commander, he served as Commander, 2d Battalion (Airborne) 503d Infantry, Vicenza, Italy, and Kunar Province, Afghanistan, during Operation Enduring Freedom VIII. In addition, he has served in a variety of command and staff positions in the continental United States, Korea, Europe, Iraq and Afghanistan, including U.S. European Command Support Section Chief, J-5, U.S. Strategic Command; S-3 (Operations), 173d Airborne Brigade, Kirkuk, Iraq; S-3, 1st Battalion (Airborne), 508th Infantry, Vicenza, Italy; G-3 Chief of Operations, Southern European Task Force, Vicenza, Italy; and Associate Professor, Department of Social Sciences, United States Military Academy, West Point, New York. Colonel Ostlund received a Bachelor of General Studies degree from the University of Nebraska at Omaha and a Master of Arts in Law and Diplomacy from The Fletcher School at Tufts University. He is a graduate of the U.S. Army Command and General Staff College and the Joint and Combined Warfighting School. He also completed an Army War College Fellowship at The Fletcher School. This paper represents the opinions of the author and should not be taken to represent the views of the Department of the Army, the Department of Defense, the United States government, the Institute of Land Warfare, or the Association of the United States Army or its members. Copyright 2012 by The Association of the United States Army All rights reserved. Inquiries regarding this and future Land Warfare Papers should be directed to: AUSA s Institute of Land Warfare, Attn: Director, ILW Programs, 2425 Wilson Boulevard, Arlington VA 22201, [email protected] or telephone (direct dial) or (toll free) , ext ii
4 Contents Foreword... v Introduction... 1 Irregular Warfare... 2 Irregular Warfare Afghanistan... 4 Lessons Gleaned from a Decade of War... 6 Conclusion... 8 Glossary of Acronyms Endnotes iii
5 iv
6 Foreword United States counterterrorism (CT) forces have been employed in Afghanistan since October Over the past decade, the CT force profile and method of operating have evolved. Historically, says the author, the CT force was a secretive organization that did little to directly assist conventional battlespace owners (BSOs) operating in a shared counterinsurgency (COIN) environment; today, the CT force overtly supports BSOs, from the Commander, International Security Assistance Force (COMISAF) to the many dispersed battalion commanders operating throughout Afghanistan. According to the author, the CT force s evolution was born of necessity. As the battlespace became more complex and conventional forces controlled large tracts of land, ensuring operations were mutually supporting aided if not guaranteed the CT force s freedom of action (FOA); conversely, operations that were not fully coordinated routinely inhibited the CT force s FOA. In January 2009, the CT force aggressively revamped its method of operating in Afghanistan to provide unprecedented support to BSO and consequently guarantee FOA for the CT force. This study seeks to ensure the unclassified lessons amassed are captured and ideally learned, trained, rehearsed and implemented. This paper was chosen as the winner of the 2012 AUSA/Army Capabilities Integration Center (ARCIC) writing contest. 17 September 2012 Gordon R. Sullivan General, U.S. Army Retired President, Association of the United States Army v
7 vi
8 Irregular Warfare: Counterterrorism Forces in Support of Counterinsurgency Operations A decade of continuous conflict and employment has highlighted the value of Special Operation Forces [SOF] and has also shown the necessity of Special Operations Forces working in a complementary fashion with General Purpose Forces and allied forces. The synergistic effects of U.S. SOF working with partners of all types cannot be overstated or overlooked. Admiral William H. McRaven 1 Introduction On 19 October 2001, a joint special operations task force parachuted onto Objective Rhino, a remote desert landing strip southwest of Kandahar, Afghanistan. 2 This was the overt insertion of counterterrorism (CT) forces into the country. 3 For the next seven years the CT force operated in the shadows, protecting information about all facets of its organization and operations from U.S. and coalition forces as vigorously and competently as it protected that information from the enemies it targeted. Despite the innate culture of secrecy that permeated early CT force operations, the counterinsurgency operating environment demanded greater transparency if the CT force was to sustain effects or achieve the increased effects desired. 4 The CT force aggressively responded to the environment and dramatically and continuously increased internal and external coordination and cooperation in order to increase its freedom of action ability to operate and achieve sought effects. This effort will focus on unclassified actions taken by the CT force to increase its freedom of action and thus effects in two very different counterinsurgency operating environments Afghanistan and Iraq. Generic inferences will illuminate, and ideally help preserve, the CT force efforts and lessons without compromising ongoing efforts and effects. Counterterrorism force is a purposefully generic term that will be used throughout this paper to discuss United States Special Operations Command s (USSOCOM s) counterterrorism forces. The sub-units that comprise the CT force do not warrant identification in this forum and that information would add nothing to the narrative. It is relevant to acknowledge that as a unified command, USSOCOM is a joint headquarters responsible for: approximately 57,000 active duty, Reserve and National Guard Soldiers, Sailors, Airmen, Marines and [Department of Defense] civilians assigned to the headquarters, its four components and one sub-unified command. USSOCOM s components are U.S. 1
9 Army Special Operations Command (USASOC), Naval Special Warfare Command (NAVSPECWARCOM), Air Force Special Operations Command (AFSOC) and Marine Corps Forces Special Operations Command (MARSOC). The Joint Special Operations Command (JSOC) is a USSOCOM sub-unified command. 5 Further, USSOCOM develops special operations strategy, doctrine and tactics and, as directed by the Unified Command Plan, is responsible for synchronizing Department of Defense (DoD) plans against global terrorist networks. USSOCOM receives, reviews, coordinates and prioritizes all DoD plans that support the global campaign against terror. Among special operations forces core activities are counterterrorism and counterinsurgency operations. 6 Terrorism and CT, as defined by Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms, allow very local entities to be classified as terrorists and possibly requiring attention from a CT force. Conversely, a decade of conflict lent experiences to the U.S. government and U.S. military that have been used to inform U.S. national security strategy documents and joint doctrine development and updates. The U.S. national security apparatus has acknowledged that CT forces, special operations forces and conventional forces have a role in irregular warfare of which CT is one of five principle activities. CT operations are no longer an exclusive domain for a single national CT force but also a requirement for special operations forces and conventional forces. 7 Irregular Warfare Irregular threats are adaptive state or nonstate adversaries such as terrorists, insurgents and criminal networks that resort to irregular forms of warfare to challenge conventional military powers. As articulated in the Irregular Warfare Joint Operating Concept (IW JOC), the U.S. Joint Force approach to countering irregular threats is to prevent, deter, disrupt and defeat irregular threats, with prevention being the primary focus of the effort. The IW JOC identifies five principle activities or operations counterterrorism (CT), unconventional warfare (UW), foreign internal defense (FID), counterinsurgency (COIN) and stability operations (SO) that are undertaken in sequence, in parallel or in a blended form to coherently address irregular threats. 8 Strategy and doctrine documents are clear about the need for a whole-of-government approach, integration of all elements of national power, interagency inclusiveness, collaboration with partners of many types and unifying efforts to deal with irregular threats and to counter terrorism. 9 The National Defense Strategy states: We will continue to work to improve understanding and harmonize best practices amongst interagency partners. This must happen at every level from Washington, DCbased headquarters to the field. 10 There seems to be wide recognition and acknowledgment that each department and agency relies on the others to accomplish varied missions and that there are no independent actors achieving national objectives in isolation. 11 Directives to coordinate, cooperate, complement and integrate efforts permeate the national strategy documents. 12 However, there is an obvious absence of directives or inferences for the military services to work together. This leads to the assumption that the President, the Secretary of Defense and the Chairman of the Joint Chiefs of Staff understand that U.S. military forces are inextricably integrated joint and that the focus of strategic documents has shifted to discussing the whole of government or whole of nation approach, which demands greater interagency and greater multinational cooperation; many references to partners, allies and coalitions are included in the strategy documents. 13 2
10 If the assumption holds that the U.S. military is joint, a subset of the joint force the CT force should be examined. The SOCOM CT force is a joint force that routinely operates as a joint special operations task force; however, the CT force also has an impressive history of excelling as an insular force. Only recently did the CT force recognize the need to be more transparent and to be an overt team member if it is to gain, maintain and even increase its freedom of action throughout COIN operating environments. Specific CT force commanders and interagency leaders were key to increasing the transparency and team play of their respective insular organizations. 14 One of the first culture changes occurred within the CT force when historically stovepiped and competitive units were directed to complement (and perhaps compliment) the others efforts. War facilitated this directive as, for the first time in its history, the CT force had more requirements than it had forces to address the requirements. The competition to get into the fight dissipated and the command sought to maximize CT force efficiency and effectiveness as requirements for effects quickly outstripped CT force capacity. Internally, the insular CT force noted the expanded effects achieved when all CT force units sought complementary effects. The CT force quickly achieved maximum efficiency and effectiveness and then focused externally to increase the size, competency (speed) and effects of the entire CT team. Increasing the team size required diplomacy and sincerity to allay concerns of the insular internal team members and to attract skeptical external members to the newly constructed big tent. 15 The CT force did not waver from offering greater transparency and quickly noted the synergy attained by allowing more players onto the team; CT force effects increased exponentially. These efforts are accurately captured in General Stanley A. McChrystal s article It Takes a Network 16 and Eric Schmitt and Thom Shanker s book, Counterstrike: The Untold Story of America s Secret Campaign Against Al Qaeda. 17 The CT force created a network of unprecedented effectiveness. It simultaneously operated in multiple theaters and achieved unequalled successes in each. The CT force increased its tools and forces and continuously improved its tactics, techniques and procedures (TTPs). The CT force was a learning organization that prided itself on its disciplined and extensive after-action review procedures that not only cataloged lessons from each operation but disseminated and incorporated them, and thus continuously bettered itself through critical review. Classified statistics tell a story of steadily increasing effectiveness by all metrics. Despite its comparatively light footprint and a restrictive mandate, the CT force s numerous unheralded successes contributed directly to unhinging al Qaeda from Afghanistan and to the initial defeat of the Taliban. 18 Then in early 2003, Iraq became the CT force s main effort and Afghanistan transitioned to a supporting or secondary effort. In the Iraqi theater, the CT force s size, responsibilities and effects expanded far beyond their previous capabilities. 19 The learned CT force defeated al Qaeda in Iraq, where it dramatically contributed to conventional force successes as well. 20 It was in Iraq that the CT force became a catalyst for unprecedented interagency cooperation and interservice coordination. 21 The CT force was, and remains, secretive out of necessity. Yet its need to protect information does not detract from the value of its hard-earned lessons, which are routinely shared throughout the services to improve the overall operation of the United States military. Aspects of its increased transparency and cooperation with conventional forces conducting COIN operations played an integral role in the military s overall organizational growth. 22 The evolution of the CT force s methods of operation TTPs drove its success. Its 3
11 targeting process known as Find, Fix, Finish, Exploit and Analyze (F3EA) was continuously refined. New technologies and additional resources, including enhanced communication, intelligence, surveillance and reconnaissance (ISR), analytical tools and analysts, enhanced the F3EA process. 23 Information sharing within the military between the CT forces and conventional forces increased, and conventional force assets and capabilities were brought to bear on the problem sets and targets facing the CT force. 24 In short, greater cooperation yielded more effective battlefield results. The process demonstrated that complementing operations were more effective than unilateral operations conducted by CT or conventional forces. 25 Irregular Warfare Afghanistan Iraq remained the CT force s main effort until 2010, when the CT force realigned and Afghanistan again emerged as the main effort with Iraq devolving to a secondary effort. In Afghanistan, the CT force and interagency coordination once again evolved significantly. The CT force was a team-building organization with recent team-building successes. The CT force broke down internal barriers to improve CT force effects. 26 It proactively brought supporting agencies onto the team and into the tent, where complementary and synergistic effects were realized. 27 But the CT force initially struggled to expand the team concept to the conventional forces or general-purpose forces, known as battlespace owners (BSOs) the forces that conduct COIN operations and are responsible for holding and operating in a set geographic area; this was especially so in Afghanistan. At the direction of the CT force commander, unprecedented transparency was afforded to the BSOs. The CT force addressed the BSOs concerns and target sets and shared intelligence, exploitation and other assets. The BSOs provided much-needed conventional support and human intelligence, which required local familiarity. Transparency and coordinated efforts between the CT and COIN forces led to complementary effects and unprecedented freedom of action for the CT force. 28 The Afghan theater illustrates the complexity of CT force and BSO relations and illuminates the CT force s efforts to increase transparency and ultimately increase effects. In Afghanistan, the BSO conducts full-spectrum COIN operations, which require the BSO to live and work amongst the population and, almost without exception, to be partnered with Afghan National Security Forces (ANSF). Living amongst the population, perhaps with ANSF, and operating with ANSF amongst the population, allows the BSO to feel the operating environment in a way different from that of a raiding force. Increased transparency increased effects of the CT force and the BSO, which increased freedom of action for both the CT force and BSO and further increased coalition effects throughout the theater. The road to complementary effects was not fast or without bumps but, once directed by the CT commander, the CT force embraced the directive and sought to develop and disseminate TTPs that maximized each force s strengths. In early 2009 Admiral William H. McRaven, General McChrystal s successor as commander of Joint Special Operations Command, maintained continuity of thought and action, believing that networks defeated networks and team play was integral to strengthening networks. Although Iraq was the CT force main effort, it was apparent the main effort would switch to Afghanistan in the near future. The CT force commander became increasingly focused on Afghanistan as he sought to set conditions for realigning his main effort. Although the CT force had been operating in Afghanistan for eight years, its commander noted that, for a period of time, some BSOs did more to stymie the CT force s freedom of action than did the enemy or the Afghan military or government. A series of events led to a CT commander-directed tactical 4
12 pause and wholesale reevaluation of CT efforts and strategy in Afghanistan. The reevaluation showed that a lack of transparency with the BSO was a corrosive issue that directly affected the CT force s freedom of action. The CT force commander directed planners to review targeting, BSO coordination, information operations and anything else deemed relevant to maintaining then increasing CT force freedom of action. 29 The planners recommended changes to the CT force s targeting methodology, which directly related to BSO coordination and to information operations. The recommendations were countercultural and evolutionary as they focused on transparency highlighting that not all CT force information was secret or top secret and that sharing information would lead to BSO buy-in and support in heretofore unrealized ways. The CT force strategy was approved in February 2009 and a proof of principle was conducted in spring CT force elements partnered with a BSO that had recently left the CT force for conventional force battalion command (in Afghanistan). The personalities were right to develop and share TTPs that would allow the CT force to quickly pass intelligence, targets and assets to the BSO and for the BSO to quickly pass information to the CT force. In short order, the synergistic effect of the BSO s having access to the CT force intelligence and assets and the CT force s access to the knowledge only a population-centric BSO can gather was a model to be replicated. In addition to F3EA targeting, the CT force was able to leverage the network to produce exceptionally accurate, relevant and timely information operations (IO) products that were shared with the BSOs from battalion to International Security Assistance Force (ISAF) levels. The IO efforts nonlethal effects were continuous in the population-centric COIN environment of Afghanistan. The nonlethal effects shaped the environment by providing timely and accurate information to the BSO, Afghan partners and the Afghan population. After the proof of principle the CT force, in coordination with ISAF, disseminated the TTPs and effects to all BSOs. As one example of the synergy attained, in the summer of 2009 a CT element was committed to a BSO area that had experienced 19 U.S. casualties from improvised explosive devices (IEDs) in a period of three days. In 30 days of synchronized operations, the CT element helped reduce IED events by 90 percent, which dramatically increased the BSO s freedom of action and thus its ability to conduct more effective population-centric COIN operations. 30 The CT force continued to evolve and mature. Although the CT force had only a coordinating relationship with the ISAF commander, the CT force commander made it well known that the CT force was a supporting effort to the ISAF commander and the BSOs. He famously and routinely stated, We ll do windows if that is what it takes to maintain our freedom of action. 31 The overt display of mutual respect for and support of the BSOs dramatically increased the CT force s freedom of action. Statistically, the CT force was more precise than any force in the history of warfare, but that did not preclude all civilian deaths or accusations of civilian deaths. At those unfortunate times, the support of the BSO, Afghan Security Forces, Afghan government and population was essential to maintaining the CT force s freedom of action. When regrettable events occurred, the default setting of the BSO and those Afghans who interacted with the BSO was not accusatory toward the CT force; rather, it was acknowledged that bad things happen to good people and good units and unfortunately some innocents are hurt in war. Actions were immediately taken by the BSO and supported by the CT force to culturally address the misstep or perceived misstep. Support provided to the CT force was garnered through relationships that were built on transparency and humility. 5
13 The CT force commander, drawing on lessons from Iraq, knew the CT force in Afghanistan needed Afghan partners. To the surprise of many, he quickly retained Afghan senior partners from the ministry of defense, the ministry of the interior and the Afghan intelligence community and directed that they be allowed to operate within the guarded CT force camp. The senior partners operated adjacent to the CT joint operations center (JOC) on a 24-hour schedule as they monitored all missions from summer 2009 forward. Shortly thereafter, the CT force sought like Afghan partners at the tactical unit (or strike force) level and embarked on one of the most successful efforts to create a professional and credible partnered force; elements of the partnered force have been on nearly every objective since When it was suggested that females be included with the strike forces to more properly address Afghan females on objectives, the CT force embraced the idea and sought U.S. Army Special Operations Command s assistance in developing what became known as Cultural Support Teams. 33 In comparatively short order, well-trained U.S. military females were on objectives with the strike forces to properly address Afghan cultural concerns. The CT force is the nation s most resourced military force. Its strength is its people. Over time, its people included a network of people from the interagency to the most conventional BSO, to include coalition BSOs. 34 The CT force benefitted from transparency as the conventional forces augmented it with aircraft and surveillance platforms increasing the CT force capabilities and freedom of action which in turn allowed more strike forces to precisely action more targets in the BSO area of operations. Lessons Gleaned from a Decade of War There are times and places for the CT force to be and remain very secretive. But as the U.S. strategy and doctrine lean toward irregular warfare CT, UW, FID, COIN, SO future battle spaces are likely to be shared. The lessons from Iraq, and even more so from Afghanistan, show that transparency, where possible, creates synergistic effects between the CT force and conventional forces, leading to greater effects for all. Although the following lessons were gleaned in COIN environments, many are likely applicable to the other irregular warfare environments. Each operating environment is complex and unique. If CT force operations are conducted in the environment they may precede or follow a myriad of special operations force or conventional force efforts. It is very likely that CT force operations will precede, overlap and follow conventional force efforts. 35 As the operating environment matures or changes so must CT force operations. With few in the operating environment, CT forces have more latitude or freedom of action. As more players Special Forces, conventional forces, multinational forces, United Nations forces, interagency and others populate the operating environment, there is an expectation that coordination, cooperation and, ideally, complementary and integrated effects will be realized. The first force to detect the changes in the environment seems obligated to proactively seek to coordinate with others in an effort to mitigate what may evolve into complicating and distracting issues. Personalities matter. If the first CT personality or the first BSO personality is not ripe to the idea of transparency and increased effects, seek another personality. A little effort invested will produce the personality that shares common history and common desire to strengthen the team and improve the network. Timing matters. When CT forces are committed, there is likely a threat that requires their attention for some period. The CT force has learned the value of sending liaison officers 6
14 (LNOs) out to brigade combat team, regional command, joint command and theater command levels. The CT force also understands the need to take in LNOs. BSOs at all levels should be proactive at engaging the CT force in their battlespace and seeking a CT force LNO as well as offering an LNO to the CT force. LNO personalities matter and the CT force is committed to providing the best personality to the task, whether that be a sergeant, lieutenant, captain, major or colonel. COIN environments require all forces to work with elements of the host nation amongst the population. Leveraging the BSO is a means to gain rapid understanding of the population and a means to mitigate issues within the BSO s area of operation. The CT force brings incredible resources and precision to an imprecise operating environment. Leveraging the CT force which may mean providing the force scarce resources such as aircraft, surveillance platforms or partners is sure to pay dividends that exceed initial expectations. Senior-level and credible host nation partners in the construct of a coordination or advisory group treated as true partners coupled with well-trained and disciplined host nation partners at the tactical level (the level that interfaces with the population) increase freedom of action for conventional forces as well as for the CT force. Building these credible capabilities requires commander direction and involvement and a credible and quality investment in resources. Authorities associated with host nation entities must be understood and leveraged. Partners at every level should improve in competence and confidence on a daily basis. Additionally, coalition force understanding of and confidence in the partners should improve daily. This occurs only if credible and continuous investment is made in the partners and the relationships. At the tactical level, partners must be trained (on common equipment, maintenance and TTPs including insertion and extraction techniques), equipped, fully integrated, routinely showcased to host nation and coalition leaders and held accountable. Coalition understanding of host nation culture must improve daily; this is important in countless ways but particularly in reference to religion, diet, family, pass and leaves, medical treatment, handling of remains in accordance with religious customs, and respect. The application of the Golden Rule in the absence of particular knowledge, treat others as one would wish his or her parents or grandparents to be treated alleviates issues associated with cultural ignorance. Cultural Support Team-like entities were slow to evolve but once developed and incorporated alleviated concerns and complaints about a number of cultural sensitivities protecting or increasing freedom of action. The unanticipated benefits of the interaction of U.S. females with host nation females and adolescents were extensive but do not warrant elaboration in this forum. The CT force is composed of the United States most highly trained and best equipped servicemembers. Each is prepared to routinely risk his or her life to protect American citizens, allies and partners. Occasionally, the CT force may need to be reminded that servicemembers living in an irregular warfare environment likely fall into one of the above categories citizen, ally or partner and it is as honorable to protect other servicemembers as it is to protect non-servicemembers from hazards such as internal threats, enemy IED or indirect fire (IDF) networks, and enemy command and control. Conversely, the operative word in BSO is owner ; BSOs should own and control their battlespace and not rely on others the CT force to address routine threats in their battlespace. 7
15 The CT force F3EA targeting process is well known to many in the conventional force. F3EA has been written about in professional journals and discussed as a TTP in a number of Army professional schools. 36 The CT force has the most highly trained subject-matter experts in the world; they can be leveraged by the BSO for all aspects of the F3EA targeting process. Many targets do not require the CT force but are better executed with reduced risk to mission, force and population with CT force enablers (people or other assets). The CT force is more likely to pass targets and assets to those BSOs that are willing and able to execute targets than one might expect. The trust associated with passing targets and assets is cumulative and built over time. Engagement at LNO and commander levels will facilitate F3EA-type conversations that should include discussing CT force and BSO authorities for action. New technologies and additional resources, including enhanced communication, ISR, analytical tools and analysts, have enhanced the F3EA targeting process. 37 Information sharing within the military between the CT forces and the conventional forces has increased, and CT force and conventional force assets and capabilities are routinely brought to bear on the problem sets and targets facing one force or the other. In short, greater cooperation yields more effective battlefield results. The process consistently demonstrates that complementing operations are better than unilateral operations conducted by CT or conventional forces and it is up to all team members to seek (and provide) the greatest effects possible. 38 The F3EA targeting process puts a premium on exploitation and analysis. 39 The CT force has unparalleled means to exploit and analyze, but at times conditions may prevent the CT force from immediately securing and exploiting a target. The BSO may be offered CT force ISR, lift and fires assets, or conditions may be such that the CT force asks for BSO assets to secure a specific target in the BSO s area of operation. BSOs that are able and willing to secure and/or exploit CT force targets and possibly share assets will build trust and respect and will encourage future cooperation that is likely to pay dividends to both forces. In a COIN environment, trust between the BSO and host nation partners, between the CT force and the BSO, between the BSO and its chain of command, and between the CT force and its chain of command as well as the partners with whom they coordinate is put to the test when there is an issue that requires mitigation. BSOs know the personalities in their area of operations and many in their area of interest. BSOs generally develop relationships that can be leveraged to mitigate a wide array of issues that arise in complex COIN environments. When issues arise that require mitigation, the BSO must be willing to quickly take on the mitigating role even at high cost and the CT force must be fast, accurate and supportive when reporting to the BSO. Failing to fully disclose information at any juncture can fracture trust and relations across the network. BSOs will be more likely to assist the CT force that establishes relations prior to mitigation being required. Conclusion Although Iraq and Afghanistan are very different theaters, lessons shared between them opened doors for cooperative initiatives and organizational growth. Iraq was a nearly ideal operational environment with comparatively developed infrastructure, benign terrain, adequately enabled conventional forces, a more exploitable target set and a very different detention apparatus that housed a culturally different type of detainee. These factors led to a more effective 8
16 and efficient F3EA targeting process. Afghanistan is on the other end of the spectrum geographically larger, with extreme terrain, limited and underdeveloped infrastructure, weather challenges, sanctuary that is exploited, a larger fragmented population and target set, limited detention capacity and a lower density of U.S. troops. These differences make it particularly remarkable that the lessons of CT, interagency and conventional coordination could be shared across theaters. The combination of lessons from Iraq and more than ten years of operating in Afghanistan yields a more capable and efficient CT force moving into a new phase of U.S. military engagement irregular warfare. 40 The actions of a few insightful leaders may have served as a catalyst to focus strategic guidance on the need for better coordination, cooperation and complementary effects. These same leaders may have served as a catalyst to implement (and rewrite) joint doctrine as they matured CT force and interagency efforts from conflicting efforts, through deconflicted efforts, through coordinated efforts, to cooperative and on to complementary and integrated efforts. Getting to complementary and integrated efforts required culture changes within many organizations and agencies. Leaders and commanders with the vision to evolve and enhance their unprecedented battlefield effects set the tone for all to be better team members and in many cases team leaders, to trade arrogance for humility and to trade insular notions for inclusive actions, all of which resulted in a joint force of unmatched capability. The past decade s successes in balancing the necessity of protecting secrets with the need to enable sufficient transparency and share lessons have created more capable team members and partners and should serve as a standard to maintain and build upon. 41 As forces and agencies redeploy, budgets constrict and mission sets evolve, leadership across the network will be required to maintain and strengthen the networks of networks and enlighten or marginalize biased or corrosive personalities that threaten complementary and integrated effects and thus freedom of action. 9
17 Glossary of Acronyms AFSOC ANSF BSO COIN COMISAF CT CT TF F3EA FID FOA IDF IED IO ISAF ISR IW JOC JOC JSOC LNO MARSOC NAVSPECWARCOM SO SOF TTP USASOC USSOCOM UW Air Force Special Operations Command Afghan National Security Forces Battlespace Owner Counterinsurgency Commander, International Security Assistance Force Counterterrorism Counterterrorism Task Force Find, Fix, Finish, Exploit and Analyze Foreign Internal Defense Freedom of Action Indirect Fire Improvised Explosive Device Information Operations International Security Assistance Force Intelligence, Surveillance and Reconnaissance Irregular Warfare Joint Operations Center Joint Special Operations Command Liaison Officer Marine Corps Forces Special Operations Command Naval Special Warfare Command Stability Operations Special Operations Forces Tactics, Techniques and Procedures U.S. Army Special Operations Command United States Special Operations Command Unconventional Warfare 10
18 Endnotes 1 Admiral William McRaven, U.S. Navy, Commander, U.S. Special Operations Command, interview by author, 21 April d Ranger Battalion: Battle Tested, Combat Proven, linked from The 75th Ranger Regiment Go Army Home Page at Heritage, html (accessed 11 November 2011). 3 History: United States Special Operations Command, 31 March 2008, linked from the USSOCOM homepage at (accessed 11 November 2011). 4 Eric Schmitt and Thom Shanker, Counterstrike: The Untold Story of America s Secret Campaign Against Al Qaeda, (New York: Times Books, Henry Holt and Company, 2011), pp. 83, About SOCOM: United States Special Operations Command, linked from the USSOCM homepage at (accessed 2 February 2012). 6 Ibid. 7 U.S. Joint Chiefs of Staff, Joint Publication 3-26, Counterterrorism (Washington, DC: U.S. Joint Chiefs of Staff, 13 November 2009), p. xvi, 8 Michael G. Mullen, Irregular Warfare: Countering Irregular Threats Joint Operating Concept Version 2.0 (Washington: DC: The Pentagon, 17 May 2010), pp Barack H. Obama, National Security Strategy (Washington, DC: The White House, May 2010), p. 14; Barack H. Obama, National Security Strategy for Counterterrorism (Washington, DC: The White House, June 2011), pp. 2, Robert M. Gates, National Defense Strategy (Washington, DC: The Pentagon, June 2008), p Ibid., p Obama, National Security Strategy, p. 14; Obama, National Security Strategy for Counterterrorism, pp. 2, Gates, National Defense Strategy, pp. 1, 8, 15, 17; Obama, National Security Strategy for Counterterrorism, pp. 2, Stanley A. McChrystal, It Takes a Network, Foreign Policy, March/April 2011, foreignpolicy.com/articles/2011/02/22/it_takes_a_network?print=yes&hidecomments=yes& page=full (accessed 12 November 2011). 15 Ibid. 16 Ibid. 17 Schmitt and Shanker, Counterstrike, pp. 91 2, Steve Bowman and Catherine Dale, War in Afghanistan: Strategy, Military Operations and Issues for Congress, Congressional Research Service, 3 December 2009, p. 8, crs/row/r40156.pdf (accessed 12 November 2011). Military victory, including the demise of the Taliban regime, came quickly. In November 2001, the Taliban fled Kabul, and in December they left their stronghold, the southern city of Kandahar. It is generally understood that in December 2001, key al Qaeda and Taliban leaders fled across the border into Pakistan. 19 McChrystal, It Takes a Network. 11
19 20 Anthony H. Cordesman, Victory and Violence in Iraq: Reducing the Irreducible Minimum, Center for Strategic and International Studies, irreducible.minimum.final.pdf (accessed 12 November 2011). More quietly, the [United States] was able to combine major improvements in its intelligence, surveillance and reconnaissance capabilities with greatly improved Iraqi human intelligence. It was able to target much of the [al Qaeda in Iraq] network and key Shi ite extremists, and use precision air strikes, carefully planned raids and air mobility to be far more effective in decapitating the leaders of the insurgency. 21 Schmitt and Shanker, Counterstrike, pp Thom Shanker, Admiral Defends Use of Elite Unit in Calamitous Raid, New York Times Online 30 August 2011, linked from the New York Times Home Page at World/Asia Pacific at nytimes.com/2011/08/31/world/asia/31commander.html (accessed 12 November 2011). Admiral McRaven dismissed assertions that the most highly trained Navy and Army commando teams should be reserved solely for the most high-profile missions; he said they were regularly assigned to support commanders of units in a local area of combat if that contributed to the overall mission. We have to be fungible as a force, Admiral McRaven said. And if we are not fungible as a force, then we are not of value. It is not unusual at all for SEALs or Rangers or Army Special Operations forces to be part of a quick-reaction force, as in this case. 23 McChrystal, It Takes a Network. 24 Schmitt and Shanker, Counterstrike, p Ibid. 26 Schmitt and Shanker, Counterstrike, p McChrystal, It Takes a Network. 28 Stanley A. McChrystal and Tom Brokaw, HBO History Makers Series with Stanley McChrystal (Transcript), Council on Foreign Relations homepage, 6 October 2011, afghanistan/hbo-history-makers-series-stanley-mcchrystal/p26157 (accessed 12 November 2011). You know, there s a dichotomy that s drawn sometimes between COIN and counterterrorist operations. And I think it s absolutely a false one, at least it s false in the way people do it. If I say counterterrorist operations to most people, they think that s direct action. That s either a kinetic strike or a raid by a force. And if we talk about counterinsurgency, we tend to think of hearts and minds. In fact, direct action is part of counterinsurgency, just as reducing the causes is part of counterterrorism. So I ll talk about direct action as opposed to CT.... Dave Petraeus says it better than I ever will. You re never going to kill your way to victory or capture. What you are going to do is help reduce the enemy threat while you reduce the causes of the problem. Even terrorism is that way. 29 Interview with confidential source, 27 September 2011; CT force commanders/leaders will not be identified in unclassified publications. 30 Ibid. 31 Interview with confidential source, 28 September 2011; CT force commanders will not be identified in unclassified publications. 32 Austin Long, Partners or Proxies? U.S. Host Nation Cooperation in Counterterrorism Operations, CTC Sentinel Online, vol. 4, issue 11-2, November 2011, p. 13, (accessed 23 February 2012). 33 U.S. Army Special Operations Command John F. Kennedy Special Warfare Center and School, About the Cultural Support Program, (accessed 17 February 2012). 12
20 34 McChrystal, It Takes a Network. 35 Mullen, Irregular Warfare, p Michael T. Flynn, Rich Juergens and Thomas L. Cantrell, Employing ISR: SOF Best Practices, Joint Forces Quarterly Online, issue 50, 3rd quarter 2008, p. 57, GetTRDoc?AD=ADA (accessed 20 January 2012). 37 Ibid. 38 Ibid. 39 Ibid. 40 McChrystal, It Takes a Network : From its birth in Iraq, both the actual network and the hard-earned appreciation for that organizational model increasingly expanded to Afghanistan, especially as our nation s focus turned toward that theater ; William H. McRaven, Future of U.S. Special Operations Forces: Ten Years After 9/11 and Twenty-Five Years After Goldwater Nichols, Congressional Record, 22 September 2011, p. 4, index.cfm/files/serve?file_id=2d29a1f6-b1f2-4ee1-808f-d51a8322bafc: First, we will continue to lead and deliver the nation s premier CT fighting force. Simultaneously we must also provide, with service enablers, the preponderance of forces for sustained counterinsurgency and stability operations globally. This combined mission is currently seen in the simultaneous SOF leadership and tacit execution of the CT and Village Stability Operations in Afghanistan. As a result of these unique enduring SOF requirements, the projected conventional force drawdown in Afghanistan through 2014 is increasingly dependent upon significant SOF presence. Conventional force reductions will not equate to comparable reductions in SOF. But, when fully integrated within a comprehensive whole-of-government approach, the breadth of capability displayed in this current campaign provides the clearest evidence of SOF s inherent flexibility, agility, and value in addressing irregular missions. One of the explicit lessons of the last decade of conflict is the absolute necessity to share information, plan and operate in concert with our interagency and foreign partners. Born of our extensive presence and cultivated relationships, SOF has uniquely embraced this approach. 41 McRaven, Future of U.S. Special Operations Forces. 13
21 14
Welcome to the Introduction to Special Operations Forces lesson on Joint command and control and Special Operations Command relationships.
Welcome to the Introduction to Special Operations Forces lesson on Joint command and control and Special Operations Command relationships. In this lesson we will define the different levels of joint command
ARSOF Conventional Army Integration: An Army perspective on integration and synergies in the current and future environment
ARSOF Conventional Army Integration: An Army perspective on integration and synergies in the current and future environment -LTG John F. Mulholland Commanding General, United States Army Special Operations
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
THE ARMY S APPROACH TO LEADER DEVELOPMENT
ON FSI/FS TRAINING THE ARMY S APPROACH TO LEADER DEVELOPMENT A LOOK AT HOW THE ARMY S PROFESSIONAL EDUCATION SYSTEM DEVELOPS LEADERSHIP SKILLS OFFERS POSSIBLE LESSONS FOR THE FOREIGN SERVICE. BY JEFFREY
AUSA HOT TOPICS. Army Networks and Cyber Security in Force 2025 FINAL AGENDA 12 JUNE 2014. Crystal Gateway Marriott Arlington, Virginia
AUSA HOT TOPICS Army Networks and Cyber Security in Force 2025 12 JUNE 2014 Crystal Gateway Marriott Arlington, Virginia FINAL AGENDA The Association of the Institute of Land Warfare Hot Topic A Professional
U.S. Special Operations Forces (SOF): Background and Issues for Congress
U.S. Special Operations Forces (SOF): Background and Issues for Congress Andrew Feickert Specialist in Military Ground Forces May 8, 2014 Congressional Research Service 7-5700 www.crs.gov RS21048 Summary
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY. " 166c. Geographic combatant commander's authority to transfer excess defense articles
SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY GEOGRAPHIC COMBATANT COMMANDERS. 1 7 8 9 10 11 1 1 1 1 1 17 18 19 0 1 (a) IN GENERAL. Chapter of title 10, United States Code, is amended by inserting
LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW
TASK DESCRIPTION: LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW Learn the differences between planning for a campaign in war and planning
Designing Law Enforcement: Adaptive Strategies for the Complex Environment
Designing Law Enforcement: Adaptive Strategies for the Complex Environment John A. Bertetto, Police Officer, Chicago Police Department Crime Control Strategies As law enforcement professionals, we often
ON OBAMA S WARS IN AFGHANISTAN AND PAKISTAN. by Tom Hayden February 6, 2009
ON OBAMA S WARS IN AFGHANISTAN AND PAKISTAN by Tom Hayden February 6, 2009 It is time to rethink Afghanistan and Pakistan. Otherwise the new Obama administration will be led into a yawning quagmire. It
The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
U.S. Special Operations Forces (SOF): Background and Issues for Congress
U.S. Special Operations Forces (SOF): Background and Issues for Congress Andrew Feickert Specialist in Military Ground Forces November 19, 2014 Congressional Research Service 7-5700 www.crs.gov RS21048
In June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT
Defense Intelligence Analysis Center, home of JMIC. Intelligence Education for Joint Warfighting Courtesy Joint Military Intelligence College By A. DENIS CLIFT In June 1998 the Joint Military Intelligence
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY
A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job
REPORT DOCUMENTATION PAGE
USAWC CIVILIAN RESEARCH PROJECT Institutionalizing Interdependence: U.S. Army Special Operations Forces / Conventional Forces No Turning Back by Lieutenant Colonel (Promotable) Mitchell D. Franks United
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
Comparison of the STEEPLE Strategy Methodology and the Department of Defense s PMESII-PT Methodology. Joseph Walden. Supply Chain Leadership Institute
Joe Walden, 2011 Comparison of the STEEPLE Strategy Methodology and the Department of Defense s PMESII-PT Methodology Joseph Walden Supply Chain Leadership Institute i Joe Walden, 2011 Abbreviations PMESII-PT:
Army Doctrine Update
Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
While interagency education and training have long been staples of the intelligence and
Navigating Interagency Education and Training Courses by John Dyson While interagency education and training have long been staples of the intelligence and law enforcement communities, such efforts are
This is a Testimony On National Security and Defense
This is a Testimony On National Security and Defense 20 Years Later: Professional Military Education Published on May 20, 2009 by James Carafano, Ph.D. Testimony before the Sub-Committee on Oversight and
A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces
STATEMENT OF GENERAL JAMES L. JONES, USMC COMMANDER, UNITED STATES EUROPEAN COMMAND BEFORE THE HOUSE ARMED SERVICES COMMITTEE ON APRIL 7, 2006 A Commander s Perspective on Building the Capacity of Foreign
U.S. Special Operations Forces (SOF): Background and Issues for Congress
U.S. Special Operations Forces (SOF): Background and Issues for Congress Andrew Feickert Specialist in Military Ground Forces April 9, 2015 Congressional Research Service 7-5700 www.crs.gov RS21048 Summary
Joint Publication 3-0. Doctrine for Joint Operations
Joint Publication 3-0 Doctrine for Joint Operations 10 September 2001 This revised edition of JP 3-0, Doctrine for Joint Operations, represents the latest in a series of updates to joint doctrine. It reflects
Director of Intelligence Proposed Research Topics
Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis
This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html).
This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). *FM 3-13 Field Manual No. 3-13 Headquarters Department of the Army Washington, DC, 25 January
Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code
Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career
Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career Chad Storlie Author, Iraq Combat Veteran, Business Leader www.combattocorporate.com
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
David J. Berteau Senior Vice President and Director of International Security Program, Center for Strategic & International Studies
David J. Berteau Senior Vice President and Director of International Security Program, Center for Strategic & International Studies David J. Berteau is senior vice president and director of the CSIS International
Information Management for National Guard Agribusiness Development Teams: An Agile Development Case Study
Information Management for National Guard Agribusiness Development Teams: An Agile Development Case Study Authors: Lynndee Kemmet, Network Science Center at West Point; Ray McGowan, Army CERDEC; C. Reed
OPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT
UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 OPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT Basic Officer Course (ORM) Introduction Importance
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
INTERVIEW WITH ANDERS FOGH RASMUSSEN *
INTERVIEW WITH ANDERS FOGH RASMUSSEN * In this exclusive interview with TPQ, the Honorable Secretary General provides an overview of the major developments of the past two years in Turkey s neighborhood,
Army Foundry Intelligence Training Program
Army Regulation 350 32 Training Army Foundry Intelligence Training Program Headquarters Department of the Army Washington, DC 2 June 2015 UNCLASSIFIED SUMMARY of CHANGE AR 350 32 Army Foundry Intelligence
Management of Marine Corps Enlisted Personnel Assignments in Support of Operation Iraqi Freedom (D-2004-086)
June 16, 2004 Human Capital Management of Marine Corps Enlisted Personnel Assignments in Support of Operation Iraqi Freedom (D-2004-086) Department of Defense Office of the Inspector General Quality Integrity
How To Build A More Agile Total Naval Force
DEPARTMENT of the NAVY HUMAN BUILDING AND MANAGING CAPITAL THE TOTAL NAVAL FORCE STRATEGY 2 0 0 7 Moving forward to execute a comprehensive strategy to enhance combat effectiveness in the 21st Century,
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
FACT SHEET. General Information about the Defense Contract Management Agency
FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory
Information Technology
September 11, 2002 Information Technology The Defense Advanced Research Projects Agency s Transition of Advanced Information Technology Programs (D-2002-146) Department of Defense Office of the Inspector
National Security Agency
National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Summary 1. Module scope and objectives 2. Terms, definitions and abbreviations 3. Introduction 4. The military component
4.40 UN Military Roles and Responsibilities Contents Summary... 1 1. Module scope and objectives... 1 2. Terms, definitions and abbreviations... 2 3. Introduction... 2 4. The military component... 2 4.1.
AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013
AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This
We have come a long way since the Goldwater-Nichols Act became law more than 2j years ago, we can go further. We will.
We have come a long way since the Goldwater-Nichols Act became law more than 2j years ago, we can go further. We will. Introduction: Why we must renew our commitment to the Profession of Arms 1. Values
JOINT STATEMENT COMMISSION ON WARTIME CONTRACTING
JOINT STATEMENT COMMISSION ON WARTIME CONTRACTING TOTAL FORCE POLICY, THE QDR, AND OTHER DEFENSE OPERATIONAL PLANNING: WHY DOES PLANNING FOR CONTRACTORS CONTINUE TO LAG? JULY 12, 2010 Chairman Thibault,
INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE
INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE Prepared for an international conference on Countering Modern Terrorism History, Current Issues, and Future Threats 16-17 December 2004 Berlin Under
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
U.S. Forces in Iraq. JoAnne O Bryant and Michael Waterhouse Information Research Specialists Knowledge Services Group
Order Code RS22449 Updated April 7, 28 U.S. Forces in Iraq JoAnne O Bryant and Michael Waterhouse Information Research Specialists Knowledge Services Group Summary Varying media estimates of military forces
WEAPON SYSTEM ACQUISITIONS. Opportunities Exist to Improve the Department of Defense s Portfolio Management
United States Government Accountability Office Report to Congressional Committees August 2015 WEAPON SYSTEM ACQUISITIONS Opportunities Exist to Improve the Department of Defense s Portfolio Management
George J. Woods Vitae CURRICULUM VITAE
CURRICULUM VITAE PERSONAL INFORMATION Name: Current Position: George J. Woods, III Associate Professor, Strategic Leadership United States Army War College 122 Forbes Avenue, Room B314 (717) 245-4741 [email protected]
Theme: The Growing Role of Private Security Companies in Protecting the Homeland.
Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist
Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
ADP 3-0 UNIFIED LAND OPERATIONS OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army
Overview THE COLLEGE OF INTERNATIONAL SECURITY AFFAIRS. South and. Security Studies Program: Overview for the Board of Visitors
THE COLLEGE OF INTERNATIONAL SECURITY AFFAIRS South and Central Curriculum Asia Overview Security Studies Program: Overview for the Board of Visitors NATIONAL DEFENSE UNIVERSITY 21 May 2013 Dr. Michael
January 2010. Navy s Total Force Vision for the 21st Century
January 2010 Navy s Total Force Vision for the 21st Century I am comm mmitted to ensur urin g th at we, as a Navy, ar e goin g to be one of the bes t places for a young person to sta tart their career.
Drone Warfare: effective or counter-productive?
Drone Warfare: effective or counter-productive? Stefan Wolff, University of Birmingham While there can be no doubt that the national and international legal regulation of the deployment of Unmanned Aerial
OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
The role of special operations in the combating terrorism
AARMS Vol. 7, No. 1 (2008) 47 53 SECURITY The role of special operations in the combating terrorism CSABA KOVÁCS Miklós Zrínyi National Defence University, Budapest, Hungary The Special Operations Forces
Option 1: Use the Might of the U.S. Military to End the Assad Regime
1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger
MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION
MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION WHAT IS MSS The interdisciplinary Military Strategic Studies program is concerned with understanding, analyzing and explaining the military dimension
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
The State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E [email protected] 1 Agenda What We ve Done Biometrics
United States Army. Criminal Investigation Command. Keeping Our Army Safe CID Seeking Special Agents
United States Army Criminal Investigation Command Media contact: CID Public Affairs Office FOR IMMEDIATE RELEASE 571-305-4041 Keeping Our Army Safe CID Seeking Special Agents By Colby Hauser CID Public
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
THE U.S. COST OF THE AFGHAN WAR: FY2002-FY2013
- THE U.S. COST OF THE AFGHAN WAR: FY2002-FY2013 COST IN MILITARY OPERATING EXPENDITURES AND AID AND PROSPECTS FOR TRANSITION Anthony H. Cordesman Arleigh A. Burke Chair in Strategy May 14, 2012 To comment,
Espionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
US Casualties: The Trends in Iraq and Afghanistan
18 K Street, NW Suite 4 Washington, DC 26 Phone: 1.22.775.327 Fax: 1.22.775.3199 Web: www.csis.org/burke/reports US Casualties: The Trends in Iraq and Afghanistan Anthony H. Cordesman Arleigh A. Burke
Re: Reported Increase in Civilian Casualties Resulting from U.S Operations in Afghanistan
April 19, 2016 General John W. Nicholson Commander, Operation Resolute Support 7115 South Boundary Boulevard MacDill AFB, FL 33621-5101 Re: Reported Increase in Civilian Casualties Resulting from U.S Operations
GAO MILITARY EDUCATION. Improved Oversight and Management Needed for DOD s Fellowship and Training-with-Industry Programs
GAO United States Government Accountability Office Report to Congressional Committees April 2012 MILITARY EDUCATION Improved Oversight and Management Needed for DOD s Fellowship and Training-with-Industry
ADRP20 AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY
ADRP20 I NTELLI GENCE AUGUST201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at Army
Dr. Jeffrey D. McCausland, Founder and CEO, Diamond6 Leadership and Strategy, LLC
Dr. Jeffrey D. McCausland, Founder and CEO, Diamond6 Leadership and Strategy, LLC Dr. Jeff McCausland is the Founder and CEO of Diamond6 Leadership and Strategy, LLC. Since 2004 Diamond6 has conducted
SIGAR. Gereshk Cold and Dry Storage Facility: Quality of Construction Appears To Be Good, but the Facility Has Not Been Used to Date J U L Y
SIGAR Special Inspector General for Afghanistan Reconstruction SIGAR 14-82 Inspection Report Gereshk Cold and Dry Storage Facility: Quality of Construction Appears To Be Good, but the Facility Has Not
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
AFGHANISTAN: FRANCE IS ALSO IN THE SOUTH
FRENCH EMBASSY IN CANADA? Ottawa, June 2008 AFGHANISTAN: FRANCE IS ALSO IN THE SOUTH "France will maintain its forces in Afghanistan. Our country wishes to adapt the role of its forces to make them more
How to Identify Military Veterans and Service Members
How to Identify Military Veterans and Service Members John D. Baker Attorney at Law Baker Williams, LLP Fighting for Those Who Fought for Us 2097 County Road D East Suite C-200 Maplewood, MN 55109 Phone:
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
DAVID S. MAXWELL. He and his wife, Kim, and their daughter, Elizabeth, reside in northern Virginia.
DAVID S. MAXWELL David S. Maxwell is the Associate Director of the Center for Security Studies and the Security Studies Program in the School of Foreign Service at Georgetown University. He is a 30 year
FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE
FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist
For More Information
CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING
AUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
Joint Publication 3-05. Special Operations
Joint Publication 3-05 Special Operations 16 July 2014 PREFACE 1. Scope This publication provides overarching doctrine for special operations and the employment and support for special operations forces
SUBJECT: Army Information Technology Service Management (ITSM) Policy
DEPARTMENT OF THE ARMY OFFICE OF THE SECRETARY OF THE ARMY 107 ARMY PENTAGON WASHINGTON DC 20310-0107 Office, Chief Information Officer/G-6 SAIS-PR MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Information
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1215.17 January 29, 2014 USD(P&R) SUBJECT: Educational Requirements for Appointment to a Grade Above First Lieutenant or Lieutenant (Junior Grade) in a Reserve
