FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
3-24
69
Insurgency Prerequisites and Fundamentals networked organization embedded in a sympathetic population. Differentiating between insurgents, insurgent supporters, neutrals, and the host-nation government supporters is difficult. 4-92. Insurgencies can be viewed from an overall organizational perspective to the perspective of an individual. Networked insurgencies often have a great degree of internal complexity and this makes understanding networked insurgencies difficult. The relationship between two individuals or two groups in an insurgency may be hierarchal, based on a mutual peer to peer understanding, or a cultural understanding based upon social norms. Understanding the relationship between groups and individuals within groups is essential to understanding how an insurgency works and is a part of the overall intelligence preparation of the area of operations and understanding mission variables. This understanding starts with an individual level analysis. 4-93. Individual-level analysis characterizes members within an organization, identifies its key members, describes the types of connections between members, and makes assumptions about unknown members. Commanders and staffs can describe individuals based on their network position in relation to the network position of other individuals in the network. A networked insurgency consists of individuals and connections between them. Commanders and staffs can think of the individuals in an insurgency as actors or nodes. The connections between nodes are called links. This connection between two people is called a dyad. Understanding the various types of dyads is essential in understanding the nature of an insurgency. Person A could be connected to Person B through a number a various types of connections and each type of relationship represents an important type of dyad. (See figure 4-4 for examples of some of types of dyads.) Figure 4-4. Examples of dyads 4-94. Individual connections and new connections matter to an insurgency. For example, a marriage between a combatant and a member of the auxiliary opens new paths in a networked insurgency. Moreover, the success or lack of success of the couple will now be important. In other words, in this example, both individuals will be vested in one another, and other insurgents’ perceptions of them will be tied together. The nature of the bonds between individuals and decisions on who to create new relationships with have a future impact on both the insurgency and the individuals in the dyad. 4-95. Commanders and staffs must understand the role individuals play in a networked insurgency. One node or a very few central nodes dominate a very centralized network. If these nodes are removed or damaged, the network may quickly fragment into unconnected subnetworks. Hubs are nodes with high
3-24
70
Chapter 4 degrees of centrality. A network centralized around a well-connected hub can fail abruptly if that hub is disabled or removed. A less centralized network has no single points of failure, and it has multiple connections between all members. It is resilient even if some nodes are removed. Many nodes or links can fail while still allowing the remaining nodes to reach each other over other network paths. 4-96. Commanders and staffs can also understand how an individual fits into a network by looking at that individual’s degree centrality and betweenness centrality. Degree centrality describes how active an individual is in the network. Network activity for a node is measured using the concept of degrees—the number of direct connections a node has. Nodes with the most direct connections are the most active in their networks. Commanders and staffs determine where those connections lead and how they connect the otherwise unconnected. If a node has many ties, it is either prominent or influential. Betweenness centrality indicates the extent to which an individual lies between other individuals in the network, serving as an intermediary, liaison, or bridge. A node with high betweenness centrality has great influence over what flows in the network. Depending on position, a person with high betweenness plays a broker role in the network. 4-97. Nodes on the periphery often receive very low centrality scores. However, peripheral nodes are often connected to networks that are not currently mapped. The outer nodes may be resource gatherers or individuals with their own network outside their insurgent group. These characteristics make them very important resources for fresh information that is not available inside their insurgent group. 4-98. However, understanding a networked insurgency requires more than simply understanding relationships between individuals. Commanders and staffs must understand an insurgency at the organizational level. Organizational-level analysis provides insight about the insurgent organization’s form, efficiency, and cohesion. Commanders and staffs must understand a networked insurgency’s overall organization to understand the nature of the threat. An insurgency may consist of large numbers of subinsurgencies. As a result, each group will have a range of capacities as compared to the other groups. Commanders and staffs can describe organizational capacities using the concept of network density. 4-99. Network density is a general indicator of how connected people are in a network. Network density is the proportion of links in a network relative to the total number of links possible. Network density within an insurgency indicates which groups are most capable of conducting a coordinated attack or other type of coordination. (See figure 4-5.)
3-24
71
Insurgency Prerequisites and Fundamentals Figure 4-5. Examples of dyad networks 4-100. Changes in network density can also show changes in an insurgency’s capabilities over time. A decrease in network density means the group is reduced and becoming fragmented. This can be in response to actions taken by counterinsurgents. 4-101. Most network measures, including network density, can be mapped out to evaluate performance over time. Based on changes in network density over time, a commander can— * Monitor enemy capabilities. * Monitor the effects of recent operations. * Develop tactics to further fragment the insurgency. 4-102. Changes in network density can also show changes in the capabilities of an insurgency over time. An increase in network density indicates an increased likelihood that the insurgent group can conduct coordinated attacks. A decrease in network density means the group is reduced and becoming fragmented. This can be in response to actions taken by counterinsurgents. An effective counterinsurgency may eventually face only low-network-density subgroups. This is because high network-density subgroups require only the capture of one or a few highly connected insurgents to degrade the network. So while high-network-density groups are the most dangerous, they are also the easiest to disrupt. (See figure 4-6 on page 4-22 for an example of the possible evolution of a networked insurgency.)
3-24
72
Chapter 4 Figure 4-6. Example of changes to tactics based on density shift 4-103. Individuals within a network can also shape an insurgency. If one individual or a small group of individuals have relationships essential to maintaining an insurgency, counterinsurgents must understand those relationships. One node or a very few central nodes could dominate a highly centralized network. These nodes are called hubs and can be essential for an insurgency. A less centralized network may have no single point of failure. OTHER ANALYTICAL FRAMEWORKS 4-104. The district stability framework assists planners in identifying and mitigating sources of instability. Because of the uniqueness of the stability environment in each district within an area of operations, the district stability framework was designed to identify and mitigate sources of instability. This framework works as a planning assessment tool and nests into the military decisionmaking process. There are three steps to the district stability framework: analysis, design, and monitoring and assessment. (See ADRP 3-07 for more details on the district stability framework.) 4-105. The interagency conflict assessment framework is another framework used to understand conflict. The purpose of the interagency conflict assessment framework is to develop a commonly held understanding, across relevant U.S. government departments and agencies, of the dynamics driving and mitigating violent conflict within a country. This common understanding informs U.S. policy and planning decisions. It may also include steps to establish a strategic baseline against which U.S. government engagement can be evaluated. It is a both a process and a tool available for use by any U.S. government agency to supplement interagency planning. (For more information on interagency conflict assessment framework, see the U.S. government publication Interagency Conflict Assessment Framework.)
3-24
73
Chapter 5 Insurgency Threat Characteristics 5-1. Threat characteristics involve the composition, disposition, activities, and tactics of an insurgency. The composition of an insurgency is covered under the eighth dynamic, organizational and operational patterns. Tactics for an insurgency include political activities, criminal actions, and military tactics. Counterinsurgents consider how these threat characteristics create strengths and weaknesses for an insurgency. DISPOSITION AND ACTIVITIES 5-2. The disposition is the geographic location of insurgent elements and the way they are deployed, employed, or located. The dispositions of an insurgency are partially determined by an operational environment and the operational variables. For example, if an insurgency has connections to a black market, some of its dispositions will normally be to protect that market. Terrain will also affect the dispositions of an insurgency. Commanders and staffs must understand an operational environment to understand an insurgency’s dispositions. (See chapter 2 for more information on an operational environment.) 5-3. Insurgents who rely solely on violence to achieve their political goals are probably ineffective. Instead, effective insurgents conduct a wide range of activities to achieve their goals. Many of these activities are not enemy or terrain oriented, but political. Insurgents use a range of activities supporting both military and political actions. Insurgent actions can include: * Political activities. * Population control. * Military tactics (including terrorist actions and conventional tactics). * Support activities. POLITICAL ACTIVITIES 5-4. Insurgents may use political activities to achieve their goals and enhance their cause’s legitimacy. An insurgency’s actions can come from inside the government’s political system or can be used to communicate a message to the population. Political actions that happen within a government normally happen in a democracy or a semidemocracy. In these systems, an insurgency and related political parties can have some political power through elections. This gives groups the ability to launch official investigations and a platform to question government actions. This was a technique used by the Irish Republican Army and Sinn Fein. 5-5. Insurgent political actions within the government are limited to an autocratic regime, unless those actions are secretive. An authoritarian regime can have members that are either sympathetic to or actual members of an insurgency. However, those individuals must remain clandestine if they are to remain inside the government. In these cases, insurgencies can use these individuals for intelligence and to influence some governmental decisions. 5-6. The use of political activities to influence a society is another political activity of an insurgency. Demonstrations, propaganda, strikes, and civil disobedience can be effective means to undermine the legitimacy of a government and to disrupt a host nation. These actions show the level of support for the insurgency and transmit the insurgents’ message to the rest of society. 5-7. Propaganda is one of the most important political tools an insurgency has. Propaganda provides the means for the insurgency to communicate a message, often political, to the population. It allows the
3-24
74
Chapter 5 insurgency to create a narrative of why the government’s actions are not legitimate, and how the insurgency can eliminate the root causes of the conflict. 5-8. In areas of a country where an insurgency is in control, the insurgency can perform governmental functions. These functions replace the functions of the host-nation government. When an insurgency provides effective governance of a region or community, it can build local legitimacy. 5-9. At the national level, an insurgency can promote a shadow government. A shadow government offers a known, tangible alternative to the present government to the population. This can be effective as a propaganda technique, and a shadow government can be useful in creating a successful transition for an insurgency. As propaganda, a shadow government allows an insurgency to identify and inform a population of a known alternative to the current government. In practice, a shadow government allows a governmental structure to quickly form in insurgent controlled areas. If an insurgency is successful, this allows for a transition to a coherent national government. POPULATION CONTROL 5-10. One of the primary goals of a local insurgency is population control. Once the government is displaced from an area, an insurgency can act as the functioning government. With the use of force to enforce local rules and norms, an insurgency can become a functioning instrument to control the population. In such cases, it has displaced the government, at least locally. This control can be used to gain legitimacy among the population. When an insurgency both controls a local population and is seen as legitimate by the local population, it becomes more difficult to displace. The host nation must not only regain control of the area, but maintain control when the population may not view the host nation as a legitimate authority. MILITARY TACTICS 5-11. Insurgents use violence to create a wide range of effects. For example, in the early phases of an insurgency, insurgents plan attacks to achieve the greatest political and informational impact while not becoming decisively engaged. During the war of movement, insurgents may try to destroy a host nation’s security forces or its communication channels. Commanders need to understand the wide variety of insurgent tactics. Insurgents may use both terrorist acts and conventional military tactics. Terrorist Acts 5-12. Terrorist acts are meant to undermine the legitimacy of the government by demonstrating both the inability of the government to protect the population and the strength of the insurgency. The perpetrator of a terrorist act seeks to use the terror that the act produces among the population and the government to gain some political objective. Insurgents generally select targets based on their strategic, operational, and tactical importance and propaganda value. A terrorist attack will generally employ some deception and use techniques outside of accepted norms. 5-13. The possibility of an insurgent group gaining access to weapons of mass destruction changes the strategic effect of terrorist actions. If an insurgency gains a nuclear capability, which is an increased possibility in an interconnected world, the threat of using a nuclear weapon would provide that insurgency leverage for political negotiations. The actual use of a nuclear weapon would have regional and global effects. The use of biological and chemical weapons would also have a strategic effect, but to a lesser degree than nuclear weapons. An insurgent’s use of weapons of mass destruction would transform the nature of a conflict. Conventional Tactics 5-14. Insurgents use a wide range of tactics to attack counterinsurgents. The tactics insurgents use will be based on their capabilities. During a war of movement, insurgents may try to destroy host-nation government forces. However, this may expose insurgents if an attempt to destroy a host nation’s security force is taken too early. Insurgents must correctly judge their capabilities versus the host nation’s
3-24
75
Insurgency Threat Characteristics capabilities. When the host nation has an advantage in capability, insurgents will probably use small-unit tactics in order to not become decisively engaged. 5-15. Insurgents may use a wide range of conventional tactics. Insurgents often employ ambushes for harassment and disruption. Snipers or sharpshooters may be an effective means of engaging government forces without becoming decisively engaged. Insurgents may use indirect fire, such as mortar and rocket attacks, to harass counterinsurgents or cause them to commit forces that can then be attacked by other means. Weapons and munitions are frequently modified to best suit insurgent needs for a specific target or mission. For example, insurgents may use direct fire rockets or missiles in an indirect manner to avoid detection. Moreover, insurgents may have to improvise because they lack weapons. 5-16. Improvised explosive devices are effective tools that can be integrated into many different types of attacks. Improvised explosive devices can be inexpensive to produce and, because of the various detonation techniques available, may avoid risks to the perpetrator. Also, insurgents may use suicide bombing as an employment method, and it can be very effective. 5-17. Insurgents may use cyber electromagnetic attacks. Cyber electromagnetic capabilities can give an insurgency the ability to affect systems both within and outside the host nation. For example, a cyber electromagnetic attack could undermine the financial system within a state. This may be an effective way to undermine the legitimacy of a host nation. However, a cyber electromagnetic attack could also affect any state or region. For example, cyber electromagnetic capabilities provide an insurgent the ability to attack a country that supports the host nation. If an insurgency attains cyber electromagnetic capabilities, the nature of the conflict changes. SUPPORT ACTIVITIES 5-18. Although noticeable, violence may be only a small part of overall insurgent activity. Insurgent support activities include training, logistics, and communications. These support activities sustain insurgencies and allow for both military and political actions. They are enabled by an insurgency’s ability to generate popular support. Insurgent support networks may be large, even when violence levels are low. These networks can include support from other nations or from population groups outside the country. The effectiveness of insurgent operations depends heavily on logistics. 5-19. In some parts of the world, a lack of access to weapons may forestall insurgencies. However, there is widespread availability of weapons in many areas, with especially large surpluses in the most violent regions of the world. Explosive hazards, such as mines and improvised explosive devices, are likely to be common weapons in insurgencies. Insurgents can obtain weapons through legal or illegal purchases or from foreign sources. A common tactic is to capture them from government forces. Counterinsurgency forces should seek to cut off the flow of arms into an area of operations and eliminate their sources. 5-20. Income is essential, not only for insurgents to purchase weapons, but to pay recruits and bribe officials. Money and supplies can be obtained through many sources. Foreign support is one possible source of income. Local supporters or international front organizations may provide financial support. Sometimes legitimate businesses are established to furnish funding. In areas controlled by insurgents, confiscation or taxation may be used. Another common source of funding is criminal activity. 5-21. Funding greatly influences an insurgency’s character and vulnerabilities. The insurgents’ approach determines the movement’s requirements. Protracted popular war strategies that emphasize mobilization of the masses require considerable resources to build and maintain a counter state. In comparison, the military-focused approach—which emphasizes armed action—needs only the resources to sustain a military campaign. Counter threat finance is an important means to interdict an insurgency’s funding. (See ATP 3-07.20/MCRP 3-33 for more information.) TRAINING AND INDOCTRINATION 5-22. The quality and quantity of training depends on how advanced the insurgency is and what its specific strategy is. Indoctrination is a part of training which seeks to maintain allegiance and to focus cells to conduct continuous operations without frequent communications and direction from insurgent leadership. The level of indoctrination can help analysts identify the strategy and sophistication of the insurgency and
3-24
76
Chapter 5 includes more than just the overall objective of the insurgency. Subordinate leaders within an insurgency are indoctrinated because they must execute the senior leadership’s intent and vision as well as guide operations until redirected. With better indoctrination of intent and vision, insurgents may be more effective in decentralized operations and being self sufficient. 5-23. Training also includes individual and collective training, depending on the role of the insurgent and the specific skills of the insurgent (such as sniper, information operations, human intelligence, raid or ambush, communications, logistics and caches, or bomb maker). More advanced training may include how insurgents conduct themselves if captured, including resistance to interrogation and operations within detention facilities (recruiting, clandestine communications, and maintaining control of other insurgents). Other states may play an essential role in training an insurgency. Training can occur at sites in the supporting country or covertly within the host nation. Many states maintain the ability to conduct unconventional warfare. (See FM 3-05 for more information on unconventional warfare.) COMMUNICATIONS 5-24. Communications in an insurgency cannot depend on open and traditional means. Ensuring an effective network of communications is an essential support activity of an insurgency. Insurgents can compensate for the lack of regular and reliable communications in numerous ways, including masking their communications in radio, television, or Internet messages. They may also pass information in cameras, high frequency, short-wave, and amateur (ham radio) sets, cellular phones, the mail, computers, or memory storage devices transported by couriers. They may also avoid detection by use of couriers and face-to-face meetings. INSURGENT STRENGTHS AND WEAKNESSES 5-25. Insurgents usually have several strengths. They usually have a significant knowledge of an area of operations. Usually they are operating in their own country and own ethnic group, making it extremely difficult for friendly forces to identify insurgents in the community or to identify people connected with the insurgency. Insurgents have intimate knowledge of the area of operations including things like the characteristics of the local people and their culture, daily schedules, accents, and local slangs that enable them to blend in with the local population, enhancing their ability to operate with secrecy. They will probably wear similar clothing, have like postures, mannerisms and hand gestures, body movements, walking speed, greetings, body motions, and maintain eye contact (or lack of) as the population of the area of operations. They will also probably observe local social norms of food, drink, and sleeping schedules. 5-26. An insurgent is not usually responsible for maintaining normal governmental obligations to the local population. While insurgents may conduct some governmental functions and set up a shadow government, an insurgency does not normally have the same expectations from the population to provide governmental services. This normally means that insurgencies spend few resources on governmental functions, which frees more resources to conduct the insurgency. 5-27. Most insurgencies have limited personnel and resources. Long periods without resupply and loss of key personnel can affect an insurgency’s ability to sustain a conflict. Counterinsurgents can apply pressure on an insurgency by conducting raids on cell members; recovering enemy caches; interdicting supply routes; searching or seizing resources from cars, homes, and personnel entering the area of operations; isolating the insurgents from access to markets, smugglers, and black-market goods; and by conducting offensive operations that diminish guerrilla numbers. Insurgencies usually fail when their ability to replenish, either through counterinsurgent action, mismanagement on their own part, or withdrawal of the support of an external actor, is undermined. 5-28. Insurgent movements are vulnerable to friendly force information operations that show their danger, futility, privation, and numerical inferiority compared to government forces. In some cases, the fear of being treated as a criminal if captured, and the fear of violence to an insurgent and the insurgent’s family, can cause desertions and defections. In some societies, good treatment, pardons, protection, food, shelter, and participation in the government may be stronger incentives than the fear of criminal punishment to induce desertions. Other insurgent stress factors include sustained combat and a hostile environment that weakens insurgent resolve.
3-24
77
Insurgency Threat Characteristics 5-29. The decentralized nature of networked insurgencies that provides operations security can also be a weakness as it is resource intensive, slows responsiveness, and causes information to move slowly. The difficulty of insurgents receiving encouragement from superiors and members of the political wing, a lack of direction in the face of counterinsurgent pressures, and an inability to openly call for reinforcements and logistics due to their operations security plan can make insurgents feel isolated, alone, confused, and unsupported. Analysts need to identify these points and recommend operations to demoralize and promote defections among insurgents. ASSOCIATED THREATS 5-30. Other threats can play interconnected roles in an insurgency. Insurgencies create change in a society and this can create an opportunity for some organizations. Opportunists are important actors in this type of operational environment. Two other groups are particularly important, criminal organizations and nongovernmental militias. These groups can be supportive, neutral, or opposed to an insurgency. Moreover, these groups can have important connections to an insurgency. OPPORTUNISTS 5-31. An opportunist is one who takes advantage of any opportunity to achieve an end, often with no regard for principles or consequences. In the context of counterinsurgency, opportunists often take advantage of the conditions of instability in the pursuit of their own goals, such as smuggling contraband, while security forces are distracted from protecting the border due to combating an insurgency. Commanders and staffs identify opportunists, assess their impact on the mission and force protection, consider them in planning, and mitigate their impact as needed. 5-32. There are several types of opportunists who, by nature, impede the regular and effective functions of government and may act contrary to the well-being of the people. Opportunists may be existing local people or external actors, including civilians, members of the government, or security forces. Opportunists can be in direct support of the insurgency or outside actors. They can be state sponsored, sponsored by a non-state actor, or unsponsored, all while taking advantage of unstable conditions. Opportunists understand and exploit the conditions of instability inherent in counterinsurgency where lawlessness, subversion, and insurgency are the norm. The extreme conditions of an insurgency may allow activities that are normally countered with effective law enforcement and governance to proceed with impunity. These conditions allow opportunists to pursue their political and economic interests. 5-33. Opportunists may tend to exploit populations by conducting kidnapping for ransom; revenge killings; murder for hire; hijacking; extortion; black marketing; smuggling; and trafficking of drugs, humans, and weapons. Opportunists use the conditions of instability to conduct activities that are often illegal to further their interests. They may also work within the political system to further their interests. Insurgencies often occur in a chaotic political environment. As such, opportunists can take advantage of the chaos to gain political power. 5-34. Foreign opportunists, such as mercenaries, international criminal groups, and terrorists, may be sponsored by an external state or non-state actor or act independently. These groups may also work in the environment of an insurgency. They can act in a similar manner as internal opportunists, but they pursue the interests of an external actor. 5-35. Opportunists can work for an insurgency, against an insurgency, or both. How they work and who they work for is determined by an opportunist’s own interests. Opportunists can work both sides of a conflict to maximize influence and profits while avoiding retribution. An opportunist can provide safe passage for insurgents, while also providing intelligence to counterinsurgents. An opportunist is not bound by the objectives of either the counterinsurgent or insurgent. 5-36. Reintegration initiatives, although favorable to resolve many insurgencies, can be exploited by opportunists due to the inclusive and reconciliatory nature of these programs. Opportunists can infiltrate local civilian security forces to avoid retribution, influence less secure communities, and provide opportunities for vigilantism. Reintegration can also offer incentives for opportunists looking for employment, benefits, or even amnesty from a seditious criminal, social activist, or political past.
3-24
78
Chapter 5 5-37. Opportunists can be malign by design or by circumstance. Malign by design refers to the opportunists whose purpose by character is criminal and counterproductive to effective government and a population’s well-being. Malign by circumstance refers to opportunists whose purpose is not criminal by design but which shifts to wholly or partial illicit activities to further their interests based on obstacles to their original path. Groups like corporations, nongovernmental organizations, or security contractors may be advocates for a functioning government, but due to conditions which present opportunities for them, these groups or individuals may act counterproductively to counterinsurgent efforts. These opportunists are very difficult to identify due to their favorable position and the potentially clandestine activities employed to sustain their position. 5-38. In the planning process, counterinsurgents analyze the activities of opportunists, even though their presence may not be apparent. The same conditions that may allow an insurgency to form and enjoy freedom of movement also allow opportunists to act. Opportunists will probably take advantage of the vulnerability of the population and exploit the lack of governmental control in pursuit of their goals. 5-39. The presence, actions, and impact of opportunists can affect the success of the mission to defeat the insurgency and address the root causes of the conflict. This is especially true as opportunists may rely on the presence of the insurgency and unstable conditions to achieve their ends. Commanders and staffs need to include opportunists and their activities in understanding an area of operations and address them during mission planning and in attack the network operations. In the intelligence preparation of the battlefield/battlespace process, commanders and staffs may address opportunists within civil considerations, or within the threat, depending on where they are appropriate. The mission analysis must address identifying opportunists, understanding their impacts, and addressing or mitigating their impacts. 5-40. The commander’s intent may need to include dealing with opportunists, depending on the level of interference or political nature of opportunists. Opportunists can impact the mission or force protection operations. This is especially true if the opportunists are from a state sponsor or a border region where an internal conflict can spread to another country. Overall, counterinsurgents need to understand how opportunists can aid an insurgency, either directly or indirectly, and how they can undermine the efforts of a host-nation government or a multinational effort to address the causes of instability. 5-41. Commanders and staffs need to analyze how their units’ actions can provide opportunities for opportunists. Decisions concerning contracting, for example, can have various effects on giving opportunities to opportunists. Commanders and staffs must analyze their units’ effects on the battlefield. Some decisions that might seem to only effect a unit internally may also effect opportunists. Commanders and staffs must think holistically about how their units interact with the environment in order to minimize the effects of opportunist. CRIMINAL ORGANIZATIONS 5-42. Insurgents commonly use criminal organizations to accomplish objectives. Common activities designed to gain revenue or materials include theft, drug or human trafficking, smuggling of illicit materials, prostitution, extortion, kidnapping, blackmail, counterfeiting, taxing of civilians, bank robbery, and bribery. Criminal organizations can appear as street gangs, mafias, or cartels. Criminal organizations may also assist insurgent groups in achieving objectives other than accumulating resources. Other objectives may include intimidating government employees or candidates, conducting assassinations, kidnapping key personnel, initiating sectarian violence, strikes, demonstrations, riots, and smuggling high-value leaders, advisors, or weapons. Criminal organizations may also conduct operations deemed unpopular with a civilian population at a distance from an insurgent movement to create deniability. 5-43. Many insurgencies degenerate into criminality. This occurs as the primary movements disintegrate and the remaining elements become isolated, or the root cause is addressed. Insurgent disintegration is desirable; it replaces a dangerous, often ideologically inspired body of disaffiliated individuals with a less dangerous but more diverse body, normally of uneven character. The first is a security threat; the second is a law-and-order concern. This should not be interpreted as denigrating the armed capacity of a law-and-order threat. Successful counterinsurgents are prepared to address this disintegration. They recognize that the ideal approach eliminates both the insurgency and any criminal threats the insurgency’s elimination produces.
3-24
79
Insurgency Threat Characteristics 5-44. However, criminal groups can develop into insurgencies. In the case of localities that depend on black markets for their general welfare, the local population may depend on criminal activities. This creates a closely interlocked relationship between the criminal element (running the black market) and the insurgents (linked to the black market). In some cases, this relationship feeds into the causes of an insurgency. For example, a local population may support the insurgents because they want to stop interference with their economic livelihood. An insurgency based on a black market generally has ties to other black markets and resources through globalization. At its core, a black market requires trade and contact with others. This can create a well-funded, trained, and equipped commercial insurgency. 5-45. An insurgency can begin with a political aim and then develop into a commercial insurgency because of connections to a market. For example, the Revolutionary Armed Forces of Colombia started as a communist insurgent group in 1964. However, through its involvement in the drug trade, it has become the richest self-sustaining insurgent group in history. In the parts of Columbia that it controls, it is closely linked to the population because the population depends on the drug trade for its economic well-being. NONGOVERNMENT MILITIAS 5-46. As the host-nation government weakens and violence increases, people look for ways to protect themselves. If the government cannot provide protection, people may organize into armed militias to protect themselves. Moreover, some social structures, such as tribes, may have a militia structure. Examples of militias include the following: * Loyalist militias formed in Northern Ireland. * Right-wing paramilitary organizations formed in Colombia to counter the Revolutionary Armed Forces of Colombia. * Militias of various ethnic and political groups formed in Iraq during Operation Iraqi Freedom. 5-47. If militias are outside the host-nation government’s control, they can often be obstacles to ending an insurgency. Militias may become more powerful than the host-nation government, particularly at the local level. They may also fuel the insurgency and precipitate a downward spiral into a full-scale civil war. However, they can also play a constructive role and provide local security. While this can undermine the host nation’s government, it can also be a building block to help build legitimacy at the local level. 5-48. A militia can also shift into becoming an active insurgency and an insurgency can sometimes shift into becoming a militia. A militia may not actively oppose the government and may be working within the system. However, it represents a capability to challenge the host nation. Militias may become insurgencies. An insurgency may also be integrated by a government and become a militia.
3-24
81
PART THREE Counterinsurgencies Part three provides doctrine for how to counter an insurgency. How commanders and staffs counter an insurgency is dependent on the strategic and operational context (part one) and the type of insurgency (part two). Chapter 6 discusses command and control and mission command. Chapter 7 discusses planning and operational considerations. Planning is essential in framing the problem and the possible solutions. Chapter 8 covers intelligence. Intelligence is fundamental in gaining situational understanding. Chapter 9 discusses direct methods and chapter 10 discusses indirect methods to counter insurgency. These chapters provide a framework to help commanders and staffs develop an overall operational approach to counter an insurgency. Chapter 11 discusses working with host-nation forces. Chapter 12 discusses assessments, which provide information on effectively using measures of performance and measures of effectiveness in counterinsurgency. Finally, part three discusses legal considerations in chapter 13. Chapter 6 Mission Command and Command and Control 6-1. The operations process is the means by which a commander recognizes what needs to be done and uses the mission command or command and control process to ensure appropriate actions are taken. Sometimes this recognition takes the form of a conscious command decision, as in deciding on a concept of operations. Sometimes it takes the form of a rules-based procedure, as in the guiding of an aircraft on final approach. Other forms may require a degree of judgment and intuition so that they can only be performed by skilled, experienced people, as in devising tactics, operations, and strategies. (See ADP 6-0, ADRP 6-0, and MCDP 6 for more information on mission command and command and control.) COMMAND IN COUNTERINSURGENCY 6-2. Command in counterinsurgency often involves a large geographic area and control over multiple units performing different types of operations. In Western Iraq, Brigadier General W. Blake Crowe commanded a large area that began along the Syrian border and extended to the Jordanian border. He executed command over multiple units, performing multiple tasks in different areas. The vignette “Command in Counterinsurgency” provides an insight into Brigadier General Crowe’s command during the Iraqi War in 2006.
3-24
82
Chapter 6 Command in Counterinsurgency Our area of operations began along the Syrian border and extended down to the Jordanian border. We were also responsible for the Marine expeditionary force security area, which extended to Saudi Arabia. This was a large area, and it was not possible to be everywhere. This situation forced us to work with the locals and to work and play well with other units operating in the region, such as the special operations forces (SOF). But there in 2006, we were the surrogate government. We did not have mayors at the time. The provincial governor was in Ramadi, and he stayed there. Twice we were able to get him out to western al-Anbar in the year I was there, and it took a regimental-sized operation to get him out to cities such as Baghdadi, Haditha, and al-Qa’im. We spent nearly thirty days’ worth of planning to get him out there because for us he was more important than the President of the United States. I think Marines here would understand that. Our first mayor came in six months into my deployment in al-Qa’im. Lieutenant Colonel Dale Alford, commander of the 3d Battalion, 6th Marines, was involved in setting the conditions for that success. We didn’t have a mayor in Haditha because we had to arrest him. He was an insurgent. We didn’t have a mayor in Hit because the previous ones had been killed. So until December 2006, we were the surrogate local government. We learned very quickly that if we allowed the Iraqis to fail to build and provision their security forces, then we would have failed as well. So, we had to step in and fill that surrogate role. There is a debate concerning these operations and whether or not they are counterinsurgencies, hybrid operations, or distributed operations. We did them all. In al-Qa’im, we conducted what I would call a pure counterinsurgency (COIN) operation because the conditions had been set by the previous regiment. We were still having major manned gun, tank rounds, and combined arms in downtown Hit with more than one hundred insurgents surging on twelve- to fifteen-man positions. Phasing, synchronizing, supporting, and enabling formed what I thought was my primary role there. Every battalion commander wants to be the main effort. Every regimental or brigade commander wants to be the main effort. We weren’t the main effort in Iraq. And every battalion could not be the main effort, and that’s the hard thing for people to reconcile. How come I’m not getting all these assets? When I was in Afghanistan, I received everything. We were one Marine battalion attached to the Army and we were given everything. In Iraq, I had five battalions in my command and one reduced force reconnaissance company commanded by six lieutenant colonels. At least one unit is not going to get what they want in a timely fashion. The battalions, companies, and platoons had autonomy, but autonomy doesn’t mean that they operated independently. That’s where synchronizing comes in. It means going out and working very closely to the battalions and blurring the borders between zones of responsibility and forcing commanders to get together and have a cup of coffee. Just as we needed to have tea with the local nationals, we also needed to do that among ourselves. We did that very well with the SOF through liaisons. We established an ad-hoc tactical fusion center at the regimental level. [W]e raised close to 4,000 police officers. I waited a year and was told the police stations are coming. They never did. So we created expeditionary forward operating bases, because that way I could use Marine Corps money. I could put police in them, although they could not be designated official Iraqi Police stations. If it was designated as such, you would get reported because it would not be official. So, there are things that you have to do. It’s not selective disobedience of orders, but rather a creative way of getting the mission accomplished. We had two force protection measures: the American standard and what was acceptable to the Iraqis. Casualties were unacceptable to me as a commander.
3-24
83
Mission Command and Command and Control The first time you go to a scene where you’ve lost a soldier, it does not matter what uniform he’s wearing. He is one of ours. He was brought in to serve with us, and I don’t care what nationality he is. We needed to build it to one standard: checkpoints, force protection, food, weapons, ammunition, all the way down. They fight with us and we’re going to treat them to our standard. That’s just nonnegotiable. Note: For Army users, JP 1 defines command as the authority that a commander in the armed forces lawfully exercises over subordinates by virtue of rank or assignment. Command includes the authority and responsibility for effectively using available resources and for planning the employment of, organizing, directing, coordinating, and controlling military forces for the accomplishment of assigned missions. It also includes responsibility for health, welfare, morale, and discipline of assigned personnel. ADP 6-0 defines control as the regulation of forces and warfighting functions to accomplish the mission in accordance with the commander’s intent. 6-3. Many actions contribute to successful mission command, including planning, training, and education. Moreover, a well understood commander’s intent is essential for mission command. In a counterinsurgency, the operational environment is changing and real-time guidance or direction will need to change. Planning, whether hasty or deliberate, provides a foundation of shared understanding. Effective training and education, which make it more likely that subordinates will take the proper actions in combat, help ensure the success of mission command. A commander's intent, expressed clearly before an operation begins, is an essential element of mission command. Likewise, analysis after the operation, which ascertains the results and lessons of the action and so informs future actions, contributes to mission command. Note: For Marine Corps users, mission command does not replace command and control as a warfighting function. Mission command is a type of command and control that promotes innovation and requires the strong relationships of trust and mutual understanding necessary for decentralized decisionmaking necessary to seize the initiative, degrade enemy cohesion, and strengthen friendly cohesive relationships that are critical elements to any counterinsurgency. Based on leader character and subordinate initiative, mission command offers no checklist for success, but instead challenges the services to cultivate a bias for taking appropriate action and accentuate the senior leadership virtues of trust, moral courage, and restraint. The mission command philosophy asserts that people are the basis of all military organizations, and military operations occur as human interactions. Commanders use the philosophy of mission command to exploit and enhance uniquely human skills. Commanders implement mission command though leadership, providing direction and guidance as part of command and understanding that subordinates contribute to control. The other types of command and control are command by direction and command by planning. For the Army, the philosophy of mission command is the exercise of authority and direction by the commander using mission orders to enable disciplined initiative within the commander’s intent to empower agile and adaptive leaders in the conduct of unified land operations. (For more information, see MCDP 6 and ADP 6-0). 6-4. Due to the nature of counterinsurgency operations, the inculcation of the mission command philosophy is beneficial in dealing with the local environment. Soldiers and Marines interact with a society at the platoon, squad, and individual level. Tactical leaders must have the ability, within the commander’s intent, to have freedom of action to work with a local society. As such, tactical leaders should act with a conceptual understanding of an operational environment and how their action’s fit into that operational environment. 6-5. A counterinsurgency involves simultaneous activities at every echelon. Platoons within a company could be doing different tasks, and companies within a battalion could be doing different tasks, all in support of a battalion’s method of counterinsurgency. Every task involves potential decisions that can have an immediate impact on success or failure. Moreover, these tasks are interrelated. This means that junior leaders will make decisions at the point of effort, relying on mission type orders. This applies to any operational approach taken to defeat an insurgency. For example, if the commander integrates a direct
3-24
84
Chapter 6 action force into a host nation’s counterinsurgency effort, that force will have to understand the operational environment and the commander’s intent. Any mission can have unintended consequences, and this includes missions with clear objectives. For example, a direct action mission taken with faulty intelligence could result in the deaths of civilians. All commanders have to be empowered to make decisions that positively impact mission accomplishment. Whatever operational approach the commander takes and however the host nation is supported, mission command is essential. 6-6. When squads, platoons and companies are distributed over wide areas, they must frequently make decisions, and their understanding of the environment is generally better than that of their higher headquarters. In an effective counterinsurgency, there is a need for decentralization that puts a premium on the higher headquarters establishing a clear commander's intent and providing subordinates with vision and guidance particular to an insurgency and a host nation. In a counterinsurgency, commanders must effectively execute the art of command, which is the creative and skillful exercise of authority through timely decisionmaking and leadership. These decisions often have to be made in a time constrained environment. As such, decentralized decisionmaking is essential, and it provides control over the operations and activities inherent in a counterinsurgency. HEADQUARTERS USE IN COUNTERINSURGENCY 6-7. While mission command allows for multiple actions to simultaneously occur at every echelon, every echelon has an important role in ensuring that the various actions meet the desired end state. Control requires a shared understanding of an operational environment and operational approach in a counterinsurgency. A lack of effective control over these activities can create gaps that insurgents can exploit. For example, if different brigades or different divisions set different prices for weapons buyback programs or have different policies on wages, this sometimes creates situations that hamper the overall policy. A lack of understanding of the economic variables within a country can produce policies that undermine a weapons buyback program or distort the labor market. On the other hand, there might be cases in counterinsurgents want to allow a local commander more flexibility in setting such policies. The balance between local control and coordination of overall policy is one of the primary challenges facing the commanders and staffs of brigades, battalions, and regiments. 6-8. A commander bases the level of flexibility and coordination of activities and policies on an operational environment and a superior commander’s intent. Moreover, the type and experience level of a unit may play a role in determining the level of flexibility and coordination. Conditions vary within a country or region and the cities and towns within it. For example, while different policies on wages could produce a disjointed overall policy, it is also possible that different wages are justified by the economic environment in different areas in the country. One city could have low unemployment, while another city could have high unemployment. The different conditions in the labor market is something commanders should take into account when designing a policy on economic development and hiring local workers. Also, an inexperienced unit or a unit that is not performing its traditional mission might have less flexibility than an experienced unit performing its traditional mission. 6-9. In a counterinsurgency, operations are interrelated, and they must support the overall commander’s intent. The various activities that different units perform must also work within the operational approach of the joint commander. The joint commander is responsible for designing the overall operational approach of the counterinsurgency campaign. The joint commander has to ensure that that various activities being performed will meet stated United States (U.S.) policy goals. Subordinate commanders ensure that their operational approaches and activities fit within the overall operational approach. The combination of tactical actions must produce a strategic result, and every echelon of command shares a responsibility for ensuring that this occurs. Commanders must understand the end state and the ramifications of their actions in meeting that end state. The commander drives the operations process. The commander’s staff must ensure that the commander understands the operational environment and can visualize the battlefield/battlespace. This is accomplished through staff action during mission analysis. However, because a counterinsurgency environment is complex, situational understanding is continually developing. Understanding what counterinsurgents should do is more important than doing tasks that may be counterproductive. Also, constant engagement of key leaders with the population is essential to enhancing
3-24
85
Mission Command and Command and Control understanding of the population and understanding of the counterinsurgency. Understanding the problem and having key leaders engage the population may be more important than having a large number of troops. 6-10. Headquarters elements may be essential in coordination with the host nation, other government agencies, or other unified action partners. Counterinsurgents tailor headquarters units to the requirements to coordinate and enable subordinate units to be effective. A larger number of headquarters or a more robust headquarters may provide a further ability to work with interagency and host-nation organizations. Interagency organizations can integrate their capabilities more effectively if there is a robust headquarters element to work with. The analysis and intelligence capabilities of a division or corps headquarters may be essential in integrating interagency organizations’ capabilities. These division and corps capabilities provide brigades the needed span of control to operate and integrate interagency organizations and their capabilities. Using multiple headquarters provides a robust capability for working with host-nation organizations, both military and civilian. Many programs meant to build capacity within a host nation are national level programs. A robust headquarters element will help to ensure that these programs are integrated and resourced to maximize the benefit to the counterinsurgency effort. This is needed to ensure that these programs are effective at the local level. 6-11. A headquarters can also serve as a coordination center. A coordination center can provide a means to unify multiple governmental, military, police, and civilian partners to gather and share information, provide support to priority projects, conduct meetings with local leaders, promote a whole of government and unified effort approach, and lend added credibility to the government. Coordination centers provide needed flexibility to control and coordinate host nation and multinational actions. Coordination centers can also act as joint tactical command posts and integrate various joint capabilities, such as air support. 6-12. An operational environment does not normally dramatically change at a unit boundary. It is essential in a counterinsurgency to understand the actual economic, political, and social boundaries of an operational environment and not use unit boundaries as the only planning consideration for operations. The relationships between units that are adjacent is essential. While the conditions in their operational environment may be different, commanders should understand their adjacent unit’s problem frame and operational approach. They should also understand how their actions may affect the operational environment of other units. This is of particular importance when integrating information-related capabilities. Commanders at every echelon ensure adjacent units have relationships that allow for the completion of the overall mission. 6-13. The same is true of forces operating in another unit’s area of operations, such as special operations forces (SOF). While missions to capture an insurgent leader may be essential to the overall mission, commanders must coordinate with other commanders and units to mitigate negative consequences of these types of actions with effective information operations. Commanders and staffs at all levels must ensure that the units under their command have productive relationships with other units. Establishing command and support relationships helps create channels that streamline information dissemination by ensuring the right information passes promptly to the right people. The three common channels for information dissemination are known as command, staff, and technical channels. (See ADRP 6-0 for more information on command channels.) 6-14. The effective link between planning and assessing the effects of operations in a counterinsurgency is the foundation for establishing effective mission command. Success in a counterinsurgency is largely dependent on making lasting changes to an operational environment. This requires that commanders and staff continue to evolve in their situational understanding. A continuous assessment process is essential for planning in counterinsurgency operations. (See chapter 12 for more information on assessments.) CONVENTIONAL FORCES AND SPECIAL OPERATIONS FORCES SYNCHRONIZATION 6-15. Counterinsurgency requires the integration of all capabilities of the U.S. and often requires this integration for long periods of time. However, the integration of SOF capabilities into the effort to counter an insurgency is of particular importance to both Army and Marine commanders. FM 6-05/MCWP 3-36.1 provides a doctrinal foundation for conventional force and special operating force integration. Also,
3-24
86
Chapter 6 JP 3-05 provides an overview of special operations. The synchronization of conventional forces and SOF have special considerations in counterinsurgency. 6-16. Conventional forces and SOF depend on each other. SOF lack long term sustainability without conventional support. More importantly, if SOF are conducting direct action missions, it becomes vital that conventional forces and SOF coordinate so that they do not produce negative effects on the operational environment. However, SOF can provide conventional forces with important cultural and advising capabilities. They also provide important offensive capabilities. SOF capable of conducting direct action might be able to conduct raids and gain intelligence that conventional forces cannot. 6-17. Typically, SOF control a joint special operations area either long term or temporarily. A joint special operations area is simply an area of land, sea, and airspace assigned by a joint force commander to conduct special operations. This is a means to manage SOF, which tend to operate in small teams, separately from conventional forces, which are larger in size and capabilities. Creating a joint special operations area is a means to synchronize actions towards a common goal, prevent conventional forces and SOF from interfering with one another, and prevent fratricide. 6-18. In some counterinsurgency operations involving a large direct approach and conventional forces that are likely, at least for a time, to be the primary counterinsurgents, the land forces area of operations will typically encompass any area where SOF may operate. Unlike other operations, where the joint commander can separate forces by time and space, a counterinsurgency can involve large scale and long term involvement by land forces. Joint commanders typically set up joint special operations areas, but joint special operations areas are normally temporary, and these areas return to the control of the ground commander once the special operations mission is completed. 6-19. In a long term and large scale counterinsurgency effort, SOF operations, if not coordinated, could create problems. SOF actions, such as direct action missions, could be highly disruptive to a conventional unit’s ongoing efforts to build the legitimacy of the host-nation government if not coordinated. For example, a direct action mission that is not coordinated with information operations can alienate a local population. In some cases, a direct action mission can undermine a unit’s progress in an area, even if counterinsurgents attempt to mitigate the negative effects to the conventional unit’s missions. Commanders and staffs must ensure synchronization of both conventional forces and SOF can to ensure neither force undermines the overall effort. This synchronization can include decisions on how to perform missions and decisions on whether or not to perform missions. Both conventional forces and SOF should support the joint commander’s intent. 6-20. SOF and conventional forces complement each other’s capabilities. When SOF are operating on short duration missions, if not coordinated, they might not be aware of some of the local knowledge of the area. Commanders and staffs must share information to ensure progress. Combined operations can enhance the effectiveness of both SOF and conventional forces. The ground commander will have the daily experiences in an area and will understand the local population. On the other hand, a successful mission by the SOF commander could have strategic effects throughout the country. Coordination with SOF by the ground commander benefits both the SOF and conventional forces, who have to continue the longer term mission in an area of operation. 6-21. Both the SOF and conventional commanders share responsibility for ensuring an effective relationship. However, the joint force commander has overall responsibility for effective integration. FM 6-05/MCWP 3-36.1 offers some important tools, such as the use of liaison officers, to ensure an effective relationship. Ultimately, the joint force commander has overall responsibility for synchronization. Both SOF and conventional forces’ commanders and staffs ensure their actions meet the joint forces commander’s intent. The joint force commander ensures that the mechanisms for effective synchronization are in place.
3-24
87
Chapter 7 Planning and Operational Considerations 7-1. Planning is important for gaining understanding. Military planning processes provide a way to understand an operational environment and understand the commanders’ intent within that operational environment. Planning is often conducted simultaneously with other activities, such as execution and assessment, and both informs, and is informed by, those activities. Planning as understanding, continually refined and questioned through assessments, helps commanders maintain situational understanding in the ever changing environment of counterinsurgency. This continued conceptualization of the operational environment and problem is essential for the use of mission command. However, before commanders and staffs can conceptualize the problem, they need to understand certain paradoxes of counterinsurgency. COUNTERINSURGENCY PARADOXES 7-2. A commander planning a counterinsurgency requires a specific mindset before that commander can plan or execute operations, and that mindset is the foundation for understanding how to counter an insurgency. When the United States (U.S.) acts, even temporarily, as the primary counterinsurgent, commanders operate carefully between fighting for a population and being seen as fighting against a population. When acting indirectly to enable a host nation, these paradoxes provide a framework for understanding and enabling the host nation. Throughout conceptual and detailed planning, the counterinsurgency paradoxes described in paragraphs 7-4 through 7-12 provide a set of apparent contradictions that aid commanders and staffs in developing a counterinsurgency mindset that helps commanders and staffs operate effectively. These paradoxes are offered to stimulate thinking, not to limit it. The applicability of the these paradoxes depends on the local situation and, in particular, the state of the insurgency. For example, the statement that “sometimes, the more force used, the less effective it is”, does not apply when the enemy is breaching the perimeter; however, that thought is applicable when effective security has already been achieved in an area. In short, commanders and staffs should not reduce these paradoxes to a checklist; they should be used with considerable thought. 7-3. The commander must be conscious of the problem of the observer effect, where the act of engaging the population, itself, makes changes in the operational environment. Any action on the environment generates a reaction, thereby altering the environment. This means the environment changes with every interaction with a society. In other words, the very act of interactions with a society changes the operational environment. Commanders must understand this reality and constantly consider its effects on their assessment and planning processes. Moreover, this fact is at the heart of many of the paradoxes that follow. Sometimes, the More You Protect Your Force, the Less Secure You May Be 7-4. Ultimate success in counterinsurgency operations is normally gained by protecting the population, not the counterinsurgency force. If military forces remain in their compounds, they lose touch with the people, appear to be running scared, and give the initiative to the insurgents. A possible path to success could include an increase in outreach programs that focus on protecting the population. Commanders weigh the effectiveness of establishing patrol bases and operational support bases against the security of using larger unit bases. Establishing patrol bases ensures access to the intelligence needed to facilitate operations. Sharing risks with the population reinforces the connections with them that help establish legitimacy. Sometimes, the More Force is Used, the Less Effective It Is 7-5. Any use of force produces many effects, not all of which can be foreseen. Using substantial force also increases the opportunity for insurgent propaganda to portray lethal military activities as brutal. In contrast, using force precisely and discriminately could strengthen the rule of law that needs to be established. The key to successful counterinsurgency operations is knowing when more force is needed,
3-24
88
Chapter 7 and when it might be counterproductive. This judgment involves constant assessment of the security situation and a sense of timing regarding insurgents’ actions. The More Successful the Counterinsurgency is, the Less Force Can Be Used and the More Risk Must Be Accepted 7-6. This paradox is really a corollary to the paradox described in paragraph 7-5. As the level of insurgent violence drops, expectations of the population may lead to a reduction in direct military actions by counterinsurgents. More reliance is placed on police work, rules of engagement may be tightened, and troops may have to exercise increased restraint. Soldiers and Marines may also have to accept more risk to maintain involvement with the people. Doing Nothing is Sometimes the Best Action 7-7. Often insurgents carry out a terrorist act or guerrilla raid with the primary purpose of enticing counterinsurgents to overreact, or at least to react in a way that insurgents can exploit. For example, counterinsurgents opening fire on a crowd or executing a clearing operation may create more enemies than it removes from the streets. If an assessment of the effects of a course of action determines that more negative than positive effects may result, an alternative should be considered, potentially including not acting. Some of the Best Weapons for Counterinsurgents Do Not Shoot 7-8. Counterinsurgents often achieve the most meaningful success in garnering public support and legitimacy for the host-nation government with activities that do not involve killing insurgents (although killing clearly will often be necessary). Arguably, the decisive effort is to isolate the insurgents by denying the local population as a base of support. This establishes the need for synchronizing information operations across the various lines of effort in order to generate operational advantages for the commander conducting counterinsurgency operations. Every action, including the use of force, must be supported by adequate information. While security is essential to setting the stage for overall progress, lasting victory may come from a vibrant economy and political participation that restore hope. Particularly after security has been achieved, dollars and ballots may have more important effects than bombs and bullets. This is dependent on the context of a particular insurgency and the strategy to counter that insurgency. As with the other paradoxes, counterinsurgents cannot treat this as a uniform rule. However, a thriving economy may be more important than ammunition. Depending on the state of the insurgency, therefore, Soldiers and Marines should prepare to accomplish many nonmilitary missions to support counterinsurgency efforts. All unified action partners have a role in supporting efforts to enable governance to counter an insurgency, not just Department of State and civil affairs personnel. The Host Nation Doing Something Tolerably is Normally Better Than Us Doing it Well 7-9. It is just as important for counterinsurgents to consider who performs an operation as to assess how well it is done. Where the U.S. is supporting a host nation, long-term success requires supporting viable host-nation leaders and institutions that are legitimate and capable. The longer that process takes, the more U.S. public support will wane and the more the local population will question the legitimacy of their own forces and government. However, if the host nation cannot perform tolerably, the counterinsurgents supporting it may have to act. Experience, knowledge of the area of operations, and cultural sensitivity are essential in deciding when such action is necessary. If a Tactic Works This Week, It Might Not Work Next Week; If It Works In This Province, It Might Not Work In The Next 7-10. Competent insurgents are adaptive. They are often part of a widespread network that communicates constantly and instantly. Insurgents quickly adjust to successful counterinsurgency practices and rapidly disseminate information throughout an insurgency. Indeed, the more effective a counterinsurgency tactic is, the faster it may become out of date because insurgents have a greater need to counter it. Effective leaders
3-24
89
Planning and Operational Considerations at all levels avoid complacency and are at least as adaptive as their enemies. There is no single prescribed set of counterinsurgency procedures. Commanders and staffs must constantly develop new practices. 7-11. The environment of an insurgency is not static and different factors may influence various areas. An operation or a tactic that works well in one area may not work well in another because of different factors in the environment. Village stability operations in Afghanistan demonstrate this. Soldiers had success in one area but did not have success in another. The reason was that the operational environments and the population’s responses to these environments were vastly different. Commanders and staffs must understand the local area and not assume that the same methods will work in other areas, even in an adjacent town. If a Tactic Works in This Province, it Might Not Work in The Next: The Case of the Dan Aw Patan District, Afghanistan, 2010 In the fall of 2010, U.S. Army units comprised of special forces teams and infantry squads from the 1st Battalion, 16th Infantry Regiment introduced village stability operations in the Dan Aw Patan district of Paktia Province in southeastern Afghanistan and along the Pakistan border. Village stability operations were an effort to empower Afghan villagers to defend themselves from insurgents. The primary U.S. Army mission was to recruit Afghan men in each village to serve in the local police that would provide physical security for their community and thereby decrease the power of the Taliban. In the course of the next year Soldiers regularly visited the villages of the district, meeting with local leaders and equipping and training members of the local police. Village stability operations in Dan Aw Patan enjoyed only partial success. In the north and central areas of the district, U.S. units were able to form and train squads of local police. The villagers generally supported these efforts, participated in sustainment training, and provided useful intelligence. More importantly, the Soldiers never felt they might be in imminent danger while working with the local Afghans. In the southern part of the district, however, village stability operations failed. U.S. Soldiers in this region never enjoyed the security their counterparts enjoyed further north. Moreover, the police units that were established in these villages were far less interested in conducting patrols than in receiving pay. Despite lengthy negotiations with village leaders in which the Soldiers offered incentives such as medical assistance and funds for new schools, bridges, and other infrastructure, these local police squads never became the means of countering insurgent influence in the district. Why did village stability operations work in the northern and central villages but not in those to the south? The answer was not obvious. The distances between the central and southern villages were minimal, less than 10 miles in most cases. The demographics in each region were essentially identical in terms of size, economics, Pashtun ethnicity, religion, and culture. The U.S. approach was consistent in its methods and leadership. In fact, the same Soldiers who led the successful efforts in the north and central regions also worked with the southern villages. The lack of full success in the southern villages resulted from less visible factors. The southern area saw much more fighting during the Soviet occupation, and the local people viewed any foreign troops as “Soviets.” More important was the existence of insurgent “rat lines” in this part of the district. From the Teri Mangel arms bazaar, located just across the border in Pakistan, historic smuggling routes crossed the Afghan border into Paktia Province toward the provincial capital of Gardez. Because of the routes’ importance to the insurgent campaign, the Taliban exerted pressure on the southern villages to resist American efforts to deny freedom of movement to the insurgents and keep the routes open. Village stability operations were designed to counter exactly this type of influence. Yet because of Taliban pressure that succeeded despite the U.S. presence, the southern villages never accepted the program fully. U.S. units were not resourced to collect sufficient intelligence to discover the extent of Taliban influence, and the newly-hired local
3-24
90
Chapter 7 police proved unreliable but in a passive-aggressive manner, demonstrating little initiative except in the collection of their salaries. The case of Dan Aw Patan displays the importance of local conditions in the counterinsurgent’s choice of tactics. In general, village stability operations represented an innovative approach to the challenge of securing the Afghan population at the village level. In this case, however, the counterinsurgent learned that what worked in one village did not work in a neighboring village only a few miles distant. Many Important Decisions Are Not Made by Generals 7-12. Successful counterinsurgency operations require competence and judgment by Soldiers and Marines at all levels. Indeed, young leaders often make decisions at the tactical level that have strategic consequences. Senior leaders set the proper direction and climate with thorough training and clear guidance; they then trust their subordinates to do the right thing. Preparation for tactical-level leaders requires more than just mastering Service doctrine; they must also be trained and educated to adapt to their local situations, understand the legal and ethical implications of their actions, and exercise initiative and sound judgment in accordance with their senior commander’s intent. CONCEPTUAL PLANNING 7-13. The complexity of insurgencies presents problems that have incomplete, contradictory, and changing requirements. The solutions to these challenging problems are often difficult to recognize because of interdependencies of the relationships of an operational environment. While attempting to solve these problems, the solution to one problem may reveal or create another, even more complex, problem. Operational design employs various elements to develop and refine the commander’s operational approach. Operational design involves conceptual planning. Conceptual planning establishes aims, objectives, and intentions, and it also involves developing broad concepts for action. It generally corresponds to the art of war. The commander’s activities of understanding and visualization are key aspects of conceptual planning. (See MCDP 5 for more information on the art of war and ADRP 5-0 for more information on understanding and visualization). 7-14. Design is the conception and articulation of a framework for solving a problem, and it is critical to conceptual planning. The purpose of design is to achieve a greater understanding of the environment and the nature of the problem in order to identify an appropriate conceptual solution. While not prescriptive, design is based on critical thinking, conceptual planning, visualization, emergence of a hypothesis, and continuous activity. Design is the primary way to develop an operational approach. First, design helps commanders and staffs create a shared understanding of the current operational environment and visualize what the environment should look like. Understanding an operational environment is an essential foundation of counterinsurgency. Second, design enables the collaborative, conceptual planning necessary to understand a problem and develop broad approaches to solving it. From there, commanders can visualize their operational approach and describe to staffs and subordinate commanders how to move the environment from the current state to the desired end state. From an operational approach, the commander conducts detailed planning. (See figure 7-1.) (See JP 5-0 for more information on design. See ADP 5-0 for more information on Army design methodology and MCWP 5-1 for more information on Marine Corps design. See chapter 2 for an understanding of an operational environment.)
3-24
91
Planning and Operational Considerations Figure 7-1. Design concept 7-15. By definition, design is iterative, and reframing the problem as necessary is essential. Reframing the problem involves revisiting earlier hypotheses, conclusions, and decisions that underpin the current operational approach. Reframing can lead to a new problem statement and operational approach, resulting in an entirely new plan. By their nature, counterinsurgency efforts require repeated assessments from different perspectives to see the various factors and relationships required for adequate understanding. Assessment and learning enable incremental improvements to the operational approach. The goal is to understand the problem, to construct a reasonable explanation of observed events, and to subsequently construct a framework within which to solve the problem. The essence of this is determining the mechanism or combination of mechanisms necessary to achieve success. These mechanisms may not be military activities, or they may involve military actions in support of nonmilitary activities. Once commanders understand the problem and what needs to be accomplished to succeed, they identify the means to assess effectiveness and the related information requirements that support assessment. This feedback becomes the basis for learning, adaptation, and subsequent reframing. (See ADRP 5-0 and MCWP 5-1 for more information on design and reframing.) 7-16. In an ideal world, a commander engaged in counterinsurgency operations would enjoy clear and well-defined goals for the campaign from the beginning. However, the reality is that many goals emerge only as the mission develops and goals can change as a result of interacting with an environment. For these reasons, counterinsurgents usually seek to achieve a combination of defined and emerging goals. Likewise, the complex problems encountered during counterinsurgency operations can be so difficult to understand that a clear operational approach cannot initially be developed and some assumptions must be made during problem framing. Often, the best choice is to create iterative solutions (also known as discovery learning) to better understand the problem. The use of design and the planning process allow commanders and staffs to learn and achieve greater understanding as they interact with the environment. As this interaction with
3-24
92
Chapter 7 the population and insurgents occurs, it will reveal the validity of planning assumptions, test the strengths and weaknesses of designs, inform the operational approach, and provide guidance to further planning and engagement. Other considerations include: * Systems thinking. * Continuous assessment. * Structured learning. 7-17. Systems thinking involves understanding a problem in terms of systems and how they relate to, and influence, each other. For counterinsurgents this includes not only how the various systems in an insurgency interact, but how they interact and affect the various systems in the operational environment. Additionally, systems thinking should drive commanders and staffs to develop an understanding of how their lines of operations and lines of effort relate and influence each other. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) 7-18. Continuous assessment is essential to learning and adapting within the inherent complexity of counterinsurgency operations. No design or model completely matches reality, and reasonable and feasible solutions at one moment can become ineffective at the next moment due to changes in the situation. The object of continuous assessment is to identify where and how the actions and activities of the counterinsurgent are working or failing and to consider adjustments to design and the operational approach. (See chapter 12 for more information on assessments.) 7-19. The objective of structured learning is to develop a reasonable initial design and then learn, adapt, and iteratively and continuously improve the initial plan as more about the dynamics of the counterinsurgency problem become evident. The operational approach and framing of the problem can be thought of as models. In counterinsurgency, these models must always be tested to determine how well they match reality. In other words, counterinsurgents may believe they have an understanding and general idea of how to solve a problem, but they review that belief to ensure it is still valid at any given time. Counterinsurgents must understand the actual problem to ensure that tactical actions have an effect on the environment. CENTER OF GRAVITY 7-20. An important element of conceptual planning is center of gravity analysis. The center of gravity is important in understanding both the environment and the enemy. A center of gravity is the source of power that provides moral or physical strength, freedom of action, or will to act (JP 5-0). A center of gravity construct is useful as an analytical tool to help counterinsurgency forces analyze the insurgency’s sources of strength as well as its weaknesses and vulnerabilities. Centers of gravity may change over time, they may be different at the operational and strategic level, and they could be different from location to location. (See JP 2-01.3 for more information on centers of gravity.) 7-21. In an insurgency, the population is not necessarily the center of gravity for an insurgent. A center of gravity could be external support from another country, it could be a group of core leadership or believers, or it could be a host of other factors or vital functions. Center of gravity analysis begins with the understanding that every environment is unique, and a center of gravity analysis must not begin with a preconceived center of gravity. 7-22. Counterinsurgents must understand their own center of gravity and that of the host nation. In many cases, political support is the strategic center of gravity for the U.S. Some tactical actions, such as war crimes, can undermine political support for the counterinsurgency. Host nations may also have a wide range of centers of gravity. Operational and tactical leaders must plan and execute operations that do not undermine the host nation’s center of gravity. LINES OF OPERATION AND EFFORT 7-23. Lines of operation and effort are important planning tools to move conceptual planning into detailed planning. These planning tools help describe how a military force will turn a commander’s understanding of the current situation into a desired end state. An end state is the set of required conditions that defines achievement of the commander’s objectives (JP 3-0). The primary source for any commander’s end state is
3-24
93
Planning and Operational Considerations the mission the commander received. The use of conceptual planning helps commanders visualize how to generate the conditions that achieve that end state. Conceptual planning also allows commanders to determine if the dictated end state is achievable, if additional resources are necessary, what level of risk must be accepted, and if modification of the mission and expectations is required. The end state may change as the situation changes. Lines of operations and effort help provide the detail necessary to turn the commander’s visualization and the operational approach (how to move from the current situation to the desired end state) into a detailed plan. 7-24. A line of operation is a line that defines the interior or exterior orientation of the force in relation to the enemy or that connects actions on nodes and/or decisive points related in time and space to an objective(s) (JP 5-0). Lines of operation are normally associated with the spatial aspects of a tactical problem. Lines of operation are useful, especially when addressing the physical aspects of counterinsurgency, such as infrastructure protection, control of movement, and locating and engaging insurgent forces. Lines of operation and lines of effort can be used separately or in combination. In Service-level doctrine, United States Marine Corps doctrine does not make a distinction between lines of effort and lines of operation. MCDP 1-0 states that, “A line of operations helps define the orientation of the force. In conventional operations, lines of operations connect actions related in time and space to an objective. During counterinsurgency or other irregular warfare operations, lines of operations, for example, could focus on major stability-related objectives, such as security, restoration of essential services, and training host-nation military and police forces. In either case, lines of operations reinforce the idea of the single battle, since success or failure in any line of operations will have an impact on the other lines of operations.” 7-25. A line of effort is, in the context of joint operation planning, using the purpose (cause and effect) to focus efforts toward establishing operational and strategic conditions by linking multiple tasks and missions (JP 5-0). Because counterinsurgencies are often more oriented towards an intended outcome or purpose than an enemy force, counterinsurgency operations generally use lines of effort. If a line of operation is spatially oriented, then that line of effort is purpose oriented and is appropriate when positional references to an enemy or adversary are not the determining factor in friendly action. Because counterinsurgency operations involve many nonmilitary factors, lines of effort may form a way to link tasks, effects, conditions, and the desired end state. Lines of effort help commanders visualize how to integrate their military capabilities into the efforts of the rest of the unified action community. (See JP 5-0 for more information on lines of effort.) 7-26. +Lines of effort are important tools to link conceptual planning to detailed planning. They are an essential means that commanders can use to arrange tactical events in time, space, and purpose. The benefits of using this type of framework include— * Aiding the commander in visualizing, describing, and directing operations toward a definitive end state. * Unifying the efforts of joint, interagency, multinational, host-nation government, and host-nation security forces toward a common purpose. * Allowing commanders and staffs to synchronize activities along all lines of operation and effort to gain unity of effort. * Ensuring all efforts converge on a well-defined, commonly understood end state. * Combining the effects of long-term operations with short-, mid-, and long-term goals. * Helping commanders identify missions, assign tasks, allocate resources, and assess operations. * Enhancing mutual support between echelons and adjacent organizations. 7-27. Lines of effort depict how the actions of a counterinsurgent, over time, achieve the end state visualized by the commander. In a counterinsurgency, lines of effort must also be nested into the actions and activities of the host nation. From the tactical level to the strategic level, the goal of the counterinsurgent may be to support the host nation, depending on the operational design of the counterinsurgency. While that may require some tactical actions that do not involve host-nation forces, the overall effort must be to support the host nation’s efforts at all levels. The counterinsurgent forces support and integrate their efforts with the efforts of the host nation’s strategic and operational approaches.
3-24
94
Chapter 7 7-28. Commanders and staffs must consistently question and evaluate lines of effort as part of the operations process. As assessment indicates changes to the situation (sudden opportunities to exploit, failure of certain activities, new actors, and an actual change to the end state) the tasks and objectives of various lines of operation and effort may no longer be relevant or appropriate. Worse, they can trap the commander into a preconceived notion that accomplishment of various tasks will result in a successful completion. Lines of operation and effort are useful means to help plan activities, but they are not measures of mission success. All leaders must guard against the assumption that their actions are relevant because they support any particular line of operation or effort. The underlying assumptions behind the tasks and objectives of any detailed plan must be constantly questioned and evaluated. Just because counterinsurgents take an action, that does not make that action relevant. 7-29. The effects of actions in one line of effort are not contained to only that line. For example, the commander could have a line of effort to support the rule of law and a line of effort to support economic development. However, a working legal system has a direct effect on the economic system. A system in which contract law is enforced, for example, will have a much wider range of economic activity than a system where contract law is not enforced. In this example, progress in the support economic development line of effort may be hindered by struggles within the support rule of law line of effort. The use of systems thinking allows commanders and staffs to use lines of operation and effort not only for planning and conceptualization, but also for visualization of how they relate and influence each other. 7-30. Figure 7-2 illustrates one example of lines of effort in a counterinsurgency. However, while this is an example that may apply well to a counterinsurgency after large-scale combat operations, it may not apply well to other counterinsurgency operations. The U.S. could be providing only enablers for a counterinsurgency effort. For example, U.S. forces might be combining capabilities such as counter threat finance, signals intelligence, and a direct action force to enable the host nation by stopping the insurgency from attaining the means to fight, providing intelligence on an insurgency’s communications, and providing a means to neutralize insurgent leadership. The host nation may have the capability to handle basic functions such as governance. When designing lines of effort for a counterinsurgency, the context the counterinsurgent is operating in is not important. If commanders and staffs reduce lines of effort to some standard solution set, they are no longer using the tool, but they are being used by the tool. This illustrates that complex problems in counterinsurgency require critical thinking and defy solution by checklist and battle drill methodologies. When commanders and staffs use them properly, and when they are tied to operational and strategic purposes, lines of operation and effort are means to help commanders and staffs perform successful counterinsurgency operations. Figure 7-2 provides examples of possible tasks on each line of effort. However, commanders and staffs must remember that these are sample lines of effort and sample tasks on the lines of effort. Just as the individual lines of effort must meet the situation commanders and staffs find themselves in, tasks on a lines of effort must fit an operational environment and its desired end states. (See figure 7-2.)
3-24
95
Planning and Operational Considerations Figure 7-2. Sample of individual lines of effort
3-24
96
Chapter 7 DEVELOP SIMPLE, FLEXIBLE PLANS THROUGH MISSION ORDERS 7-31. Effective plans and orders are simple and direct. During insurgency and counterinsurgency operations, not all participates will understand military language and terms. Staffs must be careful to prepare clear, concise orders that communicate to all organizations involved a clear understanding of the operation using operational terms and symbols that are understood by all or enabling understanding through liaisons or other coordination means. 7-32. Flexible plans help participates adapt quickly to changing circumstances. Commanders and planners build opportunities for initiative into plans by anticipating events. This allows them to operate inside of the enemy’s decision cycle or to react promptly to deteriorating situations. Identifying decision points and designing branches ahead of time—combined with a clear commander’s intent—help create flexible plans. 7-33. Commanders stress the importance of using mission orders as a way of building simple, flexible plans. Mission orders are directives that emphasize to subordinates the results to be attained, not how they are to achieve them (ADP 6-0). Mission orders clearly convey the unit’s mission and the commander’s intent. Mission orders provide subordinates information on what to do and the purpose of doing it, without prescribing exactly how to do it. 7-34. +Commanders must also give guidance concerning risk when they issue mission orders. It is the responsibility of commanders and staff to assess tactical and operational risk. Moreover, they should ensure their forces are using techniques that take safety into account. That said, tactical initiative that supports mission accomplishment should never be sacrificed because of safety. An over focus on safety undermines the needed aggressive behavior to attack the enemy and take the needed risk to maintain contact with the population. However, informing decisionmakers of hazards, recommended controls (resources), and residual risk allows responsible individuals to weigh benefit against risk, direct resources to best mitigate the risk, and employ forces in the most efficient manner. (See ATP 5-19 for details on the risk management process and processes for integrating the process in both deliberate planning and under real-time constraints.) TRANSITIONS 7-35. Transitions are fundamental to the planning and execution of any line of operation or effort. Transitions may occur as a result of both success and failure in terms of friendly actions, host-nation actions, and adversary actions. There are four types of transitions in counterinsurgency operations: * Transitions between changes in the environment. * Transitions between phases. * Transitions between units in an area of operations. * Transitions of responsibilities to host nation or other agencies. 7-36. Transitions are critical events. They are critical because they represent significant changes to the situation and because a failure to properly execute them can stall or even negate progress. Whatever their nature, transitions are milestones that require reassessment. Even if a transition is a result of success, such as moving forward in phases, it is a cause to assess whether the basic assumptions and plans associated with the next phase are still appropriate and relevant. In counterinsurgency, in addition to possible transitions due to enemy actions, the commander and staff base transitions on changes in the population’s perception of legitimacy. Because transitions are based on the conditions of an operational environment, they must be a part of both the planning process and based on assessments of an operational environment. Transitions in counterinsurgency are essential because they generally measure progress towards the desired end state. However, the commander must link transitions to an assessment process that allows that commander to attain situational understanding. A transition to another phase or a transition to the host nation not linked to the assessment process can undermine the achievement of the end state. For example, a transition to a host-nation agency before that host-nation agency is ready to assume responsibility may ultimately have the effect of undermining the legitimacy of the host nation as the host nation fails to meet the basic expectations of the population.
3-24
97
Planning and Operational Considerations 7-38. Transitions and assessments should be planned and executed from the beginning of any counterinsurgency. Commanders can build legitimacy by ensuring that the host nation takes responsibility for basic functions when it can. Therefore, building towards and executing that transition to the host nation is fundamental to the commander’s planning and operations. Transitions to other units or other agencies maintain a coherent and logical progression towards an ultimate transition to the host nation. The commander avoids allowing any U.S. element to transition with another U.S. or multinational element in a way that sets back the mission. This is also true for transitions between phases. A transition to another phase before the operational environment allows can have disastrous consequences. 7-39. Effective counterinsurgency is about effectively linking tasks to a purpose and achieving that purpose. This is what makes lines of effort effective planning tools for a counterinsurgency. Whether commanders and staffs are using direct or indirect methods, they must link those methods to an end state. However, linking both assessments and transitions into each line of effort is just as essential. The end state of every line of effort is the creation of the conditions that satisfy the requirements of mission accomplishment. (See figure 7-2 on page 7-9.) In counterinsurgency, ultimate success comes when a society maintains its own legitimate government and defeats its insurgency using its own resources, not through outside enablers. Transitioning to that point requires a well planned effort that evaluates progress and executes all transitions in a way that does not undermine the objective of the line of effort. (See chapter 12 for a further discussion on assessments.) 7-40. A transition is a sequence of actions required to reorient on a changed situation, change to the next phase of action, or shift responsibility from one organization to another, not a specific point in time. Transitions require adequate time to allow for all transitional tasks to be completed. Thinking of a transition as a general series of actions rather than a point in time better aids commanders and staffs in recognizing transitions, planning for them, and executing them seamlessly. 7-41. When transitions occur between organizations, whether between military units or from a military unit to a civilian agency, all involved organizations must clearly understand the tasks and responsibilities being transferred and the time expected for completion. Commanders and staffs enable coordination between units, agencies, and organizations to reduce the friction normally associated with a transition. Commanders identify a collaborative transition planning team early in the process. 7-42. Commanders and staffs identify the criteria and conditions that must be met prior to executing a transition. For example, transitioning a strongpoint to host-nation control may require the host nation to allocate specialized personnel to replace the specialized personnel previously provided by other forces. Additionally, host-nation manning may need to be increased to offset the departure of transitioning forces. Commanders identify criteria for all parties involved or gaps will develop in execution. One criteria is the minimum sustainable effort of the host nation prior to transition. Getting the host nation’s minimum sustainable effort right with the proper balance for sustained effectiveness and long-term maintenance may reflect a less than optimal solution from the perspective of the counterinsurgent, but any higher level of effort by the host nation may actually jeopardize the legitimacy of the host nation in the long term by being too heavy-handed or too costly. 7-43. Counterinsurgents must understand that transitions occur at varying times and locations based on the situation in a given area. A transition may be linear at the local level, but transitions may occur at multiple levels in the aggregate. For example, one battalion or brigade may have three village clusters in a build phase, one that has transitioned, and two that are in a clear phase without any geographic context. One host-nation security unit may be more advanced in training and equipping than another. As a result, counterinsurgent forces may have to tailor their approach on a daily basis depending on the area, village, or unit where they are operating. Success in counterinsurgency operations requires small-unit leaders agile enough to transition among many types of missions and able to adapt to change. (See chapter 9 for more information on the shape-clear-hold-build-transition framework.) 7-44. Maintaining unity of effort is particularly important during transitions, especially between organizations of different capabilities and capacities. Relationships tend to break down during transitions. A poorly executed transition affects the success of the mission and places the new unit at risk. Ego and unhealthy competition are often the greatest impediments to achieving an effective transition, and they increase unnecessary risks to Soldiers, Marines, and the mission. Commanders must set the tone for their forces to accomplish effective physical and contextual transitions.
3-24
98
Chapter 7 7-45. A successful transition is achieved when it is executed properly and in synchronization with all the relevant organizations, entities, and agencies. Planning for transitions is more than the identification of the events that govern phases and branches for planning. It requires a holistic framing to develop the full appreciation of the tasks, time, and resources required to execute effectively and efficiently in a counterinsurgency environment. Well-planned transitions require proactive analysis and continuous assessment during execution. Assessment of qualitative and quantitative criteria, supported by expert opinion, should inform the decision to transition. OPERATIONAL CONSIDERATIONS 7-46. There are certain operational considerations that have important consequences for planning and executing counterinsurgency operations. Currently, insurgencies are likely to be networked. This makes attack the network an essential operational consideration in understanding an insurgency and planning and executing a counterinsurgency. Other considerations include remote area considerations, border considerations, and basing. Counterinsurgency operations normally integrate information related capabilities with other capabilities, and information operations are essential to most operational approaches. This makes information operations uniquely important to counterinsurgents. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) ATTACK THE NETWORK 7-47. Attack the network operations can be essential in planning and an essential consideration for every step in the operations process. When an insurgency is deeply networked into a society, it is important that attack the network operations are integrated into planning, preparing, executing, and assessing operations. Networked insurgencies must be understood and attacked. 7-48. Attack the network operations provide the primary means to attack an insurgent network or enable a host-nation force to defeat a networked insurgency. As such, they must be integrated and used when counterinsurgents are facing a networked insurgency. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) 7-49. Attack the network operations consist of activities that employ lethal and nonlethal means to support friendly networks, influence neutral networks, and neutralize threat networks. Attack the network operations are conducted continuously and simultaneously at multiple levels (tactical, operational, and strategic) throughout the whole of government. Attack the network operations are constructed around six fundamentals: * Understand the mission. * Understand the operational environment. * Understand the networks. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) * Organize for the fight. * Engage the network. * Assess. 7-50. While listed sequentially, these actions occur continuously and simultaneously and are designed as an enhancement to planning processes and intelligence preparation of the battlefield/battlespace. Effective attack the network operations occur when operations and intelligence efforts are synchronized. Failure to synchronize efforts may hamper a unit’s ability to plan and operate in an efficient manner. 7-51. Attack the network operations predominantly support problem framing and mission analysis within planning. During the initial stages of planning, intelligence preparation of the battlefield/battlespace must include an analysis and graphical (geospatial) representation of an operational environment as a series of interconnected networks (friendly, neutral, and threat) in addition to weather, terrain, and civil considerations. Threats to mission accomplishment can be presented by any network, not solely threat networks.
3-24
99
Planning and Operational Considerations 7-52. Attack the network operations enable greater understanding of the human networks and those variables critical to insurgent and threat networks. Network mapping, charting, and social network analysis are intelligence products that can aid in refined analysis and course of action developments, bridge conceptual planning and detailed planning by visually depicting time sensitive intelligence and mission requirements, and provide a shared understanding of the operational environment and design. Additionally, these network analysis products assist commanders and staffs in recognizing dynamic and static network relationships for targeting to support mission accomplishment. The evaluation and measurement of targeting effects continually aid in refined understanding and provide potential follow-on targets to degrade threat and insurgent networks. 7-53. Attack the network operations require that commanders and staffs understand social networks. A social network analysis is a tool for understanding the organizational dynamics of an insurgency and how best to attack or exploit them. A social network analysis allows analysts to identify and portray the details of a network structure. It shows how an insurgency’s networked organization behaves and how that connectivity affects its behavior. A social network analysis allows analysts to assess the network’s design, how its members may or may not act autonomously, where the leadership resides, how leadership is distributed among members, and how hierarchical dynamics may mix or not mix with network dynamics. 7-54. Attack the network operations provide a construct to identify, define, and engage any network, regardless of its design. The framework for attack the network operations can be applied against any type or combination of adaptive networks. It allows leaders to effectively engage neutral and threat networks with the appropriate lethal or nonlethal targeting, once a network has been defined through information collection and analysis. It also provides a means to protect friendly networks. Assessments of targeting and the measurement of the effects on networks (friendly, neutral, and threat) in an operational environment assist the staff in providing further targeting recommendations in sustainment of lethal or nonlethal activities. 7-55. Attack the network operations are tactical, operational, and strategic operations that capitalize on or create vulnerabilities to neutralize the threat network’s ability to function and enable success of the operation. Adaptive networked threats present an enduring challenge to all military operations. Neutralizing them may require an attack the network approach that includes the following activities: * Support friendly networks. * Influence neutral networks. * Neutralize threat networks. Support Friendly Networks 7-56. Friendly network actions are intended to establish, reinforce, or set the conditions necessary for friendly networks to function effectively and increase capability. These operations also have indirect effects on threat networks, driving down their capabilities and altering the environmental conditions those networks require to survive and operate. Actions supporting friendly networks are intended to establish, reinforce, or set the conditions necessary for the host nation or civil authorities to function effectively, add capability, and increase capacity. 7-57. Commanders and staffs use all resources available, both Department of Defense (DOD) and non-DOD, in an area of operations to ensure a comprehensive approach to supporting and enabling friendly networks. Host-nation networks such as government agencies, local business or religious organizations, tribal or cultural communities, and educational institutions all have an impact on a population and can alter its perceptions. Commanders can affect these organizations positively, thus altering public perceptions in favor of supporting those organizations. This results in increased cooperation, support, and even active rebuttal of threat networks. (See paragraphs 1-47 and 1-48 for more information on comprehensive effort.) Influence Neutral Networks 7-58. Influence neutral networks activities include operations intended to alter the opinions and attitudes of a population segment through information, influence, presence, and conduct. These activities reflect the ability of friendly forces to operate within the cultural and societal norms of the local population while
3-24
100
Chapter 7 accomplishing the mission. They require legitimacy. Developing legitimacy requires time, patience, and coordinated, cooperative efforts across the operational area. Influencing neutral networks to be more favorably disposed to U.S. and host-nation objectives has indirect effects on threat networks by making the operational environment in which threat networks operate less hospitable to their formation, growth, and sustainment. Neutralize Threat Networks 7-59. Threat networks are typically the immediate concern for any unit arriving in an area of operations. These networks must be neutralized in order to protect friendly forces and populations while creating time and space for other attack the network operations. While local friendly networks are being bolstered, there is a period when host-nation capabilities are insufficient to address the threat. U.S. forces and multinational partners must take direct actions against threats, reducing their functionality and impact, in order to set conditions for supporting friendly networks and influencing neutral networks. The goal is to change the perceptions and behaviors of neutral audiences to support the achievement of U.S., multinational, and host-nation objectives. 7-60. A solid understanding of threat networks helps commanders engage those networks to achieve their desired end state. Knowledge of numerous characteristics of networks can assist in the engagement process. Conditions for network formation can help commanders and staffs understand the cognitive domain of networks. Knowing the strengths and types of links can help commanders determine whether or not they want to target or engage key nodes within networks or all known and potential nodes and actors of a network. 7-61. Attack the network operations require that commanders understand and integrate specific staffing requirements. Commanders and staffs integrate organic capabilities with enablers including, but not limited to, other government agencies, nongovernmental organizations (NGOs), intergovernmental organizations, law enforcement professionals, and theater-specific joint task force explosive ordnance disposal elements to conduct attack the network operations. OTHER OPERATIONAL CONSIDERATIONS 7-62. Operations that occur in three additional types of environments have important considerations for counterinsurgency. They include— * Remote area considerations. * Border considerations. * Basing. Remote Area Considerations 7-63. Operations in remote areas may be conducted in rural areas where a decentralized array of forces can be most effective. Operations in remote areas are generally conducted in insurgent-controlled or contested areas to establish pockets of popular support for the host-nation government and deny support to insurgents. These operations may be conducted to establish bases in unpopulated areas where insurgent forces have established staging areas, training areas, rest areas, logistic facilities, or command posts. Units operate in remote areas to interdict insurgent activity, destroy insurgent base areas, and demonstrate that the host-nation government has not ceded control to the insurgents. 7-64. Operations in remote areas are usually conducted in areas that are either under insurgent control or are contested. In these areas, ground or water modes of entry are often used, but air assault or parachute operations can be employed. These operations may use offensive tactics such as raids, reconnaissance in force, cordon and searches, hasty or deliberate attacks, and pursuit (or combinations of these tactics). Their purpose may be to— * Harass insurgents to prevent the buildup of personnel and logistic resources. * Isolate insurgents from their support. * Demonstrate support for the government and for the populace in the local area.
3-24
101
Planning and Operational Considerations * Expand controlled areas. * Destroy the insurgent force and its base complexes. 7-65. To the extent possible, the counterinsurgency force should include personnel indigenous to the operational area. The type of force employed, along with its host-nation counterpart (regular forces or paramilitary) depends on the objectives, characteristics of the area, attitude of the local population, political considerations, and the equipment and logistic support available. The size and composition of the host-nation unit is, in part, determined by the insurgent’s influence over the population and the government’s ability to recruit and develop an adequate local force. When the unit is recruited from local inhabitants, local leaders should be used even though their military ability may be limited. By using local leaders, assisted by advisors, better control and motivation are possible. Training, indoctrinating, and incorporating the local force into the governmental structure is facilitated by using local leaders. 7-66. Understanding the host nation’s population’s issues from their perspectives enables counterinsurgents to address the prerequisites of the insurgency and obtain local support for remote area operations. Success is more likely if— * A significant segment of the local population supports the program. * The host nation recruits local personnel for its remote area paramilitary or irregular force. * Host-nation forces conduct remote area operations to interdict infiltration routes in areas nearly devoid of people. In this case, U.S. and multinational elements and host-nation forces operate in a manner similar to that of the insurgents, but with access to superior sustainment resources. 7-67. In a rural environment, insurgents rely on friendly elements within the population to provide supplies and intelligence. Rural insurgents prefer to operate in regions providing plenty of cover and concealment, such as heavily forested and mountainous areas that hinder a counterinsurgency force from gaining access to them. Often operating from their own home or village, rural insurgents often move to camps if security does not permit them to remain at home. Insurgent camps are chosen with a view toward easy access to the target population, access to a friendly or neutral border, prepared escape routes, and good observation of a counterinsurgency force’s approach routes. When counterinsurgency operations force the insurgents from their preferred base camps, insurgents tend to establish camps in rugged inhospitable areas that are not easily penetrated. Like counterinsurgency in urban areas, remote counterinsurgency operations must focus on both locating and eliminating insurgents and on severing the supportive element of the population from providing supplies and intelligence to them. 7-68. Operations in remote areas typically call for use of combat outposts that are linked to the local population. Commanders and staffs consider three perspectives (the population, insurgents, and counterinsurgents) when choosing combat outpost locations. Establishing an outpost close to the local population does not serve to advance the counterinsurgency’s goals without certain factors. These include— * Gaining acceptance of the local civilian leadership. * Maintaining a constant presence in the community. * Maintaining constant communications with the local community to provide immediate emergency assistance. * Maintaining situational understanding and an awareness of any changes in the population’s patterns of life. This includes movement of outsiders (such as visitors, merchants, nomads, or seasonal labor). 7-69. Operations in remote areas may include civil affairs, defense support of civil authorities, intelligence, population and resources control, and advisory assistance operations. Most remote operations are long term and continuous. They are initially directed at disrupting the insurgent’s operations and then destroying the insurgent armed forces. Counterinsurgents destroy the insurgent infrastructure as quickly as possible. 7-70. Initially, strong combat and sustainment forces establish secure operational bases. Counterinsurgents may conduct remote area operations in areas with little or no population to interdict infiltration routes. Counterinsurgents make maximum use of special equipment to provide continuous coverage of suspected areas and routes. Firepower and combat forces, with air assault capabilities, should be prepared to quickly attack identified targets. Because remote area operations can stress the capability of land forces to make
3-24
102
Chapter 7 rapid responses, commanders can mitigate risk by coordinating with joint enablers for close air support, tactical airdrops, information collection, communications relays, and personnel recovery forces. Border Considerations 7-71. In a counterinsurgency environment, armed forces may be responsible for border security, and they may have to help other security forces with immigration, customs, and internal security operations. The specific threat level, however, may require combat-type border operations, particularly in remote areas. The threat level may require units or advisor teams to advise and assist host-nation forces assigned to prevent or interdict the infiltration of insurgent personnel and materiel across international boundaries. This method is a terrain-centric approach to combating an insurgency. The commander’s intent is to isolate insurgent forces from their external support and sanctuaries. Secondary purposes include locating and interdicting insurgent land infiltration routes, destroying insurgent forces and bases in areas adjacent to the border, and collecting and reporting information on insurgent capabilities and intentions. Border operations normally require restrictive control measures for populations and resources that are particularly annoying to tribal and ethnic border groups who do not recognize the international boundary. The host-nation government must make a continuing effort to physically and psychologically gain and maintain the loyalty of the affected population. 7-72. Designated border forces may be composed of border police and guards and may include paramilitary forces and regular armed forces with supporting or direct responsibility for portions of the national border or key internal routes to access other regions. Border operations are planned, conducted, and supervised from the national level, to the regional level, and finally through commanders at the local level. Border task forces are tailored units designed to meet requirements in their assigned areas. They should contain sufficient sustainment warfighting function and sustainment elements to support civil authorities’ operations for extended periods. 7-73. Tasks that may be performed in controlling the border include the following: * Security of populated areas. * Intelligence and counterintelligence operations. * Operation of authorized points of entry. * Refugee and internally displaced person control. * Enforcement of movement and travel restrictions. * Military information support operations. * Reconnaissance, surveillance, and target acquisition. * Attacks against insurgent forces. * Destruction of insurgent base areas. * Barrier and denial operations. 7-74. In a phase I insurgency, operations in border areas are normally a function of police, customs, and other government organizations. Armed and paramilitary forces may assist these organizations, particularly in remote areas. In phases II and III, denial of external support for the insurgency may require combat operations in border areas. These operations require close coordination and cooperation between the armed forces, paramilitary forces, and all government agencies involved. Attempts by insurgents to infiltrate can be mitigated through the use of biometrics to identify subversive activities and limit or disrupt insurgent mobility. (See paragraphs 4-70 through 4-75 for a discussion on the insurgency phases.) 7-75. Physically sealing a border may not be possible, since it could require the commitment of more government forces and materiel than overall resources permit. Intelligence must be gathered by all means available to determine the locations and extent of insurgent activities in border areas. 7-76. Commanders determine infiltration and exfiltration routes, support sites, frequency and volume of traffic, type of transportation, number and type of personnel, amount and type of materiel, terrain and traffic conditions, and the probable location of base areas and sanctuaries. Units conduct continuous and detailed surveillance of these areas. Since placing forces and barriers at all possible crossings or entry sites may be impossible, commanders establish priorities. Counterinsurgents use natural barriers wherever possible. Using patrols, sensors, and obstacles in selected areas increase the effectiveness of natural
3-24
103
Planning and Operational Considerations barriers. Herbicides, if approved for the area of operations, may be used to enhance visibility in vegetated areas. 7-77. A restricted zone is a carefully selected area, of varied width, that is contiguous to the border. Counterinsurgents give public notice that all unauthorized individuals or groups encountered in the restricted zone will be dealt with as infiltrators or insurgents. A friendly population buffer zone is an area in which civilians living within the area of operations are limited to those believed to be loyal to the government. Persons whose loyalty cannot be established are monitored. This concept offers a good potential for establishing information nets and using loyal citizens in self-defense border units. It denies insurgents potential civilian contacts and base areas for border-crossing activities. Commanders and staffs direct a continuing military information support operation effort toward maintaining the morale and loyalty of the population. 7-78. Counterinsurgents may employ aerial reconnaissance, unattended ground sensors, and ground reconnaissance patrols to ensure adequate reconnaissance and surveillance of remote areas. Surveillance and control of extensive coastal areas normally require the use of coordinated ground patrols on the shoreline, coordinated offshore patrols, aerial surveillance, strategically located observation posts, and an effective system of licensing and identifying friendly, military, and civilian watercraft. 7-79. Commanders and staffs must consider the population of the host nation’s neighbor country. Counterinsurgent actions will be viewed and interpreted by local populations in neighboring countries. Counterinsurgents must consider the impact their actions have on these populations. If the neighboring local populations sympathize with host-nation insurgents or believe that counterinsurgent programs are counterproductive to their individual goals, then negative perceptions can lead to increased foreign fighters, weapons, and resource trafficking to support an insurgency. Counterinsurgents lack the physical means to influence this population, but they can mitigate risk by performing effective information operations that explain counterinsurgent programs and their benefits. Basing 7-80. Counterinsurgency forces operate within a host country and must have a base from which to operate. A base is a locality from which operations are projected or supported (JP 4-0). All bases must be securable and defendable. Bases vary according to the size and missions of the units occupying a base. All types of bases require clear command relationships. In counterinsurgency operations, forward operating bases and combat outposts are important. 7-81. Normally, when U.S. forces are the primary counterinsurgents, at least one forward operating base exists in an area of operations. The size of the area, its physical characteristics, and the number and size of the units operating within the area often require additional operating bases. The forward operating bases established by a brigade or battalion are often semipermanent and provide deployed units with command, control, and communications facilities; sustainment; personnel systems support; staging areas; and intelligence activities. They provide units with relatively secure locations from which to plan and prepare for operations. During counterinsurgency operations, they aid in limiting insurgent mobility nearby and in providing some security and contact to the local population. 7-82. There are a few differences between brigade and battalion forward operating bases. Brigade forward operating bases are larger than battalion forward operating bases and provide a secure location for nondeployed elements of the deployed battalions, such as battalion forward support companies. A battalion forward operating base is normally staffed with the minimum personnel needed to operate and provide security. Other assets are normally positioned in a brigade operational base. A battalion forward operating base should maintain two methods for sustainment: by road and either air or water. 7-83. A combat outpost is a reinforced observation post capable of conducting limited combat operations (FM 3-90-2). In counterinsurgency operations, combat outposts are often company and platoon-sized bases inside of insurgent influenced territory. When U.S. forces are acting as the primary counterinsurgents, combat outposts represent a cornerstone of counterinsurgency operations. Located in strategically important areas, a combat outpost provides security in its immediate area and direct contact with the local population not possible from remote bases. Although this method carries with it potential downsides in
3-24
104
Chapter 7 terms of increased proportion of forces used for force protection, thus limiting combat power available, combat outposts provide an increase in security for the population. INFORMATION OPERATIONS 7-84. Information operations is the integrated employment, during military operations, of information-related capabilities in concert with other lines of operations to influence, disrupt, corrupt, or usurp the decisionmaking of adversaries and potential adversaries while protecting our own (JP 3-13). For the Army, information operations integrates information related capabilities into the overall operational approach. The joint and multinational communities continue to use the term information operations. The joint construct for conducting information operations is the information-influence relational framework. The framework describes the application, integration, and synchronization of information-related capabilities to influence, disrupt, corrupt, or usurp the decisionmaking of target audiences to create a desired effect to support achievement of an objective. An information-related capability is a tool, technique, or activity employed within a dimension of the information environment that can be used to create effects and operationally desirable conditions (JP 3-13). (See Army doctrine for more information on integrating information-related capabilities.) 7-85. A target audience is an individual or group selected for influence (JP 3-13). Information operations seek to generate effects against the decisionmaking of individuals, a group, or perhaps elements of a population. In general, the integration of information-related capabilities is most effective when employed against precisely selected targets to achieve clearly defined objectives. 7-86. Information-related capabilities generate effects that support achievement of the commander’s objectives. There are many military capabilities that contribute to operations, and commanders and staffs should consider them during the planning process. Some of these capabilities are: * Soldier and key leader engagement. * Civil-military operations. * Cyberspace operations. * Military deception. * Electronic warfare. * Operations security. * Military information. * Physical attack. * Physical security. * Counterintelligence. * Public affairs. * Combat camera. * Defense support to public diplomacy. * Space operations. * Special technical operations. * Intelligence. * Joint electromagnetic spectrum operations. * Information assurance. 7-87. A commander can use many other capabilities to enhance and reinforce the shaping of the area of operations and the accomplishment of mission objectives in the information environment. (See JP 3-13 for additional information on the use of information-related capabilities.) 7-88. Information-related capabilities, whether applied in shaping the operational environment to deter conflict or in enabling decisive maneuver, must be recognized as an essential enabling activity that facilitates development of an operational advantage for the commander. In current and future operational environments, the integrated employment of information-related capabilities into operations is critical to mission success. (See the Marine Corps operating concept for information operations for more information on information-related capabilities.)
3-24
105
Planning and Operational Considerations 7-89. The actions of Soldiers and Marines in an area of operations are the most powerful influence on credibility of their commanders’ message. All audiences (including local, regional, and threat) compare the friendly force’s message with its actions. Consistency contributes to the success of friendly operations by building trust and credibility. Conversely, if actions and messages are inconsistent, friendly forces lose credibility. Loss of credibility makes land forces vulnerable to threat counter propaganda and information warfare and places Army and Marine forces at a disadvantage. (See FM 3-13 for more information on messaging.) 7-90. Commanders, staffs, and unified action partners construct a narrative to help understand and explain an operational environment, its problem, and solutions. Narratives are tied to actions in an operational environment. A narrative is a brief description of a commander’s story used to visualize the effects the commander wants to achieve in an information environment to support and shape an operational environment. 7-91. The key to successful information operations during an insurgency is the commander’s intent. The commander’s intent provides a focus for the coordination and synchronization of information-related capabilities. Staffs and information operations planners must balance the use of different information-related capabilities, such as civil affairs operations, physical attack, and cyberspace operations, in order to communicate the intended message to the target audience with an understanding of possible second and third order effects on the rest of the global population. 7-92. When commanders and staffs use the various types of information capabilities, there is a tension between a broad message and engaging the population to achieve a two way understanding. The U.S. is generally involved in counterinsurgencies to aid host nations. As such, commanders and staffs integrate information capabilities with the host nation’s message to tell the population the reason for U.S. involvement. Commanders and staffs have to establish relationships, seek two-way understanding, and listen to what others think. Effective counterinsurgency normally requires an effective broad message and engaging the population in a dialogue. Commanders and staffs must find the right balance between using information capabilities to give a broad message versus creating a dialogue. 7-93. Commanders and staffs balance between controlling the message and allowing for complete freedom of messaging. Having a perfectly controlled message does not allow for real, timely communication with a population. Leaders must have some ability to actually engage a population and create a shared understanding. However, if representatives of a command have total freedom of message, the population is bombarded with contradictions and inconsistencies. Commanders and staffs must find the right balance to allow real communication, but also to ensure that the command has a coherent message. 7-94. Public affairs and information operations are separate but related functions. Public affairs are those public information, command information, and community engagement activities directed toward both the external and internal publics with interest in the Department of Defense (JP 3-61). External publics include allies, neutrals, and threats. When addressing external publics, opportunities for information overlap exist between public affairs and information operations. 7-95. Information operations and public affairs personnel must maintain a common awareness of each other’s support to operations to preclude the potential for information conflict. The information operations cell provides an excellent place to coordinate and deconflict information operations and public affairs activities that could result in information fratricide. Information fratricide is the result of employing information-related capabilities in a way that causes effects in the information environment that impede the conduct of friendly operations or adversely affect friendly forces (FM 3-13). Final coordination of public affairs and information operations must occur within the operations process. 7-96. In a counterinsurgency, the insurgent often targets the U.S. population with themes and messages concerning the insurgency. There are legal and professional reasons why the armed forces cannot attempt to influence American public opinion; to do so would undermine civil control over the military. However, the military has a responsibly to provide information to the U.S. public. Transparency and truthful information allows policy decisions to be debated between decisionmakers and the public. Although providing that information during an insurgency is a responsibility of the military, trying to influence the actual debate is unethical and damages the military’s relationship with the society.
3-24
107
Chapter 8 Intelligence 8-1. Intelligence must drive operations in a counterinsurgency. Commanders and staffs must understand the area of operations in a counterinsurgency. The insurgency in Peru demonstrates that intelligence capabilities can be integrated with information operations and integrated monetary shaping operations to successfully undermine an insurgency. The Peruvian government was eventually successful in using economic development and an information campaign to weaken the Shining Path insurgency. With the gradual development of an effective military, Peru was able to continue its success. Intelligence, resulting in the capture of the Shining Path’s leader, changed the nature of the insurgency and significantly reduced the threat of the Shining Path to Peru. Intelligence and the Shining Path Peru suffered an unprecedented economic downturn in the 1970s and 1980s. The Peruvian government, though democratic, was characteristically ineffective and unable to stem the worsening crisis. This opened the door for an insurgent organization, the Sendero Luminoso (Shining Path), and its establishment of alternative governance structures in the economically devastated Peruvian highlands. Sendero Luminoso leaders purged local officials and established their own authority in the villages, beating back control efforts by the Peruvian police. In the first few years of the insurgency, the government did not take the threat seriously. Opposition to the insurgents (such as it was) was organized by local police, and the government made no effort to improve the desperate socioeconomic conditions in the highlands or to define a clear mission for regional security forces. With its superior organization and a lack of effective response by the government, Sendero Luminoso made significant progress. Its operations and propaganda were coordinated to create the perception that the group was a “winner” and was meeting its Maoist strategic goals, in sharp contrast to the largely ineffective government. Still plagued by a lack of internal unity both in the government and in the military, the state moved forward with two competing counterinsurgency strategies: one focused on development and the other focused on ideology and military force. First proposed in 1984, the developmental approach finally got its turn in 1985. The state recognized that the highlands were particularly hard hit by the economic crisis and were the heartland of the insurgency, so its goal was to increase development and job opportunities in these regions. Public investment in Ayacucho (a region in the southern highlands) quadrupled between 1985 and 1986. Unfortunately, the insurgents actively resisted this development, or co-opted it, forcing government teachers to include Sendero Luminoso materials in their curricula. The government did not provide the security necessary for development to have any effect. Subsequent to 1986, development funding fell off, and embezzlement became common. As a result, this initial push of development and investment fell far short of meeting the needs of the economically disadvantaged population in the highlands. The election of Alberto Fujimori in June 1990 raised new hopes of resolving the conflicts within the government and making greater headway against the insurgents. Fujimori promised a better human rights record and a new commitment to development. In addition to renewed government legitimacy, the Fujimori administration also brought two significant improvements to Peru’s approach to counterinsurgency: first, the use of the police and the national intelligence service to track the movements of Sendero Luminoso sympathizers and attempt to infiltrate the group and, second, the arming of rondas, peasant civil-defense militias. These
3-24
108
Chapter 8 rondas were possible only because the insurgents’ treatment of villagers in its areas of operation had become so harsh that the locals were finally pushed to stand up for themselves. Improved intelligence and an end to internal divisions within the military allowed effective engagement of insurgent forces and effective (and rapid) support to threatened rondas. For the first time in the conflict, the government, police, and military made effective use of what would now be called strategic communication, with a greater emphasis on government credibility, consistency between actions and messages, and significant efforts to woo the population in the highlands away from the insurgents (efforts of which the rondas were an integral part). In 1992 good intelligence led to Abimael Guzmán’s (the leader of Sendro Luminoso) capture. The capture of Guzman changed the ongoing insurgency and significantly undermined insurgent efforts. At the time of his capture, the police seized Guzmán's computer, in which they found a very detailed roster of his armed forces and the weapons each formation had in each region of the country. His authoritarian management of Sendero Luminoso had proven very effective when he was at large, but when he was captured, it provided a wealth of information. This information was used for further operations. INTELLIGENCE FUNDAMENTALS 8-2. Intelligence is the product resulting from the collection, processing, integration, evaluation, analysis, and interpretation of available information concerning foreign nations, hostile or potentially hostile forces or elements, or areas of actual or potential operations (JP 2-0). Intelligence can be broken down into seven disciplines, and it is an enabler of any counterinsurgency effort. Each discipline provides a means for the counterinsurgent to gain a higher level of situational understanding. These disciplines include counterintelligence, human intelligence, geospatial intelligence, measurement and signature intelligence, open-source intelligence, signals intelligence, and technical intelligence. The intelligence disciplines are integrated to ensure a multi-disciplined approach to intelligence analysis. Ultimately all-source intelligence facilitates situational understanding and supports decisionmaking. All intelligence disciplines are important in counterinsurgency. However, this chapter will focus on elements of intelligence that have unique considerations in counterinsurgency. (See ADRP 2-0 for more information on intelligence.) 8-3. An essential part of understanding the operational environment is the process of intelligence preparation of the battlefield/battlespace. Intelligence preparation of the battlefield/battlespace is a systematic process of analyzing and visualizing the portions of the mission variables of threat/adversary, terrain, weather, and civil considerations in a specific area of interest and for a specific mission. By applying intelligence preparation of the battlefield/battlespace, commanders gain the information necessary to selectively apply and maximize operational effectiveness at critical points in time and space (FM 2-01.3/MCRP 2-3A). (See FM 2-01.3/MCRP 2-3A for more information on intelligence preparation of the battlefield/battlespace.) In a counterinsurgency environment, intelligence preparation of the battlefield/battlespace must take into account operational environment considerations. (See chapter 2 for considerations about the operational environment and chapter 4 for considerations on analyzing an insurgency.) 8-4. Culture is an element of the operational environment and, like the physical terrain, creates both opportunities and challenges for Soldiers and Marines. A nation’s culture is a set of complex, ever-changing, and interconnected social, historical, political, and environmental factors that shape the perceptions, motives, and behaviors of its population. Cultural intelligence is the analysis and understanding of groups of people and the reasons they do certain things. Cultural intelligence includes gaining an understanding of the mindset of a local population to support the commander’s decisionmaking and help drive operations. (See chapter 3 for more information on culture.) 8-5. The counterinsurgency force must understand the cultural foundations of the operational environment in order to transform seemingly random and irrational activity into describable and semipredictable acts. Commanders and staffs must devote as much effort to understand the local population being supported as they do to understand the insurgents. Cultural intelligence requires historical perspective as well as collection and analysis of current information, because cultures and cultural factors are
3-24
109
Intelligence consistently shifting. Periods of warfare, instability, and natural disasters increase the rate of cultural change within a society. 8-6. Also, cyberspace is an essential domain for the gathering of intelligence in a counterinsurgency. Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers (JP 1-02). The commander and senior intelligence officer must be highly aware of the intelligence oversight implications of collecting against United States (U.S.) persons, as the distinction of citizenship is difficult to assess in cyberspace. The distinction is required because intelligence collection is enabled by and must comply with all applicable U.S. laws and policy. However, cyberspace is used by insurgents and cannot be ignored by counterinsurgents. Cyberspace and the technologies that enable it allow people of every nationality, race, faith, and point of view to communicate, cooperate, and prosper like never before. Some adversaries clearly understand the power of cyberspace. Terrorists employ the Internet for recruiting, training, motivating, and synchronizing their followers. Adversaries frequently operate in cyberspace unrestrained, and they exploit its potential. To be effective in defeating an insurgency, commanders and staffs must gather intelligence on how an insurgency is using cyberspace. ALL-SOURCE INTELLIGENCE 8-7. The Army defines all-source intelligence as the integration of intelligence and information from all relevant sources to analyze situations or conditions that impact operations. (See ADRP 2-0.) The joint force defines all-source intelligence as intelligence products and/or organizations and activities that incorporate all sources of information in the production of finished intelligence (JP 2-0). All-source intelligence is used to develop the intelligence products necessary to aid situational understanding, support the development of plans and orders, and answer information requirements. Although all-source intelligence normally takes longer to produce, it is more reliable and less susceptible to deception than single-source intelligence. Intelligence organizations fuse data and information into all-source intelligence products to support counterinsurgency operations. Analysis for counterinsurgency operations is challenging, due in part to the— * Need to understand perceptions and culture. * Need to track hundreds or thousands of personalities. * Local nature of insurgencies. * Tendency of insurgencies to change over relatively short periods of time. 8-8. Commanders and staffs need data to analyze and synthesize insurgent activities and personalities. Intelligence staffs should create a common searchable combatant command database of insurgent actions and personnel, and another database(s) that provides discoverable, accessible, and retrievable data on insurgent actions and personnel, and provide similar access to all intelligence reporting. This data should be accessible by analysts both in and out of the theater as well as conventional, special operations forces, and multinational units. 8-9. Because all echelons collect and use intelligence, all staffs are heavily involved in analysis. Units are simultaneously intelligence producers and consumers. Intelligence capabilities are normally greater at higher echelons of command. For example, battalion staffs have fewer personnel than brigade staffs to collect patrol debriefs, analyze incoming information from multiple sources, produce finished intelligence products, and disseminate products to appropriate consumers. In many cases, brigade intelligence sections may be inadequately staffed to handle the vast amounts of information necessary to conduct operations in a counterinsurgency environment. 8-10. Counterinsurgency requirements may require pushing analysts to battalion and brigade staffs to give those echelons the required analytical support. Often analysts can be beneficial at the company level. In these cases, developing company intelligence support teams may be useful. Many maneuver company commanders organize small intelligence support teams from within their units to provide tailored intelligence products to the company leadership. They may receive augmentation from the brigade military intelligence company or other intelligence Soldiers and Marines to form the nucleus of a company intelligence support team. The company intelligence support team combines information gained from
3-24
110
Chapter 8 company operations with intelligence received from adjacent and higher units. The team analyzes and reports information collected by the company while receiving, parsing, and reporting intelligence collected by other organizations. The battalion intelligence cell is responsible for integrating the various company reports into intelligence products. This is particularly useful when a maneuver company must collect large amounts of information on the local population and insurgents. A company intelligence support team can help focus collection, process information collected, and develop a common operational picture of an area of operations. Pushing analysts to brigades and lower echelons places analysts closer to collectors, improves the common operational picture, and helps higher echelon staffs receive answers to the commander’s priority intelligence requirements. Commanders may need to be creative in developing analytical capabilities within their units. Though it is not ideal, commanders can assign non-intelligence personnel to work in the intelligence section. (See TC 2-19.63 for more information on company intelligence support teams). 8-11. In a counterinsurgency, a bottom-up flow of intelligence is important. Battalions and brigades develop intelligence for their area of operations. Higher echelons fuse it into intelligence of the insurgency throughout the combatant command. Higher echelons can also integrate the human intelligence that battalions and brigades receive with the other intelligence disciplines. Comprehensive insurgency analysis focuses on the people in the area of operations. It develops information about relationships among them and the ideas and beliefs driving their actions. Comprehensive insurgency analysis brings together all other forms of analysis. FUSION CENTERS 8-12. A fusion center is an ad hoc collaborative effort between several units, organizations, or agencies that provides resources, expertise, information, and intelligence to a center with the goal of supporting the rapid execution of operations by contributing members. Fusion centers are primarily designed to focus collection and promote information sharing across multiple participants within a specific geographic area or mission type. These centers are not operations centers. Commanders at various echelons create fusion centers to manage the flow of information and intelligence, focus information collection to satisfy information requirements, and to process, exploit, analyze, and disseminate the resulting collection. Fusion centers are most effective if they have participation from all the key elements in an area of operations and representatives from all the warfighting functions. When possible, fusion centers include unified action partners. The intelligence portion of a fusion center typically comprises intelligence representatives from different tactical echelons, interagency partners, multinational organizations, host-nation organizations, and nongovernmental organizations (NGOs) operating in the area of operations. (See ADRP 2-0 for more information on fusion centers.) 8-13. In a counterinsurgency, commanders and staffs must create shared situational understanding. Fusion cells are important in creating this understanding. The mixture of personnel and expertise allows for the integration of information and analysis. This is an effective means of understanding the operational environment from multiple perspectives. Fusion cells aid in understanding intelligence and informing operations to avoid unintended consequences. HUMAN INTELLIGENCE 8-14. Human intelligence is the collection by a trained human intelligence collector of foreign information from people and multimedia to identify elements, intentions, composition, strength, dispositions, tactics, equipment, and capabilities (FM 2-22.3). For the joint force, human intelligence is defined as a category of intelligence derived from information collected and provided by human sources (JP 2-0). Because insurgency and counterinsurgency are struggles for legitimacy, human intelligence plays a vital role in determining legitimacy. Human intelligence uses human sources for information collection and uses a variety of collection methods, both passive and active, to collect information to meet intelligence requirements and inform other intelligence disciplines. Interrogation is one of the human intelligence tasks, along with screening, debriefing, liaison, and conducting controlled source operations in support of Army operations. During counterinsurgency operations, a great deal of intelligence is based on information gathered from people. However, military source intelligence operations are only conducted by human intelligence collectors. A human intelligence collector is a person who is trained to collect information
3-24
111
Intelligence from individuals for the purpose of answering requirements. (See FM 2-22.3 for more information on human intelligence.) 8-15. Operational reporting may have information of intelligence value that originates from a local population. People may approach Soldiers and Marines during the course of their day-to-day operations and offer information. Soldiers and Marines record information and report it to the intelligence section. This allows for verification of information and establishes a means for human intelligence collectors to contact individuals offering information of value. 8-16. People offering information on insurgents are often in danger as insurgents continuously try to defeat collection operations. Commanders ensure that the appropriate personnel are trained in handling human sources in accordance with Army, Marine Corps, and Department of Defense (DOD) standards and policies. Human intelligence collectors are trained in procedures that limit risks to sources and handlers. Counterinsurgents should not expect people to willingly provide information if insurgents have the ability to violently intimidate sources. Human intelligence reporting increases if counterinsurgents protect the population from insurgents and people begin to believe the insurgency is defeated. 8-17. People often provide inaccurate and conflicting information to counterinsurgents. They may spread rumors or provide inaccurate information for their own reasons. For example, people may give inaccurate information to settle tribal, ethnic, or business disputes. The accuracy of information obtained by Soldiers and Marines is verified before using it to support operations. This means that information reported to patrols should be verified with all-source intelligence. Improved accuracy will come from collecting intelligence from the whole population. Information must be seen as part of a whole picture and parts or segments of information cannot override the whole picture. An important part of gaining access from the whole population is gaining access to restricted populations. These populations often include women, but they can include any element that the counterinsurgent cannot access because of cultural considerations. Restricted access teams may be helpful in ensuring that information is attained from the whole population, including women. COUNTERINTELLIGENCE 8-18. Counterintelligence also uses human sources to assist in collection of information on foreign intelligence, international terrorist, or insider threat activities that may threaten the counterinsurgency. Counterintelligence efforts may be directed toward assisting commanders in detecting and neutralizing the insider threat by ensuring that counterinsurgency operations are not compromised by adversaries operating inside a base. Counterintelligence operations, including the use of humans as sources, must be accomplished by trained counterintelligence special agents. INFORMATION COLLECTION AND INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE 8-19. Information collection is an activity that synchronizes and integrates the planning and employment of sensors and assets as well as the processing, exploitation, and dissemination of systems in direct support of current and future operations. The deputy chief of staff, (G-2 [S-2]) and assistant chief of staff, operations (G-3 [S-3]) staffs collaborate to collect, process, and analyze information the commander requires concerning threats, terrain and weather, and civil considerations that affect operations. The information collection tasks are— * Plan requirements and assess collection. * Task and direct collection. * Execute collection. (See FM 3-55 for more information on information collection and planning requirements and assessing collection.) 8-20. Intelligence, surveillance, and reconnaissance provides commanders with detailed and timely intelligence. This intelligence helps commanders gain situational understanding of a threat and an operational environment. This is accomplished by answering requirements focused in time and space and identifying any threats to mission accomplishment. The intelligence staff provides commanders with predictive assessments of threats, terrain and weather, and civil considerations. These assessments also
3-24
112
Chapter 8 provide commanders with a running estimate regarding the degree of confidence the staff places in each analytic assessment. A running estimate is the continuous assessment of the current situation used to determine if the current operation is proceeding according to the commander’s intent and if planned future operations are supportable (ADP 5-0). INTELLIGENCE-RELATED CAPABILITIES 8-21. Commanders and staffs consider several capabilities for intelligence in a counterinsurgency. They include— * Biometrics and biometric-enabled intelligence. * Forensics and forensic-enabled intelligence. * Site exploitation. Biometric-Enabled Intelligence 8-22. Understanding biometrics-enabled intelligence requires knowledge of biometrics and its contribution to Army and Marine Corps missions. The term biometric describes both a characteristic (biometric) and a process (biometrics): * A biometric is a measurable physical characteristic or personal behavior trait used to recognize the identity or verify the claimed identity of an individual. * Biometrics is the process of recognizing an individual based on measurable anatomical, physiological, and behavioral characteristics (JP 2-0). 8-23. The Army and Marine Corps employ automated biometric systems to deny threat forces any freedom of movement within the population and to positively identify known threats, threat forces, friendly populations, local nationals, and third-country nationals throughout their areas of operation to separate insurgents and foreign fighters from the general population. Biometric systems collect biometric data, such as iris images, fingerprints, and facial images, and combine them with contextual and biographic data to produce an electronic dossier on an individual. Automated biometric systems may support the following tasks: * Positively identify high-value targets. * Screen and badge personnel. * Manage the population. * Perform force protection (local access). * Conduct detention operations. 8-24. Biometrics are important assets in any counterinsurgency operation. These tools allow the counterinsurgent to gain both civil security and control. Through positive identification, biometrics allow the counterinsurgent to effectively execute offensive operations against the insurgency while at the same time protecting the civilian population by not detaining innocent civilians. If used correctly, biometrics allow the counterinsurgent to effectively execute offensive operations against the insurgency and protect the population. Moreover, the host nation can be enabled with these capabilities. Biometric abilities can be essential in building legitimacy among the population. (For more information on biometrics, see FM 2-22.3, ATTP 2-91.6, TC 2-33.4, and TC 2-22.82.) Forensic-Enabled Intelligence 8-25. Although not an intelligence discipline, police intelligence operations can support the overall intelligence effort through the analysis, production, and dissemination of information collected from police activities. Information gathered from military police operations may contribute to a commander’s critical information requirement and focusing police forces on maintaining order. Criminal acts such as robberies, kidnappings, terrorism, and extortion may be linked to insurgent psychological or money-gathering activities. Police information, police intelligence, and criminal intelligence are subtasks of police intelligence operations. (See ATTP 3-39.20 for additional information on law enforcement.)
3-24
113
Intelligence 8-26. Forensics involves methodically gathering and analyzing evidence to establish facts that can be presented in a legal proceeding. It applies multidisciplinary scientific processes to establish facts. Forensics operations, to include site and document exploitation, further aid the positive identification efforts of a counterinsurgent and help to separate insurgents from the general population, thus contributing to overall situational understanding. Commanders and staffs should make every effort to operate within status of forces agreements and combatant command requirements. (See ATTP 2-91.6 for more information on forensics.) 8-27. For example, latent fingerprints discovered on pieces of improvised explosive devices provide critical information that analysts need to link individuals, insurgent organizations, their capabilities, and their activities. Forensics that includes site exploitation and forensic documents is of great benefit to substantiating information if detainees are insurgents. The methods of forensics allow the counterinsurgent to work towards situational understanding. Site Exploitation 8-28. Site exploitation is a series of activities to recognize, collect, process, preserve, and analyze information, personnel, and/or materiel found during the conduct of operations (JP 3-31). When countering an insurgency, site exploitation of an insurgent location is essential. Computers, cell phones, and other means of communication and storing information are vital to understanding the insurgent structure. 8-29. Site exploitation uses the full range of resources at the commander’s disposal, starting with the Soldier’s basic cognitive skills to sophisticated analytical processes conducted by joint, interagency, and intergovernmental organizations. Exploitation operations provide answers to the commander’s information requirements regardless of whether the information was gained by a squad on patrol or through external sensor platform outputs. 8-30. Site exploitation may require additional technical expertise not resident within the theater to process the collected information, material, and personnel to maintain their unique physical or forensic attributes. Detailed technical exploitation of collected items can divulge actionable information or intelligence that can be used to positively identify any unique threat characteristics or threat networks for follow-on actions. 8-31. Knowledge management enables the effective dissemination of actionable information and intelligence to units for their integration into the intelligence, targeting, and operations processes. This facilitates follow-on operations and enhances commanders’ and staffs’understanding.
3-24
115
Chapter 9 Direct Methods for Countering Insurgencies 9-1. The direct method of using United States (U.S.) land, maritime, and air forces in a decisive action role is resource intensive when done on a large scale, but it is often necessary to fully support a counterinsurgency effort. A direct method may be used, for example, when the success of a host nation’s counterinsurgency efforts is critical to U.S. interests. The U.S. can use a direct method after or during a major conflict or when U.S. interests necessitate stability in a failed or failing state. Leaders can also integrate land forces into a host nation’s ongoing effort. Unfortunately, unintended consequences, such as increased tensions among segments of society or resistance to U.S. involvement, often accompany a direct approach. Leaders must carefully plan and execute operations before and during a direct response to avoid negative consequences. However, using direct capabilities remains a valid option and an important capability that the Army and Marine Corps provide the joint force. 9-2. The level of direct U.S. involvement can vary. In many cases, a host nation will be fully capable of providing security for its population. However, integration of fires or a direct action force could enable a host nation’s counterinsurgency efforts. The Army and Marine Corps bring many capabilities that can be integrated into a counterinsurgency effort. When counterinsurgents consider direct involvement, they should consider a wide spectrum of activities that range from a modest force conducting limited missions to a large force that could be, at least for a time, the primary counterinsurgency force. 9-3. The U.S. has a wide range of capabilities that it can use to create many different operational approaches to counter an insurgency. Direct involvement by U.S. forces can take place along a spectrum, from little direct U.S. involvement to U.S. forces acting as the primary counterinsurgents. If U.S. forces are acting temporarily as the primary counterinsurgents, the shape-clear-hold-build-transition framework forms a tactical and operational background for battalion and brigade operations. While the shape-clear-hold- build-transition framework must be enabled with other capabilities, such as security force assistance, the shape-clear-hold-build-transition framework provides a framework for how Army and Marine forces will defeat an insurgency at the tactical level. Moreover, this tactical background also creates a frame of reference for understanding actions by the host nation to defeat an insurgency. This understanding is essential in integrating U.S. capabilities into a host-nation effort. 9-4. Counterinsurgents should not think that all counterinsurgencies end the same way. The shape-clear- hold-build-transition framework provides a good framework for a protracted struggle. Counterinsurgencies are conducted using a wide range of different approaches. For example, the insurgency in Sri Lanka was fought using conventional tactics and ended in a traditional offensive operation. It ended in something that looked much more like a conventional offensive operation then an application of the shape-clear-hold- build-transition framework. In some cases, the government or insurgents can impose their impose their will and control the population. While counterinsurgents should remember that specific insurgencies are unique, for many insurgencies, the shape-clear-hold-build-transition framework is a starting point for understanding host-nation actions and then enabling those actions. SHAPE-CLEAR-HOLD-BUILD-TRANSITION FRAMEWORK 9-5. For a tactical and operational ground commander acting as the primary counterinsurgent commander, the shape-clear-hold-build-transition framework provides a foundation for detailed planning. Moreover, the shape-clear-hold-build-transition framework is well-suited to those commanders and staffs engaged in training, advising, or integrating capabilities into a host-nation effort. If a host nation is performing operations, whatever the U.S. role in the counterinsurgency, Soldiers and Marines must have a framework for understanding that host nation’s actions. Commanders and staffs cannot evaluate, advise, or train another force unless they have a base of knowledge on the operations being conducted. In many counterinsurgency efforts, a state will try to defeat insurgencies by performing a general operational
3-24
116
Chapter 9 approach that is similar to the shape-clear-hold-build-transition framework at the tactical level. While this is certainly not a uniform rule, having some framework in understanding another counterinsurgent’s actions provides a point of reference for understanding. Commanders and staffs must have an understanding of how to solve a particular problem before they advise or assist another commander solve that problem. Understanding the shape-clear-hold-build-transition framework is a fundamental framework for understanding what units are trying to accomplish in a counterinsurgency. This framework applies to all units involved in the counterinsurgency, including, for example, an infantry battalion directly performing actions, a member of a special forces team advising a host nation, or a member of a combatant command integrating and evaluating various security cooperation capabilities. 9-6. Whether U.S. forces are executing the shape-clear-hold-build-transition framework or another state is executing it, it can be very effective in defeating an insurgency. For example, in the Philippines, the government was successful in using the shape-clear-hold-build-transition framework, even if it was not called shape-clear-hold-build-transition by the counterinsurgents at the time. Commanders and staffs must understand the shape-clear-hold-build-transition framework to understand what a host nation is trying to achieve in its counterinsurgency efforts. This framework is used by U.S. and foreign forces. Shape-Clear-Hold-Build-Transition: The Huks The Hukbalahap, or “Huks,” were one of several guerilla organizations that appeared in the Philippines during the Japanese occupation of World War II. By the time of the country’s liberation from the Japanese occupation, the Huks were well-armed with weapons taken from the Japanese or shipped to them from the U.S. The Philippines gained independence from the U.S. on July 4, 1946, and held its first national election in November 1946. The Huks participated in the elections, and the head of the wartime Huk movement, Luis Taruc, won a seat in the Philippine Congress. However, the newly elected President, Manuel Roxas, refused to seat Mr. Taruc or his allies in Congress, leading many Filipino peasants to join the Huk movement. By late 1946, there was open fighting between the Huks and the forces of the newly independent Republic of the Philippines. The insurgency was motivated by vast economic inequality during the country’s transition to an export-led capitalist economy, with abject poverty affecting 90 percent of the population. The Huks’ primary tactics in the beginning of the conflict included bank, payroll office, and train robberies, as well as small hit-and-run raids and ambushes that allowed them to avoid contact with large government formations. During these first few years, the Huks numbered 5,000 active insurgents, 10,000 lightly armed reserves, and 35,000 other supporters. The Huks also enjoyed incredible levels of internal support, with an estimated 250,000 peasants actively supporting them during the early years of the insurgency. The counterinsurgency force was unable to control the insurgency in the early years. Shortly after the country was granted independence, the Philippine Army was reduced from 132,000 to 37,000 men. Approximately 24,000 of these men were in the Military Police Command, which was tasked with combating the insurgency. However, the Military Police Command was poorly led and poorly equipped, and pursued tactics that accomplished little beyond alienating the population between 1946 and 1948. In 1948, President Roxas reorganized the Military Police Command into the Philippine Constabulary, which remained neither well-trained nor well-equipped. It mainly practiced encirclement and sweeps, both of which were easily evaded by the Huks, and systematically committed abuses against civilians: raiding villages, stealing possessions, and treating the population worse than the Huks did. The Huks then began making strategic and operational errors, failing to reach out to other disaffected groups to form a broad front, and employing many common criminals in their ranks, causing peasants to fear the group. Probably most catastrophic to the group’s public image was the assassination of Mrs. Aurora Quezon, the well-liked and popular wife of the late former President, Manuel Quezon.
3-24
117
Direct Methods for Countering Insurgencies As a result of Mrs. Quezon’s murder, President Quirino appointed then-Congressman Ramon Magsaysay as Secretary of Defense in 1950. After this, the Huk Rebellion became a good example of successful shape-clear-hold operations, with Magsaysay immediately instituting a shape-clear-hold approach. Shaping operations focused on efforts to win popular support for the counterinsurgency effort in preparation for future operations to clear insurgent areas. These operations included putting a stop to the abuses of civilians by the Constabulary and Army, firing many high-level military officers, placing the Constabulary under Magsaysay’s personal control, suppressing troop brutality towards the population, and increasing pay for enlisted troops to remove their incentives for looting. They also involved the establishment of a civil affairs office through which troops became involved in civic action projects (including digging wells and building bridges) and the Army’s provision of medical assistance to villagers. Additionally, Magsaysay pursued a population engagement strategy, even going so far as to set up a telegraph system that provided a direct line to the Defense Ministry for any villager on Luzon to use. 9-7. The shape-clear-hold-build-transition framework describes an operational approach that moves through each of its phases to destroy insurgent capacity and empower host-nation capacity. The phases of this method are not mutually exclusive, but the phases represent a general progression of operations. The shape phase refers to making changes to the environment, through information operations or other methods, that create the conditions for success of the other phases. The population needs to understand that there will be an increase in security and initially local leaders should be contacted. The clear phase is an effort to remove the open insurgent presence in an area. The hold phase is defined by providing security for the population in an area so an open insurgent presence cannot return. The build phase entails efforts to increase security and governmental capacity so that government and local forces can control the area and prevent the return of insurgents. The transition phase is the transition of security to local and government forces. 9-8. The commitment of resources, to include time, troops, money, development programs, and other enablers depends entirely on the capacity of the insurgency, the capacity of the host nation’s institutions, the capacity of the host nation’s security forces, and the capacity of the host nation’s population. The capacity requirement for the external counterinsurgent is that capacity which overcomes the capacity differential between the insurgents and the host nation’s systems. As the framework is predicated on the conditions on the ground, the shape-clear-hold-build-transition framework is based on understanding areas of operation and understanding the comprehensive threat. To transition between the clear, the hold, and the build, a unit must be able to measure the conditions on the ground and how those conditions are achieving the commander’s end state. This ties the shape-clear-hold-build-transition framework to assessments. 9-9. The shape-clear-hold-build-transition framework can be used as a method for constructing specific tactical operations, planning short-range operations for a specific area, or developing a mid- to long-range operational framework for a unit’s plan for countering an insurgency. The shape-clear-hold-build-transition framework can be used as a campaign framework, guiding planning from the introduction of foreign forces to conflict resolution. It can be used as campaign design to be executed by multiple units on a rotational basis. The imperatives, structure, considerations, and conditions listed here apply no matter how the shape-clear-hold-build-transition framework is applied. 9-10. Counterinsurgents must be aware that the shape-clear-hold-build-transition framework is not a phase by phase linear process. The phase that a unit performs is determined by the environment in an area of operations and each area must be assessed. Different villages, cities, or regions can be in varying degrees of insurgent control to host-nation control. Moreover, different areas in one city or different towns in one region might be along a spectrum of insurgent to host-nation control. Areas can reverse progress during a counterinsurgency. While the shape-clear-hold-build-transition framework can be a phased operation in each area, the environment must dictate its progress. The counterinsurgent uses the framework as the way to synchronize subordinate unit actions, prioritize efforts, allocate resources, and direct specific effects to achieve end state criteria in an ever-changing environment. The overall objective of using the shape-clear- hold-build-transition framework is to transition responsibility for countering the insurgency to the host
3-24
118
Chapter 9 nation’s institutions. The commander must understand that conditions associated with the clear, the hold, and the build phases may be present at any time in different areas. U.S. ground forces can expect to carry out a range of tasks simultaneously in varying combinations and varying intensity throughout the entirety of shape-clear-hold-build-transition framework. 9-11. The shape-clear-hold-build-transition method has imperatives that help counterinsurgents turn the method from theory into practical application. The imperatives are— * The conditions are assessed across several variables and cannot be taken in isolation. * The phase that the environment is in dictates the decisive operation, priorities, and resourcing. * In the clear, hold, and build phases, counterinsurgents must simultaneously conduct offensive, defensive, and stability tasks. * Each area requires its own assessment and assessments change over time. * The shape-clear-hold-build-transition framework is not a straightforward path, as the operational environment can change and cause the counterinsurgent to lose progress. However, the methodology is meant to be progressive. Improving conditions in the environment allows for progression from one phase to the next. In essence, the operational framework is determined by the operational environment. Changes in the capacity of any element in the environment can change the conditions on the ground and, therefore, change the priorities and actions of the counterinsurgent, including the host-nation forces. * The shape-clear-hold-build-transition framework is only reactive if the unit on the ground responds to conditions. The framework can be proactive if the counterinsurgents dictate the conditions they want to establish and provide the resources and emphasis necessary to achieve them. * Although an area is in a certain phase, this does not preclude operations associated with other phases. For example, although a unit is in the build phase, that does not preclude that unit from performing offensive operations against underground cells. 9-12. Executing operations in the shape-clear-hold-build-transition framework requires counterinsurgents to continually address the root causes of the insurgency. Actions taken in the clear, hold, and build phases are not executed in isolation. Instead, elements of each phase must be conducted simultaneously. The shape-clear-hold-build-transition framework does not require phasing or stages of operations, but a commander may create phases or stages of operations corresponding generally to shape-clear-hold-build- transition phases in order to synchronize actions and priorities effectively. 9-13. The shape-clear-hold-build-transition framework is driven by the conditions in an area of operations. To facilitate discussion of these conditions, figure 9-1 depicts the generic spectrum of counterinsurgency conflict. The graph portrays the relationship of capacity between insurgents, the host-nation government, the host-nation security forces, the host-nation population, and external counterinsurgents. Capacity represents the ability to change the conditions in the environment towards insurgents or counterinsurgents. As counterinsurgents are able to impact these conditions, the capability spectrum changes. The left hand side of the graph depicts the worst-case scenario in which insurgents possess increased capacity compared to the host nation. The right hand side of the graph depicts the best-case scenario in which the host-nation capacity is sufficient to counter the insurgent capability without assistance from external counterinsurgents. The shape-clear-hold-build-transition framework describes the process counterinsurgents take to progress from the left of the graph to the right. (See figure 9-1.)
3-24
119
Direct Methods for Countering Insurgencies Figure 9-1. The capability spectrum of counterinsurgency conflict 9-14. As part of developing understanding, counterinsurgents must identify the conditions that exist in particular regions that lead to instability or allow the insurgency to impact the environment. Commanders must decide where to focus actions and priorities to impact the conditions in a designated area for tactical or operational reasons. In many instances, commanders specify a preparation phase or shape phase of the shape-clear-hold-build-transition framework which clarifies the period of time, series of tasks, and effects to be achieved before counterinsurgents begin taking deliberate action against insurgents. Whether phasing is used or not, preparation of the environment is an absolute requirement to achieve conditions to progress along the shape-clear-hold-build-transition framework. SHAPE 9-15. Shaping operations involve identifying which areas in an operational environment exhibit conditions that counterinsurgents can impact to change the capability differential between insurgents and counterinsurgents. Commanders choose where to execute operations in the shape-clear-hold-build- transition framework based on a host nation’s ability (and unified action partners’ abilities if the host nation’s capabilities are still being built) to impact the root causes of the insurgency, alter or eliminate the conditions which allow the insurgency to exist in that area, or isolate the insurgents from the population. During preparation, commanders and staffs execute include information collection on the components of an insurgency. An initial census in towns or cities using biometrics data collection devices is the most effective tool to establish initial accountability for everyone. Additional information collection includes the specific root cause or causes in the particular area, the expectations of the host-nation population, and the capability of host-nation institutions such as government, security, and rule of law. Commanders and staffs conduct disruption operations to impact an insurgency’s ability to influence an operational environment. Counterinsurgents may conduct deception operations while preparing for shape-clear-hold-build-transition framework operations to force the insurgency to alter its course of action. While preparing to execute the shape-clear-hold-build-transition framework, counterinsurgents (and whenever possible the unified action and host-nation partners) conduct information operations. Counterinsurgents conduct information operations aimed at the insurgency, the insurgency’s support mechanisms (both internal and external to the country), the host-nation population, and host-nation institutions such as governance and security functions. 9-16. U.S. ground forces do not prepare for the shape-clear-hold-build-transition framework in isolation. Elements of the unified action partners are essential in shaping the area, the population, and the insurgency for future operations. In some instances, the area indicated for shape-clear-hold-build-transition framework operations may not be suitable for some partners to directly operate in, but other unified action partners
3-24
120
Chapter 9 may have the capability to shape the environment in areas of limited access. U.S. special operations forces (SOF) can conduct reconnaissance, information collection, and precision targeting. The United States Agency for International Development has the capability to introduce implementing partners who have access to initiate governance or development programs. The Department of State has the ability to influence the diplomatic process to generate initial governmental structures prior to the introduction of U.S. ground forces. Soldiers and Marines must recognize the potential that unified action partners have in shaping an operational environment prior to shape-clear-hold-build-transition framework operations. CLEAR 9-17. Once counterinsurgents have effectively shaped the environment, including host-nation partners and enablers, and prepared all elements of the unified action partners appropriately, decided on where to focus the counterinsurgent effort, and has developed the plan to progress through to transition to host-nation responsibility, the force begins executing tasks associated with clear. Clear is as a tactical mission task that requires the commander to remove all enemy forces and eliminate organized resistance within an assigned area (FM 3-90-1). When used in this context, the term clear is considered the desired effect by U.S. ground forces: to eliminate the insurgency’s combatants to enable the host nation to develop the capability to address the insurgency’s root cause and eliminate the conditions that allow it to exist. While attempting to achieve the clear, the insurgency’s underground and auxiliary elements probably remain in the area of operations. While the counterinsurgent can target them along with the insurgency’s combatants, it is unlikely that the counterinsurgent will be successful in removing all of the underground or auxiliary elements. 9-18. During the clear phase, counterinsurgents should be actively securing the population. Counterinsurgents must displace insurgents and enable basic governmental functions in their area. Moreover, the population must have the confidence that counterinsurgents will remain and insurgents will not control the area. During this period, the population may face intimidation, threats, and assassinations from insurgent forces. To gain legitimacy during this period, counterinsurgents must focus on securing the population. 9-19. Operations and tasks associated with achieving the clear begin by controlling access to an area and then by controlling key points within that area. Security and influence can then spread out from this area. Commanders and staffs should consider the following points for operations in the clear: * Create a secure physical and psychological environment. * Provide continuous security for the local populace. * Eliminate the insurgent combatants. * Reinforce culturally appropriate political primacy within the context of host-nation systems. * Enforce the rule of law. 9-20. Security tasks associated with the clear include— * Implement the provisions of a cease fire and control, capture, and disarm belligerents. * Provide territorial security until the host-nation national army can defend itself. * Protect the population—provide immediate law and order and humanitarian assistance. * Protect key individuals and sites—civilian government agencies, infrastructure, and institutions. 9-21. During the clear, counterinsurgents must execute offensive, defensive, and stability tasks. Offensive operations are the priority for counterinsurgents. In most cases, the measure of effectiveness (MOE) associated directly with impacting the insurgency’s combatants (for example, isolate insurgents from the population) is the decisive operation. Offensive operations conducted during the clear include raid, deliberate attack, cordon and search, seize key terrain, and movement to contact. Counterinsurgents execute defensive operations as well, to include block access routes, establish and secure combat outposts, conduct sniper operations, and secure the population. To set the conditions to progress through the framework, counterinsurgents must execute stability tasks and operations at this point. Stability tasks include identifying potential government or security leaders, identifying civic capacity requirements from the population, establishing a local security force (in the context of host-nation systems) and beginning a training program (if necessary), and identifying the root causes for that area. Throughout these operations,
3-24
121
Direct Methods for Countering Insurgencies the commander must consider securing the population and building host-nation capability. Actions taken while achieving the effects necessary for clear should not alienate the population. The messages of information operations are important while performing clear. Responsible use of force is essential. 9-22. Counterinsurgents conduct information operations to achieve the effects of the clear component. The focus for information operations during the clear is the insurgency’s combatants, the underground and auxiliary elements, and the host-nation population. Counterinsurgents’ information operations should facilitate operations which eliminate the combatants from an area, facilitate effective information collection on the combatants, and build a sense of security among the population. HOLD 9-23. Counterinsurgents do not execute tasks associated with the clear component unless they have developed the capability to execute tasks in the hold. Beginning shape-clear-hold-build-transition framework operations requires resources in the form of manpower, time, money, and development programs (but this framework is based on capacity, not resources). For this reason, these type of operations cannot be conducted everywhere and must be prioritized. To meet the imperatives listed above, the counterinsurgent must progress along the framework to continue to improve conditions in the environment. Therefore, units should not clear an area that they cannot hold. Until those conditions exist, the counterinsurgent may choose to continue to prepare or shape the environment for future shape-clear-hold-build-transition framework operations. 9-24. As the capability of the insurgency decreases in an area based on counterinsurgency operations, the capacity of the host-nation government and security force must increase. As the conditions improve to the point that offensive operations aimed at eliminating the insurgency’s combatants are no longer the priority and the host-nation population has freedom of movement, counterinsurgents can begin to execute tasks and operations associated with hold. The hold involves disrupting insurgent activities in an area and providing a good security environment for the population. The objective of the hold is to set the conditions for the host-nation security apparatus to provide security for the population. For this reason, the hold lasts as long as it takes to— * Develop the capability of the host-nation security forces. * Reduce the enemy strength in the area to the point that the host-nation security forces can take lead responsibility for security. 9-25. Lead responsibility means that the host-nation security forces are the decision authority for allocation of resources, priority of tasks and operations, and tactical decisions during operations. Counterinsurgents continue to eliminate the insurgency’s leadership and infrastructure. However, perhaps more importantly, counterinsurgents should focus on securing the population. During this period, proper basing of counterinsurgent forces is essential. If an area is supportive of an insurgency, then a base of counterinsurgent forces may sever the relationship between insurgents and the population. If the area is neutral or has pockets of support for the government, then the base should be established where it can best help in developing the area. 9-26. Contact with the population should be continuous, predominantly with host-nation entities (security forces, law and order officials, and government representatives) leading and U.S. counterinsurgents in support. Information operation activities provide opportunities for contact with the population. From the start of operations, Soldier and Marine actions in these areas, if culturally astute, can build bonds with the local population and in many cases change the attitudes of the people. Ultimately, the goal of this contact is twofold: to gain a better picture of the actual situation and to turn the population’s support toward the government. 9-27. Counterinsurgents must also secure key physical infrastructure. Because resources are always limited, parts of the infrastructure vital for stability and vulnerable to attack must receive the priority of protection, specifically the protection of capable host-nation security forces (if possible). This can be accomplished by analyzing the risk and likelihood of attack on various sites in the area of operations. 9-28. Much like the clear, achieving the hold requires counterinsurgents execute offense, defense, and stability tasks. While achieving the hold, defensive tasks and operations are the priority. However, to meet the objectives of the hold, the line of effort associated with development of the host-nation security forces
3-24
122
Chapter 9 is the decisive operation. Examples of stability tasks include manning, equipping, and training the host-nation security forces, establishing local governance functions, and establishing culturally appropriate rule of law systems within the host nation’s plan. Examples of some defensive tasks during the hold include counter cache operations, area denial, combined security at fixed sites, block infiltration routes, countermobility, and securing the population. Counterinsurgents must execute offensive tasks to attack the insurgency’s underground and auxiliaries. Examples of offensive operations in the hold include raids against insurgent leaders, ambushes, and disruption operations to impact support structures and local sanctuaries. The amount and scope of stability tasks and operations increase during the hold. 9-29. Security operations to achieve the hold are dominated by developing the host-nation security forces and then transitioning security responsibilities to them. Examples of security focus during the hold include— * Reform of local security institutions—reestablish military and police forces which may include the entire rebuilding of the enduring institution including recruiting, educating, training, manning, equipping, sustaining and leader development for the Army, police, rule of law, detention capacity, and court systems. * Develop the host-nation military to provide security and external defense of the nation; develop the capacity to become self-sufficient in the development and conduct of their own enduring training programs at individual and collective levels. 9-30. Counterinsurgents conduct information operations to achieve the hold as well, but the focus and message changes as conditions improve. The focus for information operations during the hold is on the remaining underground and auxiliary, the host-nation population, the host-nation security forces, and host-nation governance institutions. Counterinsurgent information operations should facilitate operations that improve the perception of security among the population, legitimize the host-nation security forces, dissuade the underground and auxiliaries from continuing insurgent activities, and promote effective host-nation governance solutions. During the hold, it is critical that the host nation becomes an integral part of information operations. BUILD 9-31. When the conditions in an operational environment allow the host-nation security forces to take lead responsibility for security, counterinsurgents transition to the build. The build comprises carrying out programs designed to remove the conditions that allow the insurgency to exist, specifically addressing the root causes, tying inhabitants to host-nation security institutions, governing and rule of law, and strengthening the host nation’s ability to provide legitimate and effective governance. Stability tasks predominately build, with many important activities being conducted by nonmilitary agencies. Progress in building support for the host-nation government requires protecting the local population. People who do not believe they are secure from insurgent intimidation, coercion, and reprisals do not risk overtly supporting host-nation efforts. 9-32. Counterinsurgents execute offense, defense, and stability tasks in the build as well. The priority for tasks and operations during the build is on the stability tasks. The line of effort that addresses increasing the host-nation government capacity becomes the decisive operation during the build. Examples of stability tasks in the build include advising and assisting the host-nation security forces, developing professional development programs (including professional education) for host-nation security and governance individuals, facilitating host-nation governance activities, support to local and national demilitarization, demobilization, and reintegration programs, and development of host-nation rule of law and conflict resolution mechanisms. However, U.S. forces execute offensive operations during the build. Examples of offensive operations in the build include providing a quick reaction force for the host-nation security forces, conducting tactical overwatch for specific host-nation security forces operations, conducting follow and assume or follow and support for host-nation security forces operations, or conducting precision strike operations in support of host-nation or U.S. objectives. Counterinsurgents execute defensive operations and tasks as well, to include protecting the population, combined action with the host-nation security forces to secure combined positions, and sanctuary denial and disruption operations. 9-33. U.S. counterinsurgents conduct information operations as part of the build in support of host-nation programs. The focus of information operations during the build is on the host-nation population, the
3-24
123
Direct Methods for Countering Insurgencies host-nation security forces, and host-nation governance institutions. U.S. counterinsurgents conduct information operations during build operations to facilitate host-nation leaders’ messaging and to emphasize success in generating the conditions that further the connection between the population and the host-nation institutions. U.S. ground force information operations reinforce the host nation’s ability to counter an insurgency without the direct involvement of U.S. ground forces. Host-nation information operations should focus on increasing the perception of security, increasing the legitimacy of the host-nation government and security forces, and promoting the host nation’s ability to address root causes. TRANSITION 9-34. Transition allows the counterinsurgent to delineate tasks associated with development of host-nation institutions (governance, rule of law, security, and economic) with those tasks associated with transitioning to host-nation lead of operations. To make transition effective, U.S. commanders incorporate planning and execution of transition as part of the shape-clear-hold-build-transition framework. 9-35. This transition is not a onetime event. Counterinsurgents transition responsibility to host-nation agencies when they are capable of taking over a function. This may mean multiple transitions to multiple host-nation agencies at different times during a counterinsurgency. Transition is a continued process in which the host nation assumes any responsibility that an external counterinsurgency may temporarily have. 9-36. Security tasks associated with transition represent the U.S. forces’ transition to security cooperation tasks. During this phase, the U.S. ground force, under the combatant command and in conjunction with the American embassy, helps generate and then implement theater engagement plans and programs. 9-37. The end goal of shape-clear-hold-build-transition framework is to create the conditions necessary for the host nation to counter an insurgency independently. However, creating these conditions may not eliminate the presence of external counterinsurgents. U.S. counterinsurgents may remain in an area during and beyond transition to help train host-nation security forces or institutions, provide enablers, or begin security cooperation tasks at the request of the host-nation government. (See FM 3-22 for more information on security cooperation tasks.) 9-38. To better facilitate the integration of all components of the unified action environment into the shape-clear-hold-build-transition framework, counterinsurgents may establish an area coordination center. An area coordination center controls, manages, and coordinates shape-clear-hold-build-transition framework operations. Commanders and staffs can establish area coordination centers and subordinate area coordination center civil-military task forces from the tactical to the strategic level. An area coordination center’s membership includes representatives of all multinational forces and host-nation agencies (military, police, intelligence, political, and civil administration) operating at the regional and local level. To be truly effective, Department of State representatives (including United States Agency for International Development personnel) should lead an area coordination center. As an area coordination center coordinates all efforts that affect the ability to transition to host-nation control, the area coordination center is responsible for generating host-nation capability beyond just the security realm. For that reason, diplomatic and governmental leaders should run an area coordination center with the goal of turning over decisionmaking and coordination authority to the host nation at the earliest opportunity. In the absence of Department of State personnel, the military force assigned an area of operations should initiate and manage an area coordination center until a government representative can take control. An area coordination center coordinates the allocation of material and personnel resources, methods of policy implementation, and evaluation of intelligence in the area within which it is organized. 9-39. The area coordination center consists of civilian and military elements necessary to plan the political, economic, social, psychological, security, intelligence, and tactical operations within that area. Commanders and staffs base operation plans on an integrated civil-military approach, and unity of effort is essential. The leadership must have authority to control the allotted resources of all agencies and activities operating within its respective area of responsibility. In those instances where U.S. or multinational forces are operating in support of host-nation forces, an exceptionally high degree of cooperation must exist and advisory efforts are critically important for success. All armed civilian defense forces and civilian organizations normally remain under operational command of their respective area coordination center task force chiefs: however, in cases where civilian administration is ineffective, military forces may provide
3-24
124
Chapter 9 civil administration until civilian programs have taken effect. A composite view of the shape-clear-hold- build-transition framework is provided in figure 9-2. 9-40. Transitions can also occur within the shape-clear-hold-build-transition framework. Soldiers and Marines will have different tasks when an operational environment changes. For example, a unit must understand when it transitions from eliminating the combatants in an area to creating an environment for host-nation control. Units will change their mix of offensive, defensive, and stability tasks. More importantly, they will have to change their mindsets. Figure 9-2 provides the changes of capacity over time, the changes in the mix of tasks units could perform, and finally when a transition may occur. This graph provides a snapshot of the shape-clear-hold-build-transition framework. In it, counterinsurgents are moving from clearing, to holding, and then to building. During this movement, the local population is becoming more supportive of the counterinsurgency, and the insurgency is losing capabilities and moving from being in a possible war of movement back to being in phrase I. As insurgent capacity decreases and counterinsurgent capabilities increase, several transitions take place that involve a different mindset and performing different tactical tasks. This is in addition to the final transition to the host-nation lead, which is the end point for the U.S. when it acts as the primary counterinsurgent. (See figure 9-2.) (See chapter 4 for more information on the phases of an insurgency and chapter 7 for more information on transitions.)
3-24
125
Direct Methods for Countering Insurgencies Figure 9-2. Example of a possible transition framework OTHER DIRECT ENABLERS 9-41. The Army and Marine Corps can also integrate other direct enablers into a counterinsurgency operation. For example, indirect fires can be integrated into an ongoing counterinsurgency effort. Special forces have the capability to perform direct actions. These are short-duration strikes. Special forces can also conduct other small-scale offensive actions conducted in hostile, denied, or politically sensitive environments that employ specialized military capabilities to seize, destroy, capture, exploit, recover, or damage designated targets. As with indirect enablers, the Army and Marine Corps have a wide range of direct capabilities that can be integrated into an ongoing counterinsurgency effort. Tactical units that can be successfully integrated into a host nation’s efforts to perform cordon and searches or raids could be an effective capability for any counterinsurgency operation.
3-24
126
Chapter 9 9-42. As part of the joint force, the air component provides Army and Marine Corps units a number of critical direct enablers. Airpower provides supported ground forces a significant asymmetric advantage over insurgents as a result of their flexibility, situational understanding, freedom of maneuver, and access to immediate joint fires. Direct air and space enablers include, but are not limited to, air mobility, casualty evacuation, intelligence, surveillance and reconnaissance, communications, cyber, global positioning system, personnel recovery, precision engagement (close air support and air interdiction), and electronic warfare. 9-43. Two other important enablers are targeted threat infrastructure and strikes. Targeted threat infrastructure provides a means for a counterinsurgent to attack the resources that an insurgency uses to continue its effort. However, targeted threat infrastructure must always be conducted in support of other efforts. Counterinsurgents must weigh the effect of the operations on the legitimacy of the host nation among the local population. Strikes are conducted to disrupt an insurgency, and they can allow other efforts to succeed. Targeted threat infrastructure and strikes are not to be conducted in isolation, and simultaneously some force should be actively securing the population and building legitimacy. TARGETED THREAT INFRASTRUCTURE 9-44. Targeted threat infrastructure is a method that seeks to destroy an insurgent force’s physical infrastructure. This is a method that will normally only work if another force is securing the population and building legitimacy. In other words, it is a method to enable another force. This method seeks to destroy the necessary requirements of an insurgency to conduct combat operations. Targeted threat infrastructure proactively targets the physical and societal mechanisms that support and fuel the insurgency. It involves an aggressive spirit of the offense. When using this method, commanders and staffs must consider the law of war principle of proportionality. The anticipated injury or damage caused to civilians or civilian property must not be excessive in relation to the concrete and direct military advantage anticipated by an attack on a military objective. Commanders and staffs using targeted threat infrastructure must also ensure it is not contributing to the recruitment of insurgent fighters by using too heavy a hand against elements of society that are not fully or willingly supporting the insurgency. 9-45. Targeted threat infrastructure must be integrated into an effective host-nation effort that is securing the population. Targeted threat infrastructure can be an effective tool, if it is well planned and executed to avoid possible negative consequences of alienating the population and decreasing the legitimacy of the host nation. If the effect of targeted threat infrastructure is the physical elimination of the basic physical infrastructure needed by an insurgency, and it avoids the negative effects of alienating the population, it can be essential in a host nation’s counterinsurgency effort. However, it is a means to enable a host nation, not a method that should be used without an additional effort to secure the population. 9-46. For targeted threat infrastructure to be effective, commanders and staffs must understand where an insurgency is attaining its strength and attack those areas and facilities. These efforts must further the desired overall end state and not undermine a host-nation government’s legitimacy. Commanders and staffs plan for and limit second and third order effects of attacks. Moreover, attacks are only targeted against the infrastructure the insurgency relies on. For example, crop eradication aimed at reducing cash flow is unlikely to effect an insurgency with a large amount of financial resources. It may, however, hurt the legitimacy of the host nation. 9-47. Illicit crops such as marijuana, coca, or poppy used to fuel and fund an insurgency can be the targets threatened under the targeted threat infrastructure method. The cash from these crops may help arm, train, and pay insurgent fighters or pay condolence payments to the families of terrorists who kill themselves in suicide acts. Attacking such crops may hurt individual farmers. In some cases, farmers may be coerced by insurgents and have no real choice in the crops they produce. In others, farmers may support the insurgency. However, the illicit nature of these crops make them valid targets. To avoid creating new insurgents through crop destruction, counterinsurgents can work with interagency partners and the United States Agency for International Development to establish crop substitution programs that can help ease hardships farmers may experience. 9-48. Another key target for the targeted threat infrastructure method is any material or physical item used to fuel the insurgency. For example, a road network that is the primary means of movement for insurgents
3-24
127
Direct Methods for Countering Insurgencies needs to be interdicted by checkpoints or destroyed. This may inconvenience the local population, but if consistent with the principle of proportionality this can be a valid course of action. Power systems and water systems deep in insurgent controlled areas are prime targets for targeted threat infrastructure, but targeting them requires careful proportionality analysis. As critical components of a society, power and water are staples that the insurgents need to survive in their own region. By impairing these resources, counterinsurgents may undermine the insurgency’s resources and its ability to continue the insurgency. However, any effort to attack these resources must be balanced with the host nation’s legitimacy among the local population that is affected. Aggressive strikes and raids are central to the targeted threat infrastructure method to destroy the physical infrastructure that supports an insurgency. This tactic is not a slash-and-burn technique, but consists of well-planned, pinpointed attacks on those critical enablers that the insurgency needs to operate. 9-49. Another key target is the illicit funds used to fuel an insurgency. By establishing counter threat finance fusion centers, commanders and staffs can work with the power of interagency law enforcement and international legal partners to find, interdict, and seize huge sums of money that the illicit regime must launder before it can be used again for legal currency. By using unit counter threat finance specialists in targeted threat infrastructure operations, funds determined to have been gained through illicit means can be targeted for seizure at the local level. For example, if a man is a small farm owner and lives in a palatial home with three cars, he should be investigated, and his funds can be targeted if it is determined that his wealth is from illicit means and those means are being used to fuel an insurgency. STRIKE 9-50. A strike is an attack to damage or destroy an objective or a capability (JP 3-0). A strike may be useful in disrupting an insurgency, especially in insurgent controlled areas. Strikes can be made on guerrilla bases, large, enclosed or isolated compounds, and training camps. Normally these operations are meant to disrupt an insurgency and allow for the success of other operations. Strike operations can be integrated into a host nation’s operations to secure a population. The U.S. may contribute a force to perform strikes. 9-51. The purpose of a strike is to destroy insurgent forces and base areas, isolate insurgent forces from their support, and interdict insurgent infiltration routes and lines of communications. Strikes are primarily offensive operations. They are characterized by reconnaissance, intelligence gathering, and careful planning, followed by vigorously executed, coordinated attacks or raids by small, highly mobile combat forces operating in dispersed formations to locate and fix an insurgent force. Upon locating an insurgent force, strike force commanders attack, pursue, and destroy that insurgent force. If contact is lost, the strike forces resume aggressive patrolling to reestablish contact and destroy the insurgent force before it can rest, reorganize, and resume combat operations. 9-52. Strikes can be conducted in support of shape-clear-hold-build-transition framework operations after guerrilla forces are initially driven out of an area during the clear phase. Strikes are often employed to assault objectives outside cleared areas to fix and destroy guerilla forces and prevent counterattacks against government and reconstruction personnel. Counterinsurgents conduct assaults in areas where guerrillas attempt to consolidate during the hold and build phases. Precision airpower weapons can be used to support other units conducting strike operations or to conduct strike operations on their own. 9-53. Reconnaissance to locate and test insurgent dispositions and strengths or to develop additional intelligence can be followed immediately by a hasty attack or raid. Reconnaissance should emphasize thorough coverage of an area, and it is characterized by continuous, decentralized, small-unit operations. Since strike campaigns are conducted in insecure areas, plans must provide for force withdrawal after mission accomplishment. 9-54. Strike forces are generally task forces composed of military units and may contain intelligence, police, and paramilitary elements. Civilian elements may be represented. Forces designated to conduct strikes should be relieved of routine area defense responsibilities well in advance of an operation. Strike forces can be controlled at the national, regional, or local levels. Strike forces are organized as self-sufficient task forces capable of operating for extended periods in areas remote from home bases. 9-55. Once insurgent bases have been located, strike forces maneuver to destroy them. An insurgency’s ability to hide weapons and to assume noncombatant guises in attempting to avoid capture may require a
3-24
128
Chapter 9 thorough reconnaissance and search of the area. Suspects must be managed firmly but treated fairly to avoid turning innocent suspects into insurgency sympathizers. When small units conducting reconnaissance locate relatively large insurgent operating forces, surveillance should be maintained and reaction forces quickly deployed to destroy them. In areas suspected of harboring insurgent forces or installations, reconnaissance and surveillance should be conducted and followed with an immediate raid by reaction forces when sufficient information has been developed on a target. Good communications and mobility are essential for success in these combat operations. 9-56. Speed and surprise are important in strikes. The sudden and unexpected delivery of combat forces into an insurgent held or contested area provides significant advantages to the forces conducting strike operations. If caught by surprise, guerrillas may be unable to react effectively. Speed and surprise can be achieved by using air assault tactics to insert the first forces into the area of operations. Subsequent forces can be delivered on later airlifts or by other modes of transportation. Fires can be used to restrict escape routes or areas that are not secured by land forces. 9-57. However, strikes do not address the root causes for beginning or sustaining an insurgency, nor do they necessarily increase the legitimacy of the host-nation government. Strikes are integrated with other approaches to counterinsurgency as part of the overall operational design. In some cases, the U.S. can integrate this ability into an ongoing host-nation effort.
3-24
129
Chapter 10 Indirect Methods for Countering Insurgencies 10-1. An indirect approach seeks to support existing governments, security forces, and groups through increasing capacity to counter an insurgency and enabling existing capabilities. This approach indirectly counters an insurgency by working through host-nation institutions or with groups in the society. The United States (U.S.) can use nation assistance and security cooperation to aid a host nation in building its institutions. 10-2. Beyond nation assistance and security cooperation, there are several methods that are indirect methods for countering an insurgency. Among these are generational engagement, negotiation and diplomacy, and identify, separate, isolate, influence, and reintegrate. Beyond these methods, there are several indirect enablers that are important in any counterinsurgency. This includes integrated monetary shaping operations. NATION ASSISTANCE AND SECURITY COOPERATION 10-3. Nation assistance is assistance rendered to a nation by foreign forces within that nation’s territory based on agreements mutually concluded between nations (JP 3-0). This civil or military assistance (other than foreign humanitarian assistance) is rendered to a nation by U.S. forces within that nation’s territory during peacetime, crises or emergencies, or war, based on agreements mutually concluded between the U.S. and that nation. Nation assistance operations support the host nation by promoting sustainable development and growth of responsive institutions. The goal is to promote long-term regional stability. 10-4. Nation assistance involves other government agencies that provide expertise in building civil institutions. This is an essential element in counterinsurgency because the military lacks the expertise to build civil control over the population, perform economic reforms, or aid in other basic functions that a host nation may need to prevent or prevail against an insurgency. Using a whole-of-government approach is essential in conducting nation assistance to prevent insurgencies from developing freedom of movement by exploiting the root causes of conflict within an operational environment. 10-5. Security cooperation is all Department of Defense interactions with foreign defense establishments to build defense relationships that promote specific US security interests, develop allied and friendly military capabilities for self-defense and multinational operations, and provide US forces with peacetime and contingency access to a host nation. (JP 3-22). This includes- * Military to military exchanges (for example, seminars and symposia). * Combined exercises. * Humanitarian assistance. * Security assistance. When these activities are used to defeat an insurgency, they are part of a counterinsurgency operation. While not all security cooperation activities are in support of counterinsurgency, security cooperation can be an effective counterinsurgency tool. These activities help the U.S. and the host nation gain credibility and help the host nation build legitimacy. These efforts can help prevent insurgencies or shape the host nation’s ability to defeat or contain insurgencies. 10-6. When directed, the Army and Marine Corps provide forces to support security cooperation missions. This requirement can include assistance in training, equipping, and advising the military forces of foreign nations. Security cooperation includes security assistance, foreign internal defense, and security force assistance. (See FM 3-22 and chapter 10 for more information on security cooperation activities. See chapter 10 for more information on working with other forces by using security cooperation.)
3-24
130
Chapter 10 GENERATIONAL ENGAGEMENT 10-7. Generational engagement is a method that can be conducted in conjunction with other approaches that seeks to get the host nation to educate and empower the population to participate in legal methods of political discourse and dissent. This can be done in both high threat situations and situations where an insurgency is at its infancy and combat is less intense. It is best that the host nation undertake this method as soon as possible to affect the next generation. Generational engagement focuses on the population. Generational engagement focuses on building new constituents in the host-nation population to counter insurgent actions. Generational engagement is a method of political mobilization of the people. The purpose of the method is to get population groups to side with the host nation. 10-8. Figure 10-1 provides a general framework for generational engagement. First, counterinsurgents identify the population that they wish to engage. This relevant population may politically engage and this will encourage the host nation to redress any grievances. This may lead to a reduction of violence. This is all built on a foundation of education, empowerment, and participation. (See figure 10-1.) Figure 10-1. Generational engagement 10-9. Five principles are fundamental to generational engagement: * Groups with whom counterinsurgents partner (such as nongovernmental organizations [NGOs]) must be seen as indigenous, not as foreign constructs. * Independence of funding and resources are important. Support groups can lose credibility the more they are perceived as solely reliant on foreign funding, possibly due to a shift in priorities by a sole and influential benefactor. Organizations and their partners should identify alternative sources of support, including local sponsors, funding from the relevant ministries, or collecting dues from members. * In selecting partners, counterinsurgents should not limit themselves to the vocal intellectual elite. If the insurgency is based on the root causes of a rural population, intellectual elites might not have legitimacy among the rural poor. Therefore, counterinsurgents should balance support between the central leadership and local branches in the provinces or townships (where youth engagement is usually most important).
3-24
131
Indirect Methods for Countering Insurgencies * Expansion and membership numbers should not be used as a key indicator of success. It can be difficult to accurately track and confirm these numbers with national organizations. A more accurate measure is the staff, number of offices, actual activity levels, and efficacy. Activity reports and photos can verify progress. * A main role for organizations is to make the connections between the local administrations and the provincial or national level government, as well as other stakeholders and peer organizations. At some point the NGOs will not be present to facilitate government access, and will be most effective when they facilitate cooperative and enduring relationships between the population and the government. 10-10. Generational engagement works with factions from a population to get them to see the benefit of participating in peaceful means to address their core grievances. Getting youths to understand the legal means they have to address root causes of conflict is a critical tool for reducing violence. If commanders and staffs believe that insurgencies may occur over extended periods, then some efforts must be made to engage this next generation of leaders who can establish a lasting peace. Engagement also has to be made with the intellectual elites of the country. They may still be residing in the country of conflict or in another country that has significant influence over the insurgent cause. 10-11. Soldiers and Marines planning to use generational engagement must identify relevant portions of the population through their planning. Plans and methods for engagements can vary, depending on the operational environment and the culture. This method is used in conjunction with direct methods as part of a comprehensive approach to combating insurgent forces. Counterinsurgents can make progress in defeating insurgent forces, but if they neglect the younger generation of the population they may lose the war. Continued and prolonged efforts must be made to ensure that counterinsurgents and the host-nation government are seen as positive influences. The population must identify with and trust their government. Counterinsurgent efforts are coordinated and tracked through continued assessments to ensure success. 10-12. Counterinsurgents engage with young factions of the population by implementing youth programs. Counterinsurgents also participate in local council meetings that include representatives from different generations of the population. 10-13. The idea behind these engagements is that they are initiated by the counterinsurgent forces and eventually taken over or continued by the host nation. It is not enough for the host nation to just continue to implement these engagements, rather the host nation must make every effort to ensure that these elements of the population identify more with the government than with the insurgents. Local leaders who identify with the government must be protected and supported. 10-14. Some examples of generational engagement can be as simple as ensuring that schools are open and available to students and ensuring adequate access to medical attention as part of the effort to ensure essential services. This can address younger portions of the population who, over the long term, will have a positive view of counterinsurgents and the efforts of their own government to ensure for their care and protection. 10-15. Some examples of generational engagement along the governance line of effort can include recruitment of younger influential leaders and including others in the electoral process. This may be difficult based on the culture in which counterinsurgents are operating because some cultures only allow for leadership positions for older members of the population. If members of the younger generation cannot assume roles in the government, they can still be encouraged to participate in the governance process and feel that they have a place where they can make their views heard by their local government. 10-16. Local participation that builds civil society has proven important in countering an insurgency. This can be essential in building legitimacy for a host government. For example, in Vietnam, the U.S. military and Department of State, along with the government of South Vietnam, established several youth groups that were very successful. One example, the 4-T Youth Club, was modeled after the American 4-H organization. Over 2000 4-T clubs served as a model of success for organizing youths at the grassroots level. A host government is essential in building local participation and a civil society. The Republican Youth Movement, National Revolutionary Movements, and Personnel Labor Revolutionary Parties were all models of successful youth engagement. These efforts increased the legitimacy of the host nation while decreasing the ability of the insurgency to recruit. These programs were generators of self-esteem for the
3-24
132
Chapter 10 participants and worked out pent-up student energy by deploying them to the provinces. In Vietnam, youth programs proved beneficial. 10-17. Outside groups can be very effective at generational engagement. For example, the Afghanistan Youth National and Social Organization is a non-profit, non-governmental organization that enrolls young Afghani males. It has district chapters, made up of around 45,000 dues-paying members, it enjoys a great deal of autonomy, and it organizes according to the needs of its local members. Its civic education program educated Afghans about their political rights and obligations, and it strengthened dialogue between local leaders and government officials. The importance of engaging local youth in Afghanistan was indicated in after action reviews and outside groups play an important part in building civic society. In sum, a non- governmental organization was effective at engaging the population and encouraging dialogue. 10-18. The first step that counterinsurgents can take to ensure that this happens is by leveraging key leadership at the local and district levels to meet with and discuss significant issues with the population. Just meeting with the younger elements of the population will not constitute completion of generational engagement. There must be efforts to follow through on major discussion topics and resolve issues that are significant to them. Where counterinsurgent forces are able to, they must continue to push local leaders to not just meet with them but also to address and resolve issues. This can be done initially by counterinsurgents and eventually by the host-nation government in concert with host-nation security forces. 10-19. Lastly, host-nation security forces must ensure that these actions are taken and that they are perceived as supportive of all elements of the population. This may done initially with counterinsurgent forces as the lead elements and later as host-nation forces develop their ability to take the lead on providing security as a supporting element of government representatives. NEGOTIATION AND DIPLOMACY 10-20. Negotiation and diplomacy are ways to resolve or defeat an insurgency. Counterinsurgents must influence the host-nation government and its subordinate elements (for example, the office of land reform) to remove the root causes that have led to acts of subversion and violence in order to seize, nullify, or challenge political control of a region. (See figure 10-2 which shows the process of negotiation and diplomacy.)
3-24
133
Indirect Methods for Countering Insurgencies Figure 10-2. Negotiation and diplomacy 10-21. The goal of negotiation and diplomacy is to address the insurgent root cause and therefore reduce the causes for armed conflict. If a host nation can be influenced by U.S. government or military personnel to peacefully address root causes, then the expected outcome is a reduction in violence and bringing the insurgents into the political process to have their issues resolved peacefully. If the host-nation government can do this successfully, the insurgency may not totally go away, but it may only use force of arms in a limited context that would manifest as limited insurrections compared to a full blown armed insurgency. 10-22. The U.S. has many tools at its disposal to influence a host nation in addressing the root causes of an insurgency. For example, economic and military aid can be tied to certain actions or standards of behavior by a host nation. Counterinsurgents must also evaluate how their actions help shape the environment. Contracting, for example, has direct links to the economy and the society. Using contracts to encourage a host nation to address root causes is another possible tool. In sum, commanders should make an assessment of how they are interfacing with a host nation and determine what tools are available to enable and encourage the host nation to take the needed actions to defeat an insurgency. 10-23. In an armed conflict environment where U.S. forces have been sent in to assist a host nation to fight its insurgency, U.S. military personnel can work with the host-nation armed forces to reduce causes for conflict, and U.S. military personnel can also interact with U.S. and host-nation government personnel to take steps to peacefully address core grievances and root causes of conflict. 10-24. In a peacetime environment where U.S. forces are not committed to help a host nation combat its insurgency, U.S. military personnel can lessen the causes of a potential crisis or insurgency in the conduct of security cooperation activities and bi-lateral military exercises. If one of the insurgents’ root causes is against the host-nation military for human rights abuses or using heavy handed tactics with the local population, U.S. military personnel can work with the military wing of the government to find alternative ways of dealing with the population.
3-24
134
Chapter 10 IDENTIFY, SEPARATE, ISOLATE, INFLUENCE, AND REINTEGRATE 10-25. Identify, separate, isolate, influence, and reintegrate is a method that combines several activities that affect relevant population groups. This can be done in both high threat situations and situations where the insurgency is at its infancy and combat is less intense. This method works by, with, and through the host nation; however, it may have some elements which Soldiers and Marines are directly interacting with a local population. 10-26. Identify, separate, isolate, influence, and reintegrate is a proactive method of addressing root causes before a full blown armed insurgency can develop. Its purpose is to identify and separate the insurgents from the population. This is a primary requirement for forces conducting counterinsurgency. By identifying who is an insurgent and who is not, and then applying resources to separate insurgents from the population, commanders and planners can more effectively focus their efforts on making the insurgency feel isolated. Insurgents may then believe that their causes for conflict are not supported by the population. Once the insurgent leaders and members feel isolated from the population, peaceful efforts can be made to influence insurgents to surrender, return, and be reintegrated into society. 10-27. Commanders conduct a detailed assessment of the insurgent and population networks before executing the identify, separate, isolate, influence, and reintegrate method. This assessment guides the application of individual means to disassemble the insurgent network. Joint forces and other actors may enter the process at many different stages; therefore, assessment is a continuous process used to guide decisionmaking throughout operations. IDENTIFY 10-28. The identify, separate, isolate, influence, and reintegrate method is used to divide and conquer the insurgency, including all elements of the insurgency listed in chapter 4. The U.S. Marine Corps refers to these as identity operations (See Marine Corps order [MCO] 5530.17), while the Army uses identity activities. The elements of an insurgency are the leadership (including the political cadre), guerilla units, auxiliary forces, and the underground elements. Although all elements of the insurgent network should be identified, the main target of the identify, separate, isolate, influence, and reintegrate effort is to identify the guerillas and eventually neutralize them, since they are the main source of the violence. Military operations should support the host nation in any thorough population screening to identify and eliminate insurgents and to identify any lingering insurgent support structures. 10-29. Operations that support identity activities include— * Raids and cordon operations. * Base access, checkpoints, and protection of critical sites. * Area security operations. * Border control and ports of entry. * Site exploitation. * Population census using biometric data collection devices and mapping the human environment and patterns of life * Medical capacity and tracking medical records. 10-30. Tools to support identity activities include— * Biometrics and biometrically enabled intelligence collection. * Tip lines. * Civil records (land documents and registration databases). * Reward programs (paying civilians to identify insurgents and their networks). * Forensics and forensics-enabled intelligence collection. * Document and media exploitation.
3-24
135
Indirect Methods for Countering Insurgencies SEPARATE 10-31. While killing or capturing insurgents in counterinsurgency operations may be necessary, an alternate and still effective method in the long run is to separate an insurgency from the population, the second phase of the identify, separate, isolate, influence, and reintegrate method. Counterinsurgents need to isolate their adversaries from the relevant population, both physically and psychologically. At the same time, counterinsurgents should also seek to bolster their own legitimacy and credibility to exercise influence over that same population. 10-32. Establishing security forces in bases among the population furthers the continued separation of the local insurgents and the population. The success or failure of the effort depends on effectively and continuously securing the population. In some cases, it may be useful to physically secure an area using barriers or other means. 10-33. Combined action programs, such as community stability operations, are local level stability operations designed to augment wider counterinsurgency operations. Village or community stability operations can work in areas with limited insurgent activity and attempt to establish security and stability “bubbles” around rural communities. These cordons are created and ideally expanded to make the area inhospitable to insurgents and enable legitimate local governance, which further separates the insurgents from the local population. (See JP 3-24, chapter 5, for more information on stability operations.) Appropriate tasks for units include, but are not limited to, the following: * Helping host-nation security forces maintain entry control points. * Providing reaction force capabilities through the parent unit. * Conducting multinational, coordinated day and night patrols to secure the town and area. * Facilitating local contacts to gather information in conjunction with local host-nation security force representatives. * Training host-nation security forces in leadership and general military subjects, so they can secure the town or area on their own. * Conducting operations with other multinational forces and host-nation units, if required. * Operating as a team with host-nation security forces to instill pride, leadership, and patriotism. * Assisting host-nation government representatives with civic action programs to establish an environment where the people have a stake in the future of their town and nation. * Protecting host-nation judicial and government representatives and helping them establish the rule of law. 10-34. The lines of operations that support the separation process include— * Sweeps and cordon and searches. * Combat outposts. * Village and community stability operations. * Border operations and port of entry operations. * Strikes, raids, and ambushes. * Interdiction operations. * Military deception and military information support operations. * Electronic warfare. * Information collection. ISOLATE 10-35. The isolation phase objective is to break the psychological and physical links between insurgents and the remainder of the insurgent organization and its support base. The first step in this segregation is to identify vulnerabilities of the insurgents. This requires a deep understanding of the operational environment and, more specifically, an understanding of all the adversaries (for example, the insurgent network, transnational terrorists, and external supporters).
3-24
136
Chapter 10 10-36. Counterinsurgents ensure efforts strive to physically isolate the insurgency in all domains (air, land, maritime, and cyberspace) from other nodes of the insurgent network. Ultimately this means controlling the physical and cognitive domains. However, completely controlling the domains at all times is not realistic. 10-37. Patrolling and cordon and search operations can physically isolate insurgents through capture or deterrence. Following these operations, counterinsurgents’ treatment of captured insurgents has immense potential impact on insurgent morale, retention, and recruitment. Humane and just treatment may afford counterinsurgents many short-term opportunities as well as potentially damaging insurgent recruitment. Abuse may foster resentment and hatred, offering the enemy an opportunity for propaganda and assist potential insurgent recruitment and support. It is important that unless they are entitled to another standard based on status, all detainees or other persons captured in any conflict, regardless of how it is characterized, shall be treated, at a minimum, in accordance with Common Article 3 of the Geneva Conventions of 1949. 10-38. Isolation must include operations to counter the insurgency lines of communication to recruit, obtain funding, weapons, equipment, direct operations, or gain intelligence. Operations such as information operations, electronic warfare, and cyberspace operations are examples of efforts designed to detect and respond to enemy insurgent networks. These operations are vital as force multipliers to identify insurgent activities and create conditions to deny or defeat their operations. 10-39. In addition to physical and psychological isolation, efforts to isolate the insurgency economically are necessary, but must be narrowly focused on the activities of insurgents. These efforts seek to isolate the insurgency as much as possible, as complete isolation of the insurgency is not realistic. If implemented too broadly, efforts to isolate may have a negative effect on the population and strengthen the insurgency. (For example, eradicating the poppy harvest in Afghanistan may have cut funding to the Taliban, but it also alienated the farmers who subsisted on the illicit crop.) Economic efforts to isolate an insurgent require both physical and informational interruption of financial, business, and criminal enterprises. Attempts to isolate insurgents from the population economically must be narrowly focused on the insurgents and minimize the effect on the population by offering viable replacement sources of employment and revenue. A primary means of the financial isolation is through counter threat finance operations. 10-40. The lines of operations that support the isolation process include— * Border operations and port of entry operations. * Strikes, raids, and interdiction operations. * Counter threat finance. * Military deception and military information support operations. * Cyber electromagnetic activities. * Electronic warfare. * Intelligence operations. * Information collection. INFLUENCE 10-41. The intent to influence the insurgent network is for the population to abandon support to the insurgency’s efforts. Planned influence operations should convey selected information and indicators to insurgent networks to influence their emotions, motives, objective reasoning, and ultimately the behavior of insurgent network itself. While it is unlikely counterinsurgents will change insurgents’ beliefs, it is possible to change their behavior. The counterinsurgency lines of effort (shown in figure 7-2 on page 7-9) support this behavior modification, but to further mitigate the insurgent threat to the host nation, additional programs should be offered as enticement solutions. In other words, counterinsurgents must leave a way out for insurgents who have lost the desire to continue the struggle. 10-42. Effective amnesty and reintegration programs provide insurgents this avenue; amnesty provides the means to quit the insurgency and reintegration allows former insurgents to become part of greater society. Rifts between insurgent leaders, if identified, can be exploited in this fashion. Offering amnesty or a seemingly generous compromise can also cause divisions within an insurgency and present opportunities to split or weaken it. Counterinsurgents can also act to magnify existing rifts. If insurgent forces are
3-24
137
Indirect Methods for Countering Insurgencies expelled or have broken into smaller groups, they must be prevented from reentering the area or reestablishing an organizational structure inside the area. 10-43. Amnesty programs provide a means for members of an insurgency to stop fighting. The essential part of an amnesty program is that insurgents believe they will be treated well and protected from their former comrades’ potential reprisal. Thus, counterinsurgents must have detailed information operation plans to inform the insurgents about the program, to turn themselves in, and to support subsequent amnesty efforts. Pragmatism must be the first consideration of amnesty programs, not ideology or vendetta. Counterinsurgents also must have methods to protect the former insurgents. Incentives for disaffected insurgents or their supporters are important, especially modest monetary rewards. 10-44. Turning former insurgents against their previous comrades can prove invaluable to counterinsurgency efforts. Former insurgents can provide vital information and even become valuable allies and combatants. However, information provided by a former insurgent must be evaluated and validated to prevent misinformation and deception. Incentives and a sense of fair treatment by counterinsurgents are vital to effective defector programs, which are also dependent on effective information operations so insurgents are aware of their options. Insurgents may be prone to defect when conflict has been prolonged, the broad population is weary of conflict, or if the insurgents have an uneven sense of purpose or drive. Defector knowledge of how the insurgents are led, organized, and operate can prove invaluable. This can include personality profiles of insurgent leaders, current communication procedures, plans, and tactics, techniques, and procedures. This detailed intelligence is difficult to gain without defector operations. 10-45. The influence lines of operations include— * Information operations. * Military information support operations. * Military deception. * Cyber electromagnetic activities. * Engagement. * Stability operations. * Defense support to public diplomacy. * Negotiation and diplomacy. * Targeted strikes and raids. * Support to amnesty programs. REINTEGRATE 10-46. The objective of reintegrating an insurgent is for the former insurgent to become a productive member of the society. Military forces, governmental organizations, NGOs from the international community, and the host nation must cooperate to plan and execute reintegration programs. Former insurgents must develop confidence in reintegration and the organizations charged with implementing it. To build this confidence, reintegration programs must be holistic and encompass efforts to restore the society, the government, and the economy at all levels. 10-47. Reintegration programs should help protect and empower moderate insurgents from extremist influence and encourage them to not rejoin the insurgency. Programs must be tailored for each area and insurgency. They can include vocational, educational (especially reading and writing), and religious programs. The employment opportunities extended to former insurgents depend on an effectively governed, viable economy with an active market sector. If the reintegration process does not provide alternative economic opportunities to the former combatants, the likelihood of their return to violence substantially increases. 10-48. Demobilization of insurgents normally involves the controlled discharge of active combatants from paramilitary groups, militias, and insurgent forces that have stopped fighting. Demobilization under these circumstances may include identifying and gathering ex-combatants for demobilization efforts. Demobilization involves deliberately dismantling insurgent organizations and belligerent group loyalties, replacing those with more appropriate group affiliations, and restoring the identity of former fighters as part
3-24
138
Chapter 10 of the national population. The demobilization of insurgents enables the eventual development of value systems, attitudes, and social practices that help them reintegrate into civil society. 10-49. Reintegration is the process through which former combatants, belligerents, and displaced civilians receive amnesty, reenter civil society, gain sustainable employment, and become contributing members of the local population. It encompasses the reinsertion of individual former insurgents into host-nation communities, villages, and social groups. Reintegration is a social and economic recovery process focused on the local community. It complements other community-based programs that spur economic recovery, training, and employment services. It includes programs to support resettlement in civilian communities, basic and vocational education, and assistance in finding employment in local economies. It accounts for the specific needs of women and children associated with insurgent and other armed groups. 10-50. Insurgents, when properly protected, reintegrated, and well treated, can become positive members of their community. Conversely, unprotected, poorly prepared, or poorly treated former insurgents will become powerful propaganda opportunities for the insurgents. Reintegration processes and programs, such as host nation-led moderate ideological or religious education and job training, should be started early in the reintegration process. 10-51. Counterinsurgency operations ultimately support reintegration through the integration of the stability functions in planning and execution. The stability functions are security, governance and participation, humanitarian assistance, rule of law, and economic stabilization and infrastructure. Specific consideration within stability operations to support the reintegration process include— * Civil-military operations and commander’s emergency response program funds for special projects. * Support to civic education projects. * Support to employment programs. * Support to relocation to prevent reprisals. * Support to integration into the political process. * Support to transitional justice. 10-52. The importance of influencing members of an insurgency to surrender cannot be overstated. The importance of how a former insurgent is reintegrated into a peaceful society is also critical because the way a war is won will decide how long the peace will last. 10-53. Counterinsurgents should offer surrendered insurgents generous terms, and counterinsurgents should follow those terms. By separating an insurgent from the population, commanders and staffs make that insurgent feel vulnerable and also take from the insurgency a means for recruitment and logistic support. Planners and commanders should work toward creating liberal and generous surrender terms. Counterinsurgents must protect surrendered insurgents from reprisals from their former insurgent colleagues. OTHER INDIRECT ENABLERS 10-54. The U.S. can integrate enablers into a host nation’s counterinsurgency efforts. These enablers can provide intelligence or prevent the flow of resources to a counterinsurgency. Various intelligence capabilities, such as signals intelligence, human intelligence, and geospatial intelligence, may be essential to a host nation’s counterinsurgency. Sharing of information from these sources may enable a host nation to defeat an insurgency. Also, other enablers, such as airlift capabilities, might be important for counterinsurgency. Another capability that can be integrated into a counterinsurgency effort is counter threat finance. Counter threat finance works to detect, counter, contain, disrupt, deter, or dismantle the transitional financing of state and non-state enemies threatening the U.S. Counter threat finance can deny an insurgent access to vital funding streams by identifying the sources and conduits of funding. In counterinsurgency, this can play an important role because of the connection between insurgencies and black markets. It provides one means to prevent an insurgency from obtaining resources. (For more information on counter threat finance, see ATTP 3-07.20/MCRP 3-33 and DODD 5205.14.)
3-24
139
Indirect Methods for Countering Insurgencies 10-55. The effective integration and synchronization of many capabilities, organizations, and functions that support the collection, analysis, exploitation and sharing of identity information leads to the identification of threat personnel, groups, and networks. These capabilities include biometric data, forensic data, document and media exploitation, intelligence, and other information exchanges. Identification of personnel allows multinational partners to prevent or mitigate insurgents or counterinsurgents from conducting operations among the innocent population. U.S. forces must comply with U.S. Army Forces Command predeployment training requirements. These requirements (such as training in personnel recovery, mitigation of insider threats, biometrics, languages, and cultural awareness) will further enable U.S. forces in a counterinsurgency environment. INTEGRATED MONETARY SHAPING OPERATIONS 10-56. Integrated monetary shaping operations are the use of monetary resources, provided with various types of aid (for example, economic, financial, humanitarian, or developmental), involving the voluntary transfer of resources (for example, money, equipment, knowledge, or training other than military) from U.S. or unified action partners to a host nation, directly or indirectly, for mutual benefit. (See ATP 3-07.20/MCRP 3-33.1G for more information on integrated monetary shaping operations.) Integrated monetary shaping operations are the coordinated use of money, goods, or services to support the commander’s objectives. They are a means to an end. Integrated monetary shaping operations are used to attack sources of instability, build partnerships, and provide for economic stabilization and security. Integrated monetary shaping operations have two major components: * Supporting operations by funding developmental assistance, infrastructure, and governance support projects to win the support of an indigenous populace and erode support for the adversary. * Denying adversaries sanctuary and operational flexibility by hindering their ability to reliably fund operations. 10-57. Integrated monetary shaping operations can be an effective tool to stabilize the security environment. However, they can also undermine both the local and national economies. One essential consideration of counterinsurgencies is to understand that long-term counterinsurgency efforts have an economic impact on the host nation. Additionally, the implementation of funding and projects can have negative secondary and tertiary effects. Commanders should recognize decisions over which contractors, communities, and individuals are chosen to receive funding could create winners and losers in their area. These effects can exacerbate tensions in the area. Finally, a counterinsurgency can last many years, and this effort can distort the pricing of goods and services within the local and national economy. Counterinsurgents must understand that they can undermine their own efforts by demanding goods in such quantities that they fundamentally alters market forces, which results in economic dependence on the counterinsurgency. This can result in economic problems that can undermine the host nation’s stability when the external counterinsurgent departs. 10-58. Integrated monetary shaping operations can be effective, but they should be linked into an overall development plan. Without that link, the haphazard use of money can be highly destructive to an economy because it creates an unsustainable economy once the counterinsurgent leaves. The basic point of integrated monetary shaping operations is primarily to be a catalyst for long-term and natural development and only secondarily to meet short-term needs or security concerns. Counterinsurgents must understand that interactions with the local culture do have far-reaching effects. The host-nation economy is one area where counterinsurgents can have both positive and negative effects. 10-59. Integrated monetary shaping operations can also inform a commander’s situational understanding. Property ownership records include census records, deeds, and other means of determining ownership of land and buildings. They help counterinsurgents to determine who should or should not be living in a specific area and help them secure the population. In some cases, it may be necessary for Soldiers and Marines to go door to door and collect census data themselves. 10-60. Financial records can provide information on sources of insurgent funding. Collection of financial records often requires help from agencies like the Department of the Treasury and financial institutions. It may require analyzing criminal activities or traditional means of currency transfer.
3-24
140
Chapter 10 10-61. Property ownership and financial records can reveal information about the structure of a society. Who owns and controls land and who controls debt provide some information on who may be a power broker in a particular society. Finding these individuals or institutions provides greater situational understanding for counterinsurgents. 10-62. Integrated monetary shaping operations can be used to aid stability efforts. Applicable funding authorities guide what types of uses of money are authorized. If authorized for the area of operations, some possible uses of money include— * Repairing damage resulting from operations. * Providing condolence payments to civilians for death or injury resulting from operations. This type of payment must be in accordance with prevailing standards for payments of solatia, a victim’s bereavement fund, or compensatory statutes provided by donor agencies and the United Nations. (Counterinsurgents must be aware of the going rates and, as far as possible, ensure that the right messaging is provided to the village or other district leadership where death or injury has occurred resulting from operations.) Further, counterinsurgents must guard against payment for injury or accident becoming a means of extortion or harassment. * Funding civic clean-up projects and other sanitation projects and equipment to provide those services. * Funding small-scale infrastructure improvements to improve the quality of life of citizens. * Funding agricultural projects to improve farming practices, improve livestock health, or implement cooperative farming programs. This type of activity should be conducted in consultation with donor agricultural agencies or the host-nation departments of agriculture to ensure that land rights and water rights of communities are not infringed and crop management is according to agriculturally sustainable principles. * Repairing civic and cultural sites and facilities. Preservation of cultural heritage is a sensitive issue and due respect to the site or culture and its practices must be adhered to. Counterinsurgents might be better to maintain a low profile and let the cultural leaders take a leading role in this initiative. * Repairing institutions and infrastructure critical to governance and rule of law (such as prisons, courthouses, and police stations). * Purchasing education supplies or repairing infrastructure critical to providing education to the local population. * Paying rewards, often discreetly, to citizens who provide information on enemy activities and locations. * Supporting the creation, training, and operation of host-nation security forces. * Funding events and activities designed to build relationships with host-nation officials and citizens. Money Usage Principles in Counterinsurgency 10-63. Seven principles can help guide the commander and staff in integrated monetary shaping operations in a counter insurgency. They are— * Host-nation ownership. * Capacity building. * Sustainability. * Selectivity. * Partnership. * Flexibility. * Accountability. Host- Nation Ownership 10-64. Units must ensure that there is counterinsurgent and host-nation ownership of any project. The local population and local government officials should view any project as their own and not one that has
3-24
141
Indirect Methods for Countering Insurgencies been imposed on them by outside agencies. A project that has been conceptualized, funded, and constructed at the local level legitimizes the local government in the eyes of the population and further contributes to stability. However, host-nation officials might lack the capacity to implement and manage the project. Counterinsurgents often consult development agencies to promote adequate ownership and accountability for projects. Capacity Building 10-65. Capacity building involves the transfer of knowledge, techniques, and skills to the local people, institutions, and government. This transfer enables those people to develop the capabilities to deliver essential services to the population. Ultimately, the local officials and institutions that gain capacity are better prepared to lead their regions through political, economic, and security-related issues. Sustainability 10-66. The principle of sustainability states that commanders should design and select projects and services that have a lasting effect on the local population. In other words, the impact of the projects under consideration must endure after forces hand over the facility or service to local authorities and the unit (or contractors) departure from the site. Sustainability implies that the local government has the necessary resources to staff and maintain the project. There are examples where commanders have failed to conduct adequate analysis and built new schools or medical clinics only to discover that too few teachers or doctors were available to staff these facilities. Similarly, some commanders have purchased large generator systems to address electricity shortfalls for neighborhoods within their areas of operation. However, without addressing the fuel, maintenance, and service requirements of these systems, the machines eventually failed and were unable to serve as a sustainable solution for the local electrical deficit. Selectivity 10-67. The development community defines the principle of selectivity as the allocation of resources based on need, local commitment, and foreign policy interests. These characteristics, while strategic, are equally important at the tactical level. Commanders seldom receive all of the financial resources they would like to have when implementing their essential service, economic, and governance lines of effort. Therefore, commanders and staffs allocate the available resources into select areas where there is a strong local commitment to the reconstruction program, where the project can positively impact the most people, and where the project under consideration can simultaneously best achieve the commander’s intent. 10-68. Commanders and staffs carefully research nominations, adopt best practices, and design for local conditions in their proposed projects. Commanders assess local conditions before investing financial resources into any potential relief or reconstruction program. Commanders and staffs do not invest money in an intelligence vacuum. They consider all available information about local conditions (such as the population’s requirements, animosities, traditions, capabilities, and economics). A detailed assessment of local conditions will best inform the commander on the project’s potential to deliver its desired effects. Each project should have a clearly defined, decisive, and attainable objective. Commanders and staffs must assess potential unintended results from their integrated monetary shaping operations. Many second or third order negative effects from a project may potentially outweigh the benefits from the original commander’s intent. Partnership 10-69. The principle of partnership involves close collaboration with local governments, communities, donors, nonprofit organizations, the private sector, international organizations, and universities. Partnership plays a central role in any relief, reconstruction, or development program, as it supports each of the other principles of reconstruction and development. In the context of money in integrated monetary shaping operations, effective partnership ensures the unit’s financial resources are well invested and synchronized to support the host nation’s internal defense and development programs and support other U.S. government strategic objectives for the country.
3-24
142
Chapter 10 Flexibility 10-70. The principle of flexibility mandates that units adjust to changing conditions, take advantage of opportunities, and maximize effectiveness as part of their reconstruction and development program. Just as the conditions for offensive and defensive operations are often changing and uncertain, so are the relief and reconstruction tasks associated with stability operations. These conditions often require commanders to change tactics to achieve desired objectives. Accountability 10-71. Enforcing accountability, building transparency into systems, and emplacing effective checks and balances to guard against corruption are important components to any relief, reconstruction, or development program. Accountability in all actions, to include the unit’s integrated monetary shaping operations, reinforces the legitimacy of the commander and operations, as well as the legitimacy of the local government, in the eyes of the population. (See ATP 3-07.20/MCRP3-33.1G for more information on integrated monetary shaping operations.)
3-24
143
Chapter 11 Working With Host-Nation Forces 11-1. The use of security cooperation tools to build governmental capability, including building a host nation’s forces, may be essential. In the eyes of a local population, the credibility of the host-nation government is vital in counterinsurgency efforts to address the threat and conditions of instability. The host nation’s military, police, and paramilitary forces are often the most visible elements of a host-nation government’s power and authority. Therefore, building the capacity of a host nation’s security forces should work toward improving the security force’s competence, capability, commitment, and confidence. (See table 11-1.) Table 11-1. Developing a host-nation security force Developmental Area Developmental Indicators Competence Host-nation security forces must possess and demonstrate individual and collective skills in their respective warfighting or law enforcement tasks. They must also support institutional functions. Capability Host-nation security force organizations must be appropriately sized to accomplish their respective missions. A host-nation security force must be adequately manned and equipped at a level that is sustainable, given that host nation’s own resources. A host-nation security forces’ supporting institutions, such as their national level force generation and logistic agencies, must be organized and directed in a manner that adds value to the lower-level, host-nation security forces’ mission requirements. Commitment A host-nation security force must be committed to the peaceful transition of political power. It must also be committed to the security and survival of the state, the rule of law, the preservation of human rights, civil liberties for the population, and to fighting hard (when necessary) to defeat the active insurgency. Confidence A host-nation’s population must believe that its host-nation security forces’ actions are always in the best interests of the people. A host-nation government must believe that its host-nation security force supports that government’s legal authority. Also, the international community must see a host nation’s security force as a force for good that respects human rights and the international law of war. 11-2. To enable a host-nation security force to conduct counterinsurgency operations, United States (U.S.) or multinational forces conduct various security cooperation activities. Commanders often view host-nation security force development as an essential task and one of their primary lines of effort. The resulting increase in a host nation’s ability to secure its own population yields significant benefits because host-nation troops are normally more effective in conducting operations among the local population than U.S. or multinational forces. Transitioning responsibility for operations to the host-nation security force reduces the visible presence of U.S. or multinational troops, further enhancing the legitimacy of the host-nation government. 11-3. Security cooperation can be an effective means to shape and aid a host nation’s counterinsurgency efforts. In the case of El Salvador, the U.S. had limits on its level of direct involvement. The U.S. mainly
3-24
144
Chapter 11 provided the government of El Salvador with security assistance. By following an effective strategy that linked this aid to governmental and military reform, the U.S. was able to shape the ongoing counterinsurgency and aid the government of El Salvador in defeating its insurgency. Security Cooperation in El Salvador In 1979, a group of disparate insurgent groups formed a coalition that would become a significant threat to the Salvadoran government. They were opposed by the Salvadoran armed forces, at that time a barracks-bound, defensively minded organization with severe deficiencies in command and control, tactical intelligence, tactical mobility, and logistics. The Salvadoran army did poorly in combat, and its only significant successes early in the conflict were in intimidating and massacring the civilian population. The mid-1980s saw a massive U.S. aid effort, and considerable civilian and military reform. Congressionally constrained to an initial limit of no more than 55 military advisors and no combat troops, U.S. aid consisted of arms, military trainers, and reform and civic action programs. Several of these programs made slow progress because many in the Salvadoran military resented their imposition by an outside power. Though resentful of the imposition, many in the Salvadoran military recognized the incentive structure, where much U.S. aid was contingent on improving El Salvador’s human rights record. Salvadoran Defense Minister Vides Casanova said, “We know that improving our image is worth millions of dollars of aid for the country.” Even if many Salvadoran counterinsurgents were principally motivated by the flow of foreign aid, they did learn, they did increase their competence, and they did improve their human rights behavior. The idea of focusing on all aspects of the struggle, political, social, economic, as well as military, had taken root and continued to the end of the war. 11-4. One issue with developing security forces in counterinsurgency is the issue of the quality versus the quantity of host-nation counterinsurgency forces. In the case of counterinsurgency, quality tends to be more important than quantity. While quantity and quality must be balanced to some degree and “quantity has a quality all its own” to the extent that too small a force will not be able to accomplish its mission, quantity is not a substitute for quality. 11-5. U.S. or multinational efforts to develop the capability and capacity of a host-nation security force must focus on operational and developmental needs of host-nation counterparts. Developing a sound plan to develop a host nation’s capability to address the root causes of the insurgency requires a deliberate, comprehensive assessment of that host nation’s security force. The set of metrics that the U.S. or multinational forces selects to assess a host-nation security force must be appropriate for the type of security force being assessed. For example, assessment of a host-nation army may require a completely different set of criteria from those used to assess a host-nation police force. Likewise, a host nation’s border or customs police, local (city or county) police, and provincial, state, or national police must all be assessed according to their specific mission requirements, while taking into consideration that host nation’s federal or local laws, political considerations, culture, and tribal affiliations. ASSESSING AND DEVELOPING A HOST-NATION FORCE 11-6. Assessment of host-nation army or land forces typically comes more naturally to U.S. or multinational forces than assessing host-nation police forces. It is easier for a Soldier or Marine to assess another Army or Marine Corps unit than it is for a Soldier or Marine to accurately assess a police precinct, fire department, or sanitation department. Developing measures of performance and measures of effectiveness based on their standards and how effective those standards are is important. (See chapter 12 for more information on assessments.) 11-7. One method to create an assessment framework is to form a working group of subject matter experts. This working group will review any lines of effort and tasks identified by the host nation and recommend
3-24
145
Working With Host-Nation Forces additions and subtractions based on their expert opinion. They will then identify relevant objective and subjective metrics that accurately measure the capability and capacity of the security force based on its doctrine, organization, training, materiel, leadership, personnel, facilities, policies, and operations. 11-8. U.S. or multinational forces working to develop the capability and capacity of host-nation security forces during the course of counterinsurgency operations must understand the difference between the assessment of host-nation security forces and the fulfillment of higher headquarters’ reporting requirements. Assessment requires a steady, persistent cycle of observation. Those observations help inform plans for subsequent security cooperation activities. They are also generally included in reports that help higher echelons make assessments of the overall effort. However, the data required for a report may not be enough to assess a host-nation security force. Historical examples of these kinds of reports include the operational readiness assessment submitted by advisor teams during operation Iraqi Freedom, and the commander’s unit assessment tool prepared by advisors or partner units during operation Enduring Freedom in Afghanistan. Higher headquarters reports rarely constitute a complete assessment of the host-nation security force at the tactical level. 11-9. Learning from how a host nation fights could benefit U.S. and multinational efforts in countering an insurgency. When the U.S. decides to become involved in an insurgency, U.S. forces need to learn how the host nation fights. If possible, the U.S. should send officers and noncommissioned officers to the host nation’s professional military schools. If the host nation does not have a developed institutional military, the U.S needs to find ways for leaders to observe how the host nation operates. To the extent possible, host-nation forces are built following host-nation doctrine or otherwise following the host nation’s traditional organization and approach. 11-10. Security cooperation is a multi-echelon endeavor that builds the capability and capacity of a host-nation security force at the executive direction, generating force, and operating force functions. During counterinsurgency operations, U.S. or multinational forces may take a bottom-up approach to building a host nation’s capacity to defeat the insurgency and defend its sovereignty by first developing host-nation security forces at the small-unit level. This approach buys time and space for a host nation to develop capacity at higher echelons. In time, a host-nation security force establishes the capacity to generate its own forces through recruiting, vetting, and induction of enlistees as well as officer candidates; initial entry training for all personnel, to include basic warrior or police skills and advanced technical, tactical, and leadership training; and processes for promotion, noncommissioned officer training, and senior leader training. A host-nation security force must also develop processes for acquisition and life-cycle management of major end items, as well as processes for procurement of all classes of supply, and contracting of other services or capabilities. At the executive direction levels, a host-nation security force must establish policies and a system of orders and directives that supports that host nation’s statutory framework and drives standardization of policies and procedures through a top-down flow of information and a robust command inspection program. U.S. or multinational personnel charged with conducting security cooperation activities in a counterinsurgency environment must look beyond the immediate tactical conditions on the ground and collaborate with multiple agencies to develop the supporting infrastructure required for a host-nation security force to sustain and regenerate itself over the long term. 11-11. A bottom up approach does not negate the importance of strategic and operational planning in security cooperation. In fact, decisions made at the strategic level may have strategic value and yet make little tactical or operational sense to local commanders and staffs. The is especially true with foreign military sales. For example, the U.S. may sell a major weapon system to a host nation that has inadequate means to maintain and support that weapon system. However, the sale may accomplish an essential political goal, or it may ensure a continued relationship between the host nation and the U.S. If a host nation is dependent on the U.S. for maintaining a major weapon system, this gives the U.S. influence over that host nation’s decisionmaking process. Tactical leaders must understand how their actions fit into the overall operational approach. 11-12. Counterinsurgency usually requires an adaptable campaign plan that includes specific objectives for all lines of effort, to include host-nation security force development. Comprehensive assessments of host-nation security force units conducted at regular intervals (possibly aligned with reporting requirements) provide critical information that can shape and inform U.S. or multinational units’ goals and objectives for host-nation security force development. One proven technique for creating an adaptable
3-24
146
Chapter 11 campaign plan is to prepare a draft plan prior to deployment, and then complete the plan once the initial assessment is complete. Following every subsequent assessment, the U.S. or multinational commander develops new goals and objectives based upon the developmental needs of the host-nation security force, and then the commander issues a fragmentary order with specific tasks for the advisor teams or partner units that support the new goals. 11-13. Host-nation security force developmental goals must include harmonized coordination among the various branches of the host-nation security force, particularly between the land forces and the police. All components of a host-nation security force must understand their own constitutional mandates and limitations. For example, a host-nation army must know if or when it has the authority to detain individuals suspected of a crime. Host-nation police forces must understand and support the rule of law, and ensure that their actions harmonize with the nation’s criminal courts, as well as with the prison system. Finally, when U.S. and multinational forces advise host-nation security force personnel, they must conduct the proper troop-to-task analysis to ensure that land forces orient their operations according to host-nation army doctrine, while police forces should be employed in a way that meets the expectations of a host-nation government and the people they protect. 11-14. Monitoring of host-nation security forces serves multiple functions, including intelligence and operations security. U.S. or multinational forces must always be aware of a host-nation security forces leadership’s loyalty to its host nation and be sensitive to any perceived intentions on the part of a host-nation security force that may run counter to legitimization of its nation’s government. 11-15. Unified action partners advise host-nation security forces to affect changes in the way they operate. If host-nation security forces are efficient across all functions, no advising is necessary. However, the only way a host-nation security force will undergo enduring growth and improvement is if the motivation comes from within. Therefore, advisors must shape host-nation security force actions so that they make their own processes and their systems work as intended. Prior to and during deployment, advisors must apply a motivated approach to learning and understanding a host-nation security force’s organizational design. To build effective working relationships, advisors need to possess a basic understanding of the host nation’s culture, social mores, and taboos. Language capability (focused on rapport-building words and phrases instead of just operational jargon) further enhances an advisor’s credibility and status. The ability to negotiate and communicate diplomatically is essential for effective advising. 11-16. Once the U.S. or multinational forces gain an understanding of their counterparts’ culture and organizational design and have completed an initial assessment of the host-nation security force unit’s capabilities and capacity, advising activities can commence. Advisors consider culture, resources available, and the base line assessment when choosing which advising task to employ when advising the host-nation security force. There are three tasks that impart knowledge to the host-nation security force: teach, coach and advise. * Teaching involves a number of activities designed to impart knowledge or skills to host-nation security force counterparts, but the advisor or partner unit drives the process. * Coaching also involves the transfer of knowledge, skills, and abilities, but host-nation security force units or individuals assume responsibility for applying what they have learned when executing counterinsurgency tasks. * Advising simply involves providing advice to commanders and staffs on their actions. There is no longer a need to actively transfer knowledge. Advising is passive and allows a host nation to be the primary actor. In many counterinsurgencies, the U.S. will only provide equipment, training, and advice. The host nation has a better understanding of the operational environment and is able to better maintain its legitimacy if it does not employ foreign forces directly. Advisors must keep in mind that they are also students and they probably have a great deal to learn from their host-nation counterparts. (See figure 11-1.)
3-24
147
Working With Host-Nation Forces Figure 11-1. Host-nation security force meter 11-17. Regardless of the tasks taken to develop the capabilities of a host-nation security force, a key interest of security cooperation in counterinsurgency is to legitimize a host-nation security force in the eyes of its population. This is best accomplished by setting the conditions for a host-nation security force to conduct security and law enforcement operations independently and professionally. 11-18. Assisting a host-nation security force in counterinsurgency means providing or augmenting a host nation’s security forces with U.S. or multinational capabilities or resources that they cannot generate on their own. Forms of assistance may include enablers such information collection assets and capabilities in support of a host-nation security force’s intelligence collection efforts. U.S. or multinational forces may provide assistance in the form of certain battlefield effects such as close air support, electronic warfare, secure long-range communications, or information operations. Assistance to host-nation security forces often complements their nascent logistics capabilities, such as transportation or mobility, medical capabilities, or corrective maintenance support. Assistance may also come in the form of materiel support across one or more classes of supply. For example, the U.S. may provide a host nation with fuel under a bilateral agreement, even if that host nation could acquire its own fuel for operational efficiency. Historically, host-nation security force personnel have shown few reservations about asking U.S. forces for materiel or other forms of assistance. Before providing any of these types of assistance, U.S. forces must ensure legal authorities permit the assistance. When pressed for assistance of any kind, U.S. or multinational personnel should ask themselves three questions: * Do my counterparts really need this materiel or capability to accomplish their mission? * Is there any way host-nation security forces could procure or acquire this resource or capability using their own systems, processes, or methods? * Can host-nation security forces sustain this system or capability over the long term? 11-19. Commanders and staffs should consider the following example. Host-nation security force counterparts suspect that insurgent forces have established camps on the far side of a ridgeline where they assemble and conduct final preparations prior to conducting attacks into major towns in the area. These counterparts ask if the U.S. commander can arrange for unmanned aircraft systems to maintain persistent surveillance over these suspected campsites to provide early warning of pending attacks. By posing the three fundamental questions listed in paragraph 11-18, it may be possible to determine other courses of action whereby a host-nation security force can produce and sustain the same effects. For example, the commander might offer a host-nation security force instruction on how to build an information collection plan and techniques for determining named areas of interest. Next, the advisors could coach their
3-24
148
Chapter 11 counterparts on determining what capabilities they have at hand to observe those named areas of interest. Can they establish permanent outposts or temporary observation posts that overlook these named areas of interest? Can they establish or improve relations with local police forces or tribal networks to establish hotlines linking the local population and the host-nation security force? Host-nation security force personnel may often imagine U.S. or multinational technological or logistic capabilities as more powerful than they truly are, and they may also fail to consider or neglect their own capabilities that can ultimately create the same effect. RELATIONSHIPS 11-20. Counterinsurgency operations require well-defined and understood relationships between U.S. and multinational forces and a host-nation security force. Insurgent forces will quickly identify and exploit gaps in counterinsurgents’ leadership and cohesion. Clearly defined relationships that evolve as a host-nation security force’s operational capabilities grow are essential for effective mission command and facilitate a smooth transition to a host-nation security force lead for security. Broadly stated, five possible command relationship types are worth considering for each specific counterinsurgency operation. These relationships are parallel, lead nation, partnered, integrated, and advisory. Each of these relationships requires U.S. or multinational forces to modify or adapt their organizations for combat to complement combined U.S. or multinational and host-nation security force counterinsurgency goals. (See figure 11-2.) Figure 11-2. Counterinsurgency command relationships 11-21. These relationships are useful for tactical and operational forces to understand. However, they are also somewhat different than the relationships found in JP 3-16. While JP 3-16 outlines a command structure in which the joint force can integrate multinational partners, paragraphs 11-22 through 11-26 provide information for understanding how to integrate forces at the tactical and operational level.
3-24
149
Working With Host-Nation Forces PARALLEL 11-22. A parallel command is when U.S. or multinational forces maintain their own command structure with no integration or partnership with a host nation. Under a parallel command structure, no single force commander is designated. This arrangement is suitable when a host-nation security force has well established, mature operational and institutional capabilities, and U.S. or multinational forces deploy to provide additional capabilities. The relationship may be based on U.S. forces being given a specific task. For example, U.S. forces may only conduct raids or only gather intelligence for the national command authority. It can also be based on the U.S. forces being given their own area of operations within a host nation. This can be done for various reasons, including that the area is sensitive to host-nation forces and an external counterinsurgent may provide a temporary stabilization of the area. This arrangement supports unit cohesion, and it also supports unity of command. LEAD NATION 11-23. A lead nation structure exists when all member nations place their forces under the control of one nation. This relationship works with one nation’s forces in the lead, and the supporting nation provides a unit or units that are attached to and under operational or tactical control of the lead nation. This arrangement provides flexibility in that the U.S. or multinational force may initially serve as the lead nation, and as the operational capacity of the host-nation security force grows, the host nation can eventually assume the role of lead nation. In also provides a possible means for the U.S. to aid a host nation in an ongoing insurgency. For example, the U.S. could provide a brigade to a host nation in an ongoing insurgency. Like parallel command, this arrangement supports unit cohesion, and it also supports unity of command. PARTNERED 11-24. This arrangement differs from parallel command in that U.S. or multinational forces and host-nation security forces are paired down to the small-unit level. Commanders and staffs must consider how to manage unity of command, logistics challenges, and language and cultural barriers. Partnering has the advantage of maintaining a degree of unit cohesion (individual units are still homogenous), and the specific capabilities of each nation’s force can be leveraged down to the small-unit levels. INTEGRATED 11-25. Integrate means to assemble forces from both the U.S. or multinational and a host-nation security force, and meld them into a single, inseparable unit. Integration, also referred to as augmenting, poses many challenges, but it has been used successfully in the past. For example, the Korean augmentation to the U.S. Army was a very successful program that integrated individual South Korean soldiers into Army units. This yielded units with enhanced manpower, and cultural and linguistic fluency, down to the squad level. The drawback is that integration requires significant time to institutionalize and does little to enable a host-nation security force as a whole to assume lead responsibility for operations. Integration requires a single shared language for all personnel, so either the U.S. or multinational forces will have to learn the host nation’s language or host-nation security force personnel will have to learn English. Furthermore, integration of U.S. and host-nation security forces into a single coherent force requires significant combined training in individual and collective tasks, which will result in a period at the beginning of the deployment when the integrated force is not fully combat capable. This could result in extended deployment periods to compensate for this operational integration and training period. Finally, integration does little to build the capability and capacity of the host nation’s ministerial-level leadership or the security forces’ supporting institutions. ADVISING 11-26. When host-nation security force units achieve a certain degree of organizational maturity at a specific echelon, U.S. or multinational forces may assign individuals or teams of advisors to perform any number of advisory tasks. One advantage of this approach is that is imposes the smallest possible U.S. or multinational force requirement. It also puts the host-nation security force in the most visible role of
3-24
150
Chapter 11 providing security to local population. Finally, since the basing and force requirements are relatively small for U.S. or multinational forces, it is the most flexible and adaptable relationship. Advisor teams can be quickly reassigned to different host-nation security force units based upon capability gaps across the host-nation security force. (See FM 3-22 for more information on advisors.) SECURITY COOPERATION PLANNING 11-27. Security cooperation activities occur across the range of military operations. Two important activities relevant to counterinsurgency are foreign internal defense and security force assistance. Foreign internal defense is participation by civilian and military agencies of a government in any of the action programs taken by another government or other designated organization to free and protect its society from subversion, lawlessness, insurgency, terrorism, and other threats to its security (JP 3-22). Security force assistance consists of the Department of Defense activities that contribute to unified action by the US Government to support the development of the capability and capacity of foreign security forces and their supporting institutions (JP 3-22). Moreover, security assistance, which includes activities in which the U.S. provides defense articles, military training, and other defense-related services by grant, loan or credit, could be important in equipping and resourcing a counterinsurgency force. Both foreign internal defense and security force assistance represent important defense activities to build the capacity of a host nation to defeat an insurgency. (For a further discussion on foreign internal defense, security force assistance, and security assistance, see FM 3-22). 11-28. Security cooperation activities are part of both strategy and policy. In planning security cooperation activities, combatant commanders start with the National Security Strategy issued by the White House and expanded upon in overarching Department of Defense (DOD) guidance documents. The National Defense Strategy influences the Guidance for Employment of the Force, which provides the parameters for combatant commands to develop their theater and functional campaign plans, which are the mechanisms to support the synchronization of the comprehensive civilian and military efforts specifically designed to end insurgent violence and facilitate a return to peaceful political processes. The combatant commander’s plans are comprehensive, as they consider design, organization, integration, conditions and objectives for a region during steady state, crisis, and contingency (including counterinsurgency). DOD develops its plans, taking into consideration all relevant stakeholders (including other partner nations and international organizations.) These plans should incorporate the full range of capabilities that are required to meet the desired end state. These plans set conditions for actions that take place throughout all phases of joint operations. (See figure 11-3 for a graphic representation of this relationship.) (See FM 3-22 for a detailed explanation on security cooperation activities and planning.)
3-24
151
Working With Host-Nation Forces Figure 11-3. Country planning JOINT PHASING MODE 11-29. Security cooperation takes place during all phases of the joint phasing model. Counterinsurgents may use security cooperation to prevent an insurgency before a major combat operation, during a combat operation, and after a major operation. This can also apply to an active insurgency. While the joint phasing model does not provide a universally prescriptive template for all conceivable joint operations, it does provide a flexible model to arrange operations. The operation plan consists of six phases: * Phase 0, shape. * Phase I, deter. * Phase II, seize the initiative. * Phase III, dominate. * Phase IV, stabilize. * Phase V, enable civil authority. 11-30. Shape, or phase 0, operations of the joint phasing model are joint and multinational operations that include normal and routine military activities. During phase 0, both the Army and Marine Corps perform security cooperation activities as directed in higher plans and orders to indirectly support a host nation in countering an insurgency. Since security cooperation operations can continue through all phases of the operation, many of the activities, such as foreign internal defense direct support and foreign internal defense combat operations, must have the unified application of U.S. forces to achieve the desired effects in countering insurgent operations. This is critically important as these efforts are important elements in phases II and III. Foreign internal defense, security force assistance, and other security cooperation
3-24
152
Chapter 11 activities are essential throughout the phases of any operation. (See JP 5-0 for more information on the joint phasing model.) 11-31. If the U.S. commits forces to a counterinsurgency conflict, it will normally deploy a joint task force or multinational joint task force headquarters to provide planning and command and control. The multinational joint task force’s desired end state is to terminate the operation plan at the conclusion of Phase V, stand-down or redeploy the multinational joint task force headquarters, and revert to Phase 0 operations. The geographic combatant command and respective Service component commands, in coordination with the country team, resume security cooperation activities directed by the country plan. Counterinsurgency operations typically extend across all phases (0 through V). Therefore, U.S. or multinational security force assistance and foreign internal defense activities in support of the host-nation security force’s counterinsurgency conflict may occur under the auspices of the American ambassador to the host nation and the geographic combatant commander, or under the authority of the multinational joint task force commander. DEVELOPING HOST-NATION SECURITY FORCES 11-32. Both foreign internal defense and security force assistance can be used as part of a long term plan to develop and deploy a host-nation force to defeat an insurgency. While the U.S. may intervene in a country that only needs enablers to enhance an already effective military force, a host nation may lack an effective military. If the host nation lacks an effective military, aid in the development of that host-nation military could follow five phases: planning and resourcing host-nation security force, generation of host-nation security force, employment of host-nation security force, transition of responsibility for security to host-nation security force, and sustainment of host-nation security force. These phases are distinct and independent of those in the joint phasing model. U.S. or multinational forces conduct parallel planning with their host-nation security force counterparts to achieve strategic, operational, and tactical objectives in support of the overall counterinsurgency campaign, while at the same time working toward milestones that lead to a successful transition from U.S. or multinational lead to host-nation security force lead for security. 11-33. Typically, the first phase of building a host-nation security force, planning and resourcing, falls to the responsibility of geographic combatant command-level planners in coordination with the country team. Coordination of legal authorities and funding for security force assistance and foreign internal defense activities is an interagency process because it typically involves resources provided under a number of different sections of the United States Code (USC). Moreover, other security cooperation programs, such as foreign military sales, may be essential in equipping another military to perform foreign internal defense operations. 11-34. Generating the host-nation security force is the second phase in building a host-nation security force. If the U.S. is deploying conventional forces, this will probably be the initial phase in which regiments or brigade combat teams will actually have an active role. These forces can partner with host-nation security forces of varying developmental levels in the conduct of counterinsurgency operations. For example, while supporting recent counterinsurgency operations in Colombia and the Philippines, host-nation security force counterparts had already fielded relatively sophisticated, well-developed operational units supported by robust supporting institutions and well established executive-level or ministerial leadership. In other U.S. historical counterinsurgency operations such as Afghanistan and Iraq, the host-nation security force operational units, their supporting institutions, and the most senior-level executive leadership functions were undeveloped or completely non-existent. In situations such as these, U.S. and multinational forces must organize, train, and equip host-nation security force units while assisting in the building or rebuilding of their supporting infrastructure. The organize, train, and equip security force assistance tasks may be assigned to U.S. or multinational regiment- or brigade-sized units while they are simultaneously battling the insurgents. At the same time, unified action must be taken to establish a host-nation security force’s own sustainable force generation capabilities and capacity. U.S. or multinational personnel, working with their host-nation security force counterparts, are placed in a difficult predicament in that they must carefully select key host-nation security force leaders to be pulled away from the immediate counterinsurgency fight to assume critical command and staff positions within the host-nation security force’s organizations. Counterinsurgents must exercise restraint by not assigning all of the best host-nation security force leaders to operating force units while neglecting to invest in their own force generation capacity. (See figure 11-4.)
3-24
153
Working With Host-Nation Forces Figure 11-4. Phases of building a host-nation security force 11-35. The third phase of building a host-nation security force is the employment of a host-nation security force to protect the population and defeat the insurgents. During this phase, the primary focus shifts from organizing, training, equipping, and rebuilding host-nation security forces to employing host-nation security forces to perform the security tasks for which they were designed. As one host-nation security force unit enters the employment phase, other units may have just begun the force generation process. Meanwhile, there may be more seasoned host-nation security force units that are ready to transition to the lead for security operations in their assigned area of operations. Additionally, it may be possible to generate host-nation police forces more quickly than army units, since they can be employed individually or in small station-level units, they do not need to conduct large-scale collective training exercises, and they typically have fewer materiel requirements. However, it may take considerably longer for police forces to show their effectiveness during the employment phase due to the length of time it takes for police forces to gain the trust of the local population and build productive, enduring relationships with local or tribal leaders. 11-36. The fourth phase of building a host-nation security force in a counterinsurgency is the transition of responsibility for security operations from the U.S. or multinational forces to a host-nation security force. In some instances, such as in Colombia or the Philippines, a host-nation security force may already be mature and highly capable in most or all operational realms (land, air, and maritime). Security force assistance activities and the resulting transition to a host-nation security force lead may refer only to specific functions such as intelligence or an even more discreet set of tactical tasks, such as employment of remote sensors, that supports the host nation’s strategic or operational counterinsurgency goals. In these instances, the U.S. may provide operational capabilities to meet the immediate threat, while conducting security force assistance in the form of equipment or training to close the capabilities gap. Once the capability gap is filled, a host nation’s security force assumes responsibility for that function, and U.S. forces redeploy, with the country team providing the host nation access to long-term security assistance programs as appropriate. 11-37. The defense attaché office and foreign area officers play an important role in long-term security assistance programs. In other cases such as Iraq, U.S. or multinational forces may initially have to assume responsibility for all security tasks in all operational realms, and across all security force functions (land forces, police, and border security). In the latter case, transition is a lengthy process with no clearly defined beginning or end date. 11-38. Transition will likely be conducted in steps or subphases, and the steps or subphases may be geographic, functional, or a combination of both. For example, the transition to host-nation security force lead for land force security operations may transpire one province at a time until the entire country has transitioned. A second example might be for transition to occur for land forces across the entire country by
3-24
154
Chapter 11 January 20XX, all police forces by June 20XX, and air and maritime forces by December 20XX. A transition to a host-nation security force lead should be conditions or assessments-based, although the U.S. or multinational forces may elect to use a set transition date as a forcing function to compel the host-nation security forces to assume greater responsibility for securing their own country and their own people. Transitions will rarely be simple. In cases where U.S. or multinational general-purpose brigade combat teams deploy for extended tours such as 12-month rotations, units may find that they are supporting the host-nation security force transition to lead for security when they arrive in-country and still supporting the same transition when they redeploy one year later. 11-39. The fifth phase of building a host-nation security force in counterinsurgency is sustainment. In this context, the term sustainment does not refer exclusively to logistic sustainment or sustainment functions. Rather, sustainment is an ongoing set of security assistance activities (Title 22) and security cooperation activities (Title 10) designed to enhance the capabilities and capacity of a host nation to provide for its own security and to participate in regional or global multinational operations. These programs also seek to develop enduring relationships with key leaders within the host-nation security force and to facilitate peacetime or contingency access to host-nation facilities such as ports, airfields, and training venues. As the transition to the host-nation security force lead for security draws to a close, there may be a number of security force assistance tasks that require an extended period to be completed properly. Examples include foreign military sales of new equipment such as tanks, artillery, helicopters, or watercraft and subsequent deployment of mobile training teams to train the host-nation security force on the employment of these new weapons systems. Enduring geographic combatant command-level security cooperation activities, such as rotational deployment of U.S. forces to conduct combined exercises with the host-nation security force, sustain and extend the development of the capability and capacity of a host-nation security force to deal with residual insurgent threats and potential future external threats to that host nation’s sovereignty. 11-40. In a counterinsurgency, the host-nation security force’s executive and ministerial leadership, its force generation capacity, and its operating forces’ capabilities must develop and mature quickly, while U.S. or multinational forces initially provide time in the form of security to allow this process to succeed. U.S. or multinational forces gradually reduce and eventually relinquish control of the counterinsurgency to a host-nation security force. Parallel planning with a host-nation security force provides the blueprint for what must occur from the U.S. or multinational side and a host-nation security force side of an operation. Both entities plan for transition to host-nation security force lead, but they approach the transition from different perspectives. Initially, teaching, coaching, and advising host-nation security forces in their planning efforts is part of the overall process, but it ultimately should result in a host-nation security force having the capability and capacity to defeat an insurgency on its own. PARALLEL PLANNING 11-41. When enabling a host nation to develop a security force, parallel planning is essential. Parallel planning is a time-saving technique that enables leaders at all levels from fire team to division to initiate the operations process (plan, prepare, execute, and assess) prior to the receipt of a complete operation order. Parallel planning allows units to generate tempo by conducting a multi-tiered planning process. This reduces haste and provides all echelons more available time to prepare for future actions. Likewise, parallel planning with host-nation security forces enables greater efficiency and the ability to conduct simultaneous actions. It also serves as an essential step in the host-nation security force transition to the lead for security in a counterinsurgency. 11-42. Parallel planning with the host-nation security force assumes adequate planning capabilities on the part of at least some of the host-nation security force commanders and staffs. When making this assumption, U.S. or multinational forces assume operational risks relating to the ability of the host-nation security force staffs to deliver on their planning requirements. Considerations when conducting parallel planning with the host-nation security force commanders and staffs may include, but are not limited to, varying or competing agendas, lower literacy rates, access to computer technology, and use of graphics or visuals. U.S. commanders and staffs conducting parallel planning consider these points:
3-24
155
Working With Host-Nation Forces * U.S. or multinational forces have their own national security objectives, while host-nation counterparts may have conflicting objectives from the national to the local level. * Literacy rates in many of the countries that the U.S. or multinational forces may partner with are often far below that of the U.S. or other western countries. Lack of formal education, however, does not preclude the host nation from being capable of understanding the western style of military planning. * Access to computer technology in various host nations often does not match that of the U.S. or western countries. Commanders and staffs may have to use manual methods of data collection, storage, and dissemination. * Instructional programs, whether computer based or done on a terrain model, are based on western preference for the presentation of information through visual modalities. Successful counterinsurgency operations require U.S. or multinational advisors to imbue their host-nation security force counterparts with the capability to process raw data into information that provides knowledge and leads to an understanding of an operational environment. * Security classification of host-nation counterparts. * Foreign disclosure restrictions. 11-43. Regardless of the difficulties of parallel planning, U.S. and multinational forces make every effort to understand host-nation planning capabilities prior to conducting operations. Despite the many challenges presented by conducting parallel planning with host-nation security forces, U.S. and multinational forces should be completely integrated into the planning process as early as possible because the host nation can potentially bring to the counterinsurgency specific and essential abilities. (See table 11-2 for examples of host-nation contributions.) Table 11-2. Host-nation contributions Task Reason for contribution Understand an operational An area of operations is a host nation’s home and its environment culture; a host-nation force knows the language, the different groups, the political situation, educational levels, economic considerations, historical bad actors, and unofficial community leaders. Provide human intelligence Host-nation security forces may be able to better gather information that leads to human intelligence for many reasons, including speaking the same language and understanding the important players in the area. Put the pieces together Host-nation forces can often better integrate the different fragments of intelligence into the context of an operational environment. Determine credibility of Host-nation forces possess a vastly superior sense of intelligence assets (sources, cultural intelligence and may be able to assist in assigning walk-ins, call-ins) credibility to sources. Validate and check Host-nation forces can assist in confirming the locally hired interpreters interpreters’ abilities to interpret. Identify and root out Host-nation forces can pick out minute differences between infiltrators normal and abnormal behaviors. Gain information superiority Host-nation forces can help write messages that may resonate with the local population. Vet locally hired personnel for Host-nation forces have access to resources not counterintelligence and necessarily available to U.S. personnel. security purposes 11-44. Tactical-level planners in the U.S. military employ either the military decisionmaking process or the Marine Corps planning process to gain an understanding of an operational environment, identify the
3-24
156
Chapter 11 tactical problem, develop possible courses of action, and evaluate and select the best course of action to most effectively address the tactical problem. Commanders and staffs first properly frame the problem. When given a set of inputs, such as an order from higher headquarters or some other initiating directive, certain intelligence products, and an initial commander’s visualization, commanders and staffs complete the steps to work toward a specified output, such as a finished operation order. In cases where host-nation security force leaders have been directly involved in combat operations over many years, those leaders who survive often owe their lives to their own ability to improvise. As a result, many host-nation security force leaders apply an intuitive, instead of a process-oriented, method of making decisions. They can immediately size up a tactical situation, almost instantaneously recognize dangers and opportunities, and decide upon a course of action. While this capability can serve in critical situations, it cannot be taught to others, and it is of no use in situations unrelated to the leader’s own experiential learning. Therefore, U.S. or multinational advisors may have to work patiently with their host-nation security force counterparts for them to develop a planning and decision support process instead of allowing them to rely solely on the intuitive approach. 11-45. U.S. and multinational planners ensure that they have conducted basic mission analysis prior to parallel planning with host-nation partners. This allows advisors to develop and assess assumptions, identify implied and specified tasks, determine what assets and capabilities are available, and formulate a tentative timeline to coordinate advisory efforts throughout the planning process.
3-24
157
Chapter 12 Assessments 12-1. Assessment is a continuous process that measures the overall effectiveness of employing joint force capabilities during military operations. It is also a determination of the progress toward accomplishing a task, creating a condition, or achieving an objective (JP 3-0). The assessment process monitors the effects of actions on mission accomplishment. Operational assessments have three enduring purposes. First, they monitor the nature, scope, and severity of a situation. Second, they track a military force’s implementation of a plan in combination with collaborating agencies. Finally, operational assessments evaluate progress towards achieving goals or objectives. Commanders and staffs must integrate assessments into the Army design methodology and conceptual planning. Assessments are crucial for successful adaptation and innovation by commanders within their respective areas of operation. Assessments are also essential in any type of transition. They are a key ingredient in adapting and learning. Assessments must be part of initial design. Commanders and staffs must conceptualize what is actually important and determine how to question those assumptions from the beginning of understanding a problem. (See ADRP 5-0 and ADRP 6-0 for doctrine on assessments.) Assessment precedes and is integrated into every operations activity and entails two broad, enduring tasks: * Continuously monitoring the current situation (including the environment as it affects friendly forces, enemy forces, and the population) and the progress of the operation. * Evaluating the operation against established criteria, expected outcomes, and the desired end state. 12-2. Commanders, assisted by their staffs, continuously evaluate an operation’s progress against the established commander’s intent, mission, and concept of the operation. Based on their assessments, commanders may adjust the operation and associated activities to better achieve the end state and adjust assessment criteria to address the most credible and relevant activities. 12-3. The critical role of assessment necessitates establishing measures of effectiveness and performance during planning. Commanders choose these measures carefully so that they align with the overall operational design and the superior commander’s intent. These measures reflect the interrelationship among the lines of effort. Commanders and staffs revise their assessment and measures of effectiveness and performance as an operation progresses to most effectively focus limited collection and analytical resources. 12-4. Sound assessment blends qualitative and quantitative analysis with the judgment and intuition of all leaders. Commanders must apply assessments carefully, as counterinsurgency operations most often involve complex societal issues that may not lend themselves to quantifiable measures of effectiveness. Moreover, bad assumptions and false data can undermine the validity of both assessments and conclusions drawn from them. Data and metrics can inform a commander’s assessment. However, they must not be allowed to dominate it in uncertain situations. Subjective and intuitive assessment must not be replaced by an exclusive focus on data or metrics. Commanders must exercise their professional judgment in determining the proper balance. ASSESSMENT FRAMEWORKS 12-5. Several assessment frameworks have been developed over the past decade. Depending on their specific purpose, they can be used as tools to develop an interagency initial assessment, assess conflicts, or measure progress. For example, the Interagency Conflict Assessment Framework is a recognized and very useful initial assessment framework (See United States [U.S.] Government publication Interagency Conflict Assessment Framework). Alternatively, units may use some form of systems analysis based on the operational variables.
3-24
158
Chapter 12 ASSESSMENT METHODS 12-6. Selecting the appropriate approach to assessment is the commander’s most important assessment decision. Assessment methodologies may be centralized, decentralized, or both. A centralized methodology requires units to collect and report information requirements to their higher headquarters for analysis and situational understanding. This is a common methodology and is often described as pattern and trend analysis. Pattern and trend analysis uses centralized quantitative analysis to produce a snapshot of the operation’s momentum over time. Pattern and trend analysts tend to accept that counterinsurgency data will be inaccurate and incomplete, but when viewed in aggregate this data will be sufficient to produce relevant, centralized, and quantifiable analysis. Pattern and trend analysis measures progress, but it is not truly an assessment. The problem with the centralized approach to assessment is that the decentralized nature of counterinsurgency prevents the development of any centralized model to understand the important nuances of local context. Decentralized assessments enable subordinate units to develop and measure progress locally. The interaction between levels of command is critical to informing the higher commander. Although decentralized assessments are preferred by the lower tactical levels, actual measurement of progress is limited by the lack of a common starting point. This often gives the best picture of a local situation, but it lacks the context of how it compares to other locations. Senior commanders must weigh the results by comparing assessments with dissimilar measurements. This makes the development of an aggregate analysis very difficult. 12-7. Military forces in counterinsurgencies usually use a combination of these two assessment methods, choosing common reporting requirements for all subordinates but also requiring a subjective analysis from each of the subordinate commanders to aid in informing the senior commanders’ situational understanding. Units report qualitative statistics to enable pattern analysis, and commanders provide quantitative analysis to fully depict what the statistics mean at the local level. The combined assessment involves a top down planning, bottom-up refinement approach in which analysis is conducted at the level the data is collected and reports to higher headquarters include narratives from local commanders. This type of assessment eschews the establishment of core level metrics at the highest levels and allows commanders to establish additional metrics in accordance with their situation and their resources. Combined assessment generally results in more accurate reporting and efficient use of collection and analysis resources. 12-8. In geographically distributed, decentralized counterinsurgency campaigns, only a few activities produce similar outcomes or are consistently implemented across the theater of operations. What is important in one area may not be important in another. Similarly, what works in one area may not work in another area. ASSESSMENT CONSIDERATIONS 12-9. Assessment begins as soon as a military force receives an alert or warning and does not end until after that force has ceased operations and left the area of operations. Assessment begins with an initial assessment that serves as the basis for planning. Planning develops this into an operational assessment that evaluates plan effectiveness and focus. The assessment is continually reassessed. Often plans are updated because of the reassessment process. 12-10. The assessment should reflect the achievements of collaborating partners. Military forces cannot defeat an insurgency alone. Assessors must realize that information about the underlying root causes for social, cultural, political, and economic turbulence will probably be incomplete. Obtaining reliable information can be costly and time-consuming. Assessors should be extremely wary of methods that claim to provide this information quickly. An assessment based on faulty information can result in military force actions that are counterproductive. It is better for assessors to monitor the situation, track what every organization is doing, and be clear about what they do not know. The next step is to postulate, hypothesize, and clearly state what assumptions the evaluation process is making. Assessors seek information to test assumptions and revise estimates as operations continue. 12-11. At its core, a counterinsurgency environment is a political problem. Understanding and solving the political problem is the essence of counterinsurgency operations. A counterinsurgency environment is complex, with many lines of effort covering a variety of political, military, economic, social, infrastructural, and informational activities. As such, developing a comprehensive assessment is a
3-24
159
Assessments time-consuming process that is difficult to perform properly and effectively. Counterinsurgents must assess not only their own actions or inactions, but also those of insurgents and the population. In understanding these actions and inactions, counterinsurgents must have a thorough knowledge of the history and culture of their areas of operations. These assessments must include, among many other factors, the context for any given situation, the perceptions of those involved, and the possible outcomes of actions or inactions. 12-12. Commanders are responsible for assessments. The commander’s direct and personal involvement in the assessment process is critical. Moreover, assessments must contain both subjective and objective elements. Assessments combine elements of science and art. They are not simply a collection of numbers or indicators. Commanders and staffs must understand assessments in the context of the overall campaign, not just from a military perspective. 12-13. Countering an insurgency most often involves an extended campaign. Counterinsurgents must assess actions or inactions broadly, to include how they are viewed locally, within the multinational force (if one exists), host nation, and the region. Counterinsurgents also assesses actions against host-nation strategic goals. Without the backing of each of these levels, counterinsurgents risk loss of legitimacy and potential failure. 12-14. Eliminating the root causes of an insurgency is the goal of a counterinsurgency. Assessment must focus on those activities and actions that are most important in addressing these root causes. Assessment must be focused on gathering the right information needed to understand what to do. The commander must determine if counterinsurgents are doing things right, if counterinsurgents are doing the right things, and if change is necessary. 12-15. Balanced assessments include information from all relevant and objective sources, including both quantitative and qualitative data. This data includes the proper combination of centralized and decentralized reporting. A balanced assessment includes countering opinions and data that contradict overall findings. A combination of quantitative and qualitative types of indicators reduces the chance of misconstruing trends. 12-16. No assessment will ever show all the aspects of a counterinsurgency campaign. Efforts to show all aspects of a counterinsurgency waste resources and place unrealistic demands on subordinate units that often result in falsified reporting. Assessment should rely principally on information gathered through ongoing intelligence and operational reporting. Demands for additional reporting should be minimized. 12-17. There is no substitute for seeing a battlefield as a means for understanding a situation. Battlefield circulation is critical to establishing relationships between commanders at all levels. The view of a commander who daily walks and lives in a particular area of operations provides a level of insight that no statistic or report can replace. These first-hand encounters provide commanders a lens with which to review and compare centralized reports and trend analysis with the intuition and local understanding of subordinate commands. 12-18. Collecting, assembling, and analyzing information is a time and labor-intensive process. Commanders balance time and resources for assessment just as they do across the planning, decision, and execution continuum. To help achieve this balance, commanders and staffs ask the following questions: * What must be understood to begin planning? * What will be assessed and to what detail? * How will a particular task, objective, end state condition, or assumption be assessed? * What measures of effectiveness and measures of performance will be used? * What information requirements (indicators) are needed to support a particular assessment? * Who on the staff has primary responsibility for assessing a particular area? * What is the collection plan? * How can the host nation help? * How can the other agencies of the U.S. government assist? DEVELOPING MEASUREMENT CRITERIA 12-19. Assessment requires determining why and when progress is being achieved along each line of effort. Traditionally, commanders use discrete quantitative and qualitative measurements to evaluate
3-24
160
Chapter 12 progress. However, the complex nature of counterinsurgency operations makes progress difficult to measure. Subjective assessment at all levels is essential to understand the diverse and complex nature of counterinsurgency problems. It is also needed to measure local success or failure against the overall operation’s end state. Additionally, commanders need to know how actions along different lines of effort complement each other; therefore, planners evaluate not only progress along each line of effort but also interactions among lines of efforts. 12-20. The most common types of assessment measures are measures of effectiveness (MOEs) and measures of performance (MOPs). A measure of effectiveness is a criterion used to assess changes in system behavior, capability, or operational environment that is tied to measuring the attainment of an end state, achievement of an objective, or creation of an effect (JP 3-0). MOEs focus on the results or consequences of actions. MOEs answer the question, “Are we achieving results that move counterinsurgents towards the desired end state, or are additional or alternative actions required?” A measure of performance is a criterion used to assess friendly actions that is tied to measuring task accomplishment (JP 3-0). MOPs answer the question, “Was the task or action performed as the commander intended?” 12-21. MOEs and MOPs for assessing counterinsurgency operations are designed with the same characteristics. MOEs and MOPs are measurable, observable, distinctive, relevant, and responsive: * MOEs and MOPs have quantitative or qualitative standards against which they can be measured. The most effective measurement is a combination of quantitative and qualitative measures to guard against an inaccurate view of results. * Each MOE and MOP measures a separate, distinct aspect of the task, purpose, or condition. * MOEs and MOPs are relevant to the measured task, outcome, and condition. Host-nation local, regional, and national leaders, and NGO personnel, may provide practical ideas, professional ideas, and feedback to craft relevant MOPs and MOEs. * Assessment tools detect environmental and situational changes. DESIGNING MEASURES OF EFFECTIVENESS AND PERFORMANCE 12-22. An MOE provides some information about how an operational environment is changing. An MOE of a number of attacks on counterinsurgents can indicate a successful counterinsurgency, or it can indicate insurgent control of an area and an unwillingness of counterinsurgents to contest that control. In this example, commanders and staffs need to understand why the number of attacks are down. What is essential to any MOE is the development of an effective measure that tells the commander critical information about how an operational environment is changing. 12-23. Moreover, in developing MOPs, commanders and staffs measure a unit’s performance based on the conditions of its area of operations. In other words, MOPs should be developed as a means to measure if a unit is effectively doing the things that the commander and staff view as essential to defeating an insurgency. MOPs are developed based on a counterinsurgency mission and an area of operations. 12-24. When designing MOEs and MOPs, commanders and staffs consider several points: * Raw counts of something is usually not as important as how many out of a possible total and how important each one is. * Knowledge of the state of insurgent training may provide information about the overall capability of the insurgency. If an insurgency can produce trained units, it may have a higher military and sustainment capacity. * Training in other states could indicate support from another state. * A high number of un-coerced informant reports could be an important indicator of a breakdown in insurgent security. Also, the position of the informer in the society might be an important indicator. * The number of insurgent attacks is not always as important as the scale of an insurgent attack. Large-scale attacks require a level of operational sophistication that may imply an increased insurgent capability.
3-24
161
Assessments * How many insurgents are caught and jailed may be an important MOE. However, the number convicted and sentenced by government judicial authorities and remaining in jail over time is also an important MOE of governmental capability and corruption. * The number of recruits available for an insurgency can be an important indicator of the government’s and the insurgency’s legitimacy. * An MOP based on the number of patrols in a given area over a period may not be as effective as the persistence of patrols in a given area over the same period of time. * An MOE based on the amount of money seized may not be as important as an MOE based on denying funding sources. It may simply show an increased flow of funds into an area. 12-25. When developing MOPs and MOEs, commanders and staffs avoid developing MOPs or MOEs that highlight what a commander and staff are actively doing to defeat an insurgency. For example, building a number of schools can be used as an MOP, and the number of students in the school can be used as an MOE. However, these activities may have no effect on an insurgency at all. Commanders and staffs connect MOEs and MOPs to their operational environment and insurgency. Accepting the assumption that what one is doing is actually relevant to defeating an insurgency is an easy means to undermine the effectiveness of MOPs and MOEs. Commanders and staffs avoid the trap of thinking that because they do something and measure it, it is important. 12-26. Commanders and staffs generally avoid measures that lack context. For example, the number of enemy killed, without any context, is normally a dangerous MOP. The number of enemy killed can indicate that the insurgency is increasing its recruitment and capabilities, thus more insurgents are being killed in more attacks. Commanders and staffs establish some context in any measure that they use. 12-27. Vietnam highlights the importance of creating an assessment framework that is contextual to the insurgency and is relevant to actually measuring success. In Vietnam, U.S. leadership made assumptions about what were important measures of success without connecting those measurements to situational understanding. Many U.S. leaders did not actively question their assumptions. Even worse, their ineffective assessment framework had an influence on operations. Measuring Effectiveness and Performance in Vietnam Historical accounts of the conflict in Vietnam vary widely in the points emphasized and the explanations offered. Disputes are facilitated by the different personal experiences of many different direct observers who saw or participated in sometimes very different slices of the conflict at different times, at different operational levels, and in different parts of the country. What, if anything, could have been done to change the outcome of the war and who to blame for that outcome remains fairly hotly contested. What the outcome was, however, is not contested: U.S. forces withdrew in 1973, and the Saigon government fell to the combined pressure of the insurgency and North Vietnamese regular forces in April of 1975, unequivocally a counterinsurgent loss. The literature on the U.S. military’s Vietnam-era assessment process is highly negative; even the most strident defenders of the assessment reports produced during that period expressed some dissatisfaction with the process. Assessments of the Vietnam War varied in type, purpose, and intended consumer. The entire process changed and grew between the early 1960s and the early 1970s; there was no single “Vietnam War assessment.” There were many assessment processes, and many were burdened with murky objectives, measures that were poorly connected to those objectives, and poor data collection. Quantitative data of questionable veracity were used to make optimistic prognostications, such as the illusion of a trend toward “a light at the end of the tunnel.” Distrust of Vietnam-era military briefings became so endemic that members of the press corps referred to the daily military press briefings as the “five o’clock follies.” The Military Assistance Command, Vietnam, or MACV, was the theater- level military command in Saigon, South Vietnam. MACV was the neck of the funnel for nearly all field reports on operations, intelligence, pacification, and other data
3-24
162
Chapter 12 categories. Some of the MACV reports and nearly all of the Secretary of Defense’s reports relied heavily on aggregated quantitative data and pattern and trend analysis. In some cases, data collection requirements were developed to meet perceived operational or strategic needs; in other cases, they were specifically designed to provide data that would show some kind of progress without context. For example, in 1968, MACV reported the number of cakes of soap it had issued to Vietnamese villagers in 1967 (572,121), an irrelevant input metric. More famous (or infamous) is the use of “body counts” as a primary progress metric. Not only were body counts a poor proxy for progress driven by an untenable assumption about adversary attrition, but data collected were wildly inaccurate because of the adversary emphasis on reclaiming bodies, difficult terrain, duplicate reporting, and the temptation to exaggerate, among other reasons. Assessment of the Vietnam War was haphazard before MACV became a theater combat command in the early 1960s. Between the mid-1960s and the early 1970s, MACV and the Office of the Secretary of Defense (with Central Intelligence Agency assistance) created the single largest and most comprehensive military counterinsurgency assessment apparatus in the history of warfare. It involved the efforts of hundreds of thousands of military personnel, civilians, Vietnamese nationals, intelligence experts, and analysts over the course of several years. These contributors produced hundreds of millions of data items (in Department of Defense [DOD] parlance), tens of thousands of tactical and operational analytic reports, and hundreds of comprehensive assessments that addressed nearly every aspect of the war. Data flowed up from the hundreds of thousands of troops on the ground, province advisors, military advisors to Republic of Vietnam units, U.S. civilian officials, and U.S. intelligence officers, as well as Republic of Vietnam military units, government agencies, and civilian development teams. These data points were then fed into catalogs and computer databases, including the Hamlet Evaluation System, the Terrorist Incident Reporting System, the Territorial Forces Effectiveness System, the Pacification Attitude Analysis System, the Situation Reports Army File, and many others. “Data” could mean anything from a simple number (for example, rounds fired in a single artillery attack) to a more complex set of ostensibly correlated survey data (for example, hamlet evaluation data). Assessment in Vietnam was non-trivial: A July 26, 1970, U.S. military intelligence briefing listed 44 provinces, 257 districts, 2,464 villages, 11,729 hamlets, and 1,500 miles of coastline from the demilitarized zone with North Vietnam to the border with Cambodia in the Gulf of Siam. The challenges of assessment in Vietnam are the same challenges faced in any counterinsurgency: How should policymakers determine progress and decide strategy if all they have to choose from is inaccurate, decontextualized, and aggregated numbers or thousands of pages of lengthy narrative? While it is not possible to state that poor assessment led to the loss of the Vietnam War, the war was distinguished by internal confusion, poor decisionmaking, and, ultimately, strategic defeat. It is apparent from analyzing the way in which assessments were presented and used that they contributed to many of the poor decisions that led to this defeat. BROAD INDICATORS OF PROGRESS 12-28. Numerical and statistical indicators have limits when measuring social environments. For example, in South Vietnam U.S. forces used the body count to evaluate success or failure of combat operations. Yet, the body count only communicated a small part of the information commanders needed to assess their operations. It was therefore misleading. Body counts can be a partial, effective indicator only when adversaries and their identities can be verified. (Normally, this identification is determined through a uniform or possession of an insurgent identification card.) Additionally, an accurate appreciation of what insurgent casualty numbers might indicate regarding enemy strength or capability requires knowing the exact number of insurgent armed fighters initially present. In addition, this indicator does not measure
3-24
163
Assessments several important factors. For example, it does not measure which side the local population blames for collateral damage, whether this fighting and resultant casualties damaged the insurgent infrastructure and affected the insurgency strategy in that area, and where families of dead insurgents reside and how they might react. Within the essential services lines of effort, the number of schools built or renovated does not equate to the effective operation of an educational system, nor is it as important as the number of children in school. Moreover, counterinsurgents should question whether the number of children taught is an important measure at all. 12-29. Planners start with broad measures of social and economic health or weakness when assessing environmental conditions. Examples of possible counterinsurgency indicators include— * Acts of violence (numbers of attacks and friendly or host-nation casualties). * Dislocated civilians. The number, population, and demographics of dislocated camps or the lack of lack of camps are indicators of overall security and stability. A drop in the number of people in camps often indicates a return to normalcy. The numbers of people and families exiled from or fleeing their homes and property and people returning to them are measurable and revealing. Human movement and religious attendance. Religious activity can be used as a measure of  religious freedom and of how much confidence the population has in their government’s security. Possible indicators include the ability or lack of ability of religious pilgrims to move about the country. Development and active use of places of worship.  Number of religious structures (for example, temples, churches, mosques, religious schools)  closed by a government. * Presence and activity of small- and medium-sized businesses. When danger or insecure conditions exist, these businesses close. Patrols can report on the number of businesses that are open and how many customers they have. Tax collections may indicate the overall amount of sales activity. * Level of agricultural activity: Is a province, region, or nation self-sustaining, or must life-support type foodstuffs be  imported? How many acres are under cultivation? Are the fields well maintained and watered?  Are agricultural goods getting to market? Has the annual need increased or decreased?  * Presence or absence of associations. The formation and presence of multiple political parties indicates more involvement of the people in government. Meetings of independent professional associations demonstrate the viability of the middle class and professions. Trade union activity indicates worker involvement in the economy and politics. * Government services available. Examples include— Police stations operational and police officers present throughout the area.  Clinics and hospitals in full operation, and whether or not new facilities sponsored by the  private sector are open and operational. Schools and universities open, functioning, with increasing attendance over time.  * Freedom of movement of people, goods, and communications. This is a classic measure to determine if an insurgency has denied areas in the physical, electronic, or print domains. * Tax revenue. If people are paying taxes, this can be an indicator of host-nation government influence and subsequent civil stability. * Industry exports. * Employment or unemployment rate over time. An increasing employment rate over time is generally a sign of stability. * Amount of electricity produced. Increasing production of electricity is associated with provisions for essential services. However, increased stability often results in greater demand so care must be taken in the use of this indicator. * Specific attacks on infrastructure.
3-24
164
Chapter 12 ASSESSMENT CELL 12-30. An assessment cell normally shadows the planning effort, looking for areas of the plan that may require assistance in measuring progress toward planned goals and the purpose of the operation. Assessing progress is the responsibility of all staff sections and not the sole responsibility of any one staff section or command post cell. Each staff section assesses the operation from its specific area of expertise. However, staff sections must coordinate and integrate their individual assessments and associated recommendations across the warfighting functions to produce comprehensive assessments for the commander, particularly in counterinsurgency operations. 12-31. The function and purpose of an assessment cell or working group must include not only the assessment of the plan and progress of operations, but also the effects of those operations on operational environments. To understand the effect, it is important to assess not only what happened or how, but why a particular result was achieved. This level of understanding aids in informing future decisions and plans. 12-32. In counterinsurgency operations, especially in widely decentralized operations, assessment cells with analysts are organized down to and including the battalion level. This capability greatly assists in the development of bottom-up assessment metrics that provide context and balance for other types of assessment. DIRECTED TELESCOPE TECHNIQUE 12-33. The directed telescope technique aids commanders with assessments by providing eyes on the ground. Military commanders often find value in a separate and objective source of information regarding actions and events “on the ground.” 12-34. When using the directed telescope technique, commanders send trusted subordinates and teams to the battlefield to swiftly assess and report. This helps commanders get a sense for what is transpiring in the field. This technique does not take the place of regular after action reviews or reporting, but instead it helps commanders confirm or deny the visual image they have of how operations are going and the impact their troops efforts’ are having. 12-35. The duties of a team assigned to a directed telescope mission include a variety of skills and qualities to be successful. They include— * Good judgment. * Unfailing tact. * Initiative. * Sympathy, which implies a desire to help rather than to criticize. * Acute perception, coupled with exactness and accuracy in determining facts. * Ability to express themselves and deliver impartial reports in the clearest and most concise terms. * Good tactical knowledge. 12-36. Instead of spying or informing the commander on personnel or single events, the focus is to provide advice to units based on their findings, report trends to the commander, and most importantly provide recommendations that are feasible, acceptable, and suitable. 12-37. The directed telescope technique can work at various echelons and can be included when battalion and brigade staff and personnel are supporting subordinate units in information analysis, operations, planning, and training.
3-24
165
Chapter 13 Legal Considerations 13-1. Counterinsurgency operations are complex and raise challenging legal issues for Soldiers, Marines, and their commanders. Counterinsurgency commanders, staffs, and planners should consult their servicing legal advisors often in their initial planning and as they encounter changing conditions that may change the application of relevant legal authorities. This chapter is not intended as a complete legal guide or a substitute for legal advice, but rather serves to alert counterinsurgency leaders of some of the more common legal issues that may affect United States (U.S.) counterinsurgency operations. This summary cannot replace a consultation with the unit’s supporting legal advisor. 13-2. All U.S. military operations, including counterinsurgency operations, are governed by U.S. domestic law, the international law binding on the U.S. (to include the law of war), and U.S. policy and regulations. A number of areas of the law are critical for counterinsurgency operations, including the authority to deploy forces and conduct counterinsurgency operations in the first instance, the laws governing the conduct of operations, and the laws that fund counterinsurgency operations. The law of war, including the treatment of civilians and detainees, and the application of rules of engagement, in particular, are critical issues that have a significant impact on the conduct of counterinsurgency operations. AUTHORITY TO ASSIST A FOREIGN GOVERNMENT 13-3. In addition to the authorities to use military force, through a variety of statutes contained in Title 10, United States Code (USC) and Title 22, USC, Congress has authorized and directed the Department of Defense (DOD) and Department of State, respectively, to provide assistance to foreign governments relevant to counterinsurgency. For example, U.S. forces may be called upon to provide foreign internal defense or training to foreign security forces (such as military forces and police). AUTHORITY FOR FOREIGN INTERNAL DEFENSE 13-4. The President or Secretary of Defense may issue a deployment or execution order, which may authorize U.S. forces to make limited contributions during operations that involve foreign internal defense. If the Secretary of State requests and the Secretary of Defense approves, U.S. forces can participate in foreign internal defense. The request and approval may go through the standing statutory authorities in Title 22, USC. Among other foreign relations programs, Title 22 contains the Foreign Assistance Act and the Arms Export Control Act. Programs under Title 22 authorize security assistance, developmental assistance, and other forms of aid. The request and approval might also occur under various provisions of Title 10, as well. Title 10 authorizes certain types of military-to-military contacts, exchanges, exercises, and limited forms of humanitarian and civic assistance in coordination with the U.S. ambassador for the host nation. In such situations, U.S. military personnel ordinarily work as administrative and technical personnel of the embassy. They are part of the U.S. diplomatic mission, pursuant to a status of forces agreement, or pursuant to an exchange of notes. This cooperation and assistance is limited to liaison, contacts, training, equipping, and providing defense articles and services. It does not include direct involvement in operations. GENERAL PROHIBITION ON ASSISTANCE TO POLICE 13-5. The Foreign Assistance Act specifically prohibits assistance to foreign police forces except within carefully circumscribed exceptions. The lead role in providing police assistance within those exceptions normally has been delegated to the Department of State's Bureau of International Narcotics and Law Enforcement Affairs. U.S. commanders are not able to train foreign law enforcement personnel unless given specific legal authority. That said, Congress granted DOD the authority to train the police forces of Iraq and Afghanistan. Moreover, Congress has provided limited authority for U.S. forces to train foreign law enforcement personnel in counternarcotics and counter narco-terrorism operations
3-24
166
Chapter 13 RULES OF ENGAGEMENT 13-6. Rules of engagement are directives issued by competent military authority that delineate the circumstances and limitations under which United States forces will initiate and/or continue combat engagement with other forces encountered (JP 1-04). Often these directives are specific to an operation. Absent operation-specific rules of engagement, U.S. forces apply the standing rules of engagement. When working with a multinational force, commanders must thoroughly coordinate the rules of engagement. MISSION-SPECIFIC RULES OF ENGAGEMENT 13-7. The standing rules of engagement provide a mechanism for combatant commanders to develop mission-specific rules of engagement by implementing supplemental measures within their discretion, or by submitting a request for supplemental measures to the Secretary of Defense for approval. These mission-specific rules of engagement are then passed down the chain of command in the form of a rules of engagement execute order, fragmentary order, or other formal operational tasking. The combatant commander and subordinate commanders must follow these mission-specific rules of engagement. Combatant commanders may augment the rules of engagement as necessary by implementing supplemental measures within their authority to approve. Both combatant commanders and subordinate commanders are required to notify the Secretary of Defense of any restrictions placed on the Secretary of Defense-approved mission-specific rules of engagement. Commanders at all levels are required to evaluate the rules of engagement and request changes if they determine the rules of engagement are inadequate for the mission. 13-8. Taken as a whole, the rules of engagement regulate the conduct of U.S. forces for the application of force for mission accomplishment and the exercise of self-defense. For instance, for mission accomplishment, U.S. forces may be authorized to engage enemy forces declared hostile anywhere in the area of operations at anytime without the need to observe a hostile act or demonstrated hostile intent. With respect to self-defense, unit commanders always retain the inherent right and obligation to exercise unit self-defense in response to a hostile act or demonstrated hostile intent. U.S. forces may exercise individual self-defense in response to a hostile act or demonstrated hostile intent; however, unit commanders may limit individual self-defense by members of their unit. The rules of engagement in counterinsurgency operations change from time to time. To meet the ever-changing operational environment, supplemental measures and the level of force commanders employ from day to day may change often. Commanders must regularly review the rules of engagement for their effectiveness in a complex counterinsurgency environment. Counterinsurgency leaders should frequently train their Soldiers and Marines in the application of the rules of engagement to the situations they may encounter in the area of operations so their actions become instinctive, effective, and legally sound. MULTINATIONAL RULES OF ENGAGEMENT 13-9. U.S. forces assigned to the operational or tactical control of a multinational force follow the rules of engagement of the multinational force for mission accomplishment, if authorized by the Secretary of Defense. U.S. forces retain the right of self-defense. Apparent inconsistencies between the right of self-defense contained in U.S. rules of engagement and the rules of engagement of the multinational force will be submitted through the U.S. chain of command for resolution. While final resolution is pending, U.S. forces will continue to operate under the U.S. rules of engagement. When U.S. forces, under U.S. operational or tactical control, operate with a multinational force, reasonable efforts are made to develop combined or common rules of engagement. If common rules of engagement cannot be developed, U.S. forces operate under U.S. rules of engagement. The multinational forces will be informed prior to U.S. participation in the operation that U.S. forces intend to operate under U.S. rules of engagement. U.S. forces remain bound by international agreements to which the U.S. is a party even though other multinational force members may not be bound by them. The U.S. does not interpret any international agreements, such as status-of-forces agreements, to limit U.S. forces’ right of self-defense. LAW OF WAR 13-10. Counterinsurgency operations may occur in both an international armed conflict (state versus state) and a non-international armed conflict (state versus armed nonstate actor). Situations can occur, such as
3-24
167
Legal Considerations during occupation, where armed forces are engaged in combat with armed nonstate actors, or other persons who are not part of a state’s armed forces. Any hostilities between state and non-state actors may rise to the level of a non-international armed conflict. A non-international armed conflict may exist in the same area of operations as an ongoing international armed conflict. An armed conflict exists whenever there is a resort to armed force between states (in an international armed conflict) or protracted armed violence between governmental authorities and organized armed groups or between such groups within a state (in a non-international armed conflict). Regardless of the context, U.S. forces obey the law of war. The U.S. is bound by the law of war treaties to which it is a party, as well as binding norms of customary international law. 13-11. The law of war is the branch of international law applicable to the conduct of armed conflict and concerns the rights and relationships among the participants and victims of armed conflicts. It is often called the law of armed conflict or international humanitarian law. The law of war generally regulates the use of force to the amount necessary to achieve the aim of the conflict and spares those who do not or no longer directly participate in hostilities. The purposes of adhering to the law of war include— * Ensuring good order and discipline. * Fighting in a disciplined manner consistent with U.S. national values. * Maintaining domestic, international, and local support. * Protecting combatants, noncombatants, and civilians from unnecessary suffering. * Safeguarding persons who fall into the hands of an enemy. * Facilitating the restoration of peace. 13-12. The primary sources of the law of war include the various Hague Conventions, the four Geneva Conventions of 1949, the 1980 UN Conventional Weapons Convention and its five protocols, and customary international law. Many nations that have been recent coalition partners with the U.S. are also parties to two additional 1977 protocols to the Geneva Conventions, Additional Protocol I and Additional Protocol II. However, the U.S. is not a party to these two protocols. Without recognizing the authority of these two protocols, the U.S. recognizes that many of their provisions, some of which are discussed in this manual, are either an accurate statement of the law or consistent with U.S. practice. 13-13. The law of war is based on the following fundamental principles: * First, military necessity, that is, that a belligerent is justified in applying those measures not forbidden by international law which are indispensable for securing the complete submission of the enemy as soon as possible. * Second, humanity, which requires military forces to avoid inflicting gratuitous violence on the enemy. * Third, discrimination, which posits that military attacks should be directed at combatants and other military targets, not civilians or civilian property. * Fourth, proportionality, expressed in the concept that the expected incidental loss of civilian life, injury to civilians, and damage to civilian objects must not be excessive in relation to the concrete and direct military advantage anticipated. MILITARY NECESSITY 13-14. The principle of military necessity is expressed in Article 23(g), of Hague IV Annex., which forbids a belligerent to destroy or seize the enemy’s property, unless such destruction or seizure be imperatively demanded by the necessities of war. While no law of war treaty defines military necessity, its role is recognized in many treaties to which the U.S. is a state party. Moreover, the U.S. has defined military necessity in its law of war manuals. Military necessity is that principle which justifies those measures not forbidden by international law which are indispensable for securing the complete submission of the enemy as soon as possible. (See FM 27-10 for more information on military necessity.) 13-15. Military necessity does not authorize all military action and destruction. Under no circumstances may military necessity authorize actions specifically prohibited by the law of war, such as the murder of prisoners of war, ill-treatment of prisoners of war or internees, the taking of hostages, or the execution of a reprisal against a person or object specifically protected from reprisal. Civilian objects are generally
3-24
168
Chapter 13 protected from intentional attack or destruction. However, civilian objects may lose their protections if they are being used for military purposes, or there is a military necessity for their destruction or seizure. Civilian objects may, in such circumstances, become military objectives, and if so, the law of war permits their destruction. In treaties such as Hague IV and its annex and the Geneva Conventions, where an express prohibition has been stated, neither military necessity nor any other rationale of necessity may override that prohibition. In short, the principle of military necessity authorizes that use of force that is required to accomplish the mission, but it does not authorize acts otherwise prohibited by the law of war. This principle must be applied in conjunction with other law of war principles as well as other, more specific legal constraints set forth in law of war treaties to which the U.S. is a party. HUMANITY, UNNECESSARY SUFFERING, OR SUPERFLUOUS INJURY 13-16. The right of belligerents to adopt means of injuring the enemy is not unlimited, as Hague IV Annex, Article 22, states. Article 23(e) then captures the essence of the Law of War principle of humanity as it prohibits the employment of arms, projectiles, or material calculated to cause unnecessary suffering. The principle of humanity is also called the principle of unnecessary suffering or superfluous injury. The terms unnecessary suffering and superfluous injury are regarded as synonymous. Although neither of the terms is defined, they are understood to refer to injury to persons, rather than damage to objects. The prohibition of unnecessary suffering constitutes acknowledgement that the suffering of combatants is lawful and expected, and may include severe injury or loss of life. As a general proposition, the suffering inflicted by weapons or munitions would be deemed unnecessary only if— * Its use was calculated to cause unnecessary suffering. * The inevitable result of the normal use causes an injury the nature of which is considered by governments as manifestly disproportionate in relation to the military advantage anticipated from employment of the weapons or munitions. 13-17. Weapons’ or munitions’ effects must be weighed in light of comparable lawful weapons and munitions in use on the modern battlefield. A weapon cannot be declared unlawful merely because it may cause severe suffering or injury. The appropriate determination is whether a weapon’s or munitions’ employment for its normal or expected use would be prohibited under some or all circumstances. The correct criterion is whether the employment of a weapon for its normal or expected use inevitably would cause injury or suffering manifestly disproportionate to its military effectiveness. A state is not required to foresee or anticipate all possible uses or misuses of a weapon or munitions, since almost any weapon or munition can be misused in ways that might be prohibited. 13-18. Under the law of war, combatants may kill or wound enemy combatants and civilians taking a direct part in hostilities; such acts are legitimate if accomplished with lawful means and methods. For example, the prohibition of unnecessary suffering does not limit the bringing of overwhelming firepower on an opposing military force in order to subdue or destroy it. What the law of war does prohibit is the design, modification, or employment of a weapon or munitions for the purpose of increasing or causing suffering beyond that required by military necessity. DISCRIMINATION 13-19. The principle of discrimination, sometimes referred to as the principle of distinction, is the international law obligation of parties to a conflict to distinguish between the civilian population (or individual civilians not taking a direct part in the hostilities) and combatant forces when engaged in military operations, directing the application of force solely against personnel belonging to the latter. Similarly, military force may be directed only against military objects or objectives, and not against civilian objects. A military objective is not limited to military bases, forces, or equipment, but includes other objects that contribute to an opposing state’s ability to wage war. Additionally, a civilian object is immune from intentional attack unless and until it loses its protected status through enemy abuse of that status. The principle of discrimination also provides civilians immunity from direct attack for as long as they take no part in hostile acts against military forces. 13-20. The principle of discrimination applies to military forces engaged in offensive or defensive operations, and to governments providing protection for their civilian population and civilian objects. Each
3-24
169
Legal Considerations government and its military forces, as well as armed nonstate parties to a conflict, are obligated to separate their military or other fighting forces and military objects from the civilian population and civilian objects, to take steps to protect the civilian population (or civilians within its control) through affirmative steps such as evacuation from the vicinity of military operations or air raid precautions, and to minimize or avoid actions that might otherwise place the civilian population at risk from lawful military operations by the opposing force. The employment of voluntary or involuntary human shields to protect military objectives, individual military units, or military personnel is a violation of the law of war principle of discrimination. 13-21. Physical damage or destruction of property is an inevitable and lawful aspect of combat. Military equipment (other than military medical equipment and transportation) is subject to lawful attack and destruction at all times. Civilian objects, including cultural property, are protected from seizure or intentional attack unless there is military necessity for their seizure or destruction, that is, they become military objectives. Destruction of civilian objects that is expressly prohibited, or that is not justified by military necessity, or that is wanton or excessive, is unnecessary destruction for which a commander may be culpable. 13-22. The civilian population and individual civilians not taking a direct part in hostilities are protected from intentional attack. Where civilians are present on the battlefield or in proximity to legitimate military objectives, or they are being used to shield legitimate targets from an attack that otherwise would be lawful, they are at risk of injury incidental to the lawful conduct of military operations. A law of war violation occurs when— * The civilian population is attacked intentionally. * Civilian casualties incidental to an otherwise lawful attack become excessive in relation to the concrete and direct military advantage to be gained and are attributed to the wanton conduct of an attacking force, for which the defending force or individual civilians or groups of civilians (such as voluntary human shields) bear no responsibility. * A defender or attacker employs civilians as voluntary or involuntary human shields. Each of these acts constitutes a violation of the principle of discrimination. 13-23. The law of war does not expressly prohibit civilians from taking a direct part in hostilities. If they do, however, they may be targeted for so long as they take a direct part. Civilians do not enjoy the combatant’s privilege—that is, they do not have combatant immunity—and if captured, they may be prosecuted for their belligerent acts under the domestic law of the captor. Civilians engaging in belligerent acts not only forfeit their immunity from direct attack; they also make it more difficult for military personnel to apply the principle of discrimination and, thereby, put all civilians at risk. There is no definition of direct part in hostilities in treaty law or customary international law. At a minimum, it encompasses actions that are belligerent per se, that is, by their very nature and purpose can be expected to cause actual harm to an enemy. In general, the qualification of an act as direct participation in hostilities is a fact-dependent analysis that must be made after analyzing all relevant available facts, in the circumstances prevailing at the time. 13-24. Within an international armed conflict or a non-international armed conflict, the armed forces of a state may engage in hostilities with armed nonstate actors. This is the classic counterinsurgency environment. While most international armed conflict involves warfare between the armed forces of two or more states, situations can occur, such as during occupation, where such armed forces and other armed security forces of the state (including police forces) are engaged in combat with armed nonstate actors, or other persons who are not part of a state armed force. These groups can take a variety of forms, including an organized resistance movement that belongs to a state party but fails to meet the requirements for prisoner of war status under the Geneva Convention Relative to the Treatment of Prisoners of War Article 4A (2), or a terrorist organization such as al Qaeda that, without regard to compliance with any of the other requirements of Article 4A(2) (such as being under responsible command, wears fixed distinctive sign recognizable at a distance, carries arms openly, and conducts operations in compliance with the law of war), operates without any authorization or affiliation with a state and thereby falls outside of the Geneva Convention’s protections. An individual who is formally or functionally part of an organized armed group that is engaged in hostilities may be targeted at any time. In essence, membership in armed forces or armed groups (such as the status of belonging to such a group) and direct participation in hostilities (such as a conduct-based standard) are separate bases for targeting under the law of war.
3-24
170
Chapter 13 13-25. U.S. practice is that the designation of an armed nonstate group as hostile (as such targetable at all times) and its members as direct participants in hostilities, should only be made by an official authorized to do so. Without such a designation, the determination of whether a civilian may be targeted depends on whether that civilian is committing specific acts that amount to hostile acts or demonstrations of hostile intent, in accordance with the standing rules of engagement. In addition, individual conflicts may involve specific rules of engagement that incorporate direct participation in hostilities analysis. PROPORTIONALITY 13-26. Proportionality requires that the anticipated loss of life and damage to property incidental to attacks must not be excessive in relation to the concrete and direct military advantage expected to be gained. Proportionality is process-oriented rather than result-oriented. Decisionmakers are expected to take all feasible precautions in planning military operations, but they remain dependent on the (often imperfect and incomplete) information available at the time to weigh the risk these operations may pose to the civilian population. In this context, proportionality may be viewed as a fulcrum upon which military forces and commanders must weigh the legitimate destructive effect of an attack (the law of war principle of military necessity) against the undesirable incidental effects of an attack (such as the risk of death or injury to civilians not taking a direct part in hostilities). Proportionality may be applied by decisionmakers at the national, strategic, operational, or tactical level. 13-27. Proportionality does not prohibit destruction for which there is military necessity, or limit the degree of engagement of enemy military forces in the absence of civilians or civilian objects. In particular, it does not prohibit bringing overwhelming firepower to bear on an opposing military force to subdue or destroy it. Nor does it prohibit injury to civilians that is incidental to lawful military operations. As used in this context, proportionality constitutes an acknowledgment of the unfortunate inevitability—but lawfulness—of incidental injury to civilians not taking a direct part in hostilities, or of the incidental damage or destruction of civilian objects, despite precautions, in the execution of legitimate military operations, particularly when these persons or objects have been intermingled with military forces or objectives. 13-28. Proportionality is weighed by a commander in determining whether, in engaging in offensive or defensive operations, that commander’s actions may be expected to cause incidental loss of civilian life, injury to civilians, damage to civilian objects, or a combination thereof, that would be excessive in relation to the concrete and direct military advantage anticipated by those actions. The military advantage anticipated is intended to refer to the advantage anticipated from those actions considered as a whole, and not only from isolated or particular parts thereof. Generally, military advantage is not restricted to tactical gains, but is linked to the full context of a war strategy. HONOR 13-29. Honor has long been a basis of warrior ethos and of the law of war. Honor demands a certain mutual respect and trust between opposing forces. It denounces and forbids resort to dishonorable means, expedients, or conduct that would constitute a breach of trust. An example of this form of honor is the use of a white flag, which in land warfare represents a flag of truce. Its display is predicated upon good faith. Its misuse is prohibited and constitutes a war crime. Another example of how honor applies comes from law of war requirements regarding the treatment of persons hors de combat—that is, military personnel who are no longer able to fight due to sickness, injury, or wounds, or because they are shipwrecked. The principle of honor (and other humanitarian considerations) requires that an individual who is hors de combat be treated and protected in the same manner as one would wish to be treated and protected by the enemy if the roles were reversed. However, this principle is not dependent upon reciprocity. THE SOLDIER’S AND MARINE’S BASIC RULES 13-30. It is DOD policy that members of DOD components comply with the law of war during all armed conflicts, however such conflicts are characterized (such as international armed conflict or non-international armed conflict), and in all other military operations. The law of war principles discussed in paragraphs 13-13 through 13-29 can be safely applied by Soldiers and Marines by adhering to the following ten basic rules:
3-24
171
Legal Considerations * Soldiers and Marines fight only enemy combatants. * Soldiers and Marines do not harm enemies who surrender. They disarm them and turn them over to their superiors. * Soldiers and Marines do not kill or torture enemy prisoners of war or detainees. * Soldiers and Marines collect and care for the wounded, whether friend or foe. * Soldiers and Marines do not attack medical personnel, facilities, or equipment. * Soldiers and Marines destroy no more than the mission requires. * Soldiers and Marines treat all civilians humanely. * Soldiers and Marines do not steal. They respect private property and possessions. * Soldiers and Marines do their best to prevent violations of the law of war. * Soldiers and Marines report all violations of the law of war to their superior. 13-31. When working with host-nation or local friendly forces in a counterinsurgency, it is critical to both teach and enforce these rules among allies and friendly forces. Following the law of war is a critical component of counterinsurgency operations that directly supports the accomplishment of the strategic mission to defeat the insurgency and establish local rule by gaining the trust of the local civilian population, or at a minimum, enabling a local population to cease active support of an insurgency. Violations of the law of war have a direct and significant negative impact on the ability to conduct successful counterinsurgency operations. 13-32. The law of war includes rules governing situations in which the military forces of one state occupy the territory of another. Occupation is not a transfer of sovereignty. It does, however, grant the occupying power the authority and responsibility to restore and maintain public order and safety. The occupying power must enforce, as much as possible, the laws in force in the host nation. One of the four Geneva Conventions of 1949—the Geneva Convention Relative to the Protection of Civilian Persons in Time of War—becomes a prominent source of law during occupation, as well as the Hague Convention IV Regulations of 1907. NON-INTERNATIONAL ARMED CONFLICT 13-33. The full body of the law of war only applies during international armed conflict. It does not apply during a non-international armed conflict. This does not mean no rules apply during a non-international armed conflict. For instance, the law of war principle of distinction still applies. It requires force to be directed at combatants and not innocent civilians, and a proportionality analysis is required when targeting combatants and military objectives if civilians or civilian objects may be impacted. Counterinsurgency operations are almost certain to be a feature of non-international armed conflict, the most common form of armed conflict today. During counterinsurgency operations, Common Article 3 of the Geneva Conventions applies. Commanders must be aware of Common Article 3, and the basic protections that must be afforded to insurgents or others captured by U.S. forces, as well as the status of insurgents under the laws of the host nation. GENEVA CONVENTION, COMMON ARTICLE 3 13-34. Although insurgencies can occur within the context of an international armed conflict, they are classically conflicts between states and non-state actors that are considered to be non-international armed conflicts. 13-35. It bears emphasis, however, that one article contained in all four of the Geneva Conventions— Common Article 3—is specifically intended to apply to non-international armed conflicts. Common Article 3 affords significantly fewer protections to combatants fighting in a non-international armed conflict than does the full body of the law of war in an applicable international armed conflict. However, it does set a simple baseline of humane protection, along with fundamental rules that reflect the principles captured in the broader law of war. 13-36. Common Article 3 requires that in the case of armed conflict not of an international character (a non-international armed conflict) occurring in the territory of one of the high contracting parties to the