FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
3-07
72
Chapter 3 police can give advice when dealing with correction or law enforcement. Attorneys can give advice on dealing with judicial and legal personnel. 3-112. In a permissive environment, military forces coordinate the criminal justice system reform effort with the country team. In a permissive environment, criminal justice system reform efforts may take the form of engagements with the host-nation military. In those cases, military police may work with host- nation military law enforcement personnel, but possibly not the civilian law enforcement personnel. Similarly, military judge advocates would work with host-nation military legal and judicial personnel in a permissive environment, but not their civilian counterparts, at least not without further coordination with the country team. A diverse and wide array of opinions across this crucial area of governance can only prove beneficial for the long-term sustainability of a nation. 3-113. Often, the personnel available for the military’s rule of law activities will be Soldiers, particularly in a nonpermissive environment. Similarly, in a nonpermissive environment the military may be unable to coordinate the criminal justice system reform effort with the country team. When only personnel are performing rule of law activities, military police should be the ones interacting with host-nation corrections and law enforcement personnel. Likewise, military judge advocates should interact with judicial and legal personnel. A purely military perspective on the rule of law may be unacceptable and can be damaging to the host nation. However, sometimes the military may be the only organization in the local area conducting rule of law activities due to the security situation. 3-114. U.S. forces have limited authority to provide assistance to foreign governments. The DOS is the lead for U.S. efforts to coordinate stabilization, security, transition, and reconstruction activities. The Army conducts operations focused on stability in support of these activities. Such support promotes the broader U.S. interests in two ways. First, it assists an existing government with internal challenges or helping to establish a new social, economic, and political domestic order in the short term. Second, it assists in the long term by establishing conditions for a sustainable peace. USAID PRINCIPLES FOR RECONSTRUCTION AND DEVELOPMENT 3-115. Commanders involved in reconstruction during operations focused on stability need to understand and apply basic reconstruction and development principles. These nine principles are the key tenets of USAID’s work. The principles are not a checklist. They are a summary of the characteristics of successful assistance programs. They cannot be applied the same way in each situation but should serve as a reference for development practitioners as they design and implement programs. The USAID principles for reconstruction and development are— * Ownership: Build on the leadership, participation, and commitment of a country and its people. * Capacity building: Strengthen local institutions, transfer technical skills, and promote appropriate policies. * Sustainability: Design programs to ensure their impact endures. * Accountability: Design accountability and transparency into systems and build effective checks and balances to guard against corruption. * Assessment: Conduct careful research, adapt best practices, and design for local conditions. * Results: Allocate resources based on need, local commitment, and foreign policy interests. * Partnership: Collaborate closely with all partners, including governments, communities, donors, NGOs, the private sector, international organizations, and universities. * Flexibility: Adjust to changing conditions, take advantage of opportunities, and maximize efficiency. * Selectivity: Allocate resources to countries and programs based on need, policy performance, and foreign policy interests. 3-116. U.S. leaders must engage failed states while understanding the potential correlation between fragile states and instability related to terrorism. Effective engagement requires the use of the tools of diplomacy, development, and defense in a collaborative fashion. The success of U.S. military strategy and development assistance policy in these countries have become mutually reinforcing. Development cannot effectively occur without the security that armed force provides, and security will not be sustained until the
3-07
73
Considerations to Achieve Unity of Effort local populace sees the promise of development as a viable alternative to violence to meet its needs. For example, while involved in reconstruction activities in Iraq and Afghanistan, the U.S. military was called upon to manage substantially increased levels of U.S. bilateral foreign assistance. This assistance included official development assistance funding traditionally managed by USAID. To use these resources effectively, commanders involved in reconstruction in operations focused on stability need to understand and apply basic reconstruction and development principles. Such principles have evolved by the development community through years of experience. 3-117. USAID and the development community assist fragile states with finding solutions and resources to meet their requirements for sustained development and growth. To accomplish this, the development community relies on specific operating principles for stabilization, reconstruction, and development assistance. The principles have been tested through years of practical application and understanding the cultural and socioeconomic influences in the host nation. Understanding these generally accepted principles enables those involved in development, and in the development aspects of stabilization and reconstruction, to incorporate techniques and procedures effectively. Then those involved can help countries improve the economic and social conditions of the people. 3-118. Development officials improve the likelihood of success by applying the principles of reconstruction and development. Timely and adequate emphasis on these principles increases the opportunity for immediate success or, at a minimum, provides a means to adapt to the changing conditions. Development assistance officials assume risk in their programs when these principles are violated or ignored. 3-119. The nine principles of reconstruction and development formalize customary practices and operating procedures. The principles reflect key institutional principles that most aid agencies incorporate into the reconstruction framework. The principles are designed to ensure local ownership and sustainability of program results while building local capacity and thus eventual independence from outside assistance. They take advantage of the skills and resources others can bring to the effort by forging partnerships. Following these principles helps the host nation to adjust reconstruction and development activities to the dynamic political environment usually encountered in a violent conflict or post-conflict situation. COMPREHENSIVE APPROACH 3-120. Stability efforts require contributions from a variety of partners outside the United States and the U.S. Government, including military and police forces, NGOs, international organizations, host-nation organizations, news media, and businesses. Many have no formal relationship with Army units but are, nevertheless, instrumental in achieving the desired outcomes. Army units must interact effectively with these partners to exchange information and strive for unified action. This requires interorganizational coordination, such as— * Engaging with host-nation key leaders and the population. * Conducting multinational operations. * Building partner capacity. * Establishing mechanisms such as civil-military operations centers (CMOCs) to facilitate coordination. * Providing support to other partners, such as helping with the delivery of essential goods and services. 3-121. Some partners, such as many NGOs, prefer not to be known as partners of Army forces. NGOs that maintain neutrality perform an important role in stabilization and reconstruction, and Army units should not compromise their neutrality. 3-122. The UN Office for the Coordination of Humanitarian Affairs (known as OCHA) coordinates activities among UN agencies, NGOs, and local partners. To facilitate this, fifteen global clusters have been created based on sectors of expertise. Global clusters and lead agencies are depicted in table 3-2 on page 3-20, and depending on the situation, a similar structure may exist at the country level.
3-07
74
Chapter 3 Table 3-2. Global clusters and lead agencies Global clusters Lead agencies Food Security Food and Agriculture Organization (co-lead). World Food Programme (WFP) (co-lead). Camp Coordination and United Nations (UN) High Commissioner for refugees (UNHCR) Management (co-lead). International Organization for Migration (co-lead). Early Recovery UN Development Programme. Education Save the Children (co-lead). UN Children’s Fund (UNICEF) (co-lead). Emergency Shelter Disaster: International Federation of the Red Cross and Red Crescent. Conflict: UNHCR. Emergency Telecommunications Process: UN Office for the Coordination of Humanitarian Affairs. Data and security communications: WFP. Health World Health Organization. Logistics WFP. Nutrition UNICEF. Protection UNHCR. Water Sanitation and Hygiene UNICEF. COORDINATION WITH OTHER PARTNERS 3-123. Army units interact with other partners to share information and, when possible, attain unity of effort to complete the primary stability tasks effectively. Stability is a multifaceted challenge with military and nonmilitary aspects. Different partners have important roles in achieving the desired outcomes; however, they will have dissimilar goals, priorities, and authorities. To the extent possible, Army units coordinate with these partners to achieve unified action, avoid gaps and redundancies, and resolve disagreements. 3-124. Army leaders determine what level of cooperation is possible and desirable with other actors. They consider guidance from the chain of command and the changing situation. Some actors may not desire a cooperative relationship even when their stabilization goals overlap with U.S. goals. The operational-level determination may differ from tactical levels in certain areas. For example, potential topics for coordination may include information regarding civilian risks and needs, humanitarian space considerations, planned operations, requests for assistance, transitions, and security concerns. Eventually, host-nation actors assume control over the stability tasks, maintain security, and achieve other desired outcomes. This can be problematic when host-nation actors who are to be entrusted with the future may be the same actors who contributed to state fragility in the past. 3-125. Different levels of interaction include coexistence, communication, information sharing, formal coordination, and collaboration. As shown in figure 3-1, higher levels of interaction may be possible when Army units share objectives with other actors and mutual trust exists. In some cases, it is only possible or necessary to understand each other’s objectives, requirements, capabilities, limitations, procedures, and terminology. However, some closer coordination is often critical; an important example is close integration with local police forces. In some cases, the Army units may conduct some level of interaction with potential adversaries.
3-07
75
Considerations to Achieve Unity of Effort Figure 3-1. Levels of interaction Coexistence 3-126. Coexistence describes when multiple groups are present in an area but do not interact or communicate with each other. This may be the case with certain groups who do not want any affiliation with military forces at all. Communication 3-127. Communication describes when parties have periodic contact, such as at routine meetings, but do not share substantive information on a regular basis, if at all. Parties can contact each other if necessary (for example, they may retain phone numbers for each other). When parties do not share any common interests, direct communication may not even be possible. In cases where no direct communication exists, they may sometimes relay messages through intermediaries such as civilian personnel associated with the mission or host-nation officials. Information Sharing 3-128. Information sharing occurs when parties share substantive information periodically, but such activities are often circumspect and may not occur on a regular basis. Exchanged information is likely to be limited to matters of extremely high mutual concern. For example, a NGO may be willing to provide some information regarding a mass atrocity that has occurred but will be unwilling to share details about its planned operations. Formal Coordination 3-129. Formal coordination occurs when parties regularly exchange information on a wide range of topics, to include some planned operations. This coordination includes generally answering most requests for information when parties can reasonably do so. The parties may find it beneficial to meet on a routine basis and may invite representatives to attend their own internal meetings.
3-07
76
Chapter 3 Cooperation and Collaboration 3-130. The highest level of interaction entails cooperation or collaboration that can include jointly conducted operations, co-location of organizations, exchange of liaisons, and other measures to achieve more effective integration. In a loosely collaborative relationship, Army units may occasionally provide direct security for the other partners (such as a convoy escort). In a closer collaboration, the interaction is substantive and more permanent. 3-131. Other partners can beneficially contribute to Army units by providing independent, external assessments of relevant issues, to include the military’s activities and benchmarking. Army units should invite partners’ input and contribution to after action reviews, either by direct participation or through acceptable intermediaries such as civilian personnel associated with the operation. 3-132. Some general guidelines will help foster improved coordination with other partners: * Take time to develop and maintain relationships. * Identify and include stakeholders early. Coordination with host-nation security forces (especially police) is particularly important to create a secure environment, particularly since police forces will become responsible for civil security. Army units should seek input from vulnerable societal groups that lack power, as these may have long been without a voice. * Consult; do not dictate. * Be honest and reliable. Back up words with action. * Be respectful. Avoid appearing arrogant or condescending. Show proper courtesy to older or higher-ranking counterparts. * Conduct vertical efforts to supplement horizontal engagements. Direct engagements with counterparts may prove futile for a variety of reasons. It may be necessary to identify a problem to higher echelons in the chain of command that can in turn encourage higher counterparts to direct or take necessary actions. * Consider the impact of and the effect on informing and influencing audiences. Challenges 3-133. Many critical actors attempt to preserve their neutrality and avoid the appearance of collaborating with political and military entities such as Army units or the host-nation government. Because of different objectives, cultures, and chains of authority, disagreements and misunderstandings between the actors occur. Additionally, the competition for scarce resources such as infrastructure and a qualified host-nation work force can create tensions between Army units and other actors. CONSIDERATIONS FOR MULTINATIONAL OPERATIONS 3-134. Multinational operations are vital to achieve efficiency, unity of effort, and synergy to perform the primary stability tasks. Multinational operations integrate the wide variety of partners essential for stability and strengthen the population’s confidence in Army units and other security organizations. Multinational operations expand mutual situational understanding and can improve the effectiveness of the participants and enhance their relationships with each other. These operations enable host-nation involvement in and ownership of the primary stability tasks, since the host-nation retains its sovereign obligations and eventually must be capable of meeting them effectively. Multinational operations also capitalize on the host-nation security forces’ understanding of the terrain and population. By providing a method to monitor and mentor host-nation security forces, multinational operations can also support security sector reform. 3-135. While it is possible to integrate individuals at the lowest unit levels (for example, Soldiers and host-nation police operate a vehicle checkpoint together), it is often more appropriate to maintain unit integrity and assign tasks to Army units only. For example, a host-nation platoon might be tasked to establish a security cordon for a search operation conducted by an Army unit, or vice versa. Language differences and the availability of interpreters determine the possible level of integration. Staff integration can be extremely useful, depending on considerations such as language skills, security access requirements, and operations security precautions.
3-07
77
Considerations to Achieve Unity of Effort 3-136. Multinational operations can be difficult to conduct effectively because of the potential attitudes and capabilities of the different participants. The various organizations will have dissimilar objectives, priorities, chains of authority, and cultures. They may also tend to disregard and mistrust outsiders, or otherwise cooperate reluctantly. Mistakes, misunderstandings, friction, and personality clashes can also undermine combined efforts. Army leaders, who desire effective multinational operations, may need to emphasize their importance, closely monitor their progress, and take corrective action when necessary. Patience and open-mindedness are critical to overcome inevitable obstructions. Multinational operations also have to account for logistics. Some participants may need significant support from Army units to contribute effectively, which could cause them to be perceived negatively. Interpreters are critical in many situations but often in short supply. Successful multinational operations require significant nurturing, which could divert leader focus from other pressing concerns. BUILDING PARTNER CAPACITY 3-137. Building partner capacity addresses the potentially most important stability effort, which is to support and enable partners so they can perform their roles effectively. Building partner capacity results from comprehensive interorganizational activities, programs, and sustained military engagements. Over time, building partner capacity enhances the ability of partners for security, governance, economic development, essential services, rule of law, and other critical government functions. The Army integrates the capabilities of the operating and generating forces—to include special operations forces—to support capacity-building efforts, primarily through security cooperation activities. (See ADRP 3-0 and ADRP 3-07 for more information.) 3-138. Army units are concerned mainly with the capabilities of military and other security actors but should not ignore capacities unrelated to security sectors. In some cases, Army units can help build the capacity of other international partners who in turn are attempting to improve host-nation institutions. In other cases, Army units may directly assist in improving host-nation capacity and capability. One result of comprehensive engagement with other partners should be an increase in collective capacity to protect civilians. 3-139. Building partner capacity requires a different emphasis from many of the tasks Army units typically perform. Ultimately, the host nation must have the capability to ensure a safe and secure environment and must likewise develop the capacity to maintain acceptable conditions related to good governance, the rule-of-law, social well-being, and economic development. These efforts depend on capable host-nation and international partners from military, police, and civilian sectors. 3-140. Unified action partners (see ADRP 3-0) may have capabilities and a capacity that can contribute to stability; some partners such as the host-nation or coalition military forces operating under international mandates have formal legal obligations while others such as NGO’s contribute without formal obligations. Building partner capacity has short-, mid-, and long-term dimensions that require the determination of realistic objectives. Generally, Army units can help build partner capacity in many of the following ways, to include— * Provide advisors and mentors. In addition to providing technical assistance on security affairs, advisors should emphasize such issues as respect for human rights, the proper treatment of civilians, and civil-military relations. * Assist with development of administrative and logistics systems (such as pay, training, and maintenance). * Monitor and if necessary restrain other partners regarding violence against civilians and human rights abuses. * Assist with assessing, planning, and monitoring efforts to complete any of the primary stability tasks. * Provide facilities and bases from which other partners may operate. * Provide security to other partners. * Provide transportation, communications, medical, or other logistics support to other partners (either on a routine or emergency basis).
3-07
78
Chapter 3 * Provide personnel augmentation to other partners. * Support and reinforce efforts of other partners by synchronizing information-related capabilities and engagements. 3-141. A major challenge is synchronizing efforts, both top-down and bottom-up, to improve host-nation capabilities. Local bottom-up efforts often begin earlier and are more critical for immediate impact on stability, but centralized top-down programs are necessary for long-term sustainability. Subsequent top- down efforts may conflict with or undermine multiple diverse bottom-up efforts that have already begun. Flexibility is required to integrate existing dissimilar local efforts with newly created centralized programs. The choice of partners must be made with care and with considerations that are more than just military. Potential partners may have questionable legitimacy because of past actions or current behavior. Additionally, Army units have limited authority, responsibility, and capability to influence other partners. Finally, other mission priorities such as daily operations limit an Army unit’s ability to focus on building the capacity of other partners. THE ROLE OF CIVIL AFFAIRS IN OPERATIONS FOCUSED ON STABILITY 3-142. Civil affairs forces support unified land operations in every environment across the range of military operations. They are essential to the conduct of successful operations focused on stability. Civil affairs personnel provide unique area and linguistic orientation, cultural astuteness, advisory capabilities, and civilian professional skills that generally parallel those of host-nation governments. They provide the commander with specialized expertise on the civil component of operational environments. The commander draws on this expertise to analyze and influence the human dimension through specific processes and dedicated resources and personnel. Civil Affairs Forces 3-143. Civil affairs forces mitigate or defeat threats to civil society and conduct responsibilities normally performed by civil governments. Civil affairs forces engage and influence the local civil populace by planning, executing, and transitioning civil affairs operations in unified action environment. Civil affairs forces support these operations by addressing civil considerations within the operational area before, during, or after a conflict or disaster. Civil affairs forces help to shape an operational environment by interacting with the local populace to facilitate military operations. A supportive local populace can provide valuable resources and critical information that supports friendly operations. A hostile local populace threatens the immediate success of military operations and may undermine domestic public support for those operations. When executed properly, civil affairs operations reduce the tensions between the local populace and the military force. Civil Affairs Operations 3-144. Civil affairs forces conduct operations that support and are nested within the overall mission and commander’s intent. Civil affairs operations improve the relationship between military forces and host- nation authorities in areas in which the military force operates. They involve applying civil affairs skills to areas normally under the responsibility of a host-nation government. Civil affairs operations establish, maintain, influence, or exploit relationships between military forces and all levels of host-nation governments and officials. These operations are fundamental to completing stability tasks successfully. 3-145. Civil affairs organizations and personnel develop detailed assessments based on civil considerations. These include information about infrastructure, civilian institutions, and attitudes and activities of civilian leaders, the local populace, and host-nation organizations. These assessments may reveal that a viable host-nation government does not exist or cannot perform its basic civil functions. In such cases, military forces may support or implement transitional military authority until a legitimate host- nation government is established. (FM 3-57 and JP 3-57 provide doctrine on civil affairs.) 3-146. Civil affairs operations help ensure the sustained legitimacy of the mission and the transparency and credibility of military operations. Civil affairs operations minimize the effects of military operations on the local populace, limit how civilians affect military operations, and provide advice to commanders on the legal and moral obligations of the force.
3-07
79
Considerations to Achieve Unity of Effort 3-147. Civil affairs personnel help the commander understand and visualize the civil component of the operational area. They provide detailed analysis based on careful consideration of operational and mission variables. This analysis helps determine the following within the supported unit’s operational area: * The root causes of instability and civil strife. * The requirement for CMOCs to facilitate communications and coordinate with civilian agencies and organizations. * The need to use liaison teams to enhance communications and coordination with civilian agencies and organizations to facilitate operations at all echelons. * What, when, where, and why civilians might be encountered; what ongoing or planned military operations might affect the activities of those civilians; what activities those civilians are engaged in that might affect military operations; and what actions the military force must take to mitigate the effects of those civilians. * Measures of performance and measures of effectiveness for civil affairs operations to support the larger military operation. Civil-Military Operations Center 3-148. Stability missions often require an established CMOC. A CMOC can facilitate information sharing and coordination between Army units and other partners, including the host-nation population and its institutions, such as police forces. Different echelons may establish their own CMOCs. A CMOC supports Army units as an agency to improve understanding and facilitate remedial action regarding civilian vulnerabilities and stability needs. All Army civil affairs units are organized and equipped to establish a CMOC. A CMOC is tailored to the specific tasks associated with the mission and normally augmented by assets such as engineers, medical, and transportation. It can be an accessible location for civilians to file reports or claims. It can serve as a coordination center for civilian and police organizations whose activities are vital for stability. WORKING WITH NONGOVERNMENTAL HUMANITARIAN ORGANIZATIONS 3-149. Organizations that deliver humanitarian assistance are diverse. They include UN agencies and international and local NGOs, each its own governing and accountability structure. Adherence to humanitarian principles, established codes of conduct, and civil-military guidelines vary. Moreover, many organizations can provide short-term humanitarian relief and long-term recovery and development assistance that often contributes to the sustainability of a host nation. 3-150. In addition to providing goods and services (for example, clean water, sanitation, food, and shelter), some humanitarian actors also provide protection programming such as human rights education, local conflict mediation and trust building, and monitoring, reporting and advocacy on the situation. Programming may be limited to ensuring that the provision of essential services does not create or exacerbate harm to civilians. Contributing to conditions that allow for the delivery of humanitarian assistance can support these humanitarian protection activities. In some contexts, political and armed actors may not accept humanitarian protection activities as neutral and impartial. Consequently, they may challenge or even target humanitarian workers. Commanders consider these variables when deciding how best to contribute to conditions enabling the provision of humanitarian assistance. 3-151. Some humanitarian actors have strong concerns about remaining neutral and independent to gain or retain access to communities in need. The ability of humanitarian organizations to operate according to their mandates, charters, and principles is sometimes known as humanitarian space. The common interests of humanitarian organizations include— * Security of humanitarian workers. * Mutual access between humanitarian workers and beneficiaries. * The ability of humanitarian workers to interact with nonstate armed actors. * Perceptions of humanitarian actors among beneficiaries and other actors. * Humanitarian advocacy.
3-07
80
Chapter 3 3-152. The neutrality and independence of humanitarian workers is especially important in politicized or conflict environments where political or armed actors are unwilling or unable to respect international humanitarian law and are targeting humanitarian workers, the assistance they provide, or the communities they are trying to assist. Humanitarian actors may also be concerned about situations where they can be confused with participants in an armed conflict. This can happen where military or other security forces provide goods and services directly to communities. Humanitarian actors may have other relationships to armed actors, such as receiving funds, even when the humanitarians are not part of the conflict. Therefore, each humanitarian agency has different interests and limitations regarding engagement with political and military actors, regardless of whether military units are tasked to facilitate humanitarian assistance or protect civilians. This diversity can create a confusing environment for Army units that may share common goals with humanitarian actors. 3-153. Humanitarians have developed guidelines to help clarify best practices for civil-military engagement and established sophisticated coordination mechanisms and offices tasked with engaging political and military actors at the tactical, operational, and strategic levels. For example, as discussed earlier, humanitarian organizations often meet in clusters. Clusters are coordinating bodies organized by functions such as water and sanitation, protection, emergency shelter, and others. The cluster leads have responsibilities to liaise with external actors. Offices such as the UN Humanitarian Coordinator and the UN Office for the Coordination of Humanitarian Affairs, if present, may also liaise with military and political actors. 3-154. Military support is more effective when Army units clearly understand the principles, codes of conduct, and policies that guide and sometimes limit humanitarian action and its interface with military actors. 3-155. Even in those situations where military forces are not directly involved, a focused and integrated humanitarian response is essential to alleviating suffering and reestablishing a stable environment that fosters a lasting peace to support broader national and international interests. Providing humanitarian aid and assistance is primarily the responsibility of specialized nonmilitary organizations and agencies, such as USAID. Nevertheless, military forces often support humanitarian response activities either as part of a broader campaign, such as Operation Iraqi Freedom, or a specific humanitarian assistance or disaster relief operation. These activities usually consist of stability tasks and generally fall under the primary stability task restore essential services. The discussion beginning with paragraph 3-156 outlines the guiding principles used by the international community to frame humanitarian response activities. 3-156. Generally, the host nation or affected country coordinates humanitarian response. However, if the host nation or affected country is unable to do so, the United Nations often leads the international community response on its behalf. The principles that guide the military contribution to that response are fundamental to success in unified land operations. These principles reflect the collective experience of a diverse group of actors in a wide range of interventions conducted over decades across the world. They help to shape the humanitarian component of operations focused on stability. 3-157. UN General Assembly Resolution 46/182 governs the humanitarian response efforts of the international community. It articulates the principal tenets for providing humanitarian assistance— humanity, neutrality, and impartiality—while promulgating the guiding principles that frame all humanitarian response activities. These guiding principles are drawn from four primary, albeit separate, sources: * InterAction and the DOD. * International Red Cross and Red Crescent Movement. * Oslo Guidelines. * The Interagency Standing Committee. InterAction and the Department of Defense 3-158. InterAction is the largest coalition of U.S.-based NGOs focused on the world’s poorest and most vulnerable people. Collectively, its members work in every developing country. Members meet people halfway in expanding opportunities. They support gender equality in education, health care, agriculture, small business, and other areas.
3-07
81
Considerations to Achieve Unity of Effort 3-159. InterAction was a key participant in the development of the 2005 Guidelines for Relations Between U.S. Armed Forces and Non-Governmental Humanitarian Organizations in Hostile or Potentially Hostile Environments (reprinted in JP 3-08). The Guidelines were developed by a working group consisting of military and civilian participants from interagency partners, the United States Institute for Peace, a consortium of U.S. NGOs, and the Army’s Peacekeeping and Stability Operations Institute. The Guidelines were endorsed by the director of the Joint Staff and disseminated to U.S. forces through the combatant commands. Although the endorsement was not directive in nature, the endorsement advised implementation of the Guidelines when possible. Note. In 2012, the DOS’s Office of the Coordinator for Stabilization and Reconstruction (formerly known as S/CRS) was replaced by the Bureau of Conflict and Stabilization Operations (known as CSO). International Red Cross and Red Crescent Movement 3-160. The International Red Cross and Red Crescent Movement encompass two institutions and nearly 200 national societies. The institutions are the International Committee of the Red Cross (ICRC) and the International Federation of Red Cross and Red Crescent Societies. The ICRC is an impartial, neutral, and independent organization. Established in 1863, its exclusively humanitarian mission aims to protect the lives and dignity of victims of war and internal violence and to provide them with assistance. It directs and coordinates the international relief activities conducted by the International Red Cross and Red Crescent Movement in conflicts. It also endeavors to prevent suffering by promoting and strengthening laws pertaining to human rights and universal humanitarian principles. Fundamental Principles of the Red Cross 3-161. Seven fundamental principles bond together the national Red Cross and Red Crescent Societies, the ICRC, and the International Federation of the Red Cross and Red Crescent Societies. The principles ensure the continuity of the International Red Cross and Red Crescent Movement and its humanitarian work (see JP 3-08 for more information). These principles are— * Humanity. * Impartiality. * Neutrality. * Independence. * Voluntary service. * Unity. * Universality. The International Red Cross and Red Crescent Movement and Nongovernmental Organization Code of Conduct 3-162. In the summer of 1994, the code of conduct for the ICRC and NGOs in disaster relief was developed. (See table 3-3 on page 3-28.) Eight of the world’s largest disaster response agencies agreed on this code. It represents the body of international standards for disaster response. Before then, no accepted body of professional standards existed to guide their work. Today, the international community uses the code of conduct to monitor its own standards of relief delivery and to encourage other agencies to set similar standards.
3-07
82
Chapter 3 Table 3-3. The International Red Cross and Red Crescent Movement and Nongovernmental Organization Code of Conduct in Disaster Relief • The humanitarian imperative comes first. • Aid is given regardless of the race, creed, or nationality of the recipients and without adverse distinction of any kind. Aid priorities are calculated based on need alone. • Aid will not be used to further a particular political or religious standpoint. • We shall endeavor not to act as instruments of government foreign policy. • We shall respect culture and custom. • We shall attempt to build disaster response on local capacities. • Ways shall be found to involve program beneficiaries in the management of relief aid. • Relief aid must strive to reduce future vulnerabilities to disaster as well as meeting basic needs. • We hold ourselves accountable to both those we seek to assist and those from whom we accept resources. • In our information, publicity, and advertising activities, we shall recognize disaster victims as dignified human beings, not hopeless objects. 3-163. Like most professional codes, the code of conduct is voluntary. It applies to any NGO, national or international, regardless of size. It provides ten principles that all NGOs should adhere to in their disaster response work. The code of conduct also describes the relationships that these groups should seek with donor organizations, host-nation governments, and the UN. The code is self-policing; no NGO is going to force another NGO to act in a certain way. At the time this manual was prepared, no international association for disaster response NGOs possessed any authority to sanction its members. (A more detailed discussion of The International Red Cross and Red Crescent Movement and Nongovernmental Organization Code of Conduct in Disaster Relief appears on the International Committee of the Red Cross Web site.) Oslo Guidelines 3-164. The Oslo Guidelines were completed in 1994. They were the result of a collaborative effort by over 180 delegates from 45 nations and 25 organizations. These delegates drafted the Oslo Guidelines to establish a framework on the use of foreign military and civil defense assets in disaster relief. This framework aims to formalize and improve the effectiveness and efficiency when using United Nations military and civil defense assets for international disaster relief operations. The core principles of the Oslo Guidelines are— * Humanity. * Neutrality. * Impartiality. In addition to the core principles, key concepts include sovereignty and the complementing military and civil defense forces. (A more detailed discussion of the Oslo Guidelines, including additional key concepts, can be found on the UN Web site known as ReliefWeb.) Interagency Standing Committee Principles and Concepts on Civil-Military Relationship in Complex Emergencies 3-165. The Interagency Standing Committee was established in June 1992, in response to UN General Assembly Resolution 46/182 on the strengthening of humanitarian assistance. It is the primary mechanism for interagency coordination of humanitarian assistance. It is a unique forum involving the key United Nations and other humanitarian partners. All humanitarian action, including civil-military coordination for humanitarian purposes in complex emergencies, must be conducted in accordance with the overarching principles (shown in table 3-4). This section outlines these principles and concepts to follow when planning or undertaking civil-military coordination. (A more detailed discussion of the IASC principles and concepts is in the Civil-Military Guidelines & Reference for Complex Emergencies and on the UN Web site known as ReliefWeb.)
3-07
83
Considerations to Achieve Unity of Effort Table 3-4. Interagency Standing Committee principles for civil-military relationships in complex emergencies • Humanity, neutrality, and impartiality • Humanitarian access to vulnerable populations • Perception of humanitarian action • Needs-based assistance free of discrimination • Civil-military distinction in humanitarian action • Operational independence of humanitarian action • Security of humanitarian personnel • Do no harm • Respect for international legal instruments • Respect for culture and custom • Consent of parties to the conflict • Option of last resort • Avoid reliance on the military
3-07
85
Chapter 4 Stability Assessment Frameworks This chapter begins by discussing the importance of assessing stability tasks. Then it presents two interagency frameworks that can support the activities of the operations process and enhance unity of effort. IMPORTANCE OF ASSESSING STABILITY TASKS 4-1. Army commanders measure the effectiveness and performance of stability tasks in relation to accomplishing Army missions and achieving progress toward overall United States (U.S.) stability goals. Determining how completed stability tasks support overall goals, especially in post-conflict situations, is important but challenging because measuring effects may take months or years. Commanders need to establish accurate indicators and track them at repeated intervals, in coordination with interagency partners. Interagency assessment tools can facilitate coordination of measurement efforts. Measuring the success of stability tasks includes— * Identifying and reducing the causes of instability. * Reestablishing or building host-nation capability to reduce, manage, or prevent conflict. 4-2. Army forces use the operations process described in ADRP 5-0 to plan, prepare, execute, and assess operations. The assessment process described in ADRP 5-0 consists of, but is not limited to— * Monitoring the current situation to collect relevant information. * Evaluating progress toward attaining end state conditions, achieving objectives, and performing tasks. * Recommending or directing action for improvement. 4-3. The assessment frameworks discussed in this chapter can support the activities of the operations process. These frameworks were developed collaboratively by the departments and agencies of the U.S. Government to identify the root causes of instability, develop activities to diminish or mitigate them, and evaluate the effectiveness of the activities in fostering stability. Unified action partners commonly use these frameworks. They are tools for interagency planning, and they can inform Army planning and enhance unity of effort. These frameworks are not intended to be prescriptive. In this context, terminology usage may differ from standard doctrinal terminology. 4-4. At each level of monitoring and evaluation, commanders identify lessons to improve future stabilization activities or sustain successful ones. For example, military forces may learn certain external factors prevented an activity from being successful. Subsequent efforts need to address those external factors or take a different approach to addressing the sources of instability. DISTRICT STABILITY FRAMEWORK 4-5. To increase the effectiveness of stability missions, the United States Agency for International Development (known as USAID) developed the District Stability Framework. The District Stability Framework was designed to guide and support stabilization efforts by helping civilians and military organizations identify the causes of instability, develop activities to diminish or mitigate them, and evaluate the effectiveness of the activities in fostering stability at the tactical or operational level. The District Stability Framework can be used to create local stabilization plans and provide data for the Interagency Conflict Assessment Framework, which has a strategic (country or regional) focus. The District Stability Framework supports unity of effort by providing partners with a common framework to— * Understand an operational environment from a stability-focused perspective. * Maintain focus on the local population and its perceptions.
3-07
86
Chapter 4 * Identify the sources of instability in a specific local area. * Design activities that specifically address the identified sources of instability. * Monitor and evaluate activity outputs and impacts, as well as changes in overall stability. (See ATP 3-07.5 for a more detailed description of the District Stability Framework.) 4-6. The District Stability Framework helps overcome many of the challenges to successful operations focused on stability. It can help— * Keep military formations focused on the center of gravity for operations focused on stability— the population and its perceptions. * Provide a common operational picture for all interagency teams in an area of operations. By focusing on sources of instability, partner organizations can focus their varied resources and expertise on shared priorities. * Prioritize activities based on their importance to the local populace and their relevance to the overarching mission of stabilizing the area. * Enhance continuity between military formations. Units can easily pass District Stability Framework data along from one unit to the next, establishing a clear baseline that identifies sources of instability and the steps taken to mitigate them. * Empower tactical-level formations by giving them hard data useful for decisionmaking at their level and for influencing decisions at higher levels. * Identify measures of performance and measures of effectiveness for unit activities rather than simply tracking measures of performance. * Track indicators of overall stability by assessing whether an area is becoming more stable. * Identify issues that matter most to the population; the District Stability Framework helps identify information themes that resonate with the population. 4-7. The District Stability Framework has four steps. Ideally, all interagency partners in the area participate in the process, organized through the creation of an interagency stability working group. Figure 4-1 illustrates the four basic steps. Figure 4-1. District Stability Framework process SITUATIONAL AWARENESS 4-8. The District Stability Framework uses four lenses to achieve a population-centric, stability oriented, situational awareness of an area of operations. The stability working group by examines the area of operations from four perspectives: an operational environment; cultural aspects; stability and instability dynamics; and local perceptions. The District Stability Framework examines the area of operations and helps leaders achieve a situational awareness of stability conditions and underlying factors. ANALYSIS 4-9. After gaining situational awareness in step 1, the District Stability Framework provides tools to analyze and identify potential sources of instability, their causes, the desired objectives, and the indicators
3-07
87
Stability Assessment Frameworks that measure progress in addressing each source of instability. The second step of the District Stability Framework, analysis, consists of four tasks: identify potential sources of instability, vet each source against instability criteria, determine if the source meets two of the three instability criteria, and prioritize the sources of instability. The instability criteria are— * Decreased support for the government or legitimate governance institution. * Increased support for adversaries or enemies. * Undermining of the normal functioning of society. After identifying and prioritizing the sources of instability, practitioners fill out a tactical stability matrix for each source of instability. DESIGN 4-10. In the third step of the District Stability Framework, practitioners design, prioritize, and synchronize stabilization activities. The stability working group develops activities to diminish the sources of instability identified during the analysis step. The process begins by brainstorming potential stabilization activities. It continues by filtering and refining the proposed activities against a set of stability criteria, design principles, and resource availability. This step is similar to the Army design methodology’s activities develop an operational approach and develop the plan, described in ADRP 5-0. MONITORING AND EVALUATION 4-11. The final step in the District Stability Framework takes place during and after the implementation of stability activities. Monitoring and evaluation are conducted in three ways: * Measures of performance: track implementation of an activity. * Measures of effectiveness: measure the effect that an activity achieved. * Overall stability: assess the overall stabilizing effect of all the activities conducted over a longer period, as well as the influence of external factors. 4-12. As practitioners conduct this monitoring and evaluation, they identify lessons about what worked, what did not work, and what partners can do to improve their stability efforts as they repeat the District Stability Framework process in the future. 4-13. The District Stability Framework can support effective monitoring, evaluating, and decisionmaking. It focuses on the perceptions of the population and informs a common operational picture for Army units and their interagency partners. Furthermore, it helps inform and influence audiences by identifying themes that resonate with the population. INTERAGENCY CONFLICT ASSESSMENT FRAMEWORK 4-14. Interagency partners begin helping host nations prevent, mitigate, and recover from violent conflict by developing shared understanding about the sources of violent conflict or civil strife. To assess conflict situations systemically and collaboratively, interagency teams use a tool known as the Interagency Conflict Assessment Framework (ICAF), published by the Department of State in 2008. The ICAF supports interagency planning for conflict prevention, mitigation, and stabilization. 4-15. Army forces conducting stability operations often are involved in interagency processes. To be effective, Army forces should be familiar with the ICAF. Army forces frequently participate in interagency conflict assessment activities. Using the ICAF for interagency activities also informs Army operational assessments. PURPOSE OF THE INTERAGENCY CONFLICT ASSESSMENT FRAMEWORK 4-16. The ICAF provides interagency partners a framework for developing a common perspective about the dynamics driving and mitigating violent conflict in a country. Partners use the ICAF to create shared understanding that informs national policy and planning decisions. The ICAF may also be used to inform strategic-level decisionmaking.
3-07
88
Chapter 4 4-17. The ICAF outlines key concepts, processes, and products essential to conflict assessment. Interagency partners develop supplementary documents, appropriate tools, and data collection procedures as needed. Partners set the composition and functions of each interagency conflict assessment team. 4-18. The ICAF draws on conflict assessment tools used by interagency and interorganizational partners. It is not intended to duplicate or replace independent analytical processes, such as those conducted within the intelligence community. Rather, the ICAF builds upon those and other analytical efforts to provide a common framework. It facilitates shared knowledge and understanding. 4-19. The ICAF is distinct from other forecasting tools that identify countries at risk of instability or collapse and that describe relevant conditions. The ICAF builds on other forecasts and social science expertise. It helps interagency teams understand the reasons conditions exist and identify effective ways to engage and transform those conditions. The ICAF provides a shared, strategic perspective of the conflict against which future progress can be measured. (See ADRP 3-07 for a discussion of conflict transformation in the performance of stability tasks.) APPLICATION OF THE INTERAGENCY CONFLICT ASSESSMENT FRAMEWORK 4-20. The ICAF guides the determination of which partners initiate and participate, when and where the process occurs, the type and application of products needed, and the appropriate level of classification. When interagency partners use the ICAF, they need to complete all of its analytical steps. The nature and scope of the assessment vary according to the situation. 4-21. The ICAF is a flexible, scalable interagency tool suitable for use in— * Steady-state engagement and conflict prevention planning. * U.S. Government reconstruction and stabilization contingency planning. * U.S. Government reconstruction and stabilization crisis response planning. Steady-State Engagement and Conflict Prevention Planning 4-22. Steady-state or conflict prevention planning efforts normally provide interagency partners with sufficient time for a thorough assessment and a permissive operational environment. Steady-state engagement and conflict prevention planning efforts may include— * Preparing an embassy for National Defense Authorization Act funding. * Answering requests by an embassy or combatant command for interagency assistance in understanding and planning for leveraging U.S. interests in fragile or at-risk countries. * Assisting with the development of combatant command theater campaign plans, including security cooperation planning. * Developing country assistance strategies or mission strategic plans. * Designing interagency prevention efforts for countries listed on state failure watch lists and early warning systems. United States Government Reconstruction and Stabilization Contingency Planning 4-23. Reconstruction and stabilization contingency planning are based on a hypothetical future. The ICAF provides concrete background information about existing dynamics that could trigger, exacerbate, or mitigate violent conflict. The ICAF is a robust element of planning, providing critical information for situational analysis, regardless of where the assessment and planning occur. United States Government Reconstruction and Stabilization Crisis Response Planning 4-24. The ICAF provides detailed situational analysis that can contribute critical information for initial interagency planning. Interagency partners update the ICAF analysis as they have more information available and better access to inform the policy formulation, strategy development, and interagency implementation. When used for crisis response, the ICAF might be a tabletop assessment completed in as little as one and one-half days by an interagency team based in Washington. Conversely, it could occur
3-07
89
Stability Assessment Frameworks over several weeks, with conversations back and forth between Washington and interagency partners in the field. Roles and Responsibilities in the Interagency Conflict Assessment Framework 4-25. Planners determine which partners serve on an ICAF team and in what capacities. The agency or individual responsible for managing the overall planning process proposes the tools and requests participation of partners. An established country team may use the ICAF to inform country assistance strategy development while a geographic combatant command uses the ICAF to bring an interagency perspective to theater security cooperation planning. In crisis response, the ICAF normally is part of the strategic planning led by a group focused on reconstruction and stabilization of the country in crisis. The ICAF may also be used among partners as part of collaborative planning. 4-26. As a rule, participants using an ICAF include the broadest possible representation of partners with expertise or a stake in a given situation. An ideal interagency team represents diverse skill sets and brings together the collective knowledge and experience of various U.S. departments and agencies. Participants might include relevant regional bureaus, sector experts, intelligence analysts, and social science or conflict specialists. When interagency partners use the ICAF to support planning, the interagency field team includes members of the strategic planning team. The interagency field team expands as needed to include local stakeholders and international partner representatives. 4-27. To ensure the most comprehensive analysis, members of the interagency team must provide all relevant information retained by each department or agency, including the results of past assessments and related analyses. Members of the interagency team must retain reachback capability with their agencies to obtain further information to fill critical information gaps identified through the ICAF process. 4-28. The ICAF includes two major tasks: conflict diagnosis and transition into planning. STEPS OF CONFLICT DIAGNOSIS IN THE INTERAGENCY CONFLICT ASSESSMENT FRAMEWORK 4-29. ICAF’s first major task is conflict diagnosis. Conflict diagnosis allows the interagency team to deliver a product that describes the context, core grievances and resiliencies, drivers of conflict and mitigating factors, and opportunities for increasing or decreasing conflict. Figure 4-2 illustrates the steps of conflict diagnosis: * Evaluate the context of the conflict. * Understand core grievances and social and institutional resilience. * Identify drivers of conflict and mitigating factors. * Describe opportunities for increasing or decreasing conflict. Figure 4-2. Conflict-diagnosis process of the interagency conflict-assessment framework
3-07
90
Chapter 4 Step 1—Evaluate the Context of the Conflict 4-30. During the first step of conflict diagnosis, the team evaluates and outlines key contextual issues in an operational environment. Context does not cause conflict but describes the often long-standing conditions that resist change. Issues may include environmental conditions, poverty, youth bulge, or recent or long- term conflict in a region. Contextual conditions can reinforce divisions between communities or contribute to pressures making violence appear attractive for advancing individual interests. Contextual conditions can shape perceptions of identity groups. Key actors can use the conditions to manipulate and mobilize constituencies. 4-31. Each ICAF step begins with identifying the contextual conditions and issues from which the conflict evolved. This process, depicted in figure 4-2, reflects the complex interaction between the context and the other elements of the ICAF. Step 2—Understand Core Grievances and Sources of Social and Institutional Resilience 4-32. The team should understand, agree upon, and communicate the concepts of core grievances and sources of social and institutional resilience. They should describe them within the specific situation. Under the ICAF, a core grievance is any societal group’s perception that other groups or social institutions threaten its physical security, livelihood, interests, or values. A source of social and institutional resilience is any group’s perception that social relationships, structures, or processes are in place that can resolve disputes and meet basic needs through nonviolent means. 4-33. During the second step of conflict diagnosis, the team must— * Describe identity groups who perceive threats to their identity, security, or livelihood. * Articulate how societal patterns reinforce perceived deprivation, blame, and intergroup cleavages; articulate how those societal patterns promote harmony and peaceful resolution of disputes. * Explain how positive or negative institutional performance contributes to or aggravates the resolution of conflict. 4-34. Identity groups are groups of people that identify with one another, often because of characteristics used by outsiders to describe them. These characteristics can include ethnicity, race, nationality, religion, political affiliation, age, gender, economic activity, or socioeconomic status. Identity groups are inclined to conflict when they perceive that other groups’ interests, needs, and aspirations compete with and jeopardize their identity, security, or other fundamental interests. 4-35. Societal patterns associated with conflict reinforce divisions between groups. These patterns can include elitism, exclusion, corruption, chronic state capacity deficits, and unmet expectations. Capacity deficits consist of systemic economic stagnation, scarcity of necessary resources, and ungoverned spaces. Unmet expectations may be a lack of a peace dividend, land tenure issues, disillusionment, and disenfranchisement. Impacts of societal patterns often include negative economic consequences for disadvantaged groups. 4-36. Institutional performance considers formal and informal social structures to determine the groups’ performance level and if they contribute to or mitigate conflict and instability. Formal social structures consist of governments, legal systems, religious organizations, public schools, security forces, and economic institutions. Informal social structures include traditional dispute resolution bodies; families, clans or tribes; and armed groups. Assessing institutional performance involves distinguishing between outcomes and perceptions. Institutional outcomes are results that can be measured objectively; perceptions are the evaluative assessment of those outcomes. To diagnosis the conflict, teams must understand how various groups within a society perceive outcomes, especially in terms of effectiveness and legitimacy. Step 3—Identify Drivers of Conflict and Mitigating Factors 4-37. The team should understand and outline the drivers and mitigating factors of conflict and enumerate them within the situation being assessed. Drivers of conflict represent the active energy moving the conflict—the dynamic situation resulting from key actors’ mobilization of social groups around core grievances. While core grievances can be understood as the potential energy of conflict, key actors translate
3-07
91
Stability Assessment Frameworks that energy into drivers of conflict. Mitigating factors represent the dynamic situation resulting from key actors’ mobilization of social groups around sources of social and institutional resilience. Mitigating factors can be understood as the energy produced when key actors mobilize the potential energy of social and institutional resilience. 4-38. During the third step of conflict diagnosis, the team identifies the key actors central to producing, perpetuating, or profoundly changing the societal patterns or issues of institutional performance identified previously. The team determines whether key actors are motivated to mobilize constituencies toward inflaming or mitigating violent conflict and the means they have at their disposal. To perform the analysis required in this step, the team— * Identifies the key actors. * Identifies key actors’ constituencies. Identify the Key Actors 4-39. The team identifies the people, organizations, or groups who have leadership abilities or power— such as political position, moral authority, charisma, wealth, and weapons. These key actors can affect societal patterns and institutional performance, shape perceptions and actions, and mobilize people around core grievances or social and institutional resilience. 4-40. The team identifies the locations of key actors in leadership positions in governing, social, or professional organizations or networks (either within or external to a state or territory). They include private businesses, religious organizations, government positions, informal and illicit power structures, media, and academic institutions. 4-41. The team identifies what motivates key actors to exert influence on each of the political, economic, social, and security systems within the host nation—such as commitment to a cause or a people, greed (money or notoriety), and religious beliefs. The team identifies the methods key actors use to exert their influence (leadership capability, moral authority, personal charisma, access to resources or weapons, or networks). Identify Key Actors’ Constituencies 4-42. The team first identifies key actors’ supporting and opposing constituencies. Then the team identifies their core grievances or social or institutional resilience around which they are being mobilized. The team identifies the key actors’ critical motivations, means, and resources. 4-43. Using this information, the team drafts brief narrative statements describing the methods and reasons that key actors mobilize specific constituencies around core grievances and sources of social and institutional resilience. Each statement relating to core grievances becomes an entry in the list of drivers of conflict. Each relating to sources of social and institutional resilience becomes an entry in the list of mitigating factors. Step 4—Describe Windows of Vulnerability and Windows of Opportunity 4-44. In the final step of conflict diagnosis, the team— * Identifies potential situations that could contribute to an increase in violent conflict. * Identifies potential situations that might offer opportunities for mitigating violent conflict and promoting stability. 4-45. The team should specify situations for increasing and decreasing conflict and describe those expected within the specific situation being assessed. These situations are described as windows of vulnerability and windows of opportunity. Windows of vulnerability are potential situations that may trigger conflict escalation. They often result from large-scale responses such as an increase of uncertainty during elections or following an assassination. They also result from an exclusion of parties from important events (such as negotiations or elections) or attempts to marginalize disenfranchised followers. Windows of vulnerability are moments when events threaten to rapidly and fundamentally alter the balance of political or economic power. Elections, devolution of power, and legislative changes illustrate possible windows of vulnerability. Key actors may seize, retain, and exploit the initiative during these moments to amplify the drivers of
3-07
92
Chapter 4 conflict. Windows of opportunity describe potential situations that may enable significant progress toward achieving stable peace. These windows may include situations where overarching identities assume prominence among disputing groups, natural disasters affect multiple identity groups, the situation requires a unified response, or a key leader driving the conflict is killed. These windows are moments when overarching identities become more important than subgroup identities. These occasions may present opportunities to provide additional support for factors that mitigate conflict. 4-46. The team completes conflict diagnosis by considering windows of vulnerability and windows of opportunity and prioritizing drivers of conflict and mitigating factors identified previously. The team uses the list of prioritized drivers and mitigating factors as the basis for its findings. STEPS OF TRANSITION INTO PLANNING IN THE INTERAGENCY CONFLICT ASSESSMENT FRAMEWORK 4-47. ICAF’s second major task is transition into planning. When the ICAF is used to support crisis response or deliberate planning, the findings of the conflict diagnosis feed into the situational analysis and policy formulation steps of interagency, whole-of-government planning. When the ICAF is used to support steady-state engagement or conflict prevention planning, the team begins preplanning activities after completing conflict diagnosis. During the transition into these types of planning, the team maps existing diplomatic and program activities against the prioritized lists of drivers of conflict and mitigating factors. This mapping identifies gaps in current efforts as they relate to conflict dynamics. However, this is not intended as an evaluation of the overall impact or utility of any specific program or initiative. The team uses these findings as a basis for making recommendations to planners on potential entry points for interagency activities. 4-48. When the ICAF is used to support steady-state engagement or conflict prevention planning, six steps are used to facilitate the transition into planning (summarized in table 4-1). Table 4-1. Interagency conflict assessment framework transition into planning Step 1 Specify current U.S. activities (identify U.S. departments and agencies present in the country and the nature and scope of their efforts) by— • Identifying the impact of these efforts on drivers of conflict and mitigating factors. • Identifying efforts that target similar outcomes and coordination mechanisms in place. Step 2 Specify current efforts of partners not part of the United States Government, including bilateral agencies, multilateral agencies, nongovernmental organizations, and private sector and local entities by— • Identifying the impact of the efforts on the drivers of conflict and mitigating factors. • Identifying efforts that target similar outcomes (including efforts of interagency partners) and coordinating mechanisms in place. Step 3 Identify drivers of conflict and mitigating factors not sufficiently addressed by existing efforts (gaps). Step 4 Specify challenges to addressing these gaps. Step 5 Describe risks associated with failing to address gaps (relate directly to windows of vulnerability). Step 6 Describe opportunities to address gaps (relate directly to windows of opportunity). 4-49. The team draws on the information generated from the transition into planning to determine potential entry points for U.S. efforts. The description of these entry points explain how the dynamics outlined during conflict diagnosis may be susceptible to outside influence.
3-07
93
Glossary The glossary lists acronyms and terms with Army or joint definitions. Where Army and joint definitions differ, (Army) precedes the definition. Terms for which FM 3-07 is the proponent (authority) manual are marked with an asterisk (*). The proponent manual for other terms is listed in parentheses after the definition. SECTION I – ACRONYMS AND ABBREVIATIONS ADP Army doctrine publication ADRP Army doctrine reference publication AR Army regulation ATP Army techniques publication CBRN chemical, biological, radiological, and nuclear CMOC civil-military operations center CPA Coalition Provisional Authority DA Department of the Army DOD Department of Defense DOS Department of State FM field manual HIV/AIDS human immunodeficiency virus/acquired immunodeficiency syndrome ICAF Interagency Conflict Assessment Framework ICRC International Committee of the Red Cross ICITAP International Criminal Investigative Training Assistance Program IGO intergovernmental organization JP joint publication MOE measure of effectiveness MOP measure of performance NGO nongovernmental organization PKSOI Peacekeeping and Stability Operations Institute U.S. United States UN United Nations USAID United States Agency for International Development WMD weapons of mass destruction SECTION II – TERMS demobilization The process of transitioning a conflict or wartime military establishment and defense-based civilian economy to a peacetime configuration while maintaining national security and economic vitality. (JP 4-05) dislocated civilian A broad term primarily used by the Department of Defense that includes a displaced person, an evacuee, an internally displaced person, a migrant, a refugee, or a stateless person. (JP 3-29)
3-07
94
Glossary foreign internal defense Participation by civilian and military agencies of a government in any of the action programs taken by another government or other designated organization to free and protect its society from subversion, lawlessness, insurgency, terrorism, and other threats to its security. (JP 3-22) information-related capability A tool, technique, or activity employed within a dimension of the information environment that can be used to create effects and operationally desirable conditions. (JP 3-13) integration The arrangement of military forces and their actions to create a force that operates by engaging as a whole. (JP 1) interagency coordination Within the context of Department of Defense involvement, the coordination that occurs between elements of Department of Defense, and engaged US Government agencies and departments for the purpose of achieving an objective. (JP 3-0) interorganizational coordination The interaction that occurs among elements of the Department of Defense; engaged United States Government agencies; state, territorial, local, and tribal agencies; foreign military forces and government agencies; intergovernmental organizations; nongovernmental organizations; and the private sector. (JP 3-08) phase (Army) A planning and execution tool used to divide an operation in duration or activity. (ADRP 3-0) reintegration The process through which former combatants, belligerents, and displaced civilians receive amnesty, reenter civil society, gain sustainable employment, and become contributing members of the local populace. (ADRP 3-07) security cooperation All Department of Defense interactions with foreign defense establishments to build defense relationships that promote specific US security interests, develop allied and friendly military capabilities for self-defense and multinational operations, and provide US forces with peacetime and contingency access to a host nation. (JP 3-22) security force assistance The Department of Defense activities that contribute to unified action by the US Government to support the development of the capacity and capability of foreign security forces and their supporting institutions. (JP 3-22) security sector reform A comprehensive set of programs and activities undertaken to improve the way a host nation provides safety, security, and justice. (JP 3-07) Soldier and leader engagement Interpersonal interactions by Soldiers and leaders with audiences in an area of operations. (FM 3-13) *transitional military authority A temporary military government exercising the functions of civil administration in the absence of a legitimate civil authority.
3-07
95
References All URLS accessed on 15 May 2014. REQUIRED PUBLICATIONS These documents must be available to intended users of this publication. ADP 3-07. Stability. 31 August 2012. ADRP 1-02. Terms and Military Symbols. 24 September 2013. ADRP 3-07. Stability. 31 August 2012. JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 08 November 2010. RELATED PUBLICATIONS These documents contain relevant supplemental information. JOINT AND DEPARTMENT OF DEFENSE PUBLICATIONS Most joint publications are available online: http://www.dtic.mil/doctrine/new_pubs/jointpub.htm. JP 1. Doctrine for the Armed Forces of the United States. 25 March 2013. JP 3-0. Joint Operations. 11 August 2011. JP 3-05. Special Operations. 18 April 2011. JP 3-07. Stability Operations. 29 September 2011. JP 3-07.3. Peace Operations. 01 August 2012. JP 3-08. Interorganizational Coordination During Joint Operations. 24 June 2011. JP 3-13. Information Operations. 27 November 2012. JP 3-22. Foreign Internal Defense. 12 July 2010. JP 3-24. Counterinsurgency. 22 November 2013. JP 3-29. Foreign Humanitarian Assistance. 03 January 2014. JP 3-40. Combating Weapons of Mass Destruction. 10 June 2009. JP 3-41. Chemical, Biological, Radiological, and Nuclear Consequence Management. 21 June 2012. JP 3-57. Civil-Military Operations. 11 September 2013. JP 4-05. Joint Mobilization Planning. 21 February 2014. ARMY PUBLICATIONS Most Army publications are available online: http://www.apd.army.mil/. ADRP 3-0. Unified Land Operations. 16 May 2012. ADRP 5-0. The Operations Process. 17 May 2012. AR 27-20. Claims. 08 February 2008. ATP 3-07.5. Stability Techniques. 31 August 2012. ATP 3-57.10. Civil Affairs Support to Populace and Resources Control. 06 August 2013. FM 1-06. Financial Management Operations. 04 April 2011. FM 2-22.2. Counterintelligence. 21 October 2009. FM 3-13. Inform and Influence Activities. 25 January 2013. FM 3-22. Army Support to Security Cooperation. 22 January 2013. FM 3-24. Counterinsurgency. 15 December 2006.
3-07
96
References FM 3-57. Civil Affairs Operations. 31 October 2011. FM 27-10. The Law of Land Warfare. 18 July 1956. OTHER PUBLICATIONS Civil-Military Guidelines & Reference for Complex Emergencies [Part 2]. Available at http://ochaonline.un.org/cmcs/guidelines. Geneva Conventions. Available at http://avalon.law.yale.edu/subject_menus/lawwar.asp. Guidelines for Relations Between U.S. Armed Forces and Non-Governmental Humanitarian Organizations in Hostile or Potentially Hostile Environments. Available at http://www.usip.org/sites/default/files/guidelines_handout.pdf. Guidelines on the Use of Foreign Military and Civil Defence Assets in Disaster Relief—“Oslo Guidelines.” Available at http://reliefweb.int/sites/reliefweb.int/files/resources/8706B7B69BD77E00C1257233004F057 0-OCHA-Nov2006.pdf. The Hague Conventions. Available at http://avalon.law.yale.edu/subject_menus/lawwar.asp. Interagency Conflict Assessment Framework. Available at http://pdf.usaid.gov/pdf_docs/PCAAB943.pdf. Lessons-Learned: Demobilization, Disarmament, and Reintegration (DDR) in Stabilization and Reconstruction Operations—A Guide for United States Government Planners. Available at https://www.pksoi.org/document_repository/doc_lib/SCRS_DDR_A%20Guide%20for%20U SG%20Planners_April_2006.pdf. The Management of Security Cooperation (also known as The Green Book). Available at http://www.disam.dsca.mil/pages/pubs/greenbook.aspx. Managing Performance in Peacebuilding: Framework for Conflict-Sensitive Monitoring and Evaluation. Available at http://www.undp.org/content/dam/philippines/docs/CPRU/Managing%20Performance%20in %20Peacebuilding.pdf. Manual for Military Commissions United States. Available at http://www.mc.mil/Portals/0/pdfs/2012ManualForMilitaryCommissions.pdf. Measuring Progress in Conflict Environments (MPICE). Available at http://www.usip.org/sites/default/files/MPICE%20Aug%2008.pdf. Post-Conflict Reconstruction Essential Tasks. Available at http://2001- 2009.state.gov/s/crs/rls/52959.htm. Security Sector Reform. Available at http://www.state.gov/documents/organization/115810.pdf. Senior Leader’s Guide to Transition Planning Version. Available at https://call2.army.mil/docs/doc7017/13-01.pdf. The Sphere Handbook. Available at http://www.sphereproject.org/handbook/. Strengthening of the Coordination of Humanitarian Emergency Assistance of the United Nations. Available at http://www.un.org/documents/ga/res/46/a46r182.htm. United Nations General Assembly Resolution 46/182. Available at http://www.un.org/documents/ga/res/46/a46r182.htm. United Nations Security Council Resolution 1540. Available at http://www.un.org/en/ga/search/view_doc.asp?symbol=S/RES/1540%20(2004). UNITED STATES LAW Most acts and public laws are available http://thomas.loc.gov/home/thomas.php. Foreign Assistance Act of 1961. National Defense Authorization Act. Title 10, United States Code. Armed Forces.
3-07
97
References Title 22, United States Code. Foreign Relations and Intercourse. Tom Lantos and Henry J. Hyde United States Global Leadership Against HIV/AIDS, Tuberculosis, and Malaria Reauthorization Act. WEB SITES International Committee of the Red Cross (ICRC). Available at http://www.icrc.org. North Atlantic Treaty Organization. Available at http://www.nato.int. Peacekeeping and Stability Operations Institute (PKSOI). Available at http://pksoi.army.mil. ReliefWeb (a service of the United Nations Office for the Coordination of Humanitarian Affairs). Available at http://www.reliefweb.int. United Nations (UN). Available at http://www.un.org. PRESCRIBED FORMS None. REFERENCED FORMS Unless otherwise indicated, DA forms are available on the Army Publishing Directorate Web site at http://www.apd.army.mil/. DA Form 2028. Recommended Changes to Publications and Blank Forms.
3-07
99
Index Entries are by paragraph number. civil administration, exercise of, responsibilities, 1-35, 1-40, A 2-43 2-70, 2-105, 3-102, 4-1 acting as if, managing emotions, interim civil authority and, rule of law and, 3-111 3-47 2-101 transition, 2-22 ACTion approach, steps, 3-38 transitional military authority, common ground, building, 3-76– active listening, communication 2-54–2-55 3-79 and, 3-31–3-33 civil affairs, considerations, 3-147 strategies for building, 3-78 actors, comprehensive approach, forces, 3-143 communication, 3-127 2-23 operations, 3-144–3-147 active listening and, 3-31–3-33 cooperation with, 3-124 personnel, 3-145, 3-147 improving, 3-28–3-53 engage, 1-60 stability and, 3-142–3-148 strategies, 3-30 humanitarian, 3-150 support from, 3-142 comprehensive, security sector identifying key, 4-39–4-41 civil authorities, cooperation with, reform, 1-85–1-86 influence by, 1-54 1-82 comprehensive approach, 3-120– neutrality, 3-151–3-152 civil control, establish, 1-12–1-17 3-165 Soldiers and, 1-46 phases of stability framework, funding and, 3-92 agencies, perceptions of, 3-25 1-14–1-16 integration, 2-23 alliances, developing, 3-59–3-63 civil security, establish, 1-7–1-11 security sector reform, 1-77 strategies for, 3-63 phases of stability framework, transition, 2-6 analysis, civil affairs, 3-147 1-8–1-10 conditions, stabilize, 1-3 District Stability Framework, civilians, challenges to protection, confirmation bias, 3-42 4-9 1-62 conflict, managing, 3-72–3-75 archives, preservation, 2-87 oversight, 1-87–1-91 strategies for managing, 3-75 protection of, 1-44–1-62 art, preservation, 2-88 understanding potential, 3-72 reintegration and, 1-113–1-114 assessment, activities, 1-33 risks to, 1-49 conflict diagnosis, Interagency by Soldiers, 3-49–3-53 security of, 2-69 Conflict Assessment civil affairs, 3-145 threats to, 1-51, 1-126 Framework, 4-29–4-43 District Stability Framework, treatment of, 2-71 step 1, 4-30–4-31 4-5–4-13 vulnerabilities, 1-50 step 2, 4-32–4-36 tools, 2-36, 4-18 step 3, 4-37–4-43 civil-military engagement, step 4, 4-44–4-46 assessment frameworks, stability guidelines for, 3-153 tasks, 4-3 conflict transformation, civil-military operations center, reconciliation, 2-7 assessment process, stability, 4-2 stability and, 3-148 consensus, building, 3-77 assistance, funding for, 3-87 coexistence, 3-126 context, evaluate, 4-30–4-31 atrocities, effects of, 2-89 collaboration, coordination and, contingency, planning, 4-23 authority, military, 2-75 3-130–3-132 transitional military authority, funding and, 3-90 cooperation, collaboration and, 2-40–2-48 interagency, 3-59 3-130–3-132 successful, 3-76 requirements for, 3-67 B combat power, stability and, 1-34 coordination, challenges, 3-133 behaviors, assessment of, 3-51 formal, 3-129 command responsibility, bias, common types, 3-39–3-43 transitional military authority, guidelines, 3-132 humanitarian response, 3-155 boundaries, transitional military 2-40–2-48 interorganizational, 3-120 authority and, 2-50-2-52 commanders, See also leaders military forces, 2-108–2-110 building partner capacity, 3-137– actions by, 2-67, 4-4 partners, 3-122–3-133 3-141 civil administration and, 2-57 systems of, 3-16–3-17 emphasis by, 3-139 considerations, 2-64, 2-72, whole-of-government 2-73–2-74, 3-80, 3-85 approach, 3-1–3-2 C funding considerations, 3-88– core grievance, conflict diagnosis, CBRN, 1-117–1-118 3-90 4-32 challenges, coordination, 3-133 understanding, 4-32–4-36
3-07
100
Index Entries are by paragraph number. corrections, security sector sector goals of, 2-77 funding risks, 3-91 reform, 1-101 stability necessities of, 2-81 guidance and authorities on, corruption, rule of law and, 3-102 stimulants, 2-82 3-81–3-93 transitional military authority emotions, management of, 3-44– legal restrictions, 3-84 and, 2-90 3-48 management, 3-84 other authorities, 3-98 costs, disarmament, engagement, steady state, 4-22 oversight, 3-83 demobilization, and environment, shape, 1-61 sources, 3-82, 3-94–3-98 reintegration, 1-107 stabilize, 1-3 Title 10, 3-95 counterinsurgency, 1-132–1-135 essential services, phases of Title 22, 3-97 planning, 1-135 stability framework, 1-19–1-21 types, 3-80–3-98 courts, transitional military restore, 1-18–1-22 funds, quick impact, 3-87–3-92 authority and, 2-92–2-97 establish civil control, 1-12–1-17 G criminal justice system, subtasks, 1-17 components of, 3-107 governance, 1-23 establish civil security, 1-7–1-11 rule of law and, 3-108 subtasks, 1-11 government, host nation, 2-61– criminal justice system reform, 2-67 evaluate, step 1 of conflict actions for, 3-110 officials, 2-62 diagnosis, 4-30–4-31 whole-of-government evaluation, District Stability H approach, 3-107–3-114 Framework, 4-11–4-13 host nation, assistance to, 1-5 crisis response, planning, 4-24 challenges of, 1-75 support to, 4-47 F counterinsurgency, 1-134 cultural agility, 3-13 factors, identify mitigating, 4-37– development of, 1-75 cultures, organizational, 3-18 4-43 government, 2-61–2-67 females, in engagement, 1-42 government actions, 2-28 customs, transitional military laws, customs, boundaries, authority and, 2-50–2-52 forces, actions of, 1-48 2-50–2-52 assistance from, 3-114 D responsibilities of, 1-78 focus by, 3-138 security concept, 1-80 demobilization, definition, 1-110 partners and, 3-123 security sector reform and, Department of Defense, foreign disaster relief, 1-125 1-71–1-73 InterAction and, 3-158–3-159 foreign humanitarian support to, 2-8 assistance, 1-130 Department of State, interagency human rights, 1-83 coordination and, 3-12 foreign humanitarian assistance, humanitarian action, military 1-125–1-131 design, District Stability support to, 3-154 Army support to, 1-127–1-129 Framework, 4-10 types, 1-130–1-131 humanitarian actors, interests of, development, USAID principles 3-151–3-152 foreign internal defense, 1-136– for, 3-115–3-119 support from, 3-150 1-140 disarmament, 1-109 definition, 1-136 humanitarian assistance, disarmament, demobilization, and tasks, 1-137 interagency standing committee reintegration, 1-105–1-115 and, 3-165 foreign police forces, assistance costs, 1-107 nongovernmental to, 1-95 goals of, 1-105 organizations and, 3-149– fostering sustainability phase, civil success of, 1-108 3-165 control, 1-16 dislocated civilian, definition, humanitarian efforts, civil security, 1-10 1-131 organizational differences, 3-25 essential services, 1-21 District Stability Framework, 4-5– support to economic and humanitarian operations, See also 4-13 infrastructure development, foreign humanitarian assistance assistance from, 4-6 1-31 actors in, 1-129 steps of, 4-7–4-13 support to governance, 1-26 humanitarian response, principles, drivers of conflict, identify, 4-37– foundations, security sector 3-155–3-165 4-43 reform, 1-78–1-84 sources, 3-157 dynamics, understanding, 1-55 fragile states, assistance to, 3-117 I engagement with, 3-116 E identity groups, 4-34 fundamental attribution error, 3-40 economy, recovery stimulants for, influence, development, 3-21 2-78–2-79 funding, activities, 3-82 areas of, 3-86–3-93
3-07
101
Index Entries are by paragraph number. information, accessibility, 3-29 interagency standing committee, transitional military authority sharing, 3-123, 3-128 humanitarian assistance and, and, 2-50–2-52 information-related capability, 3-165 leaders, See also commanders 1-39–1-43 interagency team, evaluation by, and officials definition of, 1-39 4-30–4-31 assessment by, 2-37 synchronized, 1-40 Interagency Conflict collaboration with, 3-56 in-group/out-group bias, 3-43 Assessment Framework considerations, 2-6, 2-29, 3-5, and, 4-25 3-17, 3-22, 3-26, 3-55, initial response phase, civil responsibilities, 4-33, 4-37– 3-124 control, 1-14 4-38, 4-44 dynamics and, 1-55–1-56 civil security, 1-8 engagement, 3-116 essential services, 1-19 intergovernmental organization, focus of, 2-14, 3-15 support to economic and security sector reform and, 1-70 interagency groups and, 3-27 infrastructure development, interim civil authority, 2-98–2-110 responsibilities, 1-52, 2-1, 1-29 activities of, 2-102 3-62, 3-68 support to governance, 1-24 characteristics of, 2-101–2-103 situational understanding, instability, criteria, 4-9 military and, 2-104–2-110 1-53–1-56 forecasting, 4-19 occurrence of, 2-98–2-100 support from, 2-25 organization, 2-103 integration, comprehensive leadership, organizational approach, 2-23 internal defense and differences, 3-21 definition, 2-4 development, 1-139–1-140 legal restrictions, funding, 3-84 multinational operations, 3-135 lines of effort, 1-140 transition and, 2-4–2-5 objectives, 1-139 legal system, security sector reform, 1-99–1-100 InterAction, Department of international law, transitional Defense and, 3-158–3-159 military authority, 2-40 legislative branch, security sector reform and, 1-89 interaction, levels of, 3-125 International Red Cross, code of conduct, 3-162–3-163 legitimacy, civil affairs, 3-146 interagency collaboration, establishment of, 1-71 facilitating, 3-59 Red Crescent Movement and, justice system, 1-94 3-160–3-163 Interagency Conflict Assessment law enforcement, 1-95–1-98 Framework, 4-14–4-49 interorganizational coordination, transparency and, 2-12 application of, 4-20–4-28 definition, 3-2 lines of effort, internal defense conflict diagnosis, 4-29–4-43 stability efforts and, 3-120 and development, 1-140 purpose of, 4-16–4-19 J location, interagencies, 3-60 responsibilities of, 4-25–4-28 joint force commander, tasks of, 4-28 M responsibilities of, 2-49 transition into planning, 4-47– 4-49 judge advocates, coordination by, mass atrocity, response, 1-63 3-105 measurement, tools, 2-36 interagency coordination, 3-5– 3-18 justice, transitions, 2-10 mediation, relationships and, 3-73 benefits of, 3-9–3-11 justice system, See also criminal military forces, combination of, 1-4 characteristics of, 3-6–3-8 justice system coordination by, 2-108 competencies for, 3-12–3-18 development of, 1-94 development of, 1-93 considerations, 3-20 reform, 1-99 foreign humanitarian definition, 3-1 justice system reform, U.S. assistance and, 1-127 fostering, 3-5 Government partners and, 1-67 interim civil authority, 2-104– relationships and, 3-74 2-110 understanding, 3-14–3-15 K responsibility of, 1-33 interagency group, considerations key actors, constituencies, 4-42– responsibilities, 1-97 by, 3-57 4-43 security sector reform and, interagency partners, assistance identify, 4-39–4-41 1-78 size needed, 1-4 from, 4-14 L stability operations and, 4-15 capabilities of, 3-16–3-17 collaboration, 3-10 law enforcement, development, strategies for, 3-58 responsibilities of, 3-108 1-95–1-98, 1-104 support from, 1-5, 1-69 oversight of, 1-91 military police, support from, 1-96 interagency partnerships, challenges, 3-8 law of war, civilians and, 1-45 military support, humanitarian laws, penal, 2-93 action, 3-154
3-07
102
Index Entries are by paragraph number. ministry of defense, partners, assistance from, 3-120 physiological regulation, responsibilities of, 1-88 benefits from, 3-131 managing emotions, 3-48 mission objectives, organizational capabilities of, 4-26 planners, Interagency Conflict differences, 3-22 challenges of, 2-34 Assessment Framework, 4-25 support to, 3-70 coordination of, 3-122, 3-123– partners, 2-15 3-133 MOEs, transition phases, 2-35 transition phases, 2-17 differences in, 3-19 transitions, 2-2, 2-30 monitoring, District Stability forces and, 3-123 Framework, 4-11–4-13 integration, 3-103 planning, conflict prevention, 4-22 counterinsurgency, 1-135 MOPs, transition phases, 2-35 Interagency Conflict partners, 2-3 Assessment Framework multinational operations, 3-134– reconstruction and stabilization and, 4-20 3-136 contingency, 4-23, 4-24 neutrality of, 3-121 participants, 3-136 rule of law and, 1-98 planning, 2-3 security sector reform, 1-74– N responsibilities, 1-73 1-76 security sector reform, 1-73 naïve realism, 3-41 transition, 2-11, 4-47–4-49 strengths, 3-70 neutrality, humanitarian actors support from, 2-24 policies, security sector reform, and, 3-151 transfer from, 2-33 1-84 nongovernmental organizations, transitions, 2-5, 2-38 policy, strategy and defense, 1-76 code of conduct, 3-162–3-163 transparency and, 2-13 populace, assessment of, 3-49 humanitarian, 3-149–3-165 U.S. Government, 1-66–1-68 attitudes, 3-136 nonpermissive environment, partnerships, building, 3-54 expression, 2-11 criminal justice system reform, interagency, 3-6 participation by, 2-65 3-113 patience, transition and, 2-14– treatment of, 2-71–2-75 O 2-15 principles, security sector reform, patterns, institutional, 4-36 1-77 officials, criteria for, 2-63 transitions, 2-6–2-15 selecting, 2-66 peace building, civilian protection, 1-58 protection, challenges, 1-62 operational environment, civilians, 1-44–1-62 understanding, 3-16 peace development, civilian guidelines for, 1-52–1-61 protection, 1-58 operational form, transitional positive outcomes for, 1-57 military authority, 2-54–2-56 peace operations, 1-120–1-124 transitional military authority, political objectives and, 1-123 operational level, transition, 2-1 2-75 types, 1-120 opportunity, describe, 4-44–4-46 provincial reconstruction teams, perceptions, focus on, 4-13 3-11 organizational culture, 3-18 interagency partners, 3-24 public health, infrastructure, 2-84 organizational differences, 3-18– transparency and, 2-12 transitional military authority 3-23 permissive environment, criminal and, 2-83–2-84 organizations, differences, 3-18– justice system reform, 3-112 public law, sources for funding, 3-23 perspective taking, 3-53 3-94–3-98 Oslo Guidelines, 3-164 ACTion approach, 3-38 purpose, building shared, 3-76– outcomes, desired, 1-57–1-58 benefits, 3-35 3-79 challenges, 3-37 oversight, civilian, 1-87–1-91 social, 3-34 Q funding, 3-83 legislative branch and, 1-89 perspectives, understanding, quick impact funds, 3-87–3-92 responsibilities, 1-88 3-34–3-53 R phase, definition, 2-17 P reconciliation, conflict phases of stability framework, civil participants, See also actors, transformation, 2-7 control, 1-14–1-16 civilians, military forces, developing, 2-8 civil security, 1-8–1-10 partners, populace, transition, 2-7–2-11 essential services, 1-19–1-21 stakeholders stability transition phases, 2-21 reconstruction, USAID principles inclusion of, 1-81 support to economic and for, 3-115–3-119 multinational operations, 3-136 infrastructure development, reconstruction and stabilization, partner capacity, building, 3-137– 1-29–1-31 contingency planning, 4-23 3-141 support to governance, 1-24– crisis response planning, 4-24 building, 3-140 1-26
3-07
103
Index Entries are by paragraph number. recovery, economic stabilization law enforcement agencies and, stability efforts, challenges, 2-9 and, 2-76–2-82 1-91 support to, 3-120 Red Crescent Movement, code of transition and, 1-90 stability framework, phases, 1-8– conduct, 3-162–3-163 transitional military authority, 1-10, 1-14–1-16, 1-19–1-21, International Red Cross and, 2-42 1-24–1-26, 1-29–1-31 3-160–3-163 security cooperation, funding, stability framework, transition and, Red Cross, principles of, 3-161 3-93 2-20 support to, 1-119 reframing, managing emotions, stability sectors, stability tasks in, 3-46 security force assistance, 1-2 definition, 1-92–1-104 reintegration, 1-111–1-115 stability tasks, accomplishment of, foreign internal defense and, definition, 1-111 1-34 1-138 goals, 1-112 assessment of, 4-1–4-4 security forces, capabilities, 1-103 related missions, stability, 1-38– categories of, 1-5 development of, 1-92–1-104 1-140 coordination, 2-109 other, 1-102–1-104 counterinsurgency, 1-132 relationship building, strategies security sector reform, 1-64–1-104 executing, 3-102 for, 3-54–3-79 civilian oversight established, identification of, 1-34–1-37 relationships, fostering, 3-64–3-66 1-87 multinational operations and, leveraging, 3-67–3-71 comprehensive, 1-85–1-86 3-134 preserving, 3-73 definition, 1-64 peace operations and, 1-122 strategies for identifying, 3-71 desired outcome, 1-65 primary, See also individual strategies for positive, 3-66 establishment of, 1-72 primary tasks religious, customs and foundations of, 1-78–1-84 primary, 1-1–1-33 organizations, 2-86 host nation, 1-71–1-73 primary list, 1-6 IGO and, 1-70 proportion of, 1-1 resilience, understand, 4-32-4-36 military support to, 1-69 stability sectors, 1-2 resources, availability, 3-23, 3-81 planning, 1-74–1-76 support to, 1-98 organizational differences, principles of, 1-77 transition of, 2-16–2-38 3-23 security requirements, 1-102 transition phases, 2-20 responsibilities, understanding, sustainment of, 1-74 stability transition phases, phases 3-55–3-58 U.S. government partners, of the stability framework, 2-21 1-66–1-68 restore essential services, 1-18– stabilization, economic recovery unity of effort, 1-85 1-22 and, 2-76–2-82 whole-of-government subtasks, 1-22 planning, 4-23–4-24 approach, 1-66 risks, civilians, 1-49 stakeholders, interagency, 3-81 situation, assessment of, 3-52 funding and, 3-91 relationships with, 3-69 understand, 1-53–1-56 reducing, 1-59 strategic level, transition, 2-1 situational awareness, District roles, understanding, 3-55–3-58 Stability Framework, 4-8 strategy and defense policy, rule of law, adherence to, 1-13 security sector reform and, 1-76 social perspective taking, 3-34 civil control and, 1-12 success, measurement, 2-35– criminal justice system and, societal patterns, 4-35 2-38, 3-27, 4-1 3-108 Soldier and leader engagement, criteria, 3-100 definition of, 1-41 support, from Army, 1-129 establishment of, 3-109 information-related capabilities support to economic and planning, 1-98 and, 1-41 infrastructure development, rule of law activities, categories of, Soldiers, actions, 3-49, 3-54 1-28–1-33 3-106 behaviors, 3-65 phases of stability framework, execution of, 3-100 collaboration with, 3-79 1-29–1-31 rule of law programs, transfer considerations of, 1-43, 3-72 subtasks, 1-32 of, 3-104 development by, 3-59 support to governance, 1-23–1-27 rule of law reform, interactions with, 3-64 phases of stability framework, whole-of-government approach, protection of civilians and, 1-46 1-24–1-26 3-99–3-106 responsibilities, 3-28 subtasks, 1-27 stability, civil affairs in, 3-142– synchronization, challenges of, S 3-148 3-141 security, assessment, 1-105 humanitarian response, 3-155 systems, support from, 2-27 coordination, 3-3 related activities, 1-38–1-140 host nation concept, 1-80 unity of effort and, 3-4
3-07
104
Index Entries are by paragraph number. T stability tasks, 2-16–2-38 U understanding, 2-2 tactical level, transition, 2-1 U.S. Government partners, teams, establishments of, 3-7 transition into planning, responsibilities, 1-66–1-68 Interagency Conflict provincial reconstruction, 3-11 understand, conflict diagnosis Assessment Framework, 4-47– teamwork, organizational step 2, 4-32–4-36 4-49 differences, 3-24 unified action partners, stability, steps for, 4-48 territorial form, transitional military 3-140 transition phase 1, 2-24–2-26 authority, 2-57–2-60 transition, 2-19 transition phase 2, 2-27–2-32 threats, 1-51 units, influence of, 1-54 transition phase 3, 2-33–2-34 time, considerations, 3-26 unity of effort, establishment, 2-14 use of, 3-55 transition phases, planners, 2-17 security sector reform, 1-85 transitional military authority, stability and, 3-4 Title 10, programs, 3-95–3-96 2-39–2-97 support to, 4-5 Title 22, programs, 3-97 authority, 2-40–2-48 USAID, District Stability transfer plan, transition, 2-31 command responsibility and, Framework, 4-5 transformation phase, civil control, 2-40–2-48 principles, 3-115–3-119 1-15 considerations, 2-85–2-91 V civil security, 1-9 courts and claims, 2-92–2-97 essential services, 1-20 criteria, 2-49 vetting, transitional military support to economic and definition, 2-39 authority and, 2-91 infrastructure development, degree of control, 2-48 vulnerability, describe, 4-44–4-46 1-30 establishment of, 2-46–2-48 support to governance, 1-25 focus of, 2-76 W forms of, 2-53–2-60 transition, challenges, 2-38 weapons of mass destruction, guidelines for, 2-68–2-91 commanders support to, 2-22 1-116 operational form, 2-54–2-56 disarmament, demobilization, whole-of-government approach, organization, 2-49–2-67 and reintegration, 1-106 3-1–3-119 public health and, 2-83–2-84 integration and, 2-4–2-5 criminal justice system reform, religious considerations, 2-86 interim civil authority, 2-102 3-107–3-114 requirements of, 2-97 justice and, 2-10 interim civil authority, 2-105 roles of, 2-41 managing, 2-18 rule of law reform, 3-99–3-106 success of, 2-61 partners, 2-5 security sector reform, 1-66 territorial form, 2-57–2-60 patience, 2-14–2-15 windows of opportunity and phases, 2-17, 2-24–2-26, transparency, civil affairs, 3-146 vulnerability, assessment of, 2-27–2-32, 2-33–2-34 transition and, 2-12–2-13 4-45–4-46 planning for, 2-11 treatment, factors for, 2-73–2-74 principles, 2-6–2-15 security and, 1-90 stability levels, 2-1–2-15
3-07
105
FM 3-07 2 JUNE 2014 By order of the Secretary of the Army: RAYMOND T. ODIERNO General, United States Army Chief of Staff Official: GERALD B. O’KEEFE Administrative Assistant to the Secretary of the Army 1414201 DISTRIBUTION: Active Army, Army National Guard, and United States Army Reserve: Distributed in accordance with
3-24
1
FM 3-24 MCWP 3-33.5 INSURGENCIES AND COUNTERING INSURGENCIES MAY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
3-24
2
This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at
3-24
3
FM 3-24/MCWP 3-33.5, C1 Change No. 1 Headquarters Department of the Army Washington, DC, 2 June 2014 Insurgencies and Countering Insurgencies 1. Change 1 to FM 3-24/MCWP 3-33.5, 13 May 2014, amends text as necessary. 2. A plus sign (+) marks new material. 3. FM 3-24/MCWP 3-33.5, 13 May 2014, is changed as follows: Remove Old Pages Insert New Pages pages 1-13 through 1-14 pages 1-13 through 1-14 pages 2-3 through 2-4 pages 2-3 through 2-4 pages 4-1 through 4-2 pages 4-1 through 4-2 pages 4-5 through 4-6 pages 4-5 through 4-6 pages 4-11 through 4-12 pages 4-11 through 4-12 pages 7-5 through 7-10 pages 7-5 through 7-10 4. File this transmittal sheet in front of the publication for reference purposes.
3-24
4
FM 3-24/MCWP 3-33.5, C1 2 June 2014 By Order of the Secretary of the Army: RAYMOND T. ODIERNO General, United States Army Chief of Staff Official: GERALD B. O’KEEFE Administrative Assistant to the Secretary of the Army 1414902 BY DIRECTION OF THE COMMANDANT OF THE MARINE CORPS: DISTRIBUTION: Active Army, Army National Guard, and U.S. Army Reserve: To be distributed in accordance with the initial distribution number 121724, requirements for FM 3-24.
3-24
5
*FM 3-24/MCWP 3-33.5 Field Manual Headquarters Department of the Army No.3-24 Washington, DC Marine Corps Warfighting Publication Headquarters Marine Corps Combat Development Command No. 3-33.5 Department of the Navy Headquarters United States Marine Corps Washington, DC 13 May 2014 Insurgencies and Countering Insurgencies Contents Page PREFACE............................................................................................................... v INTRODUCTION .................................................................................................. vii PART ONE STRATEGIC AND OPERATIONAL CONTEXT Chapter 1 UNDERSTANDING THE STRATEGIC CONTEXT............................................ 1-1 United States’ Strategy and Policy to Counter an Insurgency ........................... 1-4 Land Forces and the Range of Military Operations ............................................ 1-6 Legitimacy and Control ....................................................................................... 1-8 Understanding Unified Action ........................................................................... 1-10 Strategic Principles ........................................................................................... 1-19 Chapter 2 UNDERSTANDING AN OPERATIONAL ENVIRONMENT ............................... 2-1 Demographic and Urbanization Trends .............................................................. 2-1 The Operational Variables .................................................................................. 2-2 The Mission Variables and Civil Considerations .............................................. 2-10 Chapter 3 CULTURE........................................................................................................... 3-1 Understanding Culture ........................................................................................ 3-1 Assessing a Cultural Situation ............................................................................ 3-2 Organizing to Understand Culture ...................................................................... 3-4 Distribution Restriction: Approved for public release; distribution is unlimited. *This publication supersedes FM 3-24/MCWP 3-33.5, dated 15 December 2006. Marine Corps PCN: 143 000124 00
3-24
6
Contents PART TWO INSURGENCIES Chapter 4 INSURGENCY PREREQUISITES AND FUNDAMENTALS .............................. 4-1 Intrastate War ...................................................................................................... 4-1 Insurgency Prerequisites .................................................................................... 4-3 Insurgency Fundamentals ................................................................................... 4-5 Other Analytical Frameworks ............................................................................ 4-22 Chapter 5 INSURGENCY THREAT CHARACTERISTICS ................................................. 5-1 Disposition and Activities .................................................................................... 5-1 Support Activities ................................................................................................ 5-3 Associated Threats ............................................................................................. 5-5 PART THREE COUNTERINSURGENCIES Chapter 6 MISSION COMMAND AND COMMAND AND CONTROL ................................ 6-1 Command in Counterinsurgency ........................................................................ 6-1 Headquarters Use In Counterinsurgency ........................................................... 6-4 Conventional Forces and Special Operations Forces Synchronization .............. 6-5 Chapter 7 PLANNING FOR COUNTERING INSURGENCIES ........................................... 7-1 Conceptual Planning ........................................................................................... 7-4 Transitions ......................................................................................................... 7-10 Operational Considerations .............................................................................. 7-12 Information Operations ..................................................................................... 7-18 Chapter 8 INTELLIGENCE .................................................................................................. 8-1 Intelligence Fundamentals .................................................................................. 8-2 All-Source Intelligence ........................................................................................ 8-3 Human Intelligence ............................................................................................. 8-4 Chapter 9 DIRECT APPROACHES TO COUNTER AN INSURGENCY ............................ 9-1 Shape-Clear-Hold-Build-Transition Framework .................................................. 9-1 Other Direct Enablers ....................................................................................... 9-11 Chapter 10 INDIRECT METHODS FOR COUNTERING INSURGENCIES........................ 10-1 Nation Assistance and Security Cooperation ................................................... 10-1 Generational Engagement ................................................................................ 10-2 Negotiation and Diplomacy ............................................................................... 10-4 Identify, Separate, Isolate, Influence, and Reintegrate ..................................... 10-6 Other Indirect Enablers ................................................................................... 10-10 Chapter 11 WORKING WITH HOST-NATION FORCES .................................................... 11-1 Assessing and Developing a Host-Nation Force .............................................. 11-2 Relationships ..................................................................................................... 11-6 Security Cooperation Planning ......................................................................... 11-8 Chapter 12 ASSESSMENTS ............................................................................................... 12-1 Assessment Frameworks .................................................................................. 12-1 Assessment Methods ........................................................................................ 12-2 Assessment Considerations ............................................................................. 12-2 Developing Measurement Criteria .................................................................... 12-3
3-24
7
Contents Chapter 13 LEGAL CONSIDERATIONS ............................................................................ 13-1 Authority to Assist A Foreign Government ....................................................... 13-1 Rules of Engagement ....................................................................................... 13-2 Law of War ....................................................................................................... 13-2 Non-International Armed Conflict ..................................................................... 13-7 Detention and Interrogation .............................................................................. 13-8 Enforcing Discipline of U.S. Forces ................................................................ 13-10 Training and Equipping Foreign Forces ......................................................... 13-11 Commander’s Emergency Response Program .............................................. 13-12 Claims and Solatia .......................................................................................... 13-13 Establishing the Rule of Law .......................................................................... 13-13 SOURCE NOTES .......................................................................... Source Notes-1 GLOSSARY .......................................................................................... Glossary-1 REFERENCES .................................................................................. References-1 INDEX .......................................................................................................... Index-1 Figures Figure 1-1. Country team command relationships ............................................................... 1-17 Figure 4-1. Conflict resolution model ................................................................................... 4-15 Figure 4-2. Organizational elements of an insurgency ......................................................... 4-16 Figure 4-3. Networked insurgencies ..................................................................................... 4-18 Figure 4-4. Examples of dyads ............................................................................................. 4-19 Figure 4-5. Examples of dyad networks ............................................................................... 4-21 Figure 4-6. Example of changes to tactics based on density shift ....................................... 4-22 Figure 7-1. Design concept .................................................................................................... 7-5 Figure 7-2. Sample of individual lines of effort ....................................................................... 7-9 Figure 9-1. The capability spectrum of counterinsurgency conflict ........................................ 9-5 Figure 9-2. Example of a possible transition framework ...................................................... 9-11 Figure 10-1. Generational engagement ............................................................................... 10-2 Figure 10-2. Negotiation and diplomacy ............................................................................... 10-5 Figure 11-1. Host-nation security force meter ...................................................................... 11-5 Figure 11-2. Counterinsurgency command relationships ..................................................... 11-6 Figure 11-3. Country planning .............................................................................................. 11-9 Figure 11-4. Phases of building a host-nation security force ............................................. 11-11 Figure 13-1. Provisions binding high contracting parties ..................................................... 13-8 Tables Table 1-1. Ends, ways, means, and risk in countering an insurgency ................................... 1-5 Table 2-1. Interrelated dimensions of the information environment ....................................... 2-8
3-24
8
Contents Table 11-1. Developing a host-nation security force ........................................................... 11-1 Table 11-2. Host-nation contributions ................................................................................ 11-13 Table 13-1. Extract of the Detainee Treatment Act of 2005 ................................................ 13-9
3-24
9
Preface Field Manual (FM) 3-24/ Marine Corps Warfighting Publication (MCWP) 3-33.5 provides doctrine for Army and Marine units that are countering an insurgency. It provides a doctrinal foundation for counterinsurgency. FM 3-24/MCWP 3-33.5 is a guide for units fighting or training for counterinsurgency operations. The principal audience for FM 3-24/MCWP 3-33.5 is battalion, brigade, and regimental commanders and their staffs. Commanders and staffs of Army and Marine Corps headquarters serving as joint task force or multinational headquarters should also refer to applicable joint or multinational doctrine concerning the range of military operations and joint or multinational forces. Trainers and educators throughout the Army and Marine Corps will also use this publication. Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable United States (U.S.), international, and, in some cases, host-nation laws and regulations. Commanders at all levels ensure their Soldiers operate in accordance with the law of war and the rules of engagement. (See FM 27-10.) FM 3-24/MCWP 3-33.5 implements standardization agreement (STANAG) 2611. FM 3-24/MCWP 3-33.5 uses joint terms where applicable. Selected joint, Army, and Marine Corps terms and definitions appear in both the glossary and the text. For terms and their definitions shown in the text, the term is italicized and the number of the proponent publication follows the definition. FM 3-24/MCWP 3-33.5 applies to the United States Marine Corps, the Active Army, Army National Guard/Army National Guard of the United States, and United States Army Reserve unless otherwise stated. The proponent of FM 3-24/MCWP 3-33.5 is the United States Army Combined Arms Center. The preparing agency is the Combined Arms Doctrine Directorate, United States Army Combined Arms Center. Send comments and recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank Forms) to Commander, U.S. Army Combined Arms Center and Fort Leavenworth, ATTN: ATZL-MCK-D (FM 3-24/MCWP 3-33.5), 300 McPherson Avenue, Fort Leavenworth, KS 66027-2337; by e-mail to [email protected]; or submit an electronic DA Form 2028.
3-24
10
Preface ACKNOWLEDGEMENTS “Al-Sahawa: An Awakening in Al Qaim.” Dr. William Knarr. The Combating Terrorism Exchange Journal. Copyright © 2013. Institute for Defense Analyses. Reproduced with permission of the Institute for Defense Analyses, Alexandria, Virginia. “If a Tactic Works in This Province, it Might Not Work in The Next: The Case of the Dan Aw Patan District, Afghanistan, 2010.” Combat Studies Institute. Unpublished article. 2013. Reproduced with permission of the Combat Studies Institute, Fort Leavenworth, Kansas. “Intelligence and the Shining Path.” Christopher Paul. Unpublished article. 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “Laos, 1959-1975.” Christopher Paul. Paths to Victory: Detailed Insurgency Case Studies. Copyright © 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “Philippines (Huk Rebellion) 1946-1956.” Molly Dunigan. Paths to Victory: Detailed Insurgency Case Studies. Copyright © 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “Regimental Command in Counterinsurgency.” Brigadier General W. Blake Crowe, United States Marine Corps. Counterinsurgency Leadership in Afghanistan, Iraq, and Beyond. 2011. Marine Corps University Press. Reproduced with permission of the Marine Corps University Press, Quantico, Virginia. “Security Cooperation in El Salvador.” Christopher Paul. Unpublished article. 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “South Vietnam, 1960-1975” Christopher Paul. Paths to Victory: Detailed Insurgency Case Studies. Copyright © 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “Sri Lanka, 1976-2009.” Colin P. Clarke. Paths to Victory: Detailed Insurgency Case Studies. Copyright © 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania.
3-24
11
Introduction The 2006 version of FM 3-24/ MCWP 3-33.5, Counterinsurgency, filled an important doctrinal gap at a time when U.S. forces were engaged in counterinsurgency operations. This version of FM 3-24/MCWP 3-33.5 builds on that important manual. This field manual provides doctrine that frames counterinsurgency within the context of the range of military operations and provides a framework for the different ways land forces could counter an insurgency. Understanding insurgencies and the operational environment in which they exist, the ways in which the U.S. will attempt to counter insurgencies, and how commanders synchronize their efforts to achieve end states is at the core of what this manual provides to both the Army and the Marine Corps. This version is organized differently than the 2006 version. The new title, Insurgencies and Countering Insurgencies, provides insight into the thinking behind the organization. Overall, FM 3-24/MCWP 3-33.5 is divided into three parts. Part one provides strategic and operational context, part two provides the doctrine for understanding insurgencies, and part three provides doctrine for defeating an insurgency. In short, FM 3-24/MCWP 3-33.5 is organized to provide the context of a problem, the problem, and possible solutions. Part one, the “Strategic and Operational Context,” provides a framework for understanding the environment where a counterinsurgency exists. Part one consists of chapters one through three. Part two, “Insurgencies,” provides a doctrinal framework for understanding an insurgency. Part two consists of chapters four and five. Part three, “Counterinsurgencies,” describes how to plan and execute operations to enable a host nation to defeat an insurgency. Chapter 1, “Understanding the Strategic Context,” answers the questions of how and why U.S. forces might get involved in a counterinsurgency. Chapter 1 highlights that there are many different ways U.S. forces could counter an insurgency and that there are a range of various contexts in which an insurgency can occur. Commanders and staffs must understand the conditions in which an insurgency occurs and the overall strategy for countering that insurgency so they can effectively support it. Chapter 2, “Understanding an Operational Environment,” provides context for an operational environment where an insurgency might be occurring. Chapter 3, “Culture,” describes the role of culture in counterinsurgency operations. Understanding culture is essential in any effort to support a counterinsurgency effort. Culture is of unique importance in understanding an operational environment. Chapter 4, “Insurgency Prerequisites and Fundamentals,” provides doctrine for understanding the prerequisites of an insurgency and the root causes that allow an insurgency to keep and gain legitimacy. It than provides a framework for understanding the strategic decisions an insurgency might make and eight dynamics for analyzing any particular insurgency. Chapter 5, “Insurgency Threat Characteristics,” provides doctrine for understanding the threat characteristics of an insurgency. Chapter 6, “Command and Control and Mission Command,” provides doctrine for executing command and control under the philosophy of mission command. In a counterinsurgency effort, many units may perform many different tasks in decentralized operations. Understanding decentralized operations and ensuring these units are meeting the overall commander’s intent is essential for successful counterinsurgency operations. Chapter 7, “Planning and Operational Considerations,” provides guidance on how commanders and staffs can work from conceptual planning to detailed planning in counterinsurgency operations. It also provides
3-24
12
Introduction important operational considerations, such as attack the network, that are essential in counterinsurgency operations. Chapter 8, “Intelligence,” provides considerations for intelligence in counterinsurgency. Because understanding the environment is essential in counterinsurgency, intelligence facilities successful operations. Chapter 9, “Direct Approaches to Counter an Insurgency,” provides guidance on how the Army and the Marine Corps directly counter an insurgency at the operational and tactical level. The operational philosophy behind the direct approach is shape-clear-hold-build-transition. If tactical units are directly interfacing with a society, they will perform shape-clear-hold-build-transition. In addition to guiding U.S. forces’ actions, shape-clear-hold-build-transition also provides a framework for understanding host-nation actions. If U.S. forces have to be the primary counterinsurgency force until the host nation can deploy its forces, shape-clear-hold-build-transition provides an effective operational approach. Chapter 10, “Indirect Methods for Countering Insurgencies,” provides a framework for working with and through a host nation. While the U.S. may provide the primary counterinsurgent forces, it may also work indirectly through the host nation. There are also important indirect enablers. Chapter 11, “Working with Host-Nation Forces,” provides a foundation for understanding how security cooperation efforts are integrated into a counterinsurgency effort. Whether U.S. forces are, for a time, the primary counterinsurgent forces or they are working indirectly through a host nation, enabling the host nation through security cooperation activities is essential. Chapter 12, “Assessments,” provides doctrine for understanding how a counterinsurgency environment changes and determining if counterinsurgent actions are having an effect on achieving the desired end state. Continued assessments are fundamental to understanding how an environment is evolving and reframing the basic problems commanders and staffs are facing. Chapter 13, “Legal Considerations” provides some legal considerations that are important for commanders and staffs to consider in all counterinsurgency operations. FM 3-24/MCWP 3-33.5 provides doctrine on how to understand a counterinsurgency environment, determine the counterinsurgency problem, and plan and execute operations in that environment. It provides guidance to commanders and staffs facing the unique challenges of countering an insurgency. This field manual is one manual in a larger doctrinal library that commanders and staffs need to understand in order to be effective in countering an insurgency. Any effort to counter an insurgency must be built on broad professional competence. The Army uses the term intelligence preparation of the battlefield while the Marine Corps uses the term intelligence preparation of the battlespace. Both Services use the same definition for these terms. This manual uses the term intelligence preparation of the battlefield/battlespace to align with FM 2-01.3/MCRP 2-3A.
3-24
13
PART ONE Strategic and Operational Context When the United States (U.S.) conducts or supports counterinsurgency operations, it does so in a unique strategic and operational environment. While this is true for all operations, this is of particular importance when the U.S. is countering an insurgency. Tactical actions often have strategic effects in a counterinsurgency. This makes it essential to understand both the strategic and operational context when countering an insurgency. In this manual, part one provides an overview for commanders and staff to understand the environment and context of an insurgency and the decision to counter that insurgency. Chapter 1 provides the strategic context of a counterinsurgency. When the U.S. becomes involved in a counterinsurgency, policy and strategic decisions affect operations. Chapter 2 provides an overview of an operational environment and operational variables. In a counterinsurgency, there are unique considerations that operators and planners consider. Of particular importance in a counterinsurgency is culture. Chapter 3 provides an in-depth overview of culture and its relationship to counterinsurgency. Chapter 1 Understanding the Strategic Context 1-1. Any decision by the President to commit United States (U.S.) forces must be understood within the larger sphere of U.S. policy. Soldiers and Marines must first understand the strategic context that the U.S. is acting in to best plan, prepare, conduct, and assess a counterinsurgency operation to protect national interests. Countering an insurgency should incorporate previous or continuing security cooperation efforts and other activities, U.S. and host-nation objectives, and U.S. and host-nation whole-of-government efforts to address the root causes of the conflict. (For more information on root causes, see paragraphs 4-14 through 4-22.) Despite its irregular nature and generally less intense level of combat, counterinsurgency may be just as critical to U.S. vital interests as conventional warfare. 1-2. Irregular warfare is a violent struggle among state and non-state actors for legitimacy and influence over the relevant population(s) (JP 1). Irregular warfare favors indirect approaches, though it may employ the full range of military and other capacities in order to erode an adversary’s power, influence, and will. Because of its irregular nature, U.S. involvement in a counterinsurgency demands a whole-of-government approach. Defeating an insurgency requires a blend of both civilian and military efforts that address both assisting the host-nation government in defeating the insurgents on the battlefield and enabling the host nation in addressing the root causes of the insurgency. Moreover, after large scale combat or in an ungoverned space, there may not be a functioning host-nation government. In those cases, U.S. forces must work with population groups in the area and enable them to build governmental capacity. In either case, U.S. civilian and military participants in counterinsurgency cannot compensate for lack of will, acceptance of corruption, or counterproductive behavior on the part of the supported government or the population. 1-3. Insurgency in the most basic form is a struggle for control and influence, generally from a position of relative weakness, outside existing state institutions. Insurgencies can exist apart from or before, during, or after a conventional conflict. Elements of a population often grow dissatisfied with the status quo. When a
3-24
14
Chapter 1 population or groups in a population are willing to fight to change the conditions to their favor, using both violent and nonviolent means to affect a change in the prevailing authority, they often initiate an insurgency. An insurgency is the organized use of subversion and violence to seize, nullify, or challenge political control of a region. Insurgency can also refer to the group itself (JP 3-24). Counterinsurgency is comprehensive civilian and military efforts designed to simultaneously defeat and contain insurgency and address its root causes (JP 3-24). Warfare remains a clash of interests and will between organized groups characterized by the use of force. In conventional warfare, there are clear determinants of victory. However, achieving victory for an insurgent may depend less on defeating an armed opponent and more on a group’s ability to garner support for its political interests (often ideologically based) and to generate enough violence to achieve political consequences. 1-4. Counterinsurgency is not a substitute for strategy. When counterinsurgents attempt to defeat an insurgency, they perform a range of diverse methods intended to counter an insurgency. Commanders must effectively arrange these diverse methods in time and space to accomplish strategic objectives. The U.S. can use a range of methods to aid a host nation or group in defeating an insurgency. The various combinations of these methods with different levels of resourcing provide the U.S. with a wide range of strategic options to defeat an insurgency. The strategy to counter an insurgency is determined by the ends the U.S. wishes to achieve, the ways it wishes to achieve those ends, and the resources or means it uses to enable those ways. (See paragraphs 1-10 through 1-13 for more information on strategy.) 1-5. There is a spectrum of involvement in countering an insurgency. The U.S. could enable a host nation by not providing forces that are directly involved in securing the population or attacking the insurgents. For example, the U.S. could provide training or intelligence support to a host nation. Moreover, even if the U.S. is directly involved in defeating the insurgency, its primary role can be only to enable a host nation. A host nation may be capable of providing civil control and security. The U.S. commander can integrate a force into the host-nation’s efforts that provides a force to perform direct action or fires provided by airpower or field artillery. U.S. involvement can range from a modest and supporting commitment to a major ground force commitment that may, for a time, take the role of primary counterinsurgent force while host-nation forces become better able to take on that role themselves. 1-6. Ideally, the host nation is the primary actor in defeating an insurgency. Even in an insurgency that occurs in a country with a nonfunctioning central government or after a major conflict, the host nation must eventually provide a solution that is culturally acceptable to its society and meets U.S. policy goals. The conclusion of any counterinsurgency effort is primarily dependent on the host nation and the people who reside in that nation. Ultimately, every society has to provide solutions to its own problems. As such, one of the Army and Marine Corps’ primary roles in counterinsurgency is to enable the host nation. 1-7. A counterinsurgency can occur as part of a major combat operation, but it often occurs without a major conflict. For example, an external threat may sponsor an insurgency, and this could be part of an effort to attain other strategic objectives. As such, the objectives of a counterinsurgency must be contextual to that insurgency. Creating objectives that are relevant to a particular insurgency is essential to defeating that insurgency. Effective counterinsurgency requires clearly defined and obtainable objectives that result in an end state acceptable to the host-nation government, the populace, and the governments providing forces. When the U.S. directly involves itself in a counterinsurgency, stability may be essential. Although all tasks executed to establish the conditions to reach a desired end state are significant, stability operations may be critical in a counterinsurgency. (The Army understands all operations are made up of offensive, defensive, and stability tasks. See ADRP 3-07 and FM 3-07 for more information on operations focused on stability.) 1-8. The military role should be coordinated with the other instruments of national power that include diplomatic, informational, and economic parts. The Army and Marine Corps are only part of the instruments of national power that the U.S. can use to counter an insurgency. At times, they may be used in a supporting role. For example, Soldiers and Marines may be withdrawn from active counterinsurgency efforts while the U.S. uses other instruments of national power as the primary enablers of a host nation. In such cases, the Army and Marine Corps may play a supporting role by performing security cooperation tasks. 1-9. The Laos insurgency highlights the unique nature of an insurgency. This insurgency took place in the context of Vietnam. Here, internal groups with various interests and outside groups from North Vietnam
3-24
15
Understanding the Strategic Context and the U.S. created a unique context for the Laos insurgency. Moreover, the corrupt and ineffective host government was not able to wage its own counterinsurgency campaign effectively. To effectively counter the insurgency in Laos, the U.S. needed an operational approach that would work in that environment, if a successful operational approach were possible. Unfortunately, U.S. forces failed to create an effective strategy to counter the insurgency in Laos. Thus, the U.S. government failed to find the needed ways and means to meet the policy goal. The Laos Insurgency Lamented as “the forgotten war,” the insurgency in Laos was heavily influenced (and often overshadowed) by the conflict in neighboring Vietnam. A victim of geography, half-hearted fighting between the different factions in Laos may well have worked itself out in a lasting compromise if not for pressure from North Vietnamese communists to control areas of Laos for the infiltration of men and materiel into South Vietnam (along the Ho Chi Min trail) and U.S. efforts to oppose communist presence and influence. Beginning in earnest in 1959, fighting pitted variously rightist Royal Lao forces supported by Hmong guerillas against the leftist Pathet Lao (indigenous communists) and their North Vietnamese supporters. These participants were at times joined by other players, including U.S. advisors, Filipino troops, U.S. air power, Thai commandos and artillery formations, as well as “neutralist” Lao forces. During the period of conflict, Laos was underdeveloped in every way, including its government, its economy, and its military. The government and military were corrupt and ineffective and the economy was wholly dependent on outside support. As the United States became more invested in Vietnam, it also increased support to Laos; by the end of 1955, the U.S. provided 100% of the Lao military budget. North Vietnamese backers of the Pathet Lao sought to grow that force, supporting a significant recruiting campaign and sending many of the recruits to North Vietnam for schooling and training. This led to greater investment by the U.S. in materiel and training for government forces, and included, beginning in 1957, efforts to arm Hmong guerillas, who would play an important role later in the conflict. Vietnamese interest in Laos was primarily in securing the so called “panhandle” region, through which the Ho Chi Min trail allowed the North Vietnamese to infiltrate men and materiel into South Vietnam. A secondary consideration was the support of a fellow communist movement (the Pathet Lao). Once fighting began in 1959, the Vietnamese used government chaos to their benefit, increasing attacks on government forces and expanding the territory under their influence or control. During this period, many attacks took the form of North Vietnamese Army regulars attacking and overwhelming a position, and then letting their Pathet Lao allies occupy the area and claim the victory, thus at least paying lip service to maintaining the neutralization of Laos. These North Vietnamese Army-led attacks and several attempted counterattacks by Royal Laotian Forces against Pathet Lao positions revealed the gross incompetence of the government’s regular forces. This lack of capability stemmed from several sources, including a half-hearted martial tradition in general, a preoccupation with profiteering and political games by the senior leadership, lack of efforts by the French who were responsible for their training until late 1958, and a fundamental lack of motivation. Despite the vigorous efforts of U.S. trainers and millions of dollars in materiel throughout the course of the conflict, Royal Lao Forces would never become a consequential fighting force. In this phase, the only effective forces on the government side were the Hmong tribesmen, trained and provisioned by the Central Intelligence Agency and fighting as guerillas. International pressure (from the United States as well as from China and Russia preferring to avoid unnecessarily provoking the United States) and support (from the United States and other allies) prevented the complete collapse of the government of Laos in 1962 and pushed for neutralization through a coalition
3-24
16
Chapter 1 government. The North Vietnamese were content to allow negotiations to take place, as they had succeeded in securing what they needed: the Ho Chi Min trail. After months of wrangling, 1962 finally saw another Geneva agreement, this time for a neutralized Laos with a coalition government representing the three major factions: the rightists, the leftists, and the neutralists. Part of the neutralization agreement included the removal of foreign forces from Laos. While U.S. and allied personnel who had been fighting on the side of the Royal Lao Government were withdrawn from the country, very few of the substantial number of North Vietnamese Army forces withdrew. Nor did the Central Intelligence Agency cease its work with the Hmong. The new coalition government proved shaky. Turmoil again rocked the Lao government with continued political maneuvering by greedy generals and a string of coups. Military region commanders ran their zones like private fiefdoms, rarely dispatching their troops outside the Mekong River valley. A series of spectacular failures by the Royal Lao forces all but ensured those forces would never seek to take the initiative and act in other than a strictly defensive capacity again. Between 1964 and 1968, the conflict was primarily between the U.S.-supported paramilitaries (backed by U.S. airpower), and the Pathet Lao. The cycle of dry season and wet season, each favoring one side or the other, saw very modest back and forth movement between the two primarily irregular forces, with little change from year to year. That all changed in 1969. The communist dry season offensive of 1968 did not end with the onset of the rainy season, and gains were substantial. In early 1970, the communists seized a provincial capital for the first time, and later that year they seized another. In the now traditional way, Hmong guerillas counterattacked. However, after nearly a decade of war, the Central Intelligence Agency’s secret army was nearly fought out. Fighting against superior numbers of regular troops, the Hmong became more and more reliant on U.S. airpower and on support from Thai artillery. Bombing in southern Laos expanded such that by 1971, it was more extensive than bombing in South Vietnam and Cambodia combined. The communist dry season offensive that started in December of 1971 brought extraordinary pressure on the government. For the first time, North Vietnamese Army forces used significant armor, as well as large tube artillery. The Hmong were battered and quickly thrown back. After another year of significant communist gains, the Lao government and its international supporters once again sought a ceasefire. By the time of the 1973 ceasefire and neutralization, the government of Laos controlled little more than the capital and the Mekong river valley, and that only by virtue of the Hmong and U.S. airpower. With the withdrawal of U.S. support (both airpower and funding) in 1973, the Hmong were demobilized and the Lao government was left to its fate, which was to fall relatively quickly to the communists. UNITED STATES’ STRATEGY AND POLICY TO COUNTER AN INSURGENCY 1-10. When and how the U.S. government provides assistance to other states to counter an insurgency is a question of policy and strategy. Commanders and staffs should understand that the U.S. can respond with a range of measures, many of which do not directly involve U.S. forces securing the population or performing offensive operations, in a counterinsurgency. This manual provides the reader with information on how counterinsurgents may organize tactical tasks in time and space to reach an end state. It cannot and should not be the only reference to conduct counterinsurgency operations for someone who wishes to fully understand the policy tools available to the U.S. to aid a host nation in fighting a counterinsurgency. (See JP 3-24, Allied Joint Publication 3.4.4, and the U.S. Government Guide to Counterinsurgency for more information on counterinsurgency policy tools.)
3-24
17
Understanding the Strategic Context 1-11. Effective counterinsurgency operations require an understanding of the military profession. The tasks counterinsurgents perform in countering an insurgency are not unique. It is the organization of these tasks in time and space that is unique. For example, geographic combatant commanders employ theater strategy to align and shape efforts, resources, and tasks to support strategic goals and prepare for conflict and contingencies in their region. In support of this goal, theater strategies normally emphasize security cooperation activities, building partner capacity and force posture, and preparing for contingencies and other tasks those are not unique to counterinsurgency operations. For example, a unit can perform security cooperation tasks in support or not in support of countering an insurgency. (See FM 3-22 for more information on security cooperation tasks.) Those units that carry out security cooperation tasks to support a counterinsurgency should understand security cooperation and the tasks they are performing and teaching. Moreover, they should understand how these tasks are used in defeating an insurgency. Soldiers and Marines must start from a foundation of professional knowledge and competence to have a framework for understanding and aiding a host nation in defeating an insurgency. Whether a unit is directly performing the tasks to defeat an insurgency or indirectly supporting a host nation, this manual provides a doctrinal framework for counterinsurgency operations. However, to be effective, Soldiers and Marines must be professionally competent. This is the foundation in understanding another nation’s or group’s actions to defeat an insurgency and in providing aid to that nation or group. (See ADRP 1 for more information on professional competence.) 1-12. Political leaders and commanders must have a dialogue to decide the optimal strategy to meet the security needs of the U.S and states or groups the U.S. supports. Different capabilities provide different choices that offer different costs and risks. U.S. strategy is defined by how it combines these capabilities (the ways), resources them (the means), and its willingness to accept risk in attaining its policy goals. Commanders inform political leaders about the prospects for victory and the different costs and risks of various options, and political leaders weigh these costs and risks against their importance to U.S. national interests. Once U.S. policymakers have determined the goals (the ends) of the U.S., the military evaluates operational approaches to conduct counterinsurgency efforts depending on the ends, ways, means, and acceptable risk. The joint force provides a range of capabilities that it integrates into the overall strategy. For example, in a functioning state that is facing an insurgency, the joint force may employ a range of security cooperation tools. Moreover, other tools fall outside of security cooperation, such as direct action and counter threat financing, that the U.S. can integrate into the mix of ways that it will use to defeat or contain an insurgency. The U.S. government integrates the various instruments of national power to create a range of strategic options, of which military involvement is only one part. (For a further discussion on strategy, see MCDP 1-1.) (See table 1-1.) Table 1-1. Ends, ways, means, and risk in countering an insurgency Ends Ways Means Risk Defeat or contain an Direct methods Unified action Determined by a insurgency. (See chapter 9.) • Military force. mismatch in the • Other ends, ways, and Support strategic goals Indirect methods governmental means. capabilities and end state defined by (See chapter 10.) policy makers. 1-13. An operational approach is a description of the broad actions the force must take to transform current conditions into those desired at end state (JP 3-0). The commander may use direct or indirect approaches to counter threats. Commanders may find their operational approach is mainly direct, indirect, or a mixture of both. The approach is the manner in which a commander contends with a center of gravity. A direct approach attacks the enemy’s center of gravity or principal strength by applying combat power directly against it. An indirect approach attacks the enemy’s center of gravity by applying combat power against a series of decisive points that lead to the defeat of the center of gravity while avoiding the enemy strength. Commanders may use a single direct or indirect approach or, more likely, may employ a combination of approaches to counter an insurgency and its influence. Additionally, the emphasis on or combination of approaches may have to evolve as the security situation and insurgent networks evolve. The commander’s intent and the approach(es) the commander selects will drive the methods used by counterinsurgents. These methods may be direct or indirect. Approaches and methods must be nested and
3-24
18
Chapter 1 clearly linked, since they often involve support from diplomatic, economic, and informational efforts by non-military forces. (See chapter 9 for more information on direct methods and chapter 10 for more information on indirect methods. See JP 5-0 for more information on direct and indirect approaches.) LAND FORCES AND THE RANGE OF MILITARY OPERATIONS 1-14. The U.S. Army and Marine Corps can prevent or defeat an insurgency across the range of military operations. This is true if an insurgency starts in the context of a major combat operation or if it starts during peace. Across the range of military operations and in accordance with U.S. strategy, U.S. land forces take actions and set priorities to shape an environment to reduce the possibility of insurgencies. In some instances an operational environment and its related variables are unstable or fragile and hostile actions against a host-nation government begin. In this environment, the U.S. may make a decision to use some type of military capability. Commanders must understand the effects that the actions and priorities of the U.S. force have on an operational environment. When acting in this environment, commanders must have situational understanding of the environment and the effects of U.S. actions in that environment. This influences how the commander attempts to shape the environment. An insurgency can also occur in the context of another conflict. For example, during major combat operations, land forces must take actions to prevent insurgencies from occurring during operations and once the opposing conventional force is defeated. While an insurgency is only a possibility in a major combat operation, it could occur during major operations or afterwards. Commanders and staffs must assess the possibility of an insurgency in any operational environment and take actions to prevent one from occurring. These actions can include a range of stability operations and security cooperation activities. (See ADRP 3-07 for more information on stability operations and FM 3-22 for more information on security cooperation.) 1-15. The circumstances of U.S. involvement in a counterinsurgency are important in understanding the operational and tactical actions of U.S. forces. The type and scale of involvement, whether the Army and Marine Corps are involved temporarily as the primary counterinsurgent forces or are providing modest indirect and direct support to a counterinsurgency effort, will be determined by the circumstances of U.S. involvement. U.S. forces participate at the direction of the President, based on national security interests. One example circumstance is the collapse of a fragile state in a geographically strategic area. Even if U.S. land forces are not in place when the government collapses, the President may deploy land forces to counter an insurgency and restore stability. The use of indirect capabilities in a failed state is complex because the commander often has to work with groups outside of the legitimately constituted government. Building capacity and enabling existing capabilities is difficult when a state lacks functional institutions. Because these areas lack state institutions to provide various governmental functions to include security forces, large scale direct involvement is often resource intensive. The U.S. can use smaller direct capabilities to support groups outside the legitimately constituted government, but this also adds to uncertainty and strategic risk. 1-16. U.S. forces can participate at the request of a government that seeks to counter an insurgency in its country with assistance from the U.S. When a requesting government is capable and functioning, the U.S. can offer a wide range of capabilities. Having a capable government changes the relationship between ends, ways, and means. A capable government could require fewer resources to intervene, or it could only require indirect and direct enablers in order to be successful. However, as with any involvement to counter an insurgency, often unforeseen risks could lead to greater U.S. involvement. 1-17. U.S. involvement can also occur in a country where there are ongoing security cooperation activities. If the U.S. is performing security cooperation activities in a country and an insurgency develops, continued security cooperation efforts could result in U.S. involvement in a host nation’s counterinsurgency efforts. Efforts to train and equip host-nation forces will likely be seen as U.S. involvement by both the insurgents and the international community. Moreover, U.S. forces could also transition to direct involvement in an insurgency. Whatever the degree of involvement, a clear policy decision should be made to include the development of a national strategy. 1-18. Insurgencies could also be part of large scale combat or fueled by a regional or global adversary. In a protracted large scale operation, an insurgency often develops in controlled areas with populations sympathetic to the enemy. As such, planning for prevention of an insurgency and integrating stability operations into a prolonged operation is essential. If an insurgency develops, it will require resources to
3-24
19
Understanding the Strategic Context defeat the insurgents. This will reduce the resources available to defeat the enemy in large-scale combat. In addition, an adversary can fuel an insurgency in a host nation to undermine U.S. interests. In this case, the insurgency is part of an adversary’s overall strategy and policy. (See FM 3-05, chapter 2, for more information on unconventional warfare. It provides a U.S. perspective on enabling an insurgency.) 1-19. An insurgency can also occur at the conclusion of a large scale combat operation when an organized movement seeks to challenge the authority of the U.S. and its partners. The organized movement may be remnants of the defeated force or an opportunistic movement that seeks to obtain power using a political-military challenge to the existing authority. In either case, U.S. land forces, along with other unified action partners, must be prepared at all stages of conventional warfare to assess the capability of an insurgency occurring either during the conflict or after hostilities cease. Soldiers and Marines must also recognize that the presence of U.S. forces in the region can lead to the conditions for an insurgency. U.S. land forces can help to prevent an insurgency from occurring in the manner in which they conduct conventional warfare and in the conduct of post-conflict operations. Should prevention fail, U.S. forces will be exponentially more successful in countering an insurgency if they shape the environment during and immediately following conventional warfare for an effective transition to counterinsurgency. 1-20. In the military operations, U.S. forces can prevent an insurgency from occurring in large scale combat operations by integrating stability operations. If an insurgency does begin, U.S. forces can shape its formation and make it easier to defeat. U.S. land forces can also prevent an insurgency from occurring in peacetime through security cooperation activities and other capabilities that support the host nation or other groups. If there is an insurgency, the U.S. can integrate a number of capabilities into an overall operational approach to defeat that insurgency. 1-21. From the U.S. land forces’ perspective, insurgencies range along a spectrum depending on the scale of effort and resources the Army and Marine Corps must take to counter them. In a worst-case scenario, an extremely capable insurgency that has a significant impact on the population exists in a failed state region in which there is little or no host-nation government capability. The U.S. may have to commit significant combat power to offset the momentum of the insurgency. While the U.S. can avoid using land forces in direct combat, the use of other capabilities will often support groups that are not the recognized government. In such cases, the U.S. would be enabling one group to gain control over the state. For example, the U.S. could equip groups within a state and empower them to take control over an area. While the initial cost may be lower, this course of action is fraught with possible unintended consequences. The group that counterinsurgents enable, which is essentially another insurgency, may act in ways that are counter to U.S. interests once it gains control of the area. On the other hand, direct involvement could be extremely costly and provoke a wider conflict. If the U.S. operates in a failed state to defeat an insurgency, it must create a policy and strategy that matches its goals and the resources that it is willing to spend. Moreover, it must be willing to accept a large degree of uncertainty and strategic risk. 1-22. The best-case scenario is when the host nation has the capability to defeat an insurgency and the U.S. plays only a supporting role in enabling the insurgencies’ defeat with equipment, training, or intelligence. A middle case occurs when a functional state has an insurgency in a remote area where the host-nation government cannot exert complete control. The existing insurgency is not a challenge to the continued authority of the host-nation government, but it may seek to gain control of a specific region or area. This type of scenario can require much fewer resources for U.S. land forces to counter the insurgency than the worst-case scenario. Since the capacity of the host-nation security forces exists to contain the insurgency to a specific region or area, the U.S. can integrate a number of capabilities into the host government’s efforts to increase the effectiveness and capabilities of the host nation. While every insurgency is unique, this basic framework offers the U.S. the opportunity to achieve policy goals while spending fewer resources and offering less uncertainty and risk. However, as with any conflict, unintended consequences can change the insurgency and increase the cost and uncertainty of U.S. involvement. 1-23. In all cases, specific national policies govern U.S. land forces’ actions to counter an insurgency. An insurgency’s goals and actions are influenced by the conditions the insurgency develops in. An insurgency’s objectives are not exclusive to the condition of the state, but each can occur anywhere along the range of state conditions. However, the operational environment an insurgency develops in will affect how it understands its goals and will affect its actions (See chapter 2 for more information on an
3-24
20
Chapter 1 operational environment and section II for more information on understanding the actions of an insurgency). 1-24. There may be multiple insurgencies in an operational environment. A networked insurgency may have conflicting goals within its organization and its actions are not controlled by a command structure. These insurgencies can have links to other insurgencies or criminal organizations. Networked insurgencies might divide or combine with groups. In such cases it is difficult to analyze an insurgency or insurgencies if they are treated as monolithic actors. Instead, counterinsurgents must understand the dynamics within the insurgency or multiple insurgencies. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) 1-25. Victory in a counterinsurgency may not be as clear as winning in a conventional conflict. U.S. national ends determine the criteria for success, regardless of how the U.S. land force is deployed to conduct counterinsurgency operations. As it applies to U.S. national objectives, success in an insurgency often depends on developing host-nation capacity to contain, reduce, and defeat the insurgency without requiring direct U.S. involvement. In a counterinsurgency, the host nation often determines the criteria for success. U.S. counterinsurgents should avoid judging host-nation criteria based on their own cultural expectations. Achieving success may depend less on defeating the armed element of the insurgency and more on the ability to legitimize host-nation institutions to the populace. Short and mid-term success in counterinsurgency may be developing a host-nation government that has sufficient capability to secure itself and address an insurgency on its own. This success allows the U.S. to continue to support the host nation through a long-term relationship that addresses that nation’s legitimacy. Success includes enabling the development of resiliency within the host-nation population and host-nation institutions to sustain the ability to counter the insurgency in the future and prevent the conditions in the area from allowing an insurgency to gain strength. Achieving the conditions for success may require a mix of application of force, information operations, cultural acceptance, and building capacity and competency within host-nation institutions. Counterinsurgents may either persuade the people to support the government or dissuade them from supporting the insurgents. What capabilities the U.S. uses to counter an insurgency is dependent on the context of that insurgency and U.S. national interests. 1-26. U.S. forces should expect that the host-nation government will have its own interests that may not coincide with U.S. national interests. It may not be willing to undertake the political changes necessary to address the root causes of the insurgency. The commitment of U.S. forces may depend upon the degree to which U.S. policy makers consider the affected government to be receptive to assistance, advice, and reform. How Soldiers and Marines are employed will also require a clear determination by national decisionmakers as to what post-conflict commitments by military and civilian organizations will be required. Outside counterinsurgents, however, can never fully compensate for lack of will, incapacity, or counterproductive behavior on the part of the supported government. If a government is unambiguously committed to the defeat of insurgency, it is more likely to defeat it, regardless of the actions (or commitment level) of an outside supporter. LEGITIMACY AND CONTROL 1-27. Legitimacy, the acceptance of an authority by a society, and control are the central issues in insurgencies and counterinsurgencies. This is true however the U.S. enables a host nation to defeat an insurgency. The population of a particular society determines who has legitimacy to establish the rules and the government for that society. A population’s values and cultural norms will determine who that society perceives as a legitimate authority. Both the insurgency and the host nation attempt to control the population by some mixture of consent and coercion. Insurgents use all available tools, including political (diplomatic), informational (including appeals to religious, ethnic, historical, national, class, political, tribal or ideological beliefs), and social, military, and economic tools to overthrow or undermine an existing authority. Likewise, the host nation will use all available tools to maintain acceptance of its authority. This authority may be an established government or an interim governing body. It may be a generally accepted social order. Control of a population, however, may not be the end state desired by an insurgent. A criminal enterprise might seek to undermine existing political power in order to enable it to continue its criminal activities or insurgents could seek political power in order to impose an ideological (or religious) system on an unwilling population. In counterinsurgencies, if the affected government wants to end the insurgency, it
3-24
21
Understanding the Strategic Context should use all instruments of its national power to prove its legitimacy, to defeat the insurgency, and to reduce the likelihood of another crisis emerging. 1-28. Legitimacy is essential to understanding the political variable in an insurgency. Who a population accepts as legitimate is dependent on the norms and values within that particular population. Legitimacy can change as a society evolves and groups or individuals change their conceptualization of who they are and what authority they accept. Sometimes large changes, such as the American War of Independence or the unification of Germany in 1871, create a change in group identity and accepted authority. Sometimes group identity changes by slow evolution, as is the case with the European Union. However, at the core, who a group accepts as providing legitimate authority to govern their actions is that group’s legitimate authority. (See paragraphs 2-16 through 2-19 for information on the political variable.) 1-29. Legitimacy provides willing acceptance of authority and thus requires fewer resources to enforce its authority than illegitimacy. Most populations are controlled through a combination of consent and coercion. The host-nation government generally needs some level of legitimacy among the population in order to retain power. This provides some level of consent. Legitimacy is an indicator of the extent to which systems of authority, decisions, and conduct are accepted by the local population. Political legitimacy of a government determines the degree to which the population will voluntarily or passively comply with the decisions and rules issued by a governing authority. Legitimacy determines the transaction costs of political and governmental power. Low legitimacy may breed contempt on the part of the population and may require extensive prodding and incentives by the government to secure compliance of the population; high legitimacy generally invites compliance by the population and therefore requires less effort by the government to ensure compliance. An illegitimate government’s only method of controlling its population is coercion, which can be resource intensive. A legitimate government has to use coercion for policing power, but its population, in general, sees the rules and directions of its government as intrinsically correct. A population will follow a legitimate government’s rules and norms passively, and those who break those rules or norms are disapproved of by the society. Who the population sees as a legitimate authority is a central issue of a counterinsurgency. 1-30. All population groups are controlled by some combination of consent and coercion. Some governments may use a range of coercive methods to control the population. Coercive methods can damage legitimacy if the methods cannot be justified under the values and norms of the population. However, counterinsurgents should not think of coercion and consent as counter forces to one another. If coercive acts by the government or insurgency are justifiable under the norms and values of the population, those acts do not necessarily undermine the legitimacy of the government or host nation. Acts by both the government and the insurgency must be viewed from the perspective of the population experiencing those acts and not from an outside perspective that will bring its own bias to viewing actions of the host government or insurgency. 1-31. The struggle for legitimacy with the population is typically a central issue of an insurgency. The insurgency will attack the legitimacy of the host-nation government while attempting to develop its own credibility with the population. The host-nation government should reduce the credibility of the insurgency while strengthening its own legitimacy. A government that is seen as legitimate magnifies the resources and capabilities needed to defeat an insurgency and allows the host nation to concentrate finite resources on targeting the insurgency. However, legitimacy is a condition perceived by the population. Who the population sees as legitimate will be determined by that population’s norms and values. For example, if a population does not see outside forces as legitimate, this can undermine the legitimacy of the host-nation government trying to counter an insurgency. 1-32. The legitimacy of the host-nation government is achieved because the population accepts its authority and how it governs can be justified in terms of the population’s beliefs. It is not enough for the host-nation government to be simply seen as effective and credible. The governmental structure must be justifiable to the population and that justification must be based on the population’s norms and values. In some situations, providing effective governance may be essential to establish legitimacy among the population. However, this is not a uniform rule. The key is that legitimacy is ultimately decided in the minds of the population. Counterinsurgents must understand how the population will perceive a government. A host nation that is less efficient but perceived as legitimate by the population will be more
3-24
22
Chapter 1 effective than an efficient host-nation government that cannot be justified by the values and norms of the population. 1-33. Even if a population does not see an insurgency or a government as legitimate, control can be established effectively by coercion. Many states and insurgencies have used domestic intelligence apparatus or other means to control every aspect of their populations. Illegitimate governments often use distrust and divisions within a population to effectively control a society. Moreover, a population is not monolithic. It is made up of many groups and subgroups. In many autocratic regimes, various groups within a population have a vested interest in continuing the current government, even if it is repressive. Likewise, an insurgency might receive support from elements within the population, even if it is repressive and uses coercive methods. Legitimacy must be seen from the different perspectives of the different groups within a society. UNDERSTANDING UNIFIED ACTION 1-34. Once the U.S. decides to become involved in a counterinsurgency, all instruments of national power provide the U.S. important capabilities to defeat an insurgency. Unified action is essential for all types of involvement in any counterinsurgency. Unified action is the synchronization, coordination, and/or integration of the activities of governmental and nongovernmental entities with military operations to achieve unity of effort (JP 1). Paragraphs 1-34 through 1-76 provide commanders and staffs with an understanding of how civilian agencies and military departments and forces synchronize and integrate their operations to achieve unity of effort. Paragraphs 1-41 through 1-48 explain both a whole-of-government and a comprehensive approach to defeat insurgencies and achieve U.S. and host-nation objectives. Paragraphs 1-59 through 1-76 also explain the roles of intergovernmental, nongovernmental, multinational forces, private sector organizations, and host-nation government and host-nation forces in counterinsurgency. 1-35. Unified action must be integrated into the overall host-nation efforts. The focus of U.S. efforts is to support the host nation’s internal defense and development. Internal defense and development is the full range of measures taken by a nation to promote its growth and protect itself from subversion, lawlessness, insurgency, terrorism, and other threats to its security (JP 3-22). Internal defense and development focuses on building viable institutions that respond to the needs of society. Security cooperation activities must work with and support a nation’s own internal defense and development programs. Within the context of counterinsurgency, commanders and staffs must understand and support a host nation’s internal defense and development strategy. In the long run, the host nation, and not the U.S., will either defeat or be defeated by the insurgency. Supporting a host nation’s internal defense and development plan is one of the more effective ways in which the U.S. enables a host nation to defeat an insurgency. (See JP 3-22 for more information on internal defense and development.) ETHICAL APPLICATION OF LANDPOWER IN UNIFIED ACTION 1-36. Army and Marine Corps leaders should clearly understand how adherence to a professional ethic provides the moral basis for unified action and how it becomes a force multiplier in all operations. The actions of Army and Marine Corps professionals are framed by the disciplined, ethical application of force. This is the foundation for unified action. Effective, ethical leaders must communicate to their Soldiers and Marines that American values affect every aspect of how U.S. forces fight and win a counterinsurgency. This instills in them the concept of honorable service and builds esprit de corps, two essential characteristics of the military profession, while enhancing resilience and preventing or reducing moral injuries to Soldiers and Marines. Unified action requires the judicious use of lethal force balanced with restraint and tempered by professional judgment. Combat in counterinsurgency often obligates leaders, Soldiers, and Marines to apply force in a precise manner to accomplish the mission without causing unnecessary loss of life or suffering. To maintain U.S. legitimacy, to ensure international credibility, and to safeguard the U.S., Soldiers and Marines cannot afford to misuse the lethal power provided to them by the U.S. government. 1-37. Soldiers and Marines are not permitted to use force disproportionately or indiscriminately. Typically, more force reduces tactical risk in the short term. But in counterinsurgency, the more force that is used, the less effective it can be. It is more likely that counterinsurgents will achieve an end state by protecting a
3-24
23
Understanding the Strategic Context population, not the counterinsurgency force. When military forces remain in secure compounds, they lose touch with the situation, appear to be indifferent to the population, simplify enemy intelligence operations, or appear afraid to engage the insurgents. In effect, they concede the initiative to the insurgents. To be successful, counterinsurgency forces must work with and share risks with the host-nation forces and the population. Soldiers and Marines must accept some risk to minimize harm to noncombatants. Accepting prudent risk is an essential part of the warrior ethos and an obligation of honorable service. 1-38. Leaders must accept ambiguity and risk, which are inherent to decentralized operations. The presence of a local population within which insurgents may disappear creates a high degree of ambiguity. Operationally adaptable leaders observe the rapidly changing situation, identify its key characteristics, determine what has to be done in consultation with subordinates and host-nation forces, and determine the best method to accomplish the mission. They must assess and accept prudent risk, and they must adjust rapidly as conditions change. They must be able to shift operational tasks from capacity building to combat and back again in days, or even hours. Alert junior leaders recognize the dynamic context of a tactical situation and can use their professional judgment to apply informed lethal and non-lethal force to achieve the commander’s intent. Any use of force generates a series of reactions. The general rule for the use of force for the counterinsurgents is “do not create more enemies than you eliminate with your action.” The more force is applied, the greater the chance of collateral damage and mistakes. There will be times when an overwhelming effort is necessary to destroy or intimidate an opponent and reassure the populace. However, counterinsurgency forces should calculate carefully the type and amount of force to be applied and who wields it for any operation. Using force precisely and discriminately strengthens the rule of law that needs to be established in the host nation. Normally, counterinsurgency forces can use escalation of force procedures to minimize unnecessary loss of life or suffering. These procedures are especially appropriate during an operation in which the counterinsurgent security force interacts with the local population. All interactions between security forces and the population directly impact legitimacy. (See chapter 13 for legal information on the use of force). 1-39. Who wields force is also important. If the police have a reasonable reputation for competence and impartiality, it may be better for them to execute urban raids than military forces because the population is more likely to view their application of force as legitimate. This is true even if the police are not as well armed or as capable as military forces. Local circumstances, however, affect this decision. For example, if the police are seen as part of an ethnic or sectarian group oppressing the general population, their use may be counterproductive. (See chapter 10 regarding the development of host-nation security forces and chapter 12 regarding assessing counterinsurgency operations. For further discussions on use of force, see chapter 13.) 1-40. The environments where counterinsurgency operations exist can be much more ethically complex than those associated with conventional conflicts. Many leadership and ethical imperatives are prominent and, in some cases, unique to counterinsurgency. The dynamic and ambiguous environment of modern counterinsurgency places a premium on leadership at every level, from sergeant to general. Application of decentralized authority and decisionmaking is more prevalent in counterinsurgency than other types of military operations. Combat in a counterinsurgency is frequently a small-unit leader’s fight; however, senior leaders set the conditions and the tone for all actions by subordinates. Today’s Soldiers and Marines must rapidly adapt cognitively and emotionally to the perplexing challenges of counterinsurgency and master new competencies in dynamic contexts. Those in leadership positions must provide the moral compass for their subordinates as they navigate this complex environment. Underscoring these imperatives is the fact that exercising leadership in the midst of ambiguity requires intense, discretionary professional judgment. Army and Marine Corps leaders are expected to demonstrate their competence, character, and commitment to their professional ethic. All leaders must continually reconcile mission effectiveness, ethical standards, and thoughtful stewardship of the nation’s precious resources—human and material—in the pursuit of national aims. Leaders must link tactical actions to strategic objectives and to the host nation’s essential political goals. U.S. forces must use the combat multiplier of seeking and maintaining the moral high ground in a counterinsurgency. Doing so guarantees maintaining trust with the American people and upholds the ideals of the profession of arms.
3-24
24
Chapter 1 A WHOLE-OF-GOVERNMENT EFFORT 1-41. Accomplishing U.S. policy objectives in any conflict requires government expertise and resources outside of the Department of Defense (DOD). Policy objectives, especially during a conflict, require a whole-of-government effort. A whole-of-government approach integrates the collaborative efforts of the departments and agencies of the U.S. government to achieve unity of effort toward a shared goal. A whole-of-government effort is vital to achieving the balance of resources, capabilities, and activities that reinforce progress made by one of the instruments of national power while enabling success among the others. It relies on coordination among the agencies of the U.S. government, including DOD, to ensure that the full range of available capabilities are used, synchronized, and applied to a given policy objective. Government agencies usually agree upon relationships and authorities in a memorandum of agreement or understanding. Military commanders exercise only the authority outlined in these agreements and are often directed by another agency. The terms in these documents may form the basis for establishing some form of relationship between commanders and agency chiefs. When unity of command is not possible, commanders strive to achieve unity of effort. Often, the interpersonal relationships that commanders establish with their interagency partners are essential. 1-42. A whole-of-government effort incorporates all of the capabilities of the U.S. government to achieve U.S. national objectives. In many counterinsurgencies, for example, political objectives include assisting the host nation with managing the nonmilitary aspects of the insurgency. Therefore, these political objectives include eliminating the root causes of the insurgency. However, counterinsurgency commanders and planners must understand that, in the end, societies must address their own root causes of insurgency. Imposing major reforms may result in unintended consequences. Enabling a host nation to address the insurgency’s root causes increases its chances of defeating it. In dealing with the sorts of complex socio-cultural problems that counterinsurgents frequently face, “host-nation good enough” is normally better than what the U.S. would consider perfect, if it meets U.S. objectives. 1-43. A primary challenge for integrating civilian and military efforts into a whole-of-government effort is the differing capabilities, capacities, cultures, objectives, and approaches in civilian agencies compared to those of military forces. A successful whole-of-government effort requires that all actors— * Are represented, integrated, and actively involved in the process. * Share an understanding of the situation and problem to be resolved. * Strive for unity of effort toward achieving a common goal. * Integrate and synchronize capabilities and activities. * Collectively determine the resources, capabilities, and activities necessary to achieve their goal. 1-44. The importance of the commander’s personal involvement in building interorganizational trust, understanding, mutual respect, and friendships cannot be overstated. If organizational leaders do not set the appropriate tone and establish the necessary climate, the best whole-of-government plan will fail. 1-45. A clear understanding of the desired end state and national objectives should infuse all efforts, regardless of the agencies or individuals charged with their execution. Given the primacy of political considerations, military forces often support civilian efforts. However, the nature of counterinsurgency operations means that lead responsibility often shifts among military, civilian, and host-nation authorities. In other words, as the U.S. shifts its policy and strategy, different agencies take on different roles during an operation. Different or changing relationships with the host nation may also drive shifts in lead responsibility between different authorities. Military leaders prepare to assume local leadership for counterinsurgency efforts if civilian leadership is unavailable or cannot access the area. 1-46. U.S. land forces conducting counterinsurgency operations must recognize the legal authority of the Department of State, their chief country team, and the chief of mission. The chief of mission, who is normally the ambassador, is the principal officer in charge of a diplomatic facility of the U.S. The country team is the senior, in-country, U.S. coordinating and supervising body. Commanders ensure that they gain an understanding of the purposes, goals, and restrictions under which their interagency partners are operating. Without such an understanding, the military and nonmilitary efforts may frustrate and interfere with one another because the military and civilian organizations are functioning under separate statutory obligations that may lead to conflicting guidance and direction.
3-24
25
Understanding the Strategic Context COMPREHENSIVE EFFORT 1-47. A comprehensive effort, at a minimum, incorporates all the capabilities of U.S and host-nation governments, and may include intergovernmental and regional organizations, and nongovernmental organizations (NGOs) to address the root causes of the insurgency, in conjunction with military operations aimed at the insurgents themselves. This is difficult because many organizations will be operating in the same area, some conducting combat operations and others using non-lethal methods such as education programs and humanitarian assistance. Each organization will have different perspectives or interests. Foreign area officers may be essential in ensuring these various organization work in a comprehensive effort. Some organizations that may be part of a comprehensive effort are— * Other governments’ agencies. * Multinational forces. * Multinational corporations and contractors. * Intergovernmental organizations, such as the United Nations. * NGOs. * Private sector corporations. * Other organizations that wield diplomatic, informational, and economic power. 1-48. These various organizations may work with, in parallel to, separately from, or counter to U.S. government and civilian agencies supporting counterinsurgency efforts. Those organizations whose goals align at least partially with U.S. government goals frequently have capabilities that, if properly synchronized and coordinated, can be critical to achieving success in counterinsurgency operations. Aligning U.S. military, NGO, and intergovernmental organization capabilities requires collaboration and cooperation focused toward a common goal. This can be more difficult than working with other U.S. government agencies. Where military operations typically demand unity of command, the challenge for military and civilian leaders is to forge unity of effort among the diverse array of actors involved in a counterinsurgency. Often, the legal, cultural, and operational requirements prevent direct collaboration between U.S. land forces and non-U.S. civilian organizations. U.S. forces may encounter NGOs not aligned with any insurgent faction who are providing humanitarian assistance. These organizations can be neutral or hostile to U.S. policy goals. Commanders should handle such groups carefully and professionally. Commanders work to understand the objectives and priorities of each organization. Unity of effort between U.S. forces and host-nation forces is particularly critical. Understanding these organizations is essential to understanding the operational environment and shaping effects on organizations that are hostile or neutral to U.S. policy goals. (See JP 3-08 for more information on NGOs.) UNITY OF COMMAND AND EFFORT 1-49. Unity of command is the operation of all forces under a single responsible commander who has the requisite authority to direct and employ those forces in pursuit of a common purpose (JP 3-0). Where possible, counterinsurgency leaders achieve unity of command by establishing and maintaining formal command or support relationships. While designated officers will exercise unity of command of military forces, such relationships will not usually include nonmilitary U.S. government organizations engaged in a counterinsurgency mission. (See ADRP 5-0 for more information on unity of command.) 1-50. Unity of command of military forces is operationally desirable and important for the military to establish. However, unity of command is almost impossible to achieve among all of the various actors in a counterinsurgency. Differing political objectives, national caveats, the legal limitations on the use of force, and sensitivities about subordinating national forces to those of other states or intergovernmental organizations often preclude strong command relationships. While agreements that establish a multinational force provide a legal foundation for determining the scope and limitations on authorities, responsibilities, command, support, or other relationships, the reality might be less clear. Unity of command is one of the most sensitive and difficult to resolve issues in a counterinsurgency. 1-51. When unity of command with part or all of the force, including nonmilitary elements, is not possible, commanders work to achieve unity of effort. Unity of effort is coordination and cooperation toward common objectives, even if the participants are not necessarily part of the same command or organization, which is the product of successful unified action (JP 1). In a counterinsurgency operation, an example of
3-24
26
Chapter 1 unity of effort could be a military commander and a civilian leader ensuring that governance and economic lines of effort are fully coordinated with military operations. Unity of effort among nationally, culturally, and organizationally distinct partners is difficult to maintain, given their different layers of command. To achieve unity of effort requires participants to overcome cultural barriers and set aside parochial agendas. It also requires that each organization understand the capabilities and limitations of the others. COORDINATION 1-52. In counterinsurgency operations, coordination efforts should include key participants from the outset. The joint commander, through the strategic concept, works with the engaged civilian organizations to build an interagency coordination plan during the joint operation planning process. Subordinate joint force commanders and Army commanders also build civilian organization participation into their operations plans. This is essential in integrating other government agencies and NGOs. Within an area of responsibility and a joint operations area, appropriate decisionmaking structures are established at combatant command, joint task force headquarters, and tactical levels in order to coordinate and resolve military, political, and humanitarian issues. 1-53. The complex diplomatic, informational, military, and economic context of insurgency and counterinsurgency precludes military leaders from exercising unity of command over civilian organizations—and they should not try to do so. Interagency partners, NGOs, and private organizations have many interests and agendas that military forces cannot control. In addition, the degree of independence of local institutions affects their legitimacy to the population. However, military leaders should make every effort to ensure that counterinsurgency actions are as well integrated as possible, taking into consideration the distinct mission, need for independence, and security requirements of other organizations. Coordination between the various actors in a counterinsurgency is essential. 1-54. U.S. government agencies should participate in coordination meetings to ensure integration with military and host-nation plans. At the joint headquarters level, the commander establishes joint interagency coordination groups. A joint interagency coordination group provides timely, usable information and advice from an interagency perspective to the commander. Joint interagency coordination groups share and integrate information and assist with synchronization, training, and exercises. Joint interagency coordination groups may include representatives from other federal departments and agencies, state and local authorities, and liaison officers from other commands and DOD components. The interagency representatives and liaison officers are the subject matter experts for their respective agencies and commands. They provide the critical bridge between the commander and interagency organizations. (See JP 3-08 for more information on joint and interagency coordination.) 1-55. Coordination between NGOs may be difficult or impossible. Direct interaction among various organizations may be impractical or undesirable because of various goals of NGOs and a NGO’s desire to be seen by the society as autonomous. The differing goals and fundamental independence of NGOs and local organizations usually prevent formal relationships governed by command authority. In the absence of such relationships, military leaders seek to cooperate with other participants to contribute to achieving counterinsurgency objectives. Informal or less authoritative relationships include coordination and liaison. Basic awareness and general information sharing may be all that is possible. Nevertheless, NGOs and other organizations may resist or refuse cooperation because of the appearance of cooperating with military forces. However, government and internal agencies offer links to the various NGOs so coordination can be accomplished without directly interacting with NGOs and causing potential security issues for them. 1-56. Commanders are responsible for coordinating the activities of military forces and cooperative nonmilitary organizations in their areas of operations. To carry out this responsibility, military and civilian leaders may establish a coordinating structure, such as an area coordination center or civil-military operations center at each subordinate political level of the host-nation government. Area coordination centers and civil-military operations centers provide forums for sharing information, conducting coordination and liaison, and ensuring an effective and efficient division of labor. Active commander involvement ensures coordination, establishes liaison (formal and informal), and shares information. Influencing and persuading groups outside a commander’s authority requires skill and subtlety. In some cases, informal meetings with a civilian group at a civil-military operations center will grow to an informal
3-24
27
Understanding the Strategic Context liaison that eventually leads to close cooperation. (See JP 3-22 for more information on coordinating structures.) 1-57. Leaders ensure the various organizations supporting counterinsurgency operations in each area know which commander is responsible for the respective areas of operation. Multiple organizations operating within a land force commander’s area of operations—such as U.S. government, multinational forces, host nation, interagency organizations, and special operations forces—might increase the risk of fratricide, insider threats, and civilian casualties and may create tactical and operational gaps that insurgents can exploit. 1-58. Entities best qualified to accomplish nonmilitary tasks may not always be available. In such cases, military forces may need to perform those tasks until civilian-led capabilities become available. Within the Army, civil affairs is the branch ideally organized, trained, and equipped to assist commanders in these functions. Sometimes forces already have the skills required, and at other times they learn them during execution. By default, U.S. and multinational military forces often possess the only readily available capability to meet many of the local population’s fundamental needs. As such, it is important for commanders to assess the capabilities of their forces and other organizations on the battlefield. UNIFIED ACTION PARTNERS 1-59. Army and Marine forces conduct counterinsurgency with unified action partners. Unified action partners are those military forces, governmental and nongovernmental organizations, and elements of the private sector with whom Army and Marine Corps forces plan, coordinate, synchronize, and integrate during the conduct of operations. Unified action partners include joint forces and components, multinational forces, U.S. government agencies and departments, and some intergovernmental and NGOs. Some important unified action partners in a counterinsurgency are— * Host-nation government and forces. * Joint forces. * Department of State. * Multinational forces. * NGOs. * Other organizations. Host-Nation Government and Forces 1-60. The essential unified action partner is the host nation and its own forces. The purpose of counterinsurgency operations, from the viewpoint of the U.S., is to support or enable the host nation to defeat an insurgency. In the worst case situation, this may require the U.S. becoming the primary counterinsurgent or working with groups inside a state to build a legitimate government. However, even in the worse case, the goal is still for the host nation and its forces to defeat an insurgency. Joint Force 1-61. The maritime component plays a critical role in controlling the seas, which may be vital to isolating an insurgency, both physically and psychologically. The expeditionary character and versatility of maritime forces provide an advantage in areas where access is denied or limited. Maritime forces may provide direct support to a joint task force that does not include combat operations, to include civil-military operations, logistic support, intelligence, communication sharing, humanitarian relief, maritime civil affairs, and expeditionary medical aid and training. 1-62. Air forces and capabilities play a vital role in the military contribution to a counterinsurgency. Air contributions include close air support precision strikes; personnel recovery, air interdiction, intelligence, surveillance, and reconnaissance, communications, electronic warfare, combat support, and air mobility.
3-24
28
Chapter 1 Department of State 1-63. The U.S. Department of State is responsible for implementing U.S. foreign policy and diplomacy efforts and plays a key role in integrating the capabilities of the U.S. The Department of State leads. It also oversees U.S. government support to counterinsurgency efforts. Several functional bureaus and offices have substantive roles in the development and execution of counterinsurgency strategy. These offices include the Bureau of Political-Military Affairs; the Bureau of Conflict and Stabilization Operations; the Bureau of International Narcotics and Law Enforcement; the Bureau of Democracy, Human Rights, and Labor; the Bureau of Population, Refugees, and Migration; the Bureau of Intelligence and Research; and the Legal Advisor’s Office. The Department of State is responsible for diplomatic programs that assist a host nation with countering an insurgency. In many U.S. military operations—such as governance capacity building—the Department of State is the U.S. supported element and the military is the supporting element. 1-64. One important capability that the State Department maintains is the civilian response corps. The civilian response corps maintains active members who are full time responders whose specific job is to train for, prepare, and staff overseas conflict prevention and stabilization operations. Active members of the civilian response corps can deploy on a 48-hour notice. The civilian response corps also maintains standby members. They are current full-time employees of the U.S. government or retirees of the U.S. Foreign Service. Members in the standby component must be available to deploy within 30 days, for up to 90 days, with the possibility to extend their deployment. The civilian response corps’ work focuses on six skill sets: Planning, operations, and management; security and rule of law; diplomacy and governance; essential services; and force protection. Country Team 1-65. The country team is the senior, in-country, United States coordinating and supervising body, headed by the chief of the United States diplomatic mission, and composed of the senior member of each represented United States department or agency, as desired by the chief of the United States diplomatic mission (JP 3-07.4). In a foreign country, the chief of mission is the highest U.S. civil authority. The chief of mission leads the country team and is responsible for integrating U.S. efforts in support of the host nation. The defense attaché, usually a foreign area officer, will work directly with a county team. The defense attaché provides important links to the country team for the commander. As permanently established interagency organizations, country teams represent a priceless counterinsurgency resource. They often provide significant local knowledge and interaction with the host-nation government and population. (See figure 1-1 for an illustration of country team command relationships. See JP 3-07.4 for more information on the country teams.) Some of the government agencies normally represented on a country team include— * The United States Agency for International Development. * The Department of Justice. * The Department of Treasury’s Office of Terrorism and Financial Intelligence. * The Department of Homeland Security. * The Department of Agriculture.
3-24
29
Understanding the Strategic Context Figure 1-1. Country team command relationships 1-66. An important enabler for ensuring unity of effort in countering an insurgency, especially when the U.S. is enabling a host nation with various capabilities, is foreign area officers. These officers can be an essential link to an embassy’s country team. By virtue of unique language proficiency and cultural and regional expertise, foreign area officers can be critical in helping to integrate various capabilities into the host nation’s ongoing efforts. While foreign area officers are often associated with security cooperation activities, such as foreign military sales, foreign area officers have historically provided essential strategic thinking and planning necessary to enable a host nation. As core members of the security cooperation organization and defense attaché office within the embassy country team, foreign area officers serve as key advisors to ambassadors and combatant commanders. Foreign area officers routinely operate in a whole-of-government, joint, intergovernmental, and multinational environment. They can be essential in integrating resources, capabilities, and activities throughout U.S. and multinational agencies to achieve unity of effort and accomplish national counterinsurgency objectives. Multinational Forces 1-67. Soldiers and Marines normally function as part of a multinational force, for example, by supporting the United Nations or as part of the North Atlantic Treaty Organization. Each multinational participant provides capabilities and strengths that U.S. forces may not have. Many other countries’ military forces provide cultural backgrounds, historical experiences, and other capabilities that can be particularly valuable to counterinsurgency efforts.
3-24
30
Chapter 1 1-68. Nations join multinational efforts for various reasons. Although the missions of multinational partners may appear similar to those of the U.S., rules of engagement, host-nation policies, and sensitivities may differ among partners. U.S. military leaders require a strong cultural and political awareness of other multinational military partners. Planners must be aware that multinational forces may also require significant U.S. enabling capabilities such as medical evaluation and logistic support. (See JP 3-16 and the American, British, Canadian, Australian, and New Zealand (ABCA) Coalitions Operations Handbook for more information on multinational partners.) Nongovernmental Organizations 1-69. A nongovernmental organization is a private, self-governing, not-for-profit organization dedicated to alleviating human suffering; and/or promoting education, health care, economic development, environmental protection, human rights, and conflict resolution; and/or encouraging the establishment of democratic institutions and civil society (JP 3-08). There are several thousand NGOs of many different types. Organizational charters and their members’ motivations govern their actions. Some NGOs receive at least part of their funding from national governments or intergovernmental organizations. Some may become implementing partners according to grants or contracts. For example, the United States Agency for Internal Development contracts some NGOs to perform certain functions. In these cases, the funding organization often gains oversight and authority over how to use the funds. 1-70. To ensure their own security and gain access to vulnerable populations in theaters of conflict, most NGOs maintain neutrality, impartiality, and independence from all sides in a counterinsurgency. These positions provide NGOs protection against claims of favoritism by the parties to armed conflict and enhance the credibility and security of these organizations. 1-71. Depending on the degree to which NGOs follow these principles, NGOs may carry out their work with a very different frame of reference from that of the government. Rather than perceiving their organization as supporting the overall U.S. or multinational stabilization effort, they may view the situation from the perspective of the victims of conflict, regardless of their affiliation with belligerent parties. They may give preference to individuals and communities based on humanitarian need, rather than meeting operational objectives. 1-72. While NGOs sometimes choose to coordinate their activities with the U.S. government for security, policy, or funding, often they are reluctant for fear of being associated with the government’s political goals in conflict. This creates a natural but often unavoidable tension in the relationship. Commander’s ease this tension through a mutual understanding of respective mandates and a clear delineation of tasks. For example, some organizations, such as the International Committee of the Red Cross, refuse to take armed escorts in conflict zones, relying instead on their wide recognition as neutral, independent, and impartial humanitarian actors. Commanders ensure information is available to NGOs to allow them to deconflict ground and air routes and provide contact information for them to coordinate safe passage in areas with active air or ground defense measures. At a minimum, air information should be passed through International Civil Aviation Organization notices to airmen and host-nation aeronautical information publications. 1-73. Many NGOs may operate in conflict areas long before external military forces arrive. These NGOs may remain after forces depart. Depending on their mandate, they can support critical host-nation government functions, or can contribute to the stabilization effort. To the greatest extent possible, commanders attempt to complement rather than override their capabilities. Commanders strive to build a complementary, trust-based relationship based on mutual understanding and a clear delineation of objectives and tasks. Other Organizations 1-74. An intergovernmental organization is an organization created by a formal agreement between two or more governments on a global, regional, or functional basis to protect and promote national interests shared by member states (JP 3-08). Regional organizations like the Organization of American States and European Union or global organizations such as the United Nations may be involved in some counterinsurgency
3-24
31
Understanding the Strategic Context operations. The United Nations, in particular, has many subordinate and affiliated agencies active worldwide. 1-75. In the private sector, multinational corporations and other businesses often operate in a conflict environment. At a minimum, commanders should know which companies are present in their area of operations and where those companies are conducting business. Understanding the overall profit motivation of these business will help commanders understand their actions in the operational environment. 1-76. When the U.S. government pays contractors, the principle of unity of command should apply. Commanders should influence contractors’ performance through U.S. government contract supervisors. Commanders should identify contractors operating in their area of operations and determine the nature of their contract, accountability mechanisms, and appropriate coordination relationships. (See FM 4-92 for more information on contractors.) STRATEGIC PRINCIPLES 1-77. Whatever type of strategy and operational approach that a counterinsurgency takes, several strategic principles are normally relevant. Whether the U.S. is enabling a host nation with certain capabilities or directly using its land forces, the principles listed in paragraphs 1-78 through 1-92 are relevant to most counterinsurgency operations. However, these principles are not meant to be exclusive rules for every conflict. They are provided for the practitioner and planner as a foundation for how they think about planning and executing counterinsurgency operations. LEGITIMACY IS THE MAIN OBJECTIVE 1-78. Fostering development of effective governance by a legitimate government that can provide security and acts in the best interests of its people may be essential to countering an insurgency. Legitimacy can be seen as the willing acceptance of a government by its population. Counterinsurgency forces may achieve this objective by the balanced application of both military and nonmilitary means. Governments rule through a combination of consent and coercion. Governments that are “legitimate” normally rule with the consent of the governed; those described as “illegitimate” tend to rely mainly or entirely on coercion. Citizens of the latter tend to obey the state for fear of the consequences of doing otherwise, rather than because they voluntarily accept its rule. Legitimacy is a perceived condition by the population that can only be achieved by host-nation government actions that lead to an acceptance of its primacy by the people. (See paragraphs 1-27 through 1-33 for more information on legitimacy and control.) COUNTERINSURGENT FORCES MUST UNDERSTAND THE ENVIRONMENT 1-79. Successful conduct of counterinsurgency operations depends on thoroughly understanding the society and culture within which they are being conducted. In most counterinsurgency operations in which foreign forces participate, insurgents hold a distinct advantage in their level of local knowledge. They speak the language, move easily within the society, and are more likely to understand the population’s interests. Thus, for foreign forces participating in counterinsurgency operations, they require a greater emphasis on certain skills, such as language and cultural understanding. Understanding the operational environment allows the counterinsurgent to identify the conditions which impact the prerequisites for the insurgency and the root causes that are driving the population to accept the insurgency. Only through understanding the operational environment can the counterinsurgent plan and execute successful operations to counter the conditions that allow the insurgency to exist in the first place. Nevertheless, U.S. forces must never assume they will be welcomed by a local population. They may even be viewed as occupiers. (See chapter 2 for a discussion on developing an understanding of the operational environment.) INTELLIGENCE DRIVES OPERATIONS 1-80. Effective counterinsurgency operations are shaped by timely, relevant, tailored, predictive, accurate, and reliable intelligence, gathered and analyzed at the lowest possible level and disseminated throughout the force. Without accurate and predictive intelligence, it is often better to not act rather than to act. Gaining situational understanding before action is often essential in avoiding long term damage to mission objectives. In environments where commanders do not have situational understanding, the first action they
3-24
32
Chapter 1 should take is to use forces to gain that understanding while not creating unintended and lasting harm to the mission. (See chapter 11 for more information on intelligence.) 1-81. Because of the dispersed nature of counterinsurgency operations, the actions of counterinsurgency forces are key generators of intelligence. In counterinsurgency operations, a cycle often develops where intelligence drives operations, which produces additional intelligence that facilitates subsequent operations. Reporting by tactical units and civilian agencies is often of greater importance than reporting by specialized national intelligence assets. These factors, along with the need to generate a favorable tempo (rate of military operations) drive the requirement to produce and disseminate intelligence at the lowest practical level. Commanders are responsible for driving the intelligence process. 1-82. Understanding the operational environment extends beyond insurgent combatants and insurgent leaders. To truly counter an insurgency, counterinsurgents must gather, analyze, and disseminate civil information pertaining to the population. If legitimacy is the primary principle of counterinsurgency operations, then identifying what is preventing legitimacy is as important, if not more so, than intelligence pertaining to enemy actions. Since Army and Marine Corps forces conduct counterinsurgency with unified action partners, it is vital to separate intelligence and civil information. Some partners, particularly NGOs, may not exchange information with Army and Marine Corps forces if that information is overtly tied to intelligence collection. Achieving a common situational understanding with unified action partners will require exchanging information outside of the intelligence realm. SECURITY UNDER THE RULE OF LAW IS ESSENTIAL 1-83. Whenever possible, security forces should be provided by the host nation. To establish legitimacy, the affected government must strive to transition security activities from military authorities to host-nation law enforcement authorities as quickly as feasible. When insurgents are seen as criminals, they lose public support. Prior to any transition to full host-nation responsibility, however, the violence level must be reduced enough for the host-nation counterinsurgency forces to maintain order; otherwise, the host-nation counterinsurgency forces will be unable to secure the population and the host nation may lose the legitimacy gained by the transition. U.S. counterinsurgent forces must also understand how the military and police are viewed by the population and not assume they are always seen as protectors. The goal of a change to a host-nation security force is an accountable, self-sustaining, capable, and credible force able to meet the security challenges faced by the host nation and seen as legitimate by the population. 1-84. Security forces use a legal system that conforms to local culture and practices to deal with insurgents and criminals and that enhances the affected government’s legitimacy. To succeed in countering an insurgency, the host-nation government must develop its legal and conflict resolution systems, including police forces, judicial systems, and penal facilities. The legal use of population control measures, including curfews, movement restrictions, travel permits, registration cards, and biometric census may assist in identifying the insurgents and protecting the population. COUNTERINSURGENT FORCES SHOULD PREPARE FOR A LONG-TERM COMMITMENT 1-85. Counterinsurgency operations can be protracted. Though most insurgencies are quickly defeated by the host nation and its military forces, U.S. involvement normally comes in insurgencies that are not quickly defeated. Insurgents can become extremely difficult to identify, track, and interdict if they are effective in acting clandestinely. Insurgencies may persist for many years after the main threat has been broken. Thus, counterinsurgency operations may demand considerable expenditures of time and resources. The population must have confidence in the staying power of both the affected government and any counterinsurgency forces supporting it. The population may prefer the affected government to the insurgents; however, people do not actively support a government unless they are convinced that the government has the means, ability, stamina, and will to win. Stabilizing the security situation and transforming a failed, failing, or ineffectual government into a functional one is an extremely difficult task that may take an extended period to complete. (See paragraphs 4-70 through 4-75 for information on the seventh dynamic, phasing and timing.)
3-24
33
Understanding the Strategic Context MANAGE INFORMATION AND EXPECTATIONS 1-86. Information and expectations are related; skillful counterinsurgency forces manage both. To limit discontent and build support, the affected government and any counterinsurgency forces assisting it create and maintain a realistic set of expectations among the population, friendly military forces, and the international community. The key tools to accomplish this are information operations through the effective coordination and synchronization of information related capabilities. Effective counterinsurgency commanders tell the truth; they refuse to give projections; and they do not promise more than can be provided. Achieving steady progress toward a set of reasonable expectations can increase the population’s tolerance for the inevitable inconveniences of ongoing counterinsurgency operations. Where a large foreign force is present to help establish a regime, this progress can extend the period until foreign forces are perceived by the population as an army of occupation. 1-87. Effective counterinsurgency forces must ensure that their deeds match their words and both are consistent with the broader narrative. They should also understand that any action has an information reaction. Counterinsurgency forces should carefully consider that information reaction’s impact on the many audiences involved in the conflict and on the sidelines. They should work actively to shape responses that further their ends. In particular, messages to different audiences must be consistent. In the global information environment, people in the area of operations can access the internet and satellite television to determine the messages counterinsurgency forces are sending to the international community. Any perceived inconsistency reduces credibility and undermines counterinsurgency efforts. USE THE APPROPRIATE LEVEL OF FORCE 1-88. Any use of force generates a series of reactions. There will be times when an overwhelming effort is necessary to destroy or intimidate an opponent and reassure the population. However, counterinsurgency forces, whether they are land, maritime, or air, calculate carefully the type and amount of force to be applied and who wields it for any operation. Normally, counterinsurgency forces can use escalation of force procedures to minimize unnecessary loss of life or suffering. These procedures are especially appropriate during any operation in which the counterinsurgent security force interacts with the local population. 1-89. All interactions between security forces and the population directly impact legitimacy, and if the counterinsurgent security forces show restraint in the eyes of the population, the entire counterinsurgency effort is further legitimized. The general rule for the use of force for the counterinsurgents is “do not create more enemies than you eliminate with your action.” Escalation of force does not limit the right of self-defense, including the use of deadly force when such force is necessary to defend against a hostile act or demonstrated hostile intent. However, counterinsurgency forces must be properly trained in such procedures and, more importantly, in methods of shaping situations so that tactical leaders have to make fewer split-second, life-or-death decisions. LEARN AND ADAPT 1-90. An effective counterinsurgency force is a learning organization. Insurgents connected with other organizations constantly exchange information about their enemy’s vulnerabilities—even with insurgents in distant theaters. However, skillful counterinsurgency forces can adapt at least as fast as insurgents. Every unit needs to be able to make observations, draw and apply lessons, and assess results. Commanders must develop an effective system to circulate best practices throughout their command. Commanders might also need to seek new policies that authorize or resource necessary changes. Insurgents shift their locations looking for weak links, so widespread competence is required throughout the counterinsurgency force. EMPOWER THE LOWEST LEVELS 1-91. Local commanders have the best grasp of their situations, but they require access to or control of the resources needed to produce timely intelligence, conduct effective tactical operations, and manage intelligence and civil-military operations. Leaders encourage individual initiatives and facilitate the learning that must occur at every level. Effective counterinsurgency operations are decentralized, and higher commanders owe it to their subordinates to push as many capabilities as possible down to their levels. However, this must be balanced with ensuring that tactical leaders have the situational
3-24
34
Chapter 1 understanding of the wider operational and strategic consequences of their actions. While tactical missions are essential, commanders ensure that tactical missions support the overall objectives to defeat the insurgency. SUPPORT THE HOST NATION 1-92. In the situation of U.S. and multinational forces committed to assisting a host-nation government with its counterinsurgency strategy, the long-term goal is to leave a government able to stand by itself. In the end, the host nation has to win on its own. Achieving this requires development of viable local leaders and institutions. External assistance can help, but host-nation authorities must accept responsibilities to achieve real victory. Depending upon the condition of the host-nation government (failed, failing, or viable), a robust whole-of-government approach is critical to enabling that government to accept those responsibilities. In a failed or failing state, there may be no functioning government or national economy. The counterinsurgent, therefore, will be forced to create institutions necessary to provide governance and support economic development. While it may be easier for U.S. military units to conduct operations themselves, it is better to work to strengthen local forces and institutions and then assist them. Host-nation governments have the final responsibility to solve their own problems. Eventually all foreign armies are seen as interlopers or occupiers. The sooner the decisive effort can transition to host-nation institutions without unacceptable degradation, the better.
3-24
35
Chapter 2 Understanding an Operational Environment 2-1. Regional and strategic conditions affect United States (U.S.) involvement in opposing an insurgency. How and why the U.S. becomes involved in an insurgency is important. However, some important strategic trends can also affect the context of an insurgency. These global trends include demographic changes, globalization, the proliferation of weapons of mass destruction, religious extremism, and failed states leading to an era of persistent conflict. Persistent conflict is the protracted conflict among state, non-state, and individual actors who are increasingly willing to use violence to achieve their political and ideological ends. These trends not only affect the likelihood of conflict, but they also affect the capabilities and action of friendly, threat, neutral, and nonaligned actors. 2-2. Understanding the conditions that may affect the stability of a nation or region assists commanders as they focus on a specific operational environment to determine the root causes that led to an insurgency. Whether operating at the operational or tactical level, commanders must understand and anticipate the effects of their operations and how they fit into the broader mission. The U.S. may enter situations with long-standing conflicts and established ways of life that have implications beyond the boundaries of a specific area of operations. Commanders identify relationships within that area that may exert external influence on other governments that have their own agendas in the region. Commanders also recognize that in the modern, interconnected world, actions at any level may have far broader impact than intended. This, coupled with certain global trends, may provoke more insurgencies in the future. DEMOGRAPHIC AND URBANIZATION TRENDS 2-3. In the future, the world will become more populated and urbanized. Global population will increase by approximately 1.2 billion people by 2025 with more than a billion new urban dwellers in that time. Most population growth will occur in the developing world. Population growth, urbanization, and competition for limited resources in the Middle East, Africa, and South Central Asia will contribute to increased resource scarcity and may present governance challenges. Climate change combined with increased population centers in or near coastal environments may challenge the ability of failing and fragile states to respond to natural disasters. These conditions enhance the possibility of insurgencies in highly populated developing countries whose governments lack the capacity to provide effective governance, including security and the rule of law. These trends could lead to failed states and problems that will affect regional and global security because of globalization. 2-4. Urbanization is the growth of urban areas due to both a population surge and migration. In 1950, 29 percent of the world’s population lived in urban areas; by 2050, scientists estimate that 60 percent of the world’s population will live in urban areas. This rapid growth of urban areas, and the accompanying crowded conditions with the potential for high unemployment, creates a greater potential that future insurgencies may arise in urban areas. GLOBALIZATION 2-5. Globalization is a combination of the technological, economic, social, cultural, and political forces that are bringing nation-states and the people of the world closer together. Globalization affects an insurgency by providing a freer flow of arms, information, and money to an insurgent group or insurgents and allows an insurgency to have a wider strategic effect than in the past. It is easy for ethnic groups or ideological groups to connect internationally because of globalization. Globalization provides a greater likelihood that insurgents will have access to outside resources, or that they will try to affect objectives outside of their local area. Through technology, globalization allows an insurgent to gain access to cyber electromagnetic tools that could be used to attack any country. It also makes ideologically or religiously motivated insurgencies more prevalent due to closer contact between traditional and modern societies.
3-24
36
Chapter 2 PROLIFERATION OF WEAPONS 2-6. The proliferation of weapons of mass destruction and precision weapons will increase the potential for catastrophic attacks. The threat or use of weapons of mass destruction by terrorist organizations is as real as it is deadly. Weapons of mass destruction present significant possibilities beyond terrorist actors. If an insurgent group acquires them, they can allow the insurgent group to pressure the host nation or attack a target that would have countrywide, regional, or global strategic affects. These weapons can provide an insurgent group with capabilities unmatched in the history of irregular warfare. The likelihood of an insurgent group obtaining these weapons has never been higher because of both globalization and the number of failed states. As ethnic and ideological groups enhance bonds that go beyond state boundaries, and insurgent groups create vast safe haven areas within failed states, the proliferation of weapons of mass destruction creates new possibilities for insurgencies. Not only will insurgents strive to obtain weapons of mass destruction, but the continued availability of more precise, cheaper, and more lethal conventional weapons will make insurgent actions more deadly than in the past. (See FM 3-11/MCWP 3-37.1 for more information on chemical, biological, radiological, and nuclear operations.) FAILING OR FAILED STATES 2-7. Governments of nation-states face increasingly greater challenges in providing effective support to their growing populations. The problems of both demographic changes and the pressures of globalization, corruption, lack of government services, and decaying infrastructure can lead to a failed state. A failed state can provide insurgent groups safe havens to build their organizations, but it may also hinder their ability to promulgate their message and actions due to a lack of infrastructure. (See FM 3-07 for a detailed discussion on a failed state framework.) THE OPERATIONAL VARIABLES 2-8. An operational environment is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). Commanders and staffs analyze and describe an operational environment in terms of eight interrelated operational variables: political, military, economic, social, information, infrastructure, physical environment, and time. The operational variables are fundamental to developing a comprehensive understanding of an operational environment. 2-9. When viewing an operational environment, it is important to identify friendly, neutral, and hostile actors. However, it is uniquely important in counterinsurgency operations that commanders and staff do not view these actors as static and unchanging over time. Actors can become more hostile or become less hostile. It is the interaction between the actors and the changes between their interactions that is important. The actors have many influences on their actions and those influences help determine if an actor stays the same, becomes friendlier, or becomes more hostile. (See JP 2-01.3 for more information on an operational environment.) 2-10. In Iraq's Anbar Province, the eight interrelated operational variables created a unique operational environment. The al Qaim tribes had different interests, both political and economic, than both the Americans and al Qaeda. Religion, economic interests, culture, and other variables helped to shape the actions of everyone in the operational environment. The Marine Corps had to act in this environment and attempt to shape it. This was a process that required situational understanding and an appreciation for the unique environment. The Anbar Province Operational Environment The Anbar Province’s al Qaim district became increasingly important to Abu Musab al-Zarqawi’s al Qaeda in Iraq after November 2004 when it lost its sanctuary to the American forces’ offensive in the second battle of Fallujah. The al Qaim district is located on Iraq’s border with Syria. Although the district represents only 10% of the Anbar population, the area holds strategic importance due to its location along the Iraqi/Syrian border as well as the Euphrates River. Al Qaim is and always has been a lucrative smuggling route for black market goods and served as al Qaeda in Iraq’s
3-24
37
Understanding an Operational Environment lifeline to infiltrate Baghdad with foreign fighters, money, and other resources that fueled the insurgency. With the loss of Fallujah, al Qaim became al Qaeda in Iraq’s newfound sanctuary. Al Qaeda in Iraq arrived with offers of partnering with al Qaim’s tribes to defeat and expel the Americans. They promised the indigenous population money and other resources for their support. As Muslims and Arabs, al Qaeda in Iraq members exhorted that it was their obligation, their Jihad, to fight the crusaders. After all, the Americans, supposedly ignorant of tribal customs, religion, and traditions, allegedly had disrespected and dishonored the people of al Qaim and a patriotic resistance had already formed in the district. The tribes of al Qaim saw the al Qaeda movement as the answer to their problem with the Americans. The tribes, together with al Qaeda in Iraq, felt that the time was ripe to rid the area of the infidel occupiers. Al Qaim tribes varied in available resources and were incapable of defeating the American occupiers on their own. For example, the Albu-Mahal tribe, the strongest tribe in the area, organized and resourced the Hamza Battalion specifically to fight the Americans. However, it, along with the other tribal militias, lacked the weaponry, ammunition, and other equipment to win such a fight on their own. Al Qaeda in Iraq’s offer was tempting and most of the tribes accepted. As time went on it became apparent that al Qaeda in Iraq’s offer was deceptive; this partnership was not what it seemed. Al Qaeda in Iraq provided weaponry and funding, but in return they demanded to lead the Jihad with the intent of first destroying and then transforming the social fabric of the tribes and al Qaim. Al Qaeda in Iraq started by taking over the smuggling routes, skimming large profits and killing those that resisted. They then imposed a radical form of Sharia on the community with fanatical punishments for transgressors. Religion was used to justify al Qaeda in Iraq’s actions, which included marriages to the local women, not allowing cigarettes, the ban of music and films, and the common intimidation tactic of beheading those that resisted. 3rd Battalion 6th Marines (3/6) executed Operation IRON FIST the first week of October, attacking from east to west through the town of Sadah and eastern Karabila, ultimately stopping at the Emerald Wadi in the center of the al Qaim region. They built four combat outposts, Chosin, Iwo Jima, Belleau Wood, and Khe Sahn, and left Marines and Iraqis in place, providing a combined, permanent, persistent, presence. The next clearing operation was conducted the first week in November by 3/6 and 2/1 commanded by Regimental Combat Team 2. This operation cleared the Husaybah, Karabilah, Sadah and Ubaydi areas of all insurgents. Immediately upon clearing the areas, 3/6 began constructing combat outposts in all of the cities. By late November 3/6 had constructed 14 combat outposts in the areas from Husaybah to Ubaydi. Each combat outpost consisted of a U. S. Marine platoon and an Iraqi Army platoon or company. Those positions completed and reflected combined, permanent, persistent presence, where the Marines and Iraqi Army lived together and among the people. The next step was to engage the people. Mission analysis led to assigning company areas based on the tribal distribution. The idea was to link a company with a tribe. This was not an exact science because the tribes were intermingled, but they did locate companies in areas where a majority of a tribe resided. The next step was a concerted drive to recruit tribesmen into the police force. The Marines solicited help from the Sheikhs to nominate men from their tribes, and started developing police stations near the combat outposts. This would allow the Marines and Iraqi Army forces to partner with the local police forces in those areas and further engender trust and confidence from the local people. Moving goods across the Iraqi and Syrian border was closely connected to the local economy. Undermining this trade would jeopardize a fragile relationship that U.S. forces worked hard to develop. In fact, U.S. forces had learned from the sheikhs
3-24
38
Chapter 2 that disruption of trade was one of the major grievances the locals had against al Qaeda in Iraq. Local tribes agreed to allow U.S. forces to stop and inspect all vehicles coming into the country to ensure no foreign fighters, money, or weapons were entering Iraq. The tribes also agreed to help with the inspection. New local police largely conducted these inspections with the Iraqi Army (with Marines in overwatch.) The tribes had picked the Iraqi government’s side in the struggle against al Qaeda in Iraq and wanted to stop foreign fighters, money, and weapons from entering Iraq as much as the U.S. forces did. 2-11. Understanding is necessary to begin planning the initial development of measures of effectiveness and performance. The commander must understand what has happened in an operational environment and determine the nature, scope, and severity of its problems. A situation is usually more complicated than it seems when the military force first becomes involved. Understanding an operational environment is a collaborative effort of the unified action partners. These partners may include U.S. government military and civilian personnel, international civilian and military personnel, and host-nation civilian and military personnel. To the maximum extent possible, the military force and unified action partners strive to have a common situational understanding from the beginning of an operation. If the partnering agencies do not have the same situational understanding, they can quickly find themselves working at odds with each other. Commanders will rarely have enough time to fully understand an operational environment. Understanding an operational environment is a continued and iterative process that will continue throughout an operation. 2-12. An area of operations is an operational area defined by the joint force commander for land and maritime forces that should be large enough to accomplish their missions and protect their forces (JP 3-0). For land operations, an area of operations includes subordinate areas of operations as well. 2-13. A commander’s area of operations may be relatively static, but people, weapons, commodities, and information continuously flow through an area of operations. An area of operations can cross physical structures, such as roads and rivers, and span diverse population groups. Fabricated borders that divide natural groupings can create problems in understanding an area of operations. For example, cross-border ties allow insurgents safe havens outside of a tactical unit’s area of operations. Moreover, international boundaries often divide population groups. The span of an insurgency may be far larger than the defined area of operations and areas outside the area of operations may be relevant to a commander. For example, areas outside a commander’s area of operations may provide a safe haven for an insurgency, or an adjacent state may support an insurgency. In an insurgency, an area of interest may be large. 2-14. The area of interest is that area of concern to the commander, including the area of influence, areas adjacent thereto, and extending into enemy territory. This area also includes areas occupied by enemy forces who could jeopardize the accomplishment of the mission (JP 3-0). It is the area in which events could have significant impact on areas of operations. An area of interest can be large relative to the area of operations. When defining an area of interest, commanders should consider the operational variables. (See JP 3-0 for more information on an area of influence.) 2-15. Commanders analyze operational variables to understand the operational environment in which they are conducting operations. An operational environment is not static; it continues to evolve. Introducing units into an operational environment causes shifts and changes. As a result, commanders, their respective staffs, and all Soldiers and Marines must continuously reassess an operational environment for changing conditions. Moreover, in addition to understanding U.S. interests and desired end states in an environment, a commander must understand the environment from three additional perspectives: those of the host nation, the enemy, and the population. POLITICAL 2-16. The political variable describes the distribution of responsibility and power at all levels of governance—formally constituted authorities, as well as informal or covert political powers. The counterinsurgent seeks to understand not just the formal political system, such as political parties and elected officials, but also the informal systems of political influence, such as ethnic groups and other centers of power. There is a connection between the political variable and the social variable. For example,
3-24
39
Understanding an Operational Environment a tribal grouping or a social caste may directly affect whom that group sees as a legitimate authority in an area. Moreover, these social groupings can affect the formal power structure. For example, in an electoral system, groups will often vote as blocs, giving them added political power in that formal system. (See ADRP 5-0 for more information on the political variable.) 2-17. Often, informal groups such as tribes or local councils are the essential actors in the distribution of political power, especially at the local level. Political power is the ability to influence behavior. The biggest influence of behavior is often local groupings that can create a norming effect on a population. Most groups hold power only because the population accepts that power distribution. 2-18. However, the opposite can also be true and the formal political system can change group identity and influence the actions of any social group. States can create identity in a population through education and information. For example, an education program that instills nationalist views in an individual from an early age can be a powerful tool in shaping a person’s identity and in turn whom that person sees as a legitimate authority. Group and individual identities are not static, nor is whom a population views as legitimate static. While groups have internal means to view identity, variables outside the group, including the host nation, also affect them. 2-19. The commitment and motivation of a host nation to defeat an insurgency is an important motivation. Governments with more than one of the following traits have tended to lose historically, even when supported by competent and committed external forces: * Government sponsors or protects unpopular economic and social arrangements or cultural institutions. * Government is involved in corrupt and arbitrary personalistic rule. * Government operates as a kleptocracy. * Government is controlled by elites with perverse incentives to continue conflict. * Government is economically dependent on external actors. The harsh reality for counterinsurgents is that some of these negative characteristics are usually present, and they are key factors in sparking insurgencies in the first place. As a result, the interests of a host-nation government are often at odds with what the best practices would be to solve its political problems. (See paragraphs 1-27 through 1-33 for more information on legitimacy and control.) MILITARY 2-20. The military variable explores the military and paramilitary capabilities of all relevant actors (enemy, friendly, and neutral) in a given operational environment. For many countries, the army’s predominant purpose is to be the military force responsible for maintaining external security. However, this is not a universal rule, and many militaries become involved in internal security and even governance. In some cases, there is a degree of military control over the government, which then blends the political and military variables. This can range from a military dictatorship to a praetorian guard type military that periodically intervenes in the governance of a society. Even in cases where a host nation appears to have complete objective control over its military forces, these military forces can be an important bureaucratic and political actor. The interaction between the military and the political structure is important to understanding this variable’s relationship with the political distribution of power in a society. (See ADRP 5-0 for more information on the military variable.) 2-21. A host of institutions including police, paramilitary, intelligence, and other organizations can maintain internal security. Thus, commanders and staffs need to consider them within the military variable. In many autocratic societies, intelligence agencies provide an essential means of control over a society. Many societies maintain civil control and civil security by an accepted rule of law and a police force that enforces the rule of law. In a counterinsurgency, the host nation may use the military or a paramilitary to defeat an insurgency. 2-22. The military variable includes all forces involved in both internal and external security. U.S. counterinsurgents must fully understand how the host nation maintains internal and external security. Moreover, they must understand both neutral and enemy military forces. Neutral military forces are common in a counterinsurgency, as some states or multinational corporations will employ or contract for
3-24
40
Chapter 2 limited forces to protect personnel, resources, or infrastructure for their own interests. A peacekeeping force may be maintaining a position of neutrality in the conflict. There can also be informal groupings of military power. For example, local gangs, armed militias, and private security agents can be a factor in local areas. 2-23. Commanders and staffs should analyze friendly, neutral, and enemy forces with both qualitative and quantitative data. Some aspects to consider include— * Position of forces in national and local governmental structure. * General organization, training, and doctrine. * Economic basis (to include the appropriations system). * Conscription or recruitment systems. * Police role in the nation’s internal security. * Rapport with population. * The impact of other international forces already there or there in the recent past. These considerations are particularly important with regard to the insurgents. Knowing from what groups and sources, both within the country of conflict and outside of it, are providing what kinds of support (for example, financial, personnel, materiel, and provisions) and by what processes or routes is critical. Insurgencies that continue to meet their tangible support needs are difficult to defeat. 2-24. One enemy force in a counterinsurgency can vary widely from another. Some may be based on cellular organizations while others may be more hierarchical. Moreover, there may be a wide variance in enemy capabilities. Some insurgencies may have capabilities to conduct large scale and well coordinated attacks that may rival the capability of a host nation’s military. Others may have less capability and may rely on small-unit tactics. (See paragraphs 4-76 through 4-103 for a discussion of the eighth dynamic, organizational and operational patterns, and see chapter 5 for a further discussion on enemy military forces.) ECONOMIC 2-25. The economic variable encompasses individual and group behaviors related to gaining access to, producing, distributing, and consuming resources. These behaviors determine incentives and disincentives that encourage or discourage economic decisions. The sum of these individual and group decisions may determine the production, distribution, and consumption of economic resources. Typically, an economy is conceptualized as currency, stocks, major commodities, banking, and trade controlled and monitored by the government. However, informal economies, trade, or economic exchange outside state-controlled or money-based transactions may be of equal or greater importance than formal economies in understanding an operational environment. While the world economy continues to grow more interdependent, local economies remain relatively distinct. These differences significantly influence political choices, including individuals’ decisions to support or subvert the existing order. When commanders and staffs analyze a local economy, they consider both governmental policies and the type of local economy. 2-26. Types of economies vary widely. When looking at economic activities, commanders and staffs strive to understand the relative importance of the various sectors of an economy. Comparing the percentage of the economy in the public sector versus the private sector provides some understanding of the structure of the economy. Moreover, the private and public sector can potentially be divided into different sectors based on type of activities. Agriculture, raw materials, services, and other types of production play an important role in defining the economy of a local area. It is important to analyze governmental policies. Corruption, the rule of law, and macroeconomic policy play a role in the structure of a local economy. 2-27. Another important factor in analyzing economic activity is the informal economy. In weak states, understanding the informal economy is key to providing a full understanding of an operational environment. The informal economy is those economic interactions and exchanges that are not recognized, regulated, controlled, or taxed by a state government. In this case, informal does not always equal illegitimate. For example, a black market is a form of informal economy based on criminal activities such as racketeering, money laundering, prostitution, drug trafficking, and smuggling. On the other hand, open-air markets and barter systems are legitimate activities that often contribute to an informal economy.
3-24
41
Understanding an Operational Environment In every country there is a balance between formal and informal economies. In successful states, the informal economy may be relatively small. However, in failing states the informal economy may form the majority of all economic activities. The local population may depend on informal markets for their most basic needs. It is difficult but important for counterinsurgents to develop an understanding of these informal economies (both legitimate and illegitimate.) Because they are outside host-nation government oversight, insurgents can exploit even legitimate formal economies as a source of funding. The black market, on the other hand, will most likely be a direct enabler of an insurgency in terms of both funding and logistics. 2-28. The counterinsurgent must consider other informal economies. Most people work, buy, and sell in this economy, operating outside legal frameworks but not engaging in illicit or criminal activity (except perhaps for taxation issues). Sensitivity to the rules of an informal economy is one piece of cultural sensitivity to the population and the host nation in general. Examples of the rules of an informal economy include the following: * People earn income in non-cash payments such as benefits or goods. * People often use land for decades (or more) through traditional usage rights granted by village heads and chiefs with no legal title. * People may work without pay (in arrangements such as the traditional divisions of household and farm labor). 2-29. Economic variables also tie into other elements of a society. For example, ownership or control of land and debt indicate something about the power structure within a society. Many developing societies have highly concentrated ownership of land, which can serve as a driver for social conflict and discontent. Whoever owns land or controls land has the power to use it for economic profit. Maintaining this ownership or control during an insurgency indicates a degree of power in a society. The same is true of debt. The ability to collect a debt indicates a degree of power in a society. Land and debt are examples of how economic factors link into other social factors. 2-30. If a population views economic conditions as unjust, a lack of economic opportunity can be a root cause of an insurgency. (See paragraphs 4-14 through 4-22 for more information on motives for an insurgency.) As part of developing an understanding of an operational environment, counterinsurgents assess the current economic variables, the economic opportunities available to different segments of the population, and the effect insurgent and counterinsurgent operations are having on the population’s ability to meet their most basic economic needs. Economic survival, especially in an area where an insurgency is occurring, is almost as important and as immediate a challenge for households as physical security. For this reason, leaders at all levels of the counterinsurgency operation (including platoons and companies) need to assess the impacts of military operations on the following simple elements of the economic welfare of households and communities: * Income (including the capacity to earn streams of income in future). * Assets and property (used to earn income). * Work (including traditional patterns of unpaid work). 2-31. Commanders strive to understand the economic impact of the unit’s presence in an area. For better or worse, the presence of an Army or Marine Corps unit affects normal economic incentives and disincentives for individual behavior. Introducing foreign wealth can have unintended negative consequences. For this reason, careful thought and planning are needed for a project intended to have local economic impact. Commanders anticipate the economic impact of their arrival and their continued presence in the area of operations. Additionally, commanders and staffs carefully weigh the costs and benefits associated with all economic activity. Some factors to consider are— * Prospects of long-term sustainability. * Possibility of local price inflation. * Disrupting natural incentives (such as farmers leaving fields to work on trash pickup projects). SOCIAL 2-32. The social variable describes the cultural, religious, and ethnic makeup within an operational environment and the beliefs, values, customs, and behaviors of society. Understanding the society is
3-24
42
Chapter 2 foundational to understanding the social variable. A society is defined as a population whose members are subject to the same political authority, occupy a common territory, have a common culture, and share a sense of identity. However, no society is completely homogeneous. A society usually has a dominant culture, but it can have secondary cultures. Different societies may share similar cultures, as Canada and the U.S. do. Societies are not static, but change over time. (For more information on this variable, see chapter 3 of this publication and ADRP 5-0.) INFORMATION 2-33. The information variable describes the nature, scope, characteristics, and effects of individuals, organizations, and systems that collect, process, disseminate, or act on information. The information environment is the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information (JP 3-13). Understanding the communications systems is important because they influence international, national, regional, and local audiences. Insurgents often use information and disinformation to gain credibility and legitimacy with the population, while simultaneously undermining their opponents. Understanding how people communicate and who influences them on a daily basis is essential. This is important at all levels. For example, identifying local gathering places is important to understand or influence the spread of information, rumors, and gossip. 2-34. The information environment is made up of three dimensions: physical, informational, and cognitive. The cognitive dimension encompasses the mind of the decisionmaker or specific audience and is the dimension where people think, perceive, visualize, and decide. The informational dimension is the place where information is collected, processed, stored, disseminated, displayed, and protected with key components of the content and flow of information. The physical dimension is composed of systems, human beings (including decisionmakers, leaders, and military forces), and supporting infrastructure that enable individuals and organizations to create effects conduct operations across air, land, maritime, space and cyberspace domains across multiple domains. (See table 2-1.) Table 2-1. Interrelated dimensions of the information environment Dimension Description Cognitive • Exists in the minds of human beings. dimension • Consists of individual and collective consciousness. • Where information is used to develop perceptions and make decisions. • Significant characteristics include values, beliefs, perceptions, awareness, and decisionmaking. Informational • Created by the interaction of the physical and cognitive dimensions. dimension • Where information is collected, processed, and disseminated. • Significant characteristics are information content and flow. Physical • The tangible, real world. dimension • Where the information environment overlaps with the physical world. • Consists of targetable individuals, organizations, information systems, and the physical networks that connect them. • Significant characteristics include terrain, weather, civilian information infrastructure, media, populace, and third party organizations. 2-35. The technological advances in communications offer some unique considerations for insurgencies. For one, international communication is easier than it used to be. This allows insurgencies to communicate with organizations outside of their physical control. Connecting to diasporas or sympathetic groups could be vital to an insurgency. With the ability to communicate comes the ability to move resources and funding. Moreover, communications can be vital in importing weapons or other supplies to an insurgency. Global communications can be essential in increasing the military capabilities of an insurgency, significantly increasing the tempo of insurgent operations and their ability to change tactics. 2-36. At the operational and tactical level, communications allow for effective coordination of attacks. Organizations can communicate by cell phones, by the internet, or a number of other rapid means. This
3-24
43
Understanding an Operational Environment allows for coordinated large-scale attacks even by dispersed organizations. (For additional information on the information environment, see FM 3-13.) INFRASTRUCTURE 2-37. The infrastructure variable is composed of the facilities (buildings and equipment), personnel, and services needed for the functioning of a community or society. Societies have different infrastructure needs. For example, the expectation for hours of available electricity vary widely. Counterinsurgents try to access infrastructure needs to meet the expectation of the user, not their own expectations. 2-38. Infrastructure is also interrelated with other variables. For example, the development of a highway system will affect the ability of people to move and interact with others. Creating a society in which humans can easily move based on economic needs or simple desires greatly increases the variety of groups a person will meet. These interactions and new relationships can change how a person views the world and change that person’s values. A communications system, such as a cellular network, can have the same effect. These systems allow for communications outside of one’s areas and allow the transmission of new ideas and concepts. 2-39. Commanders and staffs conducting counterinsurgency operations must consider the relationship between infrastructure and the economic variable. An effective infrastructure can allow for the easy movement of people, goods, and ideas. Many businesses require infrastructure. While it is true that a local population may not expect 24 hours of electricity a day, a manufacturing plant may require it. Moreover, infrastructure such as schools can increase the human capital in an area and drive economic growth. 2-40. Infrastructure also has an effect on the military variable. Host-nation forces can use a good transportation system, but so can an insurgency. A road system provides a means of transportation for everyone, not simply the population and government. Moreover, infrastructure may be important for the population and the government’s role in maintaining civil control and security. An attack on the infrastructure may undermine the government’s legitimacy in an area. However, the opposite is also true. An attack on infrastructure may also undermine the insurgency if the population places blame on the insurgency and turns towards to government. PHYSICAL ENVIRONMENT 2-41. The physical environment includes the geography and man-made structures, as well as the climate and weather, in an area of operations. The physical environment affects the tactics and operations of both insurgents and counterinsurgents. Extreme conditions, such as in nations in higher elevations, can make insurgent movements difficult in the winter. The movement and the tactics of any military force will be affected by the physical environment of its area of operations. A physical environment will influence insurgency sanctuaries, the ability of an insurgency to hide resources, and the ability of an insurgency to mass forces. Understanding a physical environment is essential to understanding an insurgency. (See chapter 4 for further discussion on how a physical environment relates to an insurgency.) 2-42. A physical environment also relates to the other variables. A mountainous, landlocked country will have a difficult time building the infrastructure needed for large-scale international trade. Moreover, if the physical environment precludes the ability to easily produce an excess of food, it is difficult to divert much labor to other enterprises. This can hamper the development of a highly specialized economy. An increase in food production will often predate a major increase in industrial production. TIME 2-43. Time describes the timing and duration of activities, events, or conditions within an operational environment, as well as how various actors in an operational environment perceive the timing and duration. Time also has an interrelated relationship with other variables. For example, a multinational coalition may see its efforts in a counterinsurgency as limited by national objectives or by the public pressure. In other words, outside parties can always leave a counterinsurgency. On the other hand, for the host nation, the insurgents and the population in the struggle are less constrained by time than a multinational coalition. An
3-24
44
Chapter 2 insurgency may use the time variable to its advantage, while the time variable usually works against an external counterinsurgent. 2-44. Time can also play a role in the social variable. Ongoing conflicts tax societies. Populations can become less interested in the nuisance of a conflict and more interested in simple peace. As time passes, a population may be more interested in who is likely to win an insurgency than the motivation of either side of the conflict. Counterinsurgents may also see time as working for or against them. (See paragraphs 4-30 through 4-45 for more information on insurgent strategies.) THE MISSION VARIABLES AND CIVIL CONSIDERATIONS 2-45. Upon receipt of a mission, commanders filter information categorized by the operational variables into relevant information with respect to the mission. They use the mission variables, in combination with the operational variables, to refine their understanding of the situation and to visualize, describe, and direct operations. The mission variables are mission, enemy, terrain and weather, troops and support available, time available, and civil considerations. (See ADRP 5-0 for more information on the mission variables). Within the mission variables, civil considerations are of unique importance for counterinsurgency. Civil considerations are the influence of man-made infrastructure, civilian institutions, and activities of the civilian leaders, populations, and organizations within an area of operations on the conduct of military operations. Civil considerations comprise six characteristics, expressed in the memory aid ASCOPE: areas, structures, capabilities, organizations, people, and events. (See FM 2-01.3/MCRP 2-3A for information on the use of ASCOPE.) 2-46. The commanders’ refinement of information for their mission and their particular area of operations is essential. ASCOPE can play an important role in the identification of structures or events that will have an effect in a unit’s area of operations. As such, ASCOPE is an important tool for the unit in determining important civil considerations in an insurgency. Units within an insurgency use ASCOPE to identify and continually refine their understanding of the area of operations over time. Commanders and staffs consider ASCOPE from the perspective of the population, the insurgent, and the counterinsurgent. This is particularly important for counterinsurgency operations. (See JP 3-57, FM 3-57, MCWP 3-33.1, and ADRP 2-0 for detailed explanations of ASCOPE.)
3-24
45
Chapter 3 Culture 3-1. This chapter addresses culture and its role in a counterinsurgency operational environment. Culture forms the basis of how people interpret, understand, and respond to events and people around them. Cultural understanding is critical because who a society considers to be legitimate will often be determined by culture and norms. Additionally, counterinsurgency operations will likely be conducted as part of a multinational effort, and understanding the culture of allies and partners is equally critical. 3-2. Insurgents from a local area generally understand local culture, the perspectives of the population, and the population’s concerns and grievances much better than any foreign military forces understand them. Therefore, culturally, the insurgent may have an enormous advantage over a foreign military force. This may not be true if the insurgents are not from the local area. If a military force is to succeed in gaining support of the population, it must seek to understand the local people and their culture and incorporate the perspectives and concerns of the population in their plans and operations as well as, if not better than, the insurgents incorporate them. 3-3. There are many definitions of culture in use by the United States (U.S.) military. As a starting point, this publication understands culture is a web of meaning shared by members of a particular society or group within a society. UNDERSTANDING CULTURE 3-4. To be successful in interacting with the local population to gain information on the enemy, or to understand their requirements, military members must do more than learn a few basic facts or “do’s and do nots.” They must understand the way that their actions can change the situation for the local population (both positively and negatively) and the resulting perceptions of the population towards those actions. To be successful, commanders and staffs consider four fundamental aspects of culture when planning and executing military operations: * Culture influences how people view their world. * Culture is holistic. * Culture is learned and shared. * Culture is created by people and can and does change. 3-5. The way that a culture influences how people view their world is referred to as their worldview. Many people believe they view their world accurately, in a logical, rational, unbiased way. However, people filter what they see and experience according to their beliefs and worldview. Information and experiences that do not match what they believe to be true about the world are frequently rejected or distorted to fit the way they believe the world should work. More than any other factor, culture informs and influences that worldview. In other words, culture influences perceptions, understandings, and interpretations of events. Soldiers and Marines need to know that U.S. interpretations of events are often quite different from the perceptions of these events by other people in an area of operations. If Soldiers and Marines assume that the local population will perceive actions the way that they do, they are likely to misjudge their reactions. The U.S. military refers to this pattern of assuming others see events in the same way the U.S. does as mirror imaging. Mirror imaging is dangerous because it leads Soldiers and Marines into thinking that their assumptions about a problem and its solution are shared by the population and multinational partners, rather than employing perspective taking, and looking at the problem from the population’s perspective. 3-6. Holism is based on the principle that all socio-cultural aspects of human life are interconnected. While interacting with people in other cultures, Soldiers and Marines may be tempted to say their problems “are all about [fill in the blank: tribalism, corruption, lack of work ethic, and so on.].” In truth, very few
3-24
46
Chapter 3 counterinsurgency challenges boil down to one simple answer. Politics affects economics. Family structure affects job choices. Religion affects politics. Every aspect of culture affects every other aspect in some way, even if indirectly. By acknowledging these interconnections, military members can better assess how the local population might react to their presence and actions. For instance, when Soldiers and Marines are not thinking holistically, they may anticipate that closing down a local market will only have an impact on the local economy. However, after closing the market, it may be that the local reaction seems to be about religion or tribal concerns instead of economics. Even if Soldiers and Marines do not understand why, they should be aware that their actions will have unknown second and third order effects. By understanding that a marketplace is more than a place to exchange goods for money, and that economic conditions may affect tribal power, the status of religious leaders, and other social conditions, Soldiers and Marines can see a culture holistically. A holistic perspective helps military members understand the complex interconnectedness of a culture and avoid being surprised by local reactions to military decisions. 3-7. Culture is learned and shared. Children learn the appropriate way to act in a culture by observing other people; by being taught accepted values and ways of thinking about the world from their parents, teachers and others; and by practicing (sharing) what they have learned on a daily basis. This process of learning a new culture is called socialization. Culture can be learned at any age. Marines and Soldiers, for example, learn military culture by going through basic training or officer training in their late teens or early twenties. In fact, these initial training schools recognize their important role in socializing young men and women into core Marine and Army values. As a result, Marine Corps and Army basic training curriculums include not only classes on marksmanship, but also classes on ethics and core values. In counterinsurgency operations, understanding that culture is learned and shared can offer an important operational and tactical opportunity. Any Marine or Soldier can learn about the culture of the population simply by interacting with the local people. One of the more successful adaptations of the U.S. military in Iraq and Afghanistan occurred when service members realized they could learn a lot about the local culture quickly by talking to and observing their interpreters. Their enhanced understanding of the cultures of their areas of operations enabled them to better negotiate with leaders, to conduct operations that would be successful, and in a number of cases (such as the al Anbar Awakening), to gain the support and assistance of the population in fighting an insurgency. 3-8. One of the keys to success (and failure) in dealing with a population in a counterinsurgency operation is understanding that cultures are not static; they can and do change, often rapidly. During times of conflict, the usual methods for getting through the day may stop working for the local population, and they may try adopting new ideas or start highlighting traditional ways of doing things. Alternatively, they may switch rapidly among a range of possible behaviors. These changes can occur because of a number of factors were at play, but probably the greatest cause of this during conflict is a rapid decline in security. As security declines, the threat of attack, rape, and murder forces many changes in society. The rapid decline in the status and opportunities for women in these countries, therefore, was not merely due to centuries-old tribal beliefs, but to very real and pragmatic economic and social changes over time. As the cases of Iraq and Afghanistan illustrate, cultural practices and attitudes are frequently influenced by changes in very real physical conditions. Since the arrival of a large military, often accompanied by the destruction of physical property and the erosion of the local economy and security, is undoubtedly an enormous change for the local population, counterinsurgency planners need to recognize and plan for the impact that their operations will have upon the people and cultures in an area of operations. ASSESSING A CULTURAL SITUATION 3-9. Although it may seem that people around the world are extraordinarily different and have little in common, in reality all human groups interact with their world and each other in some basic, predictable patterns. The particular details of these patterns may vary. But the underlying patterns will not. Thus, all people use, manage, and interact with their environments. All groups have some kind of economy for exchanging goods and services. Every group has a social structure, with differing roles and status among members. Political behavior can be found in the smallest community. All people have some kind of belief system, whether based on religion, tradition, narratives, or history. By identifying these patterns wherever they deploy, Marines and Soldiers will be in a better position to assess the cultural situation and the influence of their operations upon the local population.
3-24
47
Culture 3-10. All cultures have a unique and interdependent connection with their physical surroundings. The physical environment (including climate, terrain, and resources) influences the people living in it by providing a range of possibilities within which they act. People shape their environment by the choices they make, creating a cultural landscape which reflects their social, cultural, economic, and political attitudes. A careful reading, or interpretation, of the cultural landscape can provide useful information about the people who create it, use it, and live in it. A military presence in an area of operations will affect a local population and its use of the physical environment. For example, Marines and Soldiers may inadvertently divert or impede access to resources, such as water or food, which in turn may cause real shortages or upset the balance of power by allowing greater access to these resources by one group and harming another. Counterinsurgency planners need to anticipate how their operations will impact local populations and their use of their environment and recognize that since use of the environment is cultural, these impacts may significantly differ from what might be expected in the U.S. 3-11. All cultures have specific systems for obtaining, producing, and distributing items people need to survive (for example, food, water, and shelter) or luxuries and material things. This system, which does not necessarily require money or a banking system, is called the economy of a culture. Frequently, insurgents use the informal economy to obtain funding and support for their activities. Another aspect of the economic system that is often overlooked is the concept of reciprocity, which is an exchange between people that creates a relationship. Although in Western cultures exchange usually involves the exchange of goods and services of equal monetary value, in other parts of the world exchange may be only partly about what people expect regarding goods and services and also partly about building working relationships. If Marines and Soldiers fail to see what the local people expect from the exchange, to include its impact on interpersonal relationships, it will be hard for them to understand or anticipate people’s behavior. 3-12. In all cultures, people hold differing positions of status and power, often closely related to their roles in a group. In the military, for example, one’s status and power is based on rank. Depending on a person’s rank, a person fills different roles in an organization. The way that a group distinguishes among its members according to their role, status, and power is reflected in its social structure. A person’s position in the social structure may depend on many factors, including age, gender, class, family name, tribal membership, ethnicity, religious identity, and even rank. In conflict environments, differing groups (for example, ethnic, religious, or tribal) may each vie for power, often looking to outside militaries to support them. In counterinsurgency operations, it is essential that military leaders understand which social groups have traditionally held power in an area of operations. Otherwise, they are likely to be drawn into power struggles among competing groups, and possibly even unwittingly end up aiding the insurgents. A concept central to one’s place in society is that of identity. Identity is a broad term used to describe how people conceive of themselves and how they are perceived by others. Identity shapes how people view themselves and the world. Understanding identity is complex because people have multiple identities. In times of conflict, people may choose to emphasize certain group identities such as nationality or religion, while at other times different identities, such as one’s profession or gender, may matter more. Social structure and identity are extremely important concepts for counterinsurgency planners and operators to understand, as they affect people’s allegiances and influence how groups and individuals will interpret and respond to U.S. actions. 3-13. In all cultures, people have a system that determines who leads the group and who makes decisions about its welfare. Although people in the U.S. use an electoral system to select their leaders, this is not the case in many other countries. In many places around the world, even when the official government is elected, the local population may not view that government as legitimate or effective. In fact, one of the primary motivations for people to support an insurgency is their sense that the official or formal government has failed to provide for their needs. Frequently, insurgents may be providing a “shadow government” which replaces and competes with the official government in certain parts of the country. Shadow governments are one example of informal leadership. In most areas of operations, Marines and Soldiers will find that communities or groups are influenced by a variety of leaders, most of whom are not part of the government. In some areas, religious leaders may have great influence. In others, people may look to tribal leaders or respected individuals within their ethnic group. Business leaders and warlords often have great power and influence too. To be successful in counterinsurgency operations, military members need to quickly and accurately identify the various community leaders and develop strategies to work with
3-24
48
Chapter 3 each of them in order to increase government legitimacy. Without support from the various power brokers in an area of operations, military action is unlikely to gain support from the local population. 3-14. Cultures are characterized by a shared set of beliefs, values, norms and symbols that unite a group. These beliefs may come from many sources, such as a person’s background, family, education, religion or history. Understanding the beliefs and values of a local population is critical for effective information operations. Failure to respect or understand the beliefs of a local population can result in serious hostility towards military intervention and attacks upon military personnel. Likewise, information operations that assume the foreign audience shares the same jokes, history, or values that Soldiers and Marines do frequently fail to deliver messages effectively. To gain an understanding of belief systems, counterinsurgents read and monitor information available through media or books, and counterinsurgents talk to people in the culture. Discussing history with local people can be a window into understanding the way that people in that area define a problem, who they believe caused it, and who they think the heroes and villains are. Stories, sayings and even poetry can reveal cultural narratives, the shared explanations of why the world is a certain way. Frequently, advertising appeals to people by using these narratives, as do effective information operations. Beliefs, however, are not perfectly shared or understood within a group. There is usually a range of acceptable thoughts and behaviors. This is called variation. For example, in reading about Islam, Soldiers and Marines may understand that Muslims are supposed to fast during Ramadan. However, when deployed they might observe seemingly faithful Muslims drinking and eating during Ramadan. Within U.S. culture, these internal mismatches and contradictions (variations) are often accepted without much comment. In a cross-cultural interaction, these contradictions can seem jarring or confusing. Often, working with others in a foreign culture requires the ability to suspend judgment. People often act and work in ways that may be difficult to accept or understand. However, by recognizing that all people share some fundamental patterns and seeking to understand and develop military plans and operations that build upon these patterns, commanders and staffs can effectively work to counter an insurgency within an area of operations. 3-15. Religion can be a powerful force in shaping beliefs. In many cultures religion and religious leaders have significant influence over local populations. Religious ideology can incite conflict, but religion can also be instrumental in stabilizing a culture by using universal religious concepts of justice, healing, and transformation. Because religion is often an integral part of the values set of a local culture, counterinsurgents conducting mission preparation and analysis examine the religion in an area of operations. Religion can also play an important role in creating peace and stability. Religion can create cultural instability, but in many cases it can alleviate problems in a society and be a unifying force. Many religions have messages and themes of pacifism and forgiveness. In many insurgencies, religious leaders have played an essential role in ending conflicts. The effect of a religion has to be understood within that religion and within that society. Counterinsurgents conducting a mission analysis may find that insurgents are using a radical interpretation of a religious text to incite violence. This can be countered by empowering indigenous religious leaders who promote a different interpretation. For example, radical Muslims may cite texts from the Quran that justify violence, but they may ignore the passages taught by more moderate Muslims that advocate compassion, peace, and human dignity. ORGANIZING TO UNDERSTAND CULTURE 3-16. There are three important methods for trying to understand the cultural element of a counterinsurgency. First, all counterinsurgents must make every effort to experience and understand the local culture, including by trying local food and learning local languages and customs. Second, commanders can organize their staffs in order to concentrate on cultural understanding and inject this understanding into their unit’s plans and operations. Third, commanders can rely on an outside capability to allow commanders and staffs to understand the culture. Two techniques that involve organization of staffs or outside capabilities are— * Green cell and cultural advisor. * Human terrain systems.
3-24
49
Culture GREEN CELL AND CULTURAL ADVISOR 3-17. The purpose of a green cell is to consider the population in order to promote a better understanding of the environment and the problem. At a minimum, the green cell provides for the independent will of the population. Planning teams must develop an understanding of civilian aspects of the area of operations and the will of the population. There are many techniques to achieve this capability, and each unit may approach this differently based on resources and available qualified personnel. Two techniques of note are the green cell and cultural advisor. (See MCWP 5-1 for more information on green cells.) 3-18. A green cell is an ad hoc working group consisting of individuals with a diversity of education and experience capable of identifying and considering the perspective of the population, the host-nation government, and other stakeholders within an operational environment. Ideally, a green cell is composed of individuals with cultural expertise across all warfighting functions. If a whole-of-government approach is used, experts from other government agencies such as the Department of State should be included in the cell. The green cell cooperates closely with the other members of the planning staff so that cultural factors are considered throughout the range of military operations. The green cell also interfaces and coordinates with joint and interagency groups, drawing upon the collective knowledge and experience of the Department of State, nongovernmental organizations (NGOs), and foreign resources, such as provincial reconstruction teams. (See MCWP 5-1 for more information on green cell activities.) 3-19. The commander forms the green cell during the receipt of mission and problem framing planning steps to add to the commander’s and the operational planning team’s cultural understanding of an operational environment. In order to support the operational planning team, the green cell understands the operational planning team’s mission and tasks and is able to translate cultural information in a way that is relevant to the mission. 3-20. The cultural advisor is a concept developed and employed in Operation Enduring Freedom in Afghanistan. Cultural advisors are the principal subject matter experts on culture and planning related to their designated geographic region of expertise, serving as the cultural and language advisors to the commander. The cultural advisor is a special staff officer for the commander and a member of the planning staff. This person not only serves on the planning staff, but also deploys and serves as an ongoing advisor to senior leaders while they are in theater, if needed. The advantage of having a cultural advisor on staff is that this advisor can often help explain to the commander what the advisor sees on the ground in the area of operations. A foreign area officer or a civil affairs Soldier may be a good selection for a cultural advisor. Both can provide an understanding of the host nation and its specific regional, religious, and ethnic differences, and they may have foreign language skills. As a result, the commander can adjust operations in response to a culturally challenging environment. 3-21. Overall, there are many options to task-organize staffs to incorporate culture into planning. While a green cell creates expertise in one part of the staff, those concerns are also important for other staff sections. It is important for commanders to create staffs that are well integrated across the warfighting functions. One danger of creating a cultural cell within the staff is that it will relegate cultural concerns to one staff element and inhibit cultural concerns being integrated into the planning process. Commanders ensure that the staff integrates all operational and planning concerns, including cultural concerns. 3-22. Regardless of the particular planning configuration, commanders and planners find and use whatever cultural resources are available to the unit. Commanders and staffs incorporate culture into planning during the beginning of mission planning in order to understand an area of operations prior to developing any course of action. Success is recognized not by stand-alone briefs that describe the culture of an operational environment, but when all of the operational planning teams’ planning products reflect and have been informed by the cultural analysis that has been performed by subject matter experts. HUMAN TERRAIN SYSTEM 3-23. The human terrain system provides tactical to strategic level support to commanders. The human terrain system conducts field research and analysis of the local population to determine the civil considerations in order to help commanders better understand the operational environment from the population’s perspective and assess how actions will potentially impact and be perceived by the local population.
3-24
50
Chapter 3 3-24. A human terrain team typically consists of a team leader, one or two social scientists, and one research manager. When manning demands permit, human terrain team personnel are recruited and deployed to promote engagement with elements of the population that typically have restricted access. For example, in Afghanistan at least one woman is assigned per team to facilitate access to females within the local population. 3-25. Human terrain teams, part of the human terrain system, represent a capability that traditionally falls outside of military expertise. These teams are an additional enabler for commanders to gain situational understanding of their operational environments through the socio-cultural running estimate and are an important tool in the military decisionmaking process. (See FM 2-01.3/MCRP 2-3A for more information on human terrain teams.)
3-24
51
PART TWO Insurgencies Part two provides doctrine to help understand an insurgency. While the first part provides the context of an insurgency, the second part provides a discussion of an insurgency within that context. Chapter 4 provides information about insurgency prerequisites and fundamentals. It helps commanders and staffs understand why an insurgency may form and how and why it acts. Chapter 5 then provides a description of an insurgency’s threat characteristics. Chapter 4 Insurgency Prerequisites and Fundamentals 4-1. Several factors are important in analyzing any particular insurgency. Commanders and staffs must perform this analysis within an insurgency’s operational environment. Commanders and staffs consider when an insurgency could start or what the prerequisites are for a particular insurgency. Commanders and staffs also consider a particular insurgency’s strategy and its eight dynamics. This provides a means to analyze an insurgency. INTRASTATE WAR 4-2. One way commanders and staffs view insurgencies is in the context of intrastate conflict. An intrastate conflict is as war or conflict between a constituted government and its people or representative factions from the people. It is a war within a state versus a war between two or more nation states. Intrastate conflict directly relates to insurgencies. Other types of intrastate conflicts are insurgencies that differ only in the amount of popular support or the amount of governmental capacity. Commanders and staffs should not only consider an insurgency as an intrastate conflict. Insurgent movements may operate in multiple countries, as their desired end state may be regional, transnational, or global. The types of intrastate conflicts include rebellions (also referred to as insurrections), revolutions, civil wars, and coup d’états. 4-3. A rebellion (also known as an insurrection) may be fomented by a group that challenges state control. A rebellion is usually manifested by acts of violence when the state is unable or unwilling to address the group’s concerns. Another insurgency may use a rebellion if it can gain enough popular support to engage in large scale unrest or open conflict with the governing authority. Rebellions are forms of insurgency in which an organized group is leading the population, the causes of instability exist, and the movement enjoys some passive support among the population. Under most international laws it is a crime to incite, assist, or engage in violent actions against a constituted government. The Geneva Convention states that “Every government has a right to put down rebellion within its borders and to punish the insurgents in accordance with its penal laws.” (See the final record of the Diplomatic Conference of Geneva of 1949 vol. II section B, page 121 for more information on insurrections.) 4-4. A revolution is a popular insurgency with plans to overthrow a government and transform its society and government from one form of government to another. Revolutions generally evolve from a rebellion, but in revolutions popular support comes in the form of a fully mobilized population, which differs from simply passive or active support. A fully mobilized population is a part of a revolution and it is generally
3-24
52
Chapter 4 seeking fundamental lasting change in a society’s political, economic, or social order. A significant distinction between a revolution and a counterinsurgency is a requirement of the host-nation military, government, and civil authorities to prepare, plan, and conduct counterrevolution, and not simply counterinsurgency. The main difference is the need to reintegrate the mobilized population and not only reintegrate members of the insurgency. Although a coup d’état can resemble a revolution in that it can quickly overthrow a government, this overthrow is generally done rapidly and secretly during a coup d’état versus a rapid fully mobilization of the population during a revolution. 4-5. Civil wars are condition-based conflicts beginning with an insurgency. Once the insurgency achieves certain characteristics of organization and resembles an alternate government, the conflict reaches the state of civil war. This is often characterized by performing tasks associated with a state and having a defined government. If the insurgency loses the ability to meet these criteria, the status or state of the insurgency is no longer that of a civil war. The insurgent movement may attempt to gain outside recognition by calling the conflict a civil war, as a civil war tends to afford international recognition and legal implications as a competing group and not an illegal movement. According to the Geneva Convention, the criteria of a civil war is “that the insurgents must have an organization purporting to have the characteristics of a State; that the insurgent civil authority must exercise de facto authority over persons within a determinate territory; that the armed forces must act under the direction of the organized civil authority and be prepared to observe the ordinary laws of war; that the insurgent civil authority must agree to be bound by the provisions of the Convention.” (See the final record of the Diplomatic Conference of Geneva of 1949 vol. II section B, page 121 for more information on civil wars.) 4-6. Recognized antigovernment elements in a civil war may be classified as belligerents and not insurgencies. A belligerent, though generally a sovereign state, can be a non-sovereign state if it is recognized by the international community (by two or more states or organizations like the United Nations), organized, and is providing services to the population within its controlled areas. In the case where antigovernment forces meet the criteria of a state during a civil war, they achieve sufficient international recognition, and they may achieve belligerent status rather than insurgent status. Although status may change, counterinsurgency operations, by government forces, generally remain the same at the theater through lower tactical levels. The difference between a group being classified as an insurgency or a belligerent can affect the overall status of U.S. involvement, as a belligerent has international recognition. 4-7. +A faction that employs a coup d’état seeks to overthrow the governing authority by a quick decisive action by an internal faction within the government. Usually, this is the military or part of the security apparatus. A coup d’état may or may not result in an insurgency, as part of society may reject the change. Moreover, it is possible for an active insurgency to use a coup d’état to seize control over a government. With a coup d’état, a small group can kill or remove a leader and the leadership’s supporters and assume control of a state. The main point of a coup d’état is that it is a means to change a regime by actors who are part of the government. 4-8. Intrastate conflicts present different challenges than interstate wars, since they often take place among the population and, therefore, human rights violations and sectarian violence are more likely. Secondly, intrastate conflicts can spread to adjacent countries that have governments or portions of the population that share beliefs or goals with one side or the other. 4-9. The nature of an intrastate conflict is a grievance between segments of a state’s population with its constituted government. There can be a single root cause or a variety of causes perceived as so severe that they impact the population’s social contract with its government. There are many likely contributors to intrastate conflicts, including perceived weak, illegitimate, corrupt, or overly oppressive governments, ethnic or racial tensions, religions conflicts, economic stresses, or a need for land reform. Often an intrastate conflict causes the formation and growth of insurgencies and other intrastate conflicts. Commanders and staffs must understand the nature of intrastate conflicts even if they are poorly defined. If a commander and staff misdiagnosis an intrastate conflict, they can fail to properly identify and address the root cause of instability and the nature of the threat.
3-24
53
Insurgency Prerequisites and Fundamentals INSURGENCY PREREQUISITES 4-10. The three prerequisites of an insurgency, opportunity, motive, and means, provide a framework for both planners and executers to plan for and prevent an insurgency. Planners and executers use the prerequisites for planning and execution of operations in environments where insurgencies are likely, such as a post-conflict environment. (See JP 3-24 for a further discussion of insurgency prerequisites.) OPPORTUNITY 4-11. Opportunity refers to the emergence of significant gaps in the ability of the state or its local allies to control its territory and population. States must have the capacity to detect the early stages of insurgent organization and mobilization. This requires the cooperation of a significant portion of the population or the establishment of an extensive program of domestic surveillance and intelligence activities. The state must also be capable of suppressing the insurgency in a way that deters other potential rebels while avoiding contributing to the insurgent narrative and provoking wider resistance. 4-12. For a land force, opportunity provides a means to evaluate the likelihood of an insurgency. For example, after a victory during a major combat operation, if the former government prevented insurgencies by an intelligence program, the commander and staff need to consider how likely and for how long an occupying force can prevent an insurgency without gaining the active support of the population or reestablishing intelligence programs. Understanding the opportunities for an insurgency in an area is essential for land forces. 4-13. At the tactical and operational level, understanding opportunities for an insurgency provides a means for commanders and staffs to analyze the local conditions and the likelihood of a successful insurgency developing. Commanders and staffs actively make assessments on both the support of the population and the intelligence capability and capacity of the local area. If the population is not supportive of the host nation and the host nation has no means to prevent an insurgency in a hostile population, there is an opportunity for an insurgency in that area. (For a further discussion on why a gap in state control might happen, see JP 3-24.) MOTIVE 4-14. A population that has grievances does not necessarily cause an insurgency. Grievances are necessary, but not sufficient, conditions for an insurgency. Poverty, unemployment, economic inequality, inadequate essential services, political marginalization, and repression are commonplace. These conditions exist in many places where an insurgency does not. It takes established or emerging leaders to build a compelling narrative that links grievances to a political agenda and mobilizes the population to support a violent social movement. The narrative explains who is to blame for grievances, how grievances will be addressed, and how the population and insurgency should work together to accomplish the goal. Ideology often provides a coherent set of ideas that provide a compelling framework for a narrative. Where opportunity and motive (grievances) intersect, individuals emerge to attempt to mobilize the population. When grievances mobilize a population, they are a root cause of an insurgency. (See JP 3-24 for a further discussion on motive.) 4-15. The root causes of an insurgency are real or perceived grievances that insurgents use to mobilize a population in support of an insurgency. Insurgents use these grievances to fuel an insurgency. Root causes are not static and can change over the course of an insurgency. As conditions change, insurgent leaders create different narratives to mobilize a population. The root causes that led to the insurgency in the first place may not be the same ones that are sustaining an ongoing insurgency. Commanders and staffs perform continued assessments and reassessments to determine what an insurgency is using as a root cause. 4-16. A root cause can be summarized as a broad perception of injustice linked to the government that insurgents use to mobilize a population. If counterinsurgents take actions such as building schools and roads, or creating jobs, but these actions do not address the perception of injustice, then they will not reduce support for insurgency. Phrased differently, deprivation that is not considered unjust is much less destabilizing than relative prosperity which is considered unjust. It is not the thought "I'm poor" that leads someone to attempt to overthrow or force a change in the government; it is "I'm poor, this is not fair, and
3-24
54
Chapter 4 the government is to blame." The solution to the latter thought is more complex than the solution to the former. 4-17. Identity, based on cultural, religious, or other cultural groupings, can create a strong root cause. In cases where groups are persecuted and underrepresented, the insurgents can use a narrative that uses this underrepresentation or persecution as a root cause against the government. In some cases, groups are concentrated in certain regions where the government exercises biased controls over those groups. This might be an effective root cause to use for an insurgency based on a nullification of government control. 4-18. Religion can also be an effective root cause. Religious-based movements create a perception that a certain type of religion should drive politics and groups should convert to that religion. Insurgents attempt to present their ideology as the true and only correct form of their religion. Insurgents can use religion as part of an identity based root cause if the government persecutes a certain religious group. However, insurgents can also use religion to create an ideology that everyone should be a part of, and governed by, a certain religion. In this case, a religious-based group could seek to overthrow its government and replace it with a religious based government. 4-19. The presence of a foreign force can be the root cause of an insurgency. The presence of foreign military forces can also be used as a means to mobilize popular support. The presence can come after a major combat operation that replaces a government. As such, any major combat operation should include planning for stability operations to prevent an insurgency. However, this could also be a root cause if there are Soldiers or Marines stationed in a host nation. Insurgents can use the perception that outsiders exploit the host nation or that the host-nation government excessively caters to foreigners as a root cause. 4-20. Land disputes concerning ownership, usage, and rights, especially to agrarian, mining, or other land based livelihoods or identities, can be used as a root cause. Land disputes often manifest themselves as an issue of income inequality. For example, landowners may have tenant farmers that pay the landowners’ rents. Insurgent groups can often use a narrative that exploits unequal land ownership as a root cause, and promises redistribution of land and land reform to the tenant farmers as an effective justification for the farmers to join the insurgency. 4-21. Corruption of the host-nation government can be a root cause. If institutional corruption is systemic, ongoing, and considered unfair, insurgents can use that as an effective narrative. For example, corruption in government development programs can cause resentment by the aggrieved group. Corruption can lead to loss of host-nation legitimacy and can undermine government control of an area. 4-22. Insurgents can use a gap between a population’s expectations and the government’s capability to meet those expectations as a root cause. The larger the gap, the greater the population’s perceived or real sense of deprivation. This allows for the development of a narrative in which the insurgents promise to close the gap. MEANS 4-23. It takes considerable resources to mount a violent challenge to the incumbent political authorities and the methods an insurgency uses to secure those means determines a great deal about its behavior. The leaders of a potential insurgency must assemble and organize personnel, funds, weapons, and systems of secure communications and logistics. The other prerequisites relate to the means. For example, recruiters can use existing social networks to find new recruits. (See JP 3-24 for a detailed discussion on means.) 4-24. Commanders’ and staffs’ planning efforts should consider how an insurgent movement resources itself. An insurgency will often depend on a local population for resourcing and recruitment. In these cases, insurgents base an insurgency on social relationships to include, but not limited to, villages, clans, tribes, ethnicities, or other groups. These groups will often freely give resources, but some coercion may be used. In the cases where resources are freely given, the insurgency may have legitimacy. However, the use of local resources also restricts an insurgency. For resources to be given freely, the insurgent is constrained by the social norms of the groups. Moreover, because an insurgency may be seen as aligned to a certain group, there is a certain amount of difficulty expanding the insurgency beyond its core group. 4-25. A local area’s insurgency and population could connect, through communications, with its diasporas and attain resources from around the world. If its diasporas relate to the struggle, they may freely give
3-24
55
Insurgency Prerequisites and Fundamentals financial aid to an insurgency. In such cases, commanders and staffs need to determine possible means to undermine this support. For example, the use of counter threat finance may prevent this funding. On the other hand, resourcing can be local. Insurgencies can have access to black markets or other resources that they can use to buy weapons. In these cases, stopping these transactions may be an effective means of blocking insurgent resources. 4-26. An insurgency with state sponsorship has important advantages and disadvantages. State sponsorship can offer resources, sanctuary, and training. These are important advantages for any insurgency because they offer an insurgent group the ability to organize and become tactically and operationally more effective. On the other hand, state sponsorship can undermine the support of the local population. An insurgency that depends on outside state support can be perceived as artificial and may not have deep support from the local population. While recruits may join an insurgency by increased resources, recruits attracted because of the possibility of wealth may be less effective. However, if an insurgency uses outside support to build a political base before starting military operations, insurgents mitigate these risks. For the counterinsurgent, understanding the nature of state support allows the commander and staff to undermine that support before an insurgency begins. 4-27. A group that already has resourcing could potentially become an insurgency. Groups tied to black markets, such as those selling drugs, may seek to resist or nullify the government’s ability to stop their activities. While they may exploit the population and create a root cause, the protection of their resources is the essential reason for the development of their insurgency. The means for an insurgency can play an interrelated role with the motive and opportunity. 4-28. When commanders and staffs desire an additional method of analysis other than opportunity, motive, and means, the prerequisites of an insurgency can be represented as a vulnerable population, leadership for direction, and a lack of government control. A population is vulnerable if the people have real or perceived grievances that insurgents can exploit. Moreover, there must be an insurgent leadership element that can direct the frustrations of a vulnerable population. The insurgency must act on real or perceived lack of governmental control, which can allow insurgents to operate with little or no interference from security forces or other agencies. This means that the government is not providing for the people. This may refer to inadequate services or an overly harsh and repressive government. When all three exist in an area, an insurgency can operate with increased freedom of movement, gain the support of the people, and become entrenched over time. INSURGENCY FUNDAMENTALS 4-29. Few insurgencies fit neatly into a rigid classification. However, insurgencies do have common characteristics that can provide a basis for building a more accurate picture of an insurgency and help commanders understand the situation. The fundamentals of insurgencies help commanders and staffs analyze insurgent strategies, objectives, and tactics. Each fundamental is important independently, but analyzing the interactions and relationships between the fundamentals as a whole is the key to understanding an insurgency. The two insurgency fundamentals are— * Insurgent strategies. * Dynamics of insurgency. INSURGENT STRATEGIES 4-30. An insurgency’s strategy is determined by its own ends, ways, and means. There are a range of ends an insurgency might seek, to include replacing the state, separating from the state, changing the policy of the state, nullifying state control in an area of a state, and securing a place in a state’s political system. These basic ends will influence the ways an insurgency uses. However, that influence is not deterministic, and the way an insurgency fights is also influenced by its resourcing. In addition, the relationships between an insurgency’s ends, ways, and means is also influenced by numerous important variables. Those variables include but are not limited to— * How an insurgency gains legitimacy and controls a population. * Whether the insurgency is political centric, violence centric, or economic centric. * The relationship of the insurgency to the economy.
3-24
56
Chapter 4 * Organization. * Sense of time. * Adaptability. Insurgent Legitimacy and Control 4-31. How an insurgency gains legitimacy and controls a population within a society helps determine strategic behavior. Some insurgencies have a clear political message and bring that message to their society. Others may try to use economic black markets and the wealth that comes from them to make their population dependent on the insurgency. Others may try to use coercion to control their society. Most will use a combination of many different methods. However, how an insurgency controls the local population or tries to gain legitimacy helps determine that insurgency’s strategic behavior. Political, Economic, and Violence-Centered Insurgencies 4-32. +All insurgencies have a political aim which may be to change their society or simply to protect a black market. While all insurgencies involve violence, politics, and economics, some insurgencies are focused on politics, some are focused on violence, and some are focused on economics. This can change over time. Many insurgencies develop well defined political goals which shape their strategy and an infrastructure to promote and refine them. In these insurgencies, the role of violence is probably secondary to the role of building political support. In this case an insurgency’s aims are more likely to be changing policy, fighting into the state’s political system, or replacing the state. Violence is likely to be more organized as the political support grows for an insurgency. Other insurgencies are focused on violence, lacking the ability or incentive to build a political infrastructure and gain wide political support. These types of +insurgencies are more likely to develop networked organizations with connections to criminal organizations or other insurgent groups with similar interests. Finally, an insurgency may be focused on economics. These insurgencies are likely to want simply to stop state interferences with their activities. As such, these insurgencies may limit the use of violence, unless the state attempts to interfere with their economic base, whether in the legitimate economy or in black or gray markets. The Relationship of an Insurgency to the Economy 4-33. Commanders and staffs must understand the relationship of the insurgency to the economy to understand an insurgency’s strategic behavior. An insurgency could have little dependence on the local economy and receive all its support from the outside. Insurgents could also gain resources from the formal economy in which they operate and sustain themselves through kidnapping or theft. An insurgency could also maintain an economic base on the black market, or it could control a war economy. In all cases, an insurgency’s relationship with the economy will affect its behavior. For example, if it is dependent on outside support, the aims of its outside support will influence the insurgency’s behavior. Moreover, outside support influences tactical and operational behavior. An insurgency that does not depend on the local population is more likely to use violence against the population. (See paragraphs 2-25 through 2-31 for more information the economic variable.) Insurgent Organizational Structure 4-34. The organization of an insurgency is also important. Insurgent organizations can be conceptualized along a continuum from a formal and hierarchical structure to a networked structure. This structure affects organization because it affects control over actions and the scale of tactical actions. Without a hierarchical structure, it is difficult to control individuals or groups within an insurgency. This leads to attacks that can affect the legitimacy of an insurgency. Moreover, while a networked organization may use terrorist tactics, it is also difficult for a networked insurgency to mass combat power. It is also difficult to negotiate a settlement with a networked insurgency because no single person or small group is in charge. A networked insurgency changes the dynamics of individuals in an insurgency, as no one is likely to be essential to the continuation of a networked insurgency. A hierarchical insurgency may be easier to penetrate than a networked insurgency, as a few individuals may be essential to the insurgency and control the actions of members of the insurgency. (See paragraphs 4-88 through 4-103 for more information on a networked insurgency.)
3-24
57
Insurgency Prerequisites and Fundamentals Sense of Time 4-35. An insurgents’ sense of time will also affect their actions. If insurgents feel time is on their side, they are more likely to adopt a lower risk approach and avoid becoming decisively engaged. If they perceive time as being against them, that will push them towards higher risk activities. Commanders and staffs must determine an insurgency’s perception of time to determine its behavior. (See paragraphs 2-43 through 2-44 for more information on the time variable.) Adaptability 4-36. Adaptability is also an essential element to understanding an insurgency’s strategic behavior. Adaptability determines how well, how often, and how the insurgency adapts tactically, operationally, and strategically. This can be directly linked to the organization of an insurgency. A networked insurgency may be highly adaptable at the operational and tactical level, but not at the strategic level. On the other hand, the reverse may be true for a hierarchal insurgency. 4-37. An insurgency's strategy is not static, and it can shift. Counterinsurgents must recognize and respond to shifts in strategy. As the operational environment changes, it can affect an insurgency’s resourcing, the ways an insurgency attempts to achieve its ends, and its calculation of what its ends should be. In a networked insurgency, different elements of the insurgency may evolve differently than other elements of the insurgency. An insurgency is not static, and it continues to evolve as conditions evolve. Insurgent Approaches 4-38. An insurgency might take several approaches to achieve its objectives. In many insurgencies, different elements of the same insurgency or related insurgencies will have different strategic calculations. Commanders and staffs must understand an insurgency’s approach to develop effective programs that attack the root causes of that insurgency. Commanders and staffs combine their understanding of the insurgent’s ways to accomplish its ends, with the insurgent’s means to pursue those ends, to provide the most probable and dangerous course of action for all insurgencies operating in an area of operation. This provides an understanding of the insurgency’s approach. 4-39. Commanders and staffs must understand the insurgent’s ends to understand the insurgent’s decisionmaking process, capabilities, future actions, current tactics, method of command and control, recruiting, propaganda, and use of the local population. Examining the ends of an insurgency and the insurgents’ attempts to achieve those ends through various ways, including combat actions, propaganda, and subversion, enable counterinsurgents to undermine the enemy’s decisionmaking process. The insurgents’ strategic ends may be overt and publicly championed or covert. Insurgent operations may have immediate consequences or delayed effects aligned with long-term objectives. For example, car bombings among a local population may seem counterproductive because they incite immediate anger against the bombings and their perpetrators. However, a sustained campaign of massive violence can have two long-term results, it can— * Weaken popular support for the government, which has failed to protect the people. * Make the population susceptible to insurgent intimidation. Whatever the insurgent’s ends, approaching the problem from the perspectives of the insurgent and the population can provide counterinsurgents the means to interdict the threat on a number of levels. 4-40. Counterinsurgents are likely to face insurgents who use several different approaches to achieve their ends. Some common approaches at the tactical level and operational level are the urban (terrorist), military focused, protracted, and subversive approaches. The urban (terrorist) and military focused are considered basic approaches and the protracted and subversive are considered advanced approaches. Basic approaches refer to the insurgent capabilities needed to achieve long-term strategic objectives. Basic approaches do not mean insurgents are not efficient in tactics or other skills, but overall they lack the means to pursue a more advanced approach towards achieving their goals. In contrast, advanced approaches probably have political wings that govern the militant side of the movement and are focused on longer-term political goals. 4-41. Insurgents may use different approaches at different times, applying tactics that take advantage of circumstances. Insurgents may also combine a number of methods that include tactics drawn from any or
3-24
58
Chapter 4 all of the other approaches. In addition, different insurgent forces using different approaches may form loose coalitions when it serves their interests; however, these same coalitions may fight among themselves, even while engaging counterinsurgents. A single area of operations may have multiple competing entities, each seeking to maximize its survivability and influence, and this situation may be duplicated several times across a joint operations area. This may further complicate understanding both the insurgency and the counterinsurgent operations necessary for success. 4-42. The urban (terrorist) approach is an approach in which insurgents attack government and symbolic targets (for example an important religious building) to cause government forces to overreact against the population. The insurgents want the government’s repressive measures to enrage the people so that they rise up and overthrow the government. Although this type of method may develop popular support against a government that is particularly brutal or corrupt, it may only result in shallow support for the insurgency. The population may only see the insurgency positively because of the brutal response, not because they identify with the insurgency. 4-43. An insurgency uses the military-focused approach to achieve its policy goals by military success. In this approach, insurgents’ efforts focus on causing the government to lose legitimacy by military success and inspiring a population to join the insurgents against the government. The most important idea behind a military focused method is that it does not require building political support among the population. Instead, military success and action will gain the support of a population. 4-44. A protracted approach is an advanced approach based on Mao Tse-Tung’s theory of protracted popular war. It attempts to lengthen the conflict as much as necessary to assemble the resources and forces necessary for success and to wear down the counterinsurgent forces and their political leadership. The protracted war method is based upon three distinct phases: latent and incipient, guerrilla warfare, and war of movement. Each phase builds upon the previous phase and continues activities from all or some of the previous phases. The protracted method requires both a political wing and a military wing. 4-45. The subversive approach is another advanced approach. A subversive approach attempts to subvert the government from within by using its political arm to become a legitimate political party and enter the government. Subversive activities may occur as part of other ways, particularly the protracted war approach. DYNAMICS OF INSURGENCY 4-46. Commanders and staffs must understand the nature of an insurgency when conducting a counterinsurgency. This requires understanding insurgent strategy. However, to understand an insurgent’s strategy, commanders and staffs must understand insurgency dynamics. The dynamics of insurgency is a framework for understanding an insurgency. 4-47. An operational environment may have multiple insurgent groups. These groups may be pursuing a wide variety of goals and interests. As such, these groups may be collaborating, fighting each other, or acting neutral towards each other. When commanders and staffs analyze an insurgency, they consider each group and provide a different analysis for each group based on the eight dynamics of insurgency. 4-48. Eight dynamics or some combinations of these dynamics are common to most successful insurgencies. These dynamics provide a framework for planners to analyze insurgencies. Each of these dynamics can contribute to the strength of an insurgency, but each can also be used to find fracture points and weak points in an insurgency. Fracture points are points of internal division within the insurgency. A weak point is an underlying weakness, such as access to resources, of the insurgency. The eight dynamics are— * Leadership. * Ideology. * Objectives. * Environment and geography. * External support. * Internal support.
3-24
59
Insurgency Prerequisites and Fundamentals * Phasing and timing. * Organizational and operational patterns. First Dynamic—Leadership 4-49. A group committing random violence is not an insurgency. In an insurgency, there is a political rationale behind the violence. An insurgency requires leadership to provide vision, direction, guidance, coordination, and organizational coherence. Leadership is required to mobilize the population by using a root cause. Leadership is needed organize tasks to undermine the legitimacy of the host nation and to establish legitimacy or acquiescence to their movement. The ability of insurgent leaders to organize and their willingness to distribute power across their organization is vital to the long-term success of their movement. Organizations dependent on key charismatic personalities to provide cohesion and motivation for their movement are vulnerable to disruptions if those leaders are co-opted or killed. 4-50. The political leadership can be the same as its military leadership. However, sometimes this is not the case and there is well-defined political leadership. When an insurgency has well-defined political leadership, that leadership is called the political cadre. The political cadre may participate in the political system or it may be clandestine and illegal. In either case, counterinsurgents define the political cadre of an insurgency when there are insurgent leaders who are mainly involved in the political struggle and not the armed struggle. 4-51. The political cadre are the force behind the ideology of an insurgency. They are actively engaged in the struggle to accomplish insurgent goals. They may also work within a political party to work within the political system and provide some legitimacy for the insurgency to the population. The cadre is active in spreading the ideology of the insurgency, if the insurgency has an ideology. Modern noncommunist insurgencies rarely, if ever, use the term cadre; however, these movements usually include a group that performs similar functions. In a movement based on religious extremism, religious leaders can play a role similar to political cadre. 4-52. The leadership of an insurgency is composed of leaders from the political cadre, guerrillas, and auxiliaries. These may or may not be the same individuals. Moreover, they may work closely together or operate in a decentralized manner, depending on their need for security or other operational concerns. Insurgent leaders usually exercise leadership through force of personality, the power of revolutionary ideas, and personal charisma. In some insurgencies, they may hold their position through religious, clan, or tribal authority. These leaders may include supporting members, much like command and staff in a regular military. These supporting members may include advisors, logistics and administration personnel, spokespersons, and those leading operations. Insurgent leaders may attain positions within the government and work to undermine the government. 4-53. Poor leadership can undermine an insurgency. Insurgent leaders who undermine their own legitimacy with the population, for example, will significantly hamper the success of their insurgency. An analysis of insurgent leadership provides information on how effective its leaders are in mobilizing the population and effectively using resources to undermine the host nation. Second Dynamic—Ideology 4-54. The insurgents must have a problem that justifies their actions in relation to the population’s grievances and explains what is wrong with the status quo. Insurgents use a narrative to connect a population’s grievances with its actions and demands. When an insurgency uses a narrative to mobilize a population, these grievances become root causes. An essential part of the ability of an insurgency to mobilize a population is an insurgency’s ideology. An ideology is the integrated assertions, theories, and aims that constitute a sociopolitical program. Not all insurgencies are ideological, but an ideology provides an insurgency with a message of change that is normally coherent and logical, based upon the insurgency’s underlying assumptions. 4-55. Ideology is a factor that unifies the many divergent interests and goals among the insurgency’s members and the general population. As a common set of interrelated beliefs, values, and norms, ideology is used to influence the behavior of individuals within the group. It explains how the world works. Ideology
3-24
60
Chapter 4 can serve as a rallying call for all members of the population to join a struggle. Commanders and staffs answer several questions when analyzing insurgent ideology: * What is the problem the insurgents will fix, and how will they fix it? * Are there any ideological divisions within the insurgency or the population? * Is the ideology supported by outside groups? * What propaganda are the insurgents using to propagate their ideology? Third Dynamic—Objectives 4-56. Insurgencies can have strategic, operational, and tactical objectives. Tactical objectives most directly translate to actions. For example, a tactical goal of destroying a logistics convoy directly translates into an attack against a logistics convoy. However, these actions are normally performed to achieve an operational objective. In the example of the attack on the convoy, the operational objective might be to prevent logistic support of host-nation forces. When insurgents achieve various operational goals, they can achieve the strategic end state of their insurgency. 4-57. A strategic objective is the movement’s overall political goal or desired end state. An insurgency will seek to— * Force significant political, economic, or religious change. * Overthrow the existing social order and reallocate power. * Generate resistance to outside occupiers or change within a society. * Nullify government control in an area. * Cause a region to secede. 4-58. An insurgency’s strategic objectives will influence the type of insurgency that develops, and its ideology will influence an insurgency’s end state. For example, an insurgency focused on resistance against outside occupiers or change in a society may unify many different groups based on that shared end state. The strategic end state of the insurgency may be as simple as resistance to occupation or a conservative insurgency’s general resistance to change in a society. Groups that seek to nullify government control may have an objective of protecting criminal activities and black markets. These groups may be non-ideological, but they will still need to mobilize the population to nullify governmental control. On the other hand, groups that wish to force significant change in a society or overthrow an existing social order are likely to be ideologically driven. There is a connection between an insurgency’s strategic goal and an insurgency’s ideology. Fourth Dynamic—Environment and Geography 4-59. The environment and geography affect insurgent actions. Insurgencies may form their base in urban environments, rural environments, or in a combination of both. Insurgents located in rural areas can enjoy the relative safety of remote terrain or safe heavens, such as jungles or mountains. These geographical conditions make it possible for them to form larger units and conduct larger-scale operations. However, there are some disadvantages to a rural based insurgency. Communications and supply lines are longer and slower. Insurgents can be isolated from the population, and an insurgency can be destroyed with a decisive military operation. 4-60. Urban insurgencies tend to operate within ethnic ghettos or enclaves of sympathetic supporters. Operating in urban settings requires a high degree of compartmentalization, which makes it difficult for groups to train and organize for larger-scale operations. Urban insurgencies often operate in small cells. However, an urban setting does allow an insurgency to work within large population groups. The opportunity for mobilization of the population is therefore higher than in a rural insurgency. Historically, urban insurgencies have been easier to destroy than rural insurgencies. The lack of isolation is an advantage for counterinsurgents because they can apply constant pressure on the urban population to undermine the insurgency. 4-61. Other factors of the area of operations may affect an insurgency. Tribal, religious, and social factors have relationships with insurgencies. The physical environment also effects insurgent movement and
3-24
61
Insurgency Prerequisites and Fundamentals planning. Commanders and staffs must understand the connections between a physical environment and its effect on an insurgency. (See chapter 2 for more information on a physical environment.) Fifth Dynamic—External Support 4-62. Historically, insurgencies are less likely to succeed without some form of external support. This support can be in the form of— * Moral support. * Political support. * Resources, such as money, weapons, food, advisors, training, and foreign fighters. * Sanctuary, such as secure training sites, operational bases over a border, or protection from extradition. 4-63. Governments providing support to an insurgency normally share interests or a common ideology with the insurgency. Ethnic enclaves or diasporas in third-party countries can provide significant support, even if a country’s government is not actively supporting an insurgency. For example, global diasporas can provide significant resources for an insurgency, even if no government is providing active support. (See FM 3-05, chapter 2, for more information on unconventional warfare.) 4-64. +However, with external support comes a degree of dependency on that support. Limiting access to external support is a possible means of influencing or changing the actions of an insurgency. Limiting external support provides one means to affect an insurgency indirectly. External support can help to shape an insurgency and the outcome of an insurgency. In the case of the insurgency in Sri Lanka, external support was essential to the success of the Liberation Tigers of Tamil Eelam. Large diasporas provided the Liberation Tigers of Tamil sanctuary and resources. This allowed them to gain dominance over other insurgent groups and to wage a long and bloody insurgency against the government of Sri Lanka.
3-24
62
Chapter 4 External Support for the Tamil Tigers Eleven years of discrimination by the Sinhala majority against the Tamil minority reached a breaking point in Sri Lanka during the Black July riots of 1983. Soon after, the Liberation Tigers of Tamil Eelam emerged as the most capable Tamil insurgent group, prepared to wage a campaign of violence and terror against the Sri Lankan state and non-Tamil civilians. The operational environment was complex, with insurgents fighting insurgents while also fighting the government, as occurred with Sunni and Shia groups in Iraq. At various stages of the conflict, the Liberation Tigers of Tamil Eelam fought against the Sri Lankan state but also against other antigovernment insurgent groups. The most prominent of these groups was the Janatha Vimukthi Permuna, a Marxist-Leninist group that blended violence and left-wing politics before laying down its arms in the mid to late 1990s. This case illustrates the importance of non-state actors in an operational environment. While the Liberation Tigers of Tamil Eelam was indeed a non-state actor in its own right, the group relied on its global diaspora for a range of support activities. Following the ethnic riots of 1983, thousands of Tamil refugees fled overseas to India, Australia, Canada, and the United Kingdom. This sowed the seeds for the Tamil diaspora and the transnational nature of the Liberation Tigers of Tamil Eelam’s insurgency. The global diaspora was a major part of the organization’s fundraising and propaganda network. Furthermore, the transnational diaspora network provided funding and weaponry to sustain the Tigers for most of the group’s existence. In addition to enjoying the largesse of a well-organized and entrepreneurial diaspora, the insurgents relied on co-ethnics in India for sanctuary, which was essential in the group’s early years. Since the Tamils effectively controlled the Jaffna peninsula in the northeast of the country, the Liberation Tigers of Tamil Eelam had a home base from which it could train, plan, and execute attacks against the military. Furthermore, across the Palk Straits in Tamil Nadu, India, the Liberation Tigers of Tamil Eelam was able to rely on the support—both active and passive—of thousands of ethnic Tamils who sympathized with the group. The Liberation Tigers of Tamil Eelam took advantage of the benefits of globalization, developing a truly global network of contacts abroad, and soon engaged in weapons procurement activities throughout East and Southeast Asia, in Afghanistan, Pakistan, Ukraine, the Balkans, Lebanon, and other well-known arms markets. At various points throughout the insurgency, the Tigers collaborated with other terrorists groups as diverse as the Revolutionary Armed Forces Colombia, the African National Congress in South Africa, Moro Islamic Liberation Front, Hezb-i- Islami Gulbuddin in Afghanistan, the Japanese Red Army, and the Popular Front for the Liberation of Palestine. In 1996, the insurgents acquired U.S. Stinger-class missiles from the Kurdistan Worker’s Party and used these weapons two years later to shoot down a Sri Lankan civilian Lionair jet. Over time, the Liberation Tigers of Tamil Eelam distinguished itself as perhaps the most lethal insurgent force in modern history. By the mid-late 1990s, the group boasted a navy, an air force, and an elite suicide commando unit used to assassinate several heads of state and numerous counterinsurgency force commanders. As a pioneer of suicide techniques, the Tamil Tigers devoted significant resources to two operational wings that functioned as suicide strike teams, the Black Tigers and the Sea Tigers. A “no-holds barred” approach to the conflict led the counterinsurgency force and the insurgents to routinely and systematically slaughter each other, while also destroying Sri Lanka’s infrastructure and displacing much of its civilian population.
3-24
63
Insurgency Prerequisites and Fundamentals Sixth Dynamic—Internal Support 4-65. Internal support is any support provided from within the borders of the state where the insurgency is active. An insurgency must have some internal support, even if it is limited. The level and type of support varies by insurgency and area. Counterinsurgents must understand the specific nature of the support to address and counter the relationship between the population and insurgents. This support may be either willing or based on coercion. 4-66. A large populated area or region where insurgents can operate represents many different communities that provide varying levels of support for different reasons. There are two types of internal support: active and passive. Passive support is critical for successful insurgent operations. It provides freedom of movement for members of the insurgency to reside, train, plan, and conduct operations in an area without resistance from the local community. Passive supporters do not report insurgents to local counterinsurgent forces out of sympathy for the cause, antigovernment sentiment, reluctance to get involved due to peer pressure, threats of violence, or the benefits that the insurgency provides. 4-67. Active supporters provide open sympathy to the insurgency, participate in insurgent operations, and find new recruits. Active supporters are usually central to the insurgency’s propaganda efforts. They may provide material, intelligence, or assistance as requested or demanded by insurgents. Active support, like passive support, may be volunteered or coerced. 4-68. When analyzing the type and amount of support an insurgency has, possible indicators are: * Reduction in local medical supplies or personnel absent from clinics and hospitals. * Increased black market activities and extortion for resources. * Increased theft or purchase of food and gas. * New presence of bodyguards. * New areas in which the local police are growing reluctant to patrol or conduct operations. * New or increased interaction with local civilian leaders by insurgents. * Intelligence confirming the presence of insurgents in areas where people gather and communicate. * Increased assassinations of those opposing insurgents or for symbolic value to frighten locals. * A drop in the number of walk-ins and tips due to fear of retribution. * A rise in the reluctance of local civilians to be seen talking with counterinsurgent forces. * An increase in the absence of local reconstruction crews, police, and military or a decrease in their willingness to be associated with counterinsurgent forces or to leave their families. * Suspension of local government or community meeting and events. 4-69. There is a relationship between internal and external support. Insurgents must have significant strength in at least one of these dynamics (internal or external support) or they will not be able to meet their tangible support needs. Both of these dynamics must be controlled and reduced in order for the counterinsurgent to prevail; just eliminating internal support is not enough to defeat an insurgency with robust external support (and vice versa). Seventh Dynamic—Phasing and Timing 4-70. Successful insurgencies often progress through three phases (latent and incipient, guerrilla warfare, and war of movement). Not all insurgencies progress through all three phases, and progression through all three phases is not a requirement for success. Insurgent success can occur in any phase. In addition, insurgencies can revert to an earlier phase and resume development when favorable conditions return. 4-71. Movement from one phase to another phase does not end the operational and tactical activities of earlier phases; it incorporates them. Therefore, it is difficult to determine when an insurgency moves from one phase to another. In addition, a single insurgency may be in different phases in different parts of the country. Advanced insurgencies can rapidly shift, split, combine, or reorganize; they are dynamic and adaptive.
3-24
64
Chapter 4 4-72. The first phase is latent and incipient. During this phase, activities include the emergence of insurgent leadership, creation of initial organizational infrastructure, training, acquisition of resources, and political actions, such as organizing protests. A group that eventually becomes members of an insurgency may simply be a legitimate political group at this stage. Governmental actions and changes in society can transform political groups into insurgencies. 4-73. The second phase is guerrilla warfare. In this phase, successful insurgents use small-unit tactics to attack security forces while continuing ongoing political efforts. Their goal is to undermine the government’s legitimacy and replace the government’s legitimacy with the population seeing the insurgency as legitimate. In this stage, insurgencies may begin performing limited governmental functions for the population in areas they control. 4-74. The third phase is war of movement. During this phase, an insurgency may be trying to overthrow a government or trying to force the withdrawal of an occupying power. For success, an insurgency does not necessarily need to transform into a conventional military, but it must position itself to defeat the government or occupying power. However, this phase may not be needed. In some cases, all an insurgency must do is create a continual problem that cannot be solved and wear down the patience of the counterinsurgents. This is especially true when the counterinsurgents are directed by an outside power. This phase is characterized by increased military capability, popular support, logistics capacity, and territorial control. 4-75. Many successful insurgencies go through a process similar to these three phases, but this is not a uniform rule. Some insurgencies, for example, form rapidly and displace a government quickly. Figure 4-1 provides a model for understanding the possible evolution of insurgencies. This model provides a simplification of reality in order to understand and analyze a phenomena. A phase-like evolution of an insurgency tends to create a strong political and military organization with deep roots in a society. Such organizations are difficult to undermine. However, historically the most likely outcome of an insurgency is its rapid defeat. These insurgencies demonstrate little phasing beyond the beginning of violence followed by the quick defeat of the insurgency. (See figure 4-1.)
3-24
65
Insurgency Prerequisites and Fundamentals Figure 4-1. Conflict resolution model Eighth Dynamic—Organizational and Operational Patterns 4-76. Each insurgency’s organization is unique. The specific type and level of organization is an indicator of the insurgents’ strategy and capabilities. Understanding an insurgency’s organizational and operational patterns helps counterinsurgents predict the enemy’s tactics, techniques, and procedures, understand their capabilities, and identify potential targets. 4-77. Insurgents may be organized into networks and require certain elements, characteristics, bonds, and conditions to operate and survive. A network is a series of direct and indirect ties from one entity to a collection of entities. There may be a central point of communication or influence (critical node) that provides a critical vulnerability for targeting against the network. Insurgent networking extends the range and variety of both insurgent military and political actions. Networks of communications, people, and activities exist in all populations and have a measureable impact on the organized governance of a population and, consequently, military operations. These networks tend to heal, adapt, and learn rapidly. They may be a combination of insurgent, criminal, regular, or irregular forces, and foreign government sanctioned forces. These networks exist within a population. Existing within a population enhances their
3-24
66
Chapter 4 capabilities to sow disorder, survive, and protract the struggle, presenting particularly difficult problems for counterinsurgency forces. (See paragraphs 4-88 to 4-103 for more information on networked insurgencies.) Organizational Elements 4-78. The basic organizational elements of an insurgency are the movement’s leadership, guerrillas, auxiliary forces, and underground elements. While there are almost certainly members of the insurgency who perform multiple functions, grouping an insurgency into these groups provides a model of understanding how an insurgency functions. However, commanders and staffs must avoid the trap of mirror imaging an insurgency against U.S. organizational structure. These groupings help the commander understand groups that are involved in the various functions of an insurgency, but commanders and staffs need to realize that insurgencies normally do not have fixed organizational structures. (See figure 4-2.) Figure 4-2. Organizational elements of an insurgency Leadership 4-79. An essential element of any insurgency is its leadership and its leadership structure. This can vary greatly and is dependent on whether the insurgency is a networked insurgency or a hierarchical insurgency. However, because of its importance, it is covered under the first dynamic. Guerilla Units 4-80. Guerrillas are used for a wide range military purposes, but their primary purpose is to achieve a political end. For example, attacks on host-nation forces may undermine host-nation legitimacy among a population and create insurgent safe heavens. Guerrilla units can conduct small-unit tactical operations and can mass for larger operations. Ambushes against convoys are examples of small-unit tactics an insurgent group may use. These tactics have the advantage of preventing an insurgent group from becoming decisively engaged. As an insurgency gains military power, guerilla units increase their ability to conduct large scale attacks. During the final insurgency stage, war of movement, guerilla units can perform actions meant to destroy the host-nation military force. This can be a decisive action for an insurgency. If successful, a war of movement can overthrow the government or allow the insurgency to reach other political goals. However, if the insurgency begins a war of movement too soon, the insurgency can deplete its military power and undermine its political power. Auxiliary Forces 4-81. Auxiliary forces are the insurgency’s support elements. Anyone involved in an insurgency can perform logistic functions, and insurgents are probably involved in both logistics and combat. Creating this division, however, groups certain essential functions of an insurgency in a single category.
3-24
67
Insurgency Prerequisites and Fundamentals 4-82. The auxiliary includes cells and external elements. Cells include logistics, intelligence, counterintelligence, propaganda, population control, and recruiting elements. These are elements that perform tasks directly connected to an insurgency. External elements provide support for an insurgency, but they are not directly part of the insurgency. For example, external elements may include drug smugglers or external support from another state. 4-83. Women can play an essential role in the auxiliary force. Insurgencies generally require a robust system of financing and supply. In many cases, a woman will have greater freedom of movement in a society than a man who is actively engaging government forces. For example, a wife, niece, or daughter of an insurgent might be able to send a message or make financial transitions much easier than the actual insurgent. 4-84. Auxiliary forces also include economic support systems to fund the insurgency’s military and political operations. Economic support systems include— * Fund raising and terrorist finance networks. * Pillaging, looting, extorting, and enslaving a population. * Business operations that include both direct control, joint ventures, and taxation of enterprises in these industries: Illicit trade in commodities and natural resources (such as oil, timber, and diamonds).  Criminal trafficking in narcotics, humans, and arms.  Sanctions busting.  Legal business enterprises (such as oil, shipping, motor transport, and hotels).  Banking and finance operations.  Underground 4-85. Underground cells conduct clandestine combatant and logistics operations in areas controlled by government forces. Combat operations can include sabotage, assassinations, and small arms attacks. Logistic operations can include maintaining safe houses, controlling hostages, moving weapons, and providing communications. Underground cells include intelligence cells, logistic cells, and combatant cells. 4-86. The underground element includes those elements of the insurgency that conduct covert or clandestine activities, especially in counterinsurgent occupied areas. Movement leaders may exist within the underground if they are attempting to keep their affiliation or identity a secret. Insurgencies with effective undergrounds tend to be more compartmentalized, secretive, vetted, trained, and indoctrinated than insurgencies without them. For example, the underground can carry out terrorist acts, if desired, while the insurgency has plausible deniability for these acts. The underground may remain in an area after counterinsurgency clearing operations to gather information, intimidate civilians, attack members of the security forces or government, emplace improvised explosive devices, or perform sniper operations. The underground can be a major part of an insurgency. Its effectiveness (or ineffectiveness) provides counterinsurgent analysts with indicators of the skill, advancement, and strategy of the insurgency. An advanced insurgency with an effective underground is capable of operations and tactics that differ from those of a basic insurgency, with a less capable underground. The underground tends to be the most difficult element to recruit and train; therefore, its size tends to fluctuate with time and capability. 4-87. Underground cells seek to be self-contained; they often have their own leadership, combatants, and auxiliary forces. However, the underground can also use members of the auxiliary to provide materials, intelligence, counterintelligence, and early warning. The auxiliary may also pass messages, propaganda, and disinformation. This use allows the underground to conduct operations in areas where the regular auxiliary is present, but the underground does not have a widespread presence. Networked Insurgencies 4-88. While some insurgencies are hierarchical, it is also likely that an insurgency will be deeply networked into a society. While auxiliary, guerrillas, leadership, and underground elements are a means of viewing the basic functions of an insurgency, many insurgencies in the modern era are learning and adapting networks. An insurgency’s members will often have connections to various resourcing means,
3-24
68
Chapter 4 such as the black markets or diasporas. Moreover, there are normally connections to various parts of a society. Many insurgencies, especially modern insurgencies, have members that perform basic functions but are also networked organizations that are interwoven with their societies. While it is possible for a hierarchical style insurgency to exist, a networked structure is more likely today because of modern communications. 4-89. Networked insurgencies will have many connections to their operational environment. Networked insurgencies are not monolithic, and decisions are made by different elements within the insurgency. Some parts of the insurgency may be willing to negotiate, while other parts may decide to keep fighting. In a networked insurgency, the different elements of an insurgency may have overlapping functions and connections to other similar insurgencies. A networked insurgency adds to the complexity of an area of operations because they are not acting as a unified force and because of their complex set of connections to the rest of society and each other. (See figure 4-3 for an example of a networked insurgency.) Figure 4-3. Networked insurgencies 4-90. For an insurgency, a network is not just a description of who is in the insurgent organization; it is a picture of the population, how it is put together and how members interact with one another. For example, a tribal society already has affiliated social, economic, and military networks easily adapted to warfighting. The ways in which insurgents works within a tribal network is an expression of inherent cultural and social customs. In this example, the social dynamic that sustains ongoing fighting is best understood when considered in tribal terms—in particular, from the perspective of a traditionally networked society. It is the traditional tribal network that offers insurgents a ready-made social infrastructure from which to draw. 4-91. The full functioning of a network depends on how well, and in what ways, its members are personally known and connected to one another. Strong personal ties, often ones that rest on friendship and bonding experiences, ensure high degrees of trust and loyalty. To function well, networks may require higher degrees of interpersonal trust than do other approaches to organization, like hierarchies. Kinship ties are often a fundamental aspect of many terrorist, criminal, and gang organizations. Insurgents often form a