July 12, 2011 in U.S. Joint Forces Command
To understand irregular warfare’s importance to the United States, it is first necessary to understand who is capable of threatening our national security using irregular means. This assessment discusses three types of groups that conduct their conflict with the United States using such means: insurgent groups, violent extremist organizations, and criminal networks. The descriptions we provide here are not intended to be comprehensive definitions, since such definitions would incorrectly imply a consensus among policymakers, officers, and analysts that simply does not exist.
June 20, 2011 in U.S. Army
IED and Sniper Defeat: The Battle Staff Operations Process in a COIN Environment briefing from April 13, 2007.
April 13, 2011 in Afghanistan, North Atlantic Treaty Organization
The Afghanistan Peace and Reintegration Programme (APRP) is active. It provides for both reintegration (where fighters leave the fight and peacefully rejoin their communities) and reconciliation (where entire insurgent groups reach a settlement with GIRoA that ends hostilities). Reintegration is the focus of this guide. Information is presented on the APRP, its place in the COIN Campaign and ISAF‟s role. It provides those in ISAF with what they need to work with community leaders and GIRoA and ANSF partners to build their understanding of the Programme and its opportunities. It is an Afghan Programme and ISAF‟s role is to assist and encourage GIRoA to implement it fully.
January 17, 2011 in U.S. Army
Two unclassified reports from the U.S. Army National Ground Intelligence Center that are part of a series titled “Complex Environments – An Alternative Approach to the Assessment of Insurgencies and their Social Terrain”, from November 2009-March 2010.
October 7, 2010 in U.S. Army
This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.
July 16, 2010 in North Atlantic Treaty Organization
Commander, International Security Assistance Force Campaign Overview June 2010.
July 9, 2010 in Afghanistan, U.S. Army
(U) Many students of insurgency and counterinsurgency attest to the importance of popular support to each side’s quest to achieve its objectives. Key aspects of popular support, including type (passive or active) and scope (limited or significant), are inarguably important in analyzing an insurgency. However, focusing solely or immediately on these aspects risks glossing over insurgent efforts to set conditions necessary to mobilize such support in the first place. Most notably, these conditions include the generation of compliance and the establishment and institutionalization of control.
July 7, 2010 in Afghanistan
Islamic Republic of Afghanistan National Police Strategy, January 2010.
June 9, 2010 in Afghanistan, North Atlantic Treaty Organization
ISAF Afghan National Security Forces (ANSF) Partnering Directive, August 29, 2009.
June 1, 2010 in U.S. Army
A current method used by the Taliban in Afghanistan to gain control of an area deemed of strategic interest to the Taliban leadership, which operates from safe havens in Pakistan or within Afghanistan, is to identify and target villages to subvert. The Taliban have recognized the necessity to operate with the cooperation of the local population, with their modus operandi being to gain villagers’ cooperation through indoctrination (preferred) or coercion (when necessary).
April 16, 2010 in Afghanistan, U.S. Army
FOUO U.S. Army Combined Arms Center: Afghan Counterinsurgency Lessons Brief, February 17, 2010.
April 13, 2010 in U.S. Army
Targets of Psychological Operations
PSYOP can assist counterinsurgency by reaching the following targets:
-Civilian Populace (US & HN)
-External Hostile Powers
March 22, 2010 in U.S. Department of State, United States
Insurgency is the organized use of subversion and violence to seize, nullify or challenge political control of a region. As such, it is primarily a political struggle, in which both sides use armed force to create space for their political, economic and influence activities to be effective. Insurgency is not always conducted by a single group with a centralized, military-style command structure, but may involve a complex matrix of different actors with various aims, loosely connected in dynamic and non-hierarchical networks. To be successful, insurgencies require charismatic leadership, supporters, recruits, supplies, safe havens and funding (often from illicit activities).
October 22, 2009 in Multi-National Corps Iraq
You may DETAIN civilians based upon a reasonable belief that the person: (1) must be detained for purposes of self-defense; (2) is interfering with CF mission accomplishment; (3)is on a list of persons wanted for questioning, arrest or detention; (4)is or was engaged in criminal activity; or (5)must be detained for imperative reasons of security.Anyone you detain MUSTbe protected. Force, up to and including deadly force, is authorized to protect detainees in your custody. You MUST fill out a detainee apprehension card for EVERY person you detain.
September 27, 2009 in Department of Defense
The Joint Prosecution and Exploitation Center (JPEC) synchronizes coalition force (CF) intelligence and criminal prosecution efforts associated with detainees, detainee related evidence, and other battlefield material while also supporting Iraqi Security Forces development of internationally accepted criminal investigative and forensic practices IOT facilitate the growth and development of the Anbar Criminal Justice System and the establishment of the Rule of Law within the province.