Most US personnel that are serving in Afghanistan have already served a tour in Iraq and are accustomed to doing things “the Iraq way”. Many people are trying to apply the lessons learned in Iraq to Afghanistan, which in many cases is inappropriate. AF2 wants to provide a product to US units to compare and contrast Iraqi tribal structure and Pashtun tribal structure to prevent future missteps by US forces.
Senior ranking US military leaders have so distorted the truth when communicating with the US Congress and American people in regards to conditions on the ground in Afghanistan that the truth has become unrecognizable. This deception has damaged America’s credibility among both our allies and enemies, severely limiting our ability to reach a political solution to the war in Afghanistan. It has likely cost American taxpayers hundreds of billions of dollars Congress might not otherwise have appropriated had it known the truth, and our senior leaders’ behavior has almost certainly extended the duration of this war. The single greatest penalty our Nation has suffered, however, has been that we have lost the blood, limbs and lives of tens of thousands of American Service Members with little to no gain to our country as a consequence of this deception.
This hand book synthesizes current doctrine and emerging TTPs into a handbook for units assigned a Security Force Assistance (SFA) mission. Security Force Assistance is not a unit; it is a mission assigned to a unit. Army leaders will assign this mission to Modular brigades more frequently according to the realities of the operational environment. The Modular Brigade, with its broad and flexible command and control structure, is designed to conduct Full Spectrum Operations, which includes Security Force Assistance, but it requires augmentation and specific task organization to effectively accomplish Security Force Assistance tasks.
(U//FOUO) Joint Center for Operational Analysis (JCOA) Civilian Casualties (CIVCAS) Adaptive Learning for Afghanistan
Building on several previously completed studies of civilian casualties (CIVCAS) in Afghanistan, the US Joint Forces Command (JFCOM) Joint Center for Operational Analysis (JCOA) partnered with Ms. Sarah Sewall of Harvard University to conduct an independent and comprehensive assessment of civilian casualties, the Joint Civilian Casualty Study, published in August 2010. The Commander, International Security Assistance Force (COMISAF), responded to this assessment by stating that more work was needed to ensure that the DOTMLPF changes required to reduce and mitigate CIVCAS were institutionalized. Accordingly, COMISAF requested that JCOA, with the support of the Services, conduct a study to “examine the institutionalization of CIVCAS lessons learned into US forces’ preparation for deployment, with a focus on the unique context of Afghanistan.” That study, Adaptive Learning for Afghanistan (ALA), examined ways in which lessons and adaptations in theater were captured, shared, and incorporated into force preparation. In this respect, ALA was not “another CIVCAS study,” but rather, it used CIVCAS as a test case for characterizing the overall process of adaptive learning.
The Marine Corps has a long and storied history of partnering, mentoring, and advising foreign militaries. Marines served as the officer corps of the Gendarmerie d’Haiti and integrated at platoon-level with South Vietnamese Popular Forces. These are only two of many possible examples, but they suffice to illustrate the diversity of relevant Marine Corps experience. This enduring legacy influences Marine counterinsurgency operations in Afghanistan as well as theater security cooperation exercises throughout the world.
Every year as technology grows and advances thus do the threats that surround it. Predicting what new cyber threats to look for may not always be an easy task. By keeping up with the past trends and ever changing current environment, may help to give us a good handle on how to prepare for what may be to come.
U.S. Army TRADOC Intelligence Support Activity (TRISA) Female Suicide Bombers report from January 2011.
Local governance in rural Afghanistan is not simple. Older customary local assemblies operate alongside GIRoA officials, Community Development Councils (CDC’s), and insurgent groups. Although we speak of insurgent governments as “shadow governments,” they rarely exist in the shadows for those over whom they wield power. In villages where insurgents continue to exercise control, the insurgents and not GIRoA perform traditional governmental functions; they levy taxes, resolve disputes (they are, in many villages the only law in town), and maintain local defense forces. Western Powers have invested their hope and their treasure in inventing a new form of local control: Community District Councils that come out of the National Solidarity Program (NSP). Managed by the Ministry of Rural Rehabilitation and Development (MRRD) with funds from NGO’s and from the World Bank, these organizations set priorities for the expenditure of donor money and oversee contracts. Although they offer an alternative to the indiscriminate funding of the past that encouraged favoritism and corruption, these organizations have little authority except when it comes to the stewardship of outside money. As those development funds begin to dry up, will CDC’s vanish? Can they be further empowered?
This publication provides joint doctrine for planning and executing counter-improvised explosive device (C-IED) operations. It outlines responsibilities, provides command and control considerations, discusses organizational options, details the C-IED process and attack the network methodology, and introduces models for coordinating with C-IED supporting organizations.
All assets and capabilities at a commander’s disposal have the capacity to inform and influence selected audiences to varying degrees. While specific assets termed as “information-related capabilities” are information-centric in mission and purpose, others are standard capabilities that inform and influence officers use for planning to support commanders’ information strategy and mission objectives. The primary information-related capabilities that support inform and influence activities typically include, but are not limited to, public affairs, military information support operations, combat camera, Soldier and leader engagement, civil affairs, cyber electromagnetic activities, counterintelligence, operations security, military deception, and others so designated by a commander. In addition to the primary information-related capabilities, there are operational capabilities not solely designed to inform or influence that commanders can designate to assist in achieving mission objectives, such as maneuver forces, engineers, and medical units. Success depends on commanders and staffs effectively employing all available operational assets to best shape the information environment.
U.S. Marine Corps Intelligence Activity (MCIA) “Joint Operational Environment” briefing from 2011.
Operational experiences in Iraq and Afghanistan support the continued need to eliminate barriers to information sharing that currently exist on DoD’s multiple networks. A concerted effort to unify the networks into a single information environment providing timely information to commanders will improve command and control, thus increasing our speed of action. Providing an information technology (IT) / National Security Systems (NSS) infrastructure that is accessible anywhere and anytime is key to ensuring the agility of the Department and allowing our most valuable resources, our people, nearly instant access to the information they need to make decisions in the execution of their missions. In turn, the Global Information Grid (GIG) must be designed and optimized to support warfighting functions of advantaged and disadvantaged users, to include mission partners, across the full range of military and National Security operations in any operational environment. The GIG must also be resilient and able to support the missions despite attacks by sophisticated adversaries.
U.S. military presentation from Multi-National Corps Iraq on “Core Warrior Values Training” which describes that the desecration of dead bodies is a prohibited activity.
Studying past combat helps gain insight into how insurgents may operate in the future. This guide uses short, simple vignettes to highlight common Afghan insurgent tactics. Each vignette focuses on a particular mission profile, such as raids, ambushes, and defending against a cordon and search. While tactics are continually evolving, the Afghans have a well documented history of using similar techniques against foreign militaries. Most of the vignettes in this guide are from the 1980s when Afghan insurgents fought the Soviet Union. Despite being more than 20 years old, many of the tactics remain in use today. For a more complete description of Afghan insurgent tactics against the Soviets, MCIA strongly recommends reading The Other Side of the Mountain by Ali Jalali and Les Grau, which this guide is based on. The final three vignettes in this guide are from recent operations in Afghanistan and demonstrate the evolution of tactics, techniques, and procedures (TTPs) by Afghan insurgents.
U.S. Air Force presentation detailing human interface systems for drone ground control stations from May 2010.
In certain parts of the US government, when an operation has unintended negative second or third-order consequences, they are called “blowback.” The radical Islamic movements in the Pashtun areas today were always present, but putting them on steroids in the 1980’s was pretty short-sighted by any reasonable accounting — a classic case of “blowback.” During the Soviet-Afghan war, the Pakistanis had their own agenda. The Pakistani Army’s intelligence branch, called the Inter-Services Intelligence Directorate, or ISI, became extremely powerful by cooperating with the United States and the government of Saudi Arabia to channel roughly $7.2 billion dollars worth of covert foreign military aid to their preferred Mujahideen clients. To control the Mujahideen, the ISI formed seven resistance groups, each with a notional political party associated with it. These became known as “the Peshawar Seven.” CIA oversight of the covert money was weak, and much of it went into ISI’s pockets.
A script produced by the military for the Article 32 hearing of PFC Bradley Manning was released as part of a public court filing and was first reported on by Politico.
The focus of Marine Corps Martial Arts Program (MCMAP) is the personal development of each Marine in a team framework using a standardized, trainable, and sustainable close combat fighting system. As a weapon-based system, all techniques are integrated with equipment, physical challenges, and tactics found on the modern battlefield. The MCMAP is designed to increase the warfighting capabilities of individual Marines and units, enhance Marines’ self-confidence and esprit de corps, and foster the warrior ethos in all Marines. The MCMAP is a weapon-based system rooted in the credo that every Marine is a rifleman and will engage the aggressor from 500 meters to close quarter combat.
This report is an executive summary of interviews conducted by CALL in support of the JCOA comprehensive Study Plan covering CIVCAS. Topics included CIVCAS incidents, pre-deployment training, planning, mitigation efforts and best practices from key leaders with recent operational experience in Afghanistan and Iraq.
U.S. Marine Corps Intelligence Activity Micro Mission Guide for Afghanistan published in October 2008.
U.S. Army instructional presentation from 2008 on the history and major sects within Islam.
To effectively defeat an enemy, one must first understand the enemy. Intelligence professionals have forgotten the basic principles on which intelligence analysis is conducted, instead they sub-scribe to the paradigm that the enemy faced in this Global War on Terror has no structure or doctrine. Any organization, military or civilian, must have a structure and a way of doing business if they are to have any chance of being successful.
The Kill Box MTTP reinforces kill boxes as three-dimensional areas used to facilitate the integration of joint fires while also being a permissive fire support coordination measure (FSCM) in accordance with JP 3-09, Joint Fire Support. The publication offers a detailed explanation of kill box employment and provides information to effectively organize, plan, and execute kill box procedures.
The purpose of the NLW Reference Book is to provide a single source document that contains key information about NLW descriptions, effects, characteristics, concepts of employment, and associated operational parameters and considerations to enhance NLW education and training.
Multi-National Forces West Biometric Automated Toolset (BAT) Handheld Interagency Identity Detection Equipment (HIIDE) SOP and TTP from June 2007.