Since its inception in 1979, the Islamic Republic of Iran has repeatedly disrupted the stability of the Middle East and fostered terrorist threats throughout the world. Iran exploited the power vacuum which followed the Iraq War in 2003 and Arab Spring in 2011 to significantly extend its regional influence, primarily through the establishment of proxy groups and new relationships with existing regional terrorist groups. International sanctions against Iran, levied in response to Iran’s support for terrorism and nuclear activities, constrained Iran’s actions, but did not end them, nor did they stop Iran from enhancing its conventional military enterprise.
Tag Archive for Asymmetric Warfare Group
U.S. Army
Asymmetric Warfare Group Study: Russian Private Military Companies in Operations, Competition, and Conflict
Russian PMCs are used as a force multiplier to achieve objectives for both government and Russia-aligned private interests while minimizing both political and military costs. While Moscow continues to see the use of Russian PMCs as beneficial, their use also presents several vulnerabilities that present both operational and strategic risks to Russian Federation objectives.
U.S. Army
Asymmetric Warfare Group Lessons Learned from Modern Urban Operations from 1980 to the Present
Urban warfare is not a new phenomenon. The U.S. Army saw urban combat in the Revolutionary War, the War of 1812, the Civil War, and elsewhere. Starting with World War II, overall armed conflict began to occur around centers with a high population density. This new backdrop for conflict has caused a whole new set of challenges, especially in an era of public scrutiny. The “Army’s capacity to engage, fight, and win major urban combat operations will determine the success of future operational and strategic endeavors.”
U.S. Army
(U//FOUO) Asymmetric Warfare Group Russian New Generation Warfare Handbook
As the American Army fought in Iraq and Afghanistan, it became the best tactical level counter insurgency force of the modern era. America’s enemies, however, did not rest. Russia observed the transformation of the American Army and began a transformation of their own. This new military barely resembles its former Soviet self. Wielding a sophisticated blend of Unmanned Aircraft Systems (UAS), electronic warfare (EW) jamming equipment, and long range rocket artillery, it took the Soviet model out of the 1980s and into the 21st Century.
U.S. Army
Asymmetric Warfare Group Report: Psychological and Sociological Concepts of Radicalization
Radicalization is the process by which an individual, group, or mass of people undergo a transformation from participating in the political process via legal means to the use or support of violence for political purposes (radicalism). Radicalism includes specific forms, such as terrorism, which is violence against the innocent bystander, or insurgency, which is violence against the state. It does not include legal and/or nonviolent political protest, such as protest that is more properly called activism.
U.S. Army
(U//FOUO) U.S. Army Tactical Questioning Pocket Reference Card
U.S. Army tactical questioning pocket reference guide from December 2010 produced by the Asymmetric Warfare Group. Tactical questioning consists of interviews in the field, as opposed to formal interrogations, and is “used to gain and exploit time-sensitive information for follow-on missions.”
U.S. Army
(U//FOUO) U.S. Army Company Intelligence Support Team (COIST) Reference Card
U.S. Army Company Intelligence Support Team (CoIST) Reference Card produced by the Asymmetric Warfare Group in December 2010.
U.S. Army
Asymmetric Warfare Group Guide to Insider Threats in Partnering Environments
This guide assists in three areas. First, it aides military leaders and all personnel to be aware of the indicators associated with insider threat activity while serving in a partnering environment. Second, this guide informs commanders and other leaders by giving them options on how to deal with insider threat activities. This guide is not all encompassing so there are other options a commander has dependent on their operating environment. Lastly, this guide is meant to generate open dialogue between coalition partners and partner nation personnel. Partnering in itself is a sensitive mission and only by creating trust and having an open dialogue with all forces will the mission be accomplished.
U.S. Army
(U//FOUO) Asymmetric Warfare Group Afghan Key Leader Engagement (KLE) Reference Card
U.S. Army Asymmetric Warfare Group Afghan Key Leader Engagement (KLE) Tactical Pocket Reference from October 2009.
U.S. Army
(U//FOUO) Asymmetric Warfare Group Tactical Information Superiority Report
This document facilitates discussion, training, and implementation of effective information superiority methods at the Battalion and Brigade level. This paper discusses the Center of Gravity analysis model for identifying threat networks, Critical Capabilities, and Critical Vulnerabilities; use of the methodology to determine the threat vulnerabilities; and as a basis for understanding how to achieve Information Superiority.
U.S. Army
(U//FOUO) Asymmetric Warfare Group Sniper Awareness and Counter-Sniper Reference Card
U.S. Army Asymmetric Warfare Group Sniper Awareness and Counter-Sniper Reference Card from October 2007.
U.S. Army
(U//FOUO) U.S. Army Interagency Teaming to Counter Irregular Threats Handbook
If you have picked up this handbook, or had it handed to you, you are likely an interagency team leader or team member or a military commander or civilian leader with the responsibility for setting up an interagency team. If this is your first exposure to working with the interagency, it can be a daunting prospect. This handbook is intended to provide you with a basic understanding of the interagency environment as well as insights and best practices that your team can put to use to counter irregular threats in the field or at operational level.
U.S. Army
(U//FOUO) Asymmetric Warfare Group “Attack The Network” Counterinsurgency Methodology
This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.