Insurgencies And Countering FM 3 Fm3 24
User Manual: FM-3
Open the PDF directly: View PDF .
Page Count: 202
Download | |
Open PDF In Browser | View PDF |
FM 3-24 MCWP 3-33.5 INSURGENCIES AND COUNTERING INSURGENCIES MAY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY FM 3-24/MCWP 3-33.5, C1 Headquarters Department of the Army Washington, DC, 2 June 2014 Change No. 1 Insurgencies and Countering Insurgencies 1. Change 1 to FM 3-24/MCWP 3-33.5, 13 May 2014, amends text as necessary. 2. A plus sign (+) marks new material. 3. FM 3-24/MCWP 3-33.5, 13 May 2014, is changed as follows: Remove Old Pages Insert New Pages pages 1-13 through 1-14 pages 1-13 through 1-14 pages 2-3 through 2-4 pages 2-3 through 2-4 pages 4-1 through 4-2 pages 4-1 through 4-2 pages 4-5 through 4-6 pages 4-5 through 4-6 pages 4-11 through 4-12 pages 4-11 through 4-12 pages 7-5 through 7-10 pages 7-5 through 7-10 4. File this transmittal sheet in front of the publication for reference purposes. DISTRUBUTION RESTRICTION: Approved for public release; distribution is unlimited. FM 3-24/MCWP 3-33.5, C1 2 June 2014 By Order of the Secretary of the Army: RAYMOND T. ODIERNO General, United States Army Chief of Staff Official: GERALD B. O’KEEFE Administrative Assistant to the Secretary of the Army 1414902 BY DIRECTION OF THE COMMANDANT OF THE MARINE CORPS: DISTRIBUTION: Active Army, Army National Guard, and U.S. Army Reserve: To be distributed in accordance with the initial distribution number 121724, requirements for FM 3-24. Marine Corps: PCN 143 000124 00 This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp *FM 3-24/MCWP 3-33.5 Field Manual No.3-24 Marine Corps Warfighting Publication No. 3-33.5 Headquarters Department of the Army Washington, DC Headquarters Marine Corps Combat Development Command Department of the Navy Headquarters United States Marine Corps Washington, DC 13 May 2014 Insurgencies and Countering Insurgencies Contents Page PREFACE...............................................................................................................v INTRODUCTION ..................................................................................................vii PART ONE STRATEGIC AND OPERATIONAL CONTEXT Chapter 1 UNDERSTANDING THE STRATEGIC CONTEXT............................................ 1-1 United States’ Strategy and Policy to Counter an Insurgency ........................... 1-4 Land Forces and the Range of Military Operations ............................................ 1-6 Legitimacy and Control ....................................................................................... 1-8 Understanding Unified Action ........................................................................... 1-10 Strategic Principles ........................................................................................... 1-19 Chapter 2 UNDERSTANDING AN OPERATIONAL ENVIRONMENT ............................... 2-1 Demographic and Urbanization Trends.............................................................. 2-1 The Operational Variables .................................................................................. 2-2 The Mission Variables and Civil Considerations .............................................. 2-10 Chapter 3 CULTURE........................................................................................................... 3-1 Understanding Culture........................................................................................ 3-1 Assessing a Cultural Situation ............................................................................ 3-2 Organizing to Understand Culture ...................................................................... 3-4 Distribution Restriction: Approved for public release; distribution is unlimited. *This publication supersedes FM 3-24/MCWP 3-33.5, dated 15 December 2006. Marine Corps PCN: 143 000124 00 i Contents PART TWO INSURGENCIES Chapter 4 INSURGENCY PREREQUISITES AND FUNDAMENTALS .............................. 4-1 Intrastate War...................................................................................................... 4-1 Insurgency Prerequisites .................................................................................... 4-3 Insurgency Fundamentals ................................................................................... 4-5 Other Analytical Frameworks ............................................................................ 4-22 Chapter 5 INSURGENCY THREAT CHARACTERISTICS ................................................. 5-1 Disposition and Activities .................................................................................... 5-1 Support Activities ................................................................................................ 5-3 Associated Threats ............................................................................................. 5-5 PART THREE COUNTERINSURGENCIES Chapter 6 MISSION COMMAND AND COMMAND AND CONTROL ................................ 6-1 Command in Counterinsurgency ........................................................................ 6-1 Headquarters Use In Counterinsurgency ........................................................... 6-4 Conventional Forces and Special Operations Forces Synchronization .............. 6-5 Chapter 7 PLANNING FOR COUNTERING INSURGENCIES ........................................... 7-1 Conceptual Planning ........................................................................................... 7-4 Transitions......................................................................................................... 7-10 Operational Considerations .............................................................................. 7-12 Information Operations ..................................................................................... 7-18 Chapter 8 INTELLIGENCE .................................................................................................. 8-1 Intelligence Fundamentals .................................................................................. 8-2 All-Source Intelligence ........................................................................................ 8-3 Human Intelligence ............................................................................................. 8-4 Chapter 9 DIRECT APPROACHES TO COUNTER AN INSURGENCY ............................ 9-1 Shape-Clear-Hold-Build-Transition Framework .................................................. 9-1 Other Direct Enablers ....................................................................................... 9-11 Chapter 10 INDIRECT METHODS FOR COUNTERING INSURGENCIES........................ 10-1 Nation Assistance and Security Cooperation ................................................... 10-1 Generational Engagement ................................................................................ 10-2 Negotiation and Diplomacy ............................................................................... 10-4 Identify, Separate, Isolate, Influence, and Reintegrate ..................................... 10-6 Other Indirect Enablers ................................................................................... 10-10 Chapter 11 WORKING WITH HOST-NATION FORCES .................................................... 11-1 Assessing and Developing a Host-Nation Force .............................................. 11-2 Relationships..................................................................................................... 11-6 Security Cooperation Planning ......................................................................... 11-8 Chapter 12 ASSESSMENTS ............................................................................................... 12-1 Assessment Frameworks .................................................................................. 12-1 Assessment Methods ........................................................................................ 12-2 Assessment Considerations ............................................................................. 12-2 Developing Measurement Criteria .................................................................... 12-3 ii FM 3-24/MCWP 3-33.5 13 May 2014 Contents Chapter 13 LEGAL CONSIDERATIONS ............................................................................ 13-1 Authority to Assist A Foreign Government ....................................................... 13-1 Rules of Engagement ....................................................................................... 13-2 Law of War ....................................................................................................... 13-2 Non-International Armed Conflict ..................................................................... 13-7 Detention and Interrogation .............................................................................. 13-8 Enforcing Discipline of U.S. Forces ................................................................ 13-10 Training and Equipping Foreign Forces ......................................................... 13-11 Commander’s Emergency Response Program .............................................. 13-12 Claims and Solatia.......................................................................................... 13-13 Establishing the Rule of Law .......................................................................... 13-13 SOURCE NOTES .......................................................................... Source Notes-1 GLOSSARY .......................................................................................... Glossary-1 REFERENCES .................................................................................. References-1 INDEX .......................................................................................................... Index-1 Figures Figure 1-1. Country team command relationships ............................................................... 1-17 Figure 4-1. Conflict resolution model ................................................................................... 4-15 Figure 4-2. Organizational elements of an insurgency ......................................................... 4-16 Figure 4-3. Networked insurgencies ..................................................................................... 4-18 Figure 4-4. Examples of dyads ............................................................................................. 4-19 Figure 4-5. Examples of dyad networks ............................................................................... 4-21 Figure 4-6. Example of changes to tactics based on density shift ....................................... 4-22 Figure 7-1. Design concept .................................................................................................... 7-5 Figure 7-2. Sample of individual lines of effort ....................................................................... 7-9 Figure 9-1. The capability spectrum of counterinsurgency conflict ........................................ 9-5 Figure 9-2. Example of a possible transition framework ...................................................... 9-11 Figure 10-1. Generational engagement ............................................................................... 10-2 Figure 10-2. Negotiation and diplomacy............................................................................... 10-5 Figure 11-1. Host-nation security force meter ...................................................................... 11-5 Figure 11-2. Counterinsurgency command relationships ..................................................... 11-6 Figure 11-3. Country planning .............................................................................................. 11-9 Figure 11-4. Phases of building a host-nation security force ............................................. 11-11 Figure 13-1. Provisions binding high contracting parties ..................................................... 13-8 Tables Table 1-1. Ends, ways, means, and risk in countering an insurgency ................................... 1-5 Table 2-1. Interrelated dimensions of the information environment ....................................... 2-8 13 May 2014 FM 3-24/MCWP 3-33.5 iii Contents Table 11-1. Developing a host-nation security force ........................................................... 11-1 Table 11-2. Host-nation contributions ................................................................................ 11-13 Table 13-1. Extract of the Detainee Treatment Act of 2005 ................................................ 13-9 iv FM 3-24/MCWP 3-33.5 13 May 2014 Preface Field Manual (FM) 3-24/ Marine Corps Warfighting Publication (MCWP) 3-33.5 provides doctrine for Army and Marine units that are countering an insurgency. It provides a doctrinal foundation for counterinsurgency. FM 3-24/MCWP 3-33.5 is a guide for units fighting or training for counterinsurgency operations. The principal audience for FM 3-24/MCWP 3-33.5 is battalion, brigade, and regimental commanders and their staffs. Commanders and staffs of Army and Marine Corps headquarters serving as joint task force or multinational headquarters should also refer to applicable joint or multinational doctrine concerning the range of military operations and joint or multinational forces. Trainers and educators throughout the Army and Marine Corps will also use this publication. Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable United States (U.S.), international, and, in some cases, host-nation laws and regulations. Commanders at all levels ensure their Soldiers operate in accordance with the law of war and the rules of engagement. (See FM 27-10.) FM 3-24/MCWP 3-33.5 implements standardization agreement (STANAG) 2611. FM 3-24/MCWP 3-33.5 uses joint terms where applicable. Selected joint, Army, and Marine Corps terms and definitions appear in both the glossary and the text. For terms and their definitions shown in the text, the term is italicized and the number of the proponent publication follows the definition. FM 3-24/MCWP 3-33.5 applies to the United States Marine Corps, the Active Army, Army National Guard/Army National Guard of the United States, and United States Army Reserve unless otherwise stated. The proponent of FM 3-24/MCWP 3-33.5 is the United States Army Combined Arms Center. The preparing agency is the Combined Arms Doctrine Directorate, United States Army Combined Arms Center. Send comments and recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank Forms) to Commander, U.S. Army Combined Arms Center and Fort Leavenworth, ATTN: ATZL-MCK-D (FM 3-24/MCWP 3-33.5), 300 McPherson Avenue, Fort Leavenworth, KS 66027-2337; by e-mail to usarmy.leavenworth.mccoe.mbx.cadd-org-mailbox@mail.mil; or submit an electronic DA Form 2028. 13 May 2014 FM 3-24/MCWP 3-33.5 v Preface ACKNOWLEDGEMENTS “Al-Sahawa: An Awakening in Al Qaim.” Dr. William Knarr. The Combating Terrorism Exchange Journal. Copyright © 2013. Institute for Defense Analyses. Reproduced with permission of the Institute for Defense Analyses, Alexandria, Virginia. “If a Tactic Works in This Province, it Might Not Work in The Next: The Case of the Dan Aw Patan District, Afghanistan, 2010.” Combat Studies Institute. Unpublished article. 2013. Reproduced with permission of the Combat Studies Institute, Fort Leavenworth, Kansas. “Intelligence and the Shining Path.” Christopher Paul. Unpublished article. 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “Laos, 1959-1975.” Christopher Paul. Paths to Victory: Detailed Insurgency Case Studies. Copyright © 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “Philippines (Huk Rebellion) 1946-1956.” Molly Dunigan. Paths to Victory: Detailed Insurgency Case Studies. Copyright © 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “Regimental Command in Counterinsurgency.” Brigadier General W. Blake Crowe, United States Marine Corps. Counterinsurgency Leadership in Afghanistan, Iraq, and Beyond. 2011. Marine Corps University Press. Reproduced with permission of the Marine Corps University Press, Quantico, Virginia. “Security Cooperation in El Salvador.” Christopher Paul. Unpublished article. 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “South Vietnam, 1960-1975” Christopher Paul. Paths to Victory: Detailed Insurgency Case Studies. Copyright © 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. “Sri Lanka, 1976-2009.” Colin P. Clarke. Paths to Victory: Detailed Insurgency Case Studies. Copyright © 2013. RAND National Defense Research Institute. Reproduced with permission of the RAND Corporation, Pittsburgh, Pennsylvania. vi FM 3-24/MCWP 3-33.5 13 May 2014 Introduction The 2006 version of FM 3-24/ MCWP 3-33.5, Counterinsurgency, filled an important doctrinal gap at a time when U.S. forces were engaged in counterinsurgency operations. This version of FM 3-24/MCWP 3-33.5 builds on that important manual. This field manual provides doctrine that frames counterinsurgency within the context of the range of military operations and provides a framework for the different ways land forces could counter an insurgency. Understanding insurgencies and the operational environment in which they exist, the ways in which the U.S. will attempt to counter insurgencies, and how commanders synchronize their efforts to achieve end states is at the core of what this manual provides to both the Army and the Marine Corps. This version is organized differently than the 2006 version. The new title, Insurgencies and Countering Insurgencies, provides insight into the thinking behind the organization. Overall, FM 3-24/MCWP 3-33.5 is divided into three parts. Part one provides strategic and operational context, part two provides the doctrine for understanding insurgencies, and part three provides doctrine for defeating an insurgency. In short, FM 3-24/MCWP 3-33.5 is organized to provide the context of a problem, the problem, and possible solutions. Part one, the “Strategic and Operational Context,” provides a framework for understanding the environment where a counterinsurgency exists. Part one consists of chapters one through three. Part two, “Insurgencies,” provides a doctrinal framework for understanding an insurgency. Part two consists of chapters four and five. Part three, “Counterinsurgencies,” describes how to plan and execute operations to enable a host nation to defeat an insurgency. Chapter 1, “Understanding the Strategic Context,” answers the questions of how and why U.S. forces might get involved in a counterinsurgency. Chapter 1 highlights that there are many different ways U.S. forces could counter an insurgency and that there are a range of various contexts in which an insurgency can occur. Commanders and staffs must understand the conditions in which an insurgency occurs and the overall strategy for countering that insurgency so they can effectively support it. Chapter 2, “Understanding an Operational Environment,” provides context for an operational environment where an insurgency might be occurring. Chapter 3, “Culture,” describes the role of culture in counterinsurgency operations. Understanding culture is essential in any effort to support a counterinsurgency effort. Culture is of unique importance in understanding an operational environment. Chapter 4, “Insurgency Prerequisites and Fundamentals,” provides doctrine for understanding the prerequisites of an insurgency and the root causes that allow an insurgency to keep and gain legitimacy. It than provides a framework for understanding the strategic decisions an insurgency might make and eight dynamics for analyzing any particular insurgency. Chapter 5, “Insurgency Threat Characteristics,” provides doctrine for understanding the threat characteristics of an insurgency. Chapter 6, “Command and Control and Mission Command,” provides doctrine for executing command and control under the philosophy of mission command. In a counterinsurgency effort, many units may perform many different tasks in decentralized operations. Understanding decentralized operations and ensuring these units are meeting the overall commander’s intent is essential for successful counterinsurgency operations. Chapter 7, “Planning and Operational Considerations,” provides guidance on how commanders and staffs can work from conceptual planning to detailed planning in counterinsurgency operations. It also provides 13 May 2014 FM 3-24/MCWP 3-33.5 vii Introduction important operational considerations, such as attack the network, that are essential in counterinsurgency operations. Chapter 8, “Intelligence,” provides considerations for intelligence in counterinsurgency. Because understanding the environment is essential in counterinsurgency, intelligence facilities successful operations. Chapter 9, “Direct Approaches to Counter an Insurgency,” provides guidance on how the Army and the Marine Corps directly counter an insurgency at the operational and tactical level. The operational philosophy behind the direct approach is shape-clear-hold-build-transition. If tactical units are directly interfacing with a society, they will perform shape-clear-hold-build-transition. In addition to guiding U.S. forces’ actions, shape-clear-hold-build-transition also provides a framework for understanding host-nation actions. If U.S. forces have to be the primary counterinsurgency force until the host nation can deploy its forces, shape-clear-hold-build-transition provides an effective operational approach. Chapter 10, “Indirect Methods for Countering Insurgencies,” provides a framework for working with and through a host nation. While the U.S. may provide the primary counterinsurgent forces, it may also work indirectly through the host nation. There are also important indirect enablers. Chapter 11, “Working with Host-Nation Forces,” provides a foundation for understanding how security cooperation efforts are integrated into a counterinsurgency effort. Whether U.S. forces are, for a time, the primary counterinsurgent forces or they are working indirectly through a host nation, enabling the host nation through security cooperation activities is essential. Chapter 12, “Assessments,” provides doctrine for understanding how a counterinsurgency environment changes and determining if counterinsurgent actions are having an effect on achieving the desired end state. Continued assessments are fundamental to understanding how an environment is evolving and reframing the basic problems commanders and staffs are facing. Chapter 13, “Legal Considerations” provides some legal considerations that are important for commanders and staffs to consider in all counterinsurgency operations. FM 3-24/MCWP 3-33.5 provides doctrine on how to understand a counterinsurgency environment, determine the counterinsurgency problem, and plan and execute operations in that environment. It provides guidance to commanders and staffs facing the unique challenges of countering an insurgency. This field manual is one manual in a larger doctrinal library that commanders and staffs need to understand in order to be effective in countering an insurgency. Any effort to counter an insurgency must be built on broad professional competence. The Army uses the term intelligence preparation of the battlefield while the Marine Corps uses the term intelligence preparation of the battlespace. Both Services use the same definition for these terms. This manual uses the term intelligence preparation of the battlefield/battlespace to align with FM 2-01.3/MCRP 2-3A. viii FM 3-24/MCWP 3-33.5 13 May 2014 PART ONE Strategic and Operational Context When the United States (U.S.) conducts or supports counterinsurgency operations, it does so in a unique strategic and operational environment. While this is true for all operations, this is of particular importance when the U.S. is countering an insurgency. Tactical actions often have strategic effects in a counterinsurgency. This makes it essential to understand both the strategic and operational context when countering an insurgency. In this manual, part one provides an overview for commanders and staff to understand the environment and context of an insurgency and the decision to counter that insurgency. Chapter 1 provides the strategic context of a counterinsurgency. When the U.S. becomes involved in a counterinsurgency, policy and strategic decisions affect operations. Chapter 2 provides an overview of an operational environment and operational variables. In a counterinsurgency, there are unique considerations that operators and planners consider. Of particular importance in a counterinsurgency is culture. Chapter 3 provides an in-depth overview of culture and its relationship to counterinsurgency. Chapter 1 Understanding the Strategic Context 1-1. Any decision by the President to commit United States (U.S.) forces must be understood within the larger sphere of U.S. policy. Soldiers and Marines must first understand the strategic context that the U.S. is acting in to best plan, prepare, conduct, and assess a counterinsurgency operation to protect national interests. Countering an insurgency should incorporate previous or continuing security cooperation efforts and other activities, U.S. and host-nation objectives, and U.S. and host-nation whole-of-government efforts to address the root causes of the conflict. (For more information on root causes, see paragraphs 4-14 through 4-22.) Despite its irregular nature and generally less intense level of combat, counterinsurgency may be just as critical to U.S. vital interests as conventional warfare. 1-2. Irregular warfare is a violent struggle among state and non-state actors for legitimacy and influence over the relevant population(s) (JP 1). Irregular warfare favors indirect approaches, though it may employ the full range of military and other capacities in order to erode an adversary’s power, influence, and will. Because of its irregular nature, U.S. involvement in a counterinsurgency demands a whole-of-government approach. Defeating an insurgency requires a blend of both civilian and military efforts that address both assisting the host-nation government in defeating the insurgents on the battlefield and enabling the host nation in addressing the root causes of the insurgency. Moreover, after large scale combat or in an ungoverned space, there may not be a functioning host-nation government. In those cases, U.S. forces must work with population groups in the area and enable them to build governmental capacity. In either case, U.S. civilian and military participants in counterinsurgency cannot compensate for lack of will, acceptance of corruption, or counterproductive behavior on the part of the supported government or the population. 1-3. Insurgency in the most basic form is a struggle for control and influence, generally from a position of relative weakness, outside existing state institutions. Insurgencies can exist apart from or before, during, or after a conventional conflict. Elements of a population often grow dissatisfied with the status quo. When a 13 May 2014 FM 3-24/MCWP 3-33.5 1-1 Chapter 1 population or groups in a population are willing to fight to change the conditions to their favor, using both violent and nonviolent means to affect a change in the prevailing authority, they often initiate an insurgency. An insurgency is the organized use of subversion and violence to seize, nullify, or challenge political control of a region. Insurgency can also refer to the group itself (JP 3-24). Counterinsurgency is comprehensive civilian and military efforts designed to simultaneously defeat and contain insurgency and address its root causes (JP 3-24). Warfare remains a clash of interests and will between organized groups characterized by the use of force. In conventional warfare, there are clear determinants of victory. However, achieving victory for an insurgent may depend less on defeating an armed opponent and more on a group’s ability to garner support for its political interests (often ideologically based) and to generate enough violence to achieve political consequences. 1-4. Counterinsurgency is not a substitute for strategy. When counterinsurgents attempt to defeat an insurgency, they perform a range of diverse methods intended to counter an insurgency. Commanders must effectively arrange these diverse methods in time and space to accomplish strategic objectives. The U.S. can use a range of methods to aid a host nation or group in defeating an insurgency. The various combinations of these methods with different levels of resourcing provide the U.S. with a wide range of strategic options to defeat an insurgency. The strategy to counter an insurgency is determined by the ends the U.S. wishes to achieve, the ways it wishes to achieve those ends, and the resources or means it uses to enable those ways. (See paragraphs 1-10 through 1-13 for more information on strategy.) 1-5. There is a spectrum of involvement in countering an insurgency. The U.S. could enable a host nation by not providing forces that are directly involved in securing the population or attacking the insurgents. For example, the U.S. could provide training or intelligence support to a host nation. Moreover, even if the U.S. is directly involved in defeating the insurgency, its primary role can be only to enable a host nation. A host nation may be capable of providing civil control and security. The U.S. commander can integrate a force into the host-nation’s efforts that provides a force to perform direct action or fires provided by airpower or field artillery. U.S. involvement can range from a modest and supporting commitment to a major ground force commitment that may, for a time, take the role of primary counterinsurgent force while host-nation forces become better able to take on that role themselves. 1-6. Ideally, the host nation is the primary actor in defeating an insurgency. Even in an insurgency that occurs in a country with a nonfunctioning central government or after a major conflict, the host nation must eventually provide a solution that is culturally acceptable to its society and meets U.S. policy goals. The conclusion of any counterinsurgency effort is primarily dependent on the host nation and the people who reside in that nation. Ultimately, every society has to provide solutions to its own problems. As such, one of the Army and Marine Corps’ primary roles in counterinsurgency is to enable the host nation. 1-7. A counterinsurgency can occur as part of a major combat operation, but it often occurs without a major conflict. For example, an external threat may sponsor an insurgency, and this could be part of an effort to attain other strategic objectives. As such, the objectives of a counterinsurgency must be contextual to that insurgency. Creating objectives that are relevant to a particular insurgency is essential to defeating that insurgency. Effective counterinsurgency requires clearly defined and obtainable objectives that result in an end state acceptable to the host-nation government, the populace, and the governments providing forces. When the U.S. directly involves itself in a counterinsurgency, stability may be essential. Although all tasks executed to establish the conditions to reach a desired end state are significant, stability operations may be critical in a counterinsurgency. (The Army understands all operations are made up of offensive, defensive, and stability tasks. See ADRP 3-07 and FM 3-07 for more information on operations focused on stability.) 1-8. The military role should be coordinated with the other instruments of national power that include diplomatic, informational, and economic parts. The Army and Marine Corps are only part of the instruments of national power that the U.S. can use to counter an insurgency. At times, they may be used in a supporting role. For example, Soldiers and Marines may be withdrawn from active counterinsurgency efforts while the U.S. uses other instruments of national power as the primary enablers of a host nation. In such cases, the Army and Marine Corps may play a supporting role by performing security cooperation tasks. 1-9. The Laos insurgency highlights the unique nature of an insurgency. This insurgency took place in the context of Vietnam. Here, internal groups with various interests and outside groups from North Vietnam 1-2 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding the Strategic Context and the U.S. created a unique context for the Laos insurgency. Moreover, the corrupt and ineffective host government was not able to wage its own counterinsurgency campaign effectively. To effectively counter the insurgency in Laos, the U.S. needed an operational approach that would work in that environment, if a successful operational approach were possible. Unfortunately, U.S. forces failed to create an effective strategy to counter the insurgency in Laos. Thus, the U.S. government failed to find the needed ways and means to meet the policy goal. The Laos Insurgency Lamented as “the forgotten war,” the insurgency in Laos was heavily influenced (and often overshadowed) by the conflict in neighboring Vietnam. A victim of geography, half-hearted fighting between the different factions in Laos may well have worked itself out in a lasting compromise if not for pressure from North Vietnamese communists to control areas of Laos for the infiltration of men and materiel into South Vietnam (along the Ho Chi Min trail) and U.S. efforts to oppose communist presence and influence. Beginning in earnest in 1959, fighting pitted variously rightist Royal Lao forces supported by Hmong guerillas against the leftist Pathet Lao (indigenous communists) and their North Vietnamese supporters. These participants were at times joined by other players, including U.S. advisors, Filipino troops, U.S. air power, Thai commandos and artillery formations, as well as “neutralist” Lao forces. During the period of conflict, Laos was underdeveloped in every way, including its government, its economy, and its military. The government and military were corrupt and ineffective and the economy was wholly dependent on outside support. As the United States became more invested in Vietnam, it also increased support to Laos; by the end of 1955, the U.S. provided 100% of the Lao military budget. North Vietnamese backers of the Pathet Lao sought to grow that force, supporting a significant recruiting campaign and sending many of the recruits to North Vietnam for schooling and training. This led to greater investment by the U.S. in materiel and training for government forces, and included, beginning in 1957, efforts to arm Hmong guerillas, who would play an important role later in the conflict. Vietnamese interest in Laos was primarily in securing the so called “panhandle” region, through which the Ho Chi Min trail allowed the North Vietnamese to infiltrate men and materiel into South Vietnam. A secondary consideration was the support of a fellow communist movement (the Pathet Lao). Once fighting began in 1959, the Vietnamese used government chaos to their benefit, increasing attacks on government forces and expanding the territory under their influence or control. During this period, many attacks took the form of North Vietnamese Army regulars attacking and overwhelming a position, and then letting their Pathet Lao allies occupy the area and claim the victory, thus at least paying lip service to maintaining the neutralization of Laos. These North Vietnamese Army-led attacks and several attempted counterattacks by Royal Laotian Forces against Pathet Lao positions revealed the gross incompetence of the government’s regular forces. This lack of capability stemmed from several sources, including a half-hearted martial tradition in general, a preoccupation with profiteering and political games by the senior leadership, lack of efforts by the French who were responsible for their training until late 1958, and a fundamental lack of motivation. Despite the vigorous efforts of U.S. trainers and millions of dollars in materiel throughout the course of the conflict, Royal Lao Forces would never become a consequential fighting force. In this phase, the only effective forces on the government side were the Hmong tribesmen, trained and provisioned by the Central Intelligence Agency and fighting as guerillas. International pressure (from the United States as well as from China and Russia preferring to avoid unnecessarily provoking the United States) and support (from the United States and other allies) prevented the complete collapse of the government of Laos in 1962 and pushed for neutralization through a coalition 13 May 2014 FM 3-24/MCWP 3-33.5 1-3 Chapter 1 government. The North Vietnamese were content to allow negotiations to take place, as they had succeeded in securing what they needed: the Ho Chi Min trail. After months of wrangling, 1962 finally saw another Geneva agreement, this time for a neutralized Laos with a coalition government representing the three major factions: the rightists, the leftists, and the neutralists. Part of the neutralization agreement included the removal of foreign forces from Laos. While U.S. and allied personnel who had been fighting on the side of the Royal Lao Government were withdrawn from the country, very few of the substantial number of North Vietnamese Army forces withdrew. Nor did the Central Intelligence Agency cease its work with the Hmong. The new coalition government proved shaky. Turmoil again rocked the Lao government with continued political maneuvering by greedy generals and a string of coups. Military region commanders ran their zones like private fiefdoms, rarely dispatching their troops outside the Mekong River valley. A series of spectacular failures by the Royal Lao forces all but ensured those forces would never seek to take the initiative and act in other than a strictly defensive capacity again. Between 1964 and 1968, the conflict was primarily between the U.S.-supported paramilitaries (backed by U.S. airpower), and the Pathet Lao. The cycle of dry season and wet season, each favoring one side or the other, saw very modest back and forth movement between the two primarily irregular forces, with little change from year to year. That all changed in 1969. The communist dry season offensive of 1968 did not end with the onset of the rainy season, and gains were substantial. In early 1970, the communists seized a provincial capital for the first time, and later that year they seized another. In the now traditional way, Hmong guerillas counterattacked. However, after nearly a decade of war, the Central Intelligence Agency’s secret army was nearly fought out. Fighting against superior numbers of regular troops, the Hmong became more and more reliant on U.S. airpower and on support from Thai artillery. Bombing in southern Laos expanded such that by 1971, it was more extensive than bombing in South Vietnam and Cambodia combined. The communist dry season offensive that started in December of 1971 brought extraordinary pressure on the government. For the first time, North Vietnamese Army forces used significant armor, as well as large tube artillery. The Hmong were battered and quickly thrown back. After another year of significant communist gains, the Lao government and its international supporters once again sought a ceasefire. By the time of the 1973 ceasefire and neutralization, the government of Laos controlled little more than the capital and the Mekong river valley, and that only by virtue of the Hmong and U.S. airpower. With the withdrawal of U.S. support (both airpower and funding) in 1973, the Hmong were demobilized and the Lao government was left to its fate, which was to fall relatively quickly to the communists. UNITED STATES’ STRATEGY AND POLICY TO COUNTER AN INSURGENCY 1-10. When and how the U.S. government provides assistance to other states to counter an insurgency is a question of policy and strategy. Commanders and staffs should understand that the U.S. can respond with a range of measures, many of which do not directly involve U.S. forces securing the population or performing offensive operations, in a counterinsurgency. This manual provides the reader with information on how counterinsurgents may organize tactical tasks in time and space to reach an end state. It cannot and should not be the only reference to conduct counterinsurgency operations for someone who wishes to fully understand the policy tools available to the U.S. to aid a host nation in fighting a counterinsurgency. (See JP 3-24, Allied Joint Publication 3.4.4, and the U.S. Government Guide to Counterinsurgency for more information on counterinsurgency policy tools.) 1-4 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding the Strategic Context 1-11. Effective counterinsurgency operations require an understanding of the military profession. The tasks counterinsurgents perform in countering an insurgency are not unique. It is the organization of these tasks in time and space that is unique. For example, geographic combatant commanders employ theater strategy to align and shape efforts, resources, and tasks to support strategic goals and prepare for conflict and contingencies in their region. In support of this goal, theater strategies normally emphasize security cooperation activities, building partner capacity and force posture, and preparing for contingencies and other tasks those are not unique to counterinsurgency operations. For example, a unit can perform security cooperation tasks in support or not in support of countering an insurgency. (See FM 3-22 for more information on security cooperation tasks.) Those units that carry out security cooperation tasks to support a counterinsurgency should understand security cooperation and the tasks they are performing and teaching. Moreover, they should understand how these tasks are used in defeating an insurgency. Soldiers and Marines must start from a foundation of professional knowledge and competence to have a framework for understanding and aiding a host nation in defeating an insurgency. Whether a unit is directly performing the tasks to defeat an insurgency or indirectly supporting a host nation, this manual provides a doctrinal framework for counterinsurgency operations. However, to be effective, Soldiers and Marines must be professionally competent. This is the foundation in understanding another nation’s or group’s actions to defeat an insurgency and in providing aid to that nation or group. (See ADRP 1 for more information on professional competence.) 1-12. Political leaders and commanders must have a dialogue to decide the optimal strategy to meet the security needs of the U.S and states or groups the U.S. supports. Different capabilities provide different choices that offer different costs and risks. U.S. strategy is defined by how it combines these capabilities (the ways), resources them (the means), and its willingness to accept risk in attaining its policy goals. Commanders inform political leaders about the prospects for victory and the different costs and risks of various options, and political leaders weigh these costs and risks against their importance to U.S. national interests. Once U.S. policymakers have determined the goals (the ends) of the U.S., the military evaluates operational approaches to conduct counterinsurgency efforts depending on the ends, ways, means, and acceptable risk. The joint force provides a range of capabilities that it integrates into the overall strategy. For example, in a functioning state that is facing an insurgency, the joint force may employ a range of security cooperation tools. Moreover, other tools fall outside of security cooperation, such as direct action and counter threat financing, that the U.S. can integrate into the mix of ways that it will use to defeat or contain an insurgency. The U.S. government integrates the various instruments of national power to create a range of strategic options, of which military involvement is only one part. (For a further discussion on strategy, see MCDP 1-1.) (See table 1-1.) Table 1-1. Ends, ways, means, and risk in countering an insurgency Ends Ways Defeat or contain an insurgency. Direct methods (See chapter 9.) Support strategic goals and end state defined by policy makers. Indirect methods (See chapter 10.) Means Unified action • • Military force. Other governmental capabilities Risk Determined by a mismatch in the ends, ways, and means. 1-13. An operational approach is a description of the broad actions the force must take to transform current conditions into those desired at end state (JP 3-0). The commander may use direct or indirect approaches to counter threats. Commanders may find their operational approach is mainly direct, indirect, or a mixture of both. The approach is the manner in which a commander contends with a center of gravity. A direct approach attacks the enemy’s center of gravity or principal strength by applying combat power directly against it. An indirect approach attacks the enemy’s center of gravity by applying combat power against a series of decisive points that lead to the defeat of the center of gravity while avoiding the enemy strength. Commanders may use a single direct or indirect approach or, more likely, may employ a combination of approaches to counter an insurgency and its influence. Additionally, the emphasis on or combination of approaches may have to evolve as the security situation and insurgent networks evolve. The commander’s intent and the approach(es) the commander selects will drive the methods used by counterinsurgents. These methods may be direct or indirect. Approaches and methods must be nested and 13 May 2014 FM 3-24/MCWP 3-33.5 1-5 Chapter 1 clearly linked, since they often involve support from diplomatic, economic, and informational efforts by non-military forces. (See chapter 9 for more information on direct methods and chapter 10 for more information on indirect methods. See JP 5-0 for more information on direct and indirect approaches.) LAND FORCES AND THE RANGE OF MILITARY OPERATIONS 1-14. The U.S. Army and Marine Corps can prevent or defeat an insurgency across the range of military operations. This is true if an insurgency starts in the context of a major combat operation or if it starts during peace. Across the range of military operations and in accordance with U.S. strategy, U.S. land forces take actions and set priorities to shape an environment to reduce the possibility of insurgencies. In some instances an operational environment and its related variables are unstable or fragile and hostile actions against a host-nation government begin. In this environment, the U.S. may make a decision to use some type of military capability. Commanders must understand the effects that the actions and priorities of the U.S. force have on an operational environment. When acting in this environment, commanders must have situational understanding of the environment and the effects of U.S. actions in that environment. This influences how the commander attempts to shape the environment. An insurgency can also occur in the context of another conflict. For example, during major combat operations, land forces must take actions to prevent insurgencies from occurring during operations and once the opposing conventional force is defeated. While an insurgency is only a possibility in a major combat operation, it could occur during major operations or afterwards. Commanders and staffs must assess the possibility of an insurgency in any operational environment and take actions to prevent one from occurring. These actions can include a range of stability operations and security cooperation activities. (See ADRP 3-07 for more information on stability operations and FM 3-22 for more information on security cooperation.) 1-15. The circumstances of U.S. involvement in a counterinsurgency are important in understanding the operational and tactical actions of U.S. forces. The type and scale of involvement, whether the Army and Marine Corps are involved temporarily as the primary counterinsurgent forces or are providing modest indirect and direct support to a counterinsurgency effort, will be determined by the circumstances of U.S. involvement. U.S. forces participate at the direction of the President, based on national security interests. One example circumstance is the collapse of a fragile state in a geographically strategic area. Even if U.S. land forces are not in place when the government collapses, the President may deploy land forces to counter an insurgency and restore stability. The use of indirect capabilities in a failed state is complex because the commander often has to work with groups outside of the legitimately constituted government. Building capacity and enabling existing capabilities is difficult when a state lacks functional institutions. Because these areas lack state institutions to provide various governmental functions to include security forces, large scale direct involvement is often resource intensive. The U.S. can use smaller direct capabilities to support groups outside the legitimately constituted government, but this also adds to uncertainty and strategic risk. 1-16. U.S. forces can participate at the request of a government that seeks to counter an insurgency in its country with assistance from the U.S. When a requesting government is capable and functioning, the U.S. can offer a wide range of capabilities. Having a capable government changes the relationship between ends, ways, and means. A capable government could require fewer resources to intervene, or it could only require indirect and direct enablers in order to be successful. However, as with any involvement to counter an insurgency, often unforeseen risks could lead to greater U.S. involvement. 1-17. U.S. involvement can also occur in a country where there are ongoing security cooperation activities. If the U.S. is performing security cooperation activities in a country and an insurgency develops, continued security cooperation efforts could result in U.S. involvement in a host nation’s counterinsurgency efforts. Efforts to train and equip host-nation forces will likely be seen as U.S. involvement by both the insurgents and the international community. Moreover, U.S. forces could also transition to direct involvement in an insurgency. Whatever the degree of involvement, a clear policy decision should be made to include the development of a national strategy. 1-18. Insurgencies could also be part of large scale combat or fueled by a regional or global adversary. In a protracted large scale operation, an insurgency often develops in controlled areas with populations sympathetic to the enemy. As such, planning for prevention of an insurgency and integrating stability operations into a prolonged operation is essential. If an insurgency develops, it will require resources to 1-6 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding the Strategic Context defeat the insurgents. This will reduce the resources available to defeat the enemy in large-scale combat. In addition, an adversary can fuel an insurgency in a host nation to undermine U.S. interests. In this case, the insurgency is part of an adversary’s overall strategy and policy. (See FM 3-05, chapter 2, for more information on unconventional warfare. It provides a U.S. perspective on enabling an insurgency.) 1-19. An insurgency can also occur at the conclusion of a large scale combat operation when an organized movement seeks to challenge the authority of the U.S. and its partners. The organized movement may be remnants of the defeated force or an opportunistic movement that seeks to obtain power using a political-military challenge to the existing authority. In either case, U.S. land forces, along with other unified action partners, must be prepared at all stages of conventional warfare to assess the capability of an insurgency occurring either during the conflict or after hostilities cease. Soldiers and Marines must also recognize that the presence of U.S. forces in the region can lead to the conditions for an insurgency. U.S. land forces can help to prevent an insurgency from occurring in the manner in which they conduct conventional warfare and in the conduct of post-conflict operations. Should prevention fail, U.S. forces will be exponentially more successful in countering an insurgency if they shape the environment during and immediately following conventional warfare for an effective transition to counterinsurgency. 1-20. In the military operations, U.S. forces can prevent an insurgency from occurring in large scale combat operations by integrating stability operations. If an insurgency does begin, U.S. forces can shape its formation and make it easier to defeat. U.S. land forces can also prevent an insurgency from occurring in peacetime through security cooperation activities and other capabilities that support the host nation or other groups. If there is an insurgency, the U.S. can integrate a number of capabilities into an overall operational approach to defeat that insurgency. 1-21. From the U.S. land forces’ perspective, insurgencies range along a spectrum depending on the scale of effort and resources the Army and Marine Corps must take to counter them. In a worst-case scenario, an extremely capable insurgency that has a significant impact on the population exists in a failed state region in which there is little or no host-nation government capability. The U.S. may have to commit significant combat power to offset the momentum of the insurgency. While the U.S. can avoid using land forces in direct combat, the use of other capabilities will often support groups that are not the recognized government. In such cases, the U.S. would be enabling one group to gain control over the state. For example, the U.S. could equip groups within a state and empower them to take control over an area. While the initial cost may be lower, this course of action is fraught with possible unintended consequences. The group that counterinsurgents enable, which is essentially another insurgency, may act in ways that are counter to U.S. interests once it gains control of the area. On the other hand, direct involvement could be extremely costly and provoke a wider conflict. If the U.S. operates in a failed state to defeat an insurgency, it must create a policy and strategy that matches its goals and the resources that it is willing to spend. Moreover, it must be willing to accept a large degree of uncertainty and strategic risk. 1-22. The best-case scenario is when the host nation has the capability to defeat an insurgency and the U.S. plays only a supporting role in enabling the insurgencies’ defeat with equipment, training, or intelligence. A middle case occurs when a functional state has an insurgency in a remote area where the host-nation government cannot exert complete control. The existing insurgency is not a challenge to the continued authority of the host-nation government, but it may seek to gain control of a specific region or area. This type of scenario can require much fewer resources for U.S. land forces to counter the insurgency than the worst-case scenario. Since the capacity of the host-nation security forces exists to contain the insurgency to a specific region or area, the U.S. can integrate a number of capabilities into the host government’s efforts to increase the effectiveness and capabilities of the host nation. While every insurgency is unique, this basic framework offers the U.S. the opportunity to achieve policy goals while spending fewer resources and offering less uncertainty and risk. However, as with any conflict, unintended consequences can change the insurgency and increase the cost and uncertainty of U.S. involvement. 1-23. In all cases, specific national policies govern U.S. land forces’ actions to counter an insurgency. An insurgency’s goals and actions are influenced by the conditions the insurgency develops in. An insurgency’s objectives are not exclusive to the condition of the state, but each can occur anywhere along the range of state conditions. However, the operational environment an insurgency develops in will affect how it understands its goals and will affect its actions (See chapter 2 for more information on an 13 May 2014 FM 3-24/MCWP 3-33.5 1-7 Chapter 1 operational environment and section II for more information on understanding the actions of an insurgency). 1-24. There may be multiple insurgencies in an operational environment. A networked insurgency may have conflicting goals within its organization and its actions are not controlled by a command structure. These insurgencies can have links to other insurgencies or criminal organizations. Networked insurgencies might divide or combine with groups. In such cases it is difficult to analyze an insurgency or insurgencies if they are treated as monolithic actors. Instead, counterinsurgents must understand the dynamics within the insurgency or multiple insurgencies. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) 1-25. Victory in a counterinsurgency may not be as clear as winning in a conventional conflict. U.S. national ends determine the criteria for success, regardless of how the U.S. land force is deployed to conduct counterinsurgency operations. As it applies to U.S. national objectives, success in an insurgency often depends on developing host-nation capacity to contain, reduce, and defeat the insurgency without requiring direct U.S. involvement. In a counterinsurgency, the host nation often determines the criteria for success. U.S. counterinsurgents should avoid judging host-nation criteria based on their own cultural expectations. Achieving success may depend less on defeating the armed element of the insurgency and more on the ability to legitimize host-nation institutions to the populace. Short and mid-term success in counterinsurgency may be developing a host-nation government that has sufficient capability to secure itself and address an insurgency on its own. This success allows the U.S. to continue to support the host nation through a long-term relationship that addresses that nation’s legitimacy. Success includes enabling the development of resiliency within the host-nation population and host-nation institutions to sustain the ability to counter the insurgency in the future and prevent the conditions in the area from allowing an insurgency to gain strength. Achieving the conditions for success may require a mix of application of force, information operations, cultural acceptance, and building capacity and competency within host-nation institutions. Counterinsurgents may either persuade the people to support the government or dissuade them from supporting the insurgents. What capabilities the U.S. uses to counter an insurgency is dependent on the context of that insurgency and U.S. national interests. 1-26. U.S. forces should expect that the host-nation government will have its own interests that may not coincide with U.S. national interests. It may not be willing to undertake the political changes necessary to address the root causes of the insurgency. The commitment of U.S. forces may depend upon the degree to which U.S. policy makers consider the affected government to be receptive to assistance, advice, and reform. How Soldiers and Marines are employed will also require a clear determination by national decisionmakers as to what post-conflict commitments by military and civilian organizations will be required. Outside counterinsurgents, however, can never fully compensate for lack of will, incapacity, or counterproductive behavior on the part of the supported government. If a government is unambiguously committed to the defeat of insurgency, it is more likely to defeat it, regardless of the actions (or commitment level) of an outside supporter. LEGITIMACY AND CONTROL 1-27. Legitimacy, the acceptance of an authority by a society, and control are the central issues in insurgencies and counterinsurgencies. This is true however the U.S. enables a host nation to defeat an insurgency. The population of a particular society determines who has legitimacy to establish the rules and the government for that society. A population’s values and cultural norms will determine who that society perceives as a legitimate authority. Both the insurgency and the host nation attempt to control the population by some mixture of consent and coercion. Insurgents use all available tools, including political (diplomatic), informational (including appeals to religious, ethnic, historical, national, class, political, tribal or ideological beliefs), and social, military, and economic tools to overthrow or undermine an existing authority. Likewise, the host nation will use all available tools to maintain acceptance of its authority. This authority may be an established government or an interim governing body. It may be a generally accepted social order. Control of a population, however, may not be the end state desired by an insurgent. A criminal enterprise might seek to undermine existing political power in order to enable it to continue its criminal activities or insurgents could seek political power in order to impose an ideological (or religious) system on an unwilling population. In counterinsurgencies, if the affected government wants to end the insurgency, it 1-8 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding the Strategic Context should use all instruments of its national power to prove its legitimacy, to defeat the insurgency, and to reduce the likelihood of another crisis emerging. 1-28. Legitimacy is essential to understanding the political variable in an insurgency. Who a population accepts as legitimate is dependent on the norms and values within that particular population. Legitimacy can change as a society evolves and groups or individuals change their conceptualization of who they are and what authority they accept. Sometimes large changes, such as the American War of Independence or the unification of Germany in 1871, create a change in group identity and accepted authority. Sometimes group identity changes by slow evolution, as is the case with the European Union. However, at the core, who a group accepts as providing legitimate authority to govern their actions is that group’s legitimate authority. (See paragraphs 2-16 through 2-19 for information on the political variable.) 1-29. Legitimacy provides willing acceptance of authority and thus requires fewer resources to enforce its authority than illegitimacy. Most populations are controlled through a combination of consent and coercion. The host-nation government generally needs some level of legitimacy among the population in order to retain power. This provides some level of consent. Legitimacy is an indicator of the extent to which systems of authority, decisions, and conduct are accepted by the local population. Political legitimacy of a government determines the degree to which the population will voluntarily or passively comply with the decisions and rules issued by a governing authority. Legitimacy determines the transaction costs of political and governmental power. Low legitimacy may breed contempt on the part of the population and may require extensive prodding and incentives by the government to secure compliance of the population; high legitimacy generally invites compliance by the population and therefore requires less effort by the government to ensure compliance. An illegitimate government’s only method of controlling its population is coercion, which can be resource intensive. A legitimate government has to use coercion for policing power, but its population, in general, sees the rules and directions of its government as intrinsically correct. A population will follow a legitimate government’s rules and norms passively, and those who break those rules or norms are disapproved of by the society. Who the population sees as a legitimate authority is a central issue of a counterinsurgency. 1-30. All population groups are controlled by some combination of consent and coercion. Some governments may use a range of coercive methods to control the population. Coercive methods can damage legitimacy if the methods cannot be justified under the values and norms of the population. However, counterinsurgents should not think of coercion and consent as counter forces to one another. If coercive acts by the government or insurgency are justifiable under the norms and values of the population, those acts do not necessarily undermine the legitimacy of the government or host nation. Acts by both the government and the insurgency must be viewed from the perspective of the population experiencing those acts and not from an outside perspective that will bring its own bias to viewing actions of the host government or insurgency. 1-31. The struggle for legitimacy with the population is typically a central issue of an insurgency. The insurgency will attack the legitimacy of the host-nation government while attempting to develop its own credibility with the population. The host-nation government should reduce the credibility of the insurgency while strengthening its own legitimacy. A government that is seen as legitimate magnifies the resources and capabilities needed to defeat an insurgency and allows the host nation to concentrate finite resources on targeting the insurgency. However, legitimacy is a condition perceived by the population. Who the population sees as legitimate will be determined by that population’s norms and values. For example, if a population does not see outside forces as legitimate, this can undermine the legitimacy of the host-nation government trying to counter an insurgency. 1-32. The legitimacy of the host-nation government is achieved because the population accepts its authority and how it governs can be justified in terms of the population’s beliefs. It is not enough for the host-nation government to be simply seen as effective and credible. The governmental structure must be justifiable to the population and that justification must be based on the population’s norms and values. In some situations, providing effective governance may be essential to establish legitimacy among the population. However, this is not a uniform rule. The key is that legitimacy is ultimately decided in the minds of the population. Counterinsurgents must understand how the population will perceive a government. A host nation that is less efficient but perceived as legitimate by the population will be more 13 May 2014 FM 3-24/MCWP 3-33.5 1-9 Chapter 1 effective than an efficient host-nation government that cannot be justified by the values and norms of the population. 1-33. Even if a population does not see an insurgency or a government as legitimate, control can be established effectively by coercion. Many states and insurgencies have used domestic intelligence apparatus or other means to control every aspect of their populations. Illegitimate governments often use distrust and divisions within a population to effectively control a society. Moreover, a population is not monolithic. It is made up of many groups and subgroups. In many autocratic regimes, various groups within a population have a vested interest in continuing the current government, even if it is repressive. Likewise, an insurgency might receive support from elements within the population, even if it is repressive and uses coercive methods. Legitimacy must be seen from the different perspectives of the different groups within a society. UNDERSTANDING UNIFIED ACTION 1-34. Once the U.S. decides to become involved in a counterinsurgency, all instruments of national power provide the U.S. important capabilities to defeat an insurgency. Unified action is essential for all types of involvement in any counterinsurgency. Unified action is the synchronization, coordination, and/or integration of the activities of governmental and nongovernmental entities with military operations to achieve unity of effort (JP 1). Paragraphs 1-34 through 1-76 provide commanders and staffs with an understanding of how civilian agencies and military departments and forces synchronize and integrate their operations to achieve unity of effort. Paragraphs 1-41 through 1-48 explain both a whole-of-government and a comprehensive approach to defeat insurgencies and achieve U.S. and host-nation objectives. Paragraphs 1-59 through 1-76 also explain the roles of intergovernmental, nongovernmental, multinational forces, private sector organizations, and host-nation government and host-nation forces in counterinsurgency. 1-35. Unified action must be integrated into the overall host-nation efforts. The focus of U.S. efforts is to support the host nation’s internal defense and development. Internal defense and development is the full range of measures taken by a nation to promote its growth and protect itself from subversion, lawlessness, insurgency, terrorism, and other threats to its security (JP 3-22). Internal defense and development focuses on building viable institutions that respond to the needs of society. Security cooperation activities must work with and support a nation’s own internal defense and development programs. Within the context of counterinsurgency, commanders and staffs must understand and support a host nation’s internal defense and development strategy. In the long run, the host nation, and not the U.S., will either defeat or be defeated by the insurgency. Supporting a host nation’s internal defense and development plan is one of the more effective ways in which the U.S. enables a host nation to defeat an insurgency. (See JP 3-22 for more information on internal defense and development.) ETHICAL APPLICATION OF LANDPOWER IN UNIFIED ACTION 1-36. Army and Marine Corps leaders should clearly understand how adherence to a professional ethic provides the moral basis for unified action and how it becomes a force multiplier in all operations. The actions of Army and Marine Corps professionals are framed by the disciplined, ethical application of force. This is the foundation for unified action. Effective, ethical leaders must communicate to their Soldiers and Marines that American values affect every aspect of how U.S. forces fight and win a counterinsurgency. This instills in them the concept of honorable service and builds esprit de corps, two essential characteristics of the military profession, while enhancing resilience and preventing or reducing moral injuries to Soldiers and Marines. Unified action requires the judicious use of lethal force balanced with restraint and tempered by professional judgment. Combat in counterinsurgency often obligates leaders, Soldiers, and Marines to apply force in a precise manner to accomplish the mission without causing unnecessary loss of life or suffering. To maintain U.S. legitimacy, to ensure international credibility, and to safeguard the U.S., Soldiers and Marines cannot afford to misuse the lethal power provided to them by the U.S. government. 1-37. Soldiers and Marines are not permitted to use force disproportionately or indiscriminately. Typically, more force reduces tactical risk in the short term. But in counterinsurgency, the more force that is used, the less effective it can be. It is more likely that counterinsurgents will achieve an end state by protecting a 1-10 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding the Strategic Context population, not the counterinsurgency force. When military forces remain in secure compounds, they lose touch with the situation, appear to be indifferent to the population, simplify enemy intelligence operations, or appear afraid to engage the insurgents. In effect, they concede the initiative to the insurgents. To be successful, counterinsurgency forces must work with and share risks with the host-nation forces and the population. Soldiers and Marines must accept some risk to minimize harm to noncombatants. Accepting prudent risk is an essential part of the warrior ethos and an obligation of honorable service. 1-38. Leaders must accept ambiguity and risk, which are inherent to decentralized operations. The presence of a local population within which insurgents may disappear creates a high degree of ambiguity. Operationally adaptable leaders observe the rapidly changing situation, identify its key characteristics, determine what has to be done in consultation with subordinates and host-nation forces, and determine the best method to accomplish the mission. They must assess and accept prudent risk, and they must adjust rapidly as conditions change. They must be able to shift operational tasks from capacity building to combat and back again in days, or even hours. Alert junior leaders recognize the dynamic context of a tactical situation and can use their professional judgment to apply informed lethal and non-lethal force to achieve the commander’s intent. Any use of force generates a series of reactions. The general rule for the use of force for the counterinsurgents is “do not create more enemies than you eliminate with your action.” The more force is applied, the greater the chance of collateral damage and mistakes. There will be times when an overwhelming effort is necessary to destroy or intimidate an opponent and reassure the populace. However, counterinsurgency forces should calculate carefully the type and amount of force to be applied and who wields it for any operation. Using force precisely and discriminately strengthens the rule of law that needs to be established in the host nation. Normally, counterinsurgency forces can use escalation of force procedures to minimize unnecessary loss of life or suffering. These procedures are especially appropriate during an operation in which the counterinsurgent security force interacts with the local population. All interactions between security forces and the population directly impact legitimacy. (See chapter 13 for legal information on the use of force). 1-39. Who wields force is also important. If the police have a reasonable reputation for competence and impartiality, it may be better for them to execute urban raids than military forces because the population is more likely to view their application of force as legitimate. This is true even if the police are not as well armed or as capable as military forces. Local circumstances, however, affect this decision. For example, if the police are seen as part of an ethnic or sectarian group oppressing the general population, their use may be counterproductive. (See chapter 10 regarding the development of host-nation security forces and chapter 12 regarding assessing counterinsurgency operations. For further discussions on use of force, see chapter 13.) 1-40. The environments where counterinsurgency operations exist can be much more ethically complex than those associated with conventional conflicts. Many leadership and ethical imperatives are prominent and, in some cases, unique to counterinsurgency. The dynamic and ambiguous environment of modern counterinsurgency places a premium on leadership at every level, from sergeant to general. Application of decentralized authority and decisionmaking is more prevalent in counterinsurgency than other types of military operations. Combat in a counterinsurgency is frequently a small-unit leader’s fight; however, senior leaders set the conditions and the tone for all actions by subordinates. Today’s Soldiers and Marines must rapidly adapt cognitively and emotionally to the perplexing challenges of counterinsurgency and master new competencies in dynamic contexts. Those in leadership positions must provide the moral compass for their subordinates as they navigate this complex environment. Underscoring these imperatives is the fact that exercising leadership in the midst of ambiguity requires intense, discretionary professional judgment. Army and Marine Corps leaders are expected to demonstrate their competence, character, and commitment to their professional ethic. All leaders must continually reconcile mission effectiveness, ethical standards, and thoughtful stewardship of the nation’s precious resources—human and material—in the pursuit of national aims. Leaders must link tactical actions to strategic objectives and to the host nation’s essential political goals. U.S. forces must use the combat multiplier of seeking and maintaining the moral high ground in a counterinsurgency. Doing so guarantees maintaining trust with the American people and upholds the ideals of the profession of arms. 13 May 2014 FM 3-24/MCWP 3-33.5 1-11 Chapter 1 A WHOLE-OF-GOVERNMENT EFFORT 1-41. Accomplishing U.S. policy objectives in any conflict requires government expertise and resources outside of the Department of Defense (DOD). Policy objectives, especially during a conflict, require a whole-of-government effort. A whole-of-government approach integrates the collaborative efforts of the departments and agencies of the U.S. government to achieve unity of effort toward a shared goal. A whole-of-government effort is vital to achieving the balance of resources, capabilities, and activities that reinforce progress made by one of the instruments of national power while enabling success among the others. It relies on coordination among the agencies of the U.S. government, including DOD, to ensure that the full range of available capabilities are used, synchronized, and applied to a given policy objective. Government agencies usually agree upon relationships and authorities in a memorandum of agreement or understanding. Military commanders exercise only the authority outlined in these agreements and are often directed by another agency. The terms in these documents may form the basis for establishing some form of relationship between commanders and agency chiefs. When unity of command is not possible, commanders strive to achieve unity of effort. Often, the interpersonal relationships that commanders establish with their interagency partners are essential. 1-42. A whole-of-government effort incorporates all of the capabilities of the U.S. government to achieve U.S. national objectives. In many counterinsurgencies, for example, political objectives include assisting the host nation with managing the nonmilitary aspects of the insurgency. Therefore, these political objectives include eliminating the root causes of the insurgency. However, counterinsurgency commanders and planners must understand that, in the end, societies must address their own root causes of insurgency. Imposing major reforms may result in unintended consequences. Enabling a host nation to address the insurgency’s root causes increases its chances of defeating it. In dealing with the sorts of complex socio-cultural problems that counterinsurgents frequently face, “host-nation good enough” is normally better than what the U.S. would consider perfect, if it meets U.S. objectives. 1-43. A primary challenge for integrating civilian and military efforts into a whole-of-government effort is the differing capabilities, capacities, cultures, objectives, and approaches in civilian agencies compared to those of military forces. A successful whole-of-government effort requires that all actors— Are represented, integrated, and actively involved in the process. Share an understanding of the situation and problem to be resolved. Strive for unity of effort toward achieving a common goal. Integrate and synchronize capabilities and activities. Collectively determine the resources, capabilities, and activities necessary to achieve their goal. 1-44. The importance of the commander’s personal involvement in building interorganizational trust, understanding, mutual respect, and friendships cannot be overstated. If organizational leaders do not set the appropriate tone and establish the necessary climate, the best whole-of-government plan will fail. 1-45. A clear understanding of the desired end state and national objectives should infuse all efforts, regardless of the agencies or individuals charged with their execution. Given the primacy of political considerations, military forces often support civilian efforts. However, the nature of counterinsurgency operations means that lead responsibility often shifts among military, civilian, and host-nation authorities. In other words, as the U.S. shifts its policy and strategy, different agencies take on different roles during an operation. Different or changing relationships with the host nation may also drive shifts in lead responsibility between different authorities. Military leaders prepare to assume local leadership for counterinsurgency efforts if civilian leadership is unavailable or cannot access the area. 1-46. U.S. land forces conducting counterinsurgency operations must recognize the legal authority of the Department of State, their chief country team, and the chief of mission. The chief of mission, who is normally the ambassador, is the principal officer in charge of a diplomatic facility of the U.S. The country team is the senior, in-country, U.S. coordinating and supervising body. Commanders ensure that they gain an understanding of the purposes, goals, and restrictions under which their interagency partners are operating. Without such an understanding, the military and nonmilitary efforts may frustrate and interfere with one another because the military and civilian organizations are functioning under separate statutory obligations that may lead to conflicting guidance and direction. 1-12 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding the Strategic Context COMPREHENSIVE EFFORT 1-47. A comprehensive effort, at a minimum, incorporates all the capabilities of U.S and host-nation governments, and may include intergovernmental and regional organizations, and nongovernmental organizations (NGOs) to address the root causes of the insurgency, in conjunction with military operations aimed at the insurgents themselves. This is difficult because many organizations will be operating in the same area, some conducting combat operations and others using non-lethal methods such as education programs and humanitarian assistance. Each organization will have different perspectives or interests. Foreign area officers may be essential in ensuring these various organization work in a comprehensive effort. Some organizations that may be part of a comprehensive effort are— Other governments’ agencies. Multinational forces. Multinational corporations and contractors. Intergovernmental organizations, such as the United Nations. NGOs. Private sector corporations. Other organizations that wield diplomatic, informational, and economic power. 1-48. These various organizations may work with, in parallel to, separately from, or counter to U.S. government and civilian agencies supporting counterinsurgency efforts. Those organizations whose goals align at least partially with U.S. government goals frequently have capabilities that, if properly synchronized and coordinated, can be critical to achieving success in counterinsurgency operations. Aligning U.S. military, NGO, and intergovernmental organization capabilities requires collaboration and cooperation focused toward a common goal. This can be more difficult than working with other U.S. government agencies. Where military operations typically demand unity of command, the challenge for military and civilian leaders is to forge unity of effort among the diverse array of actors involved in a counterinsurgency. Often, the legal, cultural, and operational requirements prevent direct collaboration between U.S. land forces and non-U.S. civilian organizations. U.S. forces may encounter NGOs not aligned with any insurgent faction who are providing humanitarian assistance. These organizations can be neutral or hostile to U.S. policy goals. Commanders should handle such groups carefully and professionally. Commanders work to understand the objectives and priorities of each organization. Unity of effort between U.S. forces and host-nation forces is particularly critical. Understanding these organizations is essential to understanding the operational environment and shaping effects on organizations that are hostile or neutral to U.S. policy goals. (See JP 3-08 for more information on NGOs.) UNITY OF COMMAND AND EFFORT 1-49. Unity of command is the operation of all forces under a single responsible commander who has the requisite authority to direct and employ those forces in pursuit of a common purpose (JP 3-0). Where possible, counterinsurgency leaders achieve unity of command by establishing and maintaining formal command or support relationships. While designated officers will exercise unity of command of military forces, such relationships will not usually include nonmilitary U.S. government organizations engaged in a counterinsurgency mission. (See ADRP 5-0 for more information on unity of command.) 1-50. Unity of command of military forces is operationally desirable and important for the military to establish. However, unity of command is almost impossible to achieve among all of the various actors in a counterinsurgency. Differing political objectives, national caveats, the legal limitations on the use of force, and sensitivities about subordinating national forces to those of other states or intergovernmental organizations often preclude strong command relationships. While agreements that establish a multinational force provide a legal foundation for determining the scope and limitations on authorities, responsibilities, command, support, or other relationships, the reality might be less clear. Unity of command is one of the most sensitive and difficult to resolve issues in a counterinsurgency. 1-51. When unity of command with part or all of the force, including nonmilitary elements, is not possible, commanders work to achieve unity of effort. Unity of effort is coordination and cooperation toward common objectives, even if the participants are not necessarily part of the same command or organization, which is the product of successful unified action (JP 1). In a counterinsurgency operation, an example of 2 June 2014 FM 3-24/MCWP 3-33.5, C1 1-13 Chapter 1 unity of effort could be a military commander and a civilian leader ensuring that governance and economic lines of effort are fully coordinated with military operations. Unity of effort among nationally, culturally, and organizationally distinct partners is difficult to maintain, given their different layers of command. To achieve unity of effort requires participants to overcome cultural barriers and set aside parochial agendas. It also requires that each organization understand the capabilities and limitations of the others. COORDINATION 1-52. In counterinsurgency operations, coordination efforts should include key participants from the outset. The joint commander, through the strategic concept, works with the engaged civilian organizations to build an interagency coordination plan during the joint operation planning process. Subordinate joint force commanders and Army commanders also build civilian organization participation into their operations plans. This is essential in integrating other government agencies and NGOs. Within an area of responsibility and a joint operations area, appropriate decisionmaking structures are established at combatant command, joint task force headquarters, and tactical levels in order to coordinate and resolve military, political, and humanitarian issues. 1-53. The complex diplomatic, informational, military, and economic context of insurgency and counterinsurgency precludes military leaders from exercising unity of command over civilian organizations—and they should not try to do so. Interagency partners, NGOs, and private organizations have many interests and agendas that military forces cannot control. In addition, the degree of independence of local institutions affects their legitimacy to the population. However, military leaders should make every effort to ensure that counterinsurgency actions are as well integrated as possible, taking into consideration the distinct mission, need for independence, and security requirements of other organizations. Coordination between the various actors in a counterinsurgency is essential. 1-54. U.S. government agencies should participate in coordination meetings to ensure integration with military and host-nation plans. At the joint headquarters level, the commander establishes joint interagency coordination groups. A joint interagency coordination group provides timely, usable information and advice from an interagency perspective to the commander. Joint interagency coordination groups share and integrate information and assist with synchronization, training, and exercises. Joint interagency coordination groups may include representatives from other federal departments and agencies, state and local authorities, and liaison officers from other commands and DOD components. The interagency representatives and liaison officers are the subject matter experts for their respective agencies and commands. They provide the critical bridge between the commander and interagency organizations. (See JP 3-08 for more information on joint and interagency coordination.) 1-55. Coordination between NGOs may be difficult or impossible. Direct interaction among various organizations may be impractical or undesirable because of various goals of NGOs and a NGO’s desire to be seen by the society as autonomous. The differing goals and fundamental independence of NGOs and local organizations usually prevent formal relationships governed by command authority. In the absence of such relationships, military leaders seek to cooperate with other participants to contribute to achieving counterinsurgency objectives. Informal or less authoritative relationships include coordination and liaison. Basic awareness and general information sharing may be all that is possible. Nevertheless, NGOs and other organizations may resist or refuse cooperation because of the appearance of cooperating with military forces. However, government and internal agencies offer links to the various NGOs so coordination can be accomplished without directly interacting with NGOs and causing potential security issues for them. 1-56. Commanders are responsible for coordinating the activities of military forces and cooperative nonmilitary organizations in their areas of operations. To carry out this responsibility, military and civilian leaders may establish a coordinating structure, such as an area coordination center or civil-military operations center at each subordinate political level of the host-nation government. Area coordination centers and civil-military operations centers provide forums for sharing information, conducting coordination and liaison, and ensuring an effective and efficient division of labor. Active commander involvement ensures coordination, establishes liaison (formal and informal), and shares information. Influencing and persuading groups outside a commander’s authority requires skill and subtlety. In some cases, informal meetings with a civilian group at a civil-military operations center will grow to an informal 1-14 FM 3-24/MCWP 3-33.5, C1 2 June 2014 Understanding the Strategic Context liaison that eventually leads to close cooperation. (See JP 3-22 for more information on coordinating structures.) 1-57. Leaders ensure the various organizations supporting counterinsurgency operations in each area know which commander is responsible for the respective areas of operation. Multiple organizations operating within a land force commander’s area of operations—such as U.S. government, multinational forces, host nation, interagency organizations, and special operations forces—might increase the risk of fratricide, insider threats, and civilian casualties and may create tactical and operational gaps that insurgents can exploit. 1-58. Entities best qualified to accomplish nonmilitary tasks may not always be available. In such cases, military forces may need to perform those tasks until civilian-led capabilities become available. Within the Army, civil affairs is the branch ideally organized, trained, and equipped to assist commanders in these functions. Sometimes forces already have the skills required, and at other times they learn them during execution. By default, U.S. and multinational military forces often possess the only readily available capability to meet many of the local population’s fundamental needs. As such, it is important for commanders to assess the capabilities of their forces and other organizations on the battlefield. UNIFIED ACTION PARTNERS 1-59. Army and Marine forces conduct counterinsurgency with unified action partners. Unified action partners are those military forces, governmental and nongovernmental organizations, and elements of the private sector with whom Army and Marine Corps forces plan, coordinate, synchronize, and integrate during the conduct of operations. Unified action partners include joint forces and components, multinational forces, U.S. government agencies and departments, and some intergovernmental and NGOs. Some important unified action partners in a counterinsurgency are— Host-nation government and forces. Joint forces. Department of State. Multinational forces. NGOs. Other organizations. Host-Nation Government and Forces 1-60. The essential unified action partner is the host nation and its own forces. The purpose of counterinsurgency operations, from the viewpoint of the U.S., is to support or enable the host nation to defeat an insurgency. In the worst case situation, this may require the U.S. becoming the primary counterinsurgent or working with groups inside a state to build a legitimate government. However, even in the worse case, the goal is still for the host nation and its forces to defeat an insurgency. Joint Force 1-61. The maritime component plays a critical role in controlling the seas, which may be vital to isolating an insurgency, both physically and psychologically. The expeditionary character and versatility of maritime forces provide an advantage in areas where access is denied or limited. Maritime forces may provide direct support to a joint task force that does not include combat operations, to include civil-military operations, logistic support, intelligence, communication sharing, humanitarian relief, maritime civil affairs, and expeditionary medical aid and training. 1-62. Air forces and capabilities play a vital role in the military contribution to a counterinsurgency. Air contributions include close air support precision strikes; personnel recovery, air interdiction, intelligence, surveillance, and reconnaissance, communications, electronic warfare, combat support, and air mobility. 13 May 2014 FM 3-24/MCWP 3-33.5 1-15 Chapter 1 Department of State 1-63. The U.S. Department of State is responsible for implementing U.S. foreign policy and diplomacy efforts and plays a key role in integrating the capabilities of the U.S. The Department of State leads. It also oversees U.S. government support to counterinsurgency efforts. Several functional bureaus and offices have substantive roles in the development and execution of counterinsurgency strategy. These offices include the Bureau of Political-Military Affairs; the Bureau of Conflict and Stabilization Operations; the Bureau of International Narcotics and Law Enforcement; the Bureau of Democracy, Human Rights, and Labor; the Bureau of Population, Refugees, and Migration; the Bureau of Intelligence and Research; and the Legal Advisor’s Office. The Department of State is responsible for diplomatic programs that assist a host nation with countering an insurgency. In many U.S. military operations—such as governance capacity building—the Department of State is the U.S. supported element and the military is the supporting element. 1-64. One important capability that the State Department maintains is the civilian response corps. The civilian response corps maintains active members who are full time responders whose specific job is to train for, prepare, and staff overseas conflict prevention and stabilization operations. Active members of the civilian response corps can deploy on a 48-hour notice. The civilian response corps also maintains standby members. They are current full-time employees of the U.S. government or retirees of the U.S. Foreign Service. Members in the standby component must be available to deploy within 30 days, for up to 90 days, with the possibility to extend their deployment. The civilian response corps’ work focuses on six skill sets: Planning, operations, and management; security and rule of law; diplomacy and governance; essential services; and force protection. Country Team 1-65. The country team is the senior, in-country, United States coordinating and supervising body, headed by the chief of the United States diplomatic mission, and composed of the senior member of each represented United States department or agency, as desired by the chief of the United States diplomatic mission (JP 3-07.4). In a foreign country, the chief of mission is the highest U.S. civil authority. The chief of mission leads the country team and is responsible for integrating U.S. efforts in support of the host nation. The defense attaché, usually a foreign area officer, will work directly with a county team. The defense attaché provides important links to the country team for the commander. As permanently established interagency organizations, country teams represent a priceless counterinsurgency resource. They often provide significant local knowledge and interaction with the host-nation government and population. (See figure 1-1 for an illustration of country team command relationships. See JP 3-07.4 for more information on the country teams.) Some of the government agencies normally represented on a country team include— The United States Agency for International Development. The Department of Justice. The Department of Treasury’s Office of Terrorism and Financial Intelligence. The Department of Homeland Security. The Department of Agriculture. 1-16 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding the Strategic Context Figure 1-1. Country team command relationships 1-66. An important enabler for ensuring unity of effort in countering an insurgency, especially when the U.S. is enabling a host nation with various capabilities, is foreign area officers. These officers can be an essential link to an embassy’s country team. By virtue of unique language proficiency and cultural and regional expertise, foreign area officers can be critical in helping to integrate various capabilities into the host nation’s ongoing efforts. While foreign area officers are often associated with security cooperation activities, such as foreign military sales, foreign area officers have historically provided essential strategic thinking and planning necessary to enable a host nation. As core members of the security cooperation organization and defense attaché office within the embassy country team, foreign area officers serve as key advisors to ambassadors and combatant commanders. Foreign area officers routinely operate in a whole-of-government, joint, intergovernmental, and multinational environment. They can be essential in integrating resources, capabilities, and activities throughout U.S. and multinational agencies to achieve unity of effort and accomplish national counterinsurgency objectives. Multinational Forces 1-67. Soldiers and Marines normally function as part of a multinational force, for example, by supporting the United Nations or as part of the North Atlantic Treaty Organization. Each multinational participant provides capabilities and strengths that U.S. forces may not have. Many other countries’ military forces provide cultural backgrounds, historical experiences, and other capabilities that can be particularly valuable to counterinsurgency efforts. 13 May 2014 FM 3-24/MCWP 3-33.5 1-17 Chapter 1 1-68. Nations join multinational efforts for various reasons. Although the missions of multinational partners may appear similar to those of the U.S., rules of engagement, host-nation policies, and sensitivities may differ among partners. U.S. military leaders require a strong cultural and political awareness of other multinational military partners. Planners must be aware that multinational forces may also require significant U.S. enabling capabilities such as medical evaluation and logistic support. (See JP 3-16 and the American, British, Canadian, Australian, and New Zealand (ABCA) Coalitions Operations Handbook for more information on multinational partners.) Nongovernmental Organizations 1-69. A nongovernmental organization is a private, self-governing, not-for-profit organization dedicated to alleviating human suffering; and/or promoting education, health care, economic development, environmental protection, human rights, and conflict resolution; and/or encouraging the establishment of democratic institutions and civil society (JP 3-08). There are several thousand NGOs of many different types. Organizational charters and their members’ motivations govern their actions. Some NGOs receive at least part of their funding from national governments or intergovernmental organizations. Some may become implementing partners according to grants or contracts. For example, the United States Agency for Internal Development contracts some NGOs to perform certain functions. In these cases, the funding organization often gains oversight and authority over how to use the funds. 1-70. To ensure their own security and gain access to vulnerable populations in theaters of conflict, most NGOs maintain neutrality, impartiality, and independence from all sides in a counterinsurgency. These positions provide NGOs protection against claims of favoritism by the parties to armed conflict and enhance the credibility and security of these organizations. 1-71. Depending on the degree to which NGOs follow these principles, NGOs may carry out their work with a very different frame of reference from that of the government. Rather than perceiving their organization as supporting the overall U.S. or multinational stabilization effort, they may view the situation from the perspective of the victims of conflict, regardless of their affiliation with belligerent parties. They may give preference to individuals and communities based on humanitarian need, rather than meeting operational objectives. 1-72. While NGOs sometimes choose to coordinate their activities with the U.S. government for security, policy, or funding, often they are reluctant for fear of being associated with the government’s political goals in conflict. This creates a natural but often unavoidable tension in the relationship. Commander’s ease this tension through a mutual understanding of respective mandates and a clear delineation of tasks. For example, some organizations, such as the International Committee of the Red Cross, refuse to take armed escorts in conflict zones, relying instead on their wide recognition as neutral, independent, and impartial humanitarian actors. Commanders ensure information is available to NGOs to allow them to deconflict ground and air routes and provide contact information for them to coordinate safe passage in areas with active air or ground defense measures. At a minimum, air information should be passed through International Civil Aviation Organization notices to airmen and host-nation aeronautical information publications. 1-73. Many NGOs may operate in conflict areas long before external military forces arrive. These NGOs may remain after forces depart. Depending on their mandate, they can support critical host-nation government functions, or can contribute to the stabilization effort. To the greatest extent possible, commanders attempt to complement rather than override their capabilities. Commanders strive to build a complementary, trust-based relationship based on mutual understanding and a clear delineation of objectives and tasks. Other Organizations 1-74. An intergovernmental organization is an organization created by a formal agreement between two or more governments on a global, regional, or functional basis to protect and promote national interests shared by member states (JP 3-08). Regional organizations like the Organization of American States and European Union or global organizations such as the United Nations may be involved in some counterinsurgency 1-18 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding the Strategic Context operations. The United Nations, in particular, has many subordinate and affiliated agencies active worldwide. 1-75. In the private sector, multinational corporations and other businesses often operate in a conflict environment. At a minimum, commanders should know which companies are present in their area of operations and where those companies are conducting business. Understanding the overall profit motivation of these business will help commanders understand their actions in the operational environment. 1-76. When the U.S. government pays contractors, the principle of unity of command should apply. Commanders should influence contractors’ performance through U.S. government contract supervisors. Commanders should identify contractors operating in their area of operations and determine the nature of their contract, accountability mechanisms, and appropriate coordination relationships. (See FM 4-92 for more information on contractors.) STRATEGIC PRINCIPLES 1-77. Whatever type of strategy and operational approach that a counterinsurgency takes, several strategic principles are normally relevant. Whether the U.S. is enabling a host nation with certain capabilities or directly using its land forces, the principles listed in paragraphs 1-78 through 1-92 are relevant to most counterinsurgency operations. However, these principles are not meant to be exclusive rules for every conflict. They are provided for the practitioner and planner as a foundation for how they think about planning and executing counterinsurgency operations. LEGITIMACY IS THE MAIN OBJECTIVE 1-78. Fostering development of effective governance by a legitimate government that can provide security and acts in the best interests of its people may be essential to countering an insurgency. Legitimacy can be seen as the willing acceptance of a government by its population. Counterinsurgency forces may achieve this objective by the balanced application of both military and nonmilitary means. Governments rule through a combination of consent and coercion. Governments that are “legitimate” normally rule with the consent of the governed; those described as “illegitimate” tend to rely mainly or entirely on coercion. Citizens of the latter tend to obey the state for fear of the consequences of doing otherwise, rather than because they voluntarily accept its rule. Legitimacy is a perceived condition by the population that can only be achieved by host-nation government actions that lead to an acceptance of its primacy by the people. (See paragraphs 1-27 through 1-33 for more information on legitimacy and control.) COUNTERINSURGENT FORCES MUST UNDERSTAND THE ENVIRONMENT 1-79. Successful conduct of counterinsurgency operations depends on thoroughly understanding the society and culture within which they are being conducted. In most counterinsurgency operations in which foreign forces participate, insurgents hold a distinct advantage in their level of local knowledge. They speak the language, move easily within the society, and are more likely to understand the population’s interests. Thus, for foreign forces participating in counterinsurgency operations, they require a greater emphasis on certain skills, such as language and cultural understanding. Understanding the operational environment allows the counterinsurgent to identify the conditions which impact the prerequisites for the insurgency and the root causes that are driving the population to accept the insurgency. Only through understanding the operational environment can the counterinsurgent plan and execute successful operations to counter the conditions that allow the insurgency to exist in the first place. Nevertheless, U.S. forces must never assume they will be welcomed by a local population. They may even be viewed as occupiers. (See chapter 2 for a discussion on developing an understanding of the operational environment.) INTELLIGENCE DRIVES OPERATIONS 1-80. Effective counterinsurgency operations are shaped by timely, relevant, tailored, predictive, accurate, and reliable intelligence, gathered and analyzed at the lowest possible level and disseminated throughout the force. Without accurate and predictive intelligence, it is often better to not act rather than to act. Gaining situational understanding before action is often essential in avoiding long term damage to mission objectives. In environments where commanders do not have situational understanding, the first action they 13 May 2014 FM 3-24/MCWP 3-33.5 1-19 Chapter 1 should take is to use forces to gain that understanding while not creating unintended and lasting harm to the mission. (See chapter 11 for more information on intelligence.) 1-81. Because of the dispersed nature of counterinsurgency operations, the actions of counterinsurgency forces are key generators of intelligence. In counterinsurgency operations, a cycle often develops where intelligence drives operations, which produces additional intelligence that facilitates subsequent operations. Reporting by tactical units and civilian agencies is often of greater importance than reporting by specialized national intelligence assets. These factors, along with the need to generate a favorable tempo (rate of military operations) drive the requirement to produce and disseminate intelligence at the lowest practical level. Commanders are responsible for driving the intelligence process. 1-82. Understanding the operational environment extends beyond insurgent combatants and insurgent leaders. To truly counter an insurgency, counterinsurgents must gather, analyze, and disseminate civil information pertaining to the population. If legitimacy is the primary principle of counterinsurgency operations, then identifying what is preventing legitimacy is as important, if not more so, than intelligence pertaining to enemy actions. Since Army and Marine Corps forces conduct counterinsurgency with unified action partners, it is vital to separate intelligence and civil information. Some partners, particularly NGOs, may not exchange information with Army and Marine Corps forces if that information is overtly tied to intelligence collection. Achieving a common situational understanding with unified action partners will require exchanging information outside of the intelligence realm. SECURITY UNDER THE RULE OF LAW IS ESSENTIAL 1-83. Whenever possible, security forces should be provided by the host nation. To establish legitimacy, the affected government must strive to transition security activities from military authorities to host-nation law enforcement authorities as quickly as feasible. When insurgents are seen as criminals, they lose public support. Prior to any transition to full host-nation responsibility, however, the violence level must be reduced enough for the host-nation counterinsurgency forces to maintain order; otherwise, the host-nation counterinsurgency forces will be unable to secure the population and the host nation may lose the legitimacy gained by the transition. U.S. counterinsurgent forces must also understand how the military and police are viewed by the population and not assume they are always seen as protectors. The goal of a change to a host-nation security force is an accountable, self-sustaining, capable, and credible force able to meet the security challenges faced by the host nation and seen as legitimate by the population. 1-84. Security forces use a legal system that conforms to local culture and practices to deal with insurgents and criminals and that enhances the affected government’s legitimacy. To succeed in countering an insurgency, the host-nation government must develop its legal and conflict resolution systems, including police forces, judicial systems, and penal facilities. The legal use of population control measures, including curfews, movement restrictions, travel permits, registration cards, and biometric census may assist in identifying the insurgents and protecting the population. COUNTERINSURGENT FORCES SHOULD PREPARE FOR A LONG-TERM COMMITMENT 1-85. Counterinsurgency operations can be protracted. Though most insurgencies are quickly defeated by the host nation and its military forces, U.S. involvement normally comes in insurgencies that are not quickly defeated. Insurgents can become extremely difficult to identify, track, and interdict if they are effective in acting clandestinely. Insurgencies may persist for many years after the main threat has been broken. Thus, counterinsurgency operations may demand considerable expenditures of time and resources. The population must have confidence in the staying power of both the affected government and any counterinsurgency forces supporting it. The population may prefer the affected government to the insurgents; however, people do not actively support a government unless they are convinced that the government has the means, ability, stamina, and will to win. Stabilizing the security situation and transforming a failed, failing, or ineffectual government into a functional one is an extremely difficult task that may take an extended period to complete. (See paragraphs 4-70 through 4-75 for information on the seventh dynamic, phasing and timing.) 1-20 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding the Strategic Context MANAGE INFORMATION AND EXPECTATIONS 1-86. Information and expectations are related; skillful counterinsurgency forces manage both. To limit discontent and build support, the affected government and any counterinsurgency forces assisting it create and maintain a realistic set of expectations among the population, friendly military forces, and the international community. The key tools to accomplish this are information operations through the effective coordination and synchronization of information related capabilities. Effective counterinsurgency commanders tell the truth; they refuse to give projections; and they do not promise more than can be provided. Achieving steady progress toward a set of reasonable expectations can increase the population’s tolerance for the inevitable inconveniences of ongoing counterinsurgency operations. Where a large foreign force is present to help establish a regime, this progress can extend the period until foreign forces are perceived by the population as an army of occupation. 1-87. Effective counterinsurgency forces must ensure that their deeds match their words and both are consistent with the broader narrative. They should also understand that any action has an information reaction. Counterinsurgency forces should carefully consider that information reaction’s impact on the many audiences involved in the conflict and on the sidelines. They should work actively to shape responses that further their ends. In particular, messages to different audiences must be consistent. In the global information environment, people in the area of operations can access the internet and satellite television to determine the messages counterinsurgency forces are sending to the international community. Any perceived inconsistency reduces credibility and undermines counterinsurgency efforts. USE THE APPROPRIATE LEVEL OF FORCE 1-88. Any use of force generates a series of reactions. There will be times when an overwhelming effort is necessary to destroy or intimidate an opponent and reassure the population. However, counterinsurgency forces, whether they are land, maritime, or air, calculate carefully the type and amount of force to be applied and who wields it for any operation. Normally, counterinsurgency forces can use escalation of force procedures to minimize unnecessary loss of life or suffering. These procedures are especially appropriate during any operation in which the counterinsurgent security force interacts with the local population. 1-89. All interactions between security forces and the population directly impact legitimacy, and if the counterinsurgent security forces show restraint in the eyes of the population, the entire counterinsurgency effort is further legitimized. The general rule for the use of force for the counterinsurgents is “do not create more enemies than you eliminate with your action.” Escalation of force does not limit the right of self-defense, including the use of deadly force when such force is necessary to defend against a hostile act or demonstrated hostile intent. However, counterinsurgency forces must be properly trained in such procedures and, more importantly, in methods of shaping situations so that tactical leaders have to make fewer split-second, life-or-death decisions. LEARN AND ADAPT 1-90. An effective counterinsurgency force is a learning organization. Insurgents connected with other organizations constantly exchange information about their enemy’s vulnerabilities—even with insurgents in distant theaters. However, skillful counterinsurgency forces can adapt at least as fast as insurgents. Every unit needs to be able to make observations, draw and apply lessons, and assess results. Commanders must develop an effective system to circulate best practices throughout their command. Commanders might also need to seek new policies that authorize or resource necessary changes. Insurgents shift their locations looking for weak links, so widespread competence is required throughout the counterinsurgency force. EMPOWER THE LOWEST LEVELS 1-91. Local commanders have the best grasp of their situations, but they require access to or control of the resources needed to produce timely intelligence, conduct effective tactical operations, and manage intelligence and civil-military operations. Leaders encourage individual initiatives and facilitate the learning that must occur at every level. Effective counterinsurgency operations are decentralized, and higher commanders owe it to their subordinates to push as many capabilities as possible down to their levels. However, this must be balanced with ensuring that tactical leaders have the situational 13 May 2014 FM 3-24/MCWP 3-33.5 1-21 Chapter 1 understanding of the wider operational and strategic consequences of their actions. While tactical missions are essential, commanders ensure that tactical missions support the overall objectives to defeat the insurgency. SUPPORT THE HOST NATION 1-92. In the situation of U.S. and multinational forces committed to assisting a host-nation government with its counterinsurgency strategy, the long-term goal is to leave a government able to stand by itself. In the end, the host nation has to win on its own. Achieving this requires development of viable local leaders and institutions. External assistance can help, but host-nation authorities must accept responsibilities to achieve real victory. Depending upon the condition of the host-nation government (failed, failing, or viable), a robust whole-of-government approach is critical to enabling that government to accept those responsibilities. In a failed or failing state, there may be no functioning government or national economy. The counterinsurgent, therefore, will be forced to create institutions necessary to provide governance and support economic development. While it may be easier for U.S. military units to conduct operations themselves, it is better to work to strengthen local forces and institutions and then assist them. Host-nation governments have the final responsibility to solve their own problems. Eventually all foreign armies are seen as interlopers or occupiers. The sooner the decisive effort can transition to host-nation institutions without unacceptable degradation, the better. 1-22 FM 3-24/MCWP 3-33.5 13 May 2014 Chapter 2 Understanding an Operational Environment 2-1. Regional and strategic conditions affect United States (U.S.) involvement in opposing an insurgency. How and why the U.S. becomes involved in an insurgency is important. However, some important strategic trends can also affect the context of an insurgency. These global trends include demographic changes, globalization, the proliferation of weapons of mass destruction, religious extremism, and failed states leading to an era of persistent conflict. Persistent conflict is the protracted conflict among state, non-state, and individual actors who are increasingly willing to use violence to achieve their political and ideological ends. These trends not only affect the likelihood of conflict, but they also affect the capabilities and action of friendly, threat, neutral, and nonaligned actors. 2-2. Understanding the conditions that may affect the stability of a nation or region assists commanders as they focus on a specific operational environment to determine the root causes that led to an insurgency. Whether operating at the operational or tactical level, commanders must understand and anticipate the effects of their operations and how they fit into the broader mission. The U.S. may enter situations with long-standing conflicts and established ways of life that have implications beyond the boundaries of a specific area of operations. Commanders identify relationships within that area that may exert external influence on other governments that have their own agendas in the region. Commanders also recognize that in the modern, interconnected world, actions at any level may have far broader impact than intended. This, coupled with certain global trends, may provoke more insurgencies in the future. DEMOGRAPHIC AND URBANIZATION TRENDS 2-3. In the future, the world will become more populated and urbanized. Global population will increase by approximately 1.2 billion people by 2025 with more than a billion new urban dwellers in that time. Most population growth will occur in the developing world. Population growth, urbanization, and competition for limited resources in the Middle East, Africa, and South Central Asia will contribute to increased resource scarcity and may present governance challenges. Climate change combined with increased population centers in or near coastal environments may challenge the ability of failing and fragile states to respond to natural disasters. These conditions enhance the possibility of insurgencies in highly populated developing countries whose governments lack the capacity to provide effective governance, including security and the rule of law. These trends could lead to failed states and problems that will affect regional and global security because of globalization. 2-4. Urbanization is the growth of urban areas due to both a population surge and migration. In 1950, 29 percent of the world’s population lived in urban areas; by 2050, scientists estimate that 60 percent of the world’s population will live in urban areas. This rapid growth of urban areas, and the accompanying crowded conditions with the potential for high unemployment, creates a greater potential that future insurgencies may arise in urban areas. GLOBALIZATION 2-5. Globalization is a combination of the technological, economic, social, cultural, and political forces that are bringing nation-states and the people of the world closer together. Globalization affects an insurgency by providing a freer flow of arms, information, and money to an insurgent group or insurgents and allows an insurgency to have a wider strategic effect than in the past. It is easy for ethnic groups or ideological groups to connect internationally because of globalization. Globalization provides a greater likelihood that insurgents will have access to outside resources, or that they will try to affect objectives outside of their local area. Through technology, globalization allows an insurgent to gain access to cyber electromagnetic tools that could be used to attack any country. It also makes ideologically or religiously motivated insurgencies more prevalent due to closer contact between traditional and modern societies. 13 May 2014 FM 3-24/MCWP 3-33.5 2-1 Chapter 2 PROLIFERATION OF WEAPONS 2-6. The proliferation of weapons of mass destruction and precision weapons will increase the potential for catastrophic attacks. The threat or use of weapons of mass destruction by terrorist organizations is as real as it is deadly. Weapons of mass destruction present significant possibilities beyond terrorist actors. If an insurgent group acquires them, they can allow the insurgent group to pressure the host nation or attack a target that would have countrywide, regional, or global strategic affects. These weapons can provide an insurgent group with capabilities unmatched in the history of irregular warfare. The likelihood of an insurgent group obtaining these weapons has never been higher because of both globalization and the number of failed states. As ethnic and ideological groups enhance bonds that go beyond state boundaries, and insurgent groups create vast safe haven areas within failed states, the proliferation of weapons of mass destruction creates new possibilities for insurgencies. Not only will insurgents strive to obtain weapons of mass destruction, but the continued availability of more precise, cheaper, and more lethal conventional weapons will make insurgent actions more deadly than in the past. (See FM 3-11/MCWP 3-37.1 for more information on chemical, biological, radiological, and nuclear operations.) FAILING OR FAILED STATES 2-7. Governments of nation-states face increasingly greater challenges in providing effective support to their growing populations. The problems of both demographic changes and the pressures of globalization, corruption, lack of government services, and decaying infrastructure can lead to a failed state. A failed state can provide insurgent groups safe havens to build their organizations, but it may also hinder their ability to promulgate their message and actions due to a lack of infrastructure. (See FM 3-07 for a detailed discussion on a failed state framework.) THE OPERATIONAL VARIABLES 2-8. An operational environment is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). Commanders and staffs analyze and describe an operational environment in terms of eight interrelated operational variables: political, military, economic, social, information, infrastructure, physical environment, and time. The operational variables are fundamental to developing a comprehensive understanding of an operational environment. 2-9. When viewing an operational environment, it is important to identify friendly, neutral, and hostile actors. However, it is uniquely important in counterinsurgency operations that commanders and staff do not view these actors as static and unchanging over time. Actors can become more hostile or become less hostile. It is the interaction between the actors and the changes between their interactions that is important. The actors have many influences on their actions and those influences help determine if an actor stays the same, becomes friendlier, or becomes more hostile. (See JP 2-01.3 for more information on an operational environment.) 2-10. In Iraq's Anbar Province, the eight interrelated operational variables created a unique operational environment. The al Qaim tribes had different interests, both political and economic, than both the Americans and al Qaeda. Religion, economic interests, culture, and other variables helped to shape the actions of everyone in the operational environment. The Marine Corps had to act in this environment and attempt to shape it. This was a process that required situational understanding and an appreciation for the unique environment. The Anbar Province Operational Environment The Anbar Province’s al Qaim district became increasingly important to Abu Musab al-Zarqawi’s al Qaeda in Iraq after November 2004 when it lost its sanctuary to the American forces’ offensive in the second battle of Fallujah. The al Qaim district is located on Iraq’s border with Syria. Although the district represents only 10% of the Anbar population, the area holds strategic importance due to its location along the Iraqi/Syrian border as well as the Euphrates River. Al Qaim is and always has been a lucrative smuggling route for black market goods and served as al Qaeda in Iraq’s 2-2 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding an Operational Environment lifeline to infiltrate Baghdad with foreign fighters, money, and other resources that fueled the insurgency. With the loss of Fallujah, al Qaim became al Qaeda in Iraq’s newfound sanctuary. Al Qaeda in Iraq arrived with offers of partnering with al Qaim’s tribes to defeat and expel the Americans. They promised the indigenous population money and other resources for their support. As Muslims and Arabs, al Qaeda in Iraq members exhorted that it was their obligation, their Jihad, to fight the crusaders. After all, the Americans, supposedly ignorant of tribal customs, religion, and traditions, allegedly had disrespected and dishonored the people of al Qaim and a patriotic resistance had already formed in the district. The tribes of al Qaim saw the al Qaeda movement as the answer to their problem with the Americans. The tribes, together with al Qaeda in Iraq, felt that the time was ripe to rid the area of the infidel occupiers. Al Qaim tribes varied in available resources and were incapable of defeating the American occupiers on their own. For example, the Albu-Mahal tribe, the strongest tribe in the area, organized and resourced the Hamza Battalion specifically to fight the Americans. However, it, along with the other tribal militias, lacked the weaponry, ammunition, and other equipment to win such a fight on their own. Al Qaeda in Iraq’s offer was tempting and most of the tribes accepted. As time went on it became apparent that al Qaeda in Iraq’s offer was deceptive; this partnership was not what it seemed. Al Qaeda in Iraq provided weaponry and funding, but in return they demanded to lead the Jihad with the intent of first destroying and then transforming the social fabric of the tribes and al Qaim. Al Qaeda in Iraq started by taking over the smuggling routes, skimming large profits and killing those that resisted. They then imposed a radical form of Sharia on the community with fanatical punishments for transgressors. Religion was used to justify al Qaeda in Iraq’s actions, which included marriages to the local women, not allowing cigarettes, the ban of music and films, and the common intimidation tactic of beheading those that resisted. 3rd Battalion 6th Marines (3/6) executed Operation IRON FIST the first week of October, attacking from east to west through the town of Sadah and eastern Karabila, ultimately stopping at the Emerald Wadi in the center of the al Qaim region. They built four combat outposts, Chosin, Iwo Jima, Belleau Wood, and Khe Sahn, and left Marines and Iraqis in place, providing a combined, permanent, persistent, presence. The next clearing operation was conducted the first week in November by 3/6 and 2/1 commanded by Regimental Combat Team 2. This operation cleared the Husaybah, Karabilah, Sadah and Ubaydi areas of all insurgents. Immediately upon clearing the areas, 3/6 began constructing combat outposts in all of the cities. By late November 3/6 had constructed 14 combat outposts in the areas from Husaybah to Ubaydi. Each combat outpost consisted of a U. S. Marine platoon and an Iraqi Army platoon or company. Those positions completed and reflected combined, permanent, persistent presence, where the Marines and Iraqi Army lived together and among the people. The next step was to engage the people. Mission analysis led to assigning company areas based on the tribal distribution. The idea was to link a company with a tribe. This was not an exact science because the tribes were intermingled, but they did locate companies in areas where a majority of a tribe resided. The next step was a concerted drive to recruit tribesmen into the police force. The Marines solicited help from the Sheikhs to nominate men from their tribes, and started developing police stations near the combat outposts. This would allow the Marines and Iraqi Army forces to partner with the local police forces in those areas and further engender trust and confidence from the local people. Moving goods across the Iraqi and Syrian border was closely connected to the local economy. Undermining this trade would jeopardize a fragile relationship that U.S. forces worked hard to develop. In fact, U.S. forces had learned from the sheikhs 2 June 2014 FM 3-24/MCWP 3-33.5, C1 2-3 Chapter 2 that disruption of trade was one of the major grievances the locals had against al Qaeda in Iraq. Local tribes agreed to allow U.S. forces to stop and inspect all vehicles coming into the country to ensure no foreign fighters, money, or weapons were entering Iraq. The tribes also agreed to help with the inspection. New local police largely conducted these inspections with the Iraqi Army (with Marines in overwatch.) The tribes had picked the Iraqi government’s side in the struggle against al Qaeda in Iraq and wanted to stop foreign fighters, money, and weapons from entering Iraq as much as the U.S. forces did. 2-11. Understanding is necessary to begin planning the initial development of measures of effectiveness and performance. The commander must understand what has happened in an operational environment and determine the nature, scope, and severity of its problems. A situation is usually more complicated than it seems when the military force first becomes involved. Understanding an operational environment is a collaborative effort of the unified action partners. These partners may include U.S. government military and civilian personnel, international civilian and military personnel, and host-nation civilian and military personnel. To the maximum extent possible, the military force and unified action partners strive to have a common situational understanding from the beginning of an operation. If the partnering agencies do not have the same situational understanding, they can quickly find themselves working at odds with each other. Commanders will rarely have enough time to fully understand an operational environment. Understanding an operational environment is a continued and iterative process that will continue throughout an operation. 2-12. An area of operations is an operational area defined by the joint force commander for land and maritime forces that should be large enough to accomplish their missions and protect their forces (JP 3-0). For land operations, an area of operations includes subordinate areas of operations as well. 2-13. A commander’s area of operations may be relatively static, but people, weapons, commodities, and information continuously flow through an area of operations. An area of operations can cross physical structures, such as roads and rivers, and span diverse population groups. Fabricated borders that divide natural groupings can create problems in understanding an area of operations. For example, cross-border ties allow insurgents safe havens outside of a tactical unit’s area of operations. Moreover, international boundaries often divide population groups. The span of an insurgency may be far larger than the defined area of operations and areas outside the area of operations may be relevant to a commander. For example, areas outside a commander’s area of operations may provide a safe haven for an insurgency, or an adjacent state may support an insurgency. In an insurgency, an area of interest may be large. 2-14. The area of interest is that area of concern to the commander, including the area of influence, areas adjacent thereto, and extending into enemy territory. This area also includes areas occupied by enemy forces who could jeopardize the accomplishment of the mission (JP 3-0). It is the area in which events could have significant impact on areas of operations. An area of interest can be large relative to the area of operations. When defining an area of interest, commanders should consider the operational variables. (See JP 3-0 for more information on an area of influence.) 2-15. Commanders analyze operational variables to understand the operational environment in which they are conducting operations. An operational environment is not static; it continues to evolve. Introducing units into an operational environment causes shifts and changes. As a result, commanders, their respective staffs, and all Soldiers and Marines must continuously reassess an operational environment for changing conditions. Moreover, in addition to understanding U.S. interests and desired end states in an environment, a commander must understand the environment from three additional perspectives: those of the host nation, the enemy, and the population. POLITICAL 2-16. The political variable describes the distribution of responsibility and power at all levels of governance—formally constituted authorities, as well as informal or covert political powers. The counterinsurgent seeks to understand not just the formal political system, such as political parties and elected officials, but also the informal systems of political influence, such as ethnic groups and other centers of power. There is a connection between the political variable and the social variable. For example, 2-4 FM 3-24/MCWP 3-33.5, C1 2 June 2014 Understanding an Operational Environment a tribal grouping or a social caste may directly affect whom that group sees as a legitimate authority in an area. Moreover, these social groupings can affect the formal power structure. For example, in an electoral system, groups will often vote as blocs, giving them added political power in that formal system. (See ADRP 5-0 for more information on the political variable.) 2-17. Often, informal groups such as tribes or local councils are the essential actors in the distribution of political power, especially at the local level. Political power is the ability to influence behavior. The biggest influence of behavior is often local groupings that can create a norming effect on a population. Most groups hold power only because the population accepts that power distribution. 2-18. However, the opposite can also be true and the formal political system can change group identity and influence the actions of any social group. States can create identity in a population through education and information. For example, an education program that instills nationalist views in an individual from an early age can be a powerful tool in shaping a person’s identity and in turn whom that person sees as a legitimate authority. Group and individual identities are not static, nor is whom a population views as legitimate static. While groups have internal means to view identity, variables outside the group, including the host nation, also affect them. 2-19. The commitment and motivation of a host nation to defeat an insurgency is an important motivation. Governments with more than one of the following traits have tended to lose historically, even when supported by competent and committed external forces: Government sponsors or protects unpopular economic and social arrangements or cultural institutions. Government is involved in corrupt and arbitrary personalistic rule. Government operates as a kleptocracy. Government is controlled by elites with perverse incentives to continue conflict. Government is economically dependent on external actors. The harsh reality for counterinsurgents is that some of these negative characteristics are usually present, and they are key factors in sparking insurgencies in the first place. As a result, the interests of a host-nation government are often at odds with what the best practices would be to solve its political problems. (See paragraphs 1-27 through 1-33 for more information on legitimacy and control.) MILITARY 2-20. The military variable explores the military and paramilitary capabilities of all relevant actors (enemy, friendly, and neutral) in a given operational environment. For many countries, the army’s predominant purpose is to be the military force responsible for maintaining external security. However, this is not a universal rule, and many militaries become involved in internal security and even governance. In some cases, there is a degree of military control over the government, which then blends the political and military variables. This can range from a military dictatorship to a praetorian guard type military that periodically intervenes in the governance of a society. Even in cases where a host nation appears to have complete objective control over its military forces, these military forces can be an important bureaucratic and political actor. The interaction between the military and the political structure is important to understanding this variable’s relationship with the political distribution of power in a society. (See ADRP 5-0 for more information on the military variable.) 2-21. A host of institutions including police, paramilitary, intelligence, and other organizations can maintain internal security. Thus, commanders and staffs need to consider them within the military variable. In many autocratic societies, intelligence agencies provide an essential means of control over a society. Many societies maintain civil control and civil security by an accepted rule of law and a police force that enforces the rule of law. In a counterinsurgency, the host nation may use the military or a paramilitary to defeat an insurgency. 2-22. The military variable includes all forces involved in both internal and external security. U.S. counterinsurgents must fully understand how the host nation maintains internal and external security. Moreover, they must understand both neutral and enemy military forces. Neutral military forces are common in a counterinsurgency, as some states or multinational corporations will employ or contract for 13 May 2014 FM 3-24/MCWP 3-33.5 2-5 Chapter 2 limited forces to protect personnel, resources, or infrastructure for their own interests. A peacekeeping force may be maintaining a position of neutrality in the conflict. There can also be informal groupings of military power. For example, local gangs, armed militias, and private security agents can be a factor in local areas. 2-23. Commanders and staffs should analyze friendly, neutral, and enemy forces with both qualitative and quantitative data. Some aspects to consider include— Position of forces in national and local governmental structure. General organization, training, and doctrine. Economic basis (to include the appropriations system). Conscription or recruitment systems. Police role in the nation’s internal security. Rapport with population. The impact of other international forces already there or there in the recent past. These considerations are particularly important with regard to the insurgents. Knowing from what groups and sources, both within the country of conflict and outside of it, are providing what kinds of support (for example, financial, personnel, materiel, and provisions) and by what processes or routes is critical. Insurgencies that continue to meet their tangible support needs are difficult to defeat. 2-24. One enemy force in a counterinsurgency can vary widely from another. Some may be based on cellular organizations while others may be more hierarchical. Moreover, there may be a wide variance in enemy capabilities. Some insurgencies may have capabilities to conduct large scale and well coordinated attacks that may rival the capability of a host nation’s military. Others may have less capability and may rely on small-unit tactics. (See paragraphs 4-76 through 4-103 for a discussion of the eighth dynamic, organizational and operational patterns, and see chapter 5 for a further discussion on enemy military forces.) ECONOMIC 2-25. The economic variable encompasses individual and group behaviors related to gaining access to, producing, distributing, and consuming resources. These behaviors determine incentives and disincentives that encourage or discourage economic decisions. The sum of these individual and group decisions may determine the production, distribution, and consumption of economic resources. Typically, an economy is conceptualized as currency, stocks, major commodities, banking, and trade controlled and monitored by the government. However, informal economies, trade, or economic exchange outside state-controlled or money-based transactions may be of equal or greater importance than formal economies in understanding an operational environment. While the world economy continues to grow more interdependent, local economies remain relatively distinct. These differences significantly influence political choices, including individuals’ decisions to support or subvert the existing order. When commanders and staffs analyze a local economy, they consider both governmental policies and the type of local economy. 2-26. Types of economies vary widely. When looking at economic activities, commanders and staffs strive to understand the relative importance of the various sectors of an economy. Comparing the percentage of the economy in the public sector versus the private sector provides some understanding of the structure of the economy. Moreover, the private and public sector can potentially be divided into different sectors based on type of activities. Agriculture, raw materials, services, and other types of production play an important role in defining the economy of a local area. It is important to analyze governmental policies. Corruption, the rule of law, and macroeconomic policy play a role in the structure of a local economy. 2-27. Another important factor in analyzing economic activity is the informal economy. In weak states, understanding the informal economy is key to providing a full understanding of an operational environment. The informal economy is those economic interactions and exchanges that are not recognized, regulated, controlled, or taxed by a state government. In this case, informal does not always equal illegitimate. For example, a black market is a form of informal economy based on criminal activities such as racketeering, money laundering, prostitution, drug trafficking, and smuggling. On the other hand, open-air markets and barter systems are legitimate activities that often contribute to an informal economy. 2-6 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding an Operational Environment In every country there is a balance between formal and informal economies. In successful states, the informal economy may be relatively small. However, in failing states the informal economy may form the majority of all economic activities. The local population may depend on informal markets for their most basic needs. It is difficult but important for counterinsurgents to develop an understanding of these informal economies (both legitimate and illegitimate.) Because they are outside host-nation government oversight, insurgents can exploit even legitimate formal economies as a source of funding. The black market, on the other hand, will most likely be a direct enabler of an insurgency in terms of both funding and logistics. 2-28. The counterinsurgent must consider other informal economies. Most people work, buy, and sell in this economy, operating outside legal frameworks but not engaging in illicit or criminal activity (except perhaps for taxation issues). Sensitivity to the rules of an informal economy is one piece of cultural sensitivity to the population and the host nation in general. Examples of the rules of an informal economy include the following: People earn income in non-cash payments such as benefits or goods. People often use land for decades (or more) through traditional usage rights granted by village heads and chiefs with no legal title. People may work without pay (in arrangements such as the traditional divisions of household and farm labor). 2-29. Economic variables also tie into other elements of a society. For example, ownership or control of land and debt indicate something about the power structure within a society. Many developing societies have highly concentrated ownership of land, which can serve as a driver for social conflict and discontent. Whoever owns land or controls land has the power to use it for economic profit. Maintaining this ownership or control during an insurgency indicates a degree of power in a society. The same is true of debt. The ability to collect a debt indicates a degree of power in a society. Land and debt are examples of how economic factors link into other social factors. 2-30. If a population views economic conditions as unjust, a lack of economic opportunity can be a root cause of an insurgency. (See paragraphs 4-14 through 4-22 for more information on motives for an insurgency.) As part of developing an understanding of an operational environment, counterinsurgents assess the current economic variables, the economic opportunities available to different segments of the population, and the effect insurgent and counterinsurgent operations are having on the population’s ability to meet their most basic economic needs. Economic survival, especially in an area where an insurgency is occurring, is almost as important and as immediate a challenge for households as physical security. For this reason, leaders at all levels of the counterinsurgency operation (including platoons and companies) need to assess the impacts of military operations on the following simple elements of the economic welfare of households and communities: Income (including the capacity to earn streams of income in future). Assets and property (used to earn income). Work (including traditional patterns of unpaid work). 2-31. Commanders strive to understand the economic impact of the unit’s presence in an area. For better or worse, the presence of an Army or Marine Corps unit affects normal economic incentives and disincentives for individual behavior. Introducing foreign wealth can have unintended negative consequences. For this reason, careful thought and planning are needed for a project intended to have local economic impact. Commanders anticipate the economic impact of their arrival and their continued presence in the area of operations. Additionally, commanders and staffs carefully weigh the costs and benefits associated with all economic activity. Some factors to consider are— Prospects of long-term sustainability. Possibility of local price inflation. Disrupting natural incentives (such as farmers leaving fields to work on trash pickup projects). SOCIAL 2-32. The social variable describes the cultural, religious, and ethnic makeup within an operational environment and the beliefs, values, customs, and behaviors of society. Understanding the society is 13 May 2014 FM 3-24/MCWP 3-33.5 2-7 Chapter 2 foundational to understanding the social variable. A society is defined as a population whose members are subject to the same political authority, occupy a common territory, have a common culture, and share a sense of identity. However, no society is completely homogeneous. A society usually has a dominant culture, but it can have secondary cultures. Different societies may share similar cultures, as Canada and the U.S. do. Societies are not static, but change over time. (For more information on this variable, see chapter 3 of this publication and ADRP 5-0.) INFORMATION 2-33. The information variable describes the nature, scope, characteristics, and effects of individuals, organizations, and systems that collect, process, disseminate, or act on information. The information environment is the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information (JP 3-13). Understanding the communications systems is important because they influence international, national, regional, and local audiences. Insurgents often use information and disinformation to gain credibility and legitimacy with the population, while simultaneously undermining their opponents. Understanding how people communicate and who influences them on a daily basis is essential. This is important at all levels. For example, identifying local gathering places is important to understand or influence the spread of information, rumors, and gossip. 2-34. The information environment is made up of three dimensions: physical, informational, and cognitive. The cognitive dimension encompasses the mind of the decisionmaker or specific audience and is the dimension where people think, perceive, visualize, and decide. The informational dimension is the place where information is collected, processed, stored, disseminated, displayed, and protected with key components of the content and flow of information. The physical dimension is composed of systems, human beings (including decisionmakers, leaders, and military forces), and supporting infrastructure that enable individuals and organizations to create effects conduct operations across air, land, maritime, space and cyberspace domains across multiple domains. (See table 2-1.) Table 2-1. Interrelated dimensions of the information environment Dimension Cognitive dimension Description • Exists in the minds of human beings. • Consists of individual and collective consciousness. • Where information is used to develop perceptions and make decisions. • Significant characteristics include values, beliefs, perceptions, awareness, and decisionmaking. Informational dimension • • • Created by the interaction of the physical and cognitive dimensions. Where information is collected, processed, and disseminated. Significant characteristics are information content and flow. Physical dimension • • • The tangible, real world. Where the information environment overlaps with the physical world. Consists of targetable individuals, organizations, information systems, and the physical networks that connect them. Significant characteristics include terrain, weather, civilian information infrastructure, media, populace, and third party organizations. • 2-35. The technological advances in communications offer some unique considerations for insurgencies. For one, international communication is easier than it used to be. This allows insurgencies to communicate with organizations outside of their physical control. Connecting to diasporas or sympathetic groups could be vital to an insurgency. With the ability to communicate comes the ability to move resources and funding. Moreover, communications can be vital in importing weapons or other supplies to an insurgency. Global communications can be essential in increasing the military capabilities of an insurgency, significantly increasing the tempo of insurgent operations and their ability to change tactics. 2-36. At the operational and tactical level, communications allow for effective coordination of attacks. Organizations can communicate by cell phones, by the internet, or a number of other rapid means. This 2-8 FM 3-24/MCWP 3-33.5 13 May 2014 Understanding an Operational Environment allows for coordinated large-scale attacks even by dispersed organizations. (For additional information on the information environment, see FM 3-13.) INFRASTRUCTURE 2-37. The infrastructure variable is composed of the facilities (buildings and equipment), personnel, and services needed for the functioning of a community or society. Societies have different infrastructure needs. For example, the expectation for hours of available electricity vary widely. Counterinsurgents try to access infrastructure needs to meet the expectation of the user, not their own expectations. 2-38. Infrastructure is also interrelated with other variables. For example, the development of a highway system will affect the ability of people to move and interact with others. Creating a society in which humans can easily move based on economic needs or simple desires greatly increases the variety of groups a person will meet. These interactions and new relationships can change how a person views the world and change that person’s values. A communications system, such as a cellular network, can have the same effect. These systems allow for communications outside of one’s areas and allow the transmission of new ideas and concepts. 2-39. Commanders and staffs conducting counterinsurgency operations must consider the relationship between infrastructure and the economic variable. An effective infrastructure can allow for the easy movement of people, goods, and ideas. Many businesses require infrastructure. While it is true that a local population may not expect 24 hours of electricity a day, a manufacturing plant may require it. Moreover, infrastructure such as schools can increase the human capital in an area and drive economic growth. 2-40. Infrastructure also has an effect on the military variable. Host-nation forces can use a good transportation system, but so can an insurgency. A road system provides a means of transportation for everyone, not simply the population and government. Moreover, infrastructure may be important for the population and the government’s role in maintaining civil control and security. An attack on the infrastructure may undermine the government’s legitimacy in an area. However, the opposite is also true. An attack on infrastructure may also undermine the insurgency if the population places blame on the insurgency and turns towards to government. PHYSICAL ENVIRONMENT 2-41. The physical environment includes the geography and man-made structures, as well as the climate and weather, in an area of operations. The physical environment affects the tactics and operations of both insurgents and counterinsurgents. Extreme conditions, such as in nations in higher elevations, can make insurgent movements difficult in the winter. The movement and the tactics of any military force will be affected by the physical environment of its area of operations. A physical environment will influence insurgency sanctuaries, the ability of an insurgency to hide resources, and the ability of an insurgency to mass forces. Understanding a physical environment is essential to understanding an insurgency. (See chapter 4 for further discussion on how a physical environment relates to an insurgency.) 2-42. A physical environment also relates to the other variables. A mountainous, landlocked country will have a difficult time building the infrastructure needed for large-scale international trade. Moreover, if the physical environment precludes the ability to easily produce an excess of food, it is difficult to divert much labor to other enterprises. This can hamper the development of a highly specialized economy. An increase in food production will often predate a major increase in industrial production. TIME 2-43. Time describes the timing and duration of activities, events, or conditions within an operational environment, as well as how various actors in an operational environment perceive the timing and duration. Time also has an interrelated relationship with other variables. For example, a multinational coalition may see its efforts in a counterinsurgency as limited by national objectives or by the public pressure. In other words, outside parties can always leave a counterinsurgency. On the other hand, for the host nation, the insurgents and the population in the struggle are less constrained by time than a multinational coalition. An 13 May 2014 FM 3-24/MCWP 3-33.5 2-9 Chapter 2 insurgency may use the time variable to its advantage, while the time variable usually works against an external counterinsurgent. 2-44. Time can also play a role in the social variable. Ongoing conflicts tax societies. Populations can become less interested in the nuisance of a conflict and more interested in simple peace. As time passes, a population may be more interested in who is likely to win an insurgency than the motivation of either side of the conflict. Counterinsurgents may also see time as working for or against them. (See paragraphs 4-30 through 4-45 for more information on insurgent strategies.) THE MISSION VARIABLES AND CIVIL CONSIDERATIONS 2-45. Upon receipt of a mission, commanders filter information categorized by the operational variables into relevant information with respect to the mission. They use the mission variables, in combination with the operational variables, to refine their understanding of the situation and to visualize, describe, and direct operations. The mission variables are mission, enemy, terrain and weather, troops and support available, time available, and civil considerations. (See ADRP 5-0 for more information on the mission variables). Within the mission variables, civil considerations are of unique importance for counterinsurgency. Civil considerations are the influence of man-made infrastructure, civilian institutions, and activities of the civilian leaders, populations, and organizations within an area of operations on the conduct of military operations. Civil considerations comprise six characteristics, expressed in the memory aid ASCOPE: areas, structures, capabilities, organizations, people, and events. (See FM 2-01.3/MCRP 2-3A for information on the use of ASCOPE.) 2-46. The commanders’ refinement of information for their mission and their particular area of operations is essential. ASCOPE can play an important role in the identification of structures or events that will have an effect in a unit’s area of operations. As such, ASCOPE is an important tool for the unit in determining important civil considerations in an insurgency. Units within an insurgency use ASCOPE to identify and continually refine their understanding of the area of operations over time. Commanders and staffs consider ASCOPE from the perspective of the population, the insurgent, and the counterinsurgent. This is particularly important for counterinsurgency operations. (See JP 3-57, FM 3-57, MCWP 3-33.1, and ADRP 2-0 for detailed explanations of ASCOPE.) 2-10 FM 3-24/MCWP 3-33.5 13 May 2014 Chapter 3 Culture 3-1. This chapter addresses culture and its role in a counterinsurgency operational environment. Culture forms the basis of how people interpret, understand, and respond to events and people around them. Cultural understanding is critical because who a society considers to be legitimate will often be determined by culture and norms. Additionally, counterinsurgency operations will likely be conducted as part of a multinational effort, and understanding the culture of allies and partners is equally critical. 3-2. Insurgents from a local area generally understand local culture, the perspectives of the population, and the population’s concerns and grievances much better than any foreign military forces understand them. Therefore, culturally, the insurgent may have an enormous advantage over a foreign military force. This may not be true if the insurgents are not from the local area. If a military force is to succeed in gaining support of the population, it must seek to understand the local people and their culture and incorporate the perspectives and concerns of the population in their plans and operations as well as, if not better than, the insurgents incorporate them. 3-3. There are many definitions of culture in use by the United States (U.S.) military. As a starting point, this publication understands culture is a web of meaning shared by members of a particular society or group within a society. UNDERSTANDING CULTURE 3-4. To be successful in interacting with the local population to gain information on the enemy, or to understand their requirements, military members must do more than learn a few basic facts or “do’s and do nots.” They must understand the way that their actions can change the situation for the local population (both positively and negatively) and the resulting perceptions of the population towards those actions. To be successful, commanders and staffs consider four fundamental aspects of culture when planning and executing military operations: Culture influences how people view their world. Culture is holistic. Culture is learned and shared. Culture is created by people and can and does change. 3-5. The way that a culture influences how people view their world is referred to as their worldview. Many people believe they view their world accurately, in a logical, rational, unbiased way. However, people filter what they see and experience according to their beliefs and worldview. Information and experiences that do not match what they believe to be true about the world are frequently rejected or distorted to fit the way they believe the world should work. More than any other factor, culture informs and influences that worldview. In other words, culture influences perceptions, understandings, and interpretations of events. Soldiers and Marines need to know that U.S. interpretations of events are often quite different from the perceptions of these events by other people in an area of operations. If Soldiers and Marines assume that the local population will perceive actions the way that they do, they are likely to misjudge their reactions. The U.S. military refers to this pattern of assuming others see events in the same way the U.S. does as mirror imaging. Mirror imaging is dangerous because it leads Soldiers and Marines into thinking that their assumptions about a problem and its solution are shared by the population and multinational partners, rather than employing perspective taking, and looking at the problem from the population’s perspective. 3-6. Holism is based on the principle that all socio-cultural aspects of human life are interconnected. While interacting with people in other cultures, Soldiers and Marines may be tempted to say their problems “are all about [fill in the blank: tribalism, corruption, lack of work ethic, and so on.].” In truth, very few 13 May 2014 FM 3-24/MCWP 3-33.5 3-1 Chapter 3 counterinsurgency challenges boil down to one simple answer. Politics affects economics. Family structure affects job choices. Religion affects politics. Every aspect of culture affects every other aspect in some way, even if indirectly. By acknowledging these interconnections, military members can better assess how the local population might react to their presence and actions. For instance, when Soldiers and Marines are not thinking holistically, they may anticipate that closing down a local market will only have an impact on the local economy. However, after closing the market, it may be that the local reaction seems to be about religion or tribal concerns instead of economics. Even if Soldiers and Marines do not understand why, they should be aware that their actions will have unknown second and third order effects. By understanding that a marketplace is more than a place to exchange goods for money, and that economic conditions may affect tribal power, the status of religious leaders, and other social conditions, Soldiers and Marines can see a culture holistically. A holistic perspective helps military members understand the complex interconnectedness of a culture and avoid being surprised by local reactions to military decisions. 3-7. Culture is learned and shared. Children learn the appropriate way to act in a culture by observing other people; by being taught accepted values and ways of thinking about the world from their parents, teachers and others; and by practicing (sharing) what they have learned on a daily basis. This process of learning a new culture is called socialization. Culture can be learned at any age. Marines and Soldiers, for example, learn military culture by going through basic training or officer training in their late teens or early twenties. In fact, these initial training schools recognize their important role in socializing young men and women into core Marine and Army values. As a result, Marine Corps and Army basic training curriculums include not only classes on marksmanship, but also classes on ethics and core values. In counterinsurgency operations, understanding that culture is learned and shared can offer an important operational and tactical opportunity. Any Marine or Soldier can learn about the culture of the population simply by interacting with the local people. One of the more successful adaptations of the U.S. military in Iraq and Afghanistan occurred when service members realized they could learn a lot about the local culture quickly by talking to and observing their interpreters. Their enhanced understanding of the cultures of their areas of operations enabled them to better negotiate with leaders, to conduct operations that would be successful, and in a number of cases (such as the al Anbar Awakening), to gain the support and assistance of the population in fighting an insurgency. 3-8. One of the keys to success (and failure) in dealing with a population in a counterinsurgency operation is understanding that cultures are not static; they can and do change, often rapidly. During times of conflict, the usual methods for getting through the day may stop working for the local population, and they may try adopting new ideas or start highlighting traditional ways of doing things. Alternatively, they may switch rapidly among a range of possible behaviors. These changes can occur because of a number of factors were at play, but probably the greatest cause of this during conflict is a rapid decline in security. As security declines, the threat of attack, rape, and murder forces many changes in society. The rapid decline in the status and opportunities for women in these countries, therefore, was not merely due to centuries-old tribal beliefs, but to very real and pragmatic economic and social changes over time. As the cases of Iraq and Afghanistan illustrate, cultural practices and attitudes are frequently influenced by changes in very real physical conditions. Since the arrival of a large military, often accompanied by the destruction of physical property and the erosion of the local economy and security, is undoubtedly an enormous change for the local population, counterinsurgency planners need to recognize and plan for the impact that their operations will have upon the people and cultures in an area of operations. ASSESSING A CULTURAL SITUATION 3-9. Although it may seem that people around the world are extraordinarily different and have little in common, in reality all human groups interact with their world and each other in some basic, predictable patterns. The particular details of these patterns may vary. But the underlying patterns will not. Thus, all people use, manage, and interact with their environments. All groups have some kind of economy for exchanging goods and services. Every group has a social structure, with differing roles and status among members. Political behavior can be found in the smallest community. All people have some kind of belief system, whether based on religion, tradition, narratives, or history. By identifying these patterns wherever they deploy, Marines and Soldiers will be in a better position to assess the cultural situation and the influence of their operations upon the local population. 3-2 FM 3-24/MCWP 3-33.5 13 May 2014 Culture 3-10. All cultures have a unique and interdependent connection with their physical surroundings. The physical environment (including climate, terrain, and resources) influences the people living in it by providing a range of possibilities within which they act. People shape their environment by the choices they make, creating a cultural landscape which reflects their social, cultural, economic, and political attitudes. A careful reading, or interpretation, of the cultural landscape can provide useful information about the people who create it, use it, and live in it. A military presence in an area of operations will affect a local population and its use of the physical environment. For example, Marines and Soldiers may inadvertently divert or impede access to resources, such as water or food, which in turn may cause real shortages or upset the balance of power by allowing greater access to these resources by one group and harming another. Counterinsurgency planners need to anticipate how their operations will impact local populations and their use of their environment and recognize that since use of the environment is cultural, these impacts may significantly differ from what might be expected in the U.S. 3-11. All cultures have specific systems for obtaining, producing, and distributing items people need to survive (for example, food, water, and shelter) or luxuries and material things. This system, which does not necessarily require money or a banking system, is called the economy of a culture. Frequently, insurgents use the informal economy to obtain funding and support for their activities. Another aspect of the economic system that is often overlooked is the concept of reciprocity, which is an exchange between people that creates a relationship. Although in Western cultures exchange usually involves the exchange of goods and services of equal monetary value, in other parts of the world exchange may be only partly about what people expect regarding goods and services and also partly about building working relationships. If Marines and Soldiers fail to see what the local people expect from the exchange, to include its impact on interpersonal relationships, it will be hard for them to understand or anticipate people’s behavior. 3-12. In all cultures, people hold differing positions of status and power, often closely related to their roles in a group. In the military, for example, one’s status and power is based on rank. Depending on a person’s rank, a person fills different roles in an organization. The way that a group distinguishes among its members according to their role, status, and power is reflected in its social structure. A person’s position in the social structure may depend on many factors, including age, gender, class, family name, tribal membership, ethnicity, religious identity, and even rank. In conflict environments, differing groups (for example, ethnic, religious, or tribal) may each vie for power, often looking to outside militaries to support them. In counterinsurgency operations, it is essential that military leaders understand which social groups have traditionally held power in an area of operations. Otherwise, they are likely to be drawn into power struggles among competing groups, and possibly even unwittingly end up aiding the insurgents. A concept central to one’s place in society is that of identity. Identity is a broad term used to describe how people conceive of themselves and how they are perceived by others. Identity shapes how people view themselves and the world. Understanding identity is complex because people have multiple identities. In times of conflict, people may choose to emphasize certain group identities such as nationality or religion, while at other times different identities, such as one’s profession or gender, may matter more. Social structure and identity are extremely important concepts for counterinsurgency planners and operators to understand, as they affect people’s allegiances and influence how groups and individuals will interpret and respond to U.S. actions. 3-13. In all cultures, people have a system that determines who leads the group and who makes decisions about its welfare. Although people in the U.S. use an electoral system to select their leaders, this is not the case in many other countries. In many places around the world, even when the official government is elected, the local population may not view that government as legitimate or effective. In fact, one of the primary motivations for people to support an insurgency is their sense that the official or formal government has failed to provide for their needs. Frequently, insurgents may be providing a “shadow government” which replaces and competes with the official government in certain parts of the country. Shadow governments are one example of informal leadership. In most areas of operations, Marines and Soldiers will find that communities or groups are influenced by a variety of leaders, most of whom are not part of the government. In some areas, religious leaders may have great influence. In others, people may look to tribal leaders or respected individuals within their ethnic group. Business leaders and warlords often have great power and influence too. To be successful in counterinsurgency operations, military members need to quickly and accurately identify the various community leaders and develop strategies to work with 13 May 2014 FM 3-24/MCWP 3-33.5 3-3 Chapter 3 each of them in order to increase government legitimacy. Without support from the various power brokers in an area of operations, military action is unlikely to gain support from the local population. 3-14. Cultures are characterized by a shared set of beliefs, values, norms and symbols that unite a group. These beliefs may come from many sources, such as a person’s background, family, education, religion or history. Understanding the beliefs and values of a local population is critical for effective information operations. Failure to respect or understand the beliefs of a local population can result in serious hostility towards military intervention and attacks upon military personnel. Likewise, information operations that assume the foreign audience shares the same jokes, history, or values that Soldiers and Marines do frequently fail to deliver messages effectively. To gain an understanding of belief systems, counterinsurgents read and monitor information available through media or books, and counterinsurgents talk to people in the culture. Discussing history with local people can be a window into understanding the way that people in that area define a problem, who they believe caused it, and who they think the heroes and villains are. Stories, sayings and even poetry can reveal cultural narratives, the shared explanations of why the world is a certain way. Frequently, advertising appeals to people by using these narratives, as do effective information operations. Beliefs, however, are not perfectly shared or understood within a group. There is usually a range of acceptable thoughts and behaviors. This is called variation. For example, in reading about Islam, Soldiers and Marines may understand that Muslims are supposed to fast during Ramadan. However, when deployed they might observe seemingly faithful Muslims drinking and eating during Ramadan. Within U.S. culture, these internal mismatches and contradictions (variations) are often accepted without much comment. In a cross-cultural interaction, these contradictions can seem jarring or confusing. Often, working with others in a foreign culture requires the ability to suspend judgment. People often act and work in ways that may be difficult to accept or understand. However, by recognizing that all people share some fundamental patterns and seeking to understand and develop military plans and operations that build upon these patterns, commanders and staffs can effectively work to counter an insurgency within an area of operations. 3-15. Religion can be a powerful force in shaping beliefs. In many cultures religion and religious leaders have significant influence over local populations. Religious ideology can incite conflict, but religion can also be instrumental in stabilizing a culture by using universal religious concepts of justice, healing, and transformation. Because religion is often an integral part of the values set of a local culture, counterinsurgents conducting mission preparation and analysis examine the religion in an area of operations. Religion can also play an important role in creating peace and stability. Religion can create cultural instability, but in many cases it can alleviate problems in a society and be a unifying force. Many religions have messages and themes of pacifism and forgiveness. In many insurgencies, religious leaders have played an essential role in ending conflicts. The effect of a religion has to be understood within that religion and within that society. Counterinsurgents conducting a mission analysis may find that insurgents are using a radical interpretation of a religious text to incite violence. This can be countered by empowering indigenous religious leaders who promote a different interpretation. For example, radical Muslims may cite texts from the Quran that justify violence, but they may ignore the passages taught by more moderate Muslims that advocate compassion, peace, and human dignity. ORGANIZING TO UNDERSTAND CULTURE 3-16. There are three important methods for trying to understand the cultural element of a counterinsurgency. First, all counterinsurgents must make every effort to experience and understand the local culture, including by trying local food and learning local languages and customs. Second, commanders can organize their staffs in order to concentrate on cultural understanding and inject this understanding into their unit’s plans and operations. Third, commanders can rely on an outside capability to allow commanders and staffs to understand the culture. Two techniques that involve organization of staffs or outside capabilities are— Green cell and cultural advisor. Human terrain systems. 3-4 FM 3-24/MCWP 3-33.5 13 May 2014 Culture GREEN CELL AND CULTURAL ADVISOR 3-17. The purpose of a green cell is to consider the population in order to promote a better understanding of the environment and the problem. At a minimum, the green cell provides for the independent will of the population. Planning teams must develop an understanding of civilian aspects of the area of operations and the will of the population. There are many techniques to achieve this capability, and each unit may approach this differently based on resources and available qualified personnel. Two techniques of note are the green cell and cultural advisor. (See MCWP 5-1 for more information on green cells.) 3-18. A green cell is an ad hoc working group consisting of individuals with a diversity of education and experience capable of identifying and considering the perspective of the population, the host-nation government, and other stakeholders within an operational environment. Ideally, a green cell is composed of individuals with cultural expertise across all warfighting functions. If a whole-of-government approach is used, experts from other government agencies such as the Department of State should be included in the cell. The green cell cooperates closely with the other members of the planning staff so that cultural factors are considered throughout the range of military operations. The green cell also interfaces and coordinates with joint and interagency groups, drawing upon the collective knowledge and experience of the Department of State, nongovernmental organizations (NGOs), and foreign resources, such as provincial reconstruction teams. (See MCWP 5-1 for more information on green cell activities.) 3-19. The commander forms the green cell during the receipt of mission and problem framing planning steps to add to the commander’s and the operational planning team’s cultural understanding of an operational environment. In order to support the operational planning team, the green cell understands the operational planning team’s mission and tasks and is able to translate cultural information in a way that is relevant to the mission. 3-20. The cultural advisor is a concept developed and employed in Operation Enduring Freedom in Afghanistan. Cultural advisors are the principal subject matter experts on culture and planning related to their designated geographic region of expertise, serving as the cultural and language advisors to the commander. The cultural advisor is a special staff officer for the commander and a member of the planning staff. This person not only serves on the planning staff, but also deploys and serves as an ongoing advisor to senior leaders while they are in theater, if needed. The advantage of having a cultural advisor on staff is that this advisor can often help explain to the commander what the advisor sees on the ground in the area of operations. A foreign area officer or a civil affairs Soldier may be a good selection for a cultural advisor. Both can provide an understanding of the host nation and its specific regional, religious, and ethnic differences, and they may have foreign language skills. As a result, the commander can adjust operations in response to a culturally challenging environment. 3-21. Overall, there are many options to task-organize staffs to incorporate culture into planning. While a green cell creates expertise in one part of the staff, those concerns are also important for other staff sections. It is important for commanders to create staffs that are well integrated across the warfighting functions. One danger of creating a cultural cell within the staff is that it will relegate cultural concerns to one staff element and inhibit cultural concerns being integrated into the planning process. Commanders ensure that the staff integrates all operational and planning concerns, including cultural concerns. 3-22. Regardless of the particular planning configuration, commanders and planners find and use whatever cultural resources are available to the unit. Commanders and staffs incorporate culture into planning during the beginning of mission planning in order to understand an area of operations prior to developing any course of action. Success is recognized not by stand-alone briefs that describe the culture of an operational environment, but when all of the operational planning teams’ planning products reflect and have been informed by the cultural analysis that has been performed by subject matter experts. HUMAN TERRAIN SYSTEM 3-23. The human terrain system provides tactical to strategic level support to commanders. The human terrain system conducts field research and analysis of the local population to determine the civil considerations in order to help commanders better understand the operational environment from the population’s perspective and assess how actions will potentially impact and be perceived by the local population. 13 May 2014 FM 3-24/MCWP 3-33.5 3-5 Chapter 3 3-24. A human terrain team typically consists of a team leader, one or two social scientists, and one research manager. When manning demands permit, human terrain team personnel are recruited and deployed to promote engagement with elements of the population that typically have restricted access. For example, in Afghanistan at least one woman is assigned per team to facilitate access to females within the local population. 3-25. Human terrain teams, part of the human terrain system, represent a capability that traditionally falls outside of military expertise. These teams are an additional enabler for commanders to gain situational understanding of their operational environments through the socio-cultural running estimate and are an important tool in the military decisionmaking process. (See FM 2-01.3/MCRP 2-3A for more information on human terrain teams.) 3-6 FM 3-24/MCWP 3-33.5 13 May 2014 PART TWO Insurgencies Part two provides doctrine to help understand an insurgency. While the first part provides the context of an insurgency, the second part provides a discussion of an insurgency within that context. Chapter 4 provides information about insurgency prerequisites and fundamentals. It helps commanders and staffs understand why an insurgency may form and how and why it acts. Chapter 5 then provides a description of an insurgency’s threat characteristics. Chapter 4 Insurgency Prerequisites and Fundamentals 4-1. Several factors are important in analyzing any particular insurgency. Commanders and staffs must perform this analysis within an insurgency’s operational environment. Commanders and staffs consider when an insurgency could start or what the prerequisites are for a particular insurgency. Commanders and staffs also consider a particular insurgency’s strategy and its eight dynamics. This provides a means to analyze an insurgency. INTRASTATE WAR 4-2. One way commanders and staffs view insurgencies is in the context of intrastate conflict. An intrastate conflict is as war or conflict between a constituted government and its people or representative factions from the people. It is a war within a state versus a war between two or more nation states. Intrastate conflict directly relates to insurgencies. Other types of intrastate conflicts are insurgencies that differ only in the amount of popular support or the amount of governmental capacity. Commanders and staffs should not only consider an insurgency as an intrastate conflict. Insurgent movements may operate in multiple countries, as their desired end state may be regional, transnational, or global. The types of intrastate conflicts include rebellions (also referred to as insurrections), revolutions, civil wars, and coup d’états. 4-3. A rebellion (also known as an insurrection) may be fomented by a group that challenges state control. A rebellion is usually manifested by acts of violence when the state is unable or unwilling to address the group’s concerns. Another insurgency may use a rebellion if it can gain enough popular support to engage in large scale unrest or open conflict with the governing authority. Rebellions are forms of insurgency in which an organized group is leading the population, the causes of instability exist, and the movement enjoys some passive support among the population. Under most international laws it is a crime to incite, assist, or engage in violent actions against a constituted government. The Geneva Convention states that “Every government has a right to put down rebellion within its borders and to punish the insurgents in accordance with its penal laws.” (See the final record of the Diplomatic Conference of Geneva of 1949 vol. II section B, page 121 for more information on insurrections.) 4-4. A revolution is a popular insurgency with plans to overthrow a government and transform its society and government from one form of government to another. Revolutions generally evolve from a rebellion, but in revolutions popular support comes in the form of a fully mobilized population, which differs from simply passive or active support. A fully mobilized population is a part of a revolution and it is generally 2 June 2014 FM 3-24/MCWP 3-33.5, C1 4-1 Chapter 4 seeking fundamental lasting change in a society’s political, economic, or social order. A significant distinction between a revolution and a counterinsurgency is a requirement of the host-nation military, government, and civil authorities to prepare, plan, and conduct counterrevolution, and not simply counterinsurgency. The main difference is the need to reintegrate the mobilized population and not only reintegrate members of the insurgency. Although a coup d’état can resemble a revolution in that it can quickly overthrow a government, this overthrow is generally done rapidly and secretly during a coup d’état versus a rapid fully mobilization of the population during a revolution. 4-5. Civil wars are condition-based conflicts beginning with an insurgency. Once the insurgency achieves certain characteristics of organization and resembles an alternate government, the conflict reaches the state of civil war. This is often characterized by performing tasks associated with a state and having a defined government. If the insurgency loses the ability to meet these criteria, the status or state of the insurgency is no longer that of a civil war. The insurgent movement may attempt to gain outside recognition by calling the conflict a civil war, as a civil war tends to afford international recognition and legal implications as a competing group and not an illegal movement. According to the Geneva Convention, the criteria of a civil war is “that the insurgents must have an organization purporting to have the characteristics of a State; that the insurgent civil authority must exercise de facto authority over persons within a determinate territory; that the armed forces must act under the direction of the organized civil authority and be prepared to observe the ordinary laws of war; that the insurgent civil authority must agree to be bound by the provisions of the Convention.” (See the final record of the Diplomatic Conference of Geneva of 1949 vol. II section B, page 121 for more information on civil wars.) 4-6. Recognized antigovernment elements in a civil war may be classified as belligerents and not insurgencies. A belligerent, though generally a sovereign state, can be a non-sovereign state if it is recognized by the international community (by two or more states or organizations like the United Nations), organized, and is providing services to the population within its controlled areas. In the case where antigovernment forces meet the criteria of a state during a civil war, they achieve sufficient international recognition, and they may achieve belligerent status rather than insurgent status. Although status may change, counterinsurgency operations, by government forces, generally remain the same at the theater through lower tactical levels. The difference between a group being classified as an insurgency or a belligerent can affect the overall status of U.S. involvement, as a belligerent has international recognition. 4-7. +A faction that employs a coup d’état seeks to overthrow the governing authority by a quick decisive action by an internal faction within the government. Usually, this is the military or part of the security apparatus. A coup d’état may or may not result in an insurgency, as part of society may reject the change. Moreover, it is possible for an active insurgency to use a coup d’état to seize control over a government. With a coup d’état, a small group can kill or remove a leader and the leadership’s supporters and assume control of a state. The main point of a coup d’état is that it is a means to change a regime by actors who are part of the government. 4-8. Intrastate conflicts present different challenges than interstate wars, since they often take place among the population and, therefore, human rights violations and sectarian violence are more likely. Secondly, intrastate conflicts can spread to adjacent countries that have governments or portions of the population that share beliefs or goals with one side or the other. 4-9. The nature of an intrastate conflict is a grievance between segments of a state’s population with its constituted government. There can be a single root cause or a variety of causes perceived as so severe that they impact the population’s social contract with its government. There are many likely contributors to intrastate conflicts, including perceived weak, illegitimate, corrupt, or overly oppressive governments, ethnic or racial tensions, religions conflicts, economic stresses, or a need for land reform. Often an intrastate conflict causes the formation and growth of insurgencies and other intrastate conflicts. Commanders and staffs must understand the nature of intrastate conflicts even if they are poorly defined. If a commander and staff misdiagnosis an intrastate conflict, they can fail to properly identify and address the root cause of instability and the nature of the threat. 4-2 FM 3-24/MCWP 3-33.5, C1 2 June 2014 Insurgency Prerequisites and Fundamentals INSURGENCY PREREQUISITES 4-10. The three prerequisites of an insurgency, opportunity, motive, and means, provide a framework for both planners and executers to plan for and prevent an insurgency. Planners and executers use the prerequisites for planning and execution of operations in environments where insurgencies are likely, such as a post-conflict environment. (See JP 3-24 for a further discussion of insurgency prerequisites.) OPPORTUNITY 4-11. Opportunity refers to the emergence of significant gaps in the ability of the state or its local allies to control its territory and population. States must have the capacity to detect the early stages of insurgent organization and mobilization. This requires the cooperation of a significant portion of the population or the establishment of an extensive program of domestic surveillance and intelligence activities. The state must also be capable of suppressing the insurgency in a way that deters other potential rebels while avoiding contributing to the insurgent narrative and provoking wider resistance. 4-12. For a land force, opportunity provides a means to evaluate the likelihood of an insurgency. For example, after a victory during a major combat operation, if the former government prevented insurgencies by an intelligence program, the commander and staff need to consider how likely and for how long an occupying force can prevent an insurgency without gaining the active support of the population or reestablishing intelligence programs. Understanding the opportunities for an insurgency in an area is essential for land forces. 4-13. At the tactical and operational level, understanding opportunities for an insurgency provides a means for commanders and staffs to analyze the local conditions and the likelihood of a successful insurgency developing. Commanders and staffs actively make assessments on both the support of the population and the intelligence capability and capacity of the local area. If the population is not supportive of the host nation and the host nation has no means to prevent an insurgency in a hostile population, there is an opportunity for an insurgency in that area. (For a further discussion on why a gap in state control might happen, see JP 3-24.) MOTIVE 4-14. A population that has grievances does not necessarily cause an insurgency. Grievances are necessary, but not sufficient, conditions for an insurgency. Poverty, unemployment, economic inequality, inadequate essential services, political marginalization, and repression are commonplace. These conditions exist in many places where an insurgency does not. It takes established or emerging leaders to build a compelling narrative that links grievances to a political agenda and mobilizes the population to support a violent social movement. The narrative explains who is to blame for grievances, how grievances will be addressed, and how the population and insurgency should work together to accomplish the goal. Ideology often provides a coherent set of ideas that provide a compelling framework for a narrative. Where opportunity and motive (grievances) intersect, individuals emerge to attempt to mobilize the population. When grievances mobilize a population, they are a root cause of an insurgency. (See JP 3-24 for a further discussion on motive.) 4-15. The root causes of an insurgency are real or perceived grievances that insurgents use to mobilize a population in support of an insurgency. Insurgents use these grievances to fuel an insurgency. Root causes are not static and can change over the course of an insurgency. As conditions change, insurgent leaders create different narratives to mobilize a population. The root causes that led to the insurgency in the first place may not be the same ones that are sustaining an ongoing insurgency. Commanders and staffs perform continued assessments and reassessments to determine what an insurgency is using as a root cause. 4-16. A root cause can be summarized as a broad perception of injustice linked to the government that insurgents use to mobilize a population. If counterinsurgents take actions such as building schools and roads, or creating jobs, but these actions do not address the perception of injustice, then they will not reduce support for insurgency. Phrased differently, deprivation that is not considered unjust is much less destabilizing than relative prosperity which is considered unjust. It is not the thought "I'm poor" that leads someone to attempt to overthrow or force a change in the government; it is "I'm poor, this is not fair, and 13 May 2014 FM 3-24/MCWP 3-33.5 4-3 Chapter 4 the government is to blame." The solution to the latter thought is more complex than the solution to the former. 4-17. Identity, based on cultural, religious, or other cultural groupings, can create a strong root cause. In cases where groups are persecuted and underrepresented, the insurgents can use a narrative that uses this underrepresentation or persecution as a root cause against the government. In some cases, groups are concentrated in certain regions where the government exercises biased controls over those groups. This might be an effective root cause to use for an insurgency based on a nullification of government control. 4-18. Religion can also be an effective root cause. Religious-based movements create a perception that a certain type of religion should drive politics and groups should convert to that religion. Insurgents attempt to present their ideology as the true and only correct form of their religion. Insurgents can use religion as part of an identity based root cause if the government persecutes a certain religious group. However, insurgents can also use religion to create an ideology that everyone should be a part of, and governed by, a certain religion. In this case, a religious-based group could seek to overthrow its government and replace it with a religious based government. 4-19. The presence of a foreign force can be the root cause of an insurgency. The presence of foreign military forces can also be used as a means to mobilize popular support. The presence can come after a major combat operation that replaces a government. As such, any major combat operation should include planning for stability operations to prevent an insurgency. However, this could also be a root cause if there are Soldiers or Marines stationed in a host nation. Insurgents can use the perception that outsiders exploit the host nation or that the host-nation government excessively caters to foreigners as a root cause. 4-20. Land disputes concerning ownership, usage, and rights, especially to agrarian, mining, or other land based livelihoods or identities, can be used as a root cause. Land disputes often manifest themselves as an issue of income inequality. For example, landowners may have tenant farmers that pay the landowners’ rents. Insurgent groups can often use a narrative that exploits unequal land ownership as a root cause, and promises redistribution of land and land reform to the tenant farmers as an effective justification for the farmers to join the insurgency. 4-21. Corruption of the host-nation government can be a root cause. If institutional corruption is systemic, ongoing, and considered unfair, insurgents can use that as an effective narrative. For example, corruption in government development programs can cause resentment by the aggrieved group. Corruption can lead to loss of host-nation legitimacy and can undermine government control of an area. 4-22. Insurgents can use a gap between a population’s expectations and the government’s capability to meet those expectations as a root cause. The larger the gap, the greater the population’s perceived or real sense of deprivation. This allows for the development of a narrative in which the insurgents promise to close the gap. MEANS 4-23. It takes considerable resources to mount a violent challenge to the incumbent political authorities and the methods an insurgency uses to secure those means determines a great deal about its behavior. The leaders of a potential insurgency must assemble and organize personnel, funds, weapons, and systems of secure communications and logistics. The other prerequisites relate to the means. For example, recruiters can use existing social networks to find new recruits. (See JP 3-24 for a detailed discussion on means.) 4-24. Commanders’ and staffs’ planning efforts should consider how an insurgent movement resources itself. An insurgency will often depend on a local population for resourcing and recruitment. In these cases, insurgents base an insurgency on social relationships to include, but not limited to, villages, clans, tribes, ethnicities, or other groups. These groups will often freely give resources, but some coercion may be used. In the cases where resources are freely given, the insurgency may have legitimacy. However, the use of local resources also restricts an insurgency. For resources to be given freely, the insurgent is constrained by the social norms of the groups. Moreover, because an insurgency may be seen as aligned to a certain group, there is a certain amount of difficulty expanding the insurgency beyond its core group. 4-25. A local area’s insurgency and population could connect, through communications, with its diasporas and attain resources from around the world. If its diasporas relate to the struggle, they may freely give 4-4 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Prerequisites and Fundamentals financial aid to an insurgency. In such cases, commanders and staffs need to determine possible means to undermine this support. For example, the use of counter threat finance may prevent this funding. On the other hand, resourcing can be local. Insurgencies can have access to black markets or other resources that they can use to buy weapons. In these cases, stopping these transactions may be an effective means of blocking insurgent resources. 4-26. An insurgency with state sponsorship has important advantages and disadvantages. State sponsorship can offer resources, sanctuary, and training. These are important advantages for any insurgency because they offer an insurgent group the ability to organize and become tactically and operationally more effective. On the other hand, state sponsorship can undermine the support of the local population. An insurgency that depends on outside state support can be perceived as artificial and may not have deep support from the local population. While recruits may join an insurgency by increased resources, recruits attracted because of the possibility of wealth may be less effective. However, if an insurgency uses outside support to build a political base before starting military operations, insurgents mitigate these risks. For the counterinsurgent, understanding the nature of state support allows the commander and staff to undermine that support before an insurgency begins. 4-27. A group that already has resourcing could potentially become an insurgency. Groups tied to black markets, such as those selling drugs, may seek to resist or nullify the government’s ability to stop their activities. While they may exploit the population and create a root cause, the protection of their resources is the essential reason for the development of their insurgency. The means for an insurgency can play an interrelated role with the motive and opportunity. 4-28. When commanders and staffs desire an additional method of analysis other than opportunity, motive, and means, the prerequisites of an insurgency can be represented as a vulnerable population, leadership for direction, and a lack of government control. A population is vulnerable if the people have real or perceived grievances that insurgents can exploit. Moreover, there must be an insurgent leadership element that can direct the frustrations of a vulnerable population. The insurgency must act on real or perceived lack of governmental control, which can allow insurgents to operate with little or no interference from security forces or other agencies. This means that the government is not providing for the people. This may refer to inadequate services or an overly harsh and repressive government. When all three exist in an area, an insurgency can operate with increased freedom of movement, gain the support of the people, and become entrenched over time. INSURGENCY FUNDAMENTALS 4-29. Few insurgencies fit neatly into a rigid classification. However, insurgencies do have common characteristics that can provide a basis for building a more accurate picture of an insurgency and help commanders understand the situation. The fundamentals of insurgencies help commanders and staffs analyze insurgent strategies, objectives, and tactics. Each fundamental is important independently, but analyzing the interactions and relationships between the fundamentals as a whole is the key to understanding an insurgency. The two insurgency fundamentals are— Insurgent strategies. Dynamics of insurgency. INSURGENT STRATEGIES 4-30. An insurgency’s strategy is determined by its own ends, ways, and means. There are a range of ends an insurgency might seek, to include replacing the state, separating from the state, changing the policy of the state, nullifying state control in an area of a state, and securing a place in a state’s political system. These basic ends will influence the ways an insurgency uses. However, that influence is not deterministic, and the way an insurgency fights is also influenced by its resourcing. In addition, the relationships between an insurgency’s ends, ways, and means is also influenced by numerous important variables. Those variables include but are not limited to— How an insurgency gains legitimacy and controls a population. Whether the insurgency is political centric, violence centric, or economic centric. The relationship of the insurgency to the economy. 2 June 2014 FM 3-24/MCWP 3-33.5, C1 4-5 Chapter 4 Organization. Sense of time. Adaptability. Insurgent Legitimacy and Control 4-31. How an insurgency gains legitimacy and controls a population within a society helps determine strategic behavior. Some insurgencies have a clear political message and bring that message to their society. Others may try to use economic black markets and the wealth that comes from them to make their population dependent on the insurgency. Others may try to use coercion to control their society. Most will use a combination of many different methods. However, how an insurgency controls the local population or tries to gain legitimacy helps determine that insurgency’s strategic behavior. Political, Economic, and Violence-Centered Insurgencies 4-32. +All insurgencies have a political aim which may be to change their society or simply to protect a black market. While all insurgencies involve violence, politics, and economics, some insurgencies are focused on politics, some are focused on violence, and some are focused on economics. This can change over time. Many insurgencies develop well defined political goals which shape their strategy and an infrastructure to promote and refine them. In these insurgencies, the role of violence is probably secondary to the role of building political support. In this case an insurgency’s aims are more likely to be changing policy, fighting into the state’s political system, or replacing the state. Violence is likely to be more organized as the political support grows for an insurgency. Other insurgencies are focused on violence, lacking the ability or incentive to build a political infrastructure and gain wide political support. These types of +insurgencies are more likely to develop networked organizations with connections to criminal organizations or other insurgent groups with similar interests. Finally, an insurgency may be focused on economics. These insurgencies are likely to want simply to stop state interferences with their activities. As such, these insurgencies may limit the use of violence, unless the state attempts to interfere with their economic base, whether in the legitimate economy or in black or gray markets. The Relationship of an Insurgency to the Economy 4-33. Commanders and staffs must understand the relationship of the insurgency to the economy to understand an insurgency’s strategic behavior. An insurgency could have little dependence on the local economy and receive all its support from the outside. Insurgents could also gain resources from the formal economy in which they operate and sustain themselves through kidnapping or theft. An insurgency could also maintain an economic base on the black market, or it could control a war economy. In all cases, an insurgency’s relationship with the economy will affect its behavior. For example, if it is dependent on outside support, the aims of its outside support will influence the insurgency’s behavior. Moreover, outside support influences tactical and operational behavior. An insurgency that does not depend on the local population is more likely to use violence against the population. (See paragraphs 2-25 through 2-31 for more information the economic variable.) Insurgent Organizational Structure 4-34. The organization of an insurgency is also important. Insurgent organizations can be conceptualized along a continuum from a formal and hierarchical structure to a networked structure. This structure affects organization because it affects control over actions and the scale of tactical actions. Without a hierarchical structure, it is difficult to control individuals or groups within an insurgency. This leads to attacks that can affect the legitimacy of an insurgency. Moreover, while a networked organization may use terrorist tactics, it is also difficult for a networked insurgency to mass combat power. It is also difficult to negotiate a settlement with a networked insurgency because no single person or small group is in charge. A networked insurgency changes the dynamics of individuals in an insurgency, as no one is likely to be essential to the continuation of a networked insurgency. A hierarchical insurgency may be easier to penetrate than a networked insurgency, as a few individuals may be essential to the insurgency and control the actions of members of the insurgency. (See paragraphs 4-88 through 4-103 for more information on a networked insurgency.) 4-6 FM 3-24/MCWP 3-33.5, C1 2 June 2014 Insurgency Prerequisites and Fundamentals Sense of Time 4-35. An insurgents’ sense of time will also affect their actions. If insurgents feel time is on their side, they are more likely to adopt a lower risk approach and avoid becoming decisively engaged. If they perceive time as being against them, that will push them towards higher risk activities. Commanders and staffs must determine an insurgency’s perception of time to determine its behavior. (See paragraphs 2-43 through 2-44 for more information on the time variable.) Adaptability 4-36. Adaptability is also an essential element to understanding an insurgency’s strategic behavior. Adaptability determines how well, how often, and how the insurgency adapts tactically, operationally, and strategically. This can be directly linked to the organization of an insurgency. A networked insurgency may be highly adaptable at the operational and tactical level, but not at the strategic level. On the other hand, the reverse may be true for a hierarchal insurgency. 4-37. An insurgency's strategy is not static, and it can shift. Counterinsurgents must recognize and respond to shifts in strategy. As the operational environment changes, it can affect an insurgency’s resourcing, the ways an insurgency attempts to achieve its ends, and its calculation of what its ends should be. In a networked insurgency, different elements of the insurgency may evolve differently than other elements of the insurgency. An insurgency is not static, and it continues to evolve as conditions evolve. Insurgent Approaches 4-38. An insurgency might take several approaches to achieve its objectives. In many insurgencies, different elements of the same insurgency or related insurgencies will have different strategic calculations. Commanders and staffs must understand an insurgency’s approach to develop effective programs that attack the root causes of that insurgency. Commanders and staffs combine their understanding of the insurgent’s ways to accomplish its ends, with the insurgent’s means to pursue those ends, to provide the most probable and dangerous course of action for all insurgencies operating in an area of operation. This provides an understanding of the insurgency’s approach. 4-39. Commanders and staffs must understand the insurgent’s ends to understand the insurgent’s decisionmaking process, capabilities, future actions, current tactics, method of command and control, recruiting, propaganda, and use of the local population. Examining the ends of an insurgency and the insurgents’ attempts to achieve those ends through various ways, including combat actions, propaganda, and subversion, enable counterinsurgents to undermine the enemy’s decisionmaking process. The insurgents’ strategic ends may be overt and publicly championed or covert. Insurgent operations may have immediate consequences or delayed effects aligned with long-term objectives. For example, car bombings among a local population may seem counterproductive because they incite immediate anger against the bombings and their perpetrators. However, a sustained campaign of massive violence can have two long-term results, it can— Weaken popular support for the government, which has failed to protect the people. Make the population susceptible to insurgent intimidation. Whatever the insurgent’s ends, approaching the problem from the perspectives of the insurgent and the population can provide counterinsurgents the means to interdict the threat on a number of levels. 4-40. Counterinsurgents are likely to face insurgents who use several different approaches to achieve their ends. Some common approaches at the tactical level and operational level are the urban (terrorist), military focused, protracted, and subversive approaches. The urban (terrorist) and military focused are considered basic approaches and the protracted and subversive are considered advanced approaches. Basic approaches refer to the insurgent capabilities needed to achieve long-term strategic objectives. Basic approaches do not mean insurgents are not efficient in tactics or other skills, but overall they lack the means to pursue a more advanced approach towards achieving their goals. In contrast, advanced approaches probably have political wings that govern the militant side of the movement and are focused on longer-term political goals. 4-41. Insurgents may use different approaches at different times, applying tactics that take advantage of circumstances. Insurgents may also combine a number of methods that include tactics drawn from any or 13 May 2014 FM 3-24/MCWP 3-33.5 4-7 Chapter 4 all of the other approaches. In addition, different insurgent forces using different approaches may form loose coalitions when it serves their interests; however, these same coalitions may fight among themselves, even while engaging counterinsurgents. A single area of operations may have multiple competing entities, each seeking to maximize its survivability and influence, and this situation may be duplicated several times across a joint operations area. This may further complicate understanding both the insurgency and the counterinsurgent operations necessary for success. 4-42. The urban (terrorist) approach is an approach in which insurgents attack government and symbolic targets (for example an important religious building) to cause government forces to overreact against the population. The insurgents want the government’s repressive measures to enrage the people so that they rise up and overthrow the government. Although this type of method may develop popular support against a government that is particularly brutal or corrupt, it may only result in shallow support for the insurgency. The population may only see the insurgency positively because of the brutal response, not because they identify with the insurgency. 4-43. An insurgency uses the military-focused approach to achieve its policy goals by military success. In this approach, insurgents’ efforts focus on causing the government to lose legitimacy by military success and inspiring a population to join the insurgents against the government. The most important idea behind a military focused method is that it does not require building political support among the population. Instead, military success and action will gain the support of a population. 4-44. A protracted approach is an advanced approach based on Mao Tse-Tung’s theory of protracted popular war. It attempts to lengthen the conflict as much as necessary to assemble the resources and forces necessary for success and to wear down the counterinsurgent forces and their political leadership. The protracted war method is based upon three distinct phases: latent and incipient, guerrilla warfare, and war of movement. Each phase builds upon the previous phase and continues activities from all or some of the previous phases. The protracted method requires both a political wing and a military wing. 4-45. The subversive approach is another advanced approach. A subversive approach attempts to subvert the government from within by using its political arm to become a legitimate political party and enter the government. Subversive activities may occur as part of other ways, particularly the protracted war approach. DYNAMICS OF INSURGENCY 4-46. Commanders and staffs must understand the nature of an insurgency when conducting a counterinsurgency. This requires understanding insurgent strategy. However, to understand an insurgent’s strategy, commanders and staffs must understand insurgency dynamics. The dynamics of insurgency is a framework for understanding an insurgency. 4-47. An operational environment may have multiple insurgent groups. These groups may be pursuing a wide variety of goals and interests. As such, these groups may be collaborating, fighting each other, or acting neutral towards each other. When commanders and staffs analyze an insurgency, they consider each group and provide a different analysis for each group based on the eight dynamics of insurgency. 4-48. Eight dynamics or some combinations of these dynamics are common to most successful insurgencies. These dynamics provide a framework for planners to analyze insurgencies. Each of these dynamics can contribute to the strength of an insurgency, but each can also be used to find fracture points and weak points in an insurgency. Fracture points are points of internal division within the insurgency. A weak point is an underlying weakness, such as access to resources, of the insurgency. The eight dynamics are— Leadership. Ideology. Objectives. Environment and geography. External support. Internal support. 4-8 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Prerequisites and Fundamentals Phasing and timing. Organizational and operational patterns. First Dynamic—Leadership 4-49. A group committing random violence is not an insurgency. In an insurgency, there is a political rationale behind the violence. An insurgency requires leadership to provide vision, direction, guidance, coordination, and organizational coherence. Leadership is required to mobilize the population by using a root cause. Leadership is needed organize tasks to undermine the legitimacy of the host nation and to establish legitimacy or acquiescence to their movement. The ability of insurgent leaders to organize and their willingness to distribute power across their organization is vital to the long-term success of their movement. Organizations dependent on key charismatic personalities to provide cohesion and motivation for their movement are vulnerable to disruptions if those leaders are co-opted or killed. 4-50. The political leadership can be the same as its military leadership. However, sometimes this is not the case and there is well-defined political leadership. When an insurgency has well-defined political leadership, that leadership is called the political cadre. The political cadre may participate in the political system or it may be clandestine and illegal. In either case, counterinsurgents define the political cadre of an insurgency when there are insurgent leaders who are mainly involved in the political struggle and not the armed struggle. 4-51. The political cadre are the force behind the ideology of an insurgency. They are actively engaged in the struggle to accomplish insurgent goals. They may also work within a political party to work within the political system and provide some legitimacy for the insurgency to the population. The cadre is active in spreading the ideology of the insurgency, if the insurgency has an ideology. Modern noncommunist insurgencies rarely, if ever, use the term cadre; however, these movements usually include a group that performs similar functions. In a movement based on religious extremism, religious leaders can play a role similar to political cadre. 4-52. The leadership of an insurgency is composed of leaders from the political cadre, guerrillas, and auxiliaries. These may or may not be the same individuals. Moreover, they may work closely together or operate in a decentralized manner, depending on their need for security or other operational concerns. Insurgent leaders usually exercise leadership through force of personality, the power of revolutionary ideas, and personal charisma. In some insurgencies, they may hold their position through religious, clan, or tribal authority. These leaders may include supporting members, much like command and staff in a regular military. These supporting members may include advisors, logistics and administration personnel, spokespersons, and those leading operations. Insurgent leaders may attain positions within the government and work to undermine the government. 4-53. Poor leadership can undermine an insurgency. Insurgent leaders who undermine their own legitimacy with the population, for example, will significantly hamper the success of their insurgency. An analysis of insurgent leadership provides information on how effective its leaders are in mobilizing the population and effectively using resources to undermine the host nation. Second Dynamic—Ideology 4-54. The insurgents must have a problem that justifies their actions in relation to the population’s grievances and explains what is wrong with the status quo. Insurgents use a narrative to connect a population’s grievances with its actions and demands. When an insurgency uses a narrative to mobilize a population, these grievances become root causes. An essential part of the ability of an insurgency to mobilize a population is an insurgency’s ideology. An ideology is the integrated assertions, theories, and aims that constitute a sociopolitical program. Not all insurgencies are ideological, but an ideology provides an insurgency with a message of change that is normally coherent and logical, based upon the insurgency’s underlying assumptions. 4-55. Ideology is a factor that unifies the many divergent interests and goals among the insurgency’s members and the general population. As a common set of interrelated beliefs, values, and norms, ideology is used to influence the behavior of individuals within the group. It explains how the world works. Ideology 13 May 2014 FM 3-24/MCWP 3-33.5 4-9 Chapter 4 can serve as a rallying call for all members of the population to join a struggle. Commanders and staffs answer several questions when analyzing insurgent ideology: What is the problem the insurgents will fix, and how will they fix it? Are there any ideological divisions within the insurgency or the population? Is the ideology supported by outside groups? What propaganda are the insurgents using to propagate their ideology? Third Dynamic—Objectives 4-56. Insurgencies can have strategic, operational, and tactical objectives. Tactical objectives most directly translate to actions. For example, a tactical goal of destroying a logistics convoy directly translates into an attack against a logistics convoy. However, these actions are normally performed to achieve an operational objective. In the example of the attack on the convoy, the operational objective might be to prevent logistic support of host-nation forces. When insurgents achieve various operational goals, they can achieve the strategic end state of their insurgency. 4-57. A strategic objective is the movement’s overall political goal or desired end state. An insurgency will seek to— Force significant political, economic, or religious change. Overthrow the existing social order and reallocate power. Generate resistance to outside occupiers or change within a society. Nullify government control in an area. Cause a region to secede. 4-58. An insurgency’s strategic objectives will influence the type of insurgency that develops, and its ideology will influence an insurgency’s end state. For example, an insurgency focused on resistance against outside occupiers or change in a society may unify many different groups based on that shared end state. The strategic end state of the insurgency may be as simple as resistance to occupation or a conservative insurgency’s general resistance to change in a society. Groups that seek to nullify government control may have an objective of protecting criminal activities and black markets. These groups may be non-ideological, but they will still need to mobilize the population to nullify governmental control. On the other hand, groups that wish to force significant change in a society or overthrow an existing social order are likely to be ideologically driven. There is a connection between an insurgency’s strategic goal and an insurgency’s ideology. Fourth Dynamic—Environment and Geography 4-59. The environment and geography affect insurgent actions. Insurgencies may form their base in urban environments, rural environments, or in a combination of both. Insurgents located in rural areas can enjoy the relative safety of remote terrain or safe heavens, such as jungles or mountains. These geographical conditions make it possible for them to form larger units and conduct larger-scale operations. However, there are some disadvantages to a rural based insurgency. Communications and supply lines are longer and slower. Insurgents can be isolated from the population, and an insurgency can be destroyed with a decisive military operation. 4-60. Urban insurgencies tend to operate within ethnic ghettos or enclaves of sympathetic supporters. Operating in urban settings requires a high degree of compartmentalization, which makes it difficult for groups to train and organize for larger-scale operations. Urban insurgencies often operate in small cells. However, an urban setting does allow an insurgency to work within large population groups. The opportunity for mobilization of the population is therefore higher than in a rural insurgency. Historically, urban insurgencies have been easier to destroy than rural insurgencies. The lack of isolation is an advantage for counterinsurgents because they can apply constant pressure on the urban population to undermine the insurgency. 4-61. Other factors of the area of operations may affect an insurgency. Tribal, religious, and social factors have relationships with insurgencies. The physical environment also effects insurgent movement and 4-10 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Prerequisites and Fundamentals planning. Commanders and staffs must understand the connections between a physical environment and its effect on an insurgency. (See chapter 2 for more information on a physical environment.) Fifth Dynamic—External Support 4-62. Historically, insurgencies are less likely to succeed without some form of external support. This support can be in the form of— Moral support. Political support. Resources, such as money, weapons, food, advisors, training, and foreign fighters. Sanctuary, such as secure training sites, operational bases over a border, or protection from extradition. 4-63. Governments providing support to an insurgency normally share interests or a common ideology with the insurgency. Ethnic enclaves or diasporas in third-party countries can provide significant support, even if a country’s government is not actively supporting an insurgency. For example, global diasporas can provide significant resources for an insurgency, even if no government is providing active support. (See FM 3-05, chapter 2, for more information on unconventional warfare.) 4-64. +However, with external support comes a degree of dependency on that support. Limiting access to external support is a possible means of influencing or changing the actions of an insurgency. Limiting external support provides one means to affect an insurgency indirectly. External support can help to shape an insurgency and the outcome of an insurgency. In the case of the insurgency in Sri Lanka, external support was essential to the success of the Liberation Tigers of Tamil Eelam. Large diasporas provided the Liberation Tigers of Tamil sanctuary and resources. This allowed them to gain dominance over other insurgent groups and to wage a long and bloody insurgency against the government of Sri Lanka. 2 June 2014 FM 3-24/MCWP 3-33.5, C1 4-11 Chapter 4 External Support for the Tamil Tigers Eleven years of discrimination by the Sinhala majority against the Tamil minority reached a breaking point in Sri Lanka during the Black July riots of 1983. Soon after, the Liberation Tigers of Tamil Eelam emerged as the most capable Tamil insurgent group, prepared to wage a campaign of violence and terror against the Sri Lankan state and non-Tamil civilians. The operational environment was complex, with insurgents fighting insurgents while also fighting the government, as occurred with Sunni and Shia groups in Iraq. At various stages of the conflict, the Liberation Tigers of Tamil Eelam fought against the Sri Lankan state but also against other antigovernment insurgent groups. The most prominent of these groups was the Janatha Vimukthi Permuna, a Marxist-Leninist group that blended violence and left-wing politics before laying down its arms in the mid to late 1990s. This case illustrates the importance of non-state actors in an operational environment. While the Liberation Tigers of Tamil Eelam was indeed a non-state actor in its own right, the group relied on its global diaspora for a range of support activities. Following the ethnic riots of 1983, thousands of Tamil refugees fled overseas to India, Australia, Canada, and the United Kingdom. This sowed the seeds for the Tamil diaspora and the transnational nature of the Liberation Tigers of Tamil Eelam’s insurgency. The global diaspora was a major part of the organization’s fundraising and propaganda network. Furthermore, the transnational diaspora network provided funding and weaponry to sustain the Tigers for most of the group’s existence. In addition to enjoying the largesse of a well-organized and entrepreneurial diaspora, the insurgents relied on co-ethnics in India for sanctuary, which was essential in the group’s early years. Since the Tamils effectively controlled the Jaffna peninsula in the northeast of the country, the Liberation Tigers of Tamil Eelam had a home base from which it could train, plan, and execute attacks against the military. Furthermore, across the Palk Straits in Tamil Nadu, India, the Liberation Tigers of Tamil Eelam was able to rely on the support—both active and passive—of thousands of ethnic Tamils who sympathized with the group. The Liberation Tigers of Tamil Eelam took advantage of the benefits of globalization, developing a truly global network of contacts abroad, and soon engaged in weapons procurement activities throughout East and Southeast Asia, in Afghanistan, Pakistan, Ukraine, the Balkans, Lebanon, and other well-known arms markets. At various points throughout the insurgency, the Tigers collaborated with other terrorists groups as diverse as the Revolutionary Armed Forces Colombia, the African National Congress in South Africa, Moro Islamic Liberation Front, Hezb-iIslami Gulbuddin in Afghanistan, the Japanese Red Army, and the Popular Front for the Liberation of Palestine. In 1996, the insurgents acquired U.S. Stinger-class missiles from the Kurdistan Worker’s Party and used these weapons two years later to shoot down a Sri Lankan civilian Lionair jet. Over time, the Liberation Tigers of Tamil Eelam distinguished itself as perhaps the most lethal insurgent force in modern history. By the mid-late 1990s, the group boasted a navy, an air force, and an elite suicide commando unit used to assassinate several heads of state and numerous counterinsurgency force commanders. As a pioneer of suicide techniques, the Tamil Tigers devoted significant resources to two operational wings that functioned as suicide strike teams, the Black Tigers and the Sea Tigers. A “no-holds barred” approach to the conflict led the counterinsurgency force and the insurgents to routinely and systematically slaughter each other, while also destroying Sri Lanka’s infrastructure and displacing much of its civilian population. 4-12 FM 3-24/MCWP 3-33.5, C1 2 June 2014 Insurgency Prerequisites and Fundamentals Sixth Dynamic—Internal Support 4-65. Internal support is any support provided from within the borders of the state where the insurgency is active. An insurgency must have some internal support, even if it is limited. The level and type of support varies by insurgency and area. Counterinsurgents must understand the specific nature of the support to address and counter the relationship between the population and insurgents. This support may be either willing or based on coercion. 4-66. A large populated area or region where insurgents can operate represents many different communities that provide varying levels of support for different reasons. There are two types of internal support: active and passive. Passive support is critical for successful insurgent operations. It provides freedom of movement for members of the insurgency to reside, train, plan, and conduct operations in an area without resistance from the local community. Passive supporters do not report insurgents to local counterinsurgent forces out of sympathy for the cause, antigovernment sentiment, reluctance to get involved due to peer pressure, threats of violence, or the benefits that the insurgency provides. 4-67. Active supporters provide open sympathy to the insurgency, participate in insurgent operations, and find new recruits. Active supporters are usually central to the insurgency’s propaganda efforts. They may provide material, intelligence, or assistance as requested or demanded by insurgents. Active support, like passive support, may be volunteered or coerced. 4-68. When analyzing the type and amount of support an insurgency has, possible indicators are: Reduction in local medical supplies or personnel absent from clinics and hospitals. Increased black market activities and extortion for resources. Increased theft or purchase of food and gas. New presence of bodyguards. New areas in which the local police are growing reluctant to patrol or conduct operations. New or increased interaction with local civilian leaders by insurgents. Intelligence confirming the presence of insurgents in areas where people gather and communicate. Increased assassinations of those opposing insurgents or for symbolic value to frighten locals. A drop in the number of walk-ins and tips due to fear of retribution. A rise in the reluctance of local civilians to be seen talking with counterinsurgent forces. An increase in the absence of local reconstruction crews, police, and military or a decrease in their willingness to be associated with counterinsurgent forces or to leave their families. Suspension of local government or community meeting and events. 4-69. There is a relationship between internal and external support. Insurgents must have significant strength in at least one of these dynamics (internal or external support) or they will not be able to meet their tangible support needs. Both of these dynamics must be controlled and reduced in order for the counterinsurgent to prevail; just eliminating internal support is not enough to defeat an insurgency with robust external support (and vice versa). Seventh Dynamic—Phasing and Timing 4-70. Successful insurgencies often progress through three phases (latent and incipient, guerrilla warfare, and war of movement). Not all insurgencies progress through all three phases, and progression through all three phases is not a requirement for success. Insurgent success can occur in any phase. In addition, insurgencies can revert to an earlier phase and resume development when favorable conditions return. 4-71. Movement from one phase to another phase does not end the operational and tactical activities of earlier phases; it incorporates them. Therefore, it is difficult to determine when an insurgency moves from one phase to another. In addition, a single insurgency may be in different phases in different parts of the country. Advanced insurgencies can rapidly shift, split, combine, or reorganize; they are dynamic and adaptive. 13 May 2014 FM 3-24/MCWP 3-33.5 4-13 Chapter 4 4-72. The first phase is latent and incipient. During this phase, activities include the emergence of insurgent leadership, creation of initial organizational infrastructure, training, acquisition of resources, and political actions, such as organizing protests. A group that eventually becomes members of an insurgency may simply be a legitimate political group at this stage. Governmental actions and changes in society can transform political groups into insurgencies. 4-73. The second phase is guerrilla warfare. In this phase, successful insurgents use small-unit tactics to attack security forces while continuing ongoing political efforts. Their goal is to undermine the government’s legitimacy and replace the government’s legitimacy with the population seeing the insurgency as legitimate. In this stage, insurgencies may begin performing limited governmental functions for the population in areas they control. 4-74. The third phase is war of movement. During this phase, an insurgency may be trying to overthrow a government or trying to force the withdrawal of an occupying power. For success, an insurgency does not necessarily need to transform into a conventional military, but it must position itself to defeat the government or occupying power. However, this phase may not be needed. In some cases, all an insurgency must do is create a continual problem that cannot be solved and wear down the patience of the counterinsurgents. This is especially true when the counterinsurgents are directed by an outside power. This phase is characterized by increased military capability, popular support, logistics capacity, and territorial control. 4-75. Many successful insurgencies go through a process similar to these three phases, but this is not a uniform rule. Some insurgencies, for example, form rapidly and displace a government quickly. Figure 4-1 provides a model for understanding the possible evolution of insurgencies. This model provides a simplification of reality in order to understand and analyze a phenomena. A phase-like evolution of an insurgency tends to create a strong political and military organization with deep roots in a society. Such organizations are difficult to undermine. However, historically the most likely outcome of an insurgency is its rapid defeat. These insurgencies demonstrate little phasing beyond the beginning of violence followed by the quick defeat of the insurgency. (See figure 4-1.) 4-14 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Prerequisites and Fundamentals Figure 4-1. Conflict resolution model Eighth Dynamic—Organizational and Operational Patterns 4-76. Each insurgency’s organization is unique. The specific type and level of organization is an indicator of the insurgents’ strategy and capabilities. Understanding an insurgency’s organizational and operational patterns helps counterinsurgents predict the enemy’s tactics, techniques, and procedures, understand their capabilities, and identify potential targets. 4-77. Insurgents may be organized into networks and require certain elements, characteristics, bonds, and conditions to operate and survive. A network is a series of direct and indirect ties from one entity to a collection of entities. There may be a central point of communication or influence (critical node) that provides a critical vulnerability for targeting against the network. Insurgent networking extends the range and variety of both insurgent military and political actions. Networks of communications, people, and activities exist in all populations and have a measureable impact on the organized governance of a population and, consequently, military operations. These networks tend to heal, adapt, and learn rapidly. They may be a combination of insurgent, criminal, regular, or irregular forces, and foreign government sanctioned forces. These networks exist within a population. Existing within a population enhances their 13 May 2014 FM 3-24/MCWP 3-33.5 4-15 Chapter 4 capabilities to sow disorder, survive, and protract the struggle, presenting particularly difficult problems for counterinsurgency forces. (See paragraphs 4-88 to 4-103 for more information on networked insurgencies.) Organizational Elements 4-78. The basic organizational elements of an insurgency are the movement’s leadership, guerrillas, auxiliary forces, and underground elements. While there are almost certainly members of the insurgency who perform multiple functions, grouping an insurgency into these groups provides a model of understanding how an insurgency functions. However, commanders and staffs must avoid the trap of mirror imaging an insurgency against U.S. organizational structure. These groupings help the commander understand groups that are involved in the various functions of an insurgency, but commanders and staffs need to realize that insurgencies normally do not have fixed organizational structures. (See figure 4-2.) Figure 4-2. Organizational elements of an insurgency Leadership 4-79. An essential element of any insurgency is its leadership and its leadership structure. This can vary greatly and is dependent on whether the insurgency is a networked insurgency or a hierarchical insurgency. However, because of its importance, it is covered under the first dynamic. Guerilla Units 4-80. Guerrillas are used for a wide range military purposes, but their primary purpose is to achieve a political end. For example, attacks on host-nation forces may undermine host-nation legitimacy among a population and create insurgent safe heavens. Guerrilla units can conduct small-unit tactical operations and can mass for larger operations. Ambushes against convoys are examples of small-unit tactics an insurgent group may use. These tactics have the advantage of preventing an insurgent group from becoming decisively engaged. As an insurgency gains military power, guerilla units increase their ability to conduct large scale attacks. During the final insurgency stage, war of movement, guerilla units can perform actions meant to destroy the host-nation military force. This can be a decisive action for an insurgency. If successful, a war of movement can overthrow the government or allow the insurgency to reach other political goals. However, if the insurgency begins a war of movement too soon, the insurgency can deplete its military power and undermine its political power. Auxiliary Forces 4-81. Auxiliary forces are the insurgency’s support elements. Anyone involved in an insurgency can perform logistic functions, and insurgents are probably involved in both logistics and combat. Creating this division, however, groups certain essential functions of an insurgency in a single category. 4-16 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Prerequisites and Fundamentals 4-82. The auxiliary includes cells and external elements. Cells include logistics, intelligence, counterintelligence, propaganda, population control, and recruiting elements. These are elements that perform tasks directly connected to an insurgency. External elements provide support for an insurgency, but they are not directly part of the insurgency. For example, external elements may include drug smugglers or external support from another state. 4-83. Women can play an essential role in the auxiliary force. Insurgencies generally require a robust system of financing and supply. In many cases, a woman will have greater freedom of movement in a society than a man who is actively engaging government forces. For example, a wife, niece, or daughter of an insurgent might be able to send a message or make financial transitions much easier than the actual insurgent. 4-84. Auxiliary forces also include economic support systems to fund the insurgency’s military and political operations. Economic support systems include— Fund raising and terrorist finance networks. Pillaging, looting, extorting, and enslaving a population. Business operations that include both direct control, joint ventures, and taxation of enterprises in these industries: Illicit trade in commodities and natural resources (such as oil, timber, and diamonds). Criminal trafficking in narcotics, humans, and arms. Sanctions busting. Legal business enterprises (such as oil, shipping, motor transport, and hotels). Banking and finance operations. Underground 4-85. Underground cells conduct clandestine combatant and logistics operations in areas controlled by government forces. Combat operations can include sabotage, assassinations, and small arms attacks. Logistic operations can include maintaining safe houses, controlling hostages, moving weapons, and providing communications. Underground cells include intelligence cells, logistic cells, and combatant cells. 4-86. The underground element includes those elements of the insurgency that conduct covert or clandestine activities, especially in counterinsurgent occupied areas. Movement leaders may exist within the underground if they are attempting to keep their affiliation or identity a secret. Insurgencies with effective undergrounds tend to be more compartmentalized, secretive, vetted, trained, and indoctrinated than insurgencies without them. For example, the underground can carry out terrorist acts, if desired, while the insurgency has plausible deniability for these acts. The underground may remain in an area after counterinsurgency clearing operations to gather information, intimidate civilians, attack members of the security forces or government, emplace improvised explosive devices, or perform sniper operations. The underground can be a major part of an insurgency. Its effectiveness (or ineffectiveness) provides counterinsurgent analysts with indicators of the skill, advancement, and strategy of the insurgency. An advanced insurgency with an effective underground is capable of operations and tactics that differ from those of a basic insurgency, with a less capable underground. The underground tends to be the most difficult element to recruit and train; therefore, its size tends to fluctuate with time and capability. 4-87. Underground cells seek to be self-contained; they often have their own leadership, combatants, and auxiliary forces. However, the underground can also use members of the auxiliary to provide materials, intelligence, counterintelligence, and early warning. The auxiliary may also pass messages, propaganda, and disinformation. This use allows the underground to conduct operations in areas where the regular auxiliary is present, but the underground does not have a widespread presence. Networked Insurgencies 4-88. While some insurgencies are hierarchical, it is also likely that an insurgency will be deeply networked into a society. While auxiliary, guerrillas, leadership, and underground elements are a means of viewing the basic functions of an insurgency, many insurgencies in the modern era are learning and adapting networks. An insurgency’s members will often have connections to various resourcing means, 13 May 2014 FM 3-24/MCWP 3-33.5 4-17 Chapter 4 such as the black markets or diasporas. Moreover, there are normally connections to various parts of a society. Many insurgencies, especially modern insurgencies, have members that perform basic functions but are also networked organizations that are interwoven with their societies. While it is possible for a hierarchical style insurgency to exist, a networked structure is more likely today because of modern communications. 4-89. Networked insurgencies will have many connections to their operational environment. Networked insurgencies are not monolithic, and decisions are made by different elements within the insurgency. Some parts of the insurgency may be willing to negotiate, while other parts may decide to keep fighting. In a networked insurgency, the different elements of an insurgency may have overlapping functions and connections to other similar insurgencies. A networked insurgency adds to the complexity of an area of operations because they are not acting as a unified force and because of their complex set of connections to the rest of society and each other. (See figure 4-3 for an example of a networked insurgency.) Figure 4-3. Networked insurgencies 4-90. For an insurgency, a network is not just a description of who is in the insurgent organization; it is a picture of the population, how it is put together and how members interact with one another. For example, a tribal society already has affiliated social, economic, and military networks easily adapted to warfighting. The ways in which insurgents works within a tribal network is an expression of inherent cultural and social customs. In this example, the social dynamic that sustains ongoing fighting is best understood when considered in tribal terms—in particular, from the perspective of a traditionally networked society. It is the traditional tribal network that offers insurgents a ready-made social infrastructure from which to draw. 4-91. The full functioning of a network depends on how well, and in what ways, its members are personally known and connected to one another. Strong personal ties, often ones that rest on friendship and bonding experiences, ensure high degrees of trust and loyalty. To function well, networks may require higher degrees of interpersonal trust than do other approaches to organization, like hierarchies. Kinship ties are often a fundamental aspect of many terrorist, criminal, and gang organizations. Insurgents often form a 4-18 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Prerequisites and Fundamentals networked organization embedded in a sympathetic population. Differentiating between insurgents, insurgent supporters, neutrals, and the host-nation government supporters is difficult. 4-92. Insurgencies can be viewed from an overall organizational perspective to the perspective of an individual. Networked insurgencies often have a great degree of internal complexity and this makes understanding networked insurgencies difficult. The relationship between two individuals or two groups in an insurgency may be hierarchal, based on a mutual peer to peer understanding, or a cultural understanding based upon social norms. Understanding the relationship between groups and individuals within groups is essential to understanding how an insurgency works and is a part of the overall intelligence preparation of the area of operations and understanding mission variables. This understanding starts with an individual level analysis. 4-93. Individual-level analysis characterizes members within an organization, identifies its key members, describes the types of connections between members, and makes assumptions about unknown members. Commanders and staffs can describe individuals based on their network position in relation to the network position of other individuals in the network. A networked insurgency consists of individuals and connections between them. Commanders and staffs can think of the individuals in an insurgency as actors or nodes. The connections between nodes are called links. This connection between two people is called a dyad. Understanding the various types of dyads is essential in understanding the nature of an insurgency. Person A could be connected to Person B through a number a various types of connections and each type of relationship represents an important type of dyad. (See figure 4-4 for examples of some of types of dyads.) Figure 4-4. Examples of dyads 4-94. Individual connections and new connections matter to an insurgency. For example, a marriage between a combatant and a member of the auxiliary opens new paths in a networked insurgency. Moreover, the success or lack of success of the couple will now be important. In other words, in this example, both individuals will be vested in one another, and other insurgents’ perceptions of them will be tied together. The nature of the bonds between individuals and decisions on who to create new relationships with have a future impact on both the insurgency and the individuals in the dyad. 4-95. Commanders and staffs must understand the role individuals play in a networked insurgency. One node or a very few central nodes dominate a very centralized network. If these nodes are removed or damaged, the network may quickly fragment into unconnected subnetworks. Hubs are nodes with high 13 May 2014 FM 3-24/MCWP 3-33.5 4-19 Chapter 4 degrees of centrality. A network centralized around a well-connected hub can fail abruptly if that hub is disabled or removed. A less centralized network has no single points of failure, and it has multiple connections between all members. It is resilient even if some nodes are removed. Many nodes or links can fail while still allowing the remaining nodes to reach each other over other network paths. 4-96. Commanders and staffs can also understand how an individual fits into a network by looking at that individual’s degree centrality and betweenness centrality. Degree centrality describes how active an individual is in the network. Network activity for a node is measured using the concept of degrees—the number of direct connections a node has. Nodes with the most direct connections are the most active in their networks. Commanders and staffs determine where those connections lead and how they connect the otherwise unconnected. If a node has many ties, it is either prominent or influential. Betweenness centrality indicates the extent to which an individual lies between other individuals in the network, serving as an intermediary, liaison, or bridge. A node with high betweenness centrality has great influence over what flows in the network. Depending on position, a person with high betweenness plays a broker role in the network. 4-97. Nodes on the periphery often receive very low centrality scores. However, peripheral nodes are often connected to networks that are not currently mapped. The outer nodes may be resource gatherers or individuals with their own network outside their insurgent group. These characteristics make them very important resources for fresh information that is not available inside their insurgent group. 4-98. However, understanding a networked insurgency requires more than simply understanding relationships between individuals. Commanders and staffs must understand an insurgency at the organizational level. Organizational-level analysis provides insight about the insurgent organization’s form, efficiency, and cohesion. Commanders and staffs must understand a networked insurgency’s overall organization to understand the nature of the threat. An insurgency may consist of large numbers of subinsurgencies. As a result, each group will have a range of capacities as compared to the other groups. Commanders and staffs can describe organizational capacities using the concept of network density. 4-99. Network density is a general indicator of how connected people are in a network. Network density is the proportion of links in a network relative to the total number of links possible. Network density within an insurgency indicates which groups are most capable of conducting a coordinated attack or other type of coordination. (See figure 4-5.) 4-20 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Prerequisites and Fundamentals Figure 4-5. Examples of dyad networks 4-100. Changes in network density can also show changes in an insurgency’s capabilities over time. A decrease in network density means the group is reduced and becoming fragmented. This can be in response to actions taken by counterinsurgents. 4-101. Most network measures, including network density, can be mapped out to evaluate performance over time. Based on changes in network density over time, a commander can— Monitor enemy capabilities. Monitor the effects of recent operations. Develop tactics to further fragment the insurgency. 4-102. Changes in network density can also show changes in the capabilities of an insurgency over time. An increase in network density indicates an increased likelihood that the insurgent group can conduct coordinated attacks. A decrease in network density means the group is reduced and becoming fragmented. This can be in response to actions taken by counterinsurgents. An effective counterinsurgency may eventually face only low-network-density subgroups. This is because high network-density subgroups require only the capture of one or a few highly connected insurgents to degrade the network. So while high-network-density groups are the most dangerous, they are also the easiest to disrupt. (See figure 4-6 on page 4-22 for an example of the possible evolution of a networked insurgency.) 13 May 2014 FM 3-24/MCWP 3-33.5 4-21 Chapter 4 Figure 4-6. Example of changes to tactics based on density shift 4-103. Individuals within a network can also shape an insurgency. If one individual or a small group of individuals have relationships essential to maintaining an insurgency, counterinsurgents must understand those relationships. One node or a very few central nodes could dominate a highly centralized network. These nodes are called hubs and can be essential for an insurgency. A less centralized network may have no single point of failure. OTHER ANALYTICAL FRAMEWORKS 4-104. The district stability framework assists planners in identifying and mitigating sources of instability. Because of the uniqueness of the stability environment in each district within an area of operations, the district stability framework was designed to identify and mitigate sources of instability. This framework works as a planning assessment tool and nests into the military decisionmaking process. There are three steps to the district stability framework: analysis, design, and monitoring and assessment. (See ADRP 3-07 for more details on the district stability framework.) 4-105. The interagency conflict assessment framework is another framework used to understand conflict. The purpose of the interagency conflict assessment framework is to develop a commonly held understanding, across relevant U.S. government departments and agencies, of the dynamics driving and mitigating violent conflict within a country. This common understanding informs U.S. policy and planning decisions. It may also include steps to establish a strategic baseline against which U.S. government engagement can be evaluated. It is a both a process and a tool available for use by any U.S. government agency to supplement interagency planning. (For more information on interagency conflict assessment framework, see the U.S. government publication Interagency Conflict Assessment Framework.) 4-22 FM 3-24/MCWP 3-33.5 13 May 2014 Chapter 5 Insurgency Threat Characteristics 5-1. Threat characteristics involve the composition, disposition, activities, and tactics of an insurgency. The composition of an insurgency is covered under the eighth dynamic, organizational and operational patterns. Tactics for an insurgency include political activities, criminal actions, and military tactics. Counterinsurgents consider how these threat characteristics create strengths and weaknesses for an insurgency. DISPOSITION AND ACTIVITIES 5-2. The disposition is the geographic location of insurgent elements and the way they are deployed, employed, or located. The dispositions of an insurgency are partially determined by an operational environment and the operational variables. For example, if an insurgency has connections to a black market, some of its dispositions will normally be to protect that market. Terrain will also affect the dispositions of an insurgency. Commanders and staffs must understand an operational environment to understand an insurgency’s dispositions. (See chapter 2 for more information on an operational environment.) 5-3. Insurgents who rely solely on violence to achieve their political goals are probably ineffective. Instead, effective insurgents conduct a wide range of activities to achieve their goals. Many of these activities are not enemy or terrain oriented, but political. Insurgents use a range of activities supporting both military and political actions. Insurgent actions can include: Political activities. Population control. Military tactics (including terrorist actions and conventional tactics). Support activities. POLITICAL ACTIVITIES 5-4. Insurgents may use political activities to achieve their goals and enhance their cause’s legitimacy. An insurgency’s actions can come from inside the government’s political system or can be used to communicate a message to the population. Political actions that happen within a government normally happen in a democracy or a semidemocracy. In these systems, an insurgency and related political parties can have some political power through elections. This gives groups the ability to launch official investigations and a platform to question government actions. This was a technique used by the Irish Republican Army and Sinn Fein. 5-5. Insurgent political actions within the government are limited to an autocratic regime, unless those actions are secretive. An authoritarian regime can have members that are either sympathetic to or actual members of an insurgency. However, those individuals must remain clandestine if they are to remain inside the government. In these cases, insurgencies can use these individuals for intelligence and to influence some governmental decisions. 5-6. The use of political activities to influence a society is another political activity of an insurgency. Demonstrations, propaganda, strikes, and civil disobedience can be effective means to undermine the legitimacy of a government and to disrupt a host nation. These actions show the level of support for the insurgency and transmit the insurgents’ message to the rest of society. 5-7. Propaganda is one of the most important political tools an insurgency has. Propaganda provides the means for the insurgency to communicate a message, often political, to the population. It allows the 13 May 2014 FM 3-24/MCWP 3-33.5 5-1 Chapter 5 insurgency to create a narrative of why the government’s actions are not legitimate, and how the insurgency can eliminate the root causes of the conflict. 5-8. In areas of a country where an insurgency is in control, the insurgency can perform governmental functions. These functions replace the functions of the host-nation government. When an insurgency provides effective governance of a region or community, it can build local legitimacy. 5-9. At the national level, an insurgency can promote a shadow government. A shadow government offers a known, tangible alternative to the present government to the population. This can be effective as a propaganda technique, and a shadow government can be useful in creating a successful transition for an insurgency. As propaganda, a shadow government allows an insurgency to identify and inform a population of a known alternative to the current government. In practice, a shadow government allows a governmental structure to quickly form in insurgent controlled areas. If an insurgency is successful, this allows for a transition to a coherent national government. POPULATION CONTROL 5-10. One of the primary goals of a local insurgency is population control. Once the government is displaced from an area, an insurgency can act as the functioning government. With the use of force to enforce local rules and norms, an insurgency can become a functioning instrument to control the population. In such cases, it has displaced the government, at least locally. This control can be used to gain legitimacy among the population. When an insurgency both controls a local population and is seen as legitimate by the local population, it becomes more difficult to displace. The host nation must not only regain control of the area, but maintain control when the population may not view the host nation as a legitimate authority. MILITARY TACTICS 5-11. Insurgents use violence to create a wide range of effects. For example, in the early phases of an insurgency, insurgents plan attacks to achieve the greatest political and informational impact while not becoming decisively engaged. During the war of movement, insurgents may try to destroy a host nation’s security forces or its communication channels. Commanders need to understand the wide variety of insurgent tactics. Insurgents may use both terrorist acts and conventional military tactics. Terrorist Acts 5-12. Terrorist acts are meant to undermine the legitimacy of the government by demonstrating both the inability of the government to protect the population and the strength of the insurgency. The perpetrator of a terrorist act seeks to use the terror that the act produces among the population and the government to gain some political objective. Insurgents generally select targets based on their strategic, operational, and tactical importance and propaganda value. A terrorist attack will generally employ some deception and use techniques outside of accepted norms. 5-13. The possibility of an insurgent group gaining access to weapons of mass destruction changes the strategic effect of terrorist actions. If an insurgency gains a nuclear capability, which is an increased possibility in an interconnected world, the threat of using a nuclear weapon would provide that insurgency leverage for political negotiations. The actual use of a nuclear weapon would have regional and global effects. The use of biological and chemical weapons would also have a strategic effect, but to a lesser degree than nuclear weapons. An insurgent’s use of weapons of mass destruction would transform the nature of a conflict. Conventional Tactics 5-14. Insurgents use a wide range of tactics to attack counterinsurgents. The tactics insurgents use will be based on their capabilities. During a war of movement, insurgents may try to destroy host-nation government forces. However, this may expose insurgents if an attempt to destroy a host nation’s security force is taken too early. Insurgents must correctly judge their capabilities versus the host nation’s 5-2 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Threat Characteristics capabilities. When the host nation has an advantage in capability, insurgents will probably use small-unit tactics in order to not become decisively engaged. 5-15. Insurgents may use a wide range of conventional tactics. Insurgents often employ ambushes for harassment and disruption. Snipers or sharpshooters may be an effective means of engaging government forces without becoming decisively engaged. Insurgents may use indirect fire, such as mortar and rocket attacks, to harass counterinsurgents or cause them to commit forces that can then be attacked by other means. Weapons and munitions are frequently modified to best suit insurgent needs for a specific target or mission. For example, insurgents may use direct fire rockets or missiles in an indirect manner to avoid detection. Moreover, insurgents may have to improvise because they lack weapons. 5-16. Improvised explosive devices are effective tools that can be integrated into many different types of attacks. Improvised explosive devices can be inexpensive to produce and, because of the various detonation techniques available, may avoid risks to the perpetrator. Also, insurgents may use suicide bombing as an employment method, and it can be very effective. 5-17. Insurgents may use cyber electromagnetic attacks. Cyber electromagnetic capabilities can give an insurgency the ability to affect systems both within and outside the host nation. For example, a cyber electromagnetic attack could undermine the financial system within a state. This may be an effective way to undermine the legitimacy of a host nation. However, a cyber electromagnetic attack could also affect any state or region. For example, cyber electromagnetic capabilities provide an insurgent the ability to attack a country that supports the host nation. If an insurgency attains cyber electromagnetic capabilities, the nature of the conflict changes. SUPPORT ACTIVITIES 5-18. Although noticeable, violence may be only a small part of overall insurgent activity. Insurgent support activities include training, logistics, and communications. These support activities sustain insurgencies and allow for both military and political actions. They are enabled by an insurgency’s ability to generate popular support. Insurgent support networks may be large, even when violence levels are low. These networks can include support from other nations or from population groups outside the country. The effectiveness of insurgent operations depends heavily on logistics. 5-19. In some parts of the world, a lack of access to weapons may forestall insurgencies. However, there is widespread availability of weapons in many areas, with especially large surpluses in the most violent regions of the world. Explosive hazards, such as mines and improvised explosive devices, are likely to be common weapons in insurgencies. Insurgents can obtain weapons through legal or illegal purchases or from foreign sources. A common tactic is to capture them from government forces. Counterinsurgency forces should seek to cut off the flow of arms into an area of operations and eliminate their sources. 5-20. Income is essential, not only for insurgents to purchase weapons, but to pay recruits and bribe officials. Money and supplies can be obtained through many sources. Foreign support is one possible source of income. Local supporters or international front organizations may provide financial support. Sometimes legitimate businesses are established to furnish funding. In areas controlled by insurgents, confiscation or taxation may be used. Another common source of funding is criminal activity. 5-21. Funding greatly influences an insurgency’s character and vulnerabilities. The insurgents’ approach determines the movement’s requirements. Protracted popular war strategies that emphasize mobilization of the masses require considerable resources to build and maintain a counter state. In comparison, the military-focused approach—which emphasizes armed action—needs only the resources to sustain a military campaign. Counter threat finance is an important means to interdict an insurgency’s funding. (See ATP 3-07.20/MCRP 3-33 for more information.) TRAINING AND INDOCTRINATION 5-22. The quality and quantity of training depends on how advanced the insurgency is and what its specific strategy is. Indoctrination is a part of training which seeks to maintain allegiance and to focus cells to conduct continuous operations without frequent communications and direction from insurgent leadership. The level of indoctrination can help analysts identify the strategy and sophistication of the insurgency and 13 May 2014 FM 3-24/MCWP 3-33.5 5-3 Chapter 5 includes more than just the overall objective of the insurgency. Subordinate leaders within an insurgency are indoctrinated because they must execute the senior leadership’s intent and vision as well as guide operations until redirected. With better indoctrination of intent and vision, insurgents may be more effective in decentralized operations and being self sufficient. 5-23. Training also includes individual and collective training, depending on the role of the insurgent and the specific skills of the insurgent (such as sniper, information operations, human intelligence, raid or ambush, communications, logistics and caches, or bomb maker). More advanced training may include how insurgents conduct themselves if captured, including resistance to interrogation and operations within detention facilities (recruiting, clandestine communications, and maintaining control of other insurgents). Other states may play an essential role in training an insurgency. Training can occur at sites in the supporting country or covertly within the host nation. Many states maintain the ability to conduct unconventional warfare. (See FM 3-05 for more information on unconventional warfare.) COMMUNICATIONS 5-24. Communications in an insurgency cannot depend on open and traditional means. Ensuring an effective network of communications is an essential support activity of an insurgency. Insurgents can compensate for the lack of regular and reliable communications in numerous ways, including masking their communications in radio, television, or Internet messages. They may also pass information in cameras, high frequency, short-wave, and amateur (ham radio) sets, cellular phones, the mail, computers, or memory storage devices transported by couriers. They may also avoid detection by use of couriers and face-to-face meetings. INSURGENT STRENGTHS AND WEAKNESSES 5-25. Insurgents usually have several strengths. They usually have a significant knowledge of an area of operations. Usually they are operating in their own country and own ethnic group, making it extremely difficult for friendly forces to identify insurgents in the community or to identify people connected with the insurgency. Insurgents have intimate knowledge of the area of operations including things like the characteristics of the local people and their culture, daily schedules, accents, and local slangs that enable them to blend in with the local population, enhancing their ability to operate with secrecy. They will probably wear similar clothing, have like postures, mannerisms and hand gestures, body movements, walking speed, greetings, body motions, and maintain eye contact (or lack of) as the population of the area of operations. They will also probably observe local social norms of food, drink, and sleeping schedules. 5-26. An insurgent is not usually responsible for maintaining normal governmental obligations to the local population. While insurgents may conduct some governmental functions and set up a shadow government, an insurgency does not normally have the same expectations from the population to provide governmental services. This normally means that insurgencies spend few resources on governmental functions, which frees more resources to conduct the insurgency. 5-27. Most insurgencies have limited personnel and resources. Long periods without resupply and loss of key personnel can affect an insurgency’s ability to sustain a conflict. Counterinsurgents can apply pressure on an insurgency by conducting raids on cell members; recovering enemy caches; interdicting supply routes; searching or seizing resources from cars, homes, and personnel entering the area of operations; isolating the insurgents from access to markets, smugglers, and black-market goods; and by conducting offensive operations that diminish guerrilla numbers. Insurgencies usually fail when their ability to replenish, either through counterinsurgent action, mismanagement on their own part, or withdrawal of the support of an external actor, is undermined. 5-28. Insurgent movements are vulnerable to friendly force information operations that show their danger, futility, privation, and numerical inferiority compared to government forces. In some cases, the fear of being treated as a criminal if captured, and the fear of violence to an insurgent and the insurgent’s family, can cause desertions and defections. In some societies, good treatment, pardons, protection, food, shelter, and participation in the government may be stronger incentives than the fear of criminal punishment to induce desertions. Other insurgent stress factors include sustained combat and a hostile environment that weakens insurgent resolve. 5-4 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Threat Characteristics 5-29. The decentralized nature of networked insurgencies that provides operations security can also be a weakness as it is resource intensive, slows responsiveness, and causes information to move slowly. The difficulty of insurgents receiving encouragement from superiors and members of the political wing, a lack of direction in the face of counterinsurgent pressures, and an inability to openly call for reinforcements and logistics due to their operations security plan can make insurgents feel isolated, alone, confused, and unsupported. Analysts need to identify these points and recommend operations to demoralize and promote defections among insurgents. ASSOCIATED THREATS 5-30. Other threats can play interconnected roles in an insurgency. Insurgencies create change in a society and this can create an opportunity for some organizations. Opportunists are important actors in this type of operational environment. Two other groups are particularly important, criminal organizations and nongovernmental militias. These groups can be supportive, neutral, or opposed to an insurgency. Moreover, these groups can have important connections to an insurgency. OPPORTUNISTS 5-31. An opportunist is one who takes advantage of any opportunity to achieve an end, often with no regard for principles or consequences. In the context of counterinsurgency, opportunists often take advantage of the conditions of instability in the pursuit of their own goals, such as smuggling contraband, while security forces are distracted from protecting the border due to combating an insurgency. Commanders and staffs identify opportunists, assess their impact on the mission and force protection, consider them in planning, and mitigate their impact as needed. 5-32. There are several types of opportunists who, by nature, impede the regular and effective functions of government and may act contrary to the well-being of the people. Opportunists may be existing local people or external actors, including civilians, members of the government, or security forces. Opportunists can be in direct support of the insurgency or outside actors. They can be state sponsored, sponsored by a non-state actor, or unsponsored, all while taking advantage of unstable conditions. Opportunists understand and exploit the conditions of instability inherent in counterinsurgency where lawlessness, subversion, and insurgency are the norm. The extreme conditions of an insurgency may allow activities that are normally countered with effective law enforcement and governance to proceed with impunity. These conditions allow opportunists to pursue their political and economic interests. 5-33. Opportunists may tend to exploit populations by conducting kidnapping for ransom; revenge killings; murder for hire; hijacking; extortion; black marketing; smuggling; and trafficking of drugs, humans, and weapons. Opportunists use the conditions of instability to conduct activities that are often illegal to further their interests. They may also work within the political system to further their interests. Insurgencies often occur in a chaotic political environment. As such, opportunists can take advantage of the chaos to gain political power. 5-34. Foreign opportunists, such as mercenaries, international criminal groups, and terrorists, may be sponsored by an external state or non-state actor or act independently. These groups may also work in the environment of an insurgency. They can act in a similar manner as internal opportunists, but they pursue the interests of an external actor. 5-35. Opportunists can work for an insurgency, against an insurgency, or both. How they work and who they work for is determined by an opportunist’s own interests. Opportunists can work both sides of a conflict to maximize influence and profits while avoiding retribution. An opportunist can provide safe passage for insurgents, while also providing intelligence to counterinsurgents. An opportunist is not bound by the objectives of either the counterinsurgent or insurgent. 5-36. Reintegration initiatives, although favorable to resolve many insurgencies, can be exploited by opportunists due to the inclusive and reconciliatory nature of these programs. Opportunists can infiltrate local civilian security forces to avoid retribution, influence less secure communities, and provide opportunities for vigilantism. Reintegration can also offer incentives for opportunists looking for employment, benefits, or even amnesty from a seditious criminal, social activist, or political past. 13 May 2014 FM 3-24/MCWP 3-33.5 5-5 Chapter 5 5-37. Opportunists can be malign by design or by circumstance. Malign by design refers to the opportunists whose purpose by character is criminal and counterproductive to effective government and a population’s well-being. Malign by circumstance refers to opportunists whose purpose is not criminal by design but which shifts to wholly or partial illicit activities to further their interests based on obstacles to their original path. Groups like corporations, nongovernmental organizations, or security contractors may be advocates for a functioning government, but due to conditions which present opportunities for them, these groups or individuals may act counterproductively to counterinsurgent efforts. These opportunists are very difficult to identify due to their favorable position and the potentially clandestine activities employed to sustain their position. 5-38. In the planning process, counterinsurgents analyze the activities of opportunists, even though their presence may not be apparent. The same conditions that may allow an insurgency to form and enjoy freedom of movement also allow opportunists to act. Opportunists will probably take advantage of the vulnerability of the population and exploit the lack of governmental control in pursuit of their goals. 5-39. The presence, actions, and impact of opportunists can affect the success of the mission to defeat the insurgency and address the root causes of the conflict. This is especially true as opportunists may rely on the presence of the insurgency and unstable conditions to achieve their ends. Commanders and staffs need to include opportunists and their activities in understanding an area of operations and address them during mission planning and in attack the network operations. In the intelligence preparation of the battlefield/battlespace process, commanders and staffs may address opportunists within civil considerations, or within the threat, depending on where they are appropriate. The mission analysis must address identifying opportunists, understanding their impacts, and addressing or mitigating their impacts. 5-40. The commander’s intent may need to include dealing with opportunists, depending on the level of interference or political nature of opportunists. Opportunists can impact the mission or force protection operations. This is especially true if the opportunists are from a state sponsor or a border region where an internal conflict can spread to another country. Overall, counterinsurgents need to understand how opportunists can aid an insurgency, either directly or indirectly, and how they can undermine the efforts of a host-nation government or a multinational effort to address the causes of instability. 5-41. Commanders and staffs need to analyze how their units’ actions can provide opportunities for opportunists. Decisions concerning contracting, for example, can have various effects on giving opportunities to opportunists. Commanders and staffs must analyze their units’ effects on the battlefield. Some decisions that might seem to only effect a unit internally may also effect opportunists. Commanders and staffs must think holistically about how their units interact with the environment in order to minimize the effects of opportunist. CRIMINAL ORGANIZATIONS 5-42. Insurgents commonly use criminal organizations to accomplish objectives. Common activities designed to gain revenue or materials include theft, drug or human trafficking, smuggling of illicit materials, prostitution, extortion, kidnapping, blackmail, counterfeiting, taxing of civilians, bank robbery, and bribery. Criminal organizations can appear as street gangs, mafias, or cartels. Criminal organizations may also assist insurgent groups in achieving objectives other than accumulating resources. Other objectives may include intimidating government employees or candidates, conducting assassinations, kidnapping key personnel, initiating sectarian violence, strikes, demonstrations, riots, and smuggling high-value leaders, advisors, or weapons. Criminal organizations may also conduct operations deemed unpopular with a civilian population at a distance from an insurgent movement to create deniability. 5-43. Many insurgencies degenerate into criminality. This occurs as the primary movements disintegrate and the remaining elements become isolated, or the root cause is addressed. Insurgent disintegration is desirable; it replaces a dangerous, often ideologically inspired body of disaffiliated individuals with a less dangerous but more diverse body, normally of uneven character. The first is a security threat; the second is a law-and-order concern. This should not be interpreted as denigrating the armed capacity of a law-and-order threat. Successful counterinsurgents are prepared to address this disintegration. They recognize that the ideal approach eliminates both the insurgency and any criminal threats the insurgency’s elimination produces. 5-6 FM 3-24/MCWP 3-33.5 13 May 2014 Insurgency Threat Characteristics 5-44. However, criminal groups can develop into insurgencies. In the case of localities that depend on black markets for their general welfare, the local population may depend on criminal activities. This creates a closely interlocked relationship between the criminal element (running the black market) and the insurgents (linked to the black market). In some cases, this relationship feeds into the causes of an insurgency. For example, a local population may support the insurgents because they want to stop interference with their economic livelihood. An insurgency based on a black market generally has ties to other black markets and resources through globalization. At its core, a black market requires trade and contact with others. This can create a well-funded, trained, and equipped commercial insurgency. 5-45. An insurgency can begin with a political aim and then develop into a commercial insurgency because of connections to a market. For example, the Revolutionary Armed Forces of Colombia started as a communist insurgent group in 1964. However, through its involvement in the drug trade, it has become the richest self-sustaining insurgent group in history. In the parts of Columbia that it controls, it is closely linked to the population because the population depends on the drug trade for its economic well-being. NONGOVERNMENT MILITIAS 5-46. As the host-nation government weakens and violence increases, people look for ways to protect themselves. If the government cannot provide protection, people may organize into armed militias to protect themselves. Moreover, some social structures, such as tribes, may have a militia structure. Examples of militias include the following: Loyalist militias formed in Northern Ireland. Right-wing paramilitary organizations formed in Colombia to counter the Revolutionary Armed Forces of Colombia. Militias of various ethnic and political groups formed in Iraq during Operation Iraqi Freedom. 5-47. If militias are outside the host-nation government’s control, they can often be obstacles to ending an insurgency. Militias may become more powerful than the host-nation government, particularly at the local level. They may also fuel the insurgency and precipitate a downward spiral into a full-scale civil war. However, they can also play a constructive role and provide local security. While this can undermine the host nation’s government, it can also be a building block to help build legitimacy at the local level. 5-48. A militia can also shift into becoming an active insurgency and an insurgency can sometimes shift into becoming a militia. A militia may not actively oppose the government and may be working within the system. However, it represents a capability to challenge the host nation. Militias may become insurgencies. An insurgency may also be integrated by a government and become a militia. 13 May 2014 FM 3-24/MCWP 3-33.5 5-7 This page intentionally left blank. PART THREE Counterinsurgencies Part three provides doctrine for how to counter an insurgency. How commanders and staffs counter an insurgency is dependent on the strategic and operational context (part one) and the type of insurgency (part two). Chapter 6 discusses command and control and mission command. Chapter 7 discusses planning and operational considerations. Planning is essential in framing the problem and the possible solutions. Chapter 8 covers intelligence. Intelligence is fundamental in gaining situational understanding. Chapter 9 discusses direct methods and chapter 10 discusses indirect methods to counter insurgency. These chapters provide a framework to help commanders and staffs develop an overall operational approach to counter an insurgency. Chapter 11 discusses working with host-nation forces. Chapter 12 discusses assessments, which provide information on effectively using measures of performance and measures of effectiveness in counterinsurgency. Finally, part three discusses legal considerations in chapter 13. Chapter 6 Mission Command and Command and Control 6-1. The operations process is the means by which a commander recognizes what needs to be done and uses the mission command or command and control process to ensure appropriate actions are taken. Sometimes this recognition takes the form of a conscious command decision, as in deciding on a concept of operations. Sometimes it takes the form of a rules-based procedure, as in the guiding of an aircraft on final approach. Other forms may require a degree of judgment and intuition so that they can only be performed by skilled, experienced people, as in devising tactics, operations, and strategies. (See ADP 6-0, ADRP 6-0, and MCDP 6 for more information on mission command and command and control.) COMMAND IN COUNTERINSURGENCY 6-2. Command in counterinsurgency often involves a large geographic area and control over multiple units performing different types of operations. In Western Iraq, Brigadier General W. Blake Crowe commanded a large area that began along the Syrian border and extended to the Jordanian border. He executed command over multiple units, performing multiple tasks in different areas. The vignette “Command in Counterinsurgency” provides an insight into Brigadier General Crowe’s command during the Iraqi War in 2006. 13 May 2014 FM 3-24/MCWP 3-33.5 6-1 Chapter 6 Command in Counterinsurgency Our area of operations began along the Syrian border and extended down to the Jordanian border. We were also responsible for the Marine expeditionary force security area, which extended to Saudi Arabia. This was a large area, and it was not possible to be everywhere. This situation forced us to work with the locals and to work and play well with other units operating in the region, such as the special operations forces (SOF). But there in 2006, we were the surrogate government. We did not have mayors at the time. The provincial governor was in Ramadi, and he stayed there. Twice we were able to get him out to western al-Anbar in the year I was there, and it took a regimental-sized operation to get him out to cities such as Baghdadi, Haditha, and al-Qa’im. We spent nearly thirty days’ worth of planning to get him out there because for us he was more important than the President of the United States. I think Marines here would understand that. Our first mayor came in six months into my deployment in al-Qa’im. Lieutenant Colonel Dale Alford, commander of the 3d Battalion, 6th Marines, was involved in setting the conditions for that success. We didn’t have a mayor in Haditha because we had to arrest him. He was an insurgent. We didn’t have a mayor in Hit because the previous ones had been killed. So until December 2006, we were the surrogate local government. We learned very quickly that if we allowed the Iraqis to fail to build and provision their security forces, then we would have failed as well. So, we had to step in and fill that surrogate role. There is a debate concerning these operations and whether or not they are counterinsurgencies, hybrid operations, or distributed operations. We did them all. In al-Qa’im, we conducted what I would call a pure counterinsurgency (COIN) operation because the conditions had been set by the previous regiment. We were still having major manned gun, tank rounds, and combined arms in downtown Hit with more than one hundred insurgents surging on twelve- to fifteen-man positions. Phasing, synchronizing, supporting, and enabling formed what I thought was my primary role there. Every battalion commander wants to be the main effort. Every regimental or brigade commander wants to be the main effort. We weren’t the main effort in Iraq. And every battalion could not be the main effort, and that’s the hard thing for people to reconcile. How come I’m not getting all these assets? When I was in Afghanistan, I received everything. We were one Marine battalion attached to the Army and we were given everything. In Iraq, I had five battalions in my command and one reduced force reconnaissance company commanded by six lieutenant colonels. At least one unit is not going to get what they want in a timely fashion. The battalions, companies, and platoons had autonomy, but autonomy doesn’t mean that they operated independently. That’s where synchronizing comes in. It means going out and working very closely to the battalions and blurring the borders between zones of responsibility and forcing commanders to get together and have a cup of coffee. Just as we needed to have tea with the local nationals, we also needed to do that among ourselves. We did that very well with the SOF through liaisons. We established an ad-hoc tactical fusion center at the regimental level. [W]e raised close to 4,000 police officers. I waited a year and was told the police stations are coming. They never did. So we created expeditionary forward operating bases, because that way I could use Marine Corps money. I could put police in them, although they could not be designated official Iraqi Police stations. If it was designated as such, you would get reported because it would not be official. So, there are things that you have to do. It’s not selective disobedience of orders, but rather a creative way of getting the mission accomplished. We had two force protection measures: the American standard and what was acceptable to the Iraqis. Casualties were unacceptable to me as a commander. 6-2 FM 3-24/MCWP 3-33.5 13 May 2014 Mission Command and Command and Control The first time you go to a scene where you’ve lost a soldier, it does not matter what uniform he’s wearing. He is one of ours. He was brought in to serve with us, and I don’t care what nationality he is. We needed to build it to one standard: checkpoints, force protection, food, weapons, ammunition, all the way down. They fight with us and we’re going to treat them to our standard. That’s just nonnegotiable. Note: For Army users, JP 1 defines command as the authority that a commander in the armed forces lawfully exercises over subordinates by virtue of rank or assignment. Command includes the authority and responsibility for effectively using available resources and for planning the employment of, organizing, directing, coordinating, and controlling military forces for the accomplishment of assigned missions. It also includes responsibility for health, welfare, morale, and discipline of assigned personnel. ADP 6-0 defines control as the regulation of forces and warfighting functions to accomplish the mission in accordance with the commander’s intent. 6-3. Many actions contribute to successful mission command, including planning, training, and education. Moreover, a well understood commander’s intent is essential for mission command. In a counterinsurgency, the operational environment is changing and real-time guidance or direction will need to change. Planning, whether hasty or deliberate, provides a foundation of shared understanding. Effective training and education, which make it more likely that subordinates will take the proper actions in combat, help ensure the success of mission command. A commander's intent, expressed clearly before an operation begins, is an essential element of mission command. Likewise, analysis after the operation, which ascertains the results and lessons of the action and so informs future actions, contributes to mission command. Note: For Marine Corps users, mission command does not replace command and control as a warfighting function. Mission command is a type of command and control that promotes innovation and requires the strong relationships of trust and mutual understanding necessary for decentralized decisionmaking necessary to seize the initiative, degrade enemy cohesion, and strengthen friendly cohesive relationships that are critical elements to any counterinsurgency. Based on leader character and subordinate initiative, mission command offers no checklist for success, but instead challenges the services to cultivate a bias for taking appropriate action and accentuate the senior leadership virtues of trust, moral courage, and restraint. The mission command philosophy asserts that people are the basis of all military organizations, and military operations occur as human interactions. Commanders use the philosophy of mission command to exploit and enhance uniquely human skills. Commanders implement mission command though leadership, providing direction and guidance as part of command and understanding that subordinates contribute to control. The other types of command and control are command by direction and command by planning. For the Army, the philosophy of mission command is the exercise of authority and direction by the commander using mission orders to enable disciplined initiative within the commander’s intent to empower agile and adaptive leaders in the conduct of unified land operations. (For more information, see MCDP 6 and ADP 6-0). 6-4. Due to the nature of counterinsurgency operations, the inculcation of the mission command philosophy is beneficial in dealing with the local environment. Soldiers and Marines interact with a society at the platoon, squad, and individual level. Tactical leaders must have the ability, within the commander’s intent, to have freedom of action to work with a local society. As such, tactical leaders should act with a conceptual understanding of an operational environment and how their action’s fit into that operational environment. 6-5. A counterinsurgency involves simultaneous activities at every echelon. Platoons within a company could be doing different tasks, and companies within a battalion could be doing different tasks, all in support of a battalion’s method of counterinsurgency. Every task involves potential decisions that can have an immediate impact on success or failure. Moreover, these tasks are interrelated. This means that junior leaders will make decisions at the point of effort, relying on mission type orders. This applies to any operational approach taken to defeat an insurgency. For example, if the commander integrates a direct 13 May 2014 FM 3-24/MCWP 3-33.5 6-3 Chapter 6 action force into a host nation’s counterinsurgency effort, that force will have to understand the operational environment and the commander’s intent. Any mission can have unintended consequences, and this includes missions with clear objectives. For example, a direct action mission taken with faulty intelligence could result in the deaths of civilians. All commanders have to be empowered to make decisions that positively impact mission accomplishment. Whatever operational approach the commander takes and however the host nation is supported, mission command is essential. 6-6. When squads, platoons and companies are distributed over wide areas, they must frequently make decisions, and their understanding of the environment is generally better than that of their higher headquarters. In an effective counterinsurgency, there is a need for decentralization that puts a premium on the higher headquarters establishing a clear commander's intent and providing subordinates with vision and guidance particular to an insurgency and a host nation. In a counterinsurgency, commanders must effectively execute the art of command, which is the creative and skillful exercise of authority through timely decisionmaking and leadership. These decisions often have to be made in a time constrained environment. As such, decentralized decisionmaking is essential, and it provides control over the operations and activities inherent in a counterinsurgency. HEADQUARTERS USE IN COUNTERINSURGENCY 6-7. While mission command allows for multiple actions to simultaneously occur at every echelon, every echelon has an important role in ensuring that the various actions meet the desired end state. Control requires a shared understanding of an operational environment and operational approach in a counterinsurgency. A lack of effective control over these activities can create gaps that insurgents can exploit. For example, if different brigades or different divisions set different prices for weapons buyback programs or have different policies on wages, this sometimes creates situations that hamper the overall policy. A lack of understanding of the economic variables within a country can produce policies that undermine a weapons buyback program or distort the labor market. On the other hand, there might be cases in counterinsurgents want to allow a local commander more flexibility in setting such policies. The balance between local control and coordination of overall policy is one of the primary challenges facing the commanders and staffs of brigades, battalions, and regiments. 6-8. A commander bases the level of flexibility and coordination of activities and policies on an operational environment and a superior commander’s intent. Moreover, the type and experience level of a unit may play a role in determining the level of flexibility and coordination. Conditions vary within a country or region and the cities and towns within it. For example, while different policies on wages could produce a disjointed overall policy, it is also possible that different wages are justified by the economic environment in different areas in the country. One city could have low unemployment, while another city could have high unemployment. The different conditions in the labor market is something commanders should take into account when designing a policy on economic development and hiring local workers. Also, an inexperienced unit or a unit that is not performing its traditional mission might have less flexibility than an experienced unit performing its traditional mission. 6-9. In a counterinsurgency, operations are interrelated, and they must support the overall commander’s intent. The various activities that different units perform must also work within the operational approach of the joint commander. The joint commander is responsible for designing the overall operational approach of the counterinsurgency campaign. The joint commander has to ensure that that various activities being performed will meet stated United States (U.S.) policy goals. Subordinate commanders ensure that their operational approaches and activities fit within the overall operational approach. The combination of tactical actions must produce a strategic result, and every echelon of command shares a responsibility for ensuring that this occurs. Commanders must understand the end state and the ramifications of their actions in meeting that end state. The commander drives the operations process. The commander’s staff must ensure that the commander understands the operational environment and can visualize the battlefield/battlespace. This is accomplished through staff action during mission analysis. However, because a counterinsurgency environment is complex, situational understanding is continually developing. Understanding what counterinsurgents should do is more important than doing tasks that may be counterproductive. Also, constant engagement of key leaders with the population is essential to enhancing 6-4 FM 3-24/MCWP 3-33.5 13 May 2014 Mission Command and Command and Control understanding of the population and understanding of the counterinsurgency. Understanding the problem and having key leaders engage the population may be more important than having a large number of troops. 6-10. Headquarters elements may be essential in coordination with the host nation, other government agencies, or other unified action partners. Counterinsurgents tailor headquarters units to the requirements to coordinate and enable subordinate units to be effective. A larger number of headquarters or a more robust headquarters may provide a further ability to work with interagency and host-nation organizations. Interagency organizations can integrate their capabilities more effectively if there is a robust headquarters element to work with. The analysis and intelligence capabilities of a division or corps headquarters may be essential in integrating interagency organizations’ capabilities. These division and corps capabilities provide brigades the needed span of control to operate and integrate interagency organizations and their capabilities. Using multiple headquarters provides a robust capability for working with host-nation organizations, both military and civilian. Many programs meant to build capacity within a host nation are national level programs. A robust headquarters element will help to ensure that these programs are integrated and resourced to maximize the benefit to the counterinsurgency effort. This is needed to ensure that these programs are effective at the local level. 6-11. A headquarters can also serve as a coordination center. A coordination center can provide a means to unify multiple governmental, military, police, and civilian partners to gather and share information, provide support to priority projects, conduct meetings with local leaders, promote a whole of government and unified effort approach, and lend added credibility to the government. Coordination centers provide needed flexibility to control and coordinate host nation and multinational actions. Coordination centers can also act as joint tactical command posts and integrate various joint capabilities, such as air support. 6-12. An operational environment does not normally dramatically change at a unit boundary. It is essential in a counterinsurgency to understand the actual economic, political, and social boundaries of an operational environment and not use unit boundaries as the only planning consideration for operations. The relationships between units that are adjacent is essential. While the conditions in their operational environment may be different, commanders should understand their adjacent unit’s problem frame and operational approach. They should also understand how their actions may affect the operational environment of other units. This is of particular importance when integrating information-related capabilities. Commanders at every echelon ensure adjacent units have relationships that allow for the completion of the overall mission. 6-13. The same is true of forces operating in another unit’s area of operations, such as special operations forces (SOF). While missions to capture an insurgent leader may be essential to the overall mission, commanders must coordinate with other commanders and units to mitigate negative consequences of these types of actions with effective information operations. Commanders and staffs at all levels must ensure that the units under their command have productive relationships with other units. Establishing command and support relationships helps create channels that streamline information dissemination by ensuring the right information passes promptly to the right people. The three common channels for information dissemination are known as command, staff, and technical channels. (See ADRP 6-0 for more information on command channels.) 6-14. The effective link between planning and assessing the effects of operations in a counterinsurgency is the foundation for establishing effective mission command. Success in a counterinsurgency is largely dependent on making lasting changes to an operational environment. This requires that commanders and staff continue to evolve in their situational understanding. A continuous assessment process is essential for planning in counterinsurgency operations. (See chapter 12 for more information on assessments.) CONVENTIONAL FORCES AND SPECIAL OPERATIONS FORCES SYNCHRONIZATION 6-15. Counterinsurgency requires the integration of all capabilities of the U.S. and often requires this integration for long periods of time. However, the integration of SOF capabilities into the effort to counter an insurgency is of particular importance to both Army and Marine commanders. FM 6-05/MCWP 3-36.1 provides a doctrinal foundation for conventional force and special operating force integration. Also, 13 May 2014 FM 3-24/MCWP 3-33.5 6-5 Chapter 6 JP 3-05 provides an overview of special operations. The synchronization of conventional forces and SOF have special considerations in counterinsurgency. 6-16. Conventional forces and SOF depend on each other. SOF lack long term sustainability without conventional support. More importantly, if SOF are conducting direct action missions, it becomes vital that conventional forces and SOF coordinate so that they do not produce negative effects on the operational environment. However, SOF can provide conventional forces with important cultural and advising capabilities. They also provide important offensive capabilities. SOF capable of conducting direct action might be able to conduct raids and gain intelligence that conventional forces cannot. 6-17. Typically, SOF control a joint special operations area either long term or temporarily. A joint special operations area is simply an area of land, sea, and airspace assigned by a joint force commander to conduct special operations. This is a means to manage SOF, which tend to operate in small teams, separately from conventional forces, which are larger in size and capabilities. Creating a joint special operations area is a means to synchronize actions towards a common goal, prevent conventional forces and SOF from interfering with one another, and prevent fratricide. 6-18. In some counterinsurgency operations involving a large direct approach and conventional forces that are likely, at least for a time, to be the primary counterinsurgents, the land forces area of operations will typically encompass any area where SOF may operate. Unlike other operations, where the joint commander can separate forces by time and space, a counterinsurgency can involve large scale and long term involvement by land forces. Joint commanders typically set up joint special operations areas, but joint special operations areas are normally temporary, and these areas return to the control of the ground commander once the special operations mission is completed. 6-19. In a long term and large scale counterinsurgency effort, SOF operations, if not coordinated, could create problems. SOF actions, such as direct action missions, could be highly disruptive to a conventional unit’s ongoing efforts to build the legitimacy of the host-nation government if not coordinated. For example, a direct action mission that is not coordinated with information operations can alienate a local population. In some cases, a direct action mission can undermine a unit’s progress in an area, even if counterinsurgents attempt to mitigate the negative effects to the conventional unit’s missions. Commanders and staffs must ensure synchronization of both conventional forces and SOF can to ensure neither force undermines the overall effort. This synchronization can include decisions on how to perform missions and decisions on whether or not to perform missions. Both conventional forces and SOF should support the joint commander’s intent. 6-20. SOF and conventional forces complement each other’s capabilities. When SOF are operating on short duration missions, if not coordinated, they might not be aware of some of the local knowledge of the area. Commanders and staffs must share information to ensure progress. Combined operations can enhance the effectiveness of both SOF and conventional forces. The ground commander will have the daily experiences in an area and will understand the local population. On the other hand, a successful mission by the SOF commander could have strategic effects throughout the country. Coordination with SOF by the ground commander benefits both the SOF and conventional forces, who have to continue the longer term mission in an area of operation. 6-21. Both the SOF and conventional commanders share responsibility for ensuring an effective relationship. However, the joint force commander has overall responsibility for effective integration. FM 6-05/MCWP 3-36.1 offers some important tools, such as the use of liaison officers, to ensure an effective relationship. Ultimately, the joint force commander has overall responsibility for synchronization. Both SOF and conventional forces’ commanders and staffs ensure their actions meet the joint forces commander’s intent. The joint force commander ensures that the mechanisms for effective synchronization are in place. 6-6 FM 3-24/MCWP 3-33.5 13 May 2014 Chapter 7 Planning and Operational Considerations 7-1. Planning is important for gaining understanding. Military planning processes provide a way to understand an operational environment and understand the commanders’ intent within that operational environment. Planning is often conducted simultaneously with other activities, such as execution and assessment, and both informs, and is informed by, those activities. Planning as understanding, continually refined and questioned through assessments, helps commanders maintain situational understanding in the ever changing environment of counterinsurgency. This continued conceptualization of the operational environment and problem is essential for the use of mission command. However, before commanders and staffs can conceptualize the problem, they need to understand certain paradoxes of counterinsurgency. COUNTERINSURGENCY PARADOXES 7-2. A commander planning a counterinsurgency requires a specific mindset before that commander can plan or execute operations, and that mindset is the foundation for understanding how to counter an insurgency. When the United States (U.S.) acts, even temporarily, as the primary counterinsurgent, commanders operate carefully between fighting for a population and being seen as fighting against a population. When acting indirectly to enable a host nation, these paradoxes provide a framework for understanding and enabling the host nation. Throughout conceptual and detailed planning, the counterinsurgency paradoxes described in paragraphs 7-4 through 7-12 provide a set of apparent contradictions that aid commanders and staffs in developing a counterinsurgency mindset that helps commanders and staffs operate effectively. These paradoxes are offered to stimulate thinking, not to limit it. The applicability of the these paradoxes depends on the local situation and, in particular, the state of the insurgency. For example, the statement that “sometimes, the more force used, the less effective it is”, does not apply when the enemy is breaching the perimeter; however, that thought is applicable when effective security has already been achieved in an area. In short, commanders and staffs should not reduce these paradoxes to a checklist; they should be used with considerable thought. 7-3. The commander must be conscious of the problem of the observer effect, where the act of engaging the population, itself, makes changes in the operational environment. Any action on the environment generates a reaction, thereby altering the environment. This means the environment changes with every interaction with a society. In other words, the very act of interactions with a society changes the operational environment. Commanders must understand this reality and constantly consider its effects on their assessment and planning processes. Moreover, this fact is at the heart of many of the paradoxes that follow. Sometimes, the More You Protect Your Force, the Less Secure You May Be 7-4. Ultimate success in counterinsurgency operations is normally gained by protecting the population, not the counterinsurgency force. If military forces remain in their compounds, they lose touch with the people, appear to be running scared, and give the initiative to the insurgents. A possible path to success could include an increase in outreach programs that focus on protecting the population. Commanders weigh the effectiveness of establishing patrol bases and operational support bases against the security of using larger unit bases. Establishing patrol bases ensures access to the intelligence needed to facilitate operations. Sharing risks with the population reinforces the connections with them that help establish legitimacy. Sometimes, the More Force is Used, the Less Effective It Is 7-5. Any use of force produces many effects, not all of which can be foreseen. Using substantial force also increases the opportunity for insurgent propaganda to portray lethal military activities as brutal. In contrast, using force precisely and discriminately could strengthen the rule of law that needs to be established. The key to successful counterinsurgency operations is knowing when more force is needed, 13 May 2014 FM 3-24/MCWP 3-33.5 7-1 Chapter 7 and when it might be counterproductive. This judgment involves constant assessment of the security situation and a sense of timing regarding insurgents’ actions. The More Successful the Counterinsurgency is, the Less Force Can Be Used and the More Risk Must Be Accepted 7-6. This paradox is really a corollary to the paradox described in paragraph 7-5. As the level of insurgent violence drops, expectations of the population may lead to a reduction in direct military actions by counterinsurgents. More reliance is placed on police work, rules of engagement may be tightened, and troops may have to exercise increased restraint. Soldiers and Marines may also have to accept more risk to maintain involvement with the people. Doing Nothing is Sometimes the Best Action 7-7. Often insurgents carry out a terrorist act or guerrilla raid with the primary purpose of enticing counterinsurgents to overreact, or at least to react in a way that insurgents can exploit. For example, counterinsurgents opening fire on a crowd or executing a clearing operation may create more enemies than it removes from the streets. If an assessment of the effects of a course of action determines that more negative than positive effects may result, an alternative should be considered, potentially including not acting. Some of the Best Weapons for Counterinsurgents Do Not Shoot 7-8. Counterinsurgents often achieve the most meaningful success in garnering public support and legitimacy for the host-nation government with activities that do not involve killing insurgents (although killing clearly will often be necessary). Arguably, the decisive effort is to isolate the insurgents by denying the local population as a base of support. This establishes the need for synchronizing information operations across the various lines of effort in order to generate operational advantages for the commander conducting counterinsurgency operations. Every action, including the use of force, must be supported by adequate information. While security is essential to setting the stage for overall progress, lasting victory may come from a vibrant economy and political participation that restore hope. Particularly after security has been achieved, dollars and ballots may have more important effects than bombs and bullets. This is dependent on the context of a particular insurgency and the strategy to counter that insurgency. As with the other paradoxes, counterinsurgents cannot treat this as a uniform rule. However, a thriving economy may be more important than ammunition. Depending on the state of the insurgency, therefore, Soldiers and Marines should prepare to accomplish many nonmilitary missions to support counterinsurgency efforts. All unified action partners have a role in supporting efforts to enable governance to counter an insurgency, not just Department of State and civil affairs personnel. The Host Nation Doing Something Tolerably is Normally Better Than Us Doing it Well 7-9. It is just as important for counterinsurgents to consider who performs an operation as to assess how well it is done. Where the U.S. is supporting a host nation, long-term success requires supporting viable host-nation leaders and institutions that are legitimate and capable. The longer that process takes, the more U.S. public support will wane and the more the local population will question the legitimacy of their own forces and government. However, if the host nation cannot perform tolerably, the counterinsurgents supporting it may have to act. Experience, knowledge of the area of operations, and cultural sensitivity are essential in deciding when such action is necessary. If a Tactic Works This Week, It Might Not Work Next Week; If It Works In This Province, It Might Not Work In The Next 7-10. Competent insurgents are adaptive. They are often part of a widespread network that communicates constantly and instantly. Insurgents quickly adjust to successful counterinsurgency practices and rapidly disseminate information throughout an insurgency. Indeed, the more effective a counterinsurgency tactic is, the faster it may become out of date because insurgents have a greater need to counter it. Effective leaders 7-2 FM 3-24/MCWP 3-33.5 13 May 2014 Planning and Operational Considerations at all levels avoid complacency and are at least as adaptive as their enemies. There is no single prescribed set of counterinsurgency procedures. Commanders and staffs must constantly develop new practices. 7-11. The environment of an insurgency is not static and different factors may influence various areas. An operation or a tactic that works well in one area may not work well in another because of different factors in the environment. Village stability operations in Afghanistan demonstrate this. Soldiers had success in one area but did not have success in another. The reason was that the operational environments and the population’s responses to these environments were vastly different. Commanders and staffs must understand the local area and not assume that the same methods will work in other areas, even in an adjacent town. If a Tactic Works in This Province, it Might Not Work in The Next: The Case of the Dan Aw Patan District, Afghanistan, 2010 In the fall of 2010, U.S. Army units comprised of special forces teams and infantry squads from the 1st Battalion, 16th Infantry Regiment introduced village stability operations in the Dan Aw Patan district of Paktia Province in southeastern Afghanistan and along the Pakistan border. Village stability operations were an effort to empower Afghan villagers to defend themselves from insurgents. The primary U.S. Army mission was to recruit Afghan men in each village to serve in the local police that would provide physical security for their community and thereby decrease the power of the Taliban. In the course of the next year Soldiers regularly visited the villages of the district, meeting with local leaders and equipping and training members of the local police. Village stability operations in Dan Aw Patan enjoyed only partial success. In the north and central areas of the district, U.S. units were able to form and train squads of local police. The villagers generally supported these efforts, participated in sustainment training, and provided useful intelligence. More importantly, the Soldiers never felt they might be in imminent danger while working with the local Afghans. In the southern part of the district, however, village stability operations failed. U.S. Soldiers in this region never enjoyed the security their counterparts enjoyed further north. Moreover, the police units that were established in these villages were far less interested in conducting patrols than in receiving pay. Despite lengthy negotiations with village leaders in which the Soldiers offered incentives such as medical assistance and funds for new schools, bridges, and other infrastructure, these local police squads never became the means of countering insurgent influence in the district. Why did village stability operations work in the northern and central villages but not in those to the south? The answer was not obvious. The distances between the central and southern villages were minimal, less than 10 miles in most cases. The demographics in each region were essentially identical in terms of size, economics, Pashtun ethnicity, religion, and culture. The U.S. approach was consistent in its methods and leadership. In fact, the same Soldiers who led the successful efforts in the north and central regions also worked with the southern villages. The lack of full success in the southern villages resulted from less visible factors. The southern area saw much more fighting during the Soviet occupation, and the local people viewed any foreign troops as “Soviets.” More important was the existence of insurgent “rat lines” in this part of the district. From the Teri Mangel arms bazaar, located just across the border in Pakistan, historic smuggling routes crossed the Afghan border into Paktia Province toward the provincial capital of Gardez. Because of the routes’ importance to the insurgent campaign, the Taliban exerted pressure on the southern villages to resist American efforts to deny freedom of movement to the insurgents and keep the routes open. Village stability operations were designed to counter exactly this type of influence. Yet because of Taliban pressure that succeeded despite the U.S. presence, the southern villages never accepted the program fully. U.S. units were not resourced to collect sufficient intelligence to discover the extent of Taliban influence, and the newly-hired local 13 May 2014 FM 3-24/MCWP 3-33.5 7-3 Chapter 7 police proved unreliable but in a passive-aggressive manner, demonstrating little initiative except in the collection of their salaries. The case of Dan Aw Patan displays the importance of local conditions in the counterinsurgent’s choice of tactics. In general, village stability operations represented an innovative approach to the challenge of securing the Afghan population at the village level. In this case, however, the counterinsurgent learned that what worked in one village did not work in a neighboring village only a few miles distant. Many Important Decisions Are Not Made by Generals 7-12. Successful counterinsurgency operations require competence and judgment by Soldiers and Marines at all levels. Indeed, young leaders often make decisions at the tactical level that have strategic consequences. Senior leaders set the proper direction and climate with thorough training and clear guidance; they then trust their subordinates to do the right thing. Preparation for tactical-level leaders requires more than just mastering Service doctrine; they must also be trained and educated to adapt to their local situations, understand the legal and ethical implications of their actions, and exercise initiative and sound judgment in accordance with their senior commander’s intent. CONCEPTUAL PLANNING 7-13. The complexity of insurgencies presents problems that have incomplete, contradictory, and changing requirements. The solutions to these challenging problems are often difficult to recognize because of interdependencies of the relationships of an operational environment. While attempting to solve these problems, the solution to one problem may reveal or create another, even more complex, problem. Operational design employs various elements to develop and refine the commander’s operational approach. Operational design involves conceptual planning. Conceptual planning establishes aims, objectives, and intentions, and it also involves developing broad concepts for action. It generally corresponds to the art of war. The commander’s activities of understanding and visualization are key aspects of conceptual planning. (See MCDP 5 for more information on the art of war and ADRP 5-0 for more information on understanding and visualization). 7-14. Design is the conception and articulation of a framework for solving a problem, and it is critical to conceptual planning. The purpose of design is to achieve a greater understanding of the environment and the nature of the problem in order to identify an appropriate conceptual solution. While not prescriptive, design is based on critical thinking, conceptual planning, visualization, emergence of a hypothesis, and continuous activity. Design is the primary way to develop an operational approach. First, design helps commanders and staffs create a shared understanding of the current operational environment and visualize what the environment should look like. Understanding an operational environment is an essential foundation of counterinsurgency. Second, design enables the collaborative, conceptual planning necessary to understand a problem and develop broad approaches to solving it. From there, commanders can visualize their operational approach and describe to staffs and subordinate commanders how to move the environment from the current state to the desired end state. From an operational approach, the commander conducts detailed planning. (See figure 7-1.) (See JP 5-0 for more information on design. See ADP 5-0 for more information on Army design methodology and MCWP 5-1 for more information on Marine Corps design. See chapter 2 for an understanding of an operational environment.) 7-4 FM 3-24/MCWP 3-33.5 13 May 2014 Planning and Operational Considerations Figure 7-1. Design concept 7-15. By definition, design is iterative, and reframing the problem as necessary is essential. Reframing the problem involves revisiting earlier hypotheses, conclusions, and decisions that underpin the current operational approach. Reframing can lead to a new problem statement and operational approach, resulting in an entirely new plan. By their nature, counterinsurgency efforts require repeated assessments from different perspectives to see the various factors and relationships required for adequate understanding. Assessment and learning enable incremental improvements to the operational approach. The goal is to understand the problem, to construct a reasonable explanation of observed events, and to subsequently construct a framework within which to solve the problem. The essence of this is determining the mechanism or combination of mechanisms necessary to achieve success. These mechanisms may not be military activities, or they may involve military actions in support of nonmilitary activities. Once commanders understand the problem and what needs to be accomplished to succeed, they identify the means to assess effectiveness and the related information requirements that support assessment. This feedback becomes the basis for learning, adaptation, and subsequent reframing. (See ADRP 5-0 and MCWP 5-1 for more information on design and reframing.) 7-16. In an ideal world, a commander engaged in counterinsurgency operations would enjoy clear and well-defined goals for the campaign from the beginning. However, the reality is that many goals emerge only as the mission develops and goals can change as a result of interacting with an environment. For these reasons, counterinsurgents usually seek to achieve a combination of defined and emerging goals. Likewise, the complex problems encountered during counterinsurgency operations can be so difficult to understand that a clear operational approach cannot initially be developed and some assumptions must be made during problem framing. Often, the best choice is to create iterative solutions (also known as discovery learning) to better understand the problem. The use of design and the planning process allow commanders and staffs to learn and achieve greater understanding as they interact with the environment. As this interaction with 2 June 2014 FM 3-24/MCWP 3-33.5, C1 7-5 Chapter 7 the population and insurgents occurs, it will reveal the validity of planning assumptions, test the strengths and weaknesses of designs, inform the operational approach, and provide guidance to further planning and engagement. Other considerations include: Systems thinking. Continuous assessment. Structured learning. 7-17. Systems thinking involves understanding a problem in terms of systems and how they relate to, and influence, each other. For counterinsurgents this includes not only how the various systems in an insurgency interact, but how they interact and affect the various systems in the operational environment. Additionally, systems thinking should drive commanders and staffs to develop an understanding of how their lines of operations and lines of effort relate and influence each other. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) 7-18. Continuous assessment is essential to learning and adapting within the inherent complexity of counterinsurgency operations. No design or model completely matches reality, and reasonable and feasible solutions at one moment can become ineffective at the next moment due to changes in the situation. The object of continuous assessment is to identify where and how the actions and activities of the counterinsurgent are working or failing and to consider adjustments to design and the operational approach. (See chapter 12 for more information on assessments.) 7-19. The objective of structured learning is to develop a reasonable initial design and then learn, adapt, and iteratively and continuously improve the initial plan as more about the dynamics of the counterinsurgency problem become evident. The operational approach and framing of the problem can be thought of as models. In counterinsurgency, these models must always be tested to determine how well they match reality. In other words, counterinsurgents may believe they have an understanding and general idea of how to solve a problem, but they review that belief to ensure it is still valid at any given time. Counterinsurgents must understand the actual problem to ensure that tactical actions have an effect on the environment. CENTER OF GRAVITY 7-20. An important element of conceptual planning is center of gravity analysis. The center of gravity is important in understanding both the environment and the enemy. A center of gravity is the source of power that provides moral or physical strength, freedom of action, or will to act (JP 5-0). A center of gravity construct is useful as an analytical tool to help counterinsurgency forces analyze the insurgency’s sources of strength as well as its weaknesses and vulnerabilities. Centers of gravity may change over time, they may be different at the operational and strategic level, and they could be different from location to location. (See JP 2-01.3 for more information on centers of gravity.) 7-21. In an insurgency, the population is not necessarily the center of gravity for an insurgent. A center of gravity could be external support from another country, it could be a group of core leadership or believers, or it could be a host of other factors or vital functions. Center of gravity analysis begins with the understanding that every environment is unique, and a center of gravity analysis must not begin with a preconceived center of gravity. 7-22. Counterinsurgents must understand their own center of gravity and that of the host nation. In many cases, political support is the strategic center of gravity for the U.S. Some tactical actions, such as war crimes, can undermine political support for the counterinsurgency. Host nations may also have a wide range of centers of gravity. Operational and tactical leaders must plan and execute operations that do not undermine the host nation’s center of gravity. LINES OF OPERATION AND EFFORT 7-23. Lines of operation and effort are important planning tools to move conceptual planning into detailed planning. These planning tools help describe how a military force will turn a commander’s understanding of the current situation into a desired end state. An end state is the set of required conditions that defines achievement of the commander’s objectives (JP 3-0). The primary source for any commander’s end state is 7-6 FM 3-24/MCWP 3-33.5, C1 2 June 2014 Planning and Operational Considerations the mission the commander received. The use of conceptual planning helps commanders visualize how to generate the conditions that achieve that end state. Conceptual planning also allows commanders to determine if the dictated end state is achievable, if additional resources are necessary, what level of risk must be accepted, and if modification of the mission and expectations is required. The end state may change as the situation changes. Lines of operations and effort help provide the detail necessary to turn the commander’s visualization and the operational approach (how to move from the current situation to the desired end state) into a detailed plan. 7-24. A line of operation is a line that defines the interior or exterior orientation of the force in relation to the enemy or that connects actions on nodes and/or decisive points related in time and space to an objective(s) (JP 5-0). Lines of operation are normally associated with the spatial aspects of a tactical problem. Lines of operation are useful, especially when addressing the physical aspects of counterinsurgency, such as infrastructure protection, control of movement, and locating and engaging insurgent forces. Lines of operation and lines of effort can be used separately or in combination. In Service-level doctrine, United States Marine Corps doctrine does not make a distinction between lines of effort and lines of operation. MCDP 1-0 states that, “A line of operations helps define the orientation of the force. In conventional operations, lines of operations connect actions related in time and space to an objective. During counterinsurgency or other irregular warfare operations, lines of operations, for example, could focus on major stability-related objectives, such as security, restoration of essential services, and training host-nation military and police forces. In either case, lines of operations reinforce the idea of the single battle, since success or failure in any line of operations will have an impact on the other lines of operations.” 7-25. A line of effort is, in the context of joint operation planning, using the purpose (cause and effect) to focus efforts toward establishing operational and strategic conditions by linking multiple tasks and missions (JP 5-0). Because counterinsurgencies are often more oriented towards an intended outcome or purpose than an enemy force, counterinsurgency operations generally use lines of effort. If a line of operation is spatially oriented, then that line of effort is purpose oriented and is appropriate when positional references to an enemy or adversary are not the determining factor in friendly action. Because counterinsurgency operations involve many nonmilitary factors, lines of effort may form a way to link tasks, effects, conditions, and the desired end state. Lines of effort help commanders visualize how to integrate their military capabilities into the efforts of the rest of the unified action community. (See JP 5-0 for more information on lines of effort.) 7-26. +Lines of effort are important tools to link conceptual planning to detailed planning. They are an essential means that commanders can use to arrange tactical events in time, space, and purpose. The benefits of using this type of framework include— Aiding the commander in visualizing, describing, and directing operations toward a definitive end state. Unifying the efforts of joint, interagency, multinational, host-nation government, and host-nation security forces toward a common purpose. Allowing commanders and staffs to synchronize activities along all lines of operation and effort to gain unity of effort. Ensuring all efforts converge on a well-defined, commonly understood end state. Combining the effects of long-term operations with short-, mid-, and long-term goals. Helping commanders identify missions, assign tasks, allocate resources, and assess operations. Enhancing mutual support between echelons and adjacent organizations. 7-27. Lines of effort depict how the actions of a counterinsurgent, over time, achieve the end state visualized by the commander. In a counterinsurgency, lines of effort must also be nested into the actions and activities of the host nation. From the tactical level to the strategic level, the goal of the counterinsurgent may be to support the host nation, depending on the operational design of the counterinsurgency. While that may require some tactical actions that do not involve host-nation forces, the overall effort must be to support the host nation’s efforts at all levels. The counterinsurgent forces support and integrate their efforts with the efforts of the host nation’s strategic and operational approaches. 2 June 2014 FM 3-24/MCWP 3-33.5, C1 7-7 Chapter 7 7-28. Commanders and staffs must consistently question and evaluate lines of effort as part of the operations process. As assessment indicates changes to the situation (sudden opportunities to exploit, failure of certain activities, new actors, and an actual change to the end state) the tasks and objectives of various lines of operation and effort may no longer be relevant or appropriate. Worse, they can trap the commander into a preconceived notion that accomplishment of various tasks will result in a successful completion. Lines of operation and effort are useful means to help plan activities, but they are not measures of mission success. All leaders must guard against the assumption that their actions are relevant because they support any particular line of operation or effort. The underlying assumptions behind the tasks and objectives of any detailed plan must be constantly questioned and evaluated. Just because counterinsurgents take an action, that does not make that action relevant. 7-29. The effects of actions in one line of effort are not contained to only that line. For example, the commander could have a line of effort to support the rule of law and a line of effort to support economic development. However, a working legal system has a direct effect on the economic system. A system in which contract law is enforced, for example, will have a much wider range of economic activity than a system where contract law is not enforced. In this example, progress in the support economic development line of effort may be hindered by struggles within the support rule of law line of effort. The use of systems thinking allows commanders and staffs to use lines of operation and effort not only for planning and conceptualization, but also for visualization of how they relate and influence each other. 7-30. Figure 7-2 illustrates one example of lines of effort in a counterinsurgency. However, while this is an example that may apply well to a counterinsurgency after large-scale combat operations, it may not apply well to other counterinsurgency operations. The U.S. could be providing only enablers for a counterinsurgency effort. For example, U.S. forces might be combining capabilities such as counter threat finance, signals intelligence, and a direct action force to enable the host nation by stopping the insurgency from attaining the means to fight, providing intelligence on an insurgency’s communications, and providing a means to neutralize insurgent leadership. The host nation may have the capability to handle basic functions such as governance. When designing lines of effort for a counterinsurgency, the context the counterinsurgent is operating in is not important. If commanders and staffs reduce lines of effort to some standard solution set, they are no longer using the tool, but they are being used by the tool. This illustrates that complex problems in counterinsurgency require critical thinking and defy solution by checklist and battle drill methodologies. When commanders and staffs use them properly, and when they are tied to operational and strategic purposes, lines of operation and effort are means to help commanders and staffs perform successful counterinsurgency operations. Figure 7-2 provides examples of possible tasks on each line of effort. However, commanders and staffs must remember that these are sample lines of effort and sample tasks on the lines of effort. Just as the individual lines of effort must meet the situation commanders and staffs find themselves in, tasks on a lines of effort must fit an operational environment and its desired end states. (See figure 7-2.) 7-8 FM 3-24/MCWP 3-33.5, C1 2 June 2014 Planning and Operational Considerations Figure 7-2. Sample of individual lines of effort 2 June 2014 FM 3-24/MCWP 3-33.5, C1 7-9 Chapter 7 DEVELOP SIMPLE, FLEXIBLE PLANS THROUGH MISSION ORDERS 7-31. Effective plans and orders are simple and direct. During insurgency and counterinsurgency operations, not all participates will understand military language and terms. Staffs must be careful to prepare clear, concise orders that communicate to all organizations involved a clear understanding of the operation using operational terms and symbols that are understood by all or enabling understanding through liaisons or other coordination means. 7-32. Flexible plans help participates adapt quickly to changing circumstances. Commanders and planners build opportunities for initiative into plans by anticipating events. This allows them to operate inside of the enemy’s decision cycle or to react promptly to deteriorating situations. Identifying decision points and designing branches ahead of time—combined with a clear commander’s intent—help create flexible plans. 7-33. Commanders stress the importance of using mission orders as a way of building simple, flexible plans. Mission orders are directives that emphasize to subordinates the results to be attained, not how they are to achieve them (ADP 6-0). Mission orders clearly convey the unit’s mission and the commander’s intent. Mission orders provide subordinates information on what to do and the purpose of doing it, without prescribing exactly how to do it. 7-34. +Commanders must also give guidance concerning risk when they issue mission orders. It is the responsibility of commanders and staff to assess tactical and operational risk. Moreover, they should ensure their forces are using techniques that take safety into account. That said, tactical initiative that supports mission accomplishment should never be sacrificed because of safety. An over focus on safety undermines the needed aggressive behavior to attack the enemy and take the needed risk to maintain contact with the population. However, informing decisionmakers of hazards, recommended controls (resources), and residual risk allows responsible individuals to weigh benefit against risk, direct resources to best mitigate the risk, and employ forces in the most efficient manner. (See ATP 5-19 for details on the risk management process and processes for integrating the process in both deliberate planning and under real-time constraints.) TRANSITIONS 7-35. Transitions are fundamental to the planning and execution of any line of operation or effort. Transitions may occur as a result of both success and failure in terms of friendly actions, host-nation actions, and adversary actions. There are four types of transitions in counterinsurgency operations: Transitions between changes in the environment. Transitions between phases. Transitions between units in an area of operations. Transitions of responsibilities to host nation or other agencies. 7-36. Transitions are critical events. They are critical because they represent significant changes to the situation and because a failure to properly execute them can stall or even negate progress. Whatever their nature, transitions are milestones that require reassessment. Even if a transition is a result of success, such as moving forward in phases, it is a cause to assess whether the basic assumptions and plans associated with the next phase are still appropriate and relevant. In counterinsurgency, in addition to possible transitions due to enemy actions, the commander and staff base transitions on changes in the population’s perception of legitimacy. Because transitions are based on the conditions of an operational environment, they must be a part of both the planning process and based on assessments of an operational environment. Transitions in counterinsurgency are essential because they generally measure progress towards the desired end state. However, the commander must link transitions to an assessment process that allows that commander to attain situational understanding. A transition to another phase or a transition to the host nation not linked to the assessment process can undermine the achievement of the end state. For example, a transition to a host-nation agency before that host-nation agency is ready to assume responsibility may ultimately have the effect of undermining the legitimacy of the host nation as the host nation fails to meet the basic expectations of the population. 7-10 FM 3-24/MCWP 3-33.5, C1 2 June 2014 Planning and Operational Considerations 7-38. Transitions and assessments should be planned and executed from the beginning of any counterinsurgency. Commanders can build legitimacy by ensuring that the host nation takes responsibility for basic functions when it can. Therefore, building towards and executing that transition to the host nation is fundamental to the commander’s planning and operations. Transitions to other units or other agencies maintain a coherent and logical progression towards an ultimate transition to the host nation. The commander avoids allowing any U.S. element to transition with another U.S. or multinational element in a way that sets back the mission. This is also true for transitions between phases. A transition to another phase before the operational environment allows can have disastrous consequences. 7-39. Effective counterinsurgency is about effectively linking tasks to a purpose and achieving that purpose. This is what makes lines of effort effective planning tools for a counterinsurgency. Whether commanders and staffs are using direct or indirect methods, they must link those methods to an end state. However, linking both assessments and transitions into each line of effort is just as essential. The end state of every line of effort is the creation of the conditions that satisfy the requirements of mission accomplishment. (See figure 7-2 on page 7-9.) In counterinsurgency, ultimate success comes when a society maintains its own legitimate government and defeats its insurgency using its own resources, not through outside enablers. Transitioning to that point requires a well planned effort that evaluates progress and executes all transitions in a way that does not undermine the objective of the line of effort. (See chapter 12 for a further discussion on assessments.) 7-40. A transition is a sequence of actions required to reorient on a changed situation, change to the next phase of action, or shift responsibility from one organization to another, not a specific point in time. Transitions require adequate time to allow for all transitional tasks to be completed. Thinking of a transition as a general series of actions rather than a point in time better aids commanders and staffs in recognizing transitions, planning for them, and executing them seamlessly. 7-41. When transitions occur between organizations, whether between military units or from a military unit to a civilian agency, all involved organizations must clearly understand the tasks and responsibilities being transferred and the time expected for completion. Commanders and staffs enable coordination between units, agencies, and organizations to reduce the friction normally associated with a transition. Commanders identify a collaborative transition planning team early in the process. 7-42. Commanders and staffs identify the criteria and conditions that must be met prior to executing a transition. For example, transitioning a strongpoint to host-nation control may require the host nation to allocate specialized personnel to replace the specialized personnel previously provided by other forces. Additionally, host-nation manning may need to be increased to offset the departure of transitioning forces. Commanders identify criteria for all parties involved or gaps will develop in execution. One criteria is the minimum sustainable effort of the host nation prior to transition. Getting the host nation’s minimum sustainable effort right with the proper balance for sustained effectiveness and long-term maintenance may reflect a less than optimal solution from the perspective of the counterinsurgent, but any higher level of effort by the host nation may actually jeopardize the legitimacy of the host nation in the long term by being too heavy-handed or too costly. 7-43. Counterinsurgents must understand that transitions occur at varying times and locations based on the situation in a given area. A transition may be linear at the local level, but transitions may occur at multiple levels in the aggregate. For example, one battalion or brigade may have three village clusters in a build phase, one that has transitioned, and two that are in a clear phase without any geographic context. One host-nation security unit may be more advanced in training and equipping than another. As a result, counterinsurgent forces may have to tailor their approach on a daily basis depending on the area, village, or unit where they are operating. Success in counterinsurgency operations requires small-unit leaders agile enough to transition among many types of missions and able to adapt to change. (See chapter 9 for more information on the shape-clear-hold-build-transition framework.) 7-44. Maintaining unity of effort is particularly important during transitions, especially between organizations of different capabilities and capacities. Relationships tend to break down during transitions. A poorly executed transition affects the success of the mission and places the new unit at risk. Ego and unhealthy competition are often the greatest impediments to achieving an effective transition, and they increase unnecessary risks to Soldiers, Marines, and the mission. Commanders must set the tone for their forces to accomplish effective physical and contextual transitions. 13 May 2014 FM 3-24/MCWP 3-33.5 7-11 Chapter 7 7-45. A successful transition is achieved when it is executed properly and in synchronization with all the relevant organizations, entities, and agencies. Planning for transitions is more than the identification of the events that govern phases and branches for planning. It requires a holistic framing to develop the full appreciation of the tasks, time, and resources required to execute effectively and efficiently in a counterinsurgency environment. Well-planned transitions require proactive analysis and continuous assessment during execution. Assessment of qualitative and quantitative criteria, supported by expert opinion, should inform the decision to transition. OPERATIONAL CONSIDERATIONS 7-46. There are certain operational considerations that have important consequences for planning and executing counterinsurgency operations. Currently, insurgencies are likely to be networked. This makes attack the network an essential operational consideration in understanding an insurgency and planning and executing a counterinsurgency. Other considerations include remote area considerations, border considerations, and basing. Counterinsurgency operations normally integrate information related capabilities with other capabilities, and information operations are essential to most operational approaches. This makes information operations uniquely important to counterinsurgents. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) ATTACK THE NETWORK 7-47. Attack the network operations can be essential in planning and an essential consideration for every step in the operations process. When an insurgency is deeply networked into a society, it is important that attack the network operations are integrated into planning, preparing, executing, and assessing operations. Networked insurgencies must be understood and attacked. 7-48. Attack the network operations provide the primary means to attack an insurgent network or enable a host-nation force to defeat a networked insurgency. As such, they must be integrated and used when counterinsurgents are facing a networked insurgency. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) 7-49. Attack the network operations consist of activities that employ lethal and nonlethal means to support friendly networks, influence neutral networks, and neutralize threat networks. Attack the network operations are conducted continuously and simultaneously at multiple levels (tactical, operational, and strategic) throughout the whole of government. Attack the network operations are constructed around six fundamentals: Understand the mission. Understand the operational environment. Understand the networks. (See paragraphs 4-88 through 4-103 for more information on networked insurgencies.) Organize for the fight. Engage the network. Assess. 7-50. While listed sequentially, these actions occur continuously and simultaneously and are designed as an enhancement to planning processes and intelligence preparation of the battlefield/battlespace. Effective attack the network operations occur when operations and intelligence efforts are synchronized. Failure to synchronize efforts may hamper a unit’s ability to plan and operate in an efficient manner. 7-51. Attack the network operations predominantly support problem framing and mission analysis within planning. During the initial stages of planning, intelligence preparation of the battlefield/battlespace must include an analysis and graphical (geospatial) representation of an operational environment as a series of interconnected networks (friendly, neutral, and threat) in addition to weather, terrain, and civil considerations. Threats to mission accomplishment can be presented by any network, not solely threat networks. 7-12 FM 3-24/MCWP 3-33.5 13 May 2014 Planning and Operational Considerations 7-52. Attack the network operations enable greater understanding of the human networks and those variables critical to insurgent and threat networks. Network mapping, charting, and social network analysis are intelligence products that can aid in refined analysis and course of action developments, bridge conceptual planning and detailed planning by visually depicting time sensitive intelligence and mission requirements, and provide a shared understanding of the operational environment and design. Additionally, these network analysis products assist commanders and staffs in recognizing dynamic and static network relationships for targeting to support mission accomplishment. The evaluation and measurement of targeting effects continually aid in refined understanding and provide potential follow-on targets to degrade threat and insurgent networks. 7-53. Attack the network operations require that commanders and staffs understand social networks. A social network analysis is a tool for understanding the organizational dynamics of an insurgency and how best to attack or exploit them. A social network analysis allows analysts to identify and portray the details of a network structure. It shows how an insurgency’s networked organization behaves and how that connectivity affects its behavior. A social network analysis allows analysts to assess the network’s design, how its members may or may not act autonomously, where the leadership resides, how leadership is distributed among members, and how hierarchical dynamics may mix or not mix with network dynamics. 7-54. Attack the network operations provide a construct to identify, define, and engage any network, regardless of its design. The framework for attack the network operations can be applied against any type or combination of adaptive networks. It allows leaders to effectively engage neutral and threat networks with the appropriate lethal or nonlethal targeting, once a network has been defined through information collection and analysis. It also provides a means to protect friendly networks. Assessments of targeting and the measurement of the effects on networks (friendly, neutral, and threat) in an operational environment assist the staff in providing further targeting recommendations in sustainment of lethal or nonlethal activities. 7-55. Attack the network operations are tactical, operational, and strategic operations that capitalize on or create vulnerabilities to neutralize the threat network’s ability to function and enable success of the operation. Adaptive networked threats present an enduring challenge to all military operations. Neutralizing them may require an attack the network approach that includes the following activities: Support friendly networks. Influence neutral networks. Neutralize threat networks. Support Friendly Networks 7-56. Friendly network actions are intended to establish, reinforce, or set the conditions necessary for friendly networks to function effectively and increase capability. These operations also have indirect effects on threat networks, driving down their capabilities and altering the environmental conditions those networks require to survive and operate. Actions supporting friendly networks are intended to establish, reinforce, or set the conditions necessary for the host nation or civil authorities to function effectively, add capability, and increase capacity. 7-57. Commanders and staffs use all resources available, both Department of Defense (DOD) and non-DOD, in an area of operations to ensure a comprehensive approach to supporting and enabling friendly networks. Host-nation networks such as government agencies, local business or religious organizations, tribal or cultural communities, and educational institutions all have an impact on a population and can alter its perceptions. Commanders can affect these organizations positively, thus altering public perceptions in favor of supporting those organizations. This results in increased cooperation, support, and even active rebuttal of threat networks. (See paragraphs 1-47 and 1-48 for more information on comprehensive effort.) Influence Neutral Networks 7-58. Influence neutral networks activities include operations intended to alter the opinions and attitudes of a population segment through information, influence, presence, and conduct. These activities reflect the ability of friendly forces to operate within the cultural and societal norms of the local population while 13 May 2014 FM 3-24/MCWP 3-33.5 7-13 Chapter 7 accomplishing the mission. They require legitimacy. Developing legitimacy requires time, patience, and coordinated, cooperative efforts across the operational area. Influencing neutral networks to be more favorably disposed to U.S. and host-nation objectives has indirect effects on threat networks by making the operational environment in which threat networks operate less hospitable to their formation, growth, and sustainment. Neutralize Threat Networks 7-59. Threat networks are typically the immediate concern for any unit arriving in an area of operations. These networks must be neutralized in order to protect friendly forces and populations while creating time and space for other attack the network operations. While local friendly networks are being bolstered, there is a period when host-nation capabilities are insufficient to address the threat. U.S. forces and multinational partners must take direct actions against threats, reducing their functionality and impact, in order to set conditions for supporting friendly networks and influencing neutral networks. The goal is to change the perceptions and behaviors of neutral audiences to support the achievement of U.S., multinational, and host-nation objectives. 7-60. A solid understanding of threat networks helps commanders engage those networks to achieve their desired end state. Knowledge of numerous characteristics of networks can assist in the engagement process. Conditions for network formation can help commanders and staffs understand the cognitive domain of networks. Knowing the strengths and types of links can help commanders determine whether or not they want to target or engage key nodes within networks or all known and potential nodes and actors of a network. 7-61. Attack the network operations require that commanders understand and integrate specific staffing requirements. Commanders and staffs integrate organic capabilities with enablers including, but not limited to, other government agencies, nongovernmental organizations (NGOs), intergovernmental organizations, law enforcement professionals, and theater-specific joint task force explosive ordnance disposal elements to conduct attack the network operations. OTHER OPERATIONAL CONSIDERATIONS 7-62. Operations that occur in three additional types of environments have important considerations for counterinsurgency. They include— Remote area considerations. Border considerations. Basing. Remote Area Considerations 7-63. Operations in remote areas may be conducted in rural areas where a decentralized array of forces can be most effective. Operations in remote areas are generally conducted in insurgent-controlled or contested areas to establish pockets of popular support for the host-nation government and deny support to insurgents. These operations may be conducted to establish bases in unpopulated areas where insurgent forces have established staging areas, training areas, rest areas, logistic facilities, or command posts. Units operate in remote areas to interdict insurgent activity, destroy insurgent base areas, and demonstrate that the host-nation government has not ceded control to the insurgents. 7-64. Operations in remote areas are usually conducted in areas that are either under insurgent control or are contested. In these areas, ground or water modes of entry are often used, but air assault or parachute operations can be employed. These operations may use offensive tactics such as raids, reconnaissance in force, cordon and searches, hasty or deliberate attacks, and pursuit (or combinations of these tactics). Their purpose may be to— Harass insurgents to prevent the buildup of personnel and logistic resources. Isolate insurgents from their support. Demonstrate support for the government and for the populace in the local area. 7-14 FM 3-24/MCWP 3-33.5 13 May 2014 Planning and Operational Considerations Expand controlled areas. Destroy the insurgent force and its base complexes. 7-65. To the extent possible, the counterinsurgency force should include personnel indigenous to the operational area. The type of force employed, along with its host-nation counterpart (regular forces or paramilitary) depends on the objectives, characteristics of the area, attitude of the local population, political considerations, and the equipment and logistic support available. The size and composition of the host-nation unit is, in part, determined by the insurgent’s influence over the population and the government’s ability to recruit and develop an adequate local force. When the unit is recruited from local inhabitants, local leaders should be used even though their military ability may be limited. By using local leaders, assisted by advisors, better control and motivation are possible. Training, indoctrinating, and incorporating the local force into the governmental structure is facilitated by using local leaders. 7-66. Understanding the host nation’s population’s issues from their perspectives enables counterinsurgents to address the prerequisites of the insurgency and obtain local support for remote area operations. Success is more likely if— A significant segment of the local population supports the program. The host nation recruits local personnel for its remote area paramilitary or irregular force. Host-nation forces conduct remote area operations to interdict infiltration routes in areas nearly devoid of people. In this case, U.S. and multinational elements and host-nation forces operate in a manner similar to that of the insurgents, but with access to superior sustainment resources. 7-67. In a rural environment, insurgents rely on friendly elements within the population to provide supplies and intelligence. Rural insurgents prefer to operate in regions providing plenty of cover and concealment, such as heavily forested and mountainous areas that hinder a counterinsurgency force from gaining access to them. Often operating from their own home or village, rural insurgents often move to camps if security does not permit them to remain at home. Insurgent camps are chosen with a view toward easy access to the target population, access to a friendly or neutral border, prepared escape routes, and good observation of a counterinsurgency force’s approach routes. When counterinsurgency operations force the insurgents from their preferred base camps, insurgents tend to establish camps in rugged inhospitable areas that are not easily penetrated. Like counterinsurgency in urban areas, remote counterinsurgency operations must focus on both locating and eliminating insurgents and on severing the supportive element of the population from providing supplies and intelligence to them. 7-68. Operations in remote areas typically call for use of combat outposts that are linked to the local population. Commanders and staffs consider three perspectives (the population, insurgents, and counterinsurgents) when choosing combat outpost locations. Establishing an outpost close to the local population does not serve to advance the counterinsurgency’s goals without certain factors. These include— Gaining acceptance of the local civilian leadership. Maintaining a constant presence in the community. Maintaining constant communications with the local community to provide immediate emergency assistance. Maintaining situational understanding and an awareness of any changes in the population’s patterns of life. This includes movement of outsiders (such as visitors, merchants, nomads, or seasonal labor). 7-69. Operations in remote areas may include civil affairs, defense support of civil authorities, intelligence, population and resources control, and advisory assistance operations. Most remote operations are long term and continuous. They are initially directed at disrupting the insurgent’s operations and then destroying the insurgent armed forces. Counterinsurgents destroy the insurgent infrastructure as quickly as possible. 7-70. Initially, strong combat and sustainment forces establish secure operational bases. Counterinsurgents may conduct remote area operations in areas with little or no population to interdict infiltration routes. Counterinsurgents make maximum use of special equipment to provide continuous coverage of suspected areas and routes. Firepower and combat forces, with air assault capabilities, should be prepared to quickly attack identified targets. Because remote area operations can stress the capability of land forces to make 13 May 2014 FM 3-24/MCWP 3-33.5 7-15 Chapter 7 rapid responses, commanders can mitigate risk by coordinating with joint enablers for close air support, tactical airdrops, information collection, communications relays, and personnel recovery forces. Border Considerations 7-71. In a counterinsurgency environment, armed forces may be responsible for border security, and they may have to help other security forces with immigration, customs, and internal security operations. The specific threat level, however, may require combat-type border operations, particularly in remote areas. The threat level may require units or advisor teams to advise and assist host-nation forces assigned to prevent or interdict the infiltration of insurgent personnel and materiel across international boundaries. This method is a terrain-centric approach to combating an insurgency. The commander’s intent is to isolate insurgent forces from their external support and sanctuaries. Secondary purposes include locating and interdicting insurgent land infiltration routes, destroying insurgent forces and bases in areas adjacent to the border, and collecting and reporting information on insurgent capabilities and intentions. Border operations normally require restrictive control measures for populations and resources that are particularly annoying to tribal and ethnic border groups who do not recognize the international boundary. The host-nation government must make a continuing effort to physically and psychologically gain and maintain the loyalty of the affected population. 7-72. Designated border forces may be composed of border police and guards and may include paramilitary forces and regular armed forces with supporting or direct responsibility for portions of the national border or key internal routes to access other regions. Border operations are planned, conducted, and supervised from the national level, to the regional level, and finally through commanders at the local level. Border task forces are tailored units designed to meet requirements in their assigned areas. They should contain sufficient sustainment warfighting function and sustainment elements to support civil authorities’ operations for extended periods. 7-73. Tasks that may be performed in controlling the border include the following: Security of populated areas. Intelligence and counterintelligence operations. Operation of authorized points of entry. Refugee and internally displaced person control. Enforcement of movement and travel restrictions. Military information support operations. Reconnaissance, surveillance, and target acquisition. Attacks against insurgent forces. Destruction of insurgent base areas. Barrier and denial operations. 7-74. In a phase I insurgency, operations in border areas are normally a function of police, customs, and other government organizations. Armed and paramilitary forces may assist these organizations, particularly in remote areas. In phases II and III, denial of external support for the insurgency may require combat operations in border areas. These operations require close coordination and cooperation between the armed forces, paramilitary forces, and all government agencies involved. Attempts by insurgents to infiltrate can be mitigated through the use of biometrics to identify subversive activities and limit or disrupt insurgent mobility. (See paragraphs 4-70 through 4-75 for a discussion on the insurgency phases.) 7-75. Physically sealing a border may not be possible, since it could require the commitment of more government forces and materiel than overall resources permit. Intelligence must be gathered by all means available to determine the locations and extent of insurgent activities in border areas. 7-76. Commanders determine infiltration and exfiltration routes, support sites, frequency and volume of traffic, type of transportation, number and type of personnel, amount and type of materiel, terrain and traffic conditions, and the probable location of base areas and sanctuaries. Units conduct continuous and detailed surveillance of these areas. Since placing forces and barriers at all possible crossings or entry sites may be impossible, commanders establish priorities. Counterinsurgents use natural barriers wherever possible. Using patrols, sensors, and obstacles in selected areas increase the effectiveness of natural 7-16 FM 3-24/MCWP 3-33.5 13 May 2014 Planning and Operational Considerations barriers. Herbicides, if approved for the area of operations, may be used to enhance visibility in vegetated areas. 7-77. A restricted zone is a carefully selected area, of varied width, that is contiguous to the border. Counterinsurgents give public notice that all unauthorized individuals or groups encountered in the restricted zone will be dealt with as infiltrators or insurgents. A friendly population buffer zone is an area in which civilians living within the area of operations are limited to those believed to be loyal to the government. Persons whose loyalty cannot be established are monitored. This concept offers a good potential for establishing information nets and using loyal citizens in self-defense border units. It denies insurgents potential civilian contacts and base areas for border-crossing activities. Commanders and staffs direct a continuing military information support operation effort toward maintaining the morale and loyalty of the population. 7-78. Counterinsurgents may employ aerial reconnaissance, unattended ground sensors, and ground reconnaissance patrols to ensure adequate reconnaissance and surveillance of remote areas. Surveillance and control of extensive coastal areas normally require the use of coordinated ground patrols on the shoreline, coordinated offshore patrols, aerial surveillance, strategically located observation posts, and an effective system of licensing and identifying friendly, military, and civilian watercraft. 7-79. Commanders and staffs must consider the population of the host nation’s neighbor country. Counterinsurgent actions will be viewed and interpreted by local populations in neighboring countries. Counterinsurgents must consider the impact their actions have on these populations. If the neighboring local populations sympathize with host-nation insurgents or believe that counterinsurgent programs are counterproductive to their individual goals, then negative perceptions can lead to increased foreign fighters, weapons, and resource trafficking to support an insurgency. Counterinsurgents lack the physical means to influence this population, but they can mitigate risk by performing effective information operations that explain counterinsurgent programs and their benefits. Basing 7-80. Counterinsurgency forces operate within a host country and must have a base from which to operate. A base is a locality from which operations are projected or supported (JP 4-0). All bases must be securable and defendable. Bases vary according to the size and missions of the units occupying a base. All types of bases require clear command relationships. In counterinsurgency operations, forward operating bases and combat outposts are important. 7-81. Normally, when U.S. forces are the primary counterinsurgents, at least one forward operating base exists in an area of operations. The size of the area, its physical characteristics, and the number and size of the units operating within the area often require additional operating bases. The forward operating bases established by a brigade or battalion are often semipermanent and provide deployed units with command, control, and communications facilities; sustainment; personnel systems support; staging areas; and intelligence activities. They provide units with relatively secure locations from which to plan and prepare for operations. During counterinsurgency operations, they aid in limiting insurgent mobility nearby and in providing some security and contact to the local population. 7-82. There are a few differences between brigade and battalion forward operating bases. Brigade forward operating bases are larger than battalion forward operating bases and provide a secure location for nondeployed elements of the deployed battalions, such as battalion forward support companies. A battalion forward operating base is normally staffed with the minimum personnel needed to operate and provide security. Other assets are normally positioned in a brigade operational base. A battalion forward operating base should maintain two methods for sustainment: by road and either air or water. 7-83. A combat outpost is a reinforced observation post capable of conducting limited combat operations (FM 3-90-2). In counterinsurgency operations, combat outposts are often company and platoon-sized bases inside of insurgent influenced territory. When U.S. forces are acting as the primary counterinsurgents, combat outposts represent a cornerstone of counterinsurgency operations. Located in strategically important areas, a combat outpost provides security in its immediate area and direct contact with the local population not possible from remote bases. Although this method carries with it potential downsides in 13 May 2014 FM 3-24/MCWP 3-33.5 7-17 Chapter 7 terms of increased proportion of forces used for force protection, thus limiting combat power available, combat outposts provide an increase in security for the population. INFORMATION OPERATIONS 7-84. Information operations is the integrated employment, during military operations, of information-related capabilities in concert with other lines of operations to influence, disrupt, corrupt, or usurp the decisionmaking of adversaries and potential adversaries while protecting our own (JP 3-13). For the Army, information operations integrates information related capabilities into the overall operational approach. The joint and multinational communities continue to use the term information operations. The joint construct for conducting information operations is the information-influence relational framework. The framework describes the application, integration, and synchronization of information-related capabilities to influence, disrupt, corrupt, or usurp the decisionmaking of target audiences to create a desired effect to support achievement of an objective. An information-related capability is a tool, technique, or activity employed within a dimension of the information environment that can be used to create effects and operationally desirable conditions (JP 3-13). (See Army doctrine for more information on integrating information-related capabilities.) 7-85. A target audience is an individual or group selected for influence (JP 3-13). Information operations seek to generate effects against the decisionmaking of individuals, a group, or perhaps elements of a population. In general, the integration of information-related capabilities is most effective when employed against precisely selected targets to achieve clearly defined objectives. 7-86. Information-related capabilities generate effects that support achievement of the commander’s objectives. There are many military capabilities that contribute to operations, and commanders and staffs should consider them during the planning process. Some of these capabilities are: Soldier and key leader engagement. Civil-military operations. Cyberspace operations. Military deception. Electronic warfare. Operations security. Military information. Physical attack. Physical security. Counterintelligence. Public affairs. Combat camera. Defense support to public diplomacy. Space operations. Special technical operations. Intelligence. Joint electromagnetic spectrum operations. Information assurance. 7-87. A commander can use many other capabilities to enhance and reinforce the shaping of the area of operations and the accomplishment of mission objectives in the information environment. (See JP 3-13 for additional information on the use of information-related capabilities.) 7-88. Information-related capabilities, whether applied in shaping the operational environment to deter conflict or in enabling decisive maneuver, must be recognized as an essential enabling activity that facilitates development of an operational advantage for the commander. In current and future operational environments, the integrated employment of information-related capabilities into operations is critical to mission success. (See the Marine Corps operating concept for information operations for more information on information-related capabilities.) 7-18 FM 3-24/MCWP 3-33.5 13 May 2014 Planning and Operational Considerations 7-89. The actions of Soldiers and Marines in an area of operations are the most powerful influence on credibility of their commanders’ message. All audiences (including local, regional, and threat) compare the friendly force’s message with its actions. Consistency contributes to the success of friendly operations by building trust and credibility. Conversely, if actions and messages are inconsistent, friendly forces lose credibility. Loss of credibility makes land forces vulnerable to threat counter propaganda and information warfare and places Army and Marine forces at a disadvantage. (See FM 3-13 for more information on messaging.) 7-90. Commanders, staffs, and unified action partners construct a narrative to help understand and explain an operational environment, its problem, and solutions. Narratives are tied to actions in an operational environment. A narrative is a brief description of a commander’s story used to visualize the effects the commander wants to achieve in an information environment to support and shape an operational environment. 7-91. The key to successful information operations during an insurgency is the commander’s intent. The commander’s intent provides a focus for the coordination and synchronization of information-related capabilities. Staffs and information operations planners must balance the use of different information-related capabilities, such as civil affairs operations, physical attack, and cyberspace operations, in order to communicate the intended message to the target audience with an understanding of possible second and third order effects on the rest of the global population. 7-92. When commanders and staffs use the various types of information capabilities, there is a tension between a broad message and engaging the population to achieve a two way understanding. The U.S. is generally involved in counterinsurgencies to aid host nations. As such, commanders and staffs integrate information capabilities with the host nation’s message to tell the population the reason for U.S. involvement. Commanders and staffs have to establish relationships, seek two-way understanding, and listen to what others think. Effective counterinsurgency normally requires an effective broad message and engaging the population in a dialogue. Commanders and staffs must find the right balance between using information capabilities to give a broad message versus creating a dialogue. 7-93. Commanders and staffs balance between controlling the message and allowing for complete freedom of messaging. Having a perfectly controlled message does not allow for real, timely communication with a population. Leaders must have some ability to actually engage a population and create a shared understanding. However, if representatives of a command have total freedom of message, the population is bombarded with contradictions and inconsistencies. Commanders and staffs must find the right balance to allow real communication, but also to ensure that the command has a coherent message. 7-94. Public affairs and information operations are separate but related functions. Public affairs are those public information, command information, and community engagement activities directed toward both the external and internal publics with interest in the Department of Defense (JP 3-61). External publics include allies, neutrals, and threats. When addressing external publics, opportunities for information overlap exist between public affairs and information operations. 7-95. Information operations and public affairs personnel must maintain a common awareness of each other’s support to operations to preclude the potential for information conflict. The information operations cell provides an excellent place to coordinate and deconflict information operations and public affairs activities that could result in information fratricide. Information fratricide is the result of employing information-related capabilities in a way that causes effects in the information environment that impede the conduct of friendly operations or adversely affect friendly forces (FM 3-13). Final coordination of public affairs and information operations must occur within the operations process. 7-96. In a counterinsurgency, the insurgent often targets the U.S. population with themes and messages concerning the insurgency. There are legal and professional reasons why the armed forces cannot attempt to influence American public opinion; to do so would undermine civil control over the military. However, the military has a responsibly to provide information to the U.S. public. Transparency and truthful information allows policy decisions to be debated between decisionmakers and the public. Although providing that information during an insurgency is a responsibility of the military, trying to influence the actual debate is unethical and damages the military’s relationship with the society. 13 May 2014 FM 3-24/MCWP 3-33.5 7-19 This page intentionally left blank. Chapter 8 Intelligence 8-1. Intelligence must drive operations in a counterinsurgency. Commanders and staffs must understand the area of operations in a counterinsurgency. The insurgency in Peru demonstrates that intelligence capabilities can be integrated with information operations and integrated monetary shaping operations to successfully undermine an insurgency. The Peruvian government was eventually successful in using economic development and an information campaign to weaken the Shining Path insurgency. With the gradual development of an effective military, Peru was able to continue its success. Intelligence, resulting in the capture of the Shining Path’s leader, changed the nature of the insurgency and significantly reduced the threat of the Shining Path to Peru. Intelligence and the Shining Path Peru suffered an unprecedented economic downturn in the 1970s and 1980s. The Peruvian government, though democratic, was characteristically ineffective and unable to stem the worsening crisis. This opened the door for an insurgent organization, the Sendero Luminoso (Shining Path), and its establishment of alternative governance structures in the economically devastated Peruvian highlands. Sendero Luminoso leaders purged local officials and established their own authority in the villages, beating back control efforts by the Peruvian police. In the first few years of the insurgency, the government did not take the threat seriously. Opposition to the insurgents (such as it was) was organized by local police, and the government made no effort to improve the desperate socioeconomic conditions in the highlands or to define a clear mission for regional security forces. With its superior organization and a lack of effective response by the government, Sendero Luminoso made significant progress. Its operations and propaganda were coordinated to create the perception that the group was a “winner” and was meeting its Maoist strategic goals, in sharp contrast to the largely ineffective government. Still plagued by a lack of internal unity both in the government and in the military, the state moved forward with two competing counterinsurgency strategies: one focused on development and the other focused on ideology and military force. First proposed in 1984, the developmental approach finally got its turn in 1985. The state recognized that the highlands were particularly hard hit by the economic crisis and were the heartland of the insurgency, so its goal was to increase development and job opportunities in these regions. Public investment in Ayacucho (a region in the southern highlands) quadrupled between 1985 and 1986. Unfortunately, the insurgents actively resisted this development, or co-opted it, forcing government teachers to include Sendero Luminoso materials in their curricula. The government did not provide the security necessary for development to have any effect. Subsequent to 1986, development funding fell off, and embezzlement became common. As a result, this initial push of development and investment fell far short of meeting the needs of the economically disadvantaged population in the highlands. The election of Alberto Fujimori in June 1990 raised new hopes of resolving the conflicts within the government and making greater headway against the insurgents. Fujimori promised a better human rights record and a new commitment to development. In addition to renewed government legitimacy, the Fujimori administration also brought two significant improvements to Peru’s approach to counterinsurgency: first, the use of the police and the national intelligence service to track the movements of Sendero Luminoso sympathizers and attempt to infiltrate the group and, second, the arming of rondas, peasant civil-defense militias. These 13 May 2014 FM 3-24/MCWP 3-33.5 8-1 Chapter 8 rondas were possible only because the insurgents’ treatment of villagers in its areas of operation had become so harsh that the locals were finally pushed to stand up for themselves. Improved intelligence and an end to internal divisions within the military allowed effective engagement of insurgent forces and effective (and rapid) support to threatened rondas. For the first time in the conflict, the government, police, and military made effective use of what would now be called strategic communication, with a greater emphasis on government credibility, consistency between actions and messages, and significant efforts to woo the population in the highlands away from the insurgents (efforts of which the rondas were an integral part). In 1992 good intelligence led to Abimael Guzmán’s (the leader of Sendro Luminoso) capture. The capture of Guzman changed the ongoing insurgency and significantly undermined insurgent efforts. At the time of his capture, the police seized Guzmán's computer, in which they found a very detailed roster of his armed forces and the weapons each formation had in each region of the country. His authoritarian management of Sendero Luminoso had proven very effective when he was at large, but when he was captured, it provided a wealth of information. This information was used for further operations. INTELLIGENCE FUNDAMENTALS 8-2. Intelligence is the product resulting from the collection, processing, integration, evaluation, analysis, and interpretation of available information concerning foreign nations, hostile or potentially hostile forces or elements, or areas of actual or potential operations (JP 2-0). Intelligence can be broken down into seven disciplines, and it is an enabler of any counterinsurgency effort. Each discipline provides a means for the counterinsurgent to gain a higher level of situational understanding. These disciplines include counterintelligence, human intelligence, geospatial intelligence, measurement and signature intelligence, open-source intelligence, signals intelligence, and technical intelligence. The intelligence disciplines are integrated to ensure a multi-disciplined approach to intelligence analysis. Ultimately all-source intelligence facilitates situational understanding and supports decisionmaking. All intelligence disciplines are important in counterinsurgency. However, this chapter will focus on elements of intelligence that have unique considerations in counterinsurgency. (See ADRP 2-0 for more information on intelligence.) 8-3. An essential part of understanding the operational environment is the process of intelligence preparation of the battlefield/battlespace. Intelligence preparation of the battlefield/battlespace is a systematic process of analyzing and visualizing the portions of the mission variables of threat/adversary, terrain, weather, and civil considerations in a specific area of interest and for a specific mission. By applying intelligence preparation of the battlefield/battlespace, commanders gain the information necessary to selectively apply and maximize operational effectiveness at critical points in time and space (FM 2-01.3/MCRP 2-3A). (See FM 2-01.3/MCRP 2-3A for more information on intelligence preparation of the battlefield/battlespace.) In a counterinsurgency environment, intelligence preparation of the battlefield/battlespace must take into account operational environment considerations. (See chapter 2 for considerations about the operational environment and chapter 4 for considerations on analyzing an insurgency.) 8-4. Culture is an element of the operational environment and, like the physical terrain, creates both opportunities and challenges for Soldiers and Marines. A nation’s culture is a set of complex, ever-changing, and interconnected social, historical, political, and environmental factors that shape the perceptions, motives, and behaviors of its population. Cultural intelligence is the analysis and understanding of groups of people and the reasons they do certain things. Cultural intelligence includes gaining an understanding of the mindset of a local population to support the commander’s decisionmaking and help drive operations. (See chapter 3 for more information on culture.) 8-5. The counterinsurgency force must understand the cultural foundations of the operational environment in order to transform seemingly random and irrational activity into describable and semipredictable acts. Commanders and staffs must devote as much effort to understand the local population being supported as they do to understand the insurgents. Cultural intelligence requires historical perspective as well as collection and analysis of current information, because cultures and cultural factors are 8-2 FM 3-24/MCWP 3-33.5 13 May 2014 Intelligence consistently shifting. Periods of warfare, instability, and natural disasters increase the rate of cultural change within a society. 8-6. Also, cyberspace is an essential domain for the gathering of intelligence in a counterinsurgency. Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers (JP 1-02). The commander and senior intelligence officer must be highly aware of the intelligence oversight implications of collecting against United States (U.S.) persons, as the distinction of citizenship is difficult to assess in cyberspace. The distinction is required because intelligence collection is enabled by and must comply with all applicable U.S. laws and policy. However, cyberspace is used by insurgents and cannot be ignored by counterinsurgents. Cyberspace and the technologies that enable it allow people of every nationality, race, faith, and point of view to communicate, cooperate, and prosper like never before. Some adversaries clearly understand the power of cyberspace. Terrorists employ the Internet for recruiting, training, motivating, and synchronizing their followers. Adversaries frequently operate in cyberspace unrestrained, and they exploit its potential. To be effective in defeating an insurgency, commanders and staffs must gather intelligence on how an insurgency is using cyberspace. ALL-SOURCE INTELLIGENCE 8-7. The Army defines all-source intelligence as the integration of intelligence and information from all relevant sources to analyze situations or conditions that impact operations. (See ADRP 2-0.) The joint force defines all-source intelligence as intelligence products and/or organizations and activities that incorporate all sources of information in the production of finished intelligence (JP 2-0). All-source intelligence is used to develop the intelligence products necessary to aid situational understanding, support the development of plans and orders, and answer information requirements. Although all-source intelligence normally takes longer to produce, it is more reliable and less susceptible to deception than single-source intelligence. Intelligence organizations fuse data and information into all-source intelligence products to support counterinsurgency operations. Analysis for counterinsurgency operations is challenging, due in part to the— Need to understand perceptions and culture. Need to track hundreds or thousands of personalities. Local nature of insurgencies. Tendency of insurgencies to change over relatively short periods of time. 8-8. Commanders and staffs need data to analyze and synthesize insurgent activities and personalities. Intelligence staffs should create a common searchable combatant command database of insurgent actions and personnel, and another database(s) that provides discoverable, accessible, and retrievable data on insurgent actions and personnel, and provide similar access to all intelligence reporting. This data should be accessible by analysts both in and out of the theater as well as conventional, special operations forces, and multinational units. 8-9. Because all echelons collect and use intelligence, all staffs are heavily involved in analysis. Units are simultaneously intelligence producers and consumers. Intelligence capabilities are normally greater at higher echelons of command. For example, battalion staffs have fewer personnel than brigade staffs to collect patrol debriefs, analyze incoming information from multiple sources, produce finished intelligence products, and disseminate products to appropriate consumers. In many cases, brigade intelligence sections may be inadequately staffed to handle the vast amounts of information necessary to conduct operations in a counterinsurgency environment. 8-10. Counterinsurgency requirements may require pushing analysts to battalion and brigade staffs to give those echelons the required analytical support. Often analysts can be beneficial at the company level. In these cases, developing company intelligence support teams may be useful. Many maneuver company commanders organize small intelligence support teams from within their units to provide tailored intelligence products to the company leadership. They may receive augmentation from the brigade military intelligence company or other intelligence Soldiers and Marines to form the nucleus of a company intelligence support team. The company intelligence support team combines information gained from 13 May 2014 FM 3-24/MCWP 3-33.5 8-3 Chapter 8 company operations with intelligence received from adjacent and higher units. The team analyzes and reports information collected by the company while receiving, parsing, and reporting intelligence collected by other organizations. The battalion intelligence cell is responsible for integrating the various company reports into intelligence products. This is particularly useful when a maneuver company must collect large amounts of information on the local population and insurgents. A company intelligence support team can help focus collection, process information collected, and develop a common operational picture of an area of operations. Pushing analysts to brigades and lower echelons places analysts closer to collectors, improves the common operational picture, and helps higher echelon staffs receive answers to the commander’s priority intelligence requirements. Commanders may need to be creative in developing analytical capabilities within their units. Though it is not ideal, commanders can assign non-intelligence personnel to work in the intelligence section. (See TC 2-19.63 for more information on company intelligence support teams). 8-11. In a counterinsurgency, a bottom-up flow of intelligence is important. Battalions and brigades develop intelligence for their area of operations. Higher echelons fuse it into intelligence of the insurgency throughout the combatant command. Higher echelons can also integrate the human intelligence that battalions and brigades receive with the other intelligence disciplines. Comprehensive insurgency analysis focuses on the people in the area of operations. It develops information about relationships among them and the ideas and beliefs driving their actions. Comprehensive insurgency analysis brings together all other forms of analysis. FUSION CENTERS 8-12. A fusion center is an ad hoc collaborative effort between several units, organizations, or agencies that provides resources, expertise, information, and intelligence to a center with the goal of supporting the rapid execution of operations by contributing members. Fusion centers are primarily designed to focus collection and promote information sharing across multiple participants within a specific geographic area or mission type. These centers are not operations centers. Commanders at various echelons create fusion centers to manage the flow of information and intelligence, focus information collection to satisfy information requirements, and to process, exploit, analyze, and disseminate the resulting collection. Fusion centers are most effective if they have participation from all the key elements in an area of operations and representatives from all the warfighting functions. When possible, fusion centers include unified action partners. The intelligence portion of a fusion center typically comprises intelligence representatives from different tactical echelons, interagency partners, multinational organizations, host-nation organizations, and nongovernmental organizations (NGOs) operating in the area of operations. (See ADRP 2-0 for more information on fusion centers.) 8-13. In a counterinsurgency, commanders and staffs must create shared situational understanding. Fusion cells are important in creating this understanding. The mixture of personnel and expertise allows for the integration of information and analysis. This is an effective means of understanding the operational environment from multiple perspectives. Fusion cells aid in understanding intelligence and informing operations to avoid unintended consequences. HUMAN INTELLIGENCE 8-14. Human intelligence is the collection by a trained human intelligence collector of foreign information from people and multimedia to identify elements, intentions, composition, strength, dispositions, tactics, equipment, and capabilities (FM 2-22.3). For the joint force, human intelligence is defined as a category of intelligence derived from information collected and provided by human sources (JP 2-0). Because insurgency and counterinsurgency are struggles for legitimacy, human intelligence plays a vital role in determining legitimacy. Human intelligence uses human sources for information collection and uses a variety of collection methods, both passive and active, to collect information to meet intelligence requirements and inform other intelligence disciplines. Interrogation is one of the human intelligence tasks, along with screening, debriefing, liaison, and conducting controlled source operations in support of Army operations. During counterinsurgency operations, a great deal of intelligence is based on information gathered from people. However, military source intelligence operations are only conducted by human intelligence collectors. A human intelligence collector is a person who is trained to collect information 8-4 FM 3-24/MCWP 3-33.5 13 May 2014 Intelligence from individuals for the purpose of answering requirements. (See FM 2-22.3 for more information on human intelligence.) 8-15. Operational reporting may have information of intelligence value that originates from a local population. People may approach Soldiers and Marines during the course of their day-to-day operations and offer information. Soldiers and Marines record information and report it to the intelligence section. This allows for verification of information and establishes a means for human intelligence collectors to contact individuals offering information of value. 8-16. People offering information on insurgents are often in danger as insurgents continuously try to defeat collection operations. Commanders ensure that the appropriate personnel are trained in handling human sources in accordance with Army, Marine Corps, and Department of Defense (DOD) standards and policies. Human intelligence collectors are trained in procedures that limit risks to sources and handlers. Counterinsurgents should not expect people to willingly provide information if insurgents have the ability to violently intimidate sources. Human intelligence reporting increases if counterinsurgents protect the population from insurgents and people begin to believe the insurgency is defeated. 8-17. People often provide inaccurate and conflicting information to counterinsurgents. They may spread rumors or provide inaccurate information for their own reasons. For example, people may give inaccurate information to settle tribal, ethnic, or business disputes. The accuracy of information obtained by Soldiers and Marines is verified before using it to support operations. This means that information reported to patrols should be verified with all-source intelligence. Improved accuracy will come from collecting intelligence from the whole population. Information must be seen as part of a whole picture and parts or segments of information cannot override the whole picture. An important part of gaining access from the whole population is gaining access to restricted populations. These populations often include women, but they can include any element that the counterinsurgent cannot access because of cultural considerations. Restricted access teams may be helpful in ensuring that information is attained from the whole population, including women. COUNTERINTELLIGENCE 8-18. Counterintelligence also uses human sources to assist in collection of information on foreign intelligence, international terrorist, or insider threat activities that may threaten the counterinsurgency. Counterintelligence efforts may be directed toward assisting commanders in detecting and neutralizing the insider threat by ensuring that counterinsurgency operations are not compromised by adversaries operating inside a base. Counterintelligence operations, including the use of humans as sources, must be accomplished by trained counterintelligence special agents. INFORMATION COLLECTION AND INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE 8-19. Information collection is an activity that synchronizes and integrates the planning and employment of sensors and assets as well as the processing, exploitation, and dissemination of systems in direct support of current and future operations. The deputy chief of staff, (G-2 [S-2]) and assistant chief of staff, operations (G-3 [S-3]) staffs collaborate to collect, process, and analyze information the commander requires concerning threats, terrain and weather, and civil considerations that affect operations. The information collection tasks are— Plan requirements and assess collection. Task and direct collection. Execute collection. (See FM 3-55 for more information on information collection and planning requirements and assessing collection.) 8-20. Intelligence, surveillance, and reconnaissance provides commanders with detailed and timely intelligence. This intelligence helps commanders gain situational understanding of a threat and an operational environment. This is accomplished by answering requirements focused in time and space and identifying any threats to mission accomplishment. The intelligence staff provides commanders with predictive assessments of threats, terrain and weather, and civil considerations. These assessments also 13 May 2014 FM 3-24/MCWP 3-33.5 8-5 Chapter 8 provide commanders with a running estimate regarding the degree of confidence the staff places in each analytic assessment. A running estimate is the continuous assessment of the current situation used to determine if the current operation is proceeding according to the commander’s intent and if planned future operations are supportable (ADP 5-0). INTELLIGENCE-RELATED CAPABILITIES 8-21. Commanders and staffs consider several capabilities for intelligence in a counterinsurgency. They include— Biometrics and biometric-enabled intelligence. Forensics and forensic-enabled intelligence. Site exploitation. Biometric-Enabled Intelligence 8-22. Understanding biometrics-enabled intelligence requires knowledge of biometrics and its contribution to Army and Marine Corps missions. The term biometric describes both a characteristic (biometric) and a process (biometrics): A biometric is a measurable physical characteristic or personal behavior trait used to recognize the identity or verify the claimed identity of an individual. Biometrics is the process of recognizing an individual based on measurable anatomical, physiological, and behavioral characteristics (JP 2-0). 8-23. The Army and Marine Corps employ automated biometric systems to deny threat forces any freedom of movement within the population and to positively identify known threats, threat forces, friendly populations, local nationals, and third-country nationals throughout their areas of operation to separate insurgents and foreign fighters from the general population. Biometric systems collect biometric data, such as iris images, fingerprints, and facial images, and combine them with contextual and biographic data to produce an electronic dossier on an individual. Automated biometric systems may support the following tasks: Positively identify high-value targets. Screen and badge personnel. Manage the population. Perform force protection (local access). Conduct detention operations. 8-24. Biometrics are important assets in any counterinsurgency operation. These tools allow the counterinsurgent to gain both civil security and control. Through positive identification, biometrics allow the counterinsurgent to effectively execute offensive operations against the insurgency while at the same time protecting the civilian population by not detaining innocent civilians. If used correctly, biometrics allow the counterinsurgent to effectively execute offensive operations against the insurgency and protect the population. Moreover, the host nation can be enabled with these capabilities. Biometric abilities can be essential in building legitimacy among the population. (For more information on biometrics, see FM 2-22.3, ATTP 2-91.6, TC 2-33.4, and TC 2-22.82.) Forensic-Enabled Intelligence 8-25. Although not an intelligence discipline, police intelligence operations can support the overall intelligence effort through the analysis, production, and dissemination of information collected from police activities. Information gathered from military police operations may contribute to a commander’s critical information requirement and focusing police forces on maintaining order. Criminal acts such as robberies, kidnappings, terrorism, and extortion may be linked to insurgent psychological or money-gathering activities. Police information, police intelligence, and criminal intelligence are subtasks of police intelligence operations. (See ATTP 3-39.20 for additional information on law enforcement.) 8-6 FM 3-24/MCWP 3-33.5 13 May 2014 Intelligence 8-26. Forensics involves methodically gathering and analyzing evidence to establish facts that can be presented in a legal proceeding. It applies multidisciplinary scientific processes to establish facts. Forensics operations, to include site and document exploitation, further aid the positive identification efforts of a counterinsurgent and help to separate insurgents from the general population, thus contributing to overall situational understanding. Commanders and staffs should make every effort to operate within status of forces agreements and combatant command requirements. (See ATTP 2-91.6 for more information on forensics.) 8-27. For example, latent fingerprints discovered on pieces of improvised explosive devices provide critical information that analysts need to link individuals, insurgent organizations, their capabilities, and their activities. Forensics that includes site exploitation and forensic documents is of great benefit to substantiating information if detainees are insurgents. The methods of forensics allow the counterinsurgent to work towards situational understanding. Site Exploitation 8-28. Site exploitation is a series of activities to recognize, collect, process, preserve, and analyze information, personnel, and/or materiel found during the conduct of operations (JP 3-31). When countering an insurgency, site exploitation of an insurgent location is essential. Computers, cell phones, and other means of communication and storing information are vital to understanding the insurgent structure. 8-29. Site exploitation uses the full range of resources at the commander’s disposal, starting with the Soldier’s basic cognitive skills to sophisticated analytical processes conducted by joint, interagency, and intergovernmental organizations. Exploitation operations provide answers to the commander’s information requirements regardless of whether the information was gained by a squad on patrol or through external sensor platform outputs. 8-30. Site exploitation may require additional technical expertise not resident within the theater to process the collected information, material, and personnel to maintain their unique physical or forensic attributes. Detailed technical exploitation of collected items can divulge actionable information or intelligence that can be used to positively identify any unique threat characteristics or threat networks for follow-on actions. 8-31. Knowledge management enables the effective dissemination of actionable information and intelligence to units for their integration into the intelligence, targeting, and operations processes. This facilitates follow-on operations and enhances commanders’ and staffs’understanding. 13 May 2014 FM 3-24/MCWP 3-33.5 8-7 This page intentionally left blank. Chapter 9 Direct Methods for Countering Insurgencies 9-1. The direct method of using United States (U.S.) land, maritime, and air forces in a decisive action role is resource intensive when done on a large scale, but it is often necessary to fully support a counterinsurgency effort. A direct method may be used, for example, when the success of a host nation’s counterinsurgency efforts is critical to U.S. interests. The U.S. can use a direct method after or during a major conflict or when U.S. interests necessitate stability in a failed or failing state. Leaders can also integrate land forces into a host nation’s ongoing effort. Unfortunately, unintended consequences, such as increased tensions among segments of society or resistance to U.S. involvement, often accompany a direct approach. Leaders must carefully plan and execute operations before and during a direct response to avoid negative consequences. However, using direct capabilities remains a valid option and an important capability that the Army and Marine Corps provide the joint force. 9-2. The level of direct U.S. involvement can vary. In many cases, a host nation will be fully capable of providing security for its population. However, integration of fires or a direct action force could enable a host nation’s counterinsurgency efforts. The Army and Marine Corps bring many capabilities that can be integrated into a counterinsurgency effort. When counterinsurgents consider direct involvement, they should consider a wide spectrum of activities that range from a modest force conducting limited missions to a large force that could be, at least for a time, the primary counterinsurgency force. 9-3. The U.S. has a wide range of capabilities that it can use to create many different operational approaches to counter an insurgency. Direct involvement by U.S. forces can take place along a spectrum, from little direct U.S. involvement to U.S. forces acting as the primary counterinsurgents. If U.S. forces are acting temporarily as the primary counterinsurgents, the shape-clear-hold-build-transition framework forms a tactical and operational background for battalion and brigade operations. While the shape-clear-holdbuild-transition framework must be enabled with other capabilities, such as security force assistance, the shape-clear-hold-build-transition framework provides a framework for how Army and Marine forces will defeat an insurgency at the tactical level. Moreover, this tactical background also creates a frame of reference for understanding actions by the host nation to defeat an insurgency. This understanding is essential in integrating U.S. capabilities into a host-nation effort. 9-4. Counterinsurgents should not think that all counterinsurgencies end the same way. The shape-clearhold-build-transition framework provides a good framework for a protracted struggle. Counterinsurgencies are conducted using a wide range of different approaches. For example, the insurgency in Sri Lanka was fought using conventional tactics and ended in a traditional offensive operation. It ended in something that looked much more like a conventional offensive operation then an application of the shape-clear-holdbuild-transition framework. In some cases, the government or insurgents can impose their impose their will and control the population. While counterinsurgents should remember that specific insurgencies are unique, for many insurgencies, the shape-clear-hold-build-transition framework is a starting point for understanding host-nation actions and then enabling those actions. SHAPE-CLEAR-HOLD-BUILD-TRANSITION FRAMEWORK 9-5. For a tactical and operational ground commander acting as the primary counterinsurgent commander, the shape-clear-hold-build-transition framework provides a foundation for detailed planning. Moreover, the shape-clear-hold-build-transition framework is well-suited to those commanders and staffs engaged in training, advising, or integrating capabilities into a host-nation effort. If a host nation is performing operations, whatever the U.S. role in the counterinsurgency, Soldiers and Marines must have a framework for understanding that host nation’s actions. Commanders and staffs cannot evaluate, advise, or train another force unless they have a base of knowledge on the operations being conducted. In many counterinsurgency efforts, a state will try to defeat insurgencies by performing a general operational 13 May 2014 FM 3-24/MCWP 3-33.5 9-1 Chapter 9 approach that is similar to the shape-clear-hold-build-transition framework at the tactical level. While this is certainly not a uniform rule, having some framework in understanding another counterinsurgent’s actions provides a point of reference for understanding. Commanders and staffs must have an understanding of how to solve a particular problem before they advise or assist another commander solve that problem. Understanding the shape-clear-hold-build-transition framework is a fundamental framework for understanding what units are trying to accomplish in a counterinsurgency. This framework applies to all units involved in the counterinsurgency, including, for example, an infantry battalion directly performing actions, a member of a special forces team advising a host nation, or a member of a combatant command integrating and evaluating various security cooperation capabilities. 9-6. Whether U.S. forces are executing the shape-clear-hold-build-transition framework or another state is executing it, it can be very effective in defeating an insurgency. For example, in the Philippines, the government was successful in using the shape-clear-hold-build-transition framework, even if it was not called shape-clear-hold-build-transition by the counterinsurgents at the time. Commanders and staffs must understand the shape-clear-hold-build-transition framework to understand what a host nation is trying to achieve in its counterinsurgency efforts. This framework is used by U.S. and foreign forces. Shape-Clear-Hold-Build-Transition: The Huks The Hukbalahap, or “Huks,” were one of several guerilla organizations that appeared in the Philippines during the Japanese occupation of World War II. By the time of the country’s liberation from the Japanese occupation, the Huks were well-armed with weapons taken from the Japanese or shipped to them from the U.S. The Philippines gained independence from the U.S. on July 4, 1946, and held its first national election in November 1946. The Huks participated in the elections, and the head of the wartime Huk movement, Luis Taruc, won a seat in the Philippine Congress. However, the newly elected President, Manuel Roxas, refused to seat Mr. Taruc or his allies in Congress, leading many Filipino peasants to join the Huk movement. By late 1946, there was open fighting between the Huks and the forces of the newly independent Republic of the Philippines. The insurgency was motivated by vast economic inequality during the country’s transition to an export-led capitalist economy, with abject poverty affecting 90 percent of the population. The Huks’ primary tactics in the beginning of the conflict included bank, payroll office, and train robberies, as well as small hit-and-run raids and ambushes that allowed them to avoid contact with large government formations. During these first few years, the Huks numbered 5,000 active insurgents, 10,000 lightly armed reserves, and 35,000 other supporters. The Huks also enjoyed incredible levels of internal support, with an estimated 250,000 peasants actively supporting them during the early years of the insurgency. The counterinsurgency force was unable to control the insurgency in the early years. Shortly after the country was granted independence, the Philippine Army was reduced from 132,000 to 37,000 men. Approximately 24,000 of these men were in the Military Police Command, which was tasked with combating the insurgency. However, the Military Police Command was poorly led and poorly equipped, and pursued tactics that accomplished little beyond alienating the population between 1946 and 1948. In 1948, President Roxas reorganized the Military Police Command into the Philippine Constabulary, which remained neither well-trained nor well-equipped. It mainly practiced encirclement and sweeps, both of which were easily evaded by the Huks, and systematically committed abuses against civilians: raiding villages, stealing possessions, and treating the population worse than the Huks did. The Huks then began making strategic and operational errors, failing to reach out to other disaffected groups to form a broad front, and employing many common criminals in their ranks, causing peasants to fear the group. Probably most catastrophic to the group’s public image was the assassination of Mrs. Aurora Quezon, the well-liked and popular wife of the late former President, Manuel Quezon. 9-2 FM 3-24/MCWP 3-33.5 13 May 2014 Direct Methods for Countering Insurgencies As a result of Mrs. Quezon’s murder, President Quirino appointed then-Congressman Ramon Magsaysay as Secretary of Defense in 1950. After this, the Huk Rebellion became a good example of successful shape-clear-hold operations, with Magsaysay immediately instituting a shape-clear-hold approach. Shaping operations focused on efforts to win popular support for the counterinsurgency effort in preparation for future operations to clear insurgent areas. These operations included putting a stop to the abuses of civilians by the Constabulary and Army, firing many high-level military officers, placing the Constabulary under Magsaysay’s personal control, suppressing troop brutality towards the population, and increasing pay for enlisted troops to remove their incentives for looting. They also involved the establishment of a civil affairs office through which troops became involved in civic action projects (including digging wells and building bridges) and the Army’s provision of medical assistance to villagers. Additionally, Magsaysay pursued a population engagement strategy, even going so far as to set up a telegraph system that provided a direct line to the Defense Ministry for any villager on Luzon to use. 9-7. The shape-clear-hold-build-transition framework describes an operational approach that moves through each of its phases to destroy insurgent capacity and empower host-nation capacity. The phases of this method are not mutually exclusive, but the phases represent a general progression of operations. The shape phase refers to making changes to the environment, through information operations or other methods, that create the conditions for success of the other phases. The population needs to understand that there will be an increase in security and initially local leaders should be contacted. The clear phase is an effort to remove the open insurgent presence in an area. The hold phase is defined by providing security for the population in an area so an open insurgent presence cannot return. The build phase entails efforts to increase security and governmental capacity so that government and local forces can control the area and prevent the return of insurgents. The transition phase is the transition of security to local and government forces. 9-8. The commitment of resources, to include time, troops, money, development programs, and other enablers depends entirely on the capacity of the insurgency, the capacity of the host nation’s institutions, the capacity of the host nation’s security forces, and the capacity of the host nation’s population. The capacity requirement for the external counterinsurgent is that capacity which overcomes the capacity differential between the insurgents and the host nation’s systems. As the framework is predicated on the conditions on the ground, the shape-clear-hold-build-transition framework is based on understanding areas of operation and understanding the comprehensive threat. To transition between the clear, the hold, and the build, a unit must be able to measure the conditions on the ground and how those conditions are achieving the commander’s end state. This ties the shape-clear-hold-build-transition framework to assessments. 9-9. The shape-clear-hold-build-transition framework can be used as a method for constructing specific tactical operations, planning short-range operations for a specific area, or developing a mid- to long-range operational framework for a unit’s plan for countering an insurgency. The shape-clear-hold-build-transition framework can be used as a campaign framework, guiding planning from the introduction of foreign forces to conflict resolution. It can be used as campaign design to be executed by multiple units on a rotational basis. The imperatives, structure, considerations, and conditions listed here apply no matter how the shape-clear-hold-build-transition framework is applied. 9-10. Counterinsurgents must be aware that the shape-clear-hold-build-transition framework is not a phase by phase linear process. The phase that a unit performs is determined by the environment in an area of operations and each area must be assessed. Different villages, cities, or regions can be in varying degrees of insurgent control to host-nation control. Moreover, different areas in one city or different towns in one region might be along a spectrum of insurgent to host-nation control. Areas can reverse progress during a counterinsurgency. While the shape-clear-hold-build-transition framework can be a phased operation in each area, the environment must dictate its progress. The counterinsurgent uses the framework as the way to synchronize subordinate unit actions, prioritize efforts, allocate resources, and direct specific effects to achieve end state criteria in an ever-changing environment. The overall objective of using the shape-clearhold-build-transition framework is to transition responsibility for countering the insurgency to the host 13 May 2014 FM 3-24/MCWP 3-33.5 9-3 Chapter 9 nation’s institutions. The commander must understand that conditions associated with the clear, the hold, and the build phases may be present at any time in different areas. U.S. ground forces can expect to carry out a range of tasks simultaneously in varying combinations and varying intensity throughout the entirety of shape-clear-hold-build-transition framework. 9-11. The shape-clear-hold-build-transition method has imperatives that help counterinsurgents turn the method from theory into practical application. The imperatives are— The conditions are assessed across several variables and cannot be taken in isolation. The phase that the environment is in dictates the decisive operation, priorities, and resourcing. In the clear, hold, and build phases, counterinsurgents must simultaneously conduct offensive, defensive, and stability tasks. Each area requires its own assessment and assessments change over time. The shape-clear-hold-build-transition framework is not a straightforward path, as the operational environment can change and cause the counterinsurgent to lose progress. However, the methodology is meant to be progressive. Improving conditions in the environment allows for progression from one phase to the next. In essence, the operational framework is determined by the operational environment. Changes in the capacity of any element in the environment can change the conditions on the ground and, therefore, change the priorities and actions of the counterinsurgent, including the host-nation forces. The shape-clear-hold-build-transition framework is only reactive if the unit on the ground responds to conditions. The framework can be proactive if the counterinsurgents dictate the conditions they want to establish and provide the resources and emphasis necessary to achieve them. Although an area is in a certain phase, this does not preclude operations associated with other phases. For example, although a unit is in the build phase, that does not preclude that unit from performing offensive operations against underground cells. 9-12. Executing operations in the shape-clear-hold-build-transition framework requires counterinsurgents to continually address the root causes of the insurgency. Actions taken in the clear, hold, and build phases are not executed in isolation. Instead, elements of each phase must be conducted simultaneously. The shape-clear-hold-build-transition framework does not require phasing or stages of operations, but a commander may create phases or stages of operations corresponding generally to shape-clear-hold-buildtransition phases in order to synchronize actions and priorities effectively. 9-13. The shape-clear-hold-build-transition framework is driven by the conditions in an area of operations. To facilitate discussion of these conditions, figure 9-1 depicts the generic spectrum of counterinsurgency conflict. The graph portrays the relationship of capacity between insurgents, the host-nation government, the host-nation security forces, the host-nation population, and external counterinsurgents. Capacity represents the ability to change the conditions in the environment towards insurgents or counterinsurgents. As counterinsurgents are able to impact these conditions, the capability spectrum changes. The left hand side of the graph depicts the worst-case scenario in which insurgents possess increased capacity compared to the host nation. The right hand side of the graph depicts the best-case scenario in which the host-nation capacity is sufficient to counter the insurgent capability without assistance from external counterinsurgents. The shape-clear-hold-build-transition framework describes the process counterinsurgents take to progress from the left of the graph to the right. (See figure 9-1.) 9-4 FM 3-24/MCWP 3-33.5 13 May 2014 Direct Methods for Countering Insurgencies Figure 9-1. The capability spectrum of counterinsurgency conflict 9-14. As part of developing understanding, counterinsurgents must identify the conditions that exist in particular regions that lead to instability or allow the insurgency to impact the environment. Commanders must decide where to focus actions and priorities to impact the conditions in a designated area for tactical or operational reasons. In many instances, commanders specify a preparation phase or shape phase of the shape-clear-hold-build-transition framework which clarifies the period of time, series of tasks, and effects to be achieved before counterinsurgents begin taking deliberate action against insurgents. Whether phasing is used or not, preparation of the environment is an absolute requirement to achieve conditions to progress along the shape-clear-hold-build-transition framework. SHAPE 9-15. Shaping operations involve identifying which areas in an operational environment exhibit conditions that counterinsurgents can impact to change the capability differential between insurgents and counterinsurgents. Commanders choose where to execute operations in the shape-clear-hold-buildtransition framework based on a host nation’s ability (and unified action partners’ abilities if the host nation’s capabilities are still being built) to impact the root causes of the insurgency, alter or eliminate the conditions which allow the insurgency to exist in that area, or isolate the insurgents from the population. During preparation, commanders and staffs execute include information collection on the components of an insurgency. An initial census in towns or cities using biometrics data collection devices is the most effective tool to establish initial accountability for everyone. Additional information collection includes the specific root cause or causes in the particular area, the expectations of the host-nation population, and the capability of host-nation institutions such as government, security, and rule of law. Commanders and staffs conduct disruption operations to impact an insurgency’s ability to influence an operational environment. Counterinsurgents may conduct deception operations while preparing for shape-clear-hold-build-transition framework operations to force the insurgency to alter its course of action. While preparing to execute the shape-clear-hold-build-transition framework, counterinsurgents (and whenever possible the unified action and host-nation partners) conduct information operations. Counterinsurgents conduct information operations aimed at the insurgency, the insurgency’s support mechanisms (both internal and external to the country), the host-nation population, and host-nation institutions such as governance and security functions. 9-16. U.S. ground forces do not prepare for the shape-clear-hold-build-transition framework in isolation. Elements of the unified action partners are essential in shaping the area, the population, and the insurgency for future operations. In some instances, the area indicated for shape-clear-hold-build-transition framework operations may not be suitable for some partners to directly operate in, but other unified action partners 13 May 2014 FM 3-24/MCWP 3-33.5 9-5 Chapter 9 may have the capability to shape the environment in areas of limited access. U.S. special operations forces (SOF) can conduct reconnaissance, information collection, and precision targeting. The United States Agency for International Development has the capability to introduce implementing partners who have access to initiate governance or development programs. The Department of State has the ability to influence the diplomatic process to generate initial governmental structures prior to the introduction of U.S. ground forces. Soldiers and Marines must recognize the potential that unified action partners have in shaping an operational environment prior to shape-clear-hold-build-transition framework operations. CLEAR 9-17. Once counterinsurgents have effectively shaped the environment, including host-nation partners and enablers, and prepared all elements of the unified action partners appropriately, decided on where to focus the counterinsurgent effort, and has developed the plan to progress through to transition to host-nation responsibility, the force begins executing tasks associated with clear. Clear is as a tactical mission task that requires the commander to remove all enemy forces and eliminate organized resistance within an assigned area (FM 3-90-1). When used in this context, the term clear is considered the desired effect by U.S. ground forces: to eliminate the insurgency’s combatants to enable the host nation to develop the capability to address the insurgency’s root cause and eliminate the conditions that allow it to exist. While attempting to achieve the clear, the insurgency’s underground and auxiliary elements probably remain in the area of operations. While the counterinsurgent can target them along with the insurgency’s combatants, it is unlikely that the counterinsurgent will be successful in removing all of the underground or auxiliary elements. 9-18. During the clear phase, counterinsurgents should be actively securing the population. Counterinsurgents must displace insurgents and enable basic governmental functions in their area. Moreover, the population must have the confidence that counterinsurgents will remain and insurgents will not control the area. During this period, the population may face intimidation, threats, and assassinations from insurgent forces. To gain legitimacy during this period, counterinsurgents must focus on securing the population. 9-19. Operations and tasks associated with achieving the clear begin by controlling access to an area and then by controlling key points within that area. Security and influence can then spread out from this area. Commanders and staffs should consider the following points for operations in the clear: Create a secure physical and psychological environment. Provide continuous security for the local populace. Eliminate the insurgent combatants. Reinforce culturally appropriate political primacy within the context of host-nation systems. Enforce the rule of law. 9-20. Security tasks associated with the clear include— Implement the provisions of a cease fire and control, capture, and disarm belligerents. Provide territorial security until the host-nation national army can defend itself. Protect the population—provide immediate law and order and humanitarian assistance. Protect key individuals and sites—civilian government agencies, infrastructure, and institutions. 9-21. During the clear, counterinsurgents must execute offensive, defensive, and stability tasks. Offensive operations are the priority for counterinsurgents. In most cases, the measure of effectiveness (MOE) associated directly with impacting the insurgency’s combatants (for example, isolate insurgents from the population) is the decisive operation. Offensive operations conducted during the clear include raid, deliberate attack, cordon and search, seize key terrain, and movement to contact. Counterinsurgents execute defensive operations as well, to include block access routes, establish and secure combat outposts, conduct sniper operations, and secure the population. To set the conditions to progress through the framework, counterinsurgents must execute stability tasks and operations at this point. Stability tasks include identifying potential government or security leaders, identifying civic capacity requirements from the population, establishing a local security force (in the context of host-nation systems) and beginning a training program (if necessary), and identifying the root causes for that area. Throughout these operations, 9-6 FM 3-24/MCWP 3-33.5 13 May 2014 Direct Methods for Countering Insurgencies the commander must consider securing the population and building host-nation capability. Actions taken while achieving the effects necessary for clear should not alienate the population. The messages of information operations are important while performing clear. Responsible use of force is essential. 9-22. Counterinsurgents conduct information operations to achieve the effects of the clear component. The focus for information operations during the clear is the insurgency’s combatants, the underground and auxiliary elements, and the host-nation population. Counterinsurgents’ information operations should facilitate operations which eliminate the combatants from an area, facilitate effective information collection on the combatants, and build a sense of security among the population. HOLD 9-23. Counterinsurgents do not execute tasks associated with the clear component unless they have developed the capability to execute tasks in the hold. Beginning shape-clear-hold-build-transition framework operations requires resources in the form of manpower, time, money, and development programs (but this framework is based on capacity, not resources). For this reason, these type of operations cannot be conducted everywhere and must be prioritized. To meet the imperatives listed above, the counterinsurgent must progress along the framework to continue to improve conditions in the environment. Therefore, units should not clear an area that they cannot hold. Until those conditions exist, the counterinsurgent may choose to continue to prepare or shape the environment for future shape-clear-hold-build-transition framework operations. 9-24. As the capability of the insurgency decreases in an area based on counterinsurgency operations, the capacity of the host-nation government and security force must increase. As the conditions improve to the point that offensive operations aimed at eliminating the insurgency’s combatants are no longer the priority and the host-nation population has freedom of movement, counterinsurgents can begin to execute tasks and operations associated with hold. The hold involves disrupting insurgent activities in an area and providing a good security environment for the population. The objective of the hold is to set the conditions for the host-nation security apparatus to provide security for the population. For this reason, the hold lasts as long as it takes to— Develop the capability of the host-nation security forces. Reduce the enemy strength in the area to the point that the host-nation security forces can take lead responsibility for security. 9-25. Lead responsibility means that the host-nation security forces are the decision authority for allocation of resources, priority of tasks and operations, and tactical decisions during operations. Counterinsurgents continue to eliminate the insurgency’s leadership and infrastructure. However, perhaps more importantly, counterinsurgents should focus on securing the population. During this period, proper basing of counterinsurgent forces is essential. If an area is supportive of an insurgency, then a base of counterinsurgent forces may sever the relationship between insurgents and the population. If the area is neutral or has pockets of support for the government, then the base should be established where it can best help in developing the area. 9-26. Contact with the population should be continuous, predominantly with host-nation entities (security forces, law and order officials, and government representatives) leading and U.S. counterinsurgents in support. Information operation activities provide opportunities for contact with the population. From the start of operations, Soldier and Marine actions in these areas, if culturally astute, can build bonds with the local population and in many cases change the attitudes of the people. Ultimately, the goal of this contact is twofold: to gain a better picture of the actual situation and to turn the population’s support toward the government. 9-27. Counterinsurgents must also secure key physical infrastructure. Because resources are always limited, parts of the infrastructure vital for stability and vulnerable to attack must receive the priority of protection, specifically the protection of capable host-nation security forces (if possible). This can be accomplished by analyzing the risk and likelihood of attack on various sites in the area of operations. 9-28. Much like the clear, achieving the hold requires counterinsurgents execute offense, defense, and stability tasks. While achieving the hold, defensive tasks and operations are the priority. However, to meet the objectives of the hold, the line of effort associated with development of the host-nation security forces 13 May 2014 FM 3-24/MCWP 3-33.5 9-7 Chapter 9 is the decisive operation. Examples of stability tasks include manning, equipping, and training the host-nation security forces, establishing local governance functions, and establishing culturally appropriate rule of law systems within the host nation’s plan. Examples of some defensive tasks during the hold include counter cache operations, area denial, combined security at fixed sites, block infiltration routes, countermobility, and securing the population. Counterinsurgents must execute offensive tasks to attack the insurgency’s underground and auxiliaries. Examples of offensive operations in the hold include raids against insurgent leaders, ambushes, and disruption operations to impact support structures and local sanctuaries. The amount and scope of stability tasks and operations increase during the hold. 9-29. Security operations to achieve the hold are dominated by developing the host-nation security forces and then transitioning security responsibilities to them. Examples of security focus during the hold include— Reform of local security institutions—reestablish military and police forces which may include the entire rebuilding of the enduring institution including recruiting, educating, training, manning, equipping, sustaining and leader development for the Army, police, rule of law, detention capacity, and court systems. Develop the host-nation military to provide security and external defense of the nation; develop the capacity to become self-sufficient in the development and conduct of their own enduring training programs at individual and collective levels. 9-30. Counterinsurgents conduct information operations to achieve the hold as well, but the focus and message changes as conditions improve. The focus for information operations during the hold is on the remaining underground and auxiliary, the host-nation population, the host-nation security forces, and host-nation governance institutions. Counterinsurgent information operations should facilitate operations that improve the perception of security among the population, legitimize the host-nation security forces, dissuade the underground and auxiliaries from continuing insurgent activities, and promote effective host-nation governance solutions. During the hold, it is critical that the host nation becomes an integral part of information operations. BUILD 9-31. When the conditions in an operational environment allow the host-nation security forces to take lead responsibility for security, counterinsurgents transition to the build. The build comprises carrying out programs designed to remove the conditions that allow the insurgency to exist, specifically addressing the root causes, tying inhabitants to host-nation security institutions, governing and rule of law, and strengthening the host nation’s ability to provide legitimate and effective governance. Stability tasks predominately build, with many important activities being conducted by nonmilitary agencies. Progress in building support for the host-nation government requires protecting the local population. People who do not believe they are secure from insurgent intimidation, coercion, and reprisals do not risk overtly supporting host-nation efforts. 9-32. Counterinsurgents execute offense, defense, and stability tasks in the build as well. The priority for tasks and operations during the build is on the stability tasks. The line of effort that addresses increasing the host-nation government capacity becomes the decisive operation during the build. Examples of stability tasks in the build include advising and assisting the host-nation security forces, developing professional development programs (including professional education) for host-nation security and governance individuals, facilitating host-nation governance activities, support to local and national demilitarization, demobilization, and reintegration programs, and development of host-nation rule of law and conflict resolution mechanisms. However, U.S. forces execute offensive operations during the build. Examples of offensive operations in the build include providing a quick reaction force for the host-nation security forces, conducting tactical overwatch for specific host-nation security forces operations, conducting follow and assume or follow and support for host-nation security forces operations, or conducting precision strike operations in support of host-nation or U.S. objectives. Counterinsurgents execute defensive operations and tasks as well, to include protecting the population, combined action with the host-nation security forces to secure combined positions, and sanctuary denial and disruption operations. 9-33. U.S. counterinsurgents conduct information operations as part of the build in support of host-nation programs. The focus of information operations during the build is on the host-nation population, the 9-8 FM 3-24/MCWP 3-33.5 13 May 2014 Direct Methods for Countering Insurgencies host-nation security forces, and host-nation governance institutions. U.S. counterinsurgents conduct information operations during build operations to facilitate host-nation leaders’ messaging and to emphasize success in generating the conditions that further the connection between the population and the host-nation institutions. U.S. ground force information operations reinforce the host nation’s ability to counter an insurgency without the direct involvement of U.S. ground forces. Host-nation information operations should focus on increasing the perception of security, increasing the legitimacy of the host-nation government and security forces, and promoting the host nation’s ability to address root causes. TRANSITION 9-34. Transition allows the counterinsurgent to delineate tasks associated with development of host-nation institutions (governance, rule of law, security, and economic) with those tasks associated with transitioning to host-nation lead of operations. To make transition effective, U.S. commanders incorporate planning and execution of transition as part of the shape-clear-hold-build-transition framework. 9-35. This transition is not a onetime event. Counterinsurgents transition responsibility to host-nation agencies when they are capable of taking over a function. This may mean multiple transitions to multiple host-nation agencies at different times during a counterinsurgency. Transition is a continued process in which the host nation assumes any responsibility that an external counterinsurgency may temporarily have. 9-36. Security tasks associated with transition represent the U.S. forces’ transition to security cooperation tasks. During this phase, the U.S. ground force, under the combatant command and in conjunction with the American embassy, helps generate and then implement theater engagement plans and programs. 9-37. The end goal of shape-clear-hold-build-transition framework is to create the conditions necessary for the host nation to counter an insurgency independently. However, creating these conditions may not eliminate the presence of external counterinsurgents. U.S. counterinsurgents may remain in an area during and beyond transition to help train host-nation security forces or institutions, provide enablers, or begin security cooperation tasks at the request of the host-nation government. (See FM 3-22 for more information on security cooperation tasks.) 9-38. To better facilitate the integration of all components of the unified action environment into the shape-clear-hold-build-transition framework, counterinsurgents may establish an area coordination center. An area coordination center controls, manages, and coordinates shape-clear-hold-build-transition framework operations. Commanders and staffs can establish area coordination centers and subordinate area coordination center civil-military task forces from the tactical to the strategic level. An area coordination center’s membership includes representatives of all multinational forces and host-nation agencies (military, police, intelligence, political, and civil administration) operating at the regional and local level. To be truly effective, Department of State representatives (including United States Agency for International Development personnel) should lead an area coordination center. As an area coordination center coordinates all efforts that affect the ability to transition to host-nation control, the area coordination center is responsible for generating host-nation capability beyond just the security realm. For that reason, diplomatic and governmental leaders should run an area coordination center with the goal of turning over decisionmaking and coordination authority to the host nation at the earliest opportunity. In the absence of Department of State personnel, the military force assigned an area of operations should initiate and manage an area coordination center until a government representative can take control. An area coordination center coordinates the allocation of material and personnel resources, methods of policy implementation, and evaluation of intelligence in the area within which it is organized. 9-39. The area coordination center consists of civilian and military elements necessary to plan the political, economic, social, psychological, security, intelligence, and tactical operations within that area. Commanders and staffs base operation plans on an integrated civil-military approach, and unity of effort is essential. The leadership must have authority to control the allotted resources of all agencies and activities operating within its respective area of responsibility. In those instances where U.S. or multinational forces are operating in support of host-nation forces, an exceptionally high degree of cooperation must exist and advisory efforts are critically important for success. All armed civilian defense forces and civilian organizations normally remain under operational command of their respective area coordination center task force chiefs: however, in cases where civilian administration is ineffective, military forces may provide 13 May 2014 FM 3-24/MCWP 3-33.5 9-9 Chapter 9 civil administration until civilian programs have taken effect. A composite view of the shape-clear-holdbuild-transition framework is provided in figure 9-2. 9-40. Transitions can also occur within the shape-clear-hold-build-transition framework. Soldiers and Marines will have different tasks when an operational environment changes. For example, a unit must understand when it transitions from eliminating the combatants in an area to creating an environment for host-nation control. Units will change their mix of offensive, defensive, and stability tasks. More importantly, they will have to change their mindsets. Figure 9-2 provides the changes of capacity over time, the changes in the mix of tasks units could perform, and finally when a transition may occur. This graph provides a snapshot of the shape-clear-hold-build-transition framework. In it, counterinsurgents are moving from clearing, to holding, and then to building. During this movement, the local population is becoming more supportive of the counterinsurgency, and the insurgency is losing capabilities and moving from being in a possible war of movement back to being in phrase I. As insurgent capacity decreases and counterinsurgent capabilities increase, several transitions take place that involve a different mindset and performing different tactical tasks. This is in addition to the final transition to the host-nation lead, which is the end point for the U.S. when it acts as the primary counterinsurgent. (See figure 9-2.) (See chapter 4 for more information on the phases of an insurgency and chapter 7 for more information on transitions.) 9-10 FM 3-24/MCWP 3-33.5 13 May 2014 Direct Methods for Countering Insurgencies Figure 9-2. Example of a possible transition framework OTHER DIRECT ENABLERS 9-41. The Army and Marine Corps can also integrate other direct enablers into a counterinsurgency operation. For example, indirect fires can be integrated into an ongoing counterinsurgency effort. Special forces have the capability to perform direct actions. These are short-duration strikes. Special forces can also conduct other small-scale offensive actions conducted in hostile, denied, or politically sensitive environments that employ specialized military capabilities to seize, destroy, capture, exploit, recover, or damage designated targets. As with indirect enablers, the Army and Marine Corps have a wide range of direct capabilities that can be integrated into an ongoing counterinsurgency effort. Tactical units that can be successfully integrated into a host nation’s efforts to perform cordon and searches or raids could be an effective capability for any counterinsurgency operation. 13 May 2014 FM 3-24/MCWP 3-33.5 9-11 Chapter 9 9-42. As part of the joint force, the air component provides Army and Marine Corps units a number of critical direct enablers. Airpower provides supported ground forces a significant asymmetric advantage over insurgents as a result of their flexibility, situational understanding, freedom of maneuver, and access to immediate joint fires. Direct air and space enablers include, but are not limited to, air mobility, casualty evacuation, intelligence, surveillance and reconnaissance, communications, cyber, global positioning system, personnel recovery, precision engagement (close air support and air interdiction), and electronic warfare. 9-43. Two other important enablers are targeted threat infrastructure and strikes. Targeted threat infrastructure provides a means for a counterinsurgent to attack the resources that an insurgency uses to continue its effort. However, targeted threat infrastructure must always be conducted in support of other efforts. Counterinsurgents must weigh the effect of the operations on the legitimacy of the host nation among the local population. Strikes are conducted to disrupt an insurgency, and they can allow other efforts to succeed. Targeted threat infrastructure and strikes are not to be conducted in isolation, and simultaneously some force should be actively securing the population and building legitimacy. TARGETED THREAT INFRASTRUCTURE 9-44. Targeted threat infrastructure is a method that seeks to destroy an insurgent force’s physical infrastructure. This is a method that will normally only work if another force is securing the population and building legitimacy. In other words, it is a method to enable another force. This method seeks to destroy the necessary requirements of an insurgency to conduct combat operations. Targeted threat infrastructure proactively targets the physical and societal mechanisms that support and fuel the insurgency. It involves an aggressive spirit of the offense. When using this method, commanders and staffs must consider the law of war principle of proportionality. The anticipated injury or damage caused to civilians or civilian property must not be excessive in relation to the concrete and direct military advantage anticipated by an attack on a military objective. Commanders and staffs using targeted threat infrastructure must also ensure it is not contributing to the recruitment of insurgent fighters by using too heavy a hand against elements of society that are not fully or willingly supporting the insurgency. 9-45. Targeted threat infrastructure must be integrated into an effective host-nation effort that is securing the population. Targeted threat infrastructure can be an effective tool, if it is well planned and executed to avoid possible negative consequences of alienating the population and decreasing the legitimacy of the host nation. If the effect of targeted threat infrastructure is the physical elimination of the basic physical infrastructure needed by an insurgency, and it avoids the negative effects of alienating the population, it can be essential in a host nation’s counterinsurgency effort. However, it is a means to enable a host nation, not a method that should be used without an additional effort to secure the population. 9-46. For targeted threat infrastructure to be effective, commanders and staffs must understand where an insurgency is attaining its strength and attack those areas and facilities. These efforts must further the desired overall end state and not undermine a host-nation government’s legitimacy. Commanders and staffs plan for and limit second and third order effects of attacks. Moreover, attacks are only targeted against the infrastructure the insurgency relies on. For example, crop eradication aimed at reducing cash flow is unlikely to effect an insurgency with a large amount of financial resources. It may, however, hurt the legitimacy of the host nation. 9-47. Illicit crops such as marijuana, coca, or poppy used to fuel and fund an insurgency can be the targets threatened under the targeted threat infrastructure method. The cash from these crops may help arm, train, and pay insurgent fighters or pay condolence payments to the families of terrorists who kill themselves in suicide acts. Attacking such crops may hurt individual farmers. In some cases, farmers may be coerced by insurgents and have no real choice in the crops they produce. In others, farmers may support the insurgency. However, the illicit nature of these crops make them valid targets. To avoid creating new insurgents through crop destruction, counterinsurgents can work with interagency partners and the United States Agency for International Development to establish crop substitution programs that can help ease hardships farmers may experience. 9-48. Another key target for the targeted threat infrastructure method is any material or physical item used to fuel the insurgency. For example, a road network that is the primary means of movement for insurgents 9-12 FM 3-24/MCWP 3-33.5 13 May 2014 Direct Methods for Countering Insurgencies needs to be interdicted by checkpoints or destroyed. This may inconvenience the local population, but if consistent with the principle of proportionality this can be a valid course of action. Power systems and water systems deep in insurgent controlled areas are prime targets for targeted threat infrastructure, but targeting them requires careful proportionality analysis. As critical components of a society, power and water are staples that the insurgents need to survive in their own region. By impairing these resources, counterinsurgents may undermine the insurgency’s resources and its ability to continue the insurgency. However, any effort to attack these resources must be balanced with the host nation’s legitimacy among the local population that is affected. Aggressive strikes and raids are central to the targeted threat infrastructure method to destroy the physical infrastructure that supports an insurgency. This tactic is not a slash-and-burn technique, but consists of well-planned, pinpointed attacks on those critical enablers that the insurgency needs to operate. 9-49. Another key target is the illicit funds used to fuel an insurgency. By establishing counter threat finance fusion centers, commanders and staffs can work with the power of interagency law enforcement and international legal partners to find, interdict, and seize huge sums of money that the illicit regime must launder before it can be used again for legal currency. By using unit counter threat finance specialists in targeted threat infrastructure operations, funds determined to have been gained through illicit means can be targeted for seizure at the local level. For example, if a man is a small farm owner and lives in a palatial home with three cars, he should be investigated, and his funds can be targeted if it is determined that his wealth is from illicit means and those means are being used to fuel an insurgency. STRIKE 9-50. A strike is an attack to damage or destroy an objective or a capability (JP 3-0). A strike may be useful in disrupting an insurgency, especially in insurgent controlled areas. Strikes can be made on guerrilla bases, large, enclosed or isolated compounds, and training camps. Normally these operations are meant to disrupt an insurgency and allow for the success of other operations. Strike operations can be integrated into a host nation’s operations to secure a population. The U.S. may contribute a force to perform strikes. 9-51. The purpose of a strike is to destroy insurgent forces and base areas, isolate insurgent forces from their support, and interdict insurgent infiltration routes and lines of communications. Strikes are primarily offensive operations. They are characterized by reconnaissance, intelligence gathering, and careful planning, followed by vigorously executed, coordinated attacks or raids by small, highly mobile combat forces operating in dispersed formations to locate and fix an insurgent force. Upon locating an insurgent force, strike force commanders attack, pursue, and destroy that insurgent force. If contact is lost, the strike forces resume aggressive patrolling to reestablish contact and destroy the insurgent force before it can rest, reorganize, and resume combat operations. 9-52. Strikes can be conducted in support of shape-clear-hold-build-transition framework operations after guerrilla forces are initially driven out of an area during the clear phase. Strikes are often employed to assault objectives outside cleared areas to fix and destroy guerilla forces and prevent counterattacks against government and reconstruction personnel. Counterinsurgents conduct assaults in areas where guerrillas attempt to consolidate during the hold and build phases. Precision airpower weapons can be used to support other units conducting strike operations or to conduct strike operations on their own. 9-53. Reconnaissance to locate and test insurgent dispositions and strengths or to develop additional intelligence can be followed immediately by a hasty attack or raid. Reconnaissance should emphasize thorough coverage of an area, and it is characterized by continuous, decentralized, small-unit operations. Since strike campaigns are conducted in insecure areas, plans must provide for force withdrawal after mission accomplishment. 9-54. Strike forces are generally task forces composed of military units and may contain intelligence, police, and paramilitary elements. Civilian elements may be represented. Forces designated to conduct strikes should be relieved of routine area defense responsibilities well in advance of an operation. Strike forces can be controlled at the national, regional, or local levels. Strike forces are organized as self-sufficient task forces capable of operating for extended periods in areas remote from home bases. 9-55. Once insurgent bases have been located, strike forces maneuver to destroy them. An insurgency’s ability to hide weapons and to assume noncombatant guises in attempting to avoid capture may require a 13 May 2014 FM 3-24/MCWP 3-33.5 9-13 Chapter 9 thorough reconnaissance and search of the area. Suspects must be managed firmly but treated fairly to avoid turning innocent suspects into insurgency sympathizers. When small units conducting reconnaissance locate relatively large insurgent operating forces, surveillance should be maintained and reaction forces quickly deployed to destroy them. In areas suspected of harboring insurgent forces or installations, reconnaissance and surveillance should be conducted and followed with an immediate raid by reaction forces when sufficient information has been developed on a target. Good communications and mobility are essential for success in these combat operations. 9-56. Speed and surprise are important in strikes. The sudden and unexpected delivery of combat forces into an insurgent held or contested area provides significant advantages to the forces conducting strike operations. If caught by surprise, guerrillas may be unable to react effectively. Speed and surprise can be achieved by using air assault tactics to insert the first forces into the area of operations. Subsequent forces can be delivered on later airlifts or by other modes of transportation. Fires can be used to restrict escape routes or areas that are not secured by land forces. 9-57. However, strikes do not address the root causes for beginning or sustaining an insurgency, nor do they necessarily increase the legitimacy of the host-nation government. Strikes are integrated with other approaches to counterinsurgency as part of the overall operational design. In some cases, the U.S. can integrate this ability into an ongoing host-nation effort. 9-14 FM 3-24/MCWP 3-33.5 13 May 2014 Chapter 10 Indirect Methods for Countering Insurgencies 10-1. An indirect approach seeks to support existing governments, security forces, and groups through increasing capacity to counter an insurgency and enabling existing capabilities. This approach indirectly counters an insurgency by working through host-nation institutions or with groups in the society. The United States (U.S.) can use nation assistance and security cooperation to aid a host nation in building its institutions. 10-2. Beyond nation assistance and security cooperation, there are several methods that are indirect methods for countering an insurgency. Among these are generational engagement, negotiation and diplomacy, and identify, separate, isolate, influence, and reintegrate. Beyond these methods, there are several indirect enablers that are important in any counterinsurgency. This includes integrated monetary shaping operations. NATION ASSISTANCE AND SECURITY COOPERATION 10-3. Nation assistance is assistance rendered to a nation by foreign forces within that nation’s territory based on agreements mutually concluded between nations (JP 3-0). This civil or military assistance (other than foreign humanitarian assistance) is rendered to a nation by U.S. forces within that nation’s territory during peacetime, crises or emergencies, or war, based on agreements mutually concluded between the U.S. and that nation. Nation assistance operations support the host nation by promoting sustainable development and growth of responsive institutions. The goal is to promote long-term regional stability. 10-4. Nation assistance involves other government agencies that provide expertise in building civil institutions. This is an essential element in counterinsurgency because the military lacks the expertise to build civil control over the population, perform economic reforms, or aid in other basic functions that a host nation may need to prevent or prevail against an insurgency. Using a whole-of-government approach is essential in conducting nation assistance to prevent insurgencies from developing freedom of movement by exploiting the root causes of conflict within an operational environment. 10-5. Security cooperation is all Department of Defense interactions with foreign defense establishments to build defense relationships that promote specific US security interests, develop allied and friendly military capabilities for self-defense and multinational operations, and provide US forces with peacetime and contingency access to a host nation. (JP 3-22). This includes Military to military exchanges (for example, seminars and symposia). Combined exercises. Humanitarian assistance. Security assistance. When these activities are used to defeat an insurgency, they are part of a counterinsurgency operation. While not all security cooperation activities are in support of counterinsurgency, security cooperation can be an effective counterinsurgency tool. These activities help the U.S. and the host nation gain credibility and help the host nation build legitimacy. These efforts can help prevent insurgencies or shape the host nation’s ability to defeat or contain insurgencies. 10-6. When directed, the Army and Marine Corps provide forces to support security cooperation missions. This requirement can include assistance in training, equipping, and advising the military forces of foreign nations. Security cooperation includes security assistance, foreign internal defense, and security force assistance. (See FM 3-22 and chapter 10 for more information on security cooperation activities. See chapter 10 for more information on working with other forces by using security cooperation.) 13 May 2014 FM 3-24/MCWP 3-33.5 10-1 Chapter 10 GENERATIONAL ENGAGEMENT 10-7. Generational engagement is a method that can be conducted in conjunction with other approaches that seeks to get the host nation to educate and empower the population to participate in legal methods of political discourse and dissent. This can be done in both high threat situations and situations where an insurgency is at its infancy and combat is less intense. It is best that the host nation undertake this method as soon as possible to affect the next generation. Generational engagement focuses on the population. Generational engagement focuses on building new constituents in the host-nation population to counter insurgent actions. Generational engagement is a method of political mobilization of the people. The purpose of the method is to get population groups to side with the host nation. 10-8. Figure 10-1 provides a general framework for generational engagement. First, counterinsurgents identify the population that they wish to engage. This relevant population may politically engage and this will encourage the host nation to redress any grievances. This may lead to a reduction of violence. This is all built on a foundation of education, empowerment, and participation. (See figure 10-1.) Figure 10-1. Generational engagement 10-9. Five principles are fundamental to generational engagement: Groups with whom counterinsurgents partner (such as nongovernmental organizations [NGOs]) must be seen as indigenous, not as foreign constructs. Independence of funding and resources are important. Support groups can lose credibility the more they are perceived as solely reliant on foreign funding, possibly due to a shift in priorities by a sole and influential benefactor. Organizations and their partners should identify alternative sources of support, including local sponsors, funding from the relevant ministries, or collecting dues from members. In selecting partners, counterinsurgents should not limit themselves to the vocal intellectual elite. If the insurgency is based on the root causes of a rural population, intellectual elites might not have legitimacy among the rural poor. Therefore, counterinsurgents should balance support between the central leadership and local branches in the provinces or townships (where youth engagement is usually most important). 10-2 FM 3-24/MCWP 3-33.5 13 May 2014 Indirect Methods for Countering Insurgencies Expansion and membership numbers should not be used as a key indicator of success. It can be difficult to accurately track and confirm these numbers with national organizations. A more accurate measure is the staff, number of offices, actual activity levels, and efficacy. Activity reports and photos can verify progress. A main role for organizations is to make the connections between the local administrations and the provincial or national level government, as well as other stakeholders and peer organizations. At some point the NGOs will not be present to facilitate government access, and will be most effective when they facilitate cooperative and enduring relationships between the population and the government. 10-10. Generational engagement works with factions from a population to get them to see the benefit of participating in peaceful means to address their core grievances. Getting youths to understand the legal means they have to address root causes of conflict is a critical tool for reducing violence. If commanders and staffs believe that insurgencies may occur over extended periods, then some efforts must be made to engage this next generation of leaders who can establish a lasting peace. Engagement also has to be made with the intellectual elites of the country. They may still be residing in the country of conflict or in another country that has significant influence over the insurgent cause. 10-11. Soldiers and Marines planning to use generational engagement must identify relevant portions of the population through their planning. Plans and methods for engagements can vary, depending on the operational environment and the culture. This method is used in conjunction with direct methods as part of a comprehensive approach to combating insurgent forces. Counterinsurgents can make progress in defeating insurgent forces, but if they neglect the younger generation of the population they may lose the war. Continued and prolonged efforts must be made to ensure that counterinsurgents and the host-nation government are seen as positive influences. The population must identify with and trust their government. Counterinsurgent efforts are coordinated and tracked through continued assessments to ensure success. 10-12. Counterinsurgents engage with young factions of the population by implementing youth programs. Counterinsurgents also participate in local council meetings that include representatives from different generations of the population. 10-13. The idea behind these engagements is that they are initiated by the counterinsurgent forces and eventually taken over or continued by the host nation. It is not enough for the host nation to just continue to implement these engagements, rather the host nation must make every effort to ensure that these elements of the population identify more with the government than with the insurgents. Local leaders who identify with the government must be protected and supported. 10-14. Some examples of generational engagement can be as simple as ensuring that schools are open and available to students and ensuring adequate access to medical attention as part of the effort to ensure essential services. This can address younger portions of the population who, over the long term, will have a positive view of counterinsurgents and the efforts of their own government to ensure for their care and protection. 10-15. Some examples of generational engagement along the governance line of effort can include recruitment of younger influential leaders and including others in the electoral process. This may be difficult based on the culture in which counterinsurgents are operating because some cultures only allow for leadership positions for older members of the population. If members of the younger generation cannot assume roles in the government, they can still be encouraged to participate in the governance process and feel that they have a place where they can make their views heard by their local government. 10-16. Local participation that builds civil society has proven important in countering an insurgency. This can be essential in building legitimacy for a host government. For example, in Vietnam, the U.S. military and Department of State, along with the government of South Vietnam, established several youth groups that were very successful. One example, the 4-T Youth Club, was modeled after the American 4-H organization. Over 2000 4-T clubs served as a model of success for organizing youths at the grassroots level. A host government is essential in building local participation and a civil society. The Republican Youth Movement, National Revolutionary Movements, and Personnel Labor Revolutionary Parties were all models of successful youth engagement. These efforts increased the legitimacy of the host nation while decreasing the ability of the insurgency to recruit. These programs were generators of self-esteem for the 13 May 2014 FM 3-24/MCWP 3-33.5 10-3 Chapter 10 participants and worked out pent-up student energy by deploying them to the provinces. In Vietnam, youth programs proved beneficial. 10-17. Outside groups can be very effective at generational engagement. For example, the Afghanistan Youth National and Social Organization is a non-profit, non-governmental organization that enrolls young Afghani males. It has district chapters, made up of around 45,000 dues-paying members, it enjoys a great deal of autonomy, and it organizes according to the needs of its local members. Its civic education program educated Afghans about their political rights and obligations, and it strengthened dialogue between local leaders and government officials. The importance of engaging local youth in Afghanistan was indicated in after action reviews and outside groups play an important part in building civic society. In sum, a nongovernmental organization was effective at engaging the population and encouraging dialogue. 10-18. The first step that counterinsurgents can take to ensure that this happens is by leveraging key leadership at the local and district levels to meet with and discuss significant issues with the population. Just meeting with the younger elements of the population will not constitute completion of generational engagement. There must be efforts to follow through on major discussion topics and resolve issues that are significant to them. Where counterinsurgent forces are able to, they must continue to push local leaders to not just meet with them but also to address and resolve issues. This can be done initially by counterinsurgents and eventually by the host-nation government in concert with host-nation security forces. 10-19. Lastly, host-nation security forces must ensure that these actions are taken and that they are perceived as supportive of all elements of the population. This may done initially with counterinsurgent forces as the lead elements and later as host-nation forces develop their ability to take the lead on providing security as a supporting element of government representatives. NEGOTIATION AND DIPLOMACY 10-20. Negotiation and diplomacy are ways to resolve or defeat an insurgency. Counterinsurgents must influence the host-nation government and its subordinate elements (for example, the office of land reform) to remove the root causes that have led to acts of subversion and violence in order to seize, nullify, or challenge political control of a region. (See figure 10-2 which shows the process of negotiation and diplomacy.) 10-4 FM 3-24/MCWP 3-33.5 13 May 2014 Indirect Methods for Countering Insurgencies Figure 10-2. Negotiation and diplomacy 10-21. The goal of negotiation and diplomacy is to address the insurgent root cause and therefore reduce the causes for armed conflict. If a host nation can be influenced by U.S. government or military personnel to peacefully address root causes, then the expected outcome is a reduction in violence and bringing the insurgents into the political process to have their issues resolved peacefully. If the host-nation government can do this successfully, the insurgency may not totally go away, but it may only use force of arms in a limited context that would manifest as limited insurrections compared to a full blown armed insurgency. 10-22. The U.S. has many tools at its disposal to influence a host nation in addressing the root causes of an insurgency. For example, economic and military aid can be tied to certain actions or standards of behavior by a host nation. Counterinsurgents must also evaluate how their actions help shape the environment. Contracting, for example, has direct links to the economy and the society. Using contracts to encourage a host nation to address root causes is another possible tool. In sum, commanders should make an assessment of how they are interfacing with a host nation and determine what tools are available to enable and encourage the host nation to take the needed actions to defeat an insurgency. 10-23. In an armed conflict environment where U.S. forces have been sent in to assist a host nation to fight its insurgency, U.S. military personnel can work with the host-nation armed forces to reduce causes for conflict, and U.S. military personnel can also interact with U.S. and host-nation government personnel to take steps to peacefully address core grievances and root causes of conflict. 10-24. In a peacetime environment where U.S. forces are not committed to help a host nation combat its insurgency, U.S. military personnel can lessen the causes of a potential crisis or insurgency in the conduct of security cooperation activities and bi-lateral military exercises. If one of the insurgents’ root causes is against the host-nation military for human rights abuses or using heavy handed tactics with the local population, U.S. military personnel can work with the military wing of the government to find alternative ways of dealing with the population. 13 May 2014 FM 3-24/MCWP 3-33.5 10-5 Chapter 10 IDENTIFY, SEPARATE, ISOLATE, INFLUENCE, AND REINTEGRATE 10-25. Identify, separate, isolate, influence, and reintegrate is a method that combines several activities that affect relevant population groups. This can be done in both high threat situations and situations where the insurgency is at its infancy and combat is less intense. This method works by, with, and through the host nation; however, it may have some elements which Soldiers and Marines are directly interacting with a local population. 10-26. Identify, separate, isolate, influence, and reintegrate is a proactive method of addressing root causes before a full blown armed insurgency can develop. Its purpose is to identify and separate the insurgents from the population. This is a primary requirement for forces conducting counterinsurgency. By identifying who is an insurgent and who is not, and then applying resources to separate insurgents from the population, commanders and planners can more effectively focus their efforts on making the insurgency feel isolated. Insurgents may then believe that their causes for conflict are not supported by the population. Once the insurgent leaders and members feel isolated from the population, peaceful efforts can be made to influence insurgents to surrender, return, and be reintegrated into society. 10-27. Commanders conduct a detailed assessment of the insurgent and population networks before executing the identify, separate, isolate, influence, and reintegrate method. This assessment guides the application of individual means to disassemble the insurgent network. Joint forces and other actors may enter the process at many different stages; therefore, assessment is a continuous process used to guide decisionmaking throughout operations. IDENTIFY 10-28. The identify, separate, isolate, influence, and reintegrate method is used to divide and conquer the insurgency, including all elements of the insurgency listed in chapter 4. The U.S. Marine Corps refers to these as identity operations (See Marine Corps order [MCO] 5530.17), while the Army uses identity activities. The elements of an insurgency are the leadership (including the political cadre), guerilla units, auxiliary forces, and the underground elements. Although all elements of the insurgent network should be identified, the main target of the identify, separate, isolate, influence, and reintegrate effort is to identify the guerillas and eventually neutralize them, since they are the main source of the violence. Military operations should support the host nation in any thorough population screening to identify and eliminate insurgents and to identify any lingering insurgent support structures. 10-29. Operations that support identity activities include— Raids and cordon operations. Base access, checkpoints, and protection of critical sites. Area security operations. Border control and ports of entry. Site exploitation. Population census using biometric data collection devices and mapping the human environment and patterns of life Medical capacity and tracking medical records. 10-30. Tools to support identity activities include— Biometrics and biometrically enabled intelligence collection. Tip lines. Civil records (land documents and registration databases). Reward programs (paying civilians to identify insurgents and their networks). Forensics and forensics-enabled intelligence collection. Document and media exploitation. 10-6 FM 3-24/MCWP 3-33.5 13 May 2014 Indirect Methods for Countering Insurgencies SEPARATE 10-31. While killing or capturing insurgents in counterinsurgency operations may be necessary, an alternate and still effective method in the long run is to separate an insurgency from the population, the second phase of the identify, separate, isolate, influence, and reintegrate method. Counterinsurgents need to isolate their adversaries from the relevant population, both physically and psychologically. At the same time, counterinsurgents should also seek to bolster their own legitimacy and credibility to exercise influence over that same population. 10-32. Establishing security forces in bases among the population furthers the continued separation of the local insurgents and the population. The success or failure of the effort depends on effectively and continuously securing the population. In some cases, it may be useful to physically secure an area using barriers or other means. 10-33. Combined action programs, such as community stability operations, are local level stability operations designed to augment wider counterinsurgency operations. Village or community stability operations can work in areas with limited insurgent activity and attempt to establish security and stability “bubbles” around rural communities. These cordons are created and ideally expanded to make the area inhospitable to insurgents and enable legitimate local governance, which further separates the insurgents from the local population. (See JP 3-24, chapter 5, for more information on stability operations.) Appropriate tasks for units include, but are not limited to, the following: Helping host-nation security forces maintain entry control points. Providing reaction force capabilities through the parent unit. Conducting multinational, coordinated day and night patrols to secure the town and area. Facilitating local contacts to gather information in conjunction with local host-nation security force representatives. Training host-nation security forces in leadership and general military subjects, so they can secure the town or area on their own. Conducting operations with other multinational forces and host-nation units, if required. Operating as a team with host-nation security forces to instill pride, leadership, and patriotism. Assisting host-nation government representatives with civic action programs to establish an environment where the people have a stake in the future of their town and nation. Protecting host-nation judicial and government representatives and helping them establish the rule of law. 10-34. The lines of operations that support the separation process include— Sweeps and cordon and searches. Combat outposts. Village and community stability operations. Border operations and port of entry operations. Strikes, raids, and ambushes. Interdiction operations. Military deception and military information support operations. Electronic warfare. Information collection. ISOLATE 10-35. The isolation phase objective is to break the psychological and physical links between insurgents and the remainder of the insurgent organization and its support base. The first step in this segregation is to identify vulnerabilities of the insurgents. This requires a deep understanding of the operational environment and, more specifically, an understanding of all the adversaries (for example, the insurgent network, transnational terrorists, and external supporters). 13 May 2014 FM 3-24/MCWP 3-33.5 10-7 Chapter 10 10-36. Counterinsurgents ensure efforts strive to physically isolate the insurgency in all domains (air, land, maritime, and cyberspace) from other nodes of the insurgent network. Ultimately this means controlling the physical and cognitive domains. However, completely controlling the domains at all times is not realistic. 10-37. Patrolling and cordon and search operations can physically isolate insurgents through capture or deterrence. Following these operations, counterinsurgents’ treatment of captured insurgents has immense potential impact on insurgent morale, retention, and recruitment. Humane and just treatment may afford counterinsurgents many short-term opportunities as well as potentially damaging insurgent recruitment. Abuse may foster resentment and hatred, offering the enemy an opportunity for propaganda and assist potential insurgent recruitment and support. It is important that unless they are entitled to another standard based on status, all detainees or other persons captured in any conflict, regardless of how it is characterized, shall be treated, at a minimum, in accordance with Common Article 3 of the Geneva Conventions of 1949. 10-38. Isolation must include operations to counter the insurgency lines of communication to recruit, obtain funding, weapons, equipment, direct operations, or gain intelligence. Operations such as information operations, electronic warfare, and cyberspace operations are examples of efforts designed to detect and respond to enemy insurgent networks. These operations are vital as force multipliers to identify insurgent activities and create conditions to deny or defeat their operations. 10-39. In addition to physical and psychological isolation, efforts to isolate the insurgency economically are necessary, but must be narrowly focused on the activities of insurgents. These efforts seek to isolate the insurgency as much as possible, as complete isolation of the insurgency is not realistic. If implemented too broadly, efforts to isolate may have a negative effect on the population and strengthen the insurgency. (For example, eradicating the poppy harvest in Afghanistan may have cut funding to the Taliban, but it also alienated the farmers who subsisted on the illicit crop.) Economic efforts to isolate an insurgent require both physical and informational interruption of financial, business, and criminal enterprises. Attempts to isolate insurgents from the population economically must be narrowly focused on the insurgents and minimize the effect on the population by offering viable replacement sources of employment and revenue. A primary means of the financial isolation is through counter threat finance operations. 10-40. The lines of operations that support the isolation process include— Border operations and port of entry operations. Strikes, raids, and interdiction operations. Counter threat finance. Military deception and military information support operations. Cyber electromagnetic activities. Electronic warfare. Intelligence operations. Information collection. INFLUENCE 10-41. The intent to influence the insurgent network is for the population to abandon support to the insurgency’s efforts. Planned influence operations should convey selected information and indicators to insurgent networks to influence their emotions, motives, objective reasoning, and ultimately the behavior of insurgent network itself. While it is unlikely counterinsurgents will change insurgents’ beliefs, it is possible to change their behavior. The counterinsurgency lines of effort (shown in figure 7-2 on page 7-9) support this behavior modification, but to further mitigate the insurgent threat to the host nation, additional programs should be offered as enticement solutions. In other words, counterinsurgents must leave a way out for insurgents who have lost the desire to continue the struggle. 10-42. Effective amnesty and reintegration programs provide insurgents this avenue; amnesty provides the means to quit the insurgency and reintegration allows former insurgents to become part of greater society. Rifts between insurgent leaders, if identified, can be exploited in this fashion. Offering amnesty or a seemingly generous compromise can also cause divisions within an insurgency and present opportunities to split or weaken it. Counterinsurgents can also act to magnify existing rifts. If insurgent forces are 10-8 FM 3-24/MCWP 3-33.5 13 May 2014 Indirect Methods for Countering Insurgencies expelled or have broken into smaller groups, they must be prevented from reentering the area or reestablishing an organizational structure inside the area. 10-43. Amnesty programs provide a means for members of an insurgency to stop fighting. The essential part of an amnesty program is that insurgents believe they will be treated well and protected from their former comrades’ potential reprisal. Thus, counterinsurgents must have detailed information operation plans to inform the insurgents about the program, to turn themselves in, and to support subsequent amnesty efforts. Pragmatism must be the first consideration of amnesty programs, not ideology or vendetta. Counterinsurgents also must have methods to protect the former insurgents. Incentives for disaffected insurgents or their supporters are important, especially modest monetary rewards. 10-44. Turning former insurgents against their previous comrades can prove invaluable to counterinsurgency efforts. Former insurgents can provide vital information and even become valuable allies and combatants. However, information provided by a former insurgent must be evaluated and validated to prevent misinformation and deception. Incentives and a sense of fair treatment by counterinsurgents are vital to effective defector programs, which are also dependent on effective information operations so insurgents are aware of their options. Insurgents may be prone to defect when conflict has been prolonged, the broad population is weary of conflict, or if the insurgents have an uneven sense of purpose or drive. Defector knowledge of how the insurgents are led, organized, and operate can prove invaluable. This can include personality profiles of insurgent leaders, current communication procedures, plans, and tactics, techniques, and procedures. This detailed intelligence is difficult to gain without defector operations. 10-45. The influence lines of operations include— Information operations. Military information support operations. Military deception. Cyber electromagnetic activities. Engagement. Stability operations. Defense support to public diplomacy. Negotiation and diplomacy. Targeted strikes and raids. Support to amnesty programs. REINTEGRATE 10-46. The objective of reintegrating an insurgent is for the former insurgent to become a productive member of the society. Military forces, governmental organizations, NGOs from the international community, and the host nation must cooperate to plan and execute reintegration programs. Former insurgents must develop confidence in reintegration and the organizations charged with implementing it. To build this confidence, reintegration programs must be holistic and encompass efforts to restore the society, the government, and the economy at all levels. 10-47. Reintegration programs should help protect and empower moderate insurgents from extremist influence and encourage them to not rejoin the insurgency. Programs must be tailored for each area and insurgency. They can include vocational, educational (especially reading and writing), and religious programs. The employment opportunities extended to former insurgents depend on an effectively governed, viable economy with an active market sector. If the reintegration process does not provide alternative economic opportunities to the former combatants, the likelihood of their return to violence substantially increases. 10-48. Demobilization of insurgents normally involves the controlled discharge of active combatants from paramilitary groups, militias, and insurgent forces that have stopped fighting. Demobilization under these circumstances may include identifying and gathering ex-combatants for demobilization efforts. Demobilization involves deliberately dismantling insurgent organizations and belligerent group loyalties, replacing those with more appropriate group affiliations, and restoring the identity of former fighters as part 13 May 2014 FM 3-24/MCWP 3-33.5 10-9 Chapter 10 of the national population. The demobilization of insurgents enables the eventual development of value systems, attitudes, and social practices that help them reintegrate into civil society. 10-49. Reintegration is the process through which former combatants, belligerents, and displaced civilians receive amnesty, reenter civil society, gain sustainable employment, and become contributing members of the local population. It encompasses the reinsertion of individual former insurgents into host-nation communities, villages, and social groups. Reintegration is a social and economic recovery process focused on the local community. It complements other community-based programs that spur economic recovery, training, and employment services. It includes programs to support resettlement in civilian communities, basic and vocational education, and assistance in finding employment in local economies. It accounts for the specific needs of women and children associated with insurgent and other armed groups. 10-50. Insurgents, when properly protected, reintegrated, and well treated, can become positive members of their community. Conversely, unprotected, poorly prepared, or poorly treated former insurgents will become powerful propaganda opportunities for the insurgents. Reintegration processes and programs, such as host nation-led moderate ideological or religious education and job training, should be started early in the reintegration process. 10-51. Counterinsurgency operations ultimately support reintegration through the integration of the stability functions in planning and execution. The stability functions are security, governance and participation, humanitarian assistance, rule of law, and economic stabilization and infrastructure. Specific consideration within stability operations to support the reintegration process include— Civil-military operations and commander’s emergency response program funds for special projects. Support to civic education projects. Support to employment programs. Support to relocation to prevent reprisals. Support to integration into the political process. Support to transitional justice. 10-52. The importance of influencing members of an insurgency to surrender cannot be overstated. The importance of how a former insurgent is reintegrated into a peaceful society is also critical because the way a war is won will decide how long the peace will last. 10-53. Counterinsurgents should offer surrendered insurgents generous terms, and counterinsurgents should follow those terms. By separating an insurgent from the population, commanders and staffs make that insurgent feel vulnerable and also take from the insurgency a means for recruitment and logistic support. Planners and commanders should work toward creating liberal and generous surrender terms. Counterinsurgents must protect surrendered insurgents from reprisals from their former insurgent colleagues. OTHER INDIRECT ENABLERS 10-54. The U.S. can integrate enablers into a host nation’s counterinsurgency efforts. These enablers can provide intelligence or prevent the flow of resources to a counterinsurgency. Various intelligence capabilities, such as signals intelligence, human intelligence, and geospatial intelligence, may be essential to a host nation’s counterinsurgency. Sharing of information from these sources may enable a host nation to defeat an insurgency. Also, other enablers, such as airlift capabilities, might be important for counterinsurgency. Another capability that can be integrated into a counterinsurgency effort is counter threat finance. Counter threat finance works to detect, counter, contain, disrupt, deter, or dismantle the transitional financing of state and non-state enemies threatening the U.S. Counter threat finance can deny an insurgent access to vital funding streams by identifying the sources and conduits of funding. In counterinsurgency, this can play an important role because of the connection between insurgencies and black markets. It provides one means to prevent an insurgency from obtaining resources. (For more information on counter threat finance, see ATTP 3-07.20/MCRP 3-33 and DODD 5205.14.) 10-10 FM 3-24/MCWP 3-33.5 13 May 2014 Indirect Methods for Countering Insurgencies 10-55. The effective integration and synchronization of many capabilities, organizations, and functions that support the collection, analysis, exploitation and sharing of identity information leads to the identification of threat personnel, groups, and networks. These capabilities include biometric data, forensic data, document and media exploitation, intelligence, and other information exchanges. Identification of personnel allows multinational partners to prevent or mitigate insurgents or counterinsurgents from conducting operations among the innocent population. U.S. forces must comply with U.S. Army Forces Command predeployment training requirements. These requirements (such as training in personnel recovery, mitigation of insider threats, biometrics, languages, and cultural awareness) will further enable U.S. forces in a counterinsurgency environment. INTEGRATED MONETARY SHAPING OPERATIONS 10-56. Integrated monetary shaping operations are the use of monetary resources, provided with various types of aid (for example, economic, financial, humanitarian, or developmental), involving the voluntary transfer of resources (for example, money, equipment, knowledge, or training other than military) from U.S. or unified action partners to a host nation, directly or indirectly, for mutual benefit. (See ATP 3-07.20/MCRP 3-33.1G for more information on integrated monetary shaping operations.) Integrated monetary shaping operations are the coordinated use of money, goods, or services to support the commander’s objectives. They are a means to an end. Integrated monetary shaping operations are used to attack sources of instability, build partnerships, and provide for economic stabilization and security. Integrated monetary shaping operations have two major components: Supporting operations by funding developmental assistance, infrastructure, and governance support projects to win the support of an indigenous populace and erode support for the adversary. Denying adversaries sanctuary and operational flexibility by hindering their ability to reliably fund operations. 10-57. Integrated monetary shaping operations can be an effective tool to stabilize the security environment. However, they can also undermine both the local and national economies. One essential consideration of counterinsurgencies is to understand that long-term counterinsurgency efforts have an economic impact on the host nation. Additionally, the implementation of funding and projects can have negative secondary and tertiary effects. Commanders should recognize decisions over which contractors, communities, and individuals are chosen to receive funding could create winners and losers in their area. These effects can exacerbate tensions in the area. Finally, a counterinsurgency can last many years, and this effort can distort the pricing of goods and services within the local and national economy. Counterinsurgents must understand that they can undermine their own efforts by demanding goods in such quantities that they fundamentally alters market forces, which results in economic dependence on the counterinsurgency. This can result in economic problems that can undermine the host nation’s stability when the external counterinsurgent departs. 10-58. Integrated monetary shaping operations can be effective, but they should be linked into an overall development plan. Without that link, the haphazard use of money can be highly destructive to an economy because it creates an unsustainable economy once the counterinsurgent leaves. The basic point of integrated monetary shaping operations is primarily to be a catalyst for long-term and natural development and only secondarily to meet short-term needs or security concerns. Counterinsurgents must understand that interactions with the local culture do have far-reaching effects. The host-nation economy is one area where counterinsurgents can have both positive and negative effects. 10-59. Integrated monetary shaping operations can also inform a commander’s situational understanding. Property ownership records include census records, deeds, and other means of determining ownership of land and buildings. They help counterinsurgents to determine who should or should not be living in a specific area and help them secure the population. In some cases, it may be necessary for Soldiers and Marines to go door to door and collect census data themselves. 10-60. Financial records can provide information on sources of insurgent funding. Collection of financial records often requires help from agencies like the Department of the Treasury and financial institutions. It may require analyzing criminal activities or traditional means of currency transfer. 13 May 2014 FM 3-24/MCWP 3-33.5 10-11 Chapter 10 10-61. Property ownership and financial records can reveal information about the structure of a society. Who owns and controls land and who controls debt provide some information on who may be a power broker in a particular society. Finding these individuals or institutions provides greater situational understanding for counterinsurgents. 10-62. Integrated monetary shaping operations can be used to aid stability efforts. Applicable funding authorities guide what types of uses of money are authorized. If authorized for the area of operations, some possible uses of money include— Repairing damage resulting from operations. Providing condolence payments to civilians for death or injury resulting from operations. This type of payment must be in accordance with prevailing standards for payments of solatia, a victim’s bereavement fund, or compensatory statutes provided by donor agencies and the United Nations. (Counterinsurgents must be aware of the going rates and, as far as possible, ensure that the right messaging is provided to the village or other district leadership where death or injury has occurred resulting from operations.) Further, counterinsurgents must guard against payment for injury or accident becoming a means of extortion or harassment. Funding civic clean-up projects and other sanitation projects and equipment to provide those services. Funding small-scale infrastructure improvements to improve the quality of life of citizens. Funding agricultural projects to improve farming practices, improve livestock health, or implement cooperative farming programs. This type of activity should be conducted in consultation with donor agricultural agencies or the host-nation departments of agriculture to ensure that land rights and water rights of communities are not infringed and crop management is according to agriculturally sustainable principles. Repairing civic and cultural sites and facilities. Preservation of cultural heritage is a sensitive issue and due respect to the site or culture and its practices must be adhered to. Counterinsurgents might be better to maintain a low profile and let the cultural leaders take a leading role in this initiative. Repairing institutions and infrastructure critical to governance and rule of law (such as prisons, courthouses, and police stations). Purchasing education supplies or repairing infrastructure critical to providing education to the local population. Paying rewards, often discreetly, to citizens who provide information on enemy activities and locations. Supporting the creation, training, and operation of host-nation security forces. Funding events and activities designed to build relationships with host-nation officials and citizens. Money Usage Principles in Counterinsurgency 10-63. Seven principles can help guide the commander and staff in integrated monetary shaping operations in a counter insurgency. They are— Host-nation ownership. Capacity building. Sustainability. Selectivity. Partnership. Flexibility. Accountability. Host- Nation Ownership 10-64. Units must ensure that there is counterinsurgent and host-nation ownership of any project. The local population and local government officials should view any project as their own and not one that has 10-12 FM 3-24/MCWP 3-33.5 13 May 2014 Indirect Methods for Countering Insurgencies been imposed on them by outside agencies. A project that has been conceptualized, funded, and constructed at the local level legitimizes the local government in the eyes of the population and further contributes to stability. However, host-nation officials might lack the capacity to implement and manage the project. Counterinsurgents often consult development agencies to promote adequate ownership and accountability for projects. Capacity Building 10-65. Capacity building involves the transfer of knowledge, techniques, and skills to the local people, institutions, and government. This transfer enables those people to develop the capabilities to deliver essential services to the population. Ultimately, the local officials and institutions that gain capacity are better prepared to lead their regions through political, economic, and security-related issues. Sustainability 10-66. The principle of sustainability states that commanders should design and select projects and services that have a lasting effect on the local population. In other words, the impact of the projects under consideration must endure after forces hand over the facility or service to local authorities and the unit (or contractors) departure from the site. Sustainability implies that the local government has the necessary resources to staff and maintain the project. There are examples where commanders have failed to conduct adequate analysis and built new schools or medical clinics only to discover that too few teachers or doctors were available to staff these facilities. Similarly, some commanders have purchased large generator systems to address electricity shortfalls for neighborhoods within their areas of operation. However, without addressing the fuel, maintenance, and service requirements of these systems, the machines eventually failed and were unable to serve as a sustainable solution for the local electrical deficit. Selectivity 10-67. The development community defines the principle of selectivity as the allocation of resources based on need, local commitment, and foreign policy interests. These characteristics, while strategic, are equally important at the tactical level. Commanders seldom receive all of the financial resources they would like to have when implementing their essential service, economic, and governance lines of effort. Therefore, commanders and staffs allocate the available resources into select areas where there is a strong local commitment to the reconstruction program, where the project can positively impact the most people, and where the project under consideration can simultaneously best achieve the commander’s intent. 10-68. Commanders and staffs carefully research nominations, adopt best practices, and design for local conditions in their proposed projects. Commanders assess local conditions before investing financial resources into any potential relief or reconstruction program. Commanders and staffs do not invest money in an intelligence vacuum. They consider all available information about local conditions (such as the population’s requirements, animosities, traditions, capabilities, and economics). A detailed assessment of local conditions will best inform the commander on the project’s potential to deliver its desired effects. Each project should have a clearly defined, decisive, and attainable objective. Commanders and staffs must assess potential unintended results from their integrated monetary shaping operations. Many second or third order negative effects from a project may potentially outweigh the benefits from the original commander’s intent. Partnership 10-69. The principle of partnership involves close collaboration with local governments, communities, donors, nonprofit organizations, the private sector, international organizations, and universities. Partnership plays a central role in any relief, reconstruction, or development program, as it supports each of the other principles of reconstruction and development. In the context of money in integrated monetary shaping operations, effective partnership ensures the unit’s financial resources are well invested and synchronized to support the host nation’s internal defense and development programs and support other U.S. government strategic objectives for the country. 13 May 2014 FM 3-24/MCWP 3-33.5 10-13 Chapter 10 Flexibility 10-70. The principle of flexibility mandates that units adjust to changing conditions, take advantage of opportunities, and maximize effectiveness as part of their reconstruction and development program. Just as the conditions for offensive and defensive operations are often changing and uncertain, so are the relief and reconstruction tasks associated with stability operations. These conditions often require commanders to change tactics to achieve desired objectives. Accountability 10-71. Enforcing accountability, building transparency into systems, and emplacing effective checks and balances to guard against corruption are important components to any relief, reconstruction, or development program. Accountability in all actions, to include the unit’s integrated monetary shaping operations, reinforces the legitimacy of the commander and operations, as well as the legitimacy of the local government, in the eyes of the population. (See ATP 3-07.20/MCRP3-33.1G for more information on integrated monetary shaping operations.) 10-14 FM 3-24/MCWP 3-33.5 13 May 2014 Chapter 11 Working With Host-Nation Forces 11-1. The use of security cooperation tools to build governmental capability, including building a host nation’s forces, may be essential. In the eyes of a local population, the credibility of the host-nation government is vital in counterinsurgency efforts to address the threat and conditions of instability. The host nation’s military, police, and paramilitary forces are often the most visible elements of a host-nation government’s power and authority. Therefore, building the capacity of a host nation’s security forces should work toward improving the security force’s competence, capability, commitment, and confidence. (See table 11-1.) Table 11-1. Developing a host-nation security force Developmental Area Developmental Indicators Competence Host-nation security forces must possess and demonstrate individual and collective skills in their respective warfighting or law enforcement tasks. They must also support institutional functions. Capability Host-nation security force organizations must be appropriately sized to accomplish their respective missions. A host-nation security force must be adequately manned and equipped at a level that is sustainable, given that host nation’s own resources. A host-nation security forces’ supporting institutions, such as their national level force generation and logistic agencies, must be organized and directed in a manner that adds value to the lower-level, host-nation security forces’ mission requirements. Commitment A host-nation security force must be committed to the peaceful transition of political power. It must also be committed to the security and survival of the state, the rule of law, the preservation of human rights, civil liberties for the population, and to fighting hard (when necessary) to defeat the active insurgency. Confidence A host-nation’s population must believe that its host-nation security forces’ actions are always in the best interests of the people. A host-nation government must believe that its host-nation security force supports that government’s legal authority. Also, the international community must see a host nation’s security force as a force for good that respects human rights and the international law of war. 11-2. To enable a host-nation security force to conduct counterinsurgency operations, United States (U.S.) or multinational forces conduct various security cooperation activities. Commanders often view host-nation security force development as an essential task and one of their primary lines of effort. The resulting increase in a host nation’s ability to secure its own population yields significant benefits because host-nation troops are normally more effective in conducting operations among the local population than U.S. or multinational forces. Transitioning responsibility for operations to the host-nation security force reduces the visible presence of U.S. or multinational troops, further enhancing the legitimacy of the host-nation government. 11-3. Security cooperation can be an effective means to shape and aid a host nation’s counterinsurgency efforts. In the case of El Salvador, the U.S. had limits on its level of direct involvement. The U.S. mainly 13 May 2014 FM 3-24/MCWP 3-33.5 11-1 Chapter 11 provided the government of El Salvador with security assistance. By following an effective strategy that linked this aid to governmental and military reform, the U.S. was able to shape the ongoing counterinsurgency and aid the government of El Salvador in defeating its insurgency. Security Cooperation in El Salvador In 1979, a group of disparate insurgent groups formed a coalition that would become a significant threat to the Salvadoran government. They were opposed by the Salvadoran armed forces, at that time a barracks-bound, defensively minded organization with severe deficiencies in command and control, tactical intelligence, tactical mobility, and logistics. The Salvadoran army did poorly in combat, and its only significant successes early in the conflict were in intimidating and massacring the civilian population. The mid-1980s saw a massive U.S. aid effort, and considerable civilian and military reform. Congressionally constrained to an initial limit of no more than 55 military advisors and no combat troops, U.S. aid consisted of arms, military trainers, and reform and civic action programs. Several of these programs made slow progress because many in the Salvadoran military resented their imposition by an outside power. Though resentful of the imposition, many in the Salvadoran military recognized the incentive structure, where much U.S. aid was contingent on improving El Salvador’s human rights record. Salvadoran Defense Minister Vides Casanova said, “We know that improving our image is worth millions of dollars of aid for the country.” Even if many Salvadoran counterinsurgents were principally motivated by the flow of foreign aid, they did learn, they did increase their competence, and they did improve their human rights behavior. The idea of focusing on all aspects of the struggle, political, social, economic, as well as military, had taken root and continued to the end of the war. 11-4. One issue with developing security forces in counterinsurgency is the issue of the quality versus the quantity of host-nation counterinsurgency forces. In the case of counterinsurgency, quality tends to be more important than quantity. While quantity and quality must be balanced to some degree and “quantity has a quality all its own” to the extent that too small a force will not be able to accomplish its mission, quantity is not a substitute for quality. 11-5. U.S. or multinational efforts to develop the capability and capacity of a host-nation security force must focus on operational and developmental needs of host-nation counterparts. Developing a sound plan to develop a host nation’s capability to address the root causes of the insurgency requires a deliberate, comprehensive assessment of that host nation’s security force. The set of metrics that the U.S. or multinational forces selects to assess a host-nation security force must be appropriate for the type of security force being assessed. For example, assessment of a host-nation army may require a completely different set of criteria from those used to assess a host-nation police force. Likewise, a host nation’s border or customs police, local (city or county) police, and provincial, state, or national police must all be assessed according to their specific mission requirements, while taking into consideration that host nation’s federal or local laws, political considerations, culture, and tribal affiliations. ASSESSING AND DEVELOPING A HOST-NATION FORCE 11-6. Assessment of host-nation army or land forces typically comes more naturally to U.S. or multinational forces than assessing host-nation police forces. It is easier for a Soldier or Marine to assess another Army or Marine Corps unit than it is for a Soldier or Marine to accurately assess a police precinct, fire department, or sanitation department. Developing measures of performance and measures of effectiveness based on their standards and how effective those standards are is important. (See chapter 12 for more information on assessments.) 11-7. One method to create an assessment framework is to form a working group of subject matter experts. This working group will review any lines of effort and tasks identified by the host nation and recommend 11-2 FM 3-24/MCWP 3-33.5 13 May 2014 Working With Host-Nation Forces additions and subtractions based on their expert opinion. They will then identify relevant objective and subjective metrics that accurately measure the capability and capacity of the security force based on its doctrine, organization, training, materiel, leadership, personnel, facilities, policies, and operations. 11-8. U.S. or multinational forces working to develop the capability and capacity of host-nation security forces during the course of counterinsurgency operations must understand the difference between the assessment of host-nation security forces and the fulfillment of higher headquarters’ reporting requirements. Assessment requires a steady, persistent cycle of observation. Those observations help inform plans for subsequent security cooperation activities. They are also generally included in reports that help higher echelons make assessments of the overall effort. However, the data required for a report may not be enough to assess a host-nation security force. Historical examples of these kinds of reports include the operational readiness assessment submitted by advisor teams during operation Iraqi Freedom, and the commander’s unit assessment tool prepared by advisors or partner units during operation Enduring Freedom in Afghanistan. Higher headquarters reports rarely constitute a complete assessment of the host-nation security force at the tactical level. 11-9. Learning from how a host nation fights could benefit U.S. and multinational efforts in countering an insurgency. When the U.S. decides to become involved in an insurgency, U.S. forces need to learn how the host nation fights. If possible, the U.S. should send officers and noncommissioned officers to the host nation’s professional military schools. If the host nation does not have a developed institutional military, the U.S needs to find ways for leaders to observe how the host nation operates. To the extent possible, host-nation forces are built following host-nation doctrine or otherwise following the host nation’s traditional organization and approach. 11-10. Security cooperation is a multi-echelon endeavor that builds the capability and capacity of a host-nation security force at the executive direction, generating force, and operating force functions. During counterinsurgency operations, U.S. or multinational forces may take a bottom-up approach to building a host nation’s capacity to defeat the insurgency and defend its sovereignty by first developing host-nation security forces at the small-unit level. This approach buys time and space for a host nation to develop capacity at higher echelons. In time, a host-nation security force establishes the capacity to generate its own forces through recruiting, vetting, and induction of enlistees as well as officer candidates; initial entry training for all personnel, to include basic warrior or police skills and advanced technical, tactical, and leadership training; and processes for promotion, noncommissioned officer training, and senior leader training. A host-nation security force must also develop processes for acquisition and life-cycle management of major end items, as well as processes for procurement of all classes of supply, and contracting of other services or capabilities. At the executive direction levels, a host-nation security force must establish policies and a system of orders and directives that supports that host nation’s statutory framework and drives standardization of policies and procedures through a top-down flow of information and a robust command inspection program. U.S. or multinational personnel charged with conducting security cooperation activities in a counterinsurgency environment must look beyond the immediate tactical conditions on the ground and collaborate with multiple agencies to develop the supporting infrastructure required for a host-nation security force to sustain and regenerate itself over the long term. 11-11. A bottom up approach does not negate the importance of strategic and operational planning in security cooperation. In fact, decisions made at the strategic level may have strategic value and yet make little tactical or operational sense to local commanders and staffs. The is especially true with foreign military sales. For example, the U.S. may sell a major weapon system to a host nation that has inadequate means to maintain and support that weapon system. However, the sale may accomplish an essential political goal, or it may ensure a continued relationship between the host nation and the U.S. If a host nation is dependent on the U.S. for maintaining a major weapon system, this gives the U.S. influence over that host nation’s decisionmaking process. Tactical leaders must understand how their actions fit into the overall operational approach. 11-12. Counterinsurgency usually requires an adaptable campaign plan that includes specific objectives for all lines of effort, to include host-nation security force development. Comprehensive assessments of host-nation security force units conducted at regular intervals (possibly aligned with reporting requirements) provide critical information that can shape and inform U.S. or multinational units’ goals and objectives for host-nation security force development. One proven technique for creating an adaptable 13 May 2014 FM 3-24/MCWP 3-33.5 11-3 Chapter 11 campaign plan is to prepare a draft plan prior to deployment, and then complete the plan once the initial assessment is complete. Following every subsequent assessment, the U.S. or multinational commander develops new goals and objectives based upon the developmental needs of the host-nation security force, and then the commander issues a fragmentary order with specific tasks for the advisor teams or partner units that support the new goals. 11-13. Host-nation security force developmental goals must include harmonized coordination among the various branches of the host-nation security force, particularly between the land forces and the police. All components of a host-nation security force must understand their own constitutional mandates and limitations. For example, a host-nation army must know if or when it has the authority to detain individuals suspected of a crime. Host-nation police forces must understand and support the rule of law, and ensure that their actions harmonize with the nation’s criminal courts, as well as with the prison system. Finally, when U.S. and multinational forces advise host-nation security force personnel, they must conduct the proper troop-to-task analysis to ensure that land forces orient their operations according to host-nation army doctrine, while police forces should be employed in a way that meets the expectations of a host-nation government and the people they protect. 11-14. Monitoring of host-nation security forces serves multiple functions, including intelligence and operations security. U.S. or multinational forces must always be aware of a host-nation security forces leadership’s loyalty to its host nation and be sensitive to any perceived intentions on the part of a host-nation security force that may run counter to legitimization of its nation’s government. 11-15. Unified action partners advise host-nation security forces to affect changes in the way they operate. If host-nation security forces are efficient across all functions, no advising is necessary. However, the only way a host-nation security force will undergo enduring growth and improvement is if the motivation comes from within. Therefore, advisors must shape host-nation security force actions so that they make their own processes and their systems work as intended. Prior to and during deployment, advisors must apply a motivated approach to learning and understanding a host-nation security force’s organizational design. To build effective working relationships, advisors need to possess a basic understanding of the host nation’s culture, social mores, and taboos. Language capability (focused on rapport-building words and phrases instead of just operational jargon) further enhances an advisor’s credibility and status. The ability to negotiate and communicate diplomatically is essential for effective advising. 11-16. Once the U.S. or multinational forces gain an understanding of their counterparts’ culture and organizational design and have completed an initial assessment of the host-nation security force unit’s capabilities and capacity, advising activities can commence. Advisors consider culture, resources available, and the base line assessment when choosing which advising task to employ when advising the host-nation security force. There are three tasks that impart knowledge to the host-nation security force: teach, coach and advise. Teaching involves a number of activities designed to impart knowledge or skills to host-nation security force counterparts, but the advisor or partner unit drives the process. Coaching also involves the transfer of knowledge, skills, and abilities, but host-nation security force units or individuals assume responsibility for applying what they have learned when executing counterinsurgency tasks. Advising simply involves providing advice to commanders and staffs on their actions. There is no longer a need to actively transfer knowledge. Advising is passive and allows a host nation to be the primary actor. In many counterinsurgencies, the U.S. will only provide equipment, training, and advice. The host nation has a better understanding of the operational environment and is able to better maintain its legitimacy if it does not employ foreign forces directly. Advisors must keep in mind that they are also students and they probably have a great deal to learn from their host-nation counterparts. (See figure 11-1.) 11-4 FM 3-24/MCWP 3-33.5 13 May 2014 Working With Host-Nation Forces Figure 11-1. Host-nation security force meter 11-17. Regardless of the tasks taken to develop the capabilities of a host-nation security force, a key interest of security cooperation in counterinsurgency is to legitimize a host-nation security force in the eyes of its population. This is best accomplished by setting the conditions for a host-nation security force to conduct security and law enforcement operations independently and professionally. 11-18. Assisting a host-nation security force in counterinsurgency means providing or augmenting a host nation’s security forces with U.S. or multinational capabilities or resources that they cannot generate on their own. Forms of assistance may include enablers such information collection assets and capabilities in support of a host-nation security force’s intelligence collection efforts. U.S. or multinational forces may provide assistance in the form of certain battlefield effects such as close air support, electronic warfare, secure long-range communications, or information operations. Assistance to host-nation security forces often complements their nascent logistics capabilities, such as transportation or mobility, medical capabilities, or corrective maintenance support. Assistance may also come in the form of materiel support across one or more classes of supply. For example, the U.S. may provide a host nation with fuel under a bilateral agreement, even if that host nation could acquire its own fuel for operational efficiency. Historically, host-nation security force personnel have shown few reservations about asking U.S. forces for materiel or other forms of assistance. Before providing any of these types of assistance, U.S. forces must ensure legal authorities permit the assistance. When pressed for assistance of any kind, U.S. or multinational personnel should ask themselves three questions: Do my counterparts really need this materiel or capability to accomplish their mission? Is there any way host-nation security forces could procure or acquire this resource or capability using their own systems, processes, or methods? Can host-nation security forces sustain this system or capability over the long term? 11-19. Commanders and staffs should consider the following example. Host-nation security force counterparts suspect that insurgent forces have established camps on the far side of a ridgeline where they assemble and conduct final preparations prior to conducting attacks into major towns in the area. These counterparts ask if the U.S. commander can arrange for unmanned aircraft systems to maintain persistent surveillance over these suspected campsites to provide early warning of pending attacks. By posing the three fundamental questions listed in paragraph 11-18, it may be possible to determine other courses of action whereby a host-nation security force can produce and sustain the same effects. For example, the commander might offer a host-nation security force instruction on how to build an information collection plan and techniques for determining named areas of interest. Next, the advisors could coach their 13 May 2014 FM 3-24/MCWP 3-33.5 11-5 Chapter 11 counterparts on determining what capabilities they have at hand to observe those named areas of interest. Can they establish permanent outposts or temporary observation posts that overlook these named areas of interest? Can they establish or improve relations with local police forces or tribal networks to establish hotlines linking the local population and the host-nation security force? Host-nation security force personnel may often imagine U.S. or multinational technological or logistic capabilities as more powerful than they truly are, and they may also fail to consider or neglect their own capabilities that can ultimately create the same effect. RELATIONSHIPS 11-20. Counterinsurgency operations require well-defined and understood relationships between U.S. and multinational forces and a host-nation security force. Insurgent forces will quickly identify and exploit gaps in counterinsurgents’ leadership and cohesion. Clearly defined relationships that evolve as a host-nation security force’s operational capabilities grow are essential for effective mission command and facilitate a smooth transition to a host-nation security force lead for security. Broadly stated, five possible command relationship types are worth considering for each specific counterinsurgency operation. These relationships are parallel, lead nation, partnered, integrated, and advisory. Each of these relationships requires U.S. or multinational forces to modify or adapt their organizations for combat to complement combined U.S. or multinational and host-nation security force counterinsurgency goals. (See figure 11-2.) Figure 11-2. Counterinsurgency command relationships 11-21. These relationships are useful for tactical and operational forces to understand. However, they are also somewhat different than the relationships found in JP 3-16. While JP 3-16 outlines a command structure in which the joint force can integrate multinational partners, paragraphs 11-22 through 11-26 provide information for understanding how to integrate forces at the tactical and operational level. 11-6 FM 3-24/MCWP 3-33.5 13 May 2014 Working With Host-Nation Forces PARALLEL 11-22. A parallel command is when U.S. or multinational forces maintain their own command structure with no integration or partnership with a host nation. Under a parallel command structure, no single force commander is designated. This arrangement is suitable when a host-nation security force has well established, mature operational and institutional capabilities, and U.S. or multinational forces deploy to provide additional capabilities. The relationship may be based on U.S. forces being given a specific task. For example, U.S. forces may only conduct raids or only gather intelligence for the national command authority. It can also be based on the U.S. forces being given their own area of operations within a host nation. This can be done for various reasons, including that the area is sensitive to host-nation forces and an external counterinsurgent may provide a temporary stabilization of the area. This arrangement supports unit cohesion, and it also supports unity of command. LEAD NATION 11-23. A lead nation structure exists when all member nations place their forces under the control of one nation. This relationship works with one nation’s forces in the lead, and the supporting nation provides a unit or units that are attached to and under operational or tactical control of the lead nation. This arrangement provides flexibility in that the U.S. or multinational force may initially serve as the lead nation, and as the operational capacity of the host-nation security force grows, the host nation can eventually assume the role of lead nation. In also provides a possible means for the U.S. to aid a host nation in an ongoing insurgency. For example, the U.S. could provide a brigade to a host nation in an ongoing insurgency. Like parallel command, this arrangement supports unit cohesion, and it also supports unity of command. PARTNERED 11-24. This arrangement differs from parallel command in that U.S. or multinational forces and host-nation security forces are paired down to the small-unit level. Commanders and staffs must consider how to manage unity of command, logistics challenges, and language and cultural barriers. Partnering has the advantage of maintaining a degree of unit cohesion (individual units are still homogenous), and the specific capabilities of each nation’s force can be leveraged down to the small-unit levels. INTEGRATED 11-25. Integrate means to assemble forces from both the U.S. or multinational and a host-nation security force, and meld them into a single, inseparable unit. Integration, also referred to as augmenting, poses many challenges, but it has been used successfully in the past. For example, the Korean augmentation to the U.S. Army was a very successful program that integrated individual South Korean soldiers into Army units. This yielded units with enhanced manpower, and cultural and linguistic fluency, down to the squad level. The drawback is that integration requires significant time to institutionalize and does little to enable a host-nation security force as a whole to assume lead responsibility for operations. Integration requires a single shared language for all personnel, so either the U.S. or multinational forces will have to learn the host nation’s language or host-nation security force personnel will have to learn English. Furthermore, integration of U.S. and host-nation security forces into a single coherent force requires significant combined training in individual and collective tasks, which will result in a period at the beginning of the deployment when the integrated force is not fully combat capable. This could result in extended deployment periods to compensate for this operational integration and training period. Finally, integration does little to build the capability and capacity of the host nation’s ministerial-level leadership or the security forces’ supporting institutions. ADVISING 11-26. When host-nation security force units achieve a certain degree of organizational maturity at a specific echelon, U.S. or multinational forces may assign individuals or teams of advisors to perform any number of advisory tasks. One advantage of this approach is that is imposes the smallest possible U.S. or multinational force requirement. It also puts the host-nation security force in the most visible role of 13 May 2014 FM 3-24/MCWP 3-33.5 11-7 Chapter 11 providing security to local population. Finally, since the basing and force requirements are relatively small for U.S. or multinational forces, it is the most flexible and adaptable relationship. Advisor teams can be quickly reassigned to different host-nation security force units based upon capability gaps across the host-nation security force. (See FM 3-22 for more information on advisors.) SECURITY COOPERATION PLANNING 11-27. Security cooperation activities occur across the range of military operations. Two important activities relevant to counterinsurgency are foreign internal defense and security force assistance. Foreign internal defense is participation by civilian and military agencies of a government in any of the action programs taken by another government or other designated organization to free and protect its society from subversion, lawlessness, insurgency, terrorism, and other threats to its security (JP 3-22). Security force assistance consists of the Department of Defense activities that contribute to unified action by the US Government to support the development of the capability and capacity of foreign security forces and their supporting institutions (JP 3-22). Moreover, security assistance, which includes activities in which the U.S. provides defense articles, military training, and other defense-related services by grant, loan or credit, could be important in equipping and resourcing a counterinsurgency force. Both foreign internal defense and security force assistance represent important defense activities to build the capacity of a host nation to defeat an insurgency. (For a further discussion on foreign internal defense, security force assistance, and security assistance, see FM 3-22). 11-28. Security cooperation activities are part of both strategy and policy. In planning security cooperation activities, combatant commanders start with the National Security Strategy issued by the White House and expanded upon in overarching Department of Defense (DOD) guidance documents. The National Defense Strategy influences the Guidance for Employment of the Force, which provides the parameters for combatant commands to develop their theater and functional campaign plans, which are the mechanisms to support the synchronization of the comprehensive civilian and military efforts specifically designed to end insurgent violence and facilitate a return to peaceful political processes. The combatant commander’s plans are comprehensive, as they consider design, organization, integration, conditions and objectives for a region during steady state, crisis, and contingency (including counterinsurgency). DOD develops its plans, taking into consideration all relevant stakeholders (including other partner nations and international organizations.) These plans should incorporate the full range of capabilities that are required to meet the desired end state. These plans set conditions for actions that take place throughout all phases of joint operations. (See figure 11-3 for a graphic representation of this relationship.) (See FM 3-22 for a detailed explanation on security cooperation activities and planning.) 11-8 FM 3-24/MCWP 3-33.5 13 May 2014 Working With Host-Nation Forces Figure 11-3. Country planning JOINT PHASING MODE 11-29. Security cooperation takes place during all phases of the joint phasing model. Counterinsurgents may use security cooperation to prevent an insurgency before a major combat operation, during a combat operation, and after a major operation. This can also apply to an active insurgency. While the joint phasing model does not provide a universally prescriptive template for all conceivable joint operations, it does provide a flexible model to arrange operations. The operation plan consists of six phases: Phase 0, shape. Phase I, deter. Phase II, seize the initiative. Phase III, dominate. Phase IV, stabilize. Phase V, enable civil authority. 11-30. Shape, or phase 0, operations of the joint phasing model are joint and multinational operations that include normal and routine military activities. During phase 0, both the Army and Marine Corps perform security cooperation activities as directed in higher plans and orders to indirectly support a host nation in countering an insurgency. Since security cooperation operations can continue through all phases of the operation, many of the activities, such as foreign internal defense direct support and foreign internal defense combat operations, must have the unified application of U.S. forces to achieve the desired effects in countering insurgent operations. This is critically important as these efforts are important elements in phases II and III. Foreign internal defense, security force assistance, and other security cooperation 13 May 2014 FM 3-24/MCWP 3-33.5 11-9 Chapter 11 activities are essential throughout the phases of any operation. (See JP 5-0 for more information on the joint phasing model.) 11-31. If the U.S. commits forces to a counterinsurgency conflict, it will normally deploy a joint task force or multinational joint task force headquarters to provide planning and command and control. The multinational joint task force’s desired end state is to terminate the operation plan at the conclusion of Phase V, stand-down or redeploy the multinational joint task force headquarters, and revert to Phase 0 operations. The geographic combatant command and respective Service component commands, in coordination with the country team, resume security cooperation activities directed by the country plan. Counterinsurgency operations typically extend across all phases (0 through V). Therefore, U.S. or multinational security force assistance and foreign internal defense activities in support of the host-nation security force’s counterinsurgency conflict may occur under the auspices of the American ambassador to the host nation and the geographic combatant commander, or under the authority of the multinational joint task force commander. DEVELOPING HOST-NATION SECURITY FORCES 11-32. Both foreign internal defense and security force assistance can be used as part of a long term plan to develop and deploy a host-nation force to defeat an insurgency. While the U.S. may intervene in a country that only needs enablers to enhance an already effective military force, a host nation may lack an effective military. If the host nation lacks an effective military, aid in the development of that host-nation military could follow five phases: planning and resourcing host-nation security force, generation of host-nation security force, employment of host-nation security force, transition of responsibility for security to host-nation security force, and sustainment of host-nation security force. These phases are distinct and independent of those in the joint phasing model. U.S. or multinational forces conduct parallel planning with their host-nation security force counterparts to achieve strategic, operational, and tactical objectives in support of the overall counterinsurgency campaign, while at the same time working toward milestones that lead to a successful transition from U.S. or multinational lead to host-nation security force lead for security. 11-33. Typically, the first phase of building a host-nation security force, planning and resourcing, falls to the responsibility of geographic combatant command-level planners in coordination with the country team. Coordination of legal authorities and funding for security force assistance and foreign internal defense activities is an interagency process because it typically involves resources provided under a number of different sections of the United States Code (USC). Moreover, other security cooperation programs, such as foreign military sales, may be essential in equipping another military to perform foreign internal defense operations. 11-34. Generating the host-nation security force is the second phase in building a host-nation security force. If the U.S. is deploying conventional forces, this will probably be the initial phase in which regiments or brigade combat teams will actually have an active role. These forces can partner with host-nation security forces of varying developmental levels in the conduct of counterinsurgency operations. For example, while supporting recent counterinsurgency operations in Colombia and the Philippines, host-nation security force counterparts had already fielded relatively sophisticated, well-developed operational units supported by robust supporting institutions and well established executive-level or ministerial leadership. In other U.S. historical counterinsurgency operations such as Afghanistan and Iraq, the host-nation security force operational units, their supporting institutions, and the most senior-level executive leadership functions were undeveloped or completely non-existent. In situations such as these, U.S. and multinational forces must organize, train, and equip host-nation security force units while assisting in the building or rebuilding of their supporting infrastructure. The organize, train, and equip security force assistance tasks may be assigned to U.S. or multinational regiment- or brigade-sized units while they are simultaneously battling the insurgents. At the same time, unified action must be taken to establish a host-nation security force’s own sustainable force generation capabilities and capacity. U.S. or multinational personnel, working with their host-nation security force counterparts, are placed in a difficult predicament in that they must carefully select key host-nation security force leaders to be pulled away from the immediate counterinsurgency fight to assume critical command and staff positions within the host-nation security force’s organizations. Counterinsurgents must exercise restraint by not assigning all of the best host-nation security force leaders to operating force units while neglecting to invest in their own force generation capacity. (See figure 11-4.) 11-10 FM 3-24/MCWP 3-33.5 13 May 2014 Working With Host-Nation Forces Figure 11-4. Phases of building a host-nation security force 11-35. The third phase of building a host-nation security force is the employment of a host-nation security force to protect the population and defeat the insurgents. During this phase, the primary focus shifts from organizing, training, equipping, and rebuilding host-nation security forces to employing host-nation security forces to perform the security tasks for which they were designed. As one host-nation security force unit enters the employment phase, other units may have just begun the force generation process. Meanwhile, there may be more seasoned host-nation security force units that are ready to transition to the lead for security operations in their assigned area of operations. Additionally, it may be possible to generate host-nation police forces more quickly than army units, since they can be employed individually or in small station-level units, they do not need to conduct large-scale collective training exercises, and they typically have fewer materiel requirements. However, it may take considerably longer for police forces to show their effectiveness during the employment phase due to the length of time it takes for police forces to gain the trust of the local population and build productive, enduring relationships with local or tribal leaders. 11-36. The fourth phase of building a host-nation security force in a counterinsurgency is the transition of responsibility for security operations from the U.S. or multinational forces to a host-nation security force. In some instances, such as in Colombia or the Philippines, a host-nation security force may already be mature and highly capable in most or all operational realms (land, air, and maritime). Security force assistance activities and the resulting transition to a host-nation security force lead may refer only to specific functions such as intelligence or an even more discreet set of tactical tasks, such as employment of remote sensors, that supports the host nation’s strategic or operational counterinsurgency goals. In these instances, the U.S. may provide operational capabilities to meet the immediate threat, while conducting security force assistance in the form of equipment or training to close the capabilities gap. Once the capability gap is filled, a host nation’s security force assumes responsibility for that function, and U.S. forces redeploy, with the country team providing the host nation access to long-term security assistance programs as appropriate. 11-37. The defense attaché office and foreign area officers play an important role in long-term security assistance programs. In other cases such as Iraq, U.S. or multinational forces may initially have to assume responsibility for all security tasks in all operational realms, and across all security force functions (land forces, police, and border security). In the latter case, transition is a lengthy process with no clearly defined beginning or end date. 11-38. Transition will likely be conducted in steps or subphases, and the steps or subphases may be geographic, functional, or a combination of both. For example, the transition to host-nation security force lead for land force security operations may transpire one province at a time until the entire country has transitioned. A second example might be for transition to occur for land forces across the entire country by 13 May 2014 FM 3-24/MCWP 3-33.5 11-11 Chapter 11 January 20XX, all police forces by June 20XX, and air and maritime forces by December 20XX. A transition to a host-nation security force lead should be conditions or assessments-based, although the U.S. or multinational forces may elect to use a set transition date as a forcing function to compel the host-nation security forces to assume greater responsibility for securing their own country and their own people. Transitions will rarely be simple. In cases where U.S. or multinational general-purpose brigade combat teams deploy for extended tours such as 12-month rotations, units may find that they are supporting the host-nation security force transition to lead for security when they arrive in-country and still supporting the same transition when they redeploy one year later. 11-39. The fifth phase of building a host-nation security force in counterinsurgency is sustainment. In this context, the term sustainment does not refer exclusively to logistic sustainment or sustainment functions. Rather, sustainment is an ongoing set of security assistance activities (Title 22) and security cooperation activities (Title 10) designed to enhance the capabilities and capacity of a host nation to provide for its own security and to participate in regional or global multinational operations. These programs also seek to develop enduring relationships with key leaders within the host-nation security force and to facilitate peacetime or contingency access to host-nation facilities such as ports, airfields, and training venues. As the transition to the host-nation security force lead for security draws to a close, there may be a number of security force assistance tasks that require an extended period to be completed properly. Examples include foreign military sales of new equipment such as tanks, artillery, helicopters, or watercraft and subsequent deployment of mobile training teams to train the host-nation security force on the employment of these new weapons systems. Enduring geographic combatant command-level security cooperation activities, such as rotational deployment of U.S. forces to conduct combined exercises with the host-nation security force, sustain and extend the development of the capability and capacity of a host-nation security force to deal with residual insurgent threats and potential future external threats to that host nation’s sovereignty. 11-40. In a counterinsurgency, the host-nation security force’s executive and ministerial leadership, its force generation capacity, and its operating forces’ capabilities must develop and mature quickly, while U.S. or multinational forces initially provide time in the form of security to allow this process to succeed. U.S. or multinational forces gradually reduce and eventually relinquish control of the counterinsurgency to a host-nation security force. Parallel planning with a host-nation security force provides the blueprint for what must occur from the U.S. or multinational side and a host-nation security force side of an operation. Both entities plan for transition to host-nation security force lead, but they approach the transition from different perspectives. Initially, teaching, coaching, and advising host-nation security forces in their planning efforts is part of the overall process, but it ultimately should result in a host-nation security force having the capability and capacity to defeat an insurgency on its own. PARALLEL PLANNING 11-41. When enabling a host nation to develop a security force, parallel planning is essential. Parallel planning is a time-saving technique that enables leaders at all levels from fire team to division to initiate the operations process (plan, prepare, execute, and assess) prior to the receipt of a complete operation order. Parallel planning allows units to generate tempo by conducting a multi-tiered planning process. This reduces haste and provides all echelons more available time to prepare for future actions. Likewise, parallel planning with host-nation security forces enables greater efficiency and the ability to conduct simultaneous actions. It also serves as an essential step in the host-nation security force transition to the lead for security in a counterinsurgency. 11-42. Parallel planning with the host-nation security force assumes adequate planning capabilities on the part of at least some of the host-nation security force commanders and staffs. When making this assumption, U.S. or multinational forces assume operational risks relating to the ability of the host-nation security force staffs to deliver on their planning requirements. Considerations when conducting parallel planning with the host-nation security force commanders and staffs may include, but are not limited to, varying or competing agendas, lower literacy rates, access to computer technology, and use of graphics or visuals. U.S. commanders and staffs conducting parallel planning consider these points: 11-12 FM 3-24/MCWP 3-33.5 13 May 2014 Working With Host-Nation Forces U.S. or multinational forces have their own national security objectives, while host-nation counterparts may have conflicting objectives from the national to the local level. Literacy rates in many of the countries that the U.S. or multinational forces may partner with are often far below that of the U.S. or other western countries. Lack of formal education, however, does not preclude the host nation from being capable of understanding the western style of military planning. Access to computer technology in various host nations often does not match that of the U.S. or western countries. Commanders and staffs may have to use manual methods of data collection, storage, and dissemination. Instructional programs, whether computer based or done on a terrain model, are based on western preference for the presentation of information through visual modalities. Successful counterinsurgency operations require U.S. or multinational advisors to imbue their host-nation security force counterparts with the capability to process raw data into information that provides knowledge and leads to an understanding of an operational environment. Security classification of host-nation counterparts. Foreign disclosure restrictions. 11-43. Regardless of the difficulties of parallel planning, U.S. and multinational forces make every effort to understand host-nation planning capabilities prior to conducting operations. Despite the many challenges presented by conducting parallel planning with host-nation security forces, U.S. and multinational forces should be completely integrated into the planning process as early as possible because the host nation can potentially bring to the counterinsurgency specific and essential abilities. (See table 11-2 for examples of host-nation contributions.) Table 11-2. Host-nation contributions Task Reason for contribution Understand an operational environment An area of operations is a host nation’s home and its culture; a host-nation force knows the language, the different groups, the political situation, educational levels, economic considerations, historical bad actors, and unofficial community leaders. Provide human intelligence Host-nation security forces may be able to better gather information that leads to human intelligence for many reasons, including speaking the same language and understanding the important players in the area. Put the pieces together Host-nation forces can often better integrate the different fragments of intelligence into the context of an operational environment. Determine credibility of intelligence assets (sources, walk-ins, call-ins) Host-nation forces possess a vastly superior sense of cultural intelligence and may be able to assist in assigning credibility to sources. Validate and check interpreters Host-nation forces can assist in confirming the locally hired interpreters’ abilities to interpret. Identify and root out infiltrators Host-nation forces can pick out minute differences between normal and abnormal behaviors. Gain information superiority Host-nation forces can help write messages that may resonate with the local population. Vet locally hired personnel for counterintelligence and security purposes Host-nation forces have access to resources not necessarily available to U.S. personnel. 11-44. Tactical-level planners in the U.S. military employ either the military decisionmaking process or the Marine Corps planning process to gain an understanding of an operational environment, identify the 13 May 2014 FM 3-24/MCWP 3-33.5 11-13 Chapter 11 tactical problem, develop possible courses of action, and evaluate and select the best course of action to most effectively address the tactical problem. Commanders and staffs first properly frame the problem. When given a set of inputs, such as an order from higher headquarters or some other initiating directive, certain intelligence products, and an initial commander’s visualization, commanders and staffs complete the steps to work toward a specified output, such as a finished operation order. In cases where host-nation security force leaders have been directly involved in combat operations over many years, those leaders who survive often owe their lives to their own ability to improvise. As a result, many host-nation security force leaders apply an intuitive, instead of a process-oriented, method of making decisions. They can immediately size up a tactical situation, almost instantaneously recognize dangers and opportunities, and decide upon a course of action. While this capability can serve in critical situations, it cannot be taught to others, and it is of no use in situations unrelated to the leader’s own experiential learning. Therefore, U.S. or multinational advisors may have to work patiently with their host-nation security force counterparts for them to develop a planning and decision support process instead of allowing them to rely solely on the intuitive approach. 11-45. U.S. and multinational planners ensure that they have conducted basic mission analysis prior to parallel planning with host-nation partners. This allows advisors to develop and assess assumptions, identify implied and specified tasks, determine what assets and capabilities are available, and formulate a tentative timeline to coordinate advisory efforts throughout the planning process. 11-14 FM 3-24/MCWP 3-33.5 13 May 2014 Chapter 12 Assessments 12-1. Assessment is a continuous process that measures the overall effectiveness of employing joint force capabilities during military operations. It is also a determination of the progress toward accomplishing a task, creating a condition, or achieving an objective (JP 3-0). The assessment process monitors the effects of actions on mission accomplishment. Operational assessments have three enduring purposes. First, they monitor the nature, scope, and severity of a situation. Second, they track a military force’s implementation of a plan in combination with collaborating agencies. Finally, operational assessments evaluate progress towards achieving goals or objectives. Commanders and staffs must integrate assessments into the Army design methodology and conceptual planning. Assessments are crucial for successful adaptation and innovation by commanders within their respective areas of operation. Assessments are also essential in any type of transition. They are a key ingredient in adapting and learning. Assessments must be part of initial design. Commanders and staffs must conceptualize what is actually important and determine how to question those assumptions from the beginning of understanding a problem. (See ADRP 5-0 and ADRP 6-0 for doctrine on assessments.) Assessment precedes and is integrated into every operations activity and entails two broad, enduring tasks: Continuously monitoring the current situation (including the environment as it affects friendly forces, enemy forces, and the population) and the progress of the operation. Evaluating the operation against established criteria, expected outcomes, and the desired end state. 12-2. Commanders, assisted by their staffs, continuously evaluate an operation’s progress against the established commander’s intent, mission, and concept of the operation. Based on their assessments, commanders may adjust the operation and associated activities to better achieve the end state and adjust assessment criteria to address the most credible and relevant activities. 12-3. The critical role of assessment necessitates establishing measures of effectiveness and performance during planning. Commanders choose these measures carefully so that they align with the overall operational design and the superior commander’s intent. These measures reflect the interrelationship among the lines of effort. Commanders and staffs revise their assessment and measures of effectiveness and performance as an operation progresses to most effectively focus limited collection and analytical resources. 12-4. Sound assessment blends qualitative and quantitative analysis with the judgment and intuition of all leaders. Commanders must apply assessments carefully, as counterinsurgency operations most often involve complex societal issues that may not lend themselves to quantifiable measures of effectiveness. Moreover, bad assumptions and false data can undermine the validity of both assessments and conclusions drawn from them. Data and metrics can inform a commander’s assessment. However, they must not be allowed to dominate it in uncertain situations. Subjective and intuitive assessment must not be replaced by an exclusive focus on data or metrics. Commanders must exercise their professional judgment in determining the proper balance. ASSESSMENT FRAMEWORKS 12-5. Several assessment frameworks have been developed over the past decade. Depending on their specific purpose, they can be used as tools to develop an interagency initial assessment, assess conflicts, or measure progress. For example, the Interagency Conflict Assessment Framework is a recognized and very useful initial assessment framework (See United States [U.S.] Government publication Interagency Conflict Assessment Framework). Alternatively, units may use some form of systems analysis based on the operational variables. 13 May 2014 FM 3-24/MCWP 3-33.5 12-1 Chapter 12 ASSESSMENT METHODS 12-6. Selecting the appropriate approach to assessment is the commander’s most important assessment decision. Assessment methodologies may be centralized, decentralized, or both. A centralized methodology requires units to collect and report information requirements to their higher headquarters for analysis and situational understanding. This is a common methodology and is often described as pattern and trend analysis. Pattern and trend analysis uses centralized quantitative analysis to produce a snapshot of the operation’s momentum over time. Pattern and trend analysts tend to accept that counterinsurgency data will be inaccurate and incomplete, but when viewed in aggregate this data will be sufficient to produce relevant, centralized, and quantifiable analysis. Pattern and trend analysis measures progress, but it is not truly an assessment. The problem with the centralized approach to assessment is that the decentralized nature of counterinsurgency prevents the development of any centralized model to understand the important nuances of local context. Decentralized assessments enable subordinate units to develop and measure progress locally. The interaction between levels of command is critical to informing the higher commander. Although decentralized assessments are preferred by the lower tactical levels, actual measurement of progress is limited by the lack of a common starting point. This often gives the best picture of a local situation, but it lacks the context of how it compares to other locations. Senior commanders must weigh the results by comparing assessments with dissimilar measurements. This makes the development of an aggregate analysis very difficult. 12-7. Military forces in counterinsurgencies usually use a combination of these two assessment methods, choosing common reporting requirements for all subordinates but also requiring a subjective analysis from each of the subordinate commanders to aid in informing the senior commanders’ situational understanding. Units report qualitative statistics to enable pattern analysis, and commanders provide quantitative analysis to fully depict what the statistics mean at the local level. The combined assessment involves a top down planning, bottom-up refinement approach in which analysis is conducted at the level the data is collected and reports to higher headquarters include narratives from local commanders. This type of assessment eschews the establishment of core level metrics at the highest levels and allows commanders to establish additional metrics in accordance with their situation and their resources. Combined assessment generally results in more accurate reporting and efficient use of collection and analysis resources. 12-8. In geographically distributed, decentralized counterinsurgency campaigns, only a few activities produce similar outcomes or are consistently implemented across the theater of operations. What is important in one area may not be important in another. Similarly, what works in one area may not work in another area. ASSESSMENT CONSIDERATIONS 12-9. Assessment begins as soon as a military force receives an alert or warning and does not end until after that force has ceased operations and left the area of operations. Assessment begins with an initial assessment that serves as the basis for planning. Planning develops this into an operational assessment that evaluates plan effectiveness and focus. The assessment is continually reassessed. Often plans are updated because of the reassessment process. 12-10. The assessment should reflect the achievements of collaborating partners. Military forces cannot defeat an insurgency alone. Assessors must realize that information about the underlying root causes for social, cultural, political, and economic turbulence will probably be incomplete. Obtaining reliable information can be costly and time-consuming. Assessors should be extremely wary of methods that claim to provide this information quickly. An assessment based on faulty information can result in military force actions that are counterproductive. It is better for assessors to monitor the situation, track what every organization is doing, and be clear about what they do not know. The next step is to postulate, hypothesize, and clearly state what assumptions the evaluation process is making. Assessors seek information to test assumptions and revise estimates as operations continue. 12-11. At its core, a counterinsurgency environment is a political problem. Understanding and solving the political problem is the essence of counterinsurgency operations. A counterinsurgency environment is complex, with many lines of effort covering a variety of political, military, economic, social, infrastructural, and informational activities. As such, developing a comprehensive assessment is a 12-2 FM 3-24/MCWP 3-33.5 13 May 2014 Assessments time-consuming process that is difficult to perform properly and effectively. Counterinsurgents must assess not only their own actions or inactions, but also those of insurgents and the population. In understanding these actions and inactions, counterinsurgents must have a thorough knowledge of the history and culture of their areas of operations. These assessments must include, among many other factors, the context for any given situation, the perceptions of those involved, and the possible outcomes of actions or inactions. 12-12. Commanders are responsible for assessments. The commander’s direct and personal involvement in the assessment process is critical. Moreover, assessments must contain both subjective and objective elements. Assessments combine elements of science and art. They are not simply a collection of numbers or indicators. Commanders and staffs must understand assessments in the context of the overall campaign, not just from a military perspective. 12-13. Countering an insurgency most often involves an extended campaign. Counterinsurgents must assess actions or inactions broadly, to include how they are viewed locally, within the multinational force (if one exists), host nation, and the region. Counterinsurgents also assesses actions against host-nation strategic goals. Without the backing of each of these levels, counterinsurgents risk loss of legitimacy and potential failure. 12-14. Eliminating the root causes of an insurgency is the goal of a counterinsurgency. Assessment must focus on those activities and actions that are most important in addressing these root causes. Assessment must be focused on gathering the right information needed to understand what to do. The commander must determine if counterinsurgents are doing things right, if counterinsurgents are doing the right things, and if change is necessary. 12-15. Balanced assessments include information from all relevant and objective sources, including both quantitative and qualitative data. This data includes the proper combination of centralized and decentralized reporting. A balanced assessment includes countering opinions and data that contradict overall findings. A combination of quantitative and qualitative types of indicators reduces the chance of misconstruing trends. 12-16. No assessment will ever show all the aspects of a counterinsurgency campaign. Efforts to show all aspects of a counterinsurgency waste resources and place unrealistic demands on subordinate units that often result in falsified reporting. Assessment should rely principally on information gathered through ongoing intelligence and operational reporting. Demands for additional reporting should be minimized. 12-17. There is no substitute for seeing a battlefield as a means for understanding a situation. Battlefield circulation is critical to establishing relationships between commanders at all levels. The view of a commander who daily walks and lives in a particular area of operations provides a level of insight that no statistic or report can replace. These first-hand encounters provide commanders a lens with which to review and compare centralized reports and trend analysis with the intuition and local understanding of subordinate commands. 12-18. Collecting, assembling, and analyzing information is a time and labor-intensive process. Commanders balance time and resources for assessment just as they do across the planning, decision, and execution continuum. To help achieve this balance, commanders and staffs ask the following questions: What must be understood to begin planning? What will be assessed and to what detail? How will a particular task, objective, end state condition, or assumption be assessed? What measures of effectiveness and measures of performance will be used? What information requirements (indicators) are needed to support a particular assessment? Who on the staff has primary responsibility for assessing a particular area? What is the collection plan? How can the host nation help? How can the other agencies of the U.S. government assist? DEVELOPING MEASUREMENT CRITERIA 12-19. Assessment requires determining why and when progress is being achieved along each line of effort. Traditionally, commanders use discrete quantitative and qualitative measurements to evaluate 13 May 2014 FM 3-24/MCWP 3-33.5 12-3 Chapter 12 progress. However, the complex nature of counterinsurgency operations makes progress difficult to measure. Subjective assessment at all levels is essential to understand the diverse and complex nature of counterinsurgency problems. It is also needed to measure local success or failure against the overall operation’s end state. Additionally, commanders need to know how actions along different lines of effort complement each other; therefore, planners evaluate not only progress along each line of effort but also interactions among lines of efforts. 12-20. The most common types of assessment measures are measures of effectiveness (MOEs) and measures of performance (MOPs). A measure of effectiveness is a criterion used to assess changes in system behavior, capability, or operational environment that is tied to measuring the attainment of an end state, achievement of an objective, or creation of an effect (JP 3-0). MOEs focus on the results or consequences of actions. MOEs answer the question, “Are we achieving results that move counterinsurgents towards the desired end state, or are additional or alternative actions required?” A measure of performance is a criterion used to assess friendly actions that is tied to measuring task accomplishment (JP 3-0). MOPs answer the question, “Was the task or action performed as the commander intended?” 12-21. MOEs and MOPs for assessing counterinsurgency operations are designed with the same characteristics. MOEs and MOPs are measurable, observable, distinctive, relevant, and responsive: MOEs and MOPs have quantitative or qualitative standards against which they can be measured. The most effective measurement is a combination of quantitative and qualitative measures to guard against an inaccurate view of results. Each MOE and MOP measures a separate, distinct aspect of the task, purpose, or condition. MOEs and MOPs are relevant to the measured task, outcome, and condition. Host-nation local, regional, and national leaders, and NGO personnel, may provide practical ideas, professional ideas, and feedback to craft relevant MOPs and MOEs. Assessment tools detect environmental and situational changes. DESIGNING MEASURES OF EFFECTIVENESS AND PERFORMANCE 12-22. An MOE provides some information about how an operational environment is changing. An MOE of a number of attacks on counterinsurgents can indicate a successful counterinsurgency, or it can indicate insurgent control of an area and an unwillingness of counterinsurgents to contest that control. In this example, commanders and staffs need to understand why the number of attacks are down. What is essential to any MOE is the development of an effective measure that tells the commander critical information about how an operational environment is changing. 12-23. Moreover, in developing MOPs, commanders and staffs measure a unit’s performance based on the conditions of its area of operations. In other words, MOPs should be developed as a means to measure if a unit is effectively doing the things that the commander and staff view as essential to defeating an insurgency. MOPs are developed based on a counterinsurgency mission and an area of operations. 12-24. When designing MOEs and MOPs, commanders and staffs consider several points: Raw counts of something is usually not as important as how many out of a possible total and how important each one is. Knowledge of the state of insurgent training may provide information about the overall capability of the insurgency. If an insurgency can produce trained units, it may have a higher military and sustainment capacity. Training in other states could indicate support from another state. A high number of un-coerced informant reports could be an important indicator of a breakdown in insurgent security. Also, the position of the informer in the society might be an important indicator. The number of insurgent attacks is not always as important as the scale of an insurgent attack. Large-scale attacks require a level of operational sophistication that may imply an increased insurgent capability. 12-4 FM 3-24/MCWP 3-33.5 13 May 2014 Assessments How many insurgents are caught and jailed may be an important MOE. However, the number convicted and sentenced by government judicial authorities and remaining in jail over time is also an important MOE of governmental capability and corruption. The number of recruits available for an insurgency can be an important indicator of the government’s and the insurgency’s legitimacy. An MOP based on the number of patrols in a given area over a period may not be as effective as the persistence of patrols in a given area over the same period of time. An MOE based on the amount of money seized may not be as important as an MOE based on denying funding sources. It may simply show an increased flow of funds into an area. 12-25. When developing MOPs and MOEs, commanders and staffs avoid developing MOPs or MOEs that highlight what a commander and staff are actively doing to defeat an insurgency. For example, building a number of schools can be used as an MOP, and the number of students in the school can be used as an MOE. However, these activities may have no effect on an insurgency at all. Commanders and staffs connect MOEs and MOPs to their operational environment and insurgency. Accepting the assumption that what one is doing is actually relevant to defeating an insurgency is an easy means to undermine the effectiveness of MOPs and MOEs. Commanders and staffs avoid the trap of thinking that because they do something and measure it, it is important. 12-26. Commanders and staffs generally avoid measures that lack context. For example, the number of enemy killed, without any context, is normally a dangerous MOP. The number of enemy killed can indicate that the insurgency is increasing its recruitment and capabilities, thus more insurgents are being killed in more attacks. Commanders and staffs establish some context in any measure that they use. 12-27. Vietnam highlights the importance of creating an assessment framework that is contextual to the insurgency and is relevant to actually measuring success. In Vietnam, U.S. leadership made assumptions about what were important measures of success without connecting those measurements to situational understanding. Many U.S. leaders did not actively question their assumptions. Even worse, their ineffective assessment framework had an influence on operations. Measuring Effectiveness and Performance in Vietnam Historical accounts of the conflict in Vietnam vary widely in the points emphasized and the explanations offered. Disputes are facilitated by the different personal experiences of many different direct observers who saw or participated in sometimes very different slices of the conflict at different times, at different operational levels, and in different parts of the country. What, if anything, could have been done to change the outcome of the war and who to blame for that outcome remains fairly hotly contested. What the outcome was, however, is not contested: U.S. forces withdrew in 1973, and the Saigon government fell to the combined pressure of the insurgency and North Vietnamese regular forces in April of 1975, unequivocally a counterinsurgent loss. The literature on the U.S. military’s Vietnam-era assessment process is highly negative; even the most strident defenders of the assessment reports produced during that period expressed some dissatisfaction with the process. Assessments of the Vietnam War varied in type, purpose, and intended consumer. The entire process changed and grew between the early 1960s and the early 1970s; there was no single “Vietnam War assessment.” There were many assessment processes, and many were burdened with murky objectives, measures that were poorly connected to those objectives, and poor data collection. Quantitative data of questionable veracity were used to make optimistic prognostications, such as the illusion of a trend toward “a light at the end of the tunnel.” Distrust of Vietnam-era military briefings became so endemic that members of the press corps referred to the daily military press briefings as the “five o’clock follies.” The Military Assistance Command, Vietnam, or MACV, was the theaterlevel military command in Saigon, South Vietnam. MACV was the neck of the funnel for nearly all field reports on operations, intelligence, pacification, and other data 13 May 2014 FM 3-24/MCWP 3-33.5 12-5 Chapter 12 categories. Some of the MACV reports and nearly all of the Secretary of Defense’s reports relied heavily on aggregated quantitative data and pattern and trend analysis. In some cases, data collection requirements were developed to meet perceived operational or strategic needs; in other cases, they were specifically designed to provide data that would show some kind of progress without context. For example, in 1968, MACV reported the number of cakes of soap it had issued to Vietnamese villagers in 1967 (572,121), an irrelevant input metric. More famous (or infamous) is the use of “body counts” as a primary progress metric. Not only were body counts a poor proxy for progress driven by an untenable assumption about adversary attrition, but data collected were wildly inaccurate because of the adversary emphasis on reclaiming bodies, difficult terrain, duplicate reporting, and the temptation to exaggerate, among other reasons. Assessment of the Vietnam War was haphazard before MACV became a theater combat command in the early 1960s. Between the mid-1960s and the early 1970s, MACV and the Office of the Secretary of Defense (with Central Intelligence Agency assistance) created the single largest and most comprehensive military counterinsurgency assessment apparatus in the history of warfare. It involved the efforts of hundreds of thousands of military personnel, civilians, Vietnamese nationals, intelligence experts, and analysts over the course of several years. These contributors produced hundreds of millions of data items (in Department of Defense [DOD] parlance), tens of thousands of tactical and operational analytic reports, and hundreds of comprehensive assessments that addressed nearly every aspect of the war. Data flowed up from the hundreds of thousands of troops on the ground, province advisors, military advisors to Republic of Vietnam units, U.S. civilian officials, and U.S. intelligence officers, as well as Republic of Vietnam military units, government agencies, and civilian development teams. These data points were then fed into catalogs and computer databases, including the Hamlet Evaluation System, the Terrorist Incident Reporting System, the Territorial Forces Effectiveness System, the Pacification Attitude Analysis System, the Situation Reports Army File, and many others. “Data” could mean anything from a simple number (for example, rounds fired in a single artillery attack) to a more complex set of ostensibly correlated survey data (for example, hamlet evaluation data). Assessment in Vietnam was non-trivial: A July 26, 1970, U.S. military intelligence briefing listed 44 provinces, 257 districts, 2,464 villages, 11,729 hamlets, and 1,500 miles of coastline from the demilitarized zone with North Vietnam to the border with Cambodia in the Gulf of Siam. The challenges of assessment in Vietnam are the same challenges faced in any counterinsurgency: How should policymakers determine progress and decide strategy if all they have to choose from is inaccurate, decontextualized, and aggregated numbers or thousands of pages of lengthy narrative? While it is not possible to state that poor assessment led to the loss of the Vietnam War, the war was distinguished by internal confusion, poor decisionmaking, and, ultimately, strategic defeat. It is apparent from analyzing the way in which assessments were presented and used that they contributed to many of the poor decisions that led to this defeat. BROAD INDICATORS OF PROGRESS 12-28. Numerical and statistical indicators have limits when measuring social environments. For example, in South Vietnam U.S. forces used the body count to evaluate success or failure of combat operations. Yet, the body count only communicated a small part of the information commanders needed to assess their operations. It was therefore misleading. Body counts can be a partial, effective indicator only when adversaries and their identities can be verified. (Normally, this identification is determined through a uniform or possession of an insurgent identification card.) Additionally, an accurate appreciation of what insurgent casualty numbers might indicate regarding enemy strength or capability requires knowing the exact number of insurgent armed fighters initially present. In addition, this indicator does not measure 12-6 FM 3-24/MCWP 3-33.5 13 May 2014 Assessments several important factors. For example, it does not measure which side the local population blames for collateral damage, whether this fighting and resultant casualties damaged the insurgent infrastructure and affected the insurgency strategy in that area, and where families of dead insurgents reside and how they might react. Within the essential services lines of effort, the number of schools built or renovated does not equate to the effective operation of an educational system, nor is it as important as the number of children in school. Moreover, counterinsurgents should question whether the number of children taught is an important measure at all. 12-29. Planners start with broad measures of social and economic health or weakness when assessing environmental conditions. Examples of possible counterinsurgency indicators include— Acts of violence (numbers of attacks and friendly or host-nation casualties). Dislocated civilians. The number, population, and demographics of dislocated camps or the lack of lack of camps are indicators of overall security and stability. A drop in the number of people in camps often indicates a return to normalcy. The numbers of people and families exiled from or fleeing their homes and property and people returning to them are measurable and revealing. Human movement and religious attendance. Religious activity can be used as a measure of religious freedom and of how much confidence the population has in their government’s security. Possible indicators include the ability or lack of ability of religious pilgrims to move about the country. Development and active use of places of worship. Number of religious structures (for example, temples, churches, mosques, religious schools) closed by a government. Presence and activity of small- and medium-sized businesses. When danger or insecure conditions exist, these businesses close. Patrols can report on the number of businesses that are open and how many customers they have. Tax collections may indicate the overall amount of sales activity. Level of agricultural activity: Is a province, region, or nation self-sustaining, or must life-support type foodstuffs be imported? How many acres are under cultivation? Are the fields well maintained and watered? Are agricultural goods getting to market? Has the annual need increased or decreased? Presence or absence of associations. The formation and presence of multiple political parties indicates more involvement of the people in government. Meetings of independent professional associations demonstrate the viability of the middle class and professions. Trade union activity indicates worker involvement in the economy and politics. Government services available. Examples include— Police stations operational and police officers present throughout the area. Clinics and hospitals in full operation, and whether or not new facilities sponsored by the private sector are open and operational. Schools and universities open, functioning, with increasing attendance over time. Freedom of movement of people, goods, and communications. This is a classic measure to determine if an insurgency has denied areas in the physical, electronic, or print domains. Tax revenue. If people are paying taxes, this can be an indicator of host-nation government influence and subsequent civil stability. Industry exports. Employment or unemployment rate over time. An increasing employment rate over time is generally a sign of stability. Amount of electricity produced. Increasing production of electricity is associated with provisions for essential services. However, increased stability often results in greater demand so care must be taken in the use of this indicator. Specific attacks on infrastructure. 13 May 2014 FM 3-24/MCWP 3-33.5 12-7 Chapter 12 ASSESSMENT CELL 12-30. An assessment cell normally shadows the planning effort, looking for areas of the plan that may require assistance in measuring progress toward planned goals and the purpose of the operation. Assessing progress is the responsibility of all staff sections and not the sole responsibility of any one staff section or command post cell. Each staff section assesses the operation from its specific area of expertise. However, staff sections must coordinate and integrate their individual assessments and associated recommendations across the warfighting functions to produce comprehensive assessments for the commander, particularly in counterinsurgency operations. 12-31. The function and purpose of an assessment cell or working group must include not only the assessment of the plan and progress of operations, but also the effects of those operations on operational environments. To understand the effect, it is important to assess not only what happened or how, but why a particular result was achieved. This level of understanding aids in informing future decisions and plans. 12-32. In counterinsurgency operations, especially in widely decentralized operations, assessment cells with analysts are organized down to and including the battalion level. This capability greatly assists in the development of bottom-up assessment metrics that provide context and balance for other types of assessment. DIRECTED TELESCOPE TECHNIQUE 12-33. The directed telescope technique aids commanders with assessments by providing eyes on the ground. Military commanders often find value in a separate and objective source of information regarding actions and events “on the ground.” 12-34. When using the directed telescope technique, commanders send trusted subordinates and teams to the battlefield to swiftly assess and report. This helps commanders get a sense for what is transpiring in the field. This technique does not take the place of regular after action reviews or reporting, but instead it helps commanders confirm or deny the visual image they have of how operations are going and the impact their troops efforts’ are having. 12-35. The duties of a team assigned to a directed telescope mission include a variety of skills and qualities to be successful. They include— Good judgment. Unfailing tact. Initiative. Sympathy, which implies a desire to help rather than to criticize. Acute perception, coupled with exactness and accuracy in determining facts. Ability to express themselves and deliver impartial reports in the clearest and most concise terms. Good tactical knowledge. 12-36. Instead of spying or informing the commander on personnel or single events, the focus is to provide advice to units based on their findings, report trends to the commander, and most importantly provide recommendations that are feasible, acceptable, and suitable. 12-37. The directed telescope technique can work at various echelons and can be included when battalion and brigade staff and personnel are supporting subordinate units in information analysis, operations, planning, and training. 12-8 FM 3-24/MCWP 3-33.5 13 May 2014 Chapter 13 Legal Considerations 13-1. Counterinsurgency operations are complex and raise challenging legal issues for Soldiers, Marines, and their commanders. Counterinsurgency commanders, staffs, and planners should consult their servicing legal advisors often in their initial planning and as they encounter changing conditions that may change the application of relevant legal authorities. This chapter is not intended as a complete legal guide or a substitute for legal advice, but rather serves to alert counterinsurgency leaders of some of the more common legal issues that may affect United States (U.S.) counterinsurgency operations. This summary cannot replace a consultation with the unit’s supporting legal advisor. 13-2. All U.S. military operations, including counterinsurgency operations, are governed by U.S. domestic law, the international law binding on the U.S. (to include the law of war), and U.S. policy and regulations. A number of areas of the law are critical for counterinsurgency operations, including the authority to deploy forces and conduct counterinsurgency operations in the first instance, the laws governing the conduct of operations, and the laws that fund counterinsurgency operations. The law of war, including the treatment of civilians and detainees, and the application of rules of engagement, in particular, are critical issues that have a significant impact on the conduct of counterinsurgency operations. AUTHORITY TO ASSIST A FOREIGN GOVERNMENT 13-3. In addition to the authorities to use military force, through a variety of statutes contained in Title 10, United States Code (USC) and Title 22, USC, Congress has authorized and directed the Department of Defense (DOD) and Department of State, respectively, to provide assistance to foreign governments relevant to counterinsurgency. For example, U.S. forces may be called upon to provide foreign internal defense or training to foreign security forces (such as military forces and police). AUTHORITY FOR FOREIGN INTERNAL DEFENSE 13-4. The President or Secretary of Defense may issue a deployment or execution order, which may authorize U.S. forces to make limited contributions during operations that involve foreign internal defense. If the Secretary of State requests and the Secretary of Defense approves, U.S. forces can participate in foreign internal defense. The request and approval may go through the standing statutory authorities in Title 22, USC. Among other foreign relations programs, Title 22 contains the Foreign Assistance Act and the Arms Export Control Act. Programs under Title 22 authorize security assistance, developmental assistance, and other forms of aid. The request and approval might also occur under various provisions of Title 10, as well. Title 10 authorizes certain types of military-to-military contacts, exchanges, exercises, and limited forms of humanitarian and civic assistance in coordination with the U.S. ambassador for the host nation. In such situations, U.S. military personnel ordinarily work as administrative and technical personnel of the embassy. They are part of the U.S. diplomatic mission, pursuant to a status of forces agreement, or pursuant to an exchange of notes. This cooperation and assistance is limited to liaison, contacts, training, equipping, and providing defense articles and services. It does not include direct involvement in operations. GENERAL PROHIBITION ON ASSISTANCE TO POLICE 13-5. The Foreign Assistance Act specifically prohibits assistance to foreign police forces except within carefully circumscribed exceptions. The lead role in providing police assistance within those exceptions normally has been delegated to the Department of State's Bureau of International Narcotics and Law Enforcement Affairs. U.S. commanders are not able to train foreign law enforcement personnel unless given specific legal authority. That said, Congress granted DOD the authority to train the police forces of Iraq and Afghanistan. Moreover, Congress has provided limited authority for U.S. forces to train foreign law enforcement personnel in counternarcotics and counter narco-terrorism operations 13 May 2014 FM 3-24/MCWP 3-33.5 13-1 Chapter 13 RULES OF ENGAGEMENT 13-6. Rules of engagement are directives issued by competent military authority that delineate the circumstances and limitations under which United States forces will initiate and/or continue combat engagement with other forces encountered (JP 1-04). Often these directives are specific to an operation. Absent operation-specific rules of engagement, U.S. forces apply the standing rules of engagement. When working with a multinational force, commanders must thoroughly coordinate the rules of engagement. MISSION-SPECIFIC RULES OF ENGAGEMENT 13-7. The standing rules of engagement provide a mechanism for combatant commanders to develop mission-specific rules of engagement by implementing supplemental measures within their discretion, or by submitting a request for supplemental measures to the Secretary of Defense for approval. These mission-specific rules of engagement are then passed down the chain of command in the form of a rules of engagement execute order, fragmentary order, or other formal operational tasking. The combatant commander and subordinate commanders must follow these mission-specific rules of engagement. Combatant commanders may augment the rules of engagement as necessary by implementing supplemental measures within their authority to approve. Both combatant commanders and subordinate commanders are required to notify the Secretary of Defense of any restrictions placed on the Secretary of Defense-approved mission-specific rules of engagement. Commanders at all levels are required to evaluate the rules of engagement and request changes if they determine the rules of engagement are inadequate for the mission. 13-8. Taken as a whole, the rules of engagement regulate the conduct of U.S. forces for the application of force for mission accomplishment and the exercise of self-defense. For instance, for mission accomplishment, U.S. forces may be authorized to engage enemy forces declared hostile anywhere in the area of operations at anytime without the need to observe a hostile act or demonstrated hostile intent. With respect to self-defense, unit commanders always retain the inherent right and obligation to exercise unit self-defense in response to a hostile act or demonstrated hostile intent. U.S. forces may exercise individual self-defense in response to a hostile act or demonstrated hostile intent; however, unit commanders may limit individual self-defense by members of their unit. The rules of engagement in counterinsurgency operations change from time to time. To meet the ever-changing operational environment, supplemental measures and the level of force commanders employ from day to day may change often. Commanders must regularly review the rules of engagement for their effectiveness in a complex counterinsurgency environment. Counterinsurgency leaders should frequently train their Soldiers and Marines in the application of the rules of engagement to the situations they may encounter in the area of operations so their actions become instinctive, effective, and legally sound. MULTINATIONAL RULES OF ENGAGEMENT 13-9. U.S. forces assigned to the operational or tactical control of a multinational force follow the rules of engagement of the multinational force for mission accomplishment, if authorized by the Secretary of Defense. U.S. forces retain the right of self-defense. Apparent inconsistencies between the right of self-defense contained in U.S. rules of engagement and the rules of engagement of the multinational force will be submitted through the U.S. chain of command for resolution. While final resolution is pending, U.S. forces will continue to operate under the U.S. rules of engagement. When U.S. forces, under U.S. operational or tactical control, operate with a multinational force, reasonable efforts are made to develop combined or common rules of engagement. If common rules of engagement cannot be developed, U.S. forces operate under U.S. rules of engagement. The multinational forces will be informed prior to U.S. participation in the operation that U.S. forces intend to operate under U.S. rules of engagement. U.S. forces remain bound by international agreements to which the U.S. is a party even though other multinational force members may not be bound by them. The U.S. does not interpret any international agreements, such as status-of-forces agreements, to limit U.S. forces’ right of self-defense. LAW OF WAR 13-10. Counterinsurgency operations may occur in both an international armed conflict (state versus state) and a non-international armed conflict (state versus armed nonstate actor). Situations can occur, such as 13-2 FM 3-24/MCWP 3-33.5 13 May 2014 Legal Considerations during occupation, where armed forces are engaged in combat with armed nonstate actors, or other persons who are not part of a state’s armed forces. Any hostilities between state and non-state actors may rise to the level of a non-international armed conflict. A non-international armed conflict may exist in the same area of operations as an ongoing international armed conflict. An armed conflict exists whenever there is a resort to armed force between states (in an international armed conflict) or protracted armed violence between governmental authorities and organized armed groups or between such groups within a state (in a non-international armed conflict). Regardless of the context, U.S. forces obey the law of war. The U.S. is bound by the law of war treaties to which it is a party, as well as binding norms of customary international law. 13-11. The law of war is the branch of international law applicable to the conduct of armed conflict and concerns the rights and relationships among the participants and victims of armed conflicts. It is often called the law of armed conflict or international humanitarian law. The law of war generally regulates the use of force to the amount necessary to achieve the aim of the conflict and spares those who do not or no longer directly participate in hostilities. The purposes of adhering to the law of war include— Ensuring good order and discipline. Fighting in a disciplined manner consistent with U.S. national values. Maintaining domestic, international, and local support. Protecting combatants, noncombatants, and civilians from unnecessary suffering. Safeguarding persons who fall into the hands of an enemy. Facilitating the restoration of peace. 13-12. The primary sources of the law of war include the various Hague Conventions, the four Geneva Conventions of 1949, the 1980 UN Conventional Weapons Convention and its five protocols, and customary international law. Many nations that have been recent coalition partners with the U.S. are also parties to two additional 1977 protocols to the Geneva Conventions, Additional Protocol I and Additional Protocol II. However, the U.S. is not a party to these two protocols. Without recognizing the authority of these two protocols, the U.S. recognizes that many of their provisions, some of which are discussed in this manual, are either an accurate statement of the law or consistent with U.S. practice. 13-13. The law of war is based on the following fundamental principles: First, military necessity, that is, that a belligerent is justified in applying those measures not forbidden by international law which are indispensable for securing the complete submission of the enemy as soon as possible. Second, humanity, which requires military forces to avoid inflicting gratuitous violence on the enemy. Third, discrimination, which posits that military attacks should be directed at combatants and other military targets, not civilians or civilian property. Fourth, proportionality, expressed in the concept that the expected incidental loss of civilian life, injury to civilians, and damage to civilian objects must not be excessive in relation to the concrete and direct military advantage anticipated. MILITARY NECESSITY 13-14. The principle of military necessity is expressed in Article 23(g), of Hague IV Annex., which forbids a belligerent to destroy or seize the enemy’s property, unless such destruction or seizure be imperatively demanded by the necessities of war. While no law of war treaty defines military necessity, its role is recognized in many treaties to which the U.S. is a state party. Moreover, the U.S. has defined military necessity in its law of war manuals. Military necessity is that principle which justifies those measures not forbidden by international law which are indispensable for securing the complete submission of the enemy as soon as possible. (See FM 27-10 for more information on military necessity.) 13-15. Military necessity does not authorize all military action and destruction. Under no circumstances may military necessity authorize actions specifically prohibited by the law of war, such as the murder of prisoners of war, ill-treatment of prisoners of war or internees, the taking of hostages, or the execution of a reprisal against a person or object specifically protected from reprisal. Civilian objects are generally 13 May 2014 FM 3-24/MCWP 3-33.5 13-3 Chapter 13 protected from intentional attack or destruction. However, civilian objects may lose their protections if they are being used for military purposes, or there is a military necessity for their destruction or seizure. Civilian objects may, in such circumstances, become military objectives, and if so, the law of war permits their destruction. In treaties such as Hague IV and its annex and the Geneva Conventions, where an express prohibition has been stated, neither military necessity nor any other rationale of necessity may override that prohibition. In short, the principle of military necessity authorizes that use of force that is required to accomplish the mission, but it does not authorize acts otherwise prohibited by the law of war. This principle must be applied in conjunction with other law of war principles as well as other, more specific legal constraints set forth in law of war treaties to which the U.S. is a party. HUMANITY, UNNECESSARY SUFFERING, OR SUPERFLUOUS INJURY 13-16. The right of belligerents to adopt means of injuring the enemy is not unlimited, as Hague IV Annex, Article 22, states. Article 23(e) then captures the essence of the Law of War principle of humanity as it prohibits the employment of arms, projectiles, or material calculated to cause unnecessary suffering. The principle of humanity is also called the principle of unnecessary suffering or superfluous injury. The terms unnecessary suffering and superfluous injury are regarded as synonymous. Although neither of the terms is defined, they are understood to refer to injury to persons, rather than damage to objects. The prohibition of unnecessary suffering constitutes acknowledgement that the suffering of combatants is lawful and expected, and may include severe injury or loss of life. As a general proposition, the suffering inflicted by weapons or munitions would be deemed unnecessary only if— Its use was calculated to cause unnecessary suffering. The inevitable result of the normal use causes an injury the nature of which is considered by governments as manifestly disproportionate in relation to the military advantage anticipated from employment of the weapons or munitions. 13-17. Weapons’ or munitions’ effects must be weighed in light of comparable lawful weapons and munitions in use on the modern battlefield. A weapon cannot be declared unlawful merely because it may cause severe suffering or injury. The appropriate determination is whether a weapon’s or munitions’ employment for its normal or expected use would be prohibited under some or all circumstances. The correct criterion is whether the employment of a weapon for its normal or expected use inevitably would cause injury or suffering manifestly disproportionate to its military effectiveness. A state is not required to foresee or anticipate all possible uses or misuses of a weapon or munitions, since almost any weapon or munition can be misused in ways that might be prohibited. 13-18. Under the law of war, combatants may kill or wound enemy combatants and civilians taking a direct part in hostilities; such acts are legitimate if accomplished with lawful means and methods. For example, the prohibition of unnecessary suffering does not limit the bringing of overwhelming firepower on an opposing military force in order to subdue or destroy it. What the law of war does prohibit is the design, modification, or employment of a weapon or munitions for the purpose of increasing or causing suffering beyond that required by military necessity. DISCRIMINATION 13-19. The principle of discrimination, sometimes referred to as the principle of distinction, is the international law obligation of parties to a conflict to distinguish between the civilian population (or individual civilians not taking a direct part in the hostilities) and combatant forces when engaged in military operations, directing the application of force solely against personnel belonging to the latter. Similarly, military force may be directed only against military objects or objectives, and not against civilian objects. A military objective is not limited to military bases, forces, or equipment, but includes other objects that contribute to an opposing state’s ability to wage war. Additionally, a civilian object is immune from intentional attack unless and until it loses its protected status through enemy abuse of that status. The principle of discrimination also provides civilians immunity from direct attack for as long as they take no part in hostile acts against military forces. 13-20. The principle of discrimination applies to military forces engaged in offensive or defensive operations, and to governments providing protection for their civilian population and civilian objects. Each 13-4 FM 3-24/MCWP 3-33.5 13 May 2014 Legal Considerations government and its military forces, as well as armed nonstate parties to a conflict, are obligated to separate their military or other fighting forces and military objects from the civilian population and civilian objects, to take steps to protect the civilian population (or civilians within its control) through affirmative steps such as evacuation from the vicinity of military operations or air raid precautions, and to minimize or avoid actions that might otherwise place the civilian population at risk from lawful military operations by the opposing force. The employment of voluntary or involuntary human shields to protect military objectives, individual military units, or military personnel is a violation of the law of war principle of discrimination. 13-21. Physical damage or destruction of property is an inevitable and lawful aspect of combat. Military equipment (other than military medical equipment and transportation) is subject to lawful attack and destruction at all times. Civilian objects, including cultural property, are protected from seizure or intentional attack unless there is military necessity for their seizure or destruction, that is, they become military objectives. Destruction of civilian objects that is expressly prohibited, or that is not justified by military necessity, or that is wanton or excessive, is unnecessary destruction for which a commander may be culpable. 13-22. The civilian population and individual civilians not taking a direct part in hostilities are protected from intentional attack. Where civilians are present on the battlefield or in proximity to legitimate military objectives, or they are being used to shield legitimate targets from an attack that otherwise would be lawful, they are at risk of injury incidental to the lawful conduct of military operations. A law of war violation occurs when— The civilian population is attacked intentionally. Civilian casualties incidental to an otherwise lawful attack become excessive in relation to the concrete and direct military advantage to be gained and are attributed to the wanton conduct of an attacking force, for which the defending force or individual civilians or groups of civilians (such as voluntary human shields) bear no responsibility. A defender or attacker employs civilians as voluntary or involuntary human shields. Each of these acts constitutes a violation of the principle of discrimination. 13-23. The law of war does not expressly prohibit civilians from taking a direct part in hostilities. If they do, however, they may be targeted for so long as they take a direct part. Civilians do not enjoy the combatant’s privilege—that is, they do not have combatant immunity—and if captured, they may be prosecuted for their belligerent acts under the domestic law of the captor. Civilians engaging in belligerent acts not only forfeit their immunity from direct attack; they also make it more difficult for military personnel to apply the principle of discrimination and, thereby, put all civilians at risk. There is no definition of direct part in hostilities in treaty law or customary international law. At a minimum, it encompasses actions that are belligerent per se, that is, by their very nature and purpose can be expected to cause actual harm to an enemy. In general, the qualification of an act as direct participation in hostilities is a fact-dependent analysis that must be made after analyzing all relevant available facts, in the circumstances prevailing at the time. 13-24. Within an international armed conflict or a non-international armed conflict, the armed forces of a state may engage in hostilities with armed nonstate actors. This is the classic counterinsurgency environment. While most international armed conflict involves warfare between the armed forces of two or more states, situations can occur, such as during occupation, where such armed forces and other armed security forces of the state (including police forces) are engaged in combat with armed nonstate actors, or other persons who are not part of a state armed force. These groups can take a variety of forms, including an organized resistance movement that belongs to a state party but fails to meet the requirements for prisoner of war status under the Geneva Convention Relative to the Treatment of Prisoners of War Article 4A (2), or a terrorist organization such as al Qaeda that, without regard to compliance with any of the other requirements of Article 4A(2) (such as being under responsible command, wears fixed distinctive sign recognizable at a distance, carries arms openly, and conducts operations in compliance with the law of war), operates without any authorization or affiliation with a state and thereby falls outside of the Geneva Convention’s protections. An individual who is formally or functionally part of an organized armed group that is engaged in hostilities may be targeted at any time. In essence, membership in armed forces or armed groups (such as the status of belonging to such a group) and direct participation in hostilities (such as a conduct-based standard) are separate bases for targeting under the law of war. 13 May 2014 FM 3-24/MCWP 3-33.5 13-5 Chapter 13 13-25. U.S. practice is that the designation of an armed nonstate group as hostile (as such targetable at all times) and its members as direct participants in hostilities, should only be made by an official authorized to do so. Without such a designation, the determination of whether a civilian may be targeted depends on whether that civilian is committing specific acts that amount to hostile acts or demonstrations of hostile intent, in accordance with the standing rules of engagement. In addition, individual conflicts may involve specific rules of engagement that incorporate direct participation in hostilities analysis. PROPORTIONALITY 13-26. Proportionality requires that the anticipated loss of life and damage to property incidental to attacks must not be excessive in relation to the concrete and direct military advantage expected to be gained. Proportionality is process-oriented rather than result-oriented. Decisionmakers are expected to take all feasible precautions in planning military operations, but they remain dependent on the (often imperfect and incomplete) information available at the time to weigh the risk these operations may pose to the civilian population. In this context, proportionality may be viewed as a fulcrum upon which military forces and commanders must weigh the legitimate destructive effect of an attack (the law of war principle of military necessity) against the undesirable incidental effects of an attack (such as the risk of death or injury to civilians not taking a direct part in hostilities). Proportionality may be applied by decisionmakers at the national, strategic, operational, or tactical level. 13-27. Proportionality does not prohibit destruction for which there is military necessity, or limit the degree of engagement of enemy military forces in the absence of civilians or civilian objects. In particular, it does not prohibit bringing overwhelming firepower to bear on an opposing military force to subdue or destroy it. Nor does it prohibit injury to civilians that is incidental to lawful military operations. As used in this context, proportionality constitutes an acknowledgment of the unfortunate inevitability—but lawfulness—of incidental injury to civilians not taking a direct part in hostilities, or of the incidental damage or destruction of civilian objects, despite precautions, in the execution of legitimate military operations, particularly when these persons or objects have been intermingled with military forces or objectives. 13-28. Proportionality is weighed by a commander in determining whether, in engaging in offensive or defensive operations, that commander’s actions may be expected to cause incidental loss of civilian life, injury to civilians, damage to civilian objects, or a combination thereof, that would be excessive in relation to the concrete and direct military advantage anticipated by those actions. The military advantage anticipated is intended to refer to the advantage anticipated from those actions considered as a whole, and not only from isolated or particular parts thereof. Generally, military advantage is not restricted to tactical gains, but is linked to the full context of a war strategy. HONOR 13-29. Honor has long been a basis of warrior ethos and of the law of war. Honor demands a certain mutual respect and trust between opposing forces. It denounces and forbids resort to dishonorable means, expedients, or conduct that would constitute a breach of trust. An example of this form of honor is the use of a white flag, which in land warfare represents a flag of truce. Its display is predicated upon good faith. Its misuse is prohibited and constitutes a war crime. Another example of how honor applies comes from law of war requirements regarding the treatment of persons hors de combat—that is, military personnel who are no longer able to fight due to sickness, injury, or wounds, or because they are shipwrecked. The principle of honor (and other humanitarian considerations) requires that an individual who is hors de combat be treated and protected in the same manner as one would wish to be treated and protected by the enemy if the roles were reversed. However, this principle is not dependent upon reciprocity. THE SOLDIER’S AND MARINE’S BASIC RULES 13-30. It is DOD policy that members of DOD components comply with the law of war during all armed conflicts, however such conflicts are characterized (such as international armed conflict or non-international armed conflict), and in all other military operations. The law of war principles discussed in paragraphs 13-13 through 13-29 can be safely applied by Soldiers and Marines by adhering to the following ten basic rules: 13-6 FM 3-24/MCWP 3-33.5 13 May 2014 Legal Considerations Soldiers and Marines fight only enemy combatants. Soldiers and Marines do not harm enemies who surrender. They disarm them and turn them over to their superiors. Soldiers and Marines do not kill or torture enemy prisoners of war or detainees. Soldiers and Marines collect and care for the wounded, whether friend or foe. Soldiers and Marines do not attack medical personnel, facilities, or equipment. Soldiers and Marines destroy no more than the mission requires. Soldiers and Marines treat all civilians humanely. Soldiers and Marines do not steal. They respect private property and possessions. Soldiers and Marines do their best to prevent violations of the law of war. Soldiers and Marines report all violations of the law of war to their superior. 13-31. When working with host-nation or local friendly forces in a counterinsurgency, it is critical to both teach and enforce these rules among allies and friendly forces. Following the law of war is a critical component of counterinsurgency operations that directly supports the accomplishment of the strategic mission to defeat the insurgency and establish local rule by gaining the trust of the local civilian population, or at a minimum, enabling a local population to cease active support of an insurgency. Violations of the law of war have a direct and significant negative impact on the ability to conduct successful counterinsurgency operations. 13-32. The law of war includes rules governing situations in which the military forces of one state occupy the territory of another. Occupation is not a transfer of sovereignty. It does, however, grant the occupying power the authority and responsibility to restore and maintain public order and safety. The occupying power must enforce, as much as possible, the laws in force in the host nation. One of the four Geneva Conventions of 1949—the Geneva Convention Relative to the Protection of Civilian Persons in Time of War—becomes a prominent source of law during occupation, as well as the Hague Convention IV Regulations of 1907. NON-INTERNATIONAL ARMED CONFLICT 13-33. The full body of the law of war only applies during international armed conflict. It does not apply during a non-international armed conflict. This does not mean no rules apply during a non-international armed conflict. For instance, the law of war principle of distinction still applies. It requires force to be directed at combatants and not innocent civilians, and a proportionality analysis is required when targeting combatants and military objectives if civilians or civilian objects may be impacted. Counterinsurgency operations are almost certain to be a feature of non-international armed conflict, the most common form of armed conflict today. During counterinsurgency operations, Common Article 3 of the Geneva Conventions applies. Commanders must be aware of Common Article 3, and the basic protections that must be afforded to insurgents or others captured by U.S. forces, as well as the status of insurgents under the laws of the host nation. GENEVA CONVENTION, COMMON ARTICLE 3 13-34. Although insurgencies can occur within the context of an international armed conflict, they are classically conflicts between states and non-state actors that are considered to be non-international armed conflicts. 13-35. It bears emphasis, however, that one article contained in all four of the Geneva Conventions— Common Article 3—is specifically intended to apply to non-international armed conflicts. Common Article 3 affords significantly fewer protections to combatants fighting in a non-international armed conflict than does the full body of the law of war in an applicable international armed conflict. However, it does set a simple baseline of humane protection, along with fundamental rules that reflect the principles captured in the broader law of war. 13-36. Common Article 3 requires that in the case of armed conflict not of an international character (a non-international armed conflict) occurring in the territory of one of the high contracting parties to the 13 May 2014 FM 3-24/MCWP 3-33.5 13-7 Chapter 13 Geneva Conventions, each party to the conflict shall be bound to apply, as a minimum, to six provisions of Common Article 3. (See figure 13-1 for a list of these provisions.) (1) Persons taking no active part in the hostilities, to include members of armed forces who have laid down their arms and those placed hors de combat by sickness, wounds, detention, or any other cause, shall in all circumstances be treated humanely, without any adverse distinction founded on race, color, religion or faith, sex, birth or wealth, or any other similar criteria. (2) To this end, the following acts are and shall remain prohibited at any time and in any place whatsoever with respect to the above-mentioned persons: (a) Violence to life and person, in particular murder of all kinds, mutilation, cruel treatment and torture; (b) Taking of hostages; (c) Outrages upon personal dignity, in particular humiliating and degrading treatment; (d) The passing of sentences and the carrying out of executions without previous judgment pronounced by a regularly constituted court, affording all the judicial guarantees which are recognized as indispensable by civilized peoples. (3) The wounded and sick shall be collected and cared for. (4) An impartial humanitarian body, such as the International Committee of the Red Cross, may offer its services to the Parties to the conflict. (5) The Parties to the conflict should further endeavor to bring into force, by means of special agreements, all or part of the other provisions of the present Convention. (6) The application of the preceding provisions shall not affect the legal status of the Parties to the conflict. Figure 13-1. Provisions binding high contracting parties APPLICATION OF CRIMINAL LAWS OF A HOST NATION 13-37. There is no concept of prisoner-of-war status in non-international armed conflict, as reflected in Common Article 3. Insurgents may be prosecuted by a host nation as criminals for offenses related to participation in hostilities, such as bearing arms against government forces. Similarly, U.S. forces captured by insurgents are not prisoners of war, but must be treated in accordance with Common Article 3. U.S. forces conducting counterinsurgency operations should remember that the insurgents are, as a legal matter, criminal suspects within the legal system of a host nation. To support criminal prosecution of insurgents, counterinsurgents must develop and implement procedures to carefully preserve weapons, witness statements, photographs, and other evidence collected at a scene. This evidence is used to process the insurgents into a host-nation legal system and hold them accountable for their crimes, thus promoting the rule of law. 13-38. U.S. personnel may be subject to host-nation law, depending on the terms of any existing status of forces agreement between a host nation and the U.S. Status of forces agreements establish the legal status of military personnel in foreign countries and generally provide the U.S. military some level of protection from host-nation criminal jurisdiction. In the absence of an agreement or some other arrangement with the host nation, DOD personnel in foreign countries may be subject to the criminal law of that host nation. DETENTION AND INTERROGATION 13-39. Human intelligence is essential in counterinsurgency operations. Acquiring human intelligence requires interrogation. The need for intelligence within a counterinsurgency, especially in conjunction with a third country or host-nation capture and detention scenario, can create great pressure to obtain time-sensitive information from detained individuals and suspected insurgents. Soldiers and Marines adhere to only approved detainee handling methods and interrogation techniques. In addition to complying with the law of war, U.S. forces must comply with domestic legal authorities such as the Detainee 13-8 FM 3-24/MCWP 3-33.5 13 May 2014 Legal Considerations Treatment Act of 2005, DODD 3115.09, FM 2-22.3, and other specific standards that guide U.S. forces working with detainees. DETAINEE TREATMENT ACT OF 2005 13-40. U.S. law prohibits U.S. forces, including officials from other government agencies, from using certain methods to obtain information. In response to documented instances of detainee abuse, to include maltreatment involving interrogation, Congress passed, and the President signed into law, the Detainee Treatment Act of 2005. (See table 13-1 for an extract of the Detainee Treatment Act of 2005.) Table 13-1. Extract of the Detainee Treatment Act of 2005 Section 1002: Uniform Standards for the Interrogation of Persons Under the Detention of the Department of Defense (a) In General.—No person in the custody or under the effective control of the Department of Defense or under detention in a Department of Defense facility shall be subject to any treatment or technique of interrogation not authorized by and listed in the United States Army Field Manuel on Intelligence Interrogation [FM 2-22.3]. (b) Applicability—Subsection (a) shall not apply with respect to any person in the custody or under the effective control of the Department of Defense pursuant to a criminal law or immigration law of the United States. (c) Construction.—Nothing in this section shall be construed to affect the rights under the United States Constitution of any person in the custody or under the physical jurisdiction of the United States. Section 1003: Prohibition on Cruel, Inhuman, or Degrading Treatment or Punishment of Persons Under Custody or Control of the United States Government (a) In General—No individual in custody or under the physical control of the United States Government, regardless of nationality or physical location, shall be subject to cruel, inhuman or degrading treatment or punishment. (b) Construction—Nothing in this section shall be construed to impose any geographical limitation on the applicability of the prohibition against cruel, inhuman, or degrading treatment or punishment under this section. (c) Limitation on Supersedure.—The provision of this section shall not be superseded, except by a provision of law enacted after the date of the enactment of this Act which specifically repeals, modifies, or supersedes the provisions of this section. (d) Cruel, Inhuman, or Degrading Treatment or Punishment defined.—In this section, the term “cruel, inhuman, or degrading treatment or punishment” means the cruel, unusual, and inhumane treatment or punishment prohibited by the Fifth, Eighth, and Fourteenth Amendments to the Constitution of the United States, as defined in the United States Reservations, Declarations and Understandings to the United Nations Convention Against Torture and Other Forms of Cruel, Inhuman, or Degrading Treatment or Punishment done at New York, December 10, 1984. INTERROGATION FIELD MANUAL 13-41. The Detainee Treatment Act established FM 2-22.3 as the legal standard for interrogations. U.S. forces may not use any interrogation technique other than those prescribed by FM 2-22.3. Commanders ensure that interrogators receive proper training and supervision. Executive Order 13491 extends this requirement to all U.S. government agencies. STANDARDS FOR DETENTION AND INTERNMENT 13-42. Regardless of the precise legal status of those persons captured, detained, or otherwise held in custody by U.S. forces, they must receive humane treatment until properly released to host-nation authorities, who then assume legal responsibility. They must be provided the minimum protections of Common Article 3 to the Geneva Conventions. Specially trained, organized, and equipped military police units in adequately designed and resourced facilities should accomplish prolonged detention. Such 13 May 2014 FM 3-24/MCWP 3-33.5 13-9 Chapter 13 detention must follow the detailed standards contained in Army Regulation 190-8/Marine Corps Order 3461.1. Military police operating such facilities shall not be used to assist in or set the conditions for interrogation. TRANSFER OF DETAINEES TO THE HOST NATION 13-43. There are certain conditions under which U.S. forces may not transfer the custody of detainees to the host nation or any other foreign government. U.S. forces retain custody if they have substantial grounds to believe that the detainees would be in danger in the custody of others. Such danger could include being subjected to torture or inhumane treatment. (See DODD 2310.01E for more information on transferring detainees and consult the legal advisor or staff judge advocate.) ENFORCING DISCIPLINE OF U.S. FORCES 13-44. Despite rigorous selection and training, some personnel will commit infractions requiring discipline. The Uniform Code of Military Justice is the criminal code applicable to all U.S. military members and, in time of declared war or contingency operations, other persons serving with or accompanying U.S. armed forces in the field. Commanders and general officers are responsible for their subordinates and their behavior. Commanders must give clear guidance and ensure compliance. All civilians, including contractors, working in support of operations of the U.S. forces overseas must comply with the law of war. UNIFORM CODE OF MILITARY JUSTICE 13-45. Although most well-led and well-trained U.S. military personnel perform their duties honorably and lawfully, some will commit various crimes, including violations of the law of war. U.S. military personnel remain subject at all times to the Uniform Code of Military Justice. Suspected criminal behavior must be investigated and, where appropriate, remedied by corrective action. This includes violations of orders, maltreatment of detainees, assaults, thefts, sexual offenses, destruction of property, and other crimes, to include homicides, which may be committed during a counterinsurgency. All reportable incidents committed by or against U.S. personnel, enemy persons, or any other individual must be reported promptly, investigated thoroughly, and, where appropriate, remedied by corrective action. A reportable incident is a possible, suspected, or alleged violation of the law of war, for which there is credible information, or conduct during any operation in the range of military operations that would constitute a violation of the law of war if it occurred during an armed conflict. COMMAND RESPONSIBILITY 13-46. In some cases, military commanders may be deemed responsible for crimes committed by subordinates or others subject to their control. This situation arises when the criminal acts are committed pursuant to the commander’s order. A commander is legally responsible for a war crime committed by that commander’s subordinates if that commander knew, or should have known, that the subordinates were about to commit the violation and the commander did nothing to prevent it or that the subordinates had committed the violation and the commander failed to address the violation. Commanders must know that under international law, commanders are responsible if they know, or should have known, their subordinates are about to commit or have committed a violation of the law of war. In a counterinsurgency environment, where compliance with the law of war is critical to the success of the mission, commanders should expect to be held accountable for failing to report and investigate reportable incidents. Commanders may not ignore credible information that indicates U.S. forces may have committed, intend to commit, or are in the process of committing violations of the law of war. In addition, commanders must pay close attention to the command climate within their units. Commanders must foster a climate through leadership and training that helps Soldiers and Marines understand the critical need to abide by the law of war, in particular, to distinguish between civilians and insurgents, to refrain from unnecessarily harming civilians, and to treat detainees in accordance with all applicable laws, policies, and regulations. 13-10 FM 3-24/MCWP 3-33.5 13 May 2014 Legal Considerations GENERAL ORDERS 13-47. Orders issued by general officers in command during counterinsurgency will include provisions, such as a prohibition against drinking alcohol or against entering host-nation places of religious worship, important to maintaining discipline of the force. These types of orders safeguard the image of U.S. forces and promote the legitimacy of a host-nation government. These types of orders are readily enforceable under the Uniform Code of Military Justice. CIVILIAN PERSONNEL AND CONTRACTORS 13-48. Modern counterinsurgency operations involve many DOD civilians as well as civilian personnel employed by government contractors. These civilians may be made subject to general orders. They are subject to U.S. laws and to the laws of the host nation. These civilians may be prosecuted or receive adverse administrative action by the U.S. or contract employers. Article 2(a)(10) of the Uniform Code of Military Justice provides court-martial jurisdiction over persons serving with or accompanying an armed force in the field during a time of declared war or a contingency operation. Under this authority, commanders have Uniform Code of Military Justice authority to disarm, apprehend, and detain DOD civilians and contractors suspected of having committed a felony offense in violation of the rules for the use of force, or outside the scope of their authorized mission, and to conduct the basic Uniform Code of Military Justice pretrial process and trial procedures currently applicable to courts-martial of military service members. Before bringing a DOD civilian or contractor to a court-martial, however, the Department of Justice must have the opportunity to review and determine whether it will pursue the matter pursuant to the Military Extraterritorial Jurisdiction Act. This act extends federal criminal jurisdiction over felony offenses committed by DOD civilians, contractor personnel, and others while employed by or accompany the armed forces overseas. The Military Extraterritorial Jurisdiction Act is implemented within the DOD by DODI 5525.11. Third country nationals employed by U.S. forces are covered under the Military Extraterritorial Jurisdiction Act, but host-nation personnel are not. TRAINING AND EQUIPPING FOREIGN FORCES 13-49. Foreign forces need training and equipment to be effective. U.S. laws require Congress to authorize such expenditures. U.S. laws require the Department of State to verify that the host nation receiving the assistance has not engaged in a consistent pattern of gross violations of internationally recognized human rights. All training and equipping of foreign security forces must be specifically authorized. Usually, DOD involvement is limited to a precise level of man-hours and materiel requested from the Department of State under the Foreign Assistance Act or Arms Export Control Act. The President may authorize deployed U.S. forces to train or advise host-nation security forces as part of an operational mission. In this case, DOD personnel and operation and maintenance appropriations provide an incidental benefit to those security forces. All other weapons, training, equipment, logistic support, supplies, and services provided to foreign forces must be paid for with funds appropriated by Congress for that purpose. Examples include the Iraq Security Forces Fund and the Afghan Security Forces Fund appropriations. Moreover, the President must give specific authority to DOD for its role in such training and equipping efforts. 13-50. In counterinsurgency, like all operations, commands require specific authority to expend funds. That authority is normally found in the National Defense Authorization Act (NDAA), specifically, operation and maintenance funds. In recent counterinsurgency operations, Congress appropriated additional funds to commanders for the specific purpose of dealing with counterinsurgency. Recent examples include the Commanders’ Emergency Response Program, Global Train and Equip Program, and the Global Security Contingency Fund. DOD FUNDS GENERALLY NOT EXPENDABLE BY COMMANDERS FOR THIS PURPOSE 13-51. Congress specifically appropriates funds for foreign assistance. The United States Agency for International Development expends such funds under the legal authorities in Title 22. Provisions of Title 22 authorize small amounts of money. These funds are appropriated annually for commanders to provide humanitarian relief, disaster relief, or civic assistance in conjunction with military operations. These 13 May 2014 FM 3-24/MCWP 3-33.5 13-11 Chapter 13 standing authorities are narrowly defined and generally require significant advance coordination within the DOD and the Department of State. As such, they are of limited value to ongoing counterinsurgency operations. COMMANDER’S EMERGENCY RESPONSE PROGRAM 13-52. The Commanders’ Emergency Response Program is a statutory authorization to obligate funds from the DOD operation and maintenance appropriation for the primary purpose of authorizing U.S. military commanders to carry out small-scale projects designed to meet urgent humanitarian relief requirements or urgent reconstruction requirements within their areas of responsibility that provide an immediate and direct benefit to the people of Afghanistan. When authorized, Commanders’ Emergency Response Program authority is found in annual NDAAs. Notably, the authority to use Commanders’ Emergency Response Program in Iraq was specifically repealed, eliminating the use of Commanders’ Emergency Response Program in Iraq. The Commanders’ Emergency Response Program is one of the most important authorities commanders have in Afghanistan. 13-53. Some NDAAs include waiver authority for certain contracting requirements for the Commanders’ Emergency Response Program, enabling the use of streamlined contracting procedures. For example, one NDAA provided that, “[f]or purposes of the exercise of the authority provided by this section or any other provision of law making funding available for the [Commanders’ Emergency Response Program] ... the Secretary may waive any provision of law not contained in this section that would (but for the waiver) prohibit, restrict, limit, or otherwise constrain the exercise of that authority.” As a result, the Secretary of Defense has periodically waived the Competition in Contracting Act requirements for Commanders’ Emergency Response Program-funded projects. Therefore, Commanders’ Emergency Response Program-funded projects did not need to follow the competition requirements of the Federal Acquisition Regulation. 13-54. In addition to being authorized for certain types of projects to assist the civilian population affected by an insurgency, Commanders’ Emergency Response Program funds are often available for payment to host-nation civilians in certain specified situations. For example, under the Commanders’ Emergency Response Program for Afghanistan, appropriated funds may be used to repair property damage that results from U.S., multinational, or supporting military operations that are not otherwise compensable under the Foreign Claims Act. These funds can also be used for condolence payments to individual civilians for the death or physical injury resulting from U.S., multinational, or supporting military operations that are not compensable under the Foreign Claims Act. Such payments include payments to surviving spouse or kin of defense or police personnel killed because of U.S., multinational, or supporting military operations. On the other hand, Commanders’ Emergency Response Program for Afghanistan funds may not be used to pay rewards or fund any type of weapon buy-back program. Instead, a provision in U.S. Code authorizes a rewards problem. GLOBAL TRAIN AND EQUIP OR BUILDING PARTNER CAPACITY 13-55. Other NDAA provisions have recently authorized DOD to build the capacity of foreign military forces in support of overseas contingency operations. Current NDAA Train and Equip authority allows DOD to build the capacity of a foreign country's national military forces in order for that country to— Conduct counterterrorist operations. Participate in or support military and stability operations in which the U.S forces are a participant. This authority includes building the capacity of maritime security forces conducting counterinsurgency operations. GLOBAL SECURITY CONTINGENCY FUND 13-56. Congress has used the NDAA to authorize the Global Security Contingency Fund, which provides funds to the Secretary of State or Secretary of Defense to provide assistance to designated countries for the purposes of enhancing the country’s national military forces, and other national security forces that conduct 13-12 FM 3-24/MCWP 3-33.5 13 May 2014 Legal Considerations border and maritime security, internal defense, and counterterrorism operations. Funds provided may also be used for the justice sector, including law enforcement and prisons, rule of law programs, and stabilization efforts in a country in those cases in which the Secretary of State, in consultation with the Secretary of Defense, determines that the conflict or instability in a country or region challenges the existing capability of civilian providers to deliver such assistance. Funds come from both DOD operation and maintenance appropriations and Department of State funds. HUMAN RIGHTS VETTING 13-57. Congress typically limits when it funds training or equipment for foreign security forces under provisions commonly known as the Leahy Amendment or Leahy vetting procedures. If the Department of State has credible information that the foreign security force unit identified to receive the training or equipment has engaged in a consistent pattern of gross violations of internationally recognized human rights, Congress prohibits funding. Such prohibitions impose a requirement upon Department of State and DOD. These departments must vet the proposed recipient units against a database of credible reports of human rights violations. CLAIMS AND SOLATIA 13-58. Under certain conditions, the U.S. government makes payments to host-nation civilians. The Foreign Claims Act permits certain claims to be filed against the U.S. government. In some countries, solatia payments are available. FOREIGN CLAIMS ACT 13-59. Under the Foreign Claims Act, claims by host-nation civilians for property losses, injury, or death caused by service members or the civilian component of the U.S. forces may be paid to promote and maintain friendly relations with a host nation. Claims that result from noncombat activities or negligent or wrongful acts or omissions are payable. Claims that are not payable under the Foreign Claims Act include losses from combat, contractual matters, domestic obligations, and claims that are either not in the best interest of the U.S. to pay or that are contrary to public policy. Because payment of claims requires adjudication of the claim and because many claims prove, upon investigation, to be not payable, U.S. forces must be careful not to raise expectations by promising payment. SOLATIA 13-60. If U.S. forces are conducting counterinsurgency in a country where payments in sympathy or recognition of loss are common, solatia payments to accident victims may be legally payable. Solatia payments are not claims payments. They are payments in money or in kind to a victim or to a victim’s family as an expression of sympathy or condolence. The payments are customarily made immediately and generally are nominal. The individual or unit involved in the damage has no legal obligation to pay; compensation is simply offered as an expression of remorse according to local custom. Solatia payments should not be made without prior coordination with the combatant command. ESTABLISHING THE RULE OF LAW 13-61. Establishing the rule of law is a key goal and end state in counterinsurgency. Defining that end state requires extensive coordination between the instruments of U.S. power, a host nation, and multinational partners. Attaining that end state is usually the mission of host-nation authorities, international and intergovernmental organizations, the Department of State, and other U.S. government agencies, with, in some cases, support from U.S. forces. Some key aspects of the rule of law include— 13 May 2014 FM 3-24/MCWP 3-33.5 13-13 Chapter 13 A government that derives its powers from the governed and competently manages, coordinates, and sustains collective security, as well as political, social, and economic development. This includes national, regional, and local government. Sustainable security institutions. These include a civilian-controlled military as well as police, court, and penal institutions, all of which should be perceived by the local population as fair, just, and transparent. Fundamental human rights. The United Nations Declaration on Human Rights and the International Convention for Civil and Political Rights provide a guide for applicable human rights. However, the latter provides for derogation from certain rights during an officially proclaimed state of public emergency that threatens the life of the nation. Respect for the full panoply of human rights should be the goal of a host nation; derogation and violation of these rights by host-nation security forces, in particular, often provides an excuse for insurgent activities. 13-62. In times of extreme unrest and insurgency, host-nation legal structures—courts, prosecutors, defense assistance, and prisons—may cease to exist or function. Under these conditions, counterinsurgents may need to undertake a significant role in the reconstruction of the host-nation judicial system to establish legal procedures and systems to deal with captured insurgents and common criminals. During judicial reconstruction, counterinsurgents can expect to be involved in providing sustainment and security support. They can expect to provide legal support and consultation to the host-nation judicial entities. Even when judicial functions are restored, counterinsurgents may still have to provide logistic and security support to judicial activities for a prolonged period. This support continues as long as insurgents continue to disrupt activities that support the legitimate rule of law. 13-63. Rule of law is a principle under which all persons, institutions, and entities, public and private, including the state itself, are accountable to laws that are publicly promulgated, equally enforced, and independently adjudicated, and that are consistent with international human rights principles. In assessing rule of law, counterinsurgency planners should consider the end state for which the host nation should strive. While the form of the rule of law among different states may differ markedly, the effects should be similar. Some effects from the application of rule of law include the following: The state monopolizes the use of force in the resolution of disputes. Individuals are secure in their persons and property. The state is itself bound by law and does not act arbitrarily. The law can be readily determined and is stable enough to allow individuals to plan their affairs. Individuals have meaningful access to an effective and impartial legal system. The state protects basic human rights and fundamental freedoms. Individuals rely on the existence of justice institutions and the content of law in the conduct of their daily lives. 13-64. While no nation achieves these effects entirely, counterinsurgent efforts should support and reinforce host-nation rule of law efforts to approach them. Rule of law operations can become a key line of effort for counterinsurgents. Because many variables—whether cultural, economic, institutional, or operational—affect rule of law and rule of law operations, no single approach to assessment or implementation can be established. 13-65. In counterinsurgency environments, it is likely that justice mechanisms will have either collapsed or be in serious need of rebuilding. Given the time and resources required to establish a fully functional judicial system, counterinsurgents may need to support interim justice mechanisms—mechanisms to provide justice in communities even while permanent judicial mechanisms are being developed. Such interim justice mechanisms may use simplified formal mechanisms or informal justice mechanisms such as traditional customs or other forms of community-based dispute resolution. Interim justice development and institutional capacity building should be mutually reinforcing. Overall, progress in the rule of law is far more rapid when building the capacity of police, prosecutors, judiciary, civil dispute resolution, and corrections occurs simultaneously rather than sequentially. 13-66. Transitional justice mechanisms (truth commissions, trials and amnesties, purges from office, and reparations) address past violations of human rights and humanitarian law. They can be effective in 13-14 FM 3-24/MCWP 3-33.5 13 May 2014 Legal Considerations building the rule of law and reducing support for an insurgency. Trials and amnesties are important components of reconciliation and reintegration. Truth commissions can serve the same function, and can simultaneously expose the legal and humanitarian violations of an insurgency to a population and the world. Counterinsurgency forces should coordinate with civilian leaders and consider including these processes in their operations. 13-67. In some parts of the world, formal state-sanctioned and state-run courts are not the primary method for resolving disputes. Instead, people resolve disputes through traditional customs and processes. For example, many Afghans rely on shura and jirga, councils of community leaders who mediate conflicts. In seeking to establish the rule of law, counterinsurgents need to understand what traditional forms of justice already exist in a community. Counterinsurgents should consider whether these systems should be integrated into the formal legal system, and they should also consider whether they can rely on those traditional systems of justice as interim mechanisms while more formal court systems are being developed. 13-68. Counterinsurgents must be attentive to both civil and criminal justice. The criminal justice system includes police, court systems, and corrections facilities. Its goal is to incapacitate, punish, deter, and rehabilitate criminals. The civil justice system addresses disputes that are not of a criminal nature, such as contract or property disputes. When the institutions of justice have collapsed or need to be rehabilitated, the absence of both civil and criminal justice can cause instability and frustration in local communities. The rule of law requires functioning systems for addressing both criminal and civil justice. 13-69. Helping a society develop a functioning civil and criminal legal system can be essential to counter an insurgency. A knowledge of the host-nation legal system may help a commander determine the best means to aid that development. Because a legal system develops over time within each society, understanding its development and history helps explain its relevance to society. Laws and norms that make little sense on the outside may have deep cultural and historic roots. The Army and the Marine Corps legal communities can help a commander better understand the legal environment and how to help reestablish and reinforce the rule of law. 13-70. Counterinsurgents should inform and educate the media, local community, host nation, and public at large about applicable law of war provisions, U.S. and host-nation laws, and the obligations of those participating in hostilities. Providing this information can help build trust and legitimacy by helping locals and the media understand the rules U.S. forces follow and the safeguards they apply in operations. Legal preparation of the battlefield can also help delegitimize the insurgents, as locals and the media will better understand the insurgents’ violation of the laws. 13 May 2014 FM 3-24/MCWP 3-33.5 13-15 This page intentionally left blank. Source Notes These are the sources used, quoted, or paraphrased in this publication. They are listed by page number. Where material appears in a paragraph, both page and paragraph number are listed. Boldface indicates the titles of historical vignettes. 1-3 2-2 4-4. 4-12 6-2 7-3 8-1 9-2 10-4 11-2 12-5 13 May 2014 The Laos Insurgency: Christopher Paul. “Laos, 1959-1975” in Paths to Victory: Detailed Insurgency Case Studies. Rand National Defense Research Institute. 2013, 147-156. The Anbar Province Operational Environment: Dr. William Knarr. “Al-Sahawa: An Awakening in Al Qaim.” in The Combating Terrorism Exchange Journal. May 2013, 5-30. para 4-44. Mao Zedong. On Guerrilla War. London: Cassel, 1965. External Support for the Tamil Tigers: Colin P. Clarke. “Sri Lanka, 1976-2009” in Paths to Victory: Detailed Insurgency Case Studies. Rand National Defense Research Institute. 2013, 423-439. Command in Counterinsurgency: Excerpt from Chapter 5, “Regimental Command in Counterinsurgency” in Counterinsurgency Leadership in Afghanistan, Iraq, and Beyond. Marine Corps University Press, Quantico, Virginia. 2011, 51-54. If a Tactic Works in This Province, it Might Not Work in The Next: The Case of the Dan Aw Patan District, Afghanistan, 2010: Donald P. Wright, unpublished article, Combat Studies Institute, Fort Leavenworth, Kansas. 2013. Intelligence and the Shining Path: Christopher Paul. Rand National Defense Research Institute. 2013. Shape-Clear-Hold-Build-Transition: The Huks: Molly Dunigan. “Philippines (Huk Rebellion) 1946-1956” in Paths to Victory: Detailed Insurgency Case Studies. Rand National Defense Research Institute. 2013, 31-39. para 10-47. Afghanistan Youth National and Social Organization. www.aynso.org Security Cooperation in El Salvador: Christopher Paul. Rand National Defense Research Institute. 2013. Measuring Effectiveness and Performance in Vietnam: Christopher Paul. “South Vietnam, 1960-1975” in Paths to Victory: Detailed Insurgency Case Studies. Rand National Defense Research Institute. 2013, 177-197. FM 3-24/MCWP 3-33.5 Source Notes-1 This page intentionally left blank. Glossary The glossary lists acronyms and terms with Army, multi-Service, or joint definitions. Where Army and joint definitions are different, (Army) precedes the definition. The proponent manual for terms is listed in parentheses after the definition. Terms for which the Army and Marine Corps have agreed on a common definition are followed by (Army-Marine Corps). SECTION I—ACRONYMS AND ABBREVIATIONS ABCA ADP ADRP ASCOPE American, British, Canadian, Australian, and New Zealand Army doctrine publication Army doctrine reference publication areas, structures, capabilities, organizations, people, events ATTP Army tactics, techniques, and procedures COIN counterinsurgency DA DOD DODD DODI FM JP Department of the Army Department of Defense Department of Defense directive Department of Defense instruction field manual joint publication G-2 assistant chief of staff, intelligence G-3 assistant chief of staff, operations MACV Military Assistance Command, Vietnam MCDP Marine Corps doctrine publication MCO Marine Corps order MCRP Marine Corps reference publication MCWP Marine Corps warfighting publication MOE measure of effectiveness MOP measure of performance NDAA NGO nongovernmental organization S-2 intelligence staff officer S-3 operations staff officer SOF STANAG TC 13 May 2014 National Defense Authorization Act special operations forces standardization agreement training circular U.S. United States USC United States Code FM 3-24/MCWP 3-33.5 Glossary-1 Glossary SECTION II—TERMS all-source intelligence Intelligence products and/or organizations and activities that incorporate all sources of information in the production of finished intelligence. (JP 2-0) area of interest That area of concern to the commander, including the area of influence, areas adjacent thereto, and extending into enemy territory. This area also includes areas occupied by enemy forces who could jeopardize the accomplishment of the mission. (JP 3-0) area of operations An operational area defined by the joint force commander for land and maritime forces that should be large enough to accomplish their missions and protect their forces. (JP 3-0) assessment 1. A continuous process that measures the overall effectiveness of employing joint force capabilities during military operations. 2.Determination of the progress toward accomplishing a task, creating a condition, or achieving an objective. (JP 3-0) base A locality from which operations are projected or supported. (JP 4-0) biometrics The process of recognizing an individual based on measurable anatomical, physiological, and behavioral characteristics. (JP 2-0) center of gravity The source of power that provides moral or physical strength, freedom of action, or will to act. (JP 5-0) clear A tactical mission task that requires the commander to remove all enemy forces and eliminate organized resistance within an assigned area. (FM 3-90-1) combat outpost A reinforced observation post capable of conducting limited combat operations. (FM 3-90-2) command The authority that a commander in the armed forces lawfully exercises over subordinates by virtue of rank or assignment. (JP 1) control (Army) The regulation of forces and warfighting functions to accomplish the mission in accordance with the commander’s intent. (ADP 6-0) counterinsurgency Comprehensive civilian and military efforts designed to simultaneously defeat and contain insurgency and address its root causes. (JP 3-24) country team The senior, in-country, United States coordinating and supervising body, headed by the chief of the United States diplomatic mission, and composed of the senior member of each represented United States department or agency, as desired by the chief of the United States diplomatic mission. (JP 3-07.4) cyberspace A global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. (JP 1-02) Glossary-2 FM 3-24/MCWP 3-33.5 13 May 2014 Glossary end state The set of required conditions that defines achievement of the commander’s objectives. (JP 3-0) foreign internal defense Participation by civilian and military agencies of a government in any of the action programs taken by another government or other designated organization to free and protect its society from subversion, lawlessness, insurgency, terrorism, and other threats to its security. (JP 3-22) human intelligence (joint) A category of intelligence derived from information collected and provided by human sources. (JP 2-0) (Army) The collection by a trained human intelligence collector of foreign information from people and multimedia to identify elements, intentions, composition, strength, dispositions, tactics, equipment, and capabilities. (FM 2-22.3) information environment The aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information. (JP 3-13) information fratricide The result of employing information-related capabilities in a way that causes effects in the information environment that impede the conduct of friendly operations or adversely affect friendly forces. (FM 3-13) information operations The integrated employment, during military operations, of information-related capabilities in concert with other lines of operations to influence, disrupt, corrupt, or usurp the decisionmaking of adversaries and potential adversaries while protecting our own. (JP 3-13) information-related capability A tool, technique, or activity employed within a dimension of the information environment that can be used to create effects and operationally desirable conditions. (JP 3-13) insurgency The organized use of subversion and violence to seize, nullify, or challenge political control of a region. Insurgency can also refer to the group itself. (JP 3-24) intelligence The product resulting from the collection, processing, integration, evaluation, analysis, and interpretation of available information concerning foreign nations, hostile or potentially hostile forces or elements, or areas of actual or potential operations. (JP 2-0) intelligence preparation of the battlefield/battlespace (Army-Marine Corps) A systematic process of analyzing and visualizing the portions of the mission variables of threat/adversary, terrain, weather, and civil considerations in a specific area of interest and for a specific mission. By applying intelligence preparation of the battlefield/battlespace, commanders gain the information necessary to selectively apply and maximize operational effectiveness at critical points in time and space. (FM 2-01.3/ MCRP 2-3A) intergovernmental organization An organization created by a formal agreement between two or more governments on a global, regional, or functional basis to protect and promote national interests shared by member states. (JP 3-08) internal defense and development The full range of measures taken by a nation to promote its growth and to protect itself from subversion, lawlessness, insurgency, terrorism, and other threats to its security. (JP 3-22) irregular warfare A violent struggle among state and non-state actors for legitimacy and influence over the relevant population(s). (JP 1) 13 May 2014 FM 3-24/MCWP 3-33.5 Glossary-3 Glossary line of effort In the context of joint operation planning, using the purpose (cause and effect) to focus efforts toward establishing operational and strategic conditions by linking multiple tasks and missions. (JP 5-0) line of operation A line that defines the interior or exterior orientation of the force in relation to the enemy or that connects actions on nodes and/or decisive points related in time and space to an objective(s). (JP 5-0) measure of effectiveness A criterion used to assess changes in system behavior, capability, or operational environment that is tied to measuring the attainment of an end state, achievement of an objective, or creation of an effect. (JP 3-0) measure of performance A criterion used to assess friendly actions that is tied to measuring task accomplishment. (JP 3-0) mission command The exercise of authority and direction by the commander using mission orders to enable disciplined initiative within the commander’s intent to empower agile and adaptive leaders in the conduct of unified land operations. (ADP 6-0) mission orders Directives that emphasize to subordinates the results to be attained, not how they are to achieve them. (ADP 6-0) nation assistance Assistance rendered to a nation by foreign forces within that nation’s territory based on agreements mutually concluded between nations. (JP 3-0) nongovernmental organization A private, self-governing, not-for-profit organization dedicated to alleviating human suffering; and/or promoting education, health care, economic development, environmental protection, human rights, and conflict resolution; and/or encouraging the establishment of democratic institutions and civil society. (JP 3-08) operational approach A description of the broad actions the force must take to transform current conditions into those desired at end state. (JP 3-0) operational environment A composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander. (JP 3-0) public affairs Those public information, command information, and community engagement activities directed toward both the external and internal publics with interest in the Department of Defense. (JP 3-61) rules of engagement Directives issued by competent military authority that delineate the circumstances and limitations under which United States forces will initiate and/or continue combat engagement with other forces encountered. (JP 1-04) running estimate The continuous assessment of the current situation used to determine if the current operation is proceeding according to the commander’s intent and if planned future operations are supportable. (ADP 5-0) Glossary-4 FM 3-24/MCWP 3-33.5 13 May 2014 Glossary security cooperation All Department of Defense interactions with foreign defense establishments to build defense relationships that promote specific US security interests, develop allied and friendly military capabilities for self-defense and multinational operations, and provide US forces with peacetime and contingency access to a host nation. (JP 3-22) security force assistance The Department of Defense activities that contribute to unified action by the US Government to support the development of the capacity and capability of foreign security forces and their supporting institutions. (JP 3-22) site exploitation A series of activities to recognize, collect, process, preserve, and analyze information, personnel, and/or materiel found during the conduct of operations. (JP 3-31) strike An attack to damage or destroy an objective or a capability. (JP 3-0) target audience An individual or group selected for influence. (JP 3-13) unified action The synchronization, coordination, and/or integration of the activities of governmental and nongovernmental entities with military operations to achieve unity of effort. (JP 1) unity of command The operation of all forces under a single responsible commander who has the requisite authority to direct and employ those forces in pursuit of a common purpose. (JP 3-0) unity of effort Coordination and cooperation toward common objectives, even if the participants are not necessarily part of the same command or organization, which is the product of successful unified action. (JP 1) 13 May 2014 FM 3-24/MCWP 3-33.5 Glossary-5 This page intentionally left blank. References All URLs accessed on 1 May 2014. REQUIRED PUBLICATIONS These documents must be available to intended users of this publication. ADRP 1-02. Terms and Military Symbols. 24 September 2013. JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 8 November 2010. RELATED PUBLICATIONS These documents contain relevant supplemental information. MULTINATIONAL PUBLICATIONS Most ABCA publications are available at http://www.abca-armies.org. The ABCA web site requires a user ID and password. ABCA Coalition Operations Handbook. 10 August 2010. JOINT AND DEPARTMENT OF DEFENSE PUBLICATIONS Most joint publications are available at http://www.dtic.mil/doctrine/new_pubs/jointpub.htm. DODD 2310.01E. The Department of Defense Detainee Program. 5 September 2006. DODD 3115.09. DoD Intelligence Interrogations, Detainee Debriefings, and Tactical Questioning. 11 October 2012. DODD 5205.14. DoD Counter Threat Finance (CTF) Policy. 19 August 2010. DODI 5525.11. Criminal Jurisdiction Over Civilians Employed By or Accompanying the Armed Forces Outside the United States, Certain Service Members, and Former Service Members. 3 March 2005. JP 1. Doctrine for the Armed Forces of the United States. 25 March 2013. JP 1-04. Legal Support to Military Operations. 17 August 2011. JP 2-0. Joint Intelligence. 22 October 2013. JP 2-01.3. Joint Intelligence Preparation of the Operational Environment. 16 June 2009. JP 3-0. Joint Operations. 11 August 2011. JP 3-05. Special Operations. 18 April 2011. JP 3-07.4. Joint Counterdrug Operations. 14 August 2013. JP 3-08. Interorganizational Coordination During Joint Operations. 24 June 2011. JP 3-13. Information Operations. 27 November 2012. JP 3-16. Multinational Operations. 16 July 2013. JP 3-22. Foreign Internal Defense. 12 July 2010. JP 3-24. Counterinsurgency. 22 November 2013. JP 3-31. Command and Control for Joint Land Operations. 24 February 2014. JP 3-57. Civil-Military Operations. 11 September 2013. JP 3-61. Public Affairs. 25 August 2010. JP 4-0. Joint Logistics. 16 October 2013. JP 5-0. Joint Operation Planning. 11 August 2011. ARMY PUBLICATIONS Most Army doctrinal publications are available at http://www.apd.army.mil/. 13 May 2014 FM 3-24/MCWP 3-33.5 References-1 References ADP 5-0. The Operations Process. 17 May 2012. ADP 6-0. Mission Command. 17 May 2012. ADRP 1. The Army Profession. 14 June 2013. ADRP 2-0. Intelligence. 31 August 2012. ADRP 3-07. Stability. 31 August 2012. ADRP 5-0. The Operations Process. 17 May 2012. ADRP 6-0. Mission Command. 17 May 2012. AR 190-8/MCO 3461.1 Military Police: Enemy Prisoners of War, Retained Personnel, Civilian Internees and Other Detainees. 1 October 1997. ATP 3-07.20/MCRP 3-33.1G. IMSO Multi-Service Tactics, Techniques, and Procedures for Integrated Monetary Shaping Operations. 26 April 2013. ATP 5-19. Risk Management. 14 April 2014. ATTP 2-91.6. Tactics, Techniques, and Procedures for Intelligence Support to Site Exploitation. 27 December 2010. ATTP 3-39.20. Police Intelligence Operations. 29 July 2010. FM 2-01.3/MCRP 2-3A. Intelligence Preparation of the Battlefield/Battlespace. 15 October 2009. FM 2-22.3. Human Intelligence Collector Operations. 6 September 2006. FM 3-05. Army Special Operations. 9 January 2014. FM 3-07. Stability Operations. 6 October 2008. FM 3-11/MCWP 3-37.1. Multi-Service Doctrine for Chemical, Biological, Radiological, and Nuclear Operations. 1 July 2011. FM 3-13. Inform and Influence Activities. 25 January 2013. FM 3-22. Army Support to Security Cooperation. 22 January 2013. FM 3-55. Information Collection. 3 May 2013. FM 3-57. Civil Affairs Operations. 31 October 2011. FM 3-90-1. Offense and Defense Volume 1. 22 March 2013. FM 3-90-2. Reconnaissance, Security, and Tactical Enabling Tasks Volume 2. 22 March 2013. FM 4-92. Contracting Support Brigade. 12 February 2010. FM 6-05/MCWP 3-36.1. CF-SOF Multi-Service Tactics, Techniques, and Procedures for Conventional Forces and Special Operations Forces Integration, Interoperability, and Interdependence. 13 March 2014. FM 27-10. The Law of Land Warfare. 18 July 1956. TC 2-19.63. Company Intelligence Support Team. 9 November 2010. TC 2-22.82. Biometrics-Enabled Intelligence. 21 March 2011. TC 2-33.4. Intelligence Analysis. 1 July 2009. MARINE CORPS PUBLICATIONS Most Marine Corps publications are available at http://www.marines.mil/News/Publications/ELECTRONICLIBRARY.aspx. MCDP 1-0. Marine Corps Operations. 9 August 2011. MCDP 1-1. Strategy. 12 November 1997. MCDP 5. Planning. 21 July 1997. MCDP 6. Command and Control. 4 October 1996. MCO 5530.17. Marine Corps Identity Operations (IdOps). 13 November 2012. MCWP 3-33.1. Marine Air-Ground Task Force Civil-Military Operations. 28 September 2011. MCWP 5-1. Marine Corps Planning Process. 24 August 2010. References-2 FM 3-24/MCWP 3-33.5 13 May 2014 References UNITED STATES LAW Most acts and public laws are available at http://thomas.loc.gov/home/thomas.php. Detainee Treatment Act of 2005. Executive Order 13491. Ensuring Lawful Interrogation. Available at http://www.archives.gov/federalregister/executive-orders/2009-obama.html. National Defense Authorization Act. Title 10, United States Code. Armed Forces. Title 22. United States Code. Foreign Relations and Intercourse. The Uniform Code of Military Justice. Available at http://www.law.cornell.edu/uscode/text/10/subtitle-A/part-II/chapter-47. OTHER PUBLICATIONS Geneva Conventions. Available at http://avalon.law.yale.edu/subject_menus/lawwar.asp . The Hague Conventions. Available at http://avalon.law.yale.edu/subject_menus/lawwar.asp. Interagency Conflict Assessment Framework. Office of the Coordinator for Reconstruction and Stabilization, United States Department of State. July 2008. Available online: http://toolkit.ineesite.org/toolkit/INEEcms/uploads/1151/Conflict_Assessment_Framework.pdf. Mao Zedong. On Guerrilla War. London: Cassel, 1965. NORTH ATLANTIC TREATY ORGANIZATION PUBLICATIONS North Atlantic Treaty Organization publications are available at http://www.nato.int. Allied Joint Publication 3.4.4. Allied Joint Doctrine for Counterinsurgency (COIN). 4 February 2011. STANAG 2611. Allied Joint Doctrine for Counterinsurgency (COIN). 4 February 2011. PRESCRIBED FORMS None REFERENCED FORMS Unless otherwise indicated, DA forms are available on the Army Publishing Directorate (APD) Web site (http://www.apd.army.mil/). DA Form 2028. Recommended Changes to Publications and Blank Forms. 13 May 2014 FM 3-24/MCWP 3-33.5 References-3 This page intentionally left blank. Index Entries are by paragraph number A accountability, 10-71 activities, and disposition, 5-2– 5-17 political, 5-4–5-9 support, 5-18–5-29 acts, terrorist, 5-12–5-13 adaptability, 4-36–4-37 advising, 11-26 all-source intelligence, 8-7–8-11 defined, 8-7 analytical frameworks, other, 4-104–4-105 application of criminal laws, of a host nation, 13-37–13-38 approaches, insurgent, 4-40–4-45 area of interest, defined, 2-14 area of operations, defined, 2-12 armed conflict, non-international, 13-33–13-38 assessing, a cultural situation, 3-9–3-15 and developing a host-nation force, 11-6–11-19 assessment, cell, 12-30–12-32 considerations, 12-9–12-18 defined, 12-1 frameworks, 12-5 methods, 12-6–12-8 assessments, 12-1–12-37 assist a foreign government, authority to, 13-3–13-5 assistance to police, general prohibition on, 13-5 associated threats, 5-30–5-48 attack, the network, 7-47–7-55 authority, for foreign internal defense, 13-4 to assist a foreign government, 13-3–13-5 auxiliary forces, 4-81–4-84 B base, defined, 7-80 basic rules, Soldier’s and Marine’s, 13-30–13-32 basing, 7-80–7-83 13 May 2014 biometric-enabled intelligence, 8-22–8-24 biometrics, defined, 8-22 border considerations, 7-71–7-79 broad indicators of progress, 12-28–12-29 build, 9-31–9-33 building, capacity, 10-65 building partner capacity, or global train and equip, 13-55 C capabilities, intelligence-related, 8-21–8-31 capacity, building, 10-65 cell, assessment, 12-30–12-32 center of gravity, 7-20–7-22 defined, 7-20 civil considerations, and mission variables, 2-45–2-46 civilian personnel, and contractors, 13-48 claims, and solatia, 13-58–13-60 clear, 9-17–9-22 clear, defined, 9-17 cognitive, dimension, 2-34 combat outpost, defined, 7-83 command, defined, 6-2 in counterinsurgency, 6-2–6-6 responsibility, 13-46 command and control, and mission command, 6-1–6-21 commander’s emergency response program, 13-52– 13-57 Common Article 3, Geneva Convention, 13-34–13-36 communications, 5-24 comprehensive, effort, 1-47–1-48 conceptual, planning, 7-13–7-34 considerations, assessment, 12-9–12-18 border, 7-71–7-79 legal, 13-1–13-70 operational, 7-46–7-83 other operational, 7-62–7-83 remote area, 7-63–7-70 FM 3-24/MCWP 3-33.5 context, understanding the strategic, 1-1–1-92 contractors, and civilian personnel, 13-48 control, and legitimacy, 1-27–1-33 defined, 6-2 conventional tactics, 5-14–5-17 conventional forces and special operations forces, synchronization, 6-15–6-21 coordination, 1-52–1-58 countering an insurgency, U.S. strategy and policy for, 1-10– 1-13 countering insurgencies, direct methods for, 9-1–9-57 indirect methods for, 10-1– 10-71 counterinsurgency, command, 6-2–6-6 defined, 1-3 headquarters use in, 6-7–6-14 money usage principles in, 10-63–10-71 paradoxes, 7-2–7-12 counterinsurgent forces must understand the environment, 1-79 counterinsurgent forces should prepare for a long-term commitment, 1-85 counterintelligence, 8-18 counter threat finance, 4-25, 5-21, 7-30, 9-49, 10-39, 10-40, 10-54, country team, 1-65–1-66 defined, 1-65 criminal organizations, 5-42–5-45 cultural advisor, and green cell, 3-17–3-22 cultural situation, assessing a, 3-9–3-15 culture, 3-1–3-25 organizing to understand, 3-16–3-24 understanding, 3-4–3-8 cyberspace, defined, 8-6 demographic and urbanization trends, 2-3–2-7 Index-1 Index Entries are by paragraph number. D Department of State, 1-63–1-68 designing measures of effectiveness and performance, 12-22–12-27 Detainee Treatment Act of 2005, 13-40 detention, and internment standards, 13-42 and interrogation, 13-39–13-43 develop simple, flexible plans, through mission orders, 7-31– 7-34 developing, and assessing a host-nation security force, 11-6–11-19 host-nation security forces, 11-32–11-40 measurement criteria, 12-19– 12-37 dimension, cognitive, 2-34 informational, 2-34 physical, 2-34 diplomacy, and negotiation, 10-20–10-24 direct action, 1-5, 1-12, 6-5, 6-16, direct enablers, other, 9-41–9-57 direct methods for countering insurgencies, 9-1–9-57 directed telescope technique, 12-33–12-37 discrimination, 13-19–13-25 disposition and activities, 5-2– 5-17 DOD funds generally not expendable by commanders for this purpose, 13-51 doing nothing is sometimes the best action, 7-7 dynamics of insurgency, 4-46– 4-105 E economic, variable, 2-25–2-31 effort, and unity of command, 1-49–1-51 comprehensive, 1-47–1-48 lines of and operation, 7-23– 7-30 whole-of-government, 1-41– 1-46 eighth dynamic, organizational and operational patterns, 4-76– 4-77 elements, organizational, 4-78 Index-2 emergency response program, commander’s, 13-52–13-57 empower the lowest levels, 1-91 end state, defined, 7-23 enforcing discipline of U.S. forces, 13-44–13-48 environment and geography, fourth dynamic, 4-59–4-61 establishing the rule of law, 13-61–13-70 ethical application of landpower in unified action, 1-36–1-40 external support, fifth dynamic, 4-62–4-64 F failing or failed states, 2-7 fifth dynamic, external support, 4-62–4-64 first dynamic, leadership, 4-49– 4-53 flexibility, 10-70 forces, auxiliary, 4-81–4-84 multinational, 1-67–1-68 Foreign Claims Act, 13-59 foreign forces, training and equipping, 13-49–13-51 foreign internal defense, authority for, 13-4 defined, 11-27 forensic-enabled intelligence, 8-25–8-27 fourth dynamic, environment and geography, 4-59–4-61 framework, shape-clear-hold-build-transitio n, 9-5–9-40 frameworks, assessment, 12-5 fundamentals, and prerequisites, insurgency, 4-1–4-105 insurgency, 4-29–4-105 intelligence, 8-2–8-6 fusion centers, 8-12–8-13 G general orders, 13-47 general prohibition on assistance to police, 13-5 generational engagement, 10-7– 10-19 Geneva Convention, Common Article 3, 13-34–13-36 global security contingency fund, 13-56 FM 3-24/MCWP 3-33.5 global train and equip or building partner capacity, 13-55 globalization, 2-5 government and forces, host nation, 1-60 green cell and cultural advisor, 3-17–3-22 guerilla units, 4-80 H headquarters use, in counterinsurgency, 6-7–6-14 hold, 9-23–9-30 honor, 13-29 host nation, application of criminal laws, 13-37–13-38 government and forces, 1-60 ownership, 10-64 transfer of detainees to, 13-43 working with forces, 11-1– 11-45 host-nation security forces, developing, 11-32–11-40 human intelligence, 8-14–8-17 defined, 8-14 human rights vetting, 13-57 human terrain system, 3-23–3-25 humanity, unnecessary suffering or superfluous injury, 13-16– 13-18 I identify, 10-28–10-30 identify, separate, isolate, influence, and reintegrate, 10-25–10-53 ideology, second dynamic, 4-54– 4-55 if a tactic works this week, it might not work next week; if it works in this province, it might not work in the next, 7-10–7-11 indirect enablers, other, 10-54– 10-71 indirect methods for countering insurgencies, 10-1–10-71 indoctrination, and training, 5-22– 5-23 influence, 10-41–10-45 influence neutral, networks, 7-58 information, operations, 7-84–7-96 variable, 2-33–2-36 information collection and intelligence, surveillance, and reconnaissance, 8-19–8-20 13 May 2014 Index Entries are by paragraph number. information environment, defined, 2-33 information fratricide, defined, 7-95 information operations, defined, 7-84 informational dimension, 2-34 information-related capability, defined, 7-84 infrastructure, targeted threat, 9-44–9-49 variable, 2-37–2-40 insurgencies, networked, 4-88– 4-103 insurgency, defined, 1-3 dynamics of, 4-46–4-105 fundamentals, 4-29–4-105 prerequisites, 4-10–4-28 prerequisites and fundamentals, 4-1–4-105 threat characteristics, 5-1–5-48 insurgent, approaches, 4-38–4-45 legitimacy and control, 4-31 organizational structure, 4-34 strategies, 4-30–4-39 strengths and weaknesses, 5-25–5-29 integrated, 11-25 integrated monetary shaping operations, 10-56–10-71 intelligence, 8-1–8-31 all-source, 8-7–8-11 biometric-enabled, 8-22–8-24 defined, 8-2 forensic-enabled, 8-25–8-27 fundamentals, 8-2–8-6 human, 8-14–8-17 intelligence drives operations, 1-80–1-82 intelligence preparation of the battlefield/battlespace, defined, 8-3 intelligence, surveillance, and reconnaissance, and information collection, 8-19– 8-20 intelligence-related capabilities, 8-21–8-31 intergovernmental organization, defined, 1-74 internal defense and development, defined, 1-35 internal support, sixth dynamic, 4-65–4-69 13 May 2014 internment, and detention standards, 13-42 interrogation, and detention, 13-39–13-43 interrogation field manual, 13-41 intrastate, war, 4-2–4-9 irregular warfare, defined, 1-2 isolate, 10-35–10-40 J-K joint force, 1-61–1-62 joint phasing mode, 11-29–11-31 L land forces and the range of military operations, 1-14–1-26 large scale combat, 1-2, 1-18, 1-19, 1-20 law of war, 13-10–13-13 lead nation, 11-23 leadership, 4-79 first dynamic, 4-49–4-53 learn and adapt, 1-90 legal considerations, 13-1–13-70 legitimacy, 1-2, 1-24, 1-36, 1-38, 1-53, 1-78, 1-82–1-84, 1-88, 2-33, 2-40, 3-1, 3-13, 4-21, 4-24, 4-30, 4-31, 4-34, 4-43, 4-49, 4-51, 4-53, 4-73, 4-80, 5-4, 5-6, 5-8, 5-10, 5-12, 5-17, 5-47, 6-19, 7-4, 7-8, 7-9, 7-36, 7-37, 7-38, 7-42, 7-58, 8-14, 8-24, 9-18, 9-33, 9-43–9-46, 9-48, 9-57, 10-5, 10-9, 10-16, 10-31, 10-71, 11-2, 11-16, 12-13, 12-24, 13-47, 13-70 legitimacy and control, 1-27–1-33 insurgent, 4-31 legitimacy is the main objective, 1-78 line of effort, defined, 7-25 line of operation, defined, 7-24 lines of operation and effort, 7-23– 7-30 M manage information and expectations, 1-86–1-87 many important decisions are not made by generals, 7-12 Marine’s basic rules, 13-30–13-32 means, 4-23–4-28 measure of effectiveness, defined, 12-20 FM 3-24/MCWP 3-33.5 measure of performance, defined, 12-20 measurement criteria, developing, 12-19–12-37 measures of effectiveness , designing, 12-22–12-27 measures of performance, designing, 12-22–12-27 methods, assessment, 12-6–12-8 military tactics, 5-11–5-17 variable, 2-20–2-24 Military Justice, Uniform Code of, 13-45 military necessity, 13-14–13-15 militias, nongovernment, 5-46– 5-48 mission command and command and control, 6-1–6-21 defined, 6-2 mission orders, defined, 7-34 develop simple, flexible plans through, 7-31–7-34 mission variables and civil considerations, 2-45–2-46 mission-specific rules of engagement, 13-7–13-8 money usage principles in counterinsurgency, 10-63– 10-71 motive, 4-14–4-22 multinational, forces, 1-67–1-68 rules of engagement, 13-9 N nation assistance, and security cooperation, 10-3–10-6 defined, 10-3 negotiation and diplomacy, 10-20– 10-24 network, attack the, 7-47–7-55 networked insurgencies, 4-88– 4-103 networks, influence neutral, 7-58 neutralize threat, 7-59–7-61 support friendly, 7-56–7-57 neutralize threat networks, 7-59– 7-61 nongovernment militias, 5-46– 5-48 nongovernmental organization, defined, 1-69 nongovernmental organizations, 1-69–1-73 Index-3 Index Entries are by paragraph number. non-international armed conflict, 13-33–13-38 O objectives, third dynamic, 4-56– 4-58 operation, lines of and effort, 7-23–7-30 operational, and planning considerations, 7-1–7-96 considerations, 7-46–7-83 variables, 2-8–2-44 operational approach, 1-9, 1-12, 1-13, 1-20, 1-77, 6-5, 6-7, 6-9, 6-12, 7-13, 7-14, 7-15, 7-16, 7-18, 7-19, 7-23, 7-27, 7-46, 7-84, 9-3, 9-5, 9-7, 11-11, defined, 1-13 operational environment, defined, 2-8 understanding an , 2-1–2-46 operations, information, 7-84–7-96 integrated monetary shaping, 10-56–10-71 opportunists, 5-31–5-41 opportunity, 4-11–4-13 orders, general, 13-47 organizational elements, 4-78 organizational and operational patterns, eighth dynamic, 4-76– 4-77 organizations, criminal, 5-42–5-45 nongovernmental, 1-69–1-73 other, 1-74–1-76 organizing to understand culture, 3-16–3-25 other, analytical frameworks, 4-104–4-105 direct enablers, 9-41–9-57 indirect enablers, 10-54–10-71 operational considerations, 7-62–7-83 organizations, 1-74–1-76 ownership, host nation, 10-64 P paradoxes, counterinsurgency, 7-2–7-12 parallel, 11-22 planning, 11-41–11-45 partnered, 11-24 partners, unified action, 1-59–1-76 partnership, 10-69 phasing and timing, seventh dynamic, 4-70–4-75 Index-4 physical dimension, 2-34 physical environment, variable, 2-41–2-42 planning, and operational considerations, 7-1–7-96 conceptual, 7-13–7-34 parallel, 11-41–11-45 security cooperation, 11-27– 11-45 political activities, 5-4–5-9 variable, 2-16–2-19 political, economic, and violence-centered insurgencies, 4-32 population control, 5-10 prerequisites, and fundamentals, insurgency, 4-1–4-105 insurgency, 4-10–4-28 progress, broad indicators of, 12-28–12-29 proliferation of weapons, 2-6 proportionality, 13-26–13-28 public affairs, defined, 7-94 R reintegrate, 10-46–10-53 relationship of an insurgency to the economy, 4-33 relationships, 11-20–11-26 remote area, considerations, 7-63–7-70 responsibility, command, 13-46 root cause, 1-1–1-3, 1-26, 1-42, 1-47, 1-79, 2-2, 4-9, 4-14– 4-22, 4-27, 4-38, 4-49, 4-54, 5-7, 5-39, 5-43, 9-12, 9-15, 9-17, 9-21, 9-31, 9-33, 9-57, 10-4, 10-9, 10-20–10-24, 10-26, 11-5, 12-10, 12-14 rule of law, establishing, 13-61– 13-70 rules of engagement, 13-6–13-9 defined, 13-6 mission-specific, 13-7–13-8 multinational, 13-9 running estimate, defined, 8-20 S second dynamic, ideology, 4-54– 4-55 security cooperation, defined, 10-5 nation assistance, 10-3–10-6 planning, 11-27–11-45 FM 3-24/MCWP 3-33.5 security force assistance, defined, 11-27 security under the rule of law is essential, 1-83–1-84 selectivity, 10-67–10-68 sense of time, 4-35 separate, 10-31–10-34 seventh dynamic, phasing and timing, 4-70–4-75 shape, 9-15–9-16 shape-clear-hold-build-transition, framework, 9-5–9-40 site exploitation, 8-28–8-31 defined, 8-28 sixth dynamic, internal support, 4-65–4-69 social, variable, 2-32 solatia, 13-60 and claims, 13-58–13-60 Soldier’s basic rules, 13-30–13-32 some of the best weapons for counterinsurgents do not shoot, 7-8 sometimes, the more force is used, the less effective it is, 7-5 sometimes, the more you protect your force, the less secure you may be, 7-4 special operations forces, 1-57, 8-8, 9-16, 6-13, 6-15–6-17, 6-19–6-21 standards for detention and internment, 13-42 states, failing or failed, 2-7 strategic principles, 1-77–1-92 strategies, insurgent, 4-30–4-39 strengths, insurgent, 5-25–5-29 strike, 9-50–9-57 defined, 9-50 support activities, 5-18–5-29 support friendly networks, 7-56– 7-57 support the host nation, 1-92 sustainability, 10-66 synchronization, conventional forces and special operations forces, 6-15–6-21 T tactics, conventional, 5-14–5-17 military, 5-11–5-17 target audience, defined, 7-85 13 May 2014 Index Entries are by paragraph number. targeted threat infrastructure, 9-44–9-49 technique, directed telescope, 12-33–12-37 terrorist acts, 5-12–5-13 the host nation doing something tolerably is normally better than us doing it well, 7-9 the more successful the counterinsurgency is, the less force can be used and the more risk must be accepted, 7-6 the range of military operations, land forces and, 1-14–1-26 third dynamic, objectives, 4-56– 4-58 threat characteristics, insurgency, 5-1–5-48 threats, associated, 5-30–5-48 time, variable, 2-43–2-44 training and indoctrination, 5-22– 5-23 training and equipping foreign forces, 13-49–13-51 transfer of detainees to the host nation, 13-43 transition, 9-34–9-40 transitions, 7-35–7-45 trends, demographic and urbanization, 2-3–2-7 use the appropriate level of force, 1-88–1-89 V variable, economic, 2-25–2-31 information, 2-33–2-36 infrastructure, 2-37–2-40 military, 2-20–2-24 physical environment, 2-41– 2-42 political, 2-16–2-19 social, 2-32 time, 2-43–2-44 variables, operational, 2-8–2-44 vetting, human rights, 13-57 W-X-Y-Z war, intrastate, 4-2–4-9 weaknesses, insurgent, 5-25–5-29 weapons proliferation, 2-6 whole-of-government effort, 1-41– 1-46 working with host-nation forces, 11-1–11-45 U U.S. strategy and policy to counter an insurgency, 1-10–1-13 unconventional warfare, 5-23 underground, 4-85–4-87 understanding, an operational environment, 2-1–2-46 culture, 3-4–3-8 the strategic context, 1-1–1-92 unified action, 1-34–1-76 unified action, defined, 1-34 ethical application of landpower in, 1-36–1-40 partners, 1-59–1-76 understanding, 1-34–1-76 Uniform Code of Military Justice, 13-45 unity of command and effort, 1-49–1-51 unity of command, defined, 1-49 unity of effort, defined, 1-51 urbanization, trends, 2-3–2-7 13 May 2014 FM 3-24/MCWP 3-33.5 Index-5 This page intentionally left blank. FM 3-24 MCWP 3-33.5 13 May 2014 By Order of the Secretary of the Army: RAYMOND T. ODIERNO General, United States Army Chief of Staff Official: GERALD B. O’KEEFE Administrative Assistant to the Secretary of the Army 1412701 BY DIRECTION OF THE COMMANDANT OF THE MARINE CORPS: DISTRIBUTION: Active Army, Army National Guard, and U.S. Army Reserve: To be distributed in accordance with the initial distribution number 121724, requirements for FM 3-24. Marine Corps: PCN 143 000124 00 This page intentionally left blank. PIN: 083748-000
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Author : FM 3-24 (Change 1) Create Date : 2014:05:13 13:30:04-04:00 Modify Date : 2014:06:02 14:41:33-04:00 Subject : May 2014 Has XFA : No XMP Toolkit : Adobe XMP Core 5.2-c001 63.139439, 2010/09/27-13:37:26 Creator Tool : PScript5.dll Version 5.2.2 Metadata Date : 2014:06:02 14:41:33-04:00 Producer : Acrobat Distiller 11.0 (Windows) Format : application/pdf Title : Insurgencies and Countering Insurgencies Creator : FM 3-24 (Change 1) Description : May 2014 Document ID : uuid:c2d4174b-a20a-4636-8075-a4451b976002 Instance ID : uuid:9fe05582-235f-413c-be1a-fe43d665fbd1 Page Count : 202EXIF Metadata provided by EXIF.tools