Irregular Warfare: Countering Irregular Threads
Irregular Warfare: Countering Irregular Threads
THREATS
VERSION 2.0
17 May 2010
Distribution Statement A
Approved for public release; distribution is unlimited.
THIS PAGE INTENTIONALLY LEFT BLANK
APPROVAL
This concept reflects the continued evolution in Department of
Defense thinking about future security challenges and outlines the
Department's approach to improving its capabilities and increasing its
capacity for countering irregular threats. As part of this effort, the
concept probes more deeply into the nature of these threats and the
approach required to address them, to include striking the appropriate
balance between population-focused and enemy-focused action. This
concept envisions a collaborative process by which all agencies
synchronize and integrate their activities and commit to a multinational,
multidisciplinary effort to counter irregular threats posed by state and
non-state adversaries.
~. -0
ERIC T. OLSON ON:MATTIS
Admiral. General.
United States Navy United States Marine Corps
Commander, Commander,
U.S. Special Operations Command U.S. Joint Forces Command
APPROVED
MICHAEL G. MULLEN
Admiral. United States Navy
Chairman, Joint Chiefs of Staff
THIS PAGE INTENTIONALLY LEFT BLANK
Table of Contents
1
THIS PAGE INTENTIONALLY LEFT BLANK
2
IRREGULAR WARFARE: COUNTERING IRREGULAR THREATS
JOINT OPERATING CONCEPT
EXECUTIVE SUMMARY
Joint operating concepts describe how the joint force is expected to
conduct joint operations within a military campaign in the future. They
identify the broad military capabilities necessary to achieve the ends
envisioned by the concept. 1 Since the original version of the Irregular
Warfare Joint Operating Concept was approved in September 2007, the
understanding of irregular warfare has continued to evolve. Battlefield
experience, further reflection, and official guidance led to the decision to
update the concept in advance of the normal revision cycle. Events such
as joint and Service wargames, workshops, seminars, and joint
experimentation have all contributed to the development of thinking
about irregular warfare.
1 Chairman of the Joint Chiefs of Staff Instruction 3010.02B, 27 January 2006. See also Mattis, James N.,
Vision for Joint Concept Development, 28 May 2009 (see page 3, paragraph 1 for a description of how concepts
differ from doctrine).
2 United States Department of Defense, Quadrennial Roles and Missions Review Report (QRM), January 2009,
5.
3 United States Department of Defense, Capstone Concept for Joint Operations (CCJO), v.3.0, 15 January 2009,
28-29.
4 Department of Defense Directive 3000.07, December 2008, 2.
5 Gates, Robert, “A Balanced Strategy: Reprogramming the Pentagon for a New Age,” Foreign Affairs 88, no.1
(January/February 2009).
3
JOC describes how the future joint force will conduct operations, when
directed by the President or Secretary of Defense, to prevent, deter,
disrupt, and defeat non-state actors, as well as state actors who pose
irregular threats. The joint force must be prepared to address them
without compromising its ability to address conventional threats.
6A whole of government approach is an approach that integrates the collaborative efforts of the departments
and agencies of the U.S. Government to achieve unity of effort toward a shared goal. Army Field Manual FM 3-
07, Stability Operations, October 2008, 1-17.
4
conditions that give rise to the threats. The goal is to enhance a local
partner’s legitimacy and influence over a population by addressing the
causes of conflict and building the partner’s capacity to provide security,
good governance, and economic development.
7 Security force assistance (SFA), a term that overlaps with foreign internal defense, is defined as: activities
that directly support the development of the capacity and capability of foreign security forces and their
sustaining institutions. (DoD Draft Instruction)
8 These five activities and operations are not listed in an effort to suggest sequence or a linear phasing model.
This concept advocates the execution of these five activities in concert with one another to achieve the desired
ends.
5
integrated, distributed operations by general purpose and special
operations forces. 9 Maximizing the prospect of success will likely require
additional or improved capabilities as well as potential doctrine,
organization, training, materiel, leadership and education, personnel,
facility, and policy changes.
9According to the USJFCOM Draft Concept, A Concept for Joint Distributed Operations v.0.6.1, dated 28
October 2009, distributed operations are those characterized by forces widely dispersed in multiple domains
throughout an operational area, often beyond mutually supporting range and operating independently of one
another because of distance or differing missions or capabilities, but supported by a variety of nonorganic
capabilities. The critical distinction between distributed operations and joint distributed operations is the level
and responsiveness of external support to the distributed units.
6
IW JOC Logic
The Irregular Warfare Problem: Adaptive adversaries such as terrorists, insurgents, and
transnational criminal networks as well as states present irregular threats that are not readily
countered by military means alone. These threats:
• Are enmeshed in the population
• Extend their reach and impact regionally and globally through use of communications,
cyberspace and technology
• Compete with host nation for legitimacy and influence over relevant populations
• Require long-term effort to address the causes of violent conflict
The Approach: To prevent, deter, disrupt and defeat irregular threats, the Joint Force must:
• Understand in depth
• Plan and execute in concert with partners
• Assess and adapt in response to the dynamic and complex nature of the problem
This approach requires balance between defeating the threats and enhancing a local partner’s
legitimacy and influence over a population by addressing the causes of conflict and building the
partner’s ability to provide security, good governance and economic development.
Required Capabilities:
IW Operations & Activities: The ability to:
• Counterterrorism • Gather, assess, and share a holistic understanding of
the environment
• Unconventional Warfare • Integrate joint force IW planning with interagency (IA)
• Foreign Internal Defense partners
• Counterinsurgency • Synchronize joint force IW activities with IA partners
• Stability Operations • Provide support to host nation, multinational (MN), IA,
and nongovernmental partners
• Draw support from host nation, MN, IA, and
nongovernmental partners
Guiding Principles to • Develop within the host nation an enduring capability
Counter Irregular Threats: to establish and maintain security, provide legitimate
• Understand complex political, governance, and foster development programs that
address root causes of conflict and grievance
economic, cultural, religious, • Influence relevant populations by planning and
and historical factors executing coordinated communications strategies and
• Use collaborative frameworks by matching actions to messages
to plan, act, assess and adapt • Enable partners to plan and execute communications
• Persistent engagement and strategies and match activities and messages
sustained effort given long- • Conduct cyber operations to influence, disrupt, deny,
term nature of conflict and defeat adversaries’ activities
• Build partner capability to • Conduct local and regional assessments of operational
increase legitimacy of host effectiveness
• Evaluate and understand the potential effects from
nation both population-focused action and enemy-focused
• Balanced approach to the use action.
of force • Project or modify IW-related actions and activities
• Prioritize the battle of the with flexible force and operational constructs
narrative
• Counter use of cyberspace as
a safe-haven and means of
attack Ends:
• Overcome institutional seams A joint force with an improved ability to prevent, and
to address complex factors of when necessary, counter irregular threats through a
conflict balanced approach aimed at both the threats
• Enable scalable, integrated themselves, as well as elements of the operating
and distributed operations environment, including the population and the
causes and conditions that give rise to the threats
7
1. Introduction
Irregular threats of growing reach and power will frequently confront the
United States and its strategic partners. 10 This joint operating concept
describes how the future joint force will conduct activities and operations
when directed to prevent, deter, disrupt, and defeat non-state actors as
well as state actors who pose irregular threats. 11 The concept also
identifies military capabilities to be applied as part of a “whole-of-
government” effort.
10 The use of the term “partner” in this concept may refer to one or more of the following, depending on
context: interagency, host nation, allied nations, coalition partners, other partner nations, sub-state
partners, intergovernmental organizations, nongovernmental organizations, or private voluntary
organizations.
11 Non-state actors include individuals, violent extremist groups, and state-like adversaries, who may use
conventional as well as irregular methods. State-like adversaries refer to non-traditional adversaries that have
evolved to the point of attaining state-like power, authority, and influence over a population. These are
elements that have taken root in a population group and have grown to become the de facto governing
authority but are not formally recognized by the United States or the international community.
12 The Department of Defense Directive 3000.07 (DoDD 3000.07): Irregular Warfare establishes policy and
assigns responsibility for DoD conduct of IW and development of capabilities to address irregular challenges
to national security. The Quadrennial Roles and Missions Review Report (QRM) and other documents also
identify the need for increased proficiency in irregular warfare as a priority.
8
Understanding and appreciation of the challenges of irregular
warfare have matured since the publication of the Irregular Warfare Joint
Operating Concept v. 1.0 in 2007. This concept uses the official definition
adopted in Joint Publication 1-02, which describes irregular warfare as: “a
violent struggle among state and non-state actors for legitimacy and
influence over the relevant populations. Irregular warfare favors indirect
and asymmetric approaches, though it may employ the full range of
military and other capabilities, in order to erode an adversary’s power,
influence, and will.” 13
For clarity this concept follows the original usage from the 2006
Quadrennial Defense Review in applying the term “irregular” to describe
the nature of the threat (i.e., the methods and actions of the
adversary). 15 Irregular threats include actors who employ methods such
as guerrilla warfare, terrorism, sabotage, subversion, criminal activities,
and insurgency. 16
13 United States Department of Defense, Joint Publication 1-02: Dictionary of Military and Associated Terms (JP
1-02).
14 The QRM and the CCJO note this blending tendency of categories of warfare. One characterization uses the
term hybrid warfare to describe a blend of conventional, irregular, terrorist and criminal aspects, namely: “a
full range of different modes of warfare including conventional capabilities, irregular tactics and formations,
terrorist acts including indiscriminate violence and coercion, and criminal disorder. Hybrid Wars can be
conducted by both states and a variety of non-state actors. These multi-modal activities can be conducted by
separate units, or even by the same unit, but are generally operationally and tactically directed and
coordinated within the main battlespace to achieve synergistic effects in the physical and psychological
dimensions of conflict.” in Conflict in the 21st Century: the Rise of Hybrid Wars, by Frank G. Hoffman.
15 The 2006 Quadrennial Defense Review introduced the term irregular as one of four types of threats faced by
from combined-arms tactics to guerrilla warfare, terrorism, sabotage, subversion, unconventional warfare, or
other methods usually considered ‘irregular.’ This full range of methods will be available to both state and
non-state adversaries, who are likely to adopt some combination.” Colin Gray, in Another Bloody Century:
Future Warfare, also includes insurgency as one of the “familiar branches on the tree of irregular warfare,”
225-226. He also notes that methods used by irregular forces may be adopted by regular forces.
9
adopt irregular methods. This concept recognizes that irregular methods
may also be used against state actors who present more or less
conventional threats, though this is not a focus of this JOC. The concept
recognizes that irregular warfare activities and operations are a
component of the military instrument of national power and may be
employed to address a variety of challenges as national policy directs. 17
The integrated action that the CCJO envisions future joint force
commanders employing is a blend of four military activities – combat,
security, engagement, and relief and reconstruction – which will be
applied in accordance with the unique requirements of each operational
situation. Combat aims to defeat armed enemies; security activities seek
to protect and control civil populations and territory; engagement seeks
to improve the capabilities of or cooperation with partners; and relief and
reconstruction seek to restore or maintain essential civil services. 20 The
CCJO offers them as the four basic building blocks from which joint
operations are designed. The joint force commander will develop a
concept of operations that integrates these four activities. Most joint
17 Since not all actions undertaken to address these challenges are necessarily named military operations,
this concept uses “operations and activities” or “activities” to refer to those undertaken by the joint force or
any of its partner entities.
18 Steady-state is defined as cumulative day-to-day activities that are outside of major surge operations. Surge
is defined as a condition, which requires forces to be provided to support Combatant Commander operations
beyond routinely scheduled activities and results in exceeding Secretary of Defense and Military Department
rotation planning goals or Reserve Component access policies in order to meet that demand. The definition of
steady-state and surge are drawn from the Guidance for the Development of the Force.
19 United States Department of Defense, Capstone Concept for Joint Operations v 3.0, 12-21.
20 Ibid. 15-20.
10
operations require some combination of these activities arranged and
weighted to accomplish the missions described in the subordinate joint
integrating concepts.
the Future Joint Force, United States Joint Forces Command, November 2008. Also see the National
Intelligence Council’s Global Trends 2025: A Transformed World, November 2008.
11
urbanization will all contribute to the likelihood of conflict in this
complex and fluid environment. Of particular concern are failed and
failing states, which could lead to more “ungoverned spaces,” which
become safe havens for terrorists, criminals, and groups engaged in
other illicit activities. These “spaces” could be rural, urban, maritime, air,
or “virtual.” Also of increasing concern are rogue states that use proxies,
which allow the state to distance itself from actions and achieve strategic
aims simultaneously.
State and non-state actors will find new and more deadly means of
conducting operations in all domains, to include land, air, maritime, and
cyberspace to further their aims. This may include piracy and smuggling
on the high seas; interruption of the flow of people, goods and services;
fostering illicit commerce and activities; and otherwise leveraging land,
air and maritime areas to ensure their freedom of movement and deny it
to others.
22United States Joint Forces Command, 2008 Joint Operating Environment, 46.
23 Cyberspace is a global domain within the information environment consisting of the interdependent
network of information technology infrastructures, including the Internet, telecommunications networks,
computer systems, and embedded processors and controllers (JP 1-02).
12
through graphic, rapid information operations (IO). 24 Any group or
individual armed with the necessary knowledge and technology may
wage stealthy cyber attacks to disrupt state or global information
systems and networks, or obtain information that confers insight and
advantage. Effective countermeasures are difficult to develop and employ
with equal rapidity. The JOE states it succinctly: “the introduction and
employment of new technologies and the adaptation and creativity of our
adversaries will alter the character of joint operations a great deal.” 25
24 Joint Publication 3-13, Information Operations defines IO as: “The integrated employment of the core
capabilities of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP),
military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and
related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decision
making while protecting our own.”
25 United States Joint Forces Command, 2008 Joint Operating Environment, 3.
26 Ibid. 39.
27 The “battle of the narrative,” an idea further developed in section 4.c. of this document, is an informal term
meant to denote efforts by the joint force and its interagency and other partners to counter the
message/narrative that the adversary socializes to win favor with the population. An effective counter-
narrative is based in real grievances that resonate with the relevant population.
13
3. The Irregular Warfare Problem
In the 21st century’s complex operating environment, adaptive
adversaries present irregular threats that seriously challenge military-
only responses in what are essentially contests for influence and
legitimacy. Irregular threats including terrorists, insurgents, and
criminal networks are enmeshed in the population and are increasingly
empowered by astute use of communications, cyberspace, and
technology to extend their reach regionally and globally. Subversion and
terrorism are not readily countered by military means alone, just as
legitimacy and influence cannot be achieved solely by rapid, decisive
application of military power.
Since the problem is not purely a military one, the approach is also
not purely military. Due to the nature of these complex and amorphous
threats, these contests are unlikely to end with decisive military victory.
Success will more often be defined by long-term involvement to remedy,
reduce, manage, or mitigate the conflict and its causes. The joint force
thus must find multidimensional approaches in tandem with other
partners to solve them, when directed by the President to do so.
14
The application of military force, while often necessary, can be
used by adversaries to rally opposition, and excessive use of force
can outweigh any gains derived from military power
Irregular threats operate as networks with regional and global
linkages that enable more rapid, sustained and stealthy action,
and transcend governments’ institutional boundaries 28
The varied and decentralized nature and organizational structure
of irregular threats demand versatile and agile joint forces and
organizations that are able to adapt to the complexity of the threat.
4. The Approach
The approach describes how the joint force and its partners prevent, and
when directed, counter irregular threats through a variety of methods
aimed at changing the character of the operating environment, including
the critical segments of the relevant populations, the threats themselves,
and the causes and conditions that give rise to these threats. The
approach outlined here consists of ends, ways, and means to counter
irregular threats. For the purposes of this JOC, ends are the objectives or
desired outcomes; ways are specific actions that the joint force will
undertake to reach those outcomes; and means are the methods and
capabilities required to execute the ways.
15
The ends are to prevent, deter, disrupt, or defeat irregular threats.
Prevention is a primary focus of effort, since it is preferable to deal with
incipient threats and the conditions that give rise to them. Once a threat
is manifest the joint force will aim to deter, disrupt, or defeat it. Deterring
irregular threats requires new approaches that take into account the
nature of non-state groups’ leadership, motivations, and means of
communicating. 29 In some cases, disruption, mitigation, or suppression
may be the most that can be accomplished to degrade or limit the
adversary’s ability to cause harm. In other cases irregular threats may be
defeated by swift and precise military action, but most often a long-term
focus on the causes and conditions will be required for eventual success.
The strategic measures of success are the degree to which a) the
influence and control of the relevant populations have been wrested from
the adversary and b) the legitimacy and credibility conferred on the
political authorities opposing the adversary have been increased.
The ways are principally five activities or operations that are undertaken
in sequence, in parallel, or in blended form in a coherent campaign to
address irregular threats: counterterrorism (CT), unconventional warfare
(UW), foreign internal defense (FID), counterinsurgency (COIN), and
stability operations (SO).
The means are collaborative frameworks for the joint force to act with its
partners to understand the problem in depth, plan and execute activities
and operations, and assess and adapt continuously to achieve the
desired outcomes, as well as key elements that characterize effective joint
force operations against irregular threats, and their corresponding
capabilities.
29 Amorphous leadership, nihilistic or millennial motivations or stealthy communications all pose challenges
for deterring irregular threats. It is difficult, for example, to design measures that will deter adversaries bent
on self-destruction or willing to absorb mass casualties.
16
persistent effort to enable a legitimate and capable local partner to
address the conflict’s causes and provide security, good governance, and
economic development. Success requires an appropriate balance of
population-focused and threat-focused action, special emphasis on a
strategy of continuous communication, offensive and defensive
cyberspace measures, regional and global coordination across
institutional seams, and tailored combinations of capable forces to
conduct these varied missions.
30 An imperfect analogy may aid understanding of this fundamental point: the adoption of a combined arms
approach provided greater synergistic effect than infantry, cavalry/tanks, and artillery operating separately.
31 There is also significant overlap among the five activities, in particular between foreign internal defense,
stability operations, and counterinsurgency. The former term came into being as a replacement for
counterinsurgency in the decade after Vietnam, but it is now used more broadly to characterize support to
another country facing insurgency or other forms of lawlessness and subversion. When foreign internal
defense is conducted in low-threat environments, it shares many common features with stability operations.
Finally, counterterrorism and unconventional warfare are evolving to include broader features than their core
notions of defeating terrorists and using indigenous partners to overthrow state or state-like adversaries.
32 For the purposes of this concept, and in accordance with Joint Publication 3-13, Information Operations,
17
This section describes how these five IW activities will be
conducted. Most of them will require the general purpose forces (GPF) to
play a large and varied role. In addition, USG agencies and multinational
and host-nation forces will often be partners as well. Conducting many of
these activities and operations effectively will require innovations in the
roles, skills, and relationships of the joint force in regard to its
interagency, host nation and other partners, general purpose forces, and
special operations forces components, as well as in the footprint, size,
scale, basing, sustainment, visibility, and distribution of its forces.
Land, air, and maritime forces will all be used in new ways to
counter irregular threats, address root causes, and build partner-nation
capability and capacity so they may provide ongoing security. For
example, the Africa Partnership Station builds maritime safety and
security capabilities in the Gulf of Guinea with partner nations using an
at-sea platform that provides persistent regional presence with a minimal
footprint ashore. 33 Similarly, building partner air forces will be an
important component of the overall security mission. The Combined Air
Power Transition Force 438 AEW in Afghanistan and the Iraq Training
and Advisory Mission-Air Force 321 AEW are examples of long-duration
aviation capacity-building missions. Interdicting irregular threats and
related operations will require continued, increased, and innovative use
of precision strike capability, unmanned aerial systems, intelligence,
surveillance, and reconnaissance platforms, and other space-based
assets including weather and navigational capabilities. Distributed
33 The Africa Partnership Station serves as a “maritime university” that makes repeat visits on a schedule
tailored to meet the partner nations’ need for sustained support. It is an interagency effort, coordinated with
the country teams, as well as nongovernmental organizations.
18
operations will place a premium on expanded use of low-profile and other
forms of airlift for mobility, resupply, and medical evacuation.
34 The joint force doctrinal definition of stability operations is “an overarching term encompassing various
military missions, tasks, and activities conducted outside the United States in coordination with other
instruments of national power to maintain or reestablish a safe and secure environment and provide essential
governmental services, emergency infrastructure reconstruction, and humanitarian relief.” (Joint Publication
1-02) Other definitions for Stability Operations exist, for example, in the National Defense Authorization Act of
FY 2009. The Reconstruction and Stabilization Civilian Management Act of 2008 codified the existence and
functions of the Department of State Office of the Coordinator for Reconstruction and Stabilization (S/CRS)
and authorized new interagency capabilities under the lead of the Department of State.
19
Foreign internal defense in IW. 35 The joint force will conduct
FID to enable and assist a host nation to prevent, deter, and defeat a
variety of irregular threats, including criminal activity, insurgency, and
chemical, biological, radiological, and nuclear incidents. The Department
of State will generally lead efforts that support the sovereign host-nation
government’s defense and development plan. The joint force will often
focus on the military element of FID to build the host-nation’s security
capacity, from the ministerial to tactical level. It may, if requested, also
support civilian-led efforts to improve the host-nation’s governance and
development capacity, for example by providing advisory assistance
outside of the security sector in support of interagency requirements. 36
35 Foreign internal defense is defined as “participation by civilian and military agencies of a government in any
of the action programs taken by another government or other designated organization to free and protect its
society from subversion, lawlessness, and insurgency.”(Joint Publication 1-02)
36 The Foreign Internal Defense Joint Integrating Concept, v. 0.5, March 2009 describes these operations in
greater detail.
37 This definition of SFA is in draft form and not based in doctrine. See section 4.c. on “Build partner
departments or agencies and wherever possible, with foreign governments and security forces, to enhance
partners’ capacity and capability to deter, and, when necessary, defeat state and non-state adversaries as well
as expand the capacity and capability of partners to contribute to multilateral operations. SFA comprises an
important component of the activities conducted through Security Cooperation (SC) initiatives undertaken by
DoD. While SC encompasses all of DoD’s efforts to encourage and enable international partners to work with
the United States in order to achieve strategic objectives (e.g., ranging from civil affairs activities to modeling
and simulation exchanges to senior leader bilateral meetings), SFA focuses exclusively on enhancing the
capacity and capabilities of foreign security forces and their sustaining institutions. (DoD Draft Instruction).
20
The development of non-military security forces is an important
component of FID, and an effective model with appropriate authorities
and mechanisms to integrate interagency, training, advice, and
assistance is essential to achieve unity of effort. For small-scale efforts,
police training and advising may be primarily a civilian mission. If
required and appropriately authorized, military police and other units
may be trained and deployed to train, advise, and assist non-military
security forces. SOF’s primary role is to assess, train, advise, and assist
host-nation military and paramilitary forces in the tasks that require
their unique capabilities. 39
The scale, footprint, and capabilities required for COIN will vary.
Counterinsurgency is manpower intensive because of the need to provide
population security. If host-nation forces are insufficient, COIN
operations may require a large initial commitment of GPF, including
enablers, support, and sustainment capabilities. In some cases, the joint
force may need to operate in a low-profile (i.e., not readily identifiable)
39 Joint Chiefs of Staff, Joint Publication 3-05, Joint Special Operations, II-7.
40 JP 3-24, Counterinsurgency Operations defines counterinsurgency as “comprehensive civilian and military
efforts taken to defeat an insurgency and to address any core grievances” and insurgency as the following two
definitions will be included if finalized: The final draft of JP 3-24 defines insurgency as “the organized use of
subversion and violence by a group or movement that seeks to overthrow or force change of a governing
authority. Insurgency can also refer to the group itself.” These definitions are approved for inclusion in JP 1-
02, Department of Defense Dictionary of Military and Associated Terms.
21
manner, which would also require low-profile means of air, land, and
maritime transport and sustainment. Rapid air mobility, airlift, and
target acquisition are also crucial to success and can limit the footprint
required and/or the duration of the operations. 41 In addition, certain
specialized capabilities may be required according to the circumstances,
including, but not limited to, manned and unmanned aviation, armed
reconnaissance, IO, riverine and littoral capabilities, explosive ordnance
disposal, or other personnel or units that must be rapidly deployable. 42
41 Pre-deployment training of joint air attack team personnel has increased air-ground coordination and
effectiveness. Such innovations and the importance of adaptability are discussed in Air Force Doctrine
Document 2-3: Irregular Warfare, 1 August 2007.
42 The Navy Expeditionary Combat Command is one example of a command designed to provide adaptive force
22
expand the CT network with new non-USG forces that have greater
cultural knowledge and a lower profile. SOF additionally will train host
nation CT forces, which can include constabulary, police, and other
Ministry of Interior security forces. Host nations will require appropriate,
sustainable material solutions to support their counterterrorism
operations.
23
resistance forces. Additionally, allied nations may provide SOF units to
work with resistance forces in conjunction with U.S. forces.
48 Joint elements conducting and supporting unconventional warfare generally operate in a highly distributed
manner. Small elements of SOF will work with the underground and guerrillas, and small support bases will
be located in neighboring countries or sanctuaries. When the resistance movement matures, it may move into
more lethal and visible operations, which will concurrently increase the profile of joint unconventional warfare
forces.
24
and the environment, including the relevant population. The joint force
must develop a thorough appreciation of the specific socio-cultural,
political, religious, economic, and military factors involved and a detailed
portrait of key segments of the population, including those who wield
most influence in the society. 49 Joint force commanders will provide an
assessment to policymakers to inform their decision of the costs, benefits
and implications of undertaking action. Commanders must make
realistic assessments to inform decision makers as to the prospects for
success.
49 For example, certain components of the population may be more influential or relevant than others, and
this determination will vary from case to case. The relevant population may not be every villager but rather
particular tribes, traditional leaders, or other influential groups or individuals.
50 The Interagency Conflict Assessment Framework (ICAF) is a tool that enables an interagency team to assess
conflict situations systematically and collaboratively. It is described in Appendix G. Operational design offers
an additional approach. For a description, see TRADOC Pamphlet 525-5-500: Commander’s Appreciation and
Campaign Design v1.0, 1-5 and 1-6.
51 Possible models for emulation, further development, or codification are the MNF-I Joint Strategic
Assessment Team and the USCENTCOM Assessment Team, groups of experts tasked by a commander to
conduct an independent, intensive study of the situation.
25
databases as part of an ongoing effort to gain a comprehensive
understanding that will in turn inform planning and operations. 52
52 For example, the understanding of the drivers of the conflict and the population will inform the approach to
strategic communication, e.g., identification of themes that resonate with the population and which local
messengers wield the most influence.
53 A comprehensive approach refers to efforts at cooperation among a broad variety of government and
nongovernment actors. For descriptions of and distinctions between a whole-of-government approach and a
comprehensive approach, see Army Field Manual 3-07: Stability Operations, 1-17 through 1-22. The former
seeks collaboration while the latter relies on cooperation, because the broader array of actors are not
compelled to work toward a common goal as are agencies of the same government.
54 As acknowledged in the Risks and Mitigations section of this JOC, the adoption of collaborative frameworks
is contingent upon a U.S. Government decision to do so. Absent such a decision, the joint force must
continue to seek ad hoc means of coordination and collaboration.
55 The Regional Security Initiative was one effort to coordinate counterterrorism planning and execution
among embassies in a given region and with the geographic combatant command. To maximize the impact of
U.S. Government counterterrorism efforts, the State Department Office of the Coordinator for
Counterterrorism created the Regional Security Initiative, a series of regionally-based, interagency strategy
planning activities, hosted by U.S. Embassies, to form a flexible network of coordinated country teams to deny
terrorists safe haven. (United States Department of State Office of the Coordinator for Counterterrorism, The
Terrorist Enemy)
26
A number of civilian-military planning and implementation
mechanisms have been implemented or proposed. One such mechanism,
the Interagency Management System, currently exists, but its use is
limited to reconstruction and stabilization contingencies. 56 A previous
mechanism for use in contingencies and steady-state operations was
established by Presidential Decision Directive 56, which mandated the
creation of political-military implementation plans. During the Vietnam
War, an integrated civilian-military team led by civilians, the Civil
Operations and Revolutionary Development Support (CORDS), was
employed to conduct counterinsurgency operations. Similarly, in Iraq and
Afghanistan, integrated planning cells and interagency fusion cells were
created at the country team and joint task force level to bring multiple
skills and authorities to bear on a given problem, although these entities
did not have directive authority. Another example is the National
Counterterrorism Center, which was established by Executive Order
13354 as the primary USG agency responsible for strategic operational
planning and synchronizing interagency operations, activities, and
actions to counter terrorism. 57 The Project on National Security Reform
and the Center for Strategic and International Studies both published
studies that proposed a standing procedure to form civilian-military
entities or permanent interagency task forces to enable interagency
collaboration. 58
27
from the start and draw on civilian expertise in all relevant areas of those
plans. 59 Government-wide planning will occur simultaneously with
military planning, and coordination mechanisms will ensure
transparency and compatibility. If required to perform non-military
tasks, the joint force will partner with the relevant U.S. Government
civilian agencies in their planning and execution and transition to
Department of State lead when conditions permit. 60 Geographic
combatant commands will adopt additional mechanisms to integrate
civilian-military operations. Two combatant commands have both a
military deputy and civilian deputy (a senior foreign service officer).
Interagency representatives at geographic combatant commands are a
welcome advance, but these representatives do not have authority to
decide or act on behalf of their parent agency. One further evolution
might be interagency unified commands. 61
59 Collaboration between the joint force and the interagency partners will avoid unintended effects. Even if the
joint force has funding and authority to carry out stabilization and reconstruction projects, it should enlist
the expertise of other partners to ensure that the right projects are selected and executed with the right
sensitivity. For example, the joint force may have funds and authority to build a school and do so, only to find
that the local tribal chief was dishonored when he did not get credit. The host nation or USAID, for example,
may have had the requisite knowledge to ensure that the project was executed in a way that honored the
chief. USAID’s Tactical Conflict Assessment and Planning Framework gathers and analyzes the information
required to understand and achieve the desired impact on a given local population.
60 The joint force has provided security for civilian entities, such as the Embedded Provincial Reconstruction
Teams, in order to enable them to operate in hostile environments. Responsibility for securing U.S. civilian
department and agency personnel under chief of mission authority falls to the regional security officer of the
Embassy. Responsibilities will be decided on a case by case basis in a memorandum of agreement between
the joint force and chief of mission. The joint force’s desire for civilian expertise in planning and operations to
promote governance and development may lead it to provide security for such personnel in order to obtain the
needed integrated civil-military action.
61 The U.S. Southern Command’s Command Strategy 2018: Partnership for the Americas, December 2008,
states that “USSOUTHCOM seeks to evolve into an interagency-oriented organization seeking to support
security and stability in the Americas.” The document specifically recommends that such a command be able
to: 1) Improve synchronization of operations and activities between Combatant Command (COCOM) and other
U.S. Government organizations operating in this part of the world to create a collaborative, effective, and
efficient command, 2) Integrate personnel from interagency partners into the COCOM staff and provide
similar liaisons to partner agency staff, 3) Ensure interagency participation at all COCOM exercises and
conferences, 4) Support interagency-oriented security command concept in future Unified Command Plans
and 5) Ensure COCOM has a 21st century facility to enable discussions at all levels of classification.
28
prioritization of available resources, in order to satisfy needs and achieve
desired end states.
Assess and Adapt. The joint force will also use these collaborative
frameworks to conduct continuous assessment and adaptation, which
are essential given the dynamic and adaptive nature of irregular threats.
The problem itself will continuously evolve, as will the joint force’s
understanding of it. Since any actions will alter the operational
environment and the problem, the joint force must also factor the effects
into the assessment. These insights are captured in operational design,
which provides a sophisticated method for understanding and clearly
defining an approach to complex problems. 62 The joint force commander
or interagency task force leader and his staff initially frame the problem
after an in-depth study of it, then proceed to formulate his design and
operational approach. This approach is dynamic in that it recognizes that
the original framing is a starting hypothesis and basis for learning as
operations proceed. Along the way, strategic guidance may be refined,
the operational environment will change, and situational understanding
may increase. Through a process of ongoing assessment, the commander
continually refines his design and reframes the problem to take account
of new insights as well as the evolving situation. Leaders will assess
progress against measurements of effectiveness and the desired ends.
The assessment process requires a sophisticated methodology that relies
on meaningful and apt quantitative measurements 63 as well as other
means to determine the value of new information, to include the
commander’s growing intuitive grasp of the problem. Leaders will then
use the assessment to determine what adaptations may be needed in the
framing of the problem or the campaign design in an ongoing, iterative
process.
62 See TRADOC Pamphlet 525-5-500: Commander’s Appreciation and Campaign Design v1.0, 1-5 and 1-6.
63 There is a growing appreciation that many input or output metrics that simply tally actions taken (e.g.,
number of wells dug) do not capture what if any impact the actions have had on the crucial issues of
influence and legitimacy. Some quantitative metrics are powerful indicators; for example, based on his
experience in Southeast Asia, Sir Robert Thompson identified two metrics, the amount of intelligence supplied
by the population and the rate of insurgent recruitment, as significant measures of a counterinsurgency
campaign’s effectiveness.
64 For a more detailed explanation on influencing the behaviors of selected populations, governments or other
29
frame their actions positively and those of the joint force negatively. The
joint force and its partners must grasp the central importance of this
“battle of the narrative” and adopt a meaningful approach to
communications that enables the host nation and other local partners.
30
should form interagency fusion cells to ensure all perspectives are
integrated. 66
66 For a more detailed discussion on this topic, to include required joint force capabilities, see the Strategic
31
and staffs, and other military institutions. These efforts will require land,
air, and maritime advisors to provide training and expertise in Service-
specific areas, as well as approaches that are transferrable, affordable,
modular, and interoperable. Security also requires building viable and
integrated criminal justice systems capable of implementing the rule of
law. This includes policing, detention, judicial, and other criminal justice
functions grounded in a local conception of law and legitimacy. As such,
when required and if the appropriate authorities are in place, DoD may
also provide such support to non-military security, law enforcement, and
intelligence organizations at the invitation of the host nation with full
coordination and support of the chief of mission and geographic
combatant commander. This may include, in accordance with authorities
and policy guidance, constabulary, national and regional police, border
security forces, port security forces, and authorized local defense forces.
The joint force efforts should be coordinated, paced, and scaled to
complement other training, education, assistance, and material support
to a partner’s forces from other USG agencies, countries, or private
entities. For example, the joint force should make use of coalition
partners’ experience in building national police forces, since the U.S.
Government does not have such forces. In addition, security sector
reform requires an interagency approach to strengthen basic
governmental functions such as management, oversight, finance, and the
entire judicial/criminal justice system, to include police,
detention/corrections, and prosecutorial/defense functions. 67 Such
integrated rule-of-law programs should be the norm if host nation
capability is lacking. In certain circumstances, the joint force must be
prepared to execute basic governance and development tasks at the local,
provincial, and national levels.
67 United States Agency for International Development, United States Department of Defense, and United
States Department of State, “Security Sector Reform,” February 2009 defines as “reform efforts directed at the
institutions, processes, and forces that provide security and promote rule of law.”
68 This does not preclude the appropriate use of force in accordance with commanders’ rules of engagement.
32
extremist organizations, their infrastructure, their resources, and access
to, and use of, weapons of mass destruction. This includes actions to kill,
capture, and interdict adversaries. The joint force must calibrate and
integrate these short-term actions with the much broader and sustained
set of activities to shape and influence the environment, secure the
population, and address the underlying drivers of the conflict. Ultimately
these latter efforts, if successful, will have the most lasting and
potentially decisive effect, because they erode the enemy’s ability to
survive and regenerate. 69
33
Another seam is with USAID, which takes a much more long-term
approach in planning its development assistance and other programs in
most situations. Deconflicting the differing time horizons and
methodologies between DoD and USAID is important. This can be
accomplished in part through DoD participation in USAID/country team
planning and project design activities.
71 The Department of Defense Directive 3000.07, Enclosure, Responsibilities, 12 (3) instructs the U.S. Joint
Forces Command commander in coordination with USSOCOM and the Secretaries of the Military
Departments to “recommend mechanisms and capabilities for increasing interoperability and integration of
SOF and GPF in IW-related activities.”
72 GEN (Ret) Gary Luck and COL (Ret) Mike Findlay, Insights and Best Practices: Special Operations and
Conventional Force Integration, Focus Paper #5, for the Joint Warfighting Center, United States Joint Forces
Command. See also United States Special Operations Command, Publication 3-33: Handbook on
Conventional and SOF Integration and Interoperability.
34
on a global scale place great stress on enablers’ capacity for providing
mobility, aerial sensors, field medics, remote logistics, engineering
planners, construction, intelligence, regional specialists, human terrain
teams, interpreters/translators, communications, dog teams, close air
support specialists, security forces, and base operating support.
5.a. Methodology
The capability requirements for the IW JOC v. 2.0 were derived from over
24 months of strategy-to-task analysis based on the IW JOC v. 1.0
capabilities based assessment, IW Development Series, development of
three joint integrating concepts (Defeating Terrorist Networks, Foreign
Internal Defense, Unconventional Warfare), the Guidance for Development
of the Force study, the Joint Urban Warrior 2009 wargame, and two IW
JOC v. 2.0 workshops.
5.b. Requirements
This capabilities list captures those joint requirements at the operational
level deemed new, critical, or different for IW JOC v. 2.0, and groups
them according to the three elements highlighted in the central idea of
this concept. The capabilities listed in the IW JOC v. 1.0 remain valid and
are still being considered and assessed in other venues.
35
Element 2: Plan and execute in concert with partners
36
IW 2.0-009C. The ability to conduct offensive cyberspace
operations to influence, disrupt, deny, and defeat adversaries’
activities
6. Implications
Listed below is a set of initial implications, based on elements of the
central idea and the enabling capabilities. These implications will need
to be explored, validated, and refined through further experimentation,
capability analysis, and subsequent operational experience.
37
3. The Service and joint force PME institutions should stress
the importance of cultural norms and that enhanced understanding of
culture and other environmental factors may require changes in the
application of existing doctrine; tactics, techniques, and procedures; and
standards.
38
11. The Services should incentivize and track personnel, both
active duty and reserve, with critical IW skills and experience (e.g.,
trainer advisor billets; interagency assignments; foreign area officers; or
civil affairs related specialties such as agricultural planning, water
treatment, and public administration experience). Incentives could
include career-level or re-enlistment bonuses, precepts to PME
education, promotion, and command selection boards, as well as other
career enhancing assignments.
12. The joint force should expand its ability to conduct foreign
media analysis; leveraging the capabilities and capacities of other USG
agencies when and where applicable. This ability will allow the joint
force to identify the local media, their audiences, and how information is
spread and transferred within the cultural context of the relevant
population.
73 Sections 1206, 1207 and 1208 of the National Defense Authorization Act respectively provide the
Department of Defense with the authority to train and equip foreign military and maritime security forces;
transfer funds to the Department or State for reconstruction, stabilization and security activities in foreign
countries; and reimburse foreign forces, groups or individuals supporting or facilitating ongoing
counterterrorism military operations by U/S. special operations forces.
39
relevant authorities; as well as the actors and transition points among
them.
4. The joint force should increase and enhance MILGP
structures to oversee military support to host nation partners in order to
reflect IW requirements and priorities.
5. The joint force should work with interagency partners to
refine doctrine that articulates supported and supporting roles when
working together.
6. The joint force should identify the appropriate civil-military
integration points throughout the structure of the joint force, its multi-
national partners, and the host nation. When appropriate, this could
include other USG agency billets embedded in the joint force structure
and joint force billets embedded in our partner’s structure from the
tactical to the ministerial level.
7. The joint force should institutionalize nongovernmental
organization and civil-military team training as part of military exercises,
pre-deployment training, and other events.
8. The joint force should emphasize the importance of joint
information operations in mission planning and ensure coordination
between public affairs, military support to public diplomacy and IO
functions to increase the potential for synergy.
9. The joint force should develop enhanced working
relationships with media outlets, in particular multinational and local
outlets, and provide access to appropriate information.
10. The joint force should use appropriate and timely messaging
devices and methods in order to engage in sophisticated, interactive
strategic communication at the local, regional, national, and global
levels.
11. The joint force should establish mechanisms to streamline
the current review and approval process for computer network attacks.
12. The joint force should place greater emphasis on cyberspace
in the planning process when developing courses of action.
13. The joint force should establish a collaborative system that
allows cyberspace operations to coordinate real-time with partner
nations, host nation, and interagency partners.
14. The joint force should develop the capabilities to support
global distributed operations that would place small units (below the
battalion level) of GPF in civil-military teams and situations where they
will have to rely on host nation enablers and medical care.
40
15. The Services should review the training, leadership, and
rank structure needed by the GPF to conduct global distributed
operations.
16. The joint force should establish appropriate enablers,
sustainment, and support relationships and processes in support of
global distributed operations.
3. The joint force and Services should make the Global Force
Management process and Service Force Generation models flexible
enough to meet the demand signals for IW activities; ensuring that
deploying organization and constructs are paired with appropriate and
sufficient enabler, support, and sustainment capabilities.
41
7. The Services and USSOCOM should ensure that weapons
systems and other material designs are transferable, affordable, modular,
and interoperable to facilitate building partner capability.
Mitigation: This risk can be mitigated to the degree that capabilities and
organizations can be designed for maximum versatility. In addition, a
balanced approach is needed to develop and maintain those specialized
capabilities and capacities that are required to address irregular and
regular threats. New training techniques and technologies can enhance
the ability of the joint force to develop, increase, and maintain the
proficiency required to address both irregular and regular threats.
Previously, training and education in irregular warfare activities was
allowed to atrophy post-conflict. The joint force should not allow our
education in conventional or traditional skills to atrophy. U.S. military
personnel should be provided a balanced education that instills in them
an understanding of both conventional and irregular warfare and the
ability to adapt quickly to the challenges of either, or both, in
combination. Modularization of enabling capabilities can also facilitate
rapid mission transition. In the final analysis, the President and
Secretary of Defense will decide where to take risk if such a decision is
necessary due to resource or other constraints.
42
required to address irregular and regular threats. Mitigation strategies
include increasing JPME to develop leaders that are more capable of
operating across the spectrum of conflict; pursuing technological
advances to increase our asymmetric advantages; and dedicating force
structure to establish a persistent presence that may be useful to avoid
violent conflict altogether and/or to shape the environment. This could
include establishing permanent MILGPs within U.S. missions in select
countries, and/or otherwise reconsidering the composition and/or
training of DoD presence in U.S. missions. In addition, contingency
plans and hedging strategies should be considered to provide surge
capabilities and capacities to address irregular threats, either through
utilizing capacity in the reserve component, rapid retraining of other
specialties not in high demand, and identification of additional capacity
in the DoD civilian workforce.
Risk #4: The U.S. Government does not develop collaborative whole-
of-government approaches to conducting irregular warfare activities.
43
action. In the absence of clear, formal processes, joint force commanders
should familiarize themselves with successful experiences and seek to
get USG agreement to apply them as appropriate.
44
Appendix A – References
Hoffman, Frank. Conflict in the 21st Century: The Rise of Hybrid Wars.
Arlington: Potomac Institute for Policy Studies (2007)
Joint Chiefs of Staff. Joint Publication 3-05: Doctrine for Joint Special
Operations (December 2003)
Joint Chiefs of Staff. Joint Publication 5-0: Doctrine for Planning Joint
Operations (April 1995)
Luck, General (Ret) Gary and Colonel (Ret) Mike Findlay. Insights and
Best Practices: Special Operations and Conventional Force Integration,
Focus Paper #5, for the Joint Warfighting Center, United States Joint
Forces Command (October 2008)
A-1
Mattis, General James N. Memorandum for Joint Forces Command:
Irregular Warfare Vision (March 2009)
United States Air Force. Air Force Doctrine Document 2-3: Irregular
Warfare (August 2007)
A-2
United States Department of Defense. Quadrennial Defense Review
Report (February 2006)
A-3
THIS PAGE INTENTIONALLY LEFT BLANK
A-4
Appendix B – Glossary and Acronyms
B-1
Distributed Operations. Operations characterized by forces widely
dispersed in multiple domains throughout an operational area, often
beyond mutually supporting range and operating independently of one
another because of distance or differing missions or capabilities, but
supported by a variety of nonorganic capabilities. The critical distinction
between distributed operations and joint distributed operations is the
level and responsiveness of external support to the distributed units. (US
Joint Forces Command Draft Concept, A Concept for Joint Distributed
Operations, v.0.6.1, 28 Oct 2009.)
B-2
the intent and capability to assist operations that a unit intends to
conduct. (JP 3-0)
B-3
Security forces. Duly constituted military, paramilitary, police, and
constabulary forces of a state. (DoDI 3000.07)
B-4
seize or retain territory in order to force a change in an adversary’s
government or policies. (DoDD 3000.07)
B-5
Acronyms
B-6
U.S. – United States
USAID – United States Agency for International Development
USG –U.S. Government
UW – Unconventional warfare
B-7
THIS PAGE INTENTIONALLY LEFT BLANK
B-8
Appendix C – IW JOC Relationship to Other Joint Operating
Concepts
The Irregular Warfare JOC v. 2.0 is consistent with the Capstone Concept
for Joint Operations v. 3.0. The CCJO states that U.S. forces require the
same level of expertise in irregular warfare that they developed for
conventional warfare. The institutional implications of adopting the
CCJO include improving knowledge of and capabilities for waging
irregular warfare. The relationship of the IW JOC to the other extant
JOCs is described below.
C-1
In summary, success in these efforts will greatly reduce enemy
capabilities and discredit the enemy’s reputation for effectiveness, while
at the same time enhancing the reputation and effectiveness of the Joint
and coalition forces and the host-nation government.
The DOD Homeland Defense and Civil Support (CS) Joint Operating
Concept (DOD HD and CS JOC) v. 2.0 states that threats to the homeland
C-2
will continue to be diverse, adaptive, and in many cases difficult to
predict. Potential adversaries will attempt to surprise the United States
as they adopt an array of persistent and emerging traditional, irregular,
catastrophic, and disruptive methods and capabilities to threaten the
homeland. DoD intends to fulfill its responsibilities associated with
securing the homeland by: 1) detecting, deterring, preventing, or, if
necessary, defeating external threats to the homeland, 2) responding to
catastrophic incidents, and 3) integrating and operating with U.S. and
international partners to achieve unity of effort for HD and CS. There are
also three circumstances that govern DoD involvement in HD and CS
operations and Emergency Planning activities within the homeland that
are categorized as extraordinary circumstances, emergency
circumstances, and limited scope missions. The central idea of this
concept is for DoD to contribute to a national system that is active and
layered. There are two key supporting ideas. First, HD and CS, including
Emergency Preparedness, are national missions to which DoD
contributes. Second, these integrated national HD and CS activities are
conducted via an active, layered defense comprised of a number of
overlapping systems. This JOC proposes a multi-faceted solution with an
active, layered defense, unified action to achieve unity of effort, methods
to reduce uncertainty (including the proposal for a National Homeland
Security Plan), and the desired ends, effects, and capabilities that the
Joint Force Commander will need in the 2012-2025 timeframe
C-3
THIS PAGE INTENTIONALLY LEFT BLANK
C-4
Appendix D – Consolidated Table of Capabilities
This appendix provides a table of broad IW capabilities. These
capabilities represent the incremental development of capabilities
identified during IW JOC v. 1.0 development as well as those capabilities
defined during the development of the Defeating Terrorist Networks,
Foreign Internal Defense, and Unconventional Warfare Joint Integrating
Concepts (and the execution of follow-on capabilities based
assessments).
The tables are organized by the operations cycle of plan, prepare,
execute, and assess. Within each table, the original source document of
the capability is reflected by parenthetical notation in the left hand
column. Following columns decompose the capabilities into the relevant
Joint Capability Areas. The appendix does not include all tasks required
to conduct IW in the future – it highlights capabilities and tasks that are
new or have resurfaced and should be considered in a Capabilities-Based
Assessment.
1. Design the Campaign.
D-1
Most Relevant JCA(s)
IW Broad Capability
Tier 1 Tier 2 Tier 3
2.0- and operational Develop Courses of Action
013C) constructs Analyze Courses of Action
D-2
Agency and Understanding
Department Understand Share Knowledge and
boundaries Situational Awareness
Direct Communicate Intent and
Guidance
Building Shape Partner with Governments and
Partnerships Institutions9
IW- The ability to Command Organize Establish and Maintain Unity of
008C synchronize joint and Control Effort with Mission Partners
(IW 2.0- force execution of IW Structure Organization to
003C) activities with other Mission
USG agencies to Foster Organizational
facilitate regional and Collaboration
global operations Direct Task
across Federal Monitor Assess Compliance with
Agency and Guidance
Department
boundaries
74This capability was originally identified in IW JOC v. 2.0 as IW 2.0-006C; during capability
consolidation, it became a Tier 1 IW capability.
D-3
Most Relevant JCA(s)
004C) other USG agencies Supply Manage Supplies and
and nongovernmental Equipment
partners Inventory Management
Manage Supplier Networks
Maintain Inspect
Test
Service
Repair
Logistic Food Service
Services Water and Ice Service
Basecamp Services
Hygiene Services
Building Shape Provide Aid to Foreign
Partnerships Partners and Institutions
Partner with Governments and
Institutions
D-4
Most Relevant JCA(s)
007C) planning and Partnerships Audiences
executing coordinated Persuade Partner Audiences
communications Influence Adversary and
strategies and by Competitor Audiences
matching actions to Shape Partner with Governments and
messages so that the Institutions
population
Perceives the
legitimacy of
local and host
nation
authorities
Denies moral
and physical
support to
adversaries and
competing
actors
IW- The ability to conduct Building Communicate Influence Adversary and
016C information Partnerships Competitor Audiences
(IW 1.0- operations Force Engagement Non-Kinetic
022C) Application
IW- The ability to conduct Building Shape Provide Aid to Foreign
017C civil affairs operations Partnerships Partners and Institutions
(IW 1.0- Protection Prevent Prevent Kinetic Attack
040C)
Mitigate Mitigate Lethal Effects
Force Health Force Health Protection
Support Readiness
Logistics Deployment Sustain the Force
and
Distribution
Engineering General Engineering
IW- The ability to Building Shape Partner with Governments and
018C integrate Partnerships Institutions
(DTN - development actions
005C) with interagency,
multinational and
NGO partners
D-5
021C support from host Operational Contract Support Integration
(IW 2.0- nation,, multinational, Contract
005C) other USG agencies Support Contractor Management
and nongovernmental Building Shape Partner with Governments and
partners Partnerships Institutions
IW- Ability to conduct Force Maneuver Maneuver to Secure
022C personnel recovery Application
(IW 1.0-
033C) Engagement Kinetic Means
Non-Kinetic Means
D-6
Appendix E – IW Vignette: Countering Irregular Threats
Introduction
This is a notional vignette based on a regional scenario that describes
future U.S. conduct to counter irregular threats. It details the integration
of the five primary IW activities and operations and the employment of IW
JOC-derived capabilities. While grounded in real challenges, it should
not be interpreted to be current events or situations in any country.
Sharkia, a state in the Central Gulf region, and Jaiysh al Safrani (JAS), a
violent extremist group, are waging an irregular campaign against
countries in the region and the United States.
E-1
Table 1. Regional Threats
Sharkia End: Increase influence and control of resources in the
Gulf while undermining U.S. influence in the region.
Ways:
Operates through proxies to maintain deniability.
Supports Jaiysh al Safrani through Shimal.
Supports organized criminal networks in Harbia.
Employs propaganda to portray itself as the victim of
Western hostility. 75
Conducts terrorist and cyber attacks. 76
Manipulates images of attacks to portray the United
States and its allies as the perpetrators of hostility.
Leverages digital media and social networks 77 to
cultivate worldwide network of support. 78
Sponsors criminal and hacker organizations to conduct
cyber attacks against Jisria.
Jaiysh al End: Eliminate U.S. presence in the region
Safrani Ways:
(JAS) Conducts limited terrorist attacks against U.S. interest.
Minimizes operational ties to Sharkia.
Maintains broad network of support from extra-regional
states and ideologically-based charities.
75 The effective use of a global media campaign and global network of supporters is similar to the rise of the
Russia prior to the invasion of Georgia following the Georgia incursion into South Ossetia.
77 The recent use of Twitter, Facebook, and proxy servers by Iranian protestors demonstrates the global effect
of on-line social networking to rapidly and widely broadcast messages and influence world opinion – despite a
state’s efforts to control the information domain (e.g., jam broadcasts and block message traffic on the
Internet).
78 “Diasporas have played an important role in helping Tamil rebels in Sri Lanka, Kurdish guerrillas in
Turkey, and the PLO, among other movements.” Daniel Byman, et al. Trends in Outside Support for Insurgent
Movements.
E-2
2011: Request for Assistance and Understanding the Operational
Environment
In 2011, the government of Janubia makes a formal request to the
United States to increase its level of assistance and counter the growing
unrest and violence. Acknowledging the threat posed by JAS, the U.S.
Government, and partner nations agree to the request and begin to
develop a campaign plan for persistent engagement in the region.
79 See Forging a New Shield, Project on National Security Reform, for detailed discussion of such a mechanism
for integrated civilian-military policy implementation. The JRSG is led by the Ambassador to Janubia with the
Deputy Commander of EASTCOM as the second in command, and includes the Ambassadors from Janubia,
Harbia, and Jisria. The JRSG coordinates operational planning in support of Janubia counterinsurgency
efforts. The JRSG includes planning elements from interagency and partner nation organizations. Planning
and execution is coordinated through respective Embassies. To support operational unity of effort and provide
integrated tactical control of deployed forces, EASTCOM and WESTCOM establish a military group within
each Embassy. WESTCOM forces operating in the AOR are shifted to the operational control of the deputy
commander EASTCOM for unity of command.
80 The Interagency Conflict Assessment Framework and Tactical Conflict Assessment and Planning
Framework were used to enable an interagency team to assess the situation systematically and
collaboratively. For more information see Appendix G.
81 To tap expertise from outside the joint force, in 2003 DoD developed the Human Terrain Teams and
subsequently the Human Terrain System to embed social scientists with military units for the purpose of
improving their understanding of the socio-cultural elements of the operating environment.
E-3
to connect continuously with an even broader network of subject matter
experts in social, economic, political, military, religious, and cultural
domains.
The NSC designates this region as a Tier 1 priority and directs the
JRSG to accomplish these objectives.
E-4
with the approval and participation of the governments of Janubia,
Harbia, and Jisria.
82 In El Salvador, a multibillion-dollar FID effort over a decade supported the Salvadoran government’s
national plan, Unidos Para Reconstruir, which included economic development, governance programs and
security force assistance. A small U.S. MILGP oversaw the military element of FID in support of an army with
very limited combat experience and a history of corruption and human rights violations. The war was
concluded through a UN-mediated peace accord signed in 1991.
E-5
4) Establish a regional maritime security initiative combining the
maritime security development programs in Harbia, Janubia, and
Jisria. This international task force is chartered to counter the
Shimal-sponsored piracy disrupting shipping in the Shimal Straits,
improve the flow of goods and bolster the import/export economies
of Harbia, Janubia, and Jisria. Of particular importance are U.S.
diplomatic negotiations with Sebaya to support the maritime
security initiative, reduce its level of support to Shimal, and
increase its support for Jisria. 83 Command for the maritime
security initiative is rotated between Jisria, Janubia, and Harbia –
strengthening the legitimacy of the task force to provide security to
the shipping lanes in international waters.
5) Isolate JAS and Sharkia from the population and counter their
broad global support by establishing a strategic communication
cell in order to assist Janubia, Harbia, and Jisria in their strategic
communication efforts. This includes the central government
crafting a message of support to the populations at risk, backing it
up with development and governance programs that implement
actions directly supporting the message and obtaining feedback
through units in the field that interact with local populations,
assessing their views towards the central government and the
impact and reach of the information campaign. Additionally, the
strategic communication cell makes continuous efforts to
broadcast acts of violence and disruption committed by JAS and to
clearly articulate linkages between JAS, Shimal, and Sharkia as
they are uncovered.
83 The United States launched an international naval force targeting Somali pirates, over 20 countries
contributed to the force including Russia. This collaboration with a current peer competitor is an example of
partnering with third party nations to directly support stability in a critical region while building stronger
constructive ties and indirectly reducing tensions between the two nations – turning a potential adversary into
a partner with mutually supportive motivations.
E-6
Figure 2. Reduced effectiveness of Sharkia/JAS
E-7
host nation forces. The MILGPs provide command and control of U.S.
forces, training and advisory services to security forces, foreign military
sales programs that ensure proper equipping of indigenous forces, and
ensure unity of effort with civilian agencies.
E-8
Appendix F – Joint Assessment and Experimentation Plan
Below are specific insights from some of the key activities referenced
above.
IW JOC LOE (15-17 June 2009). An LOE was conducted during the IW
JOC v.2.0 development process. The purpose of the LOE was to accept,
refine, revise, or identify an initial set of capabilities required of the joint
force to execute IW activities as stated in the JOC and to determine the
DOTMLPF-P implications of these capabilities. To examine the required
capabilities, participants were asked to explore how the joint force will
understand, act, assess, and adapt coordinated activities in multiple
operating environments.
F-2
2.0 would focus on a balanced approach that describes direct and
indirect approaches without titling them as such. Aspects of the
indirect approach are emphasized in IW JOC v. 2.0, particularly in
the sub-section titled Employ a balanced approach.
Interagency Collaboration. Multiple issues concerning
interagency partnering in IW were addressed during the Irregular
Warfare Development Series, including lack of sufficient resources
and the need for improved planning and execution frameworks.
These are other related issues are addressed in IW JOC v. 2.0,
particularly in the sections titled Adopt collaborative frameworks to
plan, act, assess, and adapt and Overcome institutional seams.
Countering Violent Extremism. “By, with and through” and the
perceived lack of effectiveness of our strategic communications
efforts were addressed during the IWDS. Both topics are directly
addressed in the IW JOC v. 2.0 sections titled Building partner
capability and Give priority to the battle of the narrative.
Assessing the Effectiveness of IW Operations. The Irregular
Warfare Development Series found that there is no capability to
effectively assess IW operations in a steady state. This issue is
addressed in the IW JOC v. 2.0 section titled Assess and Adapt.
Sovereign Partner Collaboration. The Irregular Warfare
Development Series explored how to build trust, enable
sovereignty, and connect countries with complementary U.S.
capabilities. The need to develop an enhanced shared situational
awareness among sovereign partners in the security, political,
social, economic, and information domains was identified. Both the
whole-of-government and the broader comprehensive approach are
used to frame this discussion in the IW JOC v. 2.0 section titled
Adopt collaborative frameworks to act, assess, and adapt.
SOF-GPF Synchronization. Irregular Warfare Development Series
identified a need to codify the relationships for support between
SOF-GPF and to develop a coherent IW planning construct. IW JOC
v. 2.0 addresses these issues in the section titled, Enable scalable,
integrated, distributed operations by general purpose and special
operations forces.
F-3
A complementary mix of civilian interagency personnel assigned to
the geographic combatant commands will improve the commands’
responses and decisions across the range of country and regional
issues.
As more emphasis is placed on building partner capability as a
method of creating stability, prioritization of military capability will
become a challenge.
F-4
experience and, in some cases, statutory authority to lead large-
scale multi-institutional, multinational efforts abroad.
JUW-09 recommendations included the establishment of a formal
training and education institution (styled after U.S. Army Training
and Doctrine Command), to train and educate government
civilians, military, NGO, IGO, and multinational partner
professionals.
Embed the Department of State’s regional bureau desks with the
headquarters of their corresponding geographic combatant
commands to create greater unity in strategic vision.
A system of elevated “super ambassadors” at the regional levels
that operate much like current diplomatic special envoys would
bridge the gap between DoD regional focus and the Department of
State’s country focus.
There are less than optimal information sharing arrangements
between USG and multinational partners. Information is not
always shared, even with close allies. The need to incorporate
multinational opinions is critical to producing a balanced, accurate
portrayal of the affected region.
There is a growing understanding of the importance of conflict
prevention vice post-conflict reaction and the importance of a
comprehensive approach integrating all aspects of the U.S.
Government, as well as multinational partners, IGO, and NGOs.
F-5
incorporated into other CBA activities that are part of the overall IW CBA
Campaign. Several activities being considered as candidates to cover the
control and influence CBA are three related studies: the psychological
operations CBA, the civil affairs CBA, and the Strategic Communication
Joint Integrating Concept CBA.
84 Lessons learned at the operational and tactical levels can be immediately folded into joint training venues.
For example, the U.S. Air Force Green Flag West Joint Air Attack Team (JAAT) and U.S. Joint Forces
Command’s Joint Fires Integration and Interoperability Team closely collaborated at the Army’s National
Training Center JAAT personnel, to include Army Brigade Combat Teams and Air Force fighter squadrons,
prepared for combat missions in support of irregular warfare.
F-6
Appendix G – IW Planning Between the Military and the Rest of
Government
G-2