Operational Design Reading
Operational Design Reading
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington
VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it
does not display a currently valid OMB control number.
14. ABSTRACT
16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF
ABSTRACT OF PAGES RESPONSIBLE PERSON
a. REPORT b. ABSTRACT c. THIS PAGE Same as 150
unclassified unclassified unclassified Report (SAR)
August 2012
Library of Congress Cataloging-in-Publication Data
Reilly, Jeffrey M.
Operational design : distilling clarity from complexity for decisive action / Jeffrey
M. Reilly.
p. cm.
Includes bibliographical references and index.
ISBN 978-1-58566-221-0 (alk. paper)
1. Operational art (Military science) 2. Military planning. 3. Military art and
science—Decision making. I. Title.
U162.R36 2012
355.401—dc23
2012025006
Disclaimer
AFRI
Air Force Research Institute
ii
Contents
List of Illustrations iv
About the Author ix
Preface xi
iii
CONTENTS
Illustrations
Figures
iv
CONTENTS
v
CONTENTS
vi
CONTENTS
Tables
vii
About the
Author
ix
Preface
xi
PREFACE
xii
Chapter 1
ing from the peninsula, thus ending a campaign that could have sub-
stantially altered Southern resistance. The effects of McClellan’s cam-
paign, however, were not isolated to the Virginia peninsula. When
General Lee understood that McClellan’s forces were withdrawing, he
committed his forces to destroy the Union forces under General Pope
at the Second Battle of Manassas on 29 and 30 August 1862.
In retrospect, McClellan’s Peninsula Campaign was a viable plan.
McClellan created a sophisticated plan that used an indirect ap-
proach, exploited the Union’s naval superiority, and focused on a key
decisive point, the Confederate capital of Richmond. McClellan dem-
onstrated exceptional innovation in logistics and naval gunfire sup-
port and even attempted to use two observer balloons to provide
intelligence on enemy movements. His primary faults, however, re-
volved around over-analyzing his adversary’s capabilities, failing to
take decisive action, and not conducting a realistic risk assessment.
Collectively these omissions made McClellan extremely vulnerable
to not one but a series of Confederate deception operations. Although
Alan Pinkerton’s inflated intelligence summaries are partially to
blame for this, the Confederates had exhibited a clear pattern of using
deception to mask their limited military capacity. They used decep-
tion throughout 1861 and 1862 in their defenses immediately outside
Washington, DC, at Manassas, at Centerville, and again during the
Peninsula Campaign at Yorktown. The crucial liability in McClellan’s
campaign design was in McClellan’s own inflexibility and indecisive-
ness. The outcome of his plan might have been dramatically different
if he had incorporated better decision making and risk analysis tools
in his design.
Historical
Context
1910 1945 1950 1953 1955 1968 1990 1993–94 1994 1998 2005 2010
Japanese Rule Independence Korean War Armistice Juche Blue Soviet Collapse Nuclear Crisis Kim Jong Il Taepodong Test Nuclear Weapons Yeonpyeong Island
House Declaration
Elements of Power
Cultural
- Geography
Environment
- Population
Observed System
completely affected by warfare and turn them into playing cards deftly shuf-
fled in our skilled hands, and thus use beyond-limits strategy and tactics to
combine all the resources of war, can there be the possibility that we will be
confident of victory.13
Saggita
UN Alliance Use DIE Dacro
Stability Stability IOPs
HA Energy Key Systemic
Deter Links
Use Long
DIE Term
May Allow IOPs Defeat
SPOD/APOD
Perseus Vulpecula
Use Build
Stability BLA Regional
Aquila Autonomous Hegemony
Regional Batari
COIN State
Hegemony Population
MA
HA Short
Must Be Restrained from Term
Direct Intervention Build MO M3
Auriga
Survival
Isolation Delphi
Use
DIE
IOPs Corvus
Cetus
Frame-of-Reference Theory
Before JFCs and their staff begin the development of an opera-
tional approach, they must validate their frame of reference for both
the operational environment and problem identified. Frames of ref-
erence are double-edged swords. All individuals naturally use sche-
mata to frame contextual elements and problems (fig. 4).18 Conse-
quently, in complex environments there is an innate tendency to
focus on systemic similarities of previously learned schemata rather
than identifying and investigating systemic anomalies. Isolating and
examining the operational environment’s systemic anomalies is an
intrinsic element of forming schemata. The challenge is to ensure that
the schemata used in the design process are correct.
Dialectical Tension
New Schemata
Schemata
Original Original
Frame of Reference Frame of Reference
Appointed by
Elected by Electorate Unelected/Appointed
Elected Institutions
Judiciary
Appointed
Elects
Electorate Elected by Electorate
H L L
H L L
H L L
H L L L L LL L L
H L L
H L L
L L
HHHHHHH
L L
Figure 8. Macro and micro perceptual patterns
the process of operational design │ 19
Notes
(All notes appear in shortened form. For full details, see the appropriate
entry in the bibliography.)
1. de Czege, “Systemic Operational Design,” 2.
2. This monograph defines critical thinking as a judicious evaluation of com-
monly accepted beliefs and assumptions.
3. McPherson, Battle Cry of Freedom, 348.
4. Stackpole, From Cedar Mountain to Antietam, 1.
5. Sears, George B. McClellan, 167–69.
6. Johnson and Buel, eds., Battles and Leaders of the Civil War, vol. 2, The Struggle
Intensifies, 219.
7. Joint Warfighting Center Doctrine Pamphlet 10, Design in Military Opera-
tions, 8.
8. Ch'oe, Lee, and de Bary, eds., Sources of Korean Tradition II, 419.
9. US Government Accountability Office, Afghanistan Security, 24.
10. US Department of Defense, Report on Progress toward Security and Stability
in Afghanistan, April 2011, 20.
11. Mora, “Half of Afghan Military Forces Won’t Achieve 1st Grade Literacy
Level by 2012.”
12. International Council on Security and Development, Afghanistan Transition,
26–28.
13. Qiao and Wang, Unrestricted Warfare, 191.
14. Ibid., 2.
15. See Belasco, The Cost of Iraq, Afghanistan, and Other Global War on Terror
Operations since 9/11, 28–31.
16. Kapsis, “The Failure of U.S.-Turkish Pre-War Negotiations.”
17. See Mintz, “How Do Leaders Make Decisions?,” 8.
18. See Bartlett, Remembering.
19. See Piaget and Inhelder, Memory and Intelligence.
20. Maleki, “Decision Making in Iran’s Foreign Policy.” See also Afrasiabi and
Maleki, “Iran’s Foreign Policy after 11 September.”
21. Wertheimer, “Gestalt Theory.”
Chapter 2
Infantry
Yokneam
Megiddo
Chariots
Infantry
Taanakh
Aruna
Egyptian Egyptian
Axis of Council
Advance at Yehem
Operational Design
End State Operational Art Strategy
Objectives Direct vs. Indirect
Effects Operational Reach
Centers of Gravity Anticipation Concept
Decisive Points Culmination of Plan/Order
Lines of Operation/Effort Forces and Functions Operation
Arrangement of Operations
Assumptions
COA COA
Development Approval
Initiation
Analysis
Mission Analysis
Comparison
use operational art to build the design structure. This structure then
provides the analytical basis for understanding the environment,
identifying the problem, and developing an operational approach.
Design assists JFCs with creating a cognitive map to visualize the the-
ater strategy and provide the guidance necessary for COA develop-
ment. JFCs and planners use operational art to develop COAs based
on the vision embodied in the commander’s design. As planners ana-
lyze and war-game COAs, they can identify key preplanned decisions
that leaders must make. These activities also present a focal point to
formulate emergent opportunities that exploit projected environ-
mental conditions or enemy actions. This deliberate integration of
operational art and design forms a critical foundation for examining
risk, comparing COAs, and selecting a COA. When a COA is finally
selected, the JFC uses operational art and design to refine the cogni-
tive map and solidify the operational vision that synchronizes tactical
actions to accomplish operational objectives.
Recently several eloquent articles have described the complex ori-
gins and interactions among strategy, operational art, and design.
However, these intellectual endeavors have little utility unless com-
National/Multinational Receive
Strategy Strategic
Direction
Operational
Art
Operational
Frame the
Design
- Understand the Environment Problem
Establish Vision for Operational Design Assists
- Define the Problem
- Develop Operational Approach
Theater Strategy Operational Art in Linking a
— Create Initial Cognitive Map Series of Major Operations
Build Decision Develop COAs to Accomplish Strategic
Support Objectives by Providing a
Identify Preplanned
Template Cognitive Vision
Decisions
Formulate Emergent
Reframe the
Opportunities
Problem
around Key
Decisions
Develop Decision
Support Matrix
Refine Cognitive Map Operational Art
Refine Operational Synchronizes Tactical
Vision Actions to Accomplish
Operational Objectives
Direct Tactical Execution
manders and their staffs have a design methodology they can both
understand and use. As this analysis continues, it describes a meth-
odology that can be used to comprehend design and employ it to
provide clarity in visualizing the operational approach.
Notes
1. Joint Publication (JP) 5-0, Joint Operation Planning, 11 August 2011, III-5.
2. For a description of Megiddo, see Fuller, A Military History of the Western
World, vol. 1, 4–7.
3. Gabriel and Boose, Great Battles of Antiquity, 53.
4. Nelson, “Battle of Megiddo,” 22. See also Pritchard, Ancient Near Eastern Texts
Relating to the Old Testament, 234.
5. Gabriel and Boose, Great Battles of Antiquity, 59.
6. Dickson, “Operational Design,” 23.
7. JP 3-0, Doctrine for Joint Operations, 1 February 1995, III-10.
8. JP 3-0, Joint Operations, 11 August 2011, II-4.
9. JP 5-0, Joint Operation Planning, 11 August 2011, GL-13.
10. Ibid., I-5.
Chapter 3
Centers of Gravity
Line of Operation/Effort
Assessment of
Strategic National
Strategic End
State
Decisive Points
Line of Operation/Effort
End
Operational Objectives State
Decisive Points
Effects Determination of
Line of Operation/Effort Military End State and
Termination Criteria
Tactical
Assumptions:
Time
Decisive Points Politics
Forces
Enemy
Strategic
Diplomatic End State
Economic
Information
Military
Obj
Obj
Figure 15. The cognitive map and the four national instruments of power
and/or the Secretary of Defense that must be met before a joint op-
eration can be concluded.”8 Knowing when to terminate military op-
erations and how to preserve achieved advantages is essential to
achieving the national strategic end state. The conditions, derived
from the military end state and national strategic end state, contrib-
ute to developing termination criteria that must be met before con-
cluding military operations. Termination criteria require planners to
consider a wide variety of operational issues and anticipate the nature
of post-conflict operations.9 Termination criteria are dynamic. They
evolve throughout the JOPP and are usually not evident until after
the JOPP’s course of action analysis and war-gaming step. Therefore,
it is probably more efficient to use the military end-state conditions
as the initial termination criteria until the COA analysis is complete.
Planners should also realize that termination criteria can change
significantly during the execution of an operation because national or
multinational leaders may opt to modify directed strategic end-state
conditions to pursue less aggressive goals or take advantage of envi-
ronmental opportunities. As a result, termination criteria are essen-
tially in draft form until the strategic leadership directs the cessation
of military hostilities. Once cessation is directed, planners need to
review the termination criteria and refine them to meet leader expec-
tations and environmental conditions. Table 1 shows an example of
the relationships among a national strategic end state, a correspond-
ing military end state, and termination criteria.
The analysis of the national strategic end state, military end state,
and termination criteria, in conjunction with an assessment of the
operational environment, provides the basis for determining objec-
tives. Objectives are “clearly defined, decisive, and attainable goal[s]
toward which every operation is directed.”10 They describe the political,
economic, informational, and military goals necessary to accomplish
the desired end state. Examples of military objectives are:
• D
eter Vulpecula’s forces from armed intervention into the coun-
try of Auriga
• Enable humanitarian assistance in Auriga
• If deterrence fails, defend Auriga from Vulpeculan intervention
JFCs and their staffs support and clarify objectives by developing
measurable, desired strategic and operational effects and assessment
indicators. An effect is a physical and/or behavioral state of a system
methodology for employing design │ 37
Figure 16. Relationships among end state, objectives, effects, and tasks
tives, effects, and tasks was to force the Mongols to withdraw along
the river system. Using Ngo Quyen’s victory over the Chinese in 938
as an example, Tran Hung Dao calculated that these actions would
cause the Mongols to withdraw their forces via the Bach Dang River
system (fig. 17).11
Vietnamese
Ships Battle Site
Spikes
Mongol Ships
Identifying a COG
Identifying a COG requires three important analytical and itera-
tive steps. The first step is identifying the existing COGs at each level
of war. The second step is a critical-factor analysis of each of those
COGs to identify the decisive points and lines of operation leading
into the COG. The final step is an analysis of how operations may
shape and transform the COGs.
Determining a COG is a key step omitted from doctrine, and it
requires a disciplined methodology. Contemporary doctrine focuses
on critical-factor analysis without elaborating on how a COG itself is
identified. The danger of this approach is aligning the end state, ob-
jectives, and effects against the wrong COG. At a minimum, JFCs and
their staffs should consider enemy and friendly actors, their interests
methodology for employing design │ 41
Exists at each
Contains many level of war Mostly physical at
intangible elements operational and
at strategic level tactical levels
Often depends
on factors of time Is a source of leverage
and space
Information
Infrastructure
Social
Military
Node
Link
Operational
Center of
Gravity (COG)
Economic
Strategic COG Political
fighter aircraft and surface-to-air missiles (fig. 21). The Kari system
included French and Italian long-range and short-range radars capable
of detecting aircraft flying as low as 50 feet. Additionally, the system
was augmented with a Japanese RM-835 ground-based system capable
of tracking electronic emissions and Chinese Nanjing low-frequency
radars.18 This collective arrangement of equipment gave the Iraqis a
dynamic early warning system capable of identifying the launch of air
operations against their strategic and operational COGs.
IRAQI C2
Decisive Point
Protected COG
Decisive Point
Decisive Point
Kari System
KARI System
Iraqi C2
Supply of
Equipment Provide Early
Communication Links
Parts Warning
Fragile
Communication Early Warning Enable
Links Systems Intelligence
Power
Supply
Protected COG
Decisive Point
Israel
the campaign. These designated decisive points become the basis for
developing lines of operation (LOO), visualizations of a campaign’s
concept of operations that link tactical and operational objectives to
the end state.19 LOOs define the orientation of the force in time and
space or purpose in relation to an adversary or objective. LOOs also
assist JFCs in synchronizing military activities directed at a series of
strategic and operational objectives to attain the military end state.
An operation’s LOO can be described as physical, logical, or both.
JP 5-0 defines a physical LOO as “a physical line that defines the inte-
rior or exterior orientation of the force in relation to the enemy or
that connects actions on nodes and decisive points related in time
and space to an objective(s).”20 An example of a physical LOO is Gen-
eral MacArthur’s island-hopping campaign in the Southwest Pacific
during World War II. MacArthur maneuvered his forces along a geo-
graphic line of operation from Australia to New Guinea and then to
the Philippines (fig. 24).
A logical LOO is “a logical line that connects actions on nodes and
decisive points related in time and purpose with an objective(s).”21 A
logical LOO focuses on depicting an arrangement of tasks, effects,
and objectives. The Allied liberation of Western Europe provides an
excellent illustration of a logical LOO. On 12 February 1944, the Allied
combined chiefs of staff gave General Eisenhower a one-page direc-
tive ordering the reconquest of Western Europe. Using the Allied
48 │ methodology for employing design
Figure 24. Southwest Pacific in World War II: physical line of operation.
(Reprinted from Charles R. Anderson, Papua Campaign Brochure, US
Army Center of Military History, n.d.)
Operation Overlord
2. Build up resources
Strategic Leadership
Operational Operational
C4ISR
Reserve
Second Homeland
Tactical Front Line
Echelon Defense
Forces
Forces Forces
PH II PH III PH IV
Seize Initiative Dominate Provide Stability
for future phases. In general, COGs at the strategic level of war will
rarely change as an operation progresses. At the operational level of
war, COGs may change slightly, and at the tactical level they will most
probably change.
It is also important to understand that the relationships among the
levels of war change based on national strategic objectives and the
complexities of the operational environment. If attainment of na-
tional strategic objectives requires conventional military operations,
then the relationships among the three levels of war will more than
likely be arranged in a hierarchical fashion. However, if military
forces are employed in irregular warfare operations, the relationships
among the levels of war are much more dynamic. In irregular war-
fare, seemingly insignificant actions at the tactical level of war can
have immediate repercussions on the operational and strategic levels
of war. Figure 27 shows the contrast in how different types of opera-
tions shape and transform the relationships among the levels of war.
Strategic
Level
of War
Strategic
Level
Operational of War
Level
of War
Operational Tactical
Level Level
of War of War
Tactical
Level
of War
tant decisions a JFC will make. This decision involves a detailed con-
sideration of how LOOs align with friendly and enemy COGs and the
vertical and horizontal relationship of decisive points between LOOs.
Figure 28 depicts the multifarious nature of these relationships and
the challenges in determining how best to arrange operations.
Commanders assess a host of essential factors when determining
how to arrange and link related military operations. These factors in-
clude the geography of the joint operation area, available strategic lift,
changes in command structure, force protection, logistics, adversary
reinforcement capabilities, and public opinion.23 The doctrinal tool
for arranging the sequential and simultaneous nature of operations is
phasing. JP 5-0 defines phases as “definitive stage[s] of an operation
or campaign during which a large portion of the forces and capabili-
ties are involved in similar or mutually supporting activities for a
common purpose.”24
Phasing helps JFCs and their subordinates to visualize how an entire
operation will unfold and to determine force, resource, and time re-
quirements. The principal benefit of a phase is that it assists command-
ers in achieving major objectives by planning manageable subordinate
operations to gain progressive advantages. Phases can be sequential or
52 │ methodology for employing design
BP COGS END
VP STATE
Intervention
LOCAL AIR
DETERRENCE
SUPERIORITY
ACHIEVED LOCS VP DETERRED CJTF FOC
EARLY ARF FOC
SECURED FROM EARLY IN AUR+SAG
SA NAVAL IN JOA INTERVENTION
SUPERIORITY VP MIL
ACHIEVED FORCES
BP
Loss Port BLA ISOLATED
FROM VP
INSURGENCY
Capability
COUNTER-
DETERRED
HUMAN
INTEGRATION HUMANITARIAN
WITH LOCAL ASSISTANCE
AUR / PER
AUTH/IO/NGO ENABLED
STABILITY
NEO FREE ACCESS
ENABLED TO REGION/
AU AU
SECURITY RESOURCES
STABILIZED
STABILITY
FORCES
SECURITY
ACCESS TO HA
AND
Key to abbreviations
ARF Alliance Reaction Force JOA joint operations area
AU Aurigan LOCs lines of communications
AUR country of Auriga MIL military
AUTH authority MT mountain
BLA Batari Liberation Army NEO noncombatant evacuation operation
BP branch plan NGO nongovernmental organization
CJTF combined joint task force PER country of Perseus
COGs centers of gravity SA situational awareness
FOC full operational capability SAG country of Sagitta
HA humanitarian assistance SP sequal plan
IA international airport TOA transfer of authority
INFO information UN United Nations
IO information operations VP country of Vulpecula
Notes
1. Joint Publication (JP) 1-02, Department of Defense (DOD) Dictionary, 126.
2. US Army War College, Campaign Planning Primer AY 07, 10.
3. US Department of Defense, 2008 National Defense Strategy, 6.
4. Bush, President’s Address to a Joint Session of Congress and the American People.
5. US Department of Defense press briefing, Rumsfeld and Myers.
6. National Security Directive 54, Responding to Iraqi Aggression, 2.
7. JP 5-0, Joint Operation Planning, 11 August 2011, III-19.
8. JP 1-02, DOD Dictionary, 367.
9. JP 5-0, Joint Operation Planning, 26 December 2006, III-9.
10. JP 1-02, DOD Dictionary, 265.
11. Grant, ed., 1001 Battles That Changed the Course of World History, 181–86.
12. Chapius, A History of Vietnam from Hong Bang to Tu Duc, 84.
13. JP 3-0, Joint Operations, 11 August 2011, GL-6.
14. JP 5-0, Joint Operation Planning, 26 December 2006, GL-22.
15. Ibid., GL-19.
16. Kem, Campaign Planning.
17. Ibid. and Strange, Centers of Gravity and Critical Vulnerabilities.
18. Gordon and Trainor, The Generals’ War, 105.
19. US Army War College, Campaign Planning Handbook, 93.
20. JP 5-0, Joint Operation Planning, 26 December 2006, IV-20.
21. Ibid.
22. D’Amura, “Campaigns,” 42–51. See also Pogue, Supreme Command, which
provides a description of General Eisenhower’s wartime command, focusing on the
general, his staff, and his superiors in London and Washington and contrasting Al-
lied and enemy command organizations.
23. JP 5-0, Joint Operation Planning, 11 August 2011, III-35.
24. Ibid., IV-33.
25. JP 1-02, DOD Dictionary, 30.
26. Fuller, Military History of the Western World, 239.
27. Wells, The Battle That Stopped Rome.
28. US Army War College, Campaign Planning Handbook, 38.
29. JP 5-0, Joint Operation Planning, 11 August 2011, IV-8.
30. US Army War College, Campaign Planning Primer, 17.
31. Li, Millett, and Yu, Mao’s Generals Remember, 6.
32. Jian, “Sino-Soviet Alliance,” 26.
33. US Army, On Point.
34. US Joint Forces Command, Operation Iraqi Freedom May 2003 to June 2004.
Chapter 4
COA Development
Receive Input from Components and Interagency
that operational design should set the foundation for the analysis of
preplanned and emergent-opportunity decisions.
should also have enough structure to ensure that the staff under-
stands what the commander wants. One methodology embedded in
operational design for achieving this is the cognitive map described
in the previous chapter.
A cognitive map reflects the intrinsic relationships among LOOs,
decisive points, centers of gravity, objectives, effects, and the end-
state conditions. This visualization assists JFCs with determining the
arrangement of multiple LOOs and assessing the risks associated
with assumptions. But most importantly, the cognitive map identifies
initial decision points critical to the success of the operation. Note that
decision points are different from decisive points. A decision point is
a position in space and time when the commander or staff anticipates
making a key decision concerning a specific course of action.
Figure 30 depicts a JFC’s initial cognitive map developed prior to
providing COA guidance. The map indicates decisive points, LOOs,
enemy COGs, objectives, and end-state conditions. The map also de-
notes two key decision points that will shape the strategy. The first
decision point on the deter LOO identifies the crucial point where
deterrence fails. This decision point will mandate a military recom-
Deter
Strategic
Decision
Point Level
Secure
FDOs
Force
NEO APODs
Leadership
Protection
SPODs
Sequel
Combat Operations Termination
Operational
Level
Enemy Decision
Initiate Def. Off.
Point
Exploitation
Ops Forces
Pre ATO Ops Collapse Forces
Sequel
Security and Stability Tactical
Level
UN Insurgent
HA Eco. Assumptions:
Reconstruction Handoff Forces
Time
Politics
Forces
Enemy
mendation and a political decision to use force. The staff should take
this guidance and incorporate it into courses of action being devel-
oped. The second decision point on the combat operations LOO
identifies a decision to recommend termination of combat opera-
tions. In this case, planners assess that the enemy has limited strategic
objectives and will sue for peace prior to friendly forces achieving all
military termination criteria. This preplanned decision point allows
the JFC to formulate recommended decision criteria for political
leaders and determine how it affects the theater strategy and the at-
tainment of national or multinational strategic objectives. The main
point of this example is that developing a sound operational design
enhances the JFC’s ability to envision the best strategy for the opera-
tion or campaign. This strategy, linking the application of military
force to the attainment of national or multinational strategic objec-
tives, forms the basis for COA development.
When JFCs incorporate their strategic vision into COA develop-
ment, the staff ’s productivity increases significantly. This also pre-
vents the myopic exploration of divergent (e.g., preemptive and non-
preemptive) courses of action. Directing the development of a
nonpreemptive course of action is largely an unproductive activity
because of the exceptional risk to the military force involved. No one
should expect a US or multinational military force to stand idly by
while an adversary strikes a blow. The more astute guidance is to de-
velop courses of action with branches and sequels that give political
leaders the flexibility to use military force if deterrence fails. This type
of guidance also forms a much better foundation for identifying gov-
erning factors to select the best course of action.
In operational design it is imperative to understand that a large
number of factors shape theater strategy, but one of the most critical
influences on strategy is power projection. The Mongol conquest of
Transoxiana, modern day Uzbekistan, provides a relevant example
for today. In 1218 a Mongol caravan with emissaries was transecting
the territory of Transoxiana ruled by Shah Ala al-Din Muhammad II.
One of the Shah’s governors, Inalchuq, interdicted the caravan in the
vicinity of Otrar and slaughtered its 450–500 occupants. This event
occurred as the Mongols were heavily engaged in the conquest of north
China. As a result, instead of applying military force Genghis Khan
sent three emissaries to the Shah: two Mongols and a Muslim. The
Shah shaved the two Mongols, beheaded the Muslim, and sent his
head back to Genghis Khan with the two Mongol ambassadors. Out-
establishing the link │ 63
Protection
Combat
Combat
Power
C4IISR
C4IISR
Power
Force
Force
C-Day 7 14
Interdiction Maneuver
Package Package
Sustainment
Sustainment
Protection
Protection
Combat
Combat
Power
Power
C4IISR
C4IISR
Force
Force
14 21 C+28
Figure 31. Notional arrangement of modules into force packages
establishing the link │ 65
OPFOR COA
Base
COA
DP DP
of DP DP DP COG
Ops
DP DP
OPFOR COA
Cycle 1 Cycle 2
Executive Support
Director of War Gaming
Coordinator LNOs
Referee OA-Experts
Scribe
Chain of Command
Support
tural, ideological, and religious dimensions. When the red cell has
the ability to replicate the adversary’s decision-making model, it sub-
stantially enhances the effectiveness of war gaming and builds a key
perspective for the JFC to make friendly force decisions. Compre-
hending the enemy’s decision analysis model will also yield indica-
tions of whether or not the enemy is altering his strategy.
During the Vietnam War the North Vietnamese skillfully alter-
nated the emphasis of their strategy between conventional and un-
conventional operations (fig. 35). In 1965 the North Vietnamese
Army (NVA) and National Liberation Front (NLF) attempted to use
battalion-sized conventional attacks to achieve their objectives. As
the Americans applied conventional forces to counter this maneuver,
the NVA shifted to irregular warfare. Unable to accomplish its strate-
gic objectives through irregular means, the NVA launched the Tet
offensive of 1968. When this failed, it reverted back to irregular war-
fare. In 1972, as the Americans attempted to withdraw their forces
under the policy of Vietnamization, the North Vietnamese launched
the Nguyen Hue (Chiến dịch Xuân hè) or Eastertide offensive. This
offensive cost the NVA over 125,000 lives; however, it set them in a
Predicting Effects
The Vietnam Paradigm
120
110 Exploit Conventional
100 with Warfare
# NVA Bn or Larger Attacks
90 Conventional
Assets
80
70
Exploit
60 with
50 Unconventional
40 Assets
30 Irregular
20 Warfare
10
Initial Situation
War-game overview
Team with initiative Opposing team identifies Team with initial initiative
describes initial actions actions observed identifies actions observed
Opposing team asks Opposing team describes Team with initial initiative
questions for clarification reactions describes counteractions
Umpire adjudicates Team with initial initiative Team with initial initiative asks
asks questions for clarification questions for clarification
Scribes record results
Umpire adjudicates Umpire adjudicates
Cognition Phase
In the reaction step, the side without the initiative identifies the
opposing side’s actions it observed and summarizes its reactions.
When it finishes, the opposing team asks questions for clarification,
and the referee adjudicates any controversial activities. The scribes
record the results and insights from this step. Figure 37 shows this
sequence in a time line.
The side with the initiative then begins the counteraction step by
describing what it observed during the reaction step and giving an
overview of its counteractions. When this concludes, the side without
the initiative asks questions for clarification, and the referee provides
adjudication, if necessary. The scribes then record the results and in-
sights from this step.
The most important step in a war-game move is the cognition
phase. During this step the component LNOs, subject matter experts,
and operational analysts are polled for their insights on the war-game
move. The scribes review their conclusions for the plenary war-game
group. The focal points for this analysis are decision points, decision
establishing the link │ 71
Initial Situation
(10 min.)
War-game overview
(5 min.)
Review of strategic setting
Team with initiative (3 min.) Opposing team identifies (1 min.) Team with initial initiative (1 min.)
describes initial actions actions observed identifies actions observed
Opposing team asks (1 min.) Opposing team describes (3 min.) Team with initial initiative
(3 min.)
questions for clarification reactions describes counteractions
Umpire adjudicates Team with initial initiative (1 min.) Team with initial initiative (1 min.)
asks questions for clarification asks questions for clarification
Scribes record results (1 min.)
Umpire adjudicates Umpire adjudicates
priority targets are of interest to the staff. These are identified during
staff planning and war gaming. Target areas of interest differ from
engagement areas in degree. Engagement areas plan for the use of all
available weapons; target areas of interest might be engaged by a single
weapon.”8 Figure 38 shows a decision support template combining
decision graphics with a synchronization matrix.
DP 1
Synchronization Matrix
Activity/Time D-20 D-10 D-Day D+1 D+2 D+3 D+4 D+5 D+10
Phase Deterrence Seize Initiative Dominate
OPFOR
LCC
Components
MCC
ACC
SOCC
POTF
JIACG
C2
Intel
Functional
Sustainment
Areas
Joint
Info Ops
Civil Affairs
MILDEC
Decision Pts
Assessment
Branch
Sequel
CCIR
Risks
X
FEBA B TAI 1
X
DP 2
NAI 3
XX
TAI 3
NAI 2
FEBA A
XX
Perseus’s forces Deploy MEB ashore Vul Bde at > 70% strength has LCC Issue execution order to CJTF
Execute Order unable to block
penetration of Vul
penetrated FEBA A
ACC and coalition forces
Air and fires are insufficient Redesignate operational reserve
forces Authorize JFLCC to MCC
alone to stop penetration
commit MEB to block
SOF
FEBA A penetrated penetration of FEBA Perseus’s forces < 70%
by Vul 1st A along coastal AA strength Perseus and
Echelon Bde Perseus’s reserve already Auriga forces
committed
Figure 40. Decision support matrix with decision criteria for a warn-
ing order and execute order
76 │ establishing the link
Prevent escalation
Preclusion
1
1 2 6 9
Vul :
Demonstrate alliance
resolve to deter Vul
and widening of
conflict E
C4ISR
2 N
4
COIN
A B C D E
Counter BLA Restore security and
D
11 13 insurgency stability in AUR and
PER
BLA
5 Ensure
S
Security
37
Contribute to
restoration uninterrupted
access to region and
T
8 12 14
A
of regional peace and
security its energy sources
Aurigan
T
10 Security E
Forces Ensure safety of
Enable HA alliance nationals in
AUR
Enable evacuation
3 4 5 and HA ops Ensure FoM for HA
DECISIVE POINTS
Main Plan Sequel
1. IO dominance achieved 6. Vul isolated 12. Energy resources secured A. FEBA A defended
2. Lodgment secured 7. Govt. locations secured 13. BLA begins negotiation B. Air superiority established
3. Capella Int. Airport secured 8. Strategic infrastructures secured 14. Aurigan security forces capable C. Vul OEF culminated
4. Allied noncombatants secured 9. Vul ceases BLA support D. TBM/WMD threat neutralized
5. HA ops enabled 10. Kandar Valley secured E. Vul offensive forces destroyed
11. Insurgency contained
Decision Points End state: A peaceful, stable, and secure region with the
1. Initiate sequel 1 – deterrence fails sovereignty of each state secure within internationally recognized
2. Commit op reserve to FEBA A borders, not threatened by external aggression, with respect for the
3. Aurigan government collapses human rights of each individual and with freedom of access to the
4. Vul terminates hostilities international community.
5. BLA collapses
Notes
1. JP 1-02, Department of Defense (DOD) Dictionary, 370.
2. de Hartog, Genghis Khan, 86–98.
3. Greene, 33 Strategies of War, 181.
4. US Army, Army Strategic Planning Guidance, 14–15.
5. Thayer, War without Fronts.
6. JP 1-02, DOD Dictionary, 98.
7. Ibid., 249.
8. Ibid., 361.
9. Ibid., 99.
10. Catton, Grant Moves South, 323; and Bearss, Vicksburg Campaign, 427.
11. Badeau, Military History, 162–63.
Chapter 5
Governing Authority
Cost
Lives/$
Sanctuary
COIN
Will Security
to
Succeed Destabilization
and COIN design should
shape a vision that
Level of Services stabilizes the natural
Ambition trajectory of
Shadow insurgencies to foster
Governance the will to win.
Governance
Power
Consolidation
Economic Will
Development
5 10 15 Years
Figure 44. The classic clash of wills
operational design and counterinsurgency │ 85
Other
Support Communist
from Support
USSR Neutral and
Free World
Support North Support
from
China
Vietnam
War-Making
and Support
Enemy Enemy
Capabilities
Use of Use of
Laos Cambodia
DMZ
Air Space
Territorial Waters
Districts
Local VC Areas
VC Infrastructure and
Other Support
jective and possessed a dual character: the armed struggle and the
political struggle. Pike referred to the individual fighting the political
struggle as
the man in the black pajama of the Vietnamese peasant. His mission is to steal
the people away from the government. His concern is almost exclusively con-
trol of the people, as distinguished from the big-unit war, where the concern
is “control” of the enemy’s army. He seeks to achieve this through programs
designed to control the people, programs augmented and made possible by as
much (and as little) military effort as is required.8
COIN Design
Understand the System
Religious
P
Diversity
Desired
Political End Corruption
State
M
Security
Capacity
Demonstrate Enduring
Commitment
Insurgent
Historical
Context E Barriers
Sanctuary
Cultural
Integration
Build Trust,
Confidence,
Relationships
COIN
Campaign
Actors
(Friendly/Adversary)
S Governance
Capacity Knowledge Actions
Effectiveness
I Financial
System
Cultural
I
Illiteracy
Environment
Ethnic
Divisions
riers allows planners to scope the true context of the problem, ana-
lyze priorities, and determine a realistic balance of short- and long-
term desired results.
Once COIN planners frame the system, the focus becomes how to
engender a sense of enduring commitment to the host nation. COIN
forces must earn the trust and confidence of the host nation. One
method for accomplishing this is through cultural integration. The
process of cultural integration provides a mechanism for guiding
COIN forces in working within the host nation’s culture. Planners
assess the critical junctures where culture will have a dominant effect
in galvanizing popular support for COIN efforts. Planners should use
the historical, social, and anthropological information derived from
the systems analysis along with human terrain mapping to develop a
cultural integration process that links directly to policy actions.
There are three primary reasons why cultural integration is im-
portant. First, the insurgent uses the host nation’s culture to com-
municate with the population and gain support. This use of culture
empowers the clandestine infrastructure to project shadow gover-
88 │ operational design and counterinsurgency
Durand Line King Amanullah India Golden Age Indo-Pak Golden Age Soviet Soviet Najibullah US OIF Pakistan ISAF Strategy Lisbon Conf.
ISAF
King Abdur Rahman Partition Starts Wars Ends Invasion Withdrawal Collapse Intervention Elections Change
National Identity Forming Influence of Pakistan 30 + Years of War
Information
Military Economic CIVCAS
ANSF Kabul Conf ISAF Strategy
Local Security Hydro-Electric Elections
Police Torkham Gate Lisbon Conf.
CIVCAS Mining Threat Objective
Pak Sanctuary
Pak ISI
HQN – Haqqani Withdrawal of all foreign forces from
Social Network (Zadran Afghanistan and the reestablishment of
Challenges Loya Jirga T Tribe) the Islamic Emirate of Afghanistan
Political B
Islam
Rule of Law Issues TB – Taliban Restore Islamic Emirate of Afghanistan
Sharia Law
Elections H H
Tribes/Clans I I
Illiteracy
Pashtunwali G K
Corruption Infrastructure H
Dari-Pashto I T TTP – Tehrik-e Establish fundamentalist Islamic
Opium Production Water B
G Taliban PAK government in Pakistan
Reintegration Electricity T
Roads H N
I T H H S HIG – Hezb-e Islami Establish Sunni Islamist state under
Health Care B Q Q
G M Gulbuddin Gulbuddin Hekmatyar
Education N N
T
B HIK – Hezb-e Islami Regain historical control of Nangahar
Barriers
T Khalis
• TB/HQN Sanctuary in Pakistan B
• Cultural Understanding of Afghanistan T
T
• Security Capacity P TNSM – Tehrik Implement Sharia Law in PAK
H Nefaz-E Shariat
• CIVCAS Q
• Corruption Mohammdi
N
T
• Narco-Trafficking T T
• Illiteracy B P T
B Elements of Insurgent Influence
• Financial System
• Shadow governance
T Pakistan
B
• Population intimidated and/or coerced
• Insurgents have freedom of movement
• Friendly freedom of movement limited
ISAF Focus Cultural
Strategic Minerals • Infrastructure development disrupted
• National through local governance improved Qawm • Economic capacity truncated
• Security in key population centers Key Trade Routes Deobandi Islam
• Security connected between regions Pashtunwali
• Friendly freedom of movement assured Jirga
• Major infrastructure projects ongoing Human Terrain (Durrani, Ghilzay…)
Hoqooq
• Economic corridor sustainable Baksheesh
Helmand Province
23,058 square miles
Mountainous to north
Desert plain in south
Helmand River runs throughout
Source of water and electricity
Economy
Poppy cultivation
Barley, cotton, wheat
Apricots, grapes, melons
Animal husbandry
Ring road = main artery
Capital: Lashkar Gah
Population: up to 1.4 million
94% rural
Kajaki Dam
Ethnic composition
Vital to development plans
Mainly Pushtun
Electrifying southern Afghanistan
Barakzai: 32%
Increasing cultivation
Noorzai: 16%
Dam under renovation
Alokzai: 9%
Taliban controls surrounding areas
Eshaqzai: 5%
Some Baluch in south
Literacy rate: 4% Alizai Tribe
Regional Taliban HQ
Part of Durrani Confederation
Traditional Taliban Stronghold
Hasanzai Leader: Sher Mohamed Akhundzada
Opposed by some Insurgent Influence and Capability
Located in: Not Assessed
Baghran
INS Limited Capability
Alizai Musa Qala
Naw Zad INS Demonstrated Capability
Kajaki Districts INS Effective Capability
Dominated Helmand until 1994
Jalozai Returned to power in 2001
Reprisals taken against Eshaqzai
Phase Phase
Diplomatic
Economic
Strategic Strategic Strategic
Information COG End State
Military
Phase Phase
Security Obj
Operational
Termination Criteria
Military End State
Economic
Obj
Development
Phase Phase
Security
Tactical Obj
Termination Criteria
Military End State
Economic
Obj
Development
Diplomatic
Economic
Strategic Strategic
Information COG End State
Military
Strategic
Governing
Authority
Operational Tactical
LOE KTD
Stage Stage
Security Obj LOE KTD
Provinces
Services Obj
Operational
Strategic
LOE KTD
COG COG
Governance Obj
LOE KTD
Termination Criteria
Obj RIP RIP
Development TOA TOA
RIP
TOA
Figure 50. COIN design and the relationships among levels of war
operational design and counterinsurgency │ 95
RIP/TOA Effect
Security Obj
Termination Criteria
Military End State
Services Obj
Operational Strategic
COG COG
Governance Obj
Economic
Development Obj
Deny TB overthrow
Economic Afghan Electric Water Mining 1390 Strategic of GIROA
Corridors Financial Grid System Budget
System
End State
COG - GIROA governance
Disrupt, Dismantle,
Information confidence gap minimized
Defeat AQIA
GIROA - Government corruption
reduced to norm
Opium Afghan ANSF Legitimacy
CIVCAS Corruption Reintegration
Production Governance Capacity Strengthen capacity of
to Govern ANSF and GIROA
Initiate
Military Withdrawal - ANSF at sufficient levels to defend against Taliban
- ANSF capable of providing local security
Figure 52. Synchronizing operational design relationships among levels of war (continued)
100 │ operational design and counterinsurgency
of war are working in conjunction with one another and not working
at cross purposes. It identifies key decision points, relationships
among lines of operation, points at which the two levels of war are
not synchronized, and the potential impact of improperly aligned
stages and RIP/TOAs.
At the tactical level of war, complexity has an enormous impact on
the development of the cognitive map. Tactical commanders face a
great diversity of challenges, such as different insurgent groups operat-
ing in their area of operations, ethnic and tribal enclaves, and vast dif-
ferences in area resources and host-nation political leaders’ capabilities.
To meet the challenges emerging out of the US COIN experiences in
Iraq and Afghanistan, the organizational structure of the combined
joint operations area (CJOA) is evolving. This is clearly seen in Afghan-
istan, where the CJOA structure is based on regional commands (RC),
key terrain districts (KTD), and area-of-interest districts. This type of
CJOA organization is not a new concept. It has been used in varying
degrees since ancient times. This organizational approach, however,
provides a fresh perspective on battlespace ownership and focusing op-
erations. In this concept, the operational-level headquarters oversees a
series of regional commands. The regional commands coordinate all
regional civil-military activities conducted by the military elements in
a number of different provinces. An illustration of this is seen in the
ISAF’s regional command organization of Afghanistan (fig. 53).
To maximize the effectiveness of COIN operations, each of these
regional commands has undergone a district-level key terrain assess-
ment to identify key terrain districts and area-of-interest districts.
KTDs contain concentrated populations, major centers of economic
productivity, key infrastructure, and key commerce routes. Area-of-
interest districts exert influence on KTDs and facilitate information
collection and operational resource support.19 Additionally, the ISAF
has linked the KTD system to economic corridors that support the
vision for economic development. Figure 54 illustrates Afghanistan’s
KTDs, area-of-interest districts, the Ring Road, and the border cross-
ing points that generate the majority of Afghanistan’s revenue.
The ISAF and its operational-level headquarters, the ISAF Joint
Command, have a specific set of selection criteria for designating
KTDs and area-of-interest districts. However, planners should un-
derstand that the physical location of KTDs may also be an important
consideration for selection. In Counterinsurgency Warfare: Theory and
Practice, David Galula describes the optimum geographic environments
RC (North)
RC (West) RC (East)
RC (South)
RC (Southwest)
#7 – Torah Ghundey
#4 – Islam Qal’eh
#1 – Tor Kham
#8 – Ghulum Khan
and physical shapes for both insurgencies and COINs. He states that
the most favorable shape for an insurgency is a land-locked blunt star
and for COIN operations an island shaped like a pointed star.20 Al-
though Galula does not elaborate on the rationale for these shapes,
the primary consideration is undoubtedly security of the population.
What is significant about Galula’s main point is that KTDs should be
positioned where they collectively provide maximum security for the
population. A commander may not have the luxury of conducting
COIN operations on an island shaped like a pointed star, but he or
she may be able to artificially create those conditions.
Doctrinal changes are also affecting the articulation of tactical-
level cognitive maps. Recently JP 5-0, Joint Operation Planning (revi-
sion final coordination), introduced the term lines of effort (LOE) to
the joint lexicon. LOEs establish operational and strategic conditions
by linking multiple tasks and missions.21 If we combine the impact of
RIP/TOAs on operational continuity, KTDs, economic corridors, and
LOEs with the overarching focus on governing authority, the cogni-
tive map at the high tactical level may resemble figure 55. In this
model, the operational-level headquarters issues guidance to RCs on
objectives using stages and RIP/TOAs to delineate overlapping respon-
sibilities between units. The stage defines what the common objectives/
tasks are and the RIP/TOA describes the specific KTD conditions units
must achieve to meet their responsibilities towards those objectives/
tasks. The tactical units assuming responsibility for the RC then use
Regional
Command
LOE KTD(s)
Provincial-
LOE KTD(s)
Level
Governing
LOE KTD(s)
Authority
LOE KTD(s)
that guidance to develop LOEs aimed at the directed KTD tasks. The
cumulative impact of the LOEs and KTD tasks should be directed at
enhancing the provincial-level governing authority.
Some examples of tactical-level LOEs are:
• Expanding governance of KTDs along Highway 7.
• S ecuring freedom of movement along Highway 1 to facilitate
economic opportunity for KTDs A, B, and C.
• S ecuring the economic corridor from Gardez-Khost (GK) to
Highway 1 to increase stability for KTDs D, E, F, and G.
• Building local security force capacity in KTDs H, I, and J.
The overall objectives of providing a common structural frame-
work for operational design are continuity and unity of effort. Units
and agencies responsible for executing COIN operations need as
much clarity as possible. This can happen only with an understand-
ing of everyone’s roles and a vision for integration. Additionally, a
common framework affords the ability to visualize risk and leverage
interdependencies between agencies to mitigate that risk.
Base
Camp Contested
Area
Consolidation Local
Operation Village
Strike Operation Security
by Conventional
Forces Regional
District
Forces
local security to take place. This is done in concert with special opera-
tions forces that prepare insurgent-contested areas for the introduction
of local security forces. After this foundation is established, local secu-
rity forces assume security responsibility for consolidation operations
and the introduction of police forces. Local security forces tie into po-
lice operations and bring the population under government control.
This widespread dispersion of forces provides better protection for the
people and frees conventional forces to strike insurgent refuges.
The classic mistake is handing off responsibility for local security
to police forces before the necessary conditions have been established
for their success. Handing off local security to an unprepared police
force is a critical and unforgiving vulnerability. A key illustration of
this is the Brookings Institution’s data on Afghan security force casual-
ties, 2007–09 (table 3).22 In addition to those casualties, Afghanistan’s
Ministry of the Interior reported 595 police officers killed and 1,345
wounded during the first six months of 2010. There are numerous
reasons for the disparity of casualties between the Afghan National
Army (ANA) and the Afghan National Police (ANP). Two of the pri-
mary causes are training and equipment. The ANP are neither trained
nor equipped to face the security environment they are being thrust
into. The ISAF has made Herculean strides to correct these deficien-
cies, but there is still a missing dimension in Afghanistan’s security—
the intermediate layer of local security forces.
operational design and counterinsurgency │ 105
Reprinted from Michael E. O’Hanlon and Ian Livingston, Iraq Index: Tracking Variables of Re-
construction & Security in Post-Saddam Iraq (Washington, DC: Brookings, 31 October 2010), 9.
Percent of
South Vietnamese Responsibility for Rural
Population Hamlet Security
60
50
40
PF
30
RF
20 National Police
10
0
1969 1970 1971 1972
killed or captured than any other force. In 1970 they were responsible
for 50 percent of the VCI killed or captured and in 1971 approxi-
mately 39 percent. As Thomas Thayer points out in War without
Fronts, the RFs and PFs were the most cost-effective forces of the
Vietnam War. They secured more territory than any other force, in-
creased friendly-force ratios, and inflicted between 23 and 33 percent
of the total communist combat deaths. They accomplished this while
receiving only 4 percent of the total war budget.32
Effectiveness in the RF/PF model does not originate from simply
emplacing another layer of security at the local level. Planners need
to understand efficiency and how to generate the local security forces’
commitment to the host nation’s governing authority. An option that
is often ignored is establishing a mechanism for recycling conventional-
force manpower. Under this concept conventional force members
that have completed their term of service are either placed into or
recruited for local security. Many nations operate with militaries
founded on a system of conscription that obligates individuals to a
certain number of years of service. Once they complete their term of
service, these individuals return to their homes without further obli-
gation. The cost of not leveraging this efficiency is significant. Be-
tween mid 1981 and January 1983—during El Salvador’s Civil War—
over 7,000 Salvadoran soldiers were trained at Fort Benning, Georgia.
By June 1983 only half of these soldiers were still on active duty, and
of the ones trained in 1981, only 15 percent remained.33 The failure to
harness this manpower for local security was amplified by the cost of
the soldiers’ training. The cost of training El Salvador’s Bellosso bat-
talion, 500–600 men, was $8 million.34
Galvanizing the population to support local security is an excep-
tionally difficult task. Local security patrols represent a direct chal-
lenge to insurgents for control of the population, making them high
visibility targets. The simplest and perhaps most effective method of
gaining popular support is by expanding the populace’s material reli-
ance on the government. In many situations this can be done at a
negligible cost. Areas worthy of investment include:
• medical care for wounded personnel,
• immunizations, aspirins, and other common drugs,
• agricultural information on crops, agronomy, and animal husbandry,
• education for children and adult literacy programs,
110 │ operational design and counterinsurgency
Key
Parliamentary 1390 Budget
Events 1389 Budget Kabul Conf. LISBON Conf. Reintegration
Elections
Nauroz Al-Hajj Nauroz
Key Dates Al-Hajj
Victory of Muslim Ramadan (11 AUG – 9 SEP) Victory of Muslim
Ashura
Ashura Nation (28 APR) Independence Day (19 AUG) Nation (28 APR)
Haqanni
HIG Quetta
HIK Shura Reconciliation
TTP Meeting
Positive
Perceptions
of Local 100
Conditions 90 Living Conditions Minimum Support
80 for Success
70
Governance
60 Confidence
Security Gap
50
40
30
20
10
Time
Figure 59. Measuring the governance confidence gap
116 │ operational design and counterinsurgency
Conclusion
Design is on the verge of a doctrinal breakthrough that will have a
far-reaching impact on how JFCs and their staffs develop campaigns.
Forging design’s future, however, requires a methodology that can be
explained, understood, and applied. This methodology must also in-
corporate the foresight to visualize the salient differences between the
design used for major conventional operations and the design em-
ployed in irregular warfare. These radically different operational con-
texts require distinctive methodological approaches that distill clarity
for commanders and staffs. Regardless of the operational context,
however, operational design’s effectiveness revolves around linking
design to decision making and risk analysis. In the future, planning,
decision, and execution cycles will be significantly compressed. JFCs
and their staffs will face complex networks of nation-state and non-
nation-state adversaries, a proliferation of critical technology, crip-
pling cyber attacks, and denial of the electromagnetic spectrum.
Overcoming these challenges mandates a vision that will expedite ef-
fective decision making and institutionalize approaches to accurately
assessing risk. When this occurs, well-developed plans will survive
first contact.
operational design and counterinsurgency │ 117
Notes
1. Clausewitz, On War, 87.
2. Metz, “Counterinsurgent Campaign Planning,” 61.
3. Joint Publication (JP) 3-24, Counterinsurgency Operations, GL-6.
4. Ibid., GL-5.
5. Jones, Counterinsurgency in Afghanistan, 10.
6. Galula, Counterinsurgency Warfare, 55.
7. Combined Intelligence Center Vietnam, The Enemy System, 2–3.
8. Pike, Viet-Cong Strategy of Terror, 17–18.
9. Combined Intelligence Center Vietnam, The Enemy System, 2–3.
10. US Department of Defense, Southeast Asia Statistical Summary, Table 3, 14
February 1973.
11. Thayer, War without Fronts, 32.
12. McFate and Jackson, “Object beyond War,” 13.
13. Galula, Counterinsurgency Warfare, 54–56.
14. Blackledge, Lardner, and Riechmann, “After Years of Rebuilding, Most Af-
ghans Lack Power.”
15. Trofimov, “U.S. Rebuilds Power Plant.”
16. Cloud, Rodriguez, and King, “Pakistan Closes Border Crossing.”
17. Rising, “Pakistan to Reopen Border Crossing Used by NATO.”
18. Kilcullen, Accidental Guerrilla, 70–109.
19. US Department of Defense, Report on Progress toward Security and Stability
in Afghanistan and United States Plan for Sustaining the Afghanistan National Secu-
rity Forces, 34.
20. Galula, Counterinsurgency Warfare, 25.
21. JP 5-0, Joint Operation Planning, revision final coordination.
22. Livingston, Messera, and O’Hanlon, Afghanistan Index, 13.
23. Gibb, “Where Will All the Soldiers Go?,” 47–48.
24. Manwaring and Prisk, El Salvador at War, 357.
25. Bacevich et al., American Military Policy in Small Wars, 40.
26. Rubin and Farrell, “Awakening Councils by Region.”
27. O’Hanlon and Livingston, Iraq Index, 3–12.
28. Ibid., 3.
29. DePetris, “Remember the Sons of Iraq?”
30. Harari, “Uncertain Future for the Sons of Iraq,” 3.
31. Thayer, War without Fronts, 157.
32. US Department of Defense, Southeast Asia Analysis Report, 32–34.
33. Oriofsky, “Operation Well Being Begins,” 448.
34. Craves, “Foreign Assistance Resource Problems,” 26.
35. Americas Watch Committee and Lawyers Committee for International Hu-
man Rights, Free Fire, 4.
36. Thayer, War without Fronts, 145–51.
37. Bjelajac, “Guidelines for Measuring Success in Counterinsurgency,” 1.
38. Sweetland, Item Analysis of the HES (Hamlet Evaluation System), 3.
39. Flynn, Pottinger, and Batchelor, Fixing Intel, 4.
Abbreviations
AA avenue of approach
ACC air component commander
ANA Afghan National Army
ANP Afghan National Police
ANSF Afghan National Security Forces
AOR area of responsibility
APOD aerial port of debarkation
ARF Alliance Reaction Force
ATO air tasking order
AU Aurigan
AUR country of Auriga
AUTH authority
BCT brigade combat team
Bde brigade
BLA Batari Liberation Army
Bn battalion
BP branch plan
C2 command and control
C4I command, control, communications, computers,
and intelligence
C4ISR command; control; communications; computers;
and intelligence, surveillance, and reconnaissance
CCF Chinese communist forces
CCIR commander’s critical information requirement
CHOP change of operational control
CIVCAS civilian casualty
CJOA combined joint operations area
CJTF combined joint task force
CMH Center of Military History
COA course of action
COG center of gravity
COIN counterinsurgency
CPVF Chinese People’s Volunteer Force
Def. defensive
DMZ demilitarized zone
DP decision point
120 │ abbreviations
effects (as an element of operational de- irregular warfare, 50, 68, 92, 116
sign), 5, 8, 10–11, 14, 21, 25, 31–32, Israel, 46–47
36–40, 42, 47, 49, 52–53, 57, 61, 67,
Janus strategy, 95
74, 80, 86, 93, 97, 113–14
Johnston, Gen Joseph, 2–4, 80
Egypt, 21–23
joint doctrine, 23, 25, 40, 52, 54, 59
El Salvador, 105, 109–10
joint operation, 24, 36, 41, 43, 51, 60, 102
elements of operational design, 21,
joint operation planning process
24–27, 31–32, 93
elements of power, 6 (JOPP), 24–27, 31, 36, 55, 59–60,
end state, 25, 40, 49, 86, 97; end-state 65, 73, 76–77, 97
conditions, 6, 8, 19, 21, 23, 34, 36, Joint Publication 3-0, 23–24, 76
39, 42, 50, 61, 114; military end Joint Publication 3-24, 83
state, 21, 24, 32–33, 35–38, 47; po- Joint Publication 5-0, 24, 41, 43, 47, 51,
litical end state, 9–12, 14; strategic 102
end state, 31–38, 42, 50, 57, 67 Joint Strategic Capabilities Plan, 33
execute order, 75–76 juche, 7
Farabundo Martí National Liberation Kajaki Dam, 88–89, 91
Front, 105 Kandahar Province, 8, 89
force protection, 51, 53, 63, 74 Kari system, 44–46
frame-of-reference theory, 15 Kem, Jack, 42
Galula, David, 84, 100, 102 key terrain district (KTD), 100–103
Genghis Khan, 62 Kilcullen, David, 96
Gestalt theory, 17–18 Kim Il-sung, 7
Grant, Ulysses S., 78–80 Kuwait, 34–35
Guidance for the Employment of the Lee, Gen Robert E., 4–5
Force, 33 levels of war, 40, 42, 45, 47, 49–51, 55–56,
Hamlet Evaluation System (HES), 108, 77, 89, 92–95, 97–100, 105–6
113–15 Lincoln, Pres. Abraham, 2–3
Haqqani network, 13, 93 lines of effort (LOE), 102–3
Helmand Province, 8, 88–89 lines of operation (LOO), 6, 19, 25, 31,
Hezb-e-Islami Khalis, 93 40, 44, 47–49, 51, 61–62, 79, 97, 100
illiteracy, 7–8, 86. See also literacy literacy, 8, 109. See also illiteracy
information operations (IO), 8, 10, 52, MacArthur, Gen Douglas, 47
73–74, 110 Magruder, Gen John B., 4
instrument of power, 6, 32–33, 35, 53, 97 Malvern Hill, 4
insurgency, 74, 83, 86, 92–93, 102–3, McChrystal, Gen Stanley, 13
105–6, 114 McClellan, Gen George B., 2–5
insurgent, 13, 84, 87, 92, 95, 100, 104–6,
Megiddo, Battle of, 21–23
111, 113–14
Military Assistance Command Viet-
International Security Assistance Force
nam (MACV), 85–86
(ISAF), 10, 13, 88, 93, 100–101,
mirror imaging, 15–16
104, 115
Mongol Empire, 38–39, 62–63
Iran, 7, 16–17
Iraq, 7, 11, 13, 34–35, 44–46, 57, 63, 93, named area of interest (NAI), 71, 73–75
96, 100, 106–7 National Defense Strategy, 33
index │ 133
Chief Editor
Demorah Hayes
Copy Editor
Tammi K. Dacus
Quality Review
James Howard
AFRI~~~
AIR FORCE RESEARC H INSTITUTE
http://aupress.au.af.mil
ISBN 978-1-58566-221-0