94 Sample
94 Sample
com
e
pl
m
Sa
TAA2
(Sample Only) Find this and other SMARTbooks at [Link]
[Link]
SMARTBOOK
Second Edition
with Change 1
e
pl
m
Sa
Foreign
Train, Advise & Assist
Second Edition with Change 1 (Sept 2017)
Notice of Liability
The information in this SMARTbook and quick reference guide is distributed on an “As Is”
basis, without warranty. While every precaution has been taken to ensure the reliability and
accuracy of all data and contents, neither the author nor The Lightning Press shall have
any liability to any person or entity with respect to liability, loss, or damage caused directly
or indirectly by the contents of this book. If there is a discrepancy, refer to the source docu-
ment. This SMARTbook does not contain classified or sensitive information restricted from
public release.
“The views presented in this publication are those of the author and do not necessarily
represent the views of the Department of Defense or its components.”
SMARTbook is a trademark of The Lightning Press.
Photo Credits. Cover: Marines with 3rd Air Naval Gunfire Liaison Company and Japanese
soldiers coordinate plans during a combined arms shoot with naval gunfire, attack rotary
aircraft and 120mm mortars at San Clemente Island, California, Sept. 1, 2015. ANGLICO Ma-
rines and Japanese soldiers conducted the live-fire shoot as part of Exercise Dawn Blitz 2015
(USMC Photo/Released). Other photos courtesy of the Dept of Defense and Dept of Army.
Printed and bound in the United States of America.
[Link]
(Sample Only) Find this and other SMARTbooks at [Link]
(TAA2)
Notes to Reader
TAA2: The Military Engagement, Security Cooperation &
Stability SMARTbook, 2nd Ed. (Train, Advise & Assist)
Throughout U.S. history, U.S. forces have learned that military force alone cannot
secure sustainable peace. U.S. forces can only achieve sustainable peace through a
comprehensive approach in which military objectives nest in a larger cooperative effort
of the departments and agencies of the U.S. Government, intergovernmental and nongov-
ernmental organizations, multinational partners, the private sector, and the host nation.
Military engagement, security cooperation, and stability missions, tasks, and
actions encompass a wide range of actions where the military instrument of national
power is tasked to support OGAs and cooperate with IGOs (e.g., UN, NATO) and other
countries to protect and enhance national security interests, deter conflict, and set con-
ditions for future contingency operations. Use of joint capabilities in these and related
activities such as security force assistance and foreign internal defense helps shape
the operational environment and keep the day-to-day tensions between nations or
groups below the threshold of armed conflict while maintaining US global influence.
Stability operations are various military missions, tasks, and activities conducted
e
outside the US in coordination with other instruments of national power to maintain
or reestablish a safe and secure environment, provide essential governmental ser-
pl
vices, emergency infrastructure reconstruction, and humanitarian relief.
Peace Operations are crisis response and limited contingency operations con-
ducted by a combination of military forces and nonmilitary organizations to contain
conflict, redress the peace, and shape the environment to support reconciliation and
m
(TAA2)
References
The following references were used to compile TAA2: The Military Engagement, Security
Cooperation & Stability SMARTbook, 2nd Ed. All references are considered public domain,
available to the general public, and designated as “approved for public release; distribution
is unlimited.” TAA2: The Military Engagement, Security Cooperation & Stability SMARTbook,
2nd Ed. does not contain classified or sensitive material restricted from public release.
(TAA2)
Table of Contents
The Range of Military
Chap 1
Operations (ROMO)
The Conflict Continuum (Range of Military Operations).............1-1*
I. The Range of Military Operations (ROMO).................................................... 1-1*
II. Military Operations and Related Missions, Tasks and Actions....................... 1-2*
I. Military Engagement, Security Cooperation, & Deterrence.....1-3*
The Conflict Continuum..................................................................................... 1-5*
I. Typical Operations and Activities.................................................................... 1-8*
A. Military Engagement Activities................................................................. 1-8*
B. Emergency Preparedness....................................................................... 1-8*
C. Arms Control, Nonproliferation, and Disarmament.................................. 1-8*
e
D. Combating Terrorism............................................................................... 1-9*
E. Support to Counterdrug (CD) Operations................................................ 1-9*
pl
F. Sanction Enforcement.............................................................................. 1-9*
G. Enforcing Exclusion Zones...................................................................... 1-9*
H. Freedom of Navigation and Overflight................................................... 1-10*
I. Foreign Assistance.................................................................................. 1-10*
m
J. Security Assistance (SA)........................................................................ 1-10*
K. Security Force Assistance (SFA)........................................................... 1-10*
L. Foreign Internal Defense (FID)...............................................................1-11*
M. Humanitarian Assistance........................................................................1-11*
Sa
N. Protection of Shipping............................................................................1-11*
O. Show of Force Operations......................................................................1-11*
P. Support to Insurgency............................................................................ 1-12*
Q. Counterinsurgency................................................................................ 1-12*
II. Other Considerations................................................................................... 1-12*
II. Crisis Response and Limited Contingency Operations........1-13*
I. Typical Crisis Response Operations............................................................. 1-14*
A. Noncombatant Evacuation Operations (NEO)....................................... 1-14*
B. Peace Operations (PO)......................................................................... 1-14*
C. Foreign Humanitarian Assistance (FHA)............................................... 1-15*
D. Recovery Operations............................................................................. 1-15*
E. Strikes and Raids................................................................................... 1-15*
II. Unique Considerations................................................................................ 1-16*
III. Homeland Defense and Defense Support to Civil Authorities (DSCA)....... 1-18*
III. Large-Scale Combat Operations.............................................1-19*
Joint Operation Model (Example Activities)..................................................... 1-20*
I. Considerations for Deterrence...................................................................... 1-22*
- Flexible Deterrent Options (FDOs) and Flexible Response Options (FROs).. 1-24*
III. Considerations for Seizing the Initiative..................................................... 1-22*
III. Considerations for Dominance................................................................... 1-26*
V. Considerations for Stabilization................................................................... 1-27*
VI. Considerations for Enabling Civil Authority................................................ 1-27*
Table of Contents-1
(Sample Only) Find this and other SMARTbooks at [Link]
Chap 2
Train, Advise
& Assist
Train, Advise & Assist (Overview)................................................. 2-1*
Security Relationships....................................................................................... 2-1*
I. Security Cooperation...................................................................................... 2-1*
II. Security Cooperation Activities.................................................................... 2-1a*
III. Integrated Security Cooperation Activities.................................................... 2-2*
IV. Security Cooperation Purposes.................................................................... 2-3*
I. Security Force Assistance (SFA)............................................... 2-5*
I. Security Force Assistance (SFA) Tasks.......................................................... 2-5*
A. Organize.................................................................................................. 2-5*
B. Train......................................................................................................... 2-6*
C. Equip....................................................................................................... 2-8*
D. Rebuild and Build.................................................................................... 2-8*
E. Advise and Assist..................................................................................... 2-8*
II. Security Force Assistance (SFA) Activities.................................................... 2-7*
III. Types of Security Force Assistance (SFA).................................................... 2-9*
A. Advising................................................................................................... 2-9*
e
B. Partnering................................................................................................ 2-9*
C. Augmenting.............................................................................................. 2-9*
pl
IV. The Advisor................................................................................................. 2-10*
II. Foreign Internal Defense (FID/IDAD)........................................2-11
I. Foreign Internal Defense (FID)....................................................................... 2-11
- The Foreign Internal Defense Framework.................................................2-12
m
A. Indirect Support.......................................................................................2-17
B. Direct Support Not Involving Combat Operations....................................2-17
C. Combat Operations.................................................................................2-17
D. Transition and Redeployment..................................................................2-19
IV. Planning for Foreign Internal Defense..........................................................2-18
V. Foreign Internal Defense Training.................................................................2-19
A. Training and Advising...............................................................................2-19
B. FID Training Plan.....................................................................................2-21
C. Trainer/Advisor Checklists.......................................................................2-22
D. Executing the FID Mission.......................................................................2-24
VI. Embassy and Security Cooperation Working Relationships........................2-26
III. Understanding Culture..............................................................2-27
I. Understanding Culture....................................................................................2-27
- Culture Influences How People View Their World.....................................2-28
- Culture is Holistic.......................................................................................2-28
- Culture is Learned and Shared..................................................................2-29
- Culture is Created by People and Can Change.........................................2-29
II. Assessing a Cultural Situation.......................................................................2-30
- Cultural Assessments................................................................................2-31
- Key Leader Engagements (KLE)...............................................................2-31
III. Organizing to Understand Culture................................................................2-33
A. Green Cell and Cultural Advisors.............................................................2-33
B. Human Terrain System............................................................................2-34
2-Table of Contents
(Sample Only) Find this and other SMARTbooks at [Link]
Table of Contents-3
(Sample Only) Find this and other SMARTbooks at [Link]
Chap 3
Stability
in Operations
Stability in Operations (Actions/Tasks/Efforts)........................... 3-1*
I. Stability in Operations..................................................................................... 3-1*
II. Stability within the Range of Military Operations........................................... 3-2*
III. Understanding Stability................................................................................. 3-3*
- End State Conditions for Stability............................................................ 3-3a*
IV. Understanding the Root Causes and Immediate Drivers of Instability......... 3-4*
A. The Fragile States Framework................................................................. 3-6*
B. Elements of Stable States....................................................................... 3-6*
C. Understanding the Immediate Drivers of Stability................................. 3-10*
V. Fundamentals of Stabilization....................................................................... 3-5*
VI. Principles of Joint Operations to Achieve Stability....................................... 3-8*
- Maintaining Legitimacy.............................................................................. 3-9*
VII. The Stabilization Framework..................................................................... 3-10*
A. Initial Response Stage........................................................................... 3-12*
B. Transformation Stage............................................................................ 3-12*
C. Fostering Sustainability Stage............................................................... 3-12*
e
VIII. Stability Actions in Other Joint Operations............................................... 3-13*
IX. An Integrated Approach (Linking Military and Civilian Activities)................ 3-14*
pl
- Stabilization and Reconstruction Essential Tasks Matrix (ETM).............. 3-14*
X. A Comprehensive Approach........................................................................ 3-18*
XI. A Whole of Government Approach............................................................. 3-20*
I. Primary Army Stability Tasks.....................................................3-21
m
IV. Transitions....................................................................................................3-41
V. Security Sector Reform (SSR).......................................................................3-42
VI. Disarmament, Demobilization, and Reintegration (DDR).............................3-44
VII. Foreign Humanitarian Assistance (FHA)................................................... 3-46*
VIII. Counterinsurgency.....................................................................................3-48
IX. Protection of Civilians...................................................................................3-48
X. Inform and Influence Activities in Stability.....................................................3-50
XI. Lethal and Non-Lethal Actions.....................................................................3-52
XII. Intelligence..................................................................................................3-52
III. Stabilization Planning............................................................. 3-53*
I. Stabilization Planning................................................................................... 3-53*
II. Understanding the Operational Environment (OE)...................................... 3-54*
The Operational Environment (OE) in Stabilization Efforts........................ 3-55*
A. Planning, Execution and Assessment.................................................... 3-54*
B. Establish an Evolving Common Operational Picture (COP).................. 3-56*
C. Joint Intelligence Preparation of Environment (JIPOE) ........................ 3-56*
III. Planning Stabilization Efforts...................................................................... 3-57*
A. Operational Approach............................................................................ 3-57*
B. Stability and Defeat Mechanisms.......................................................... 3-59*
IV. Phasing Major Operations and Campaigns................................................ 3-60*
V. Operational Art and Stability in Operations.................................................. 3-62*
A. End State and Conditions...................................................................... 3-62*
B. Decisive Points...................................................................................... 3-63*
e
C. Lines of Effort......................................................................................... 3-64*
D. Operational Approach............................................................................ 3-65*
pl
E. Force Organization................................................................................ 3-66*
F. Assessment............................................................................................ 3-66*
VI. Planning Transitions and Transferring Authorities...................................... 3-68*
IV. Civil-Military Teaming (PRT/JIACG/JCMOTF/JIATF)............ 3-69*
m
Table of Contents-5
(Sample Only) Find this and other SMARTbooks at [Link]
Chap 4
Peace
Operations (PO)
Peace Operations (Overview)..........................................................4-1
I. Types of Peace Operations..............................................................................4-1
II. Characteristics of Peace Operations...............................................................4-3
III. Legal Basis of Peace Operations...................................................................4-4
IV. The Peace Operations Environment..............................................................4-4
V. Command and Control Considerations...........................................................4-5
VI. The Planning Process....................................................................................4-5
VII. Fundamentals of Peace Operations..............................................................4-6
VIII. Transition Planning.......................................................................................4-9
IX. Key Documents in Peace Operations..........................................................4-10
I. Peacekeeping Operations (PKO)...............................................4-11
I. Fundamentals of Peacekeeping Operations.................................................. 4-11
II. Peacekeeping Tasks......................................................................................4-12
III. Employment..................................................................................................4-14
A. Assignment to a Specific Operational Area..............................................4-14
B. Rotation among Operational Areas..........................................................4-14
e
C. Separation of Parties to the Dispute........................................................4-14
II. Peace Enforcement Operations (PEO).....................................4-15
pl
I. Fundamentals of Peace Enforcement Operations..........................................4-15
II. Peace Enforcement Tasks.............................................................................4-16
III. Employment..................................................................................................4-17
A. Preparation and Deployment...................................................................4-17
m
Chap 5
Counterinsurgency
Operations (COIN)
Counterinsurgency Operations (Overview)...................................5-1
I. Insurgency........................................................................................................5-1
II. Approach to Counterinsurgency......................................................................5-2
U.S. Strategy and Policy................................................................................5-3
A. Political Control..........................................................................................5-2
B. COIN Is Population-Centric.......................................................................5-4
C. Assessing Relevant Actors........................................................................5-4
D. Understanding the Operational Environment............................................5-4
III. Governance and Legitimacy...........................................................................5-5
A. Governance...............................................................................................5-5
B. Legitimacy..................................................................................................5-6
A Whole-of-Government Effort.......................................................................5-7
IV. Strategic Principles.........................................................................................5-8
I. Insurgency Prerequisites & Fundamentals..............................5-11
I. Nature of Insurgency...................................................................................... 5-11
e
II. Prerequisites for Insurgency..........................................................................5-12
A. Opportunity..............................................................................................5-12
B. Motive......................................................................................................5-13
pl
C. Means......................................................................................................5-13
III. Insurgent Objectives.....................................................................................5-14
IV. Insurgent Narrative, Strategy, Dynamics and Organization..........................5-15
A. Insurgent Narrative..................................................................................5-15
m
B. Strategy...................................................................................................5-15
C. Dynamics of Insurgency..........................................................................5-18
D. Organization............................................................................................5-22
Sa
Table of Contents-7
(Sample Only) Find this and other SMARTbooks at [Link]
H. Related Operations..................................................................................5-52
IV. Additional Operational Options.....................................................................5-52
A. Generational Engagement.......................................................................5-53
B. Limited Support/Light Footprint................................................................5-53
C. Identify, Separate, Isolate, Influence, and Reintegrate (ISI2R)................5-53
D. Attack the Network (AtN).........................................................................5-54
E. Partnering................................................................................................5-54
F. Shape, Clear, Hold, Build, Transition (SCHBT)........................................5-54
V. Direct Approaches......................................................................5-55
I. Shape-Clear-Hold-Build-Transition Framework..............................................5-56
II. Other Direct Enablers....................................................................................5-64
A. Targeted Threat Infrastructure.................................................................5-64
B. Strike........................................................................................................5-64
VI. Indirect Approaches.................................................................5-65
I. Nation Assistance and Security Cooperation.................................................5-65
II. Generational Engagement.............................................................................5-66
III. Negotiation and Diplomacy...........................................................................5-68
IV. Identify, Separate, Isolate, Influence, and Reintegrate (ISI2R)....................5-59
V. Other Indirect Enablers..................................................................................5-74
- Integrated Monetary Shaping Operations..................................................5-74
8-Table of Contents
(Sample Only) Find this and other SMARTbooks at [Link]
Chap 6
Civil-Military
Operations
Civil-Military Operations (Overview)...............................................6-1
I. Civil-Military Operations, Civil Affairs, and Unified Action.................................6-1
II. CMO and the Range of Military Operations.....................................................6-2
- Strategic Aspects of Civil-Military Operations..............................................6-3
III. Civil-Military Operations and the Levels of War..............................................6-4
IV. CMO in Joint Operations................................................................................6-6
I. Organizing for Civil-Military Operations......................................6-9
Comparison of Ops and Coordination Centers....................................................6-9
A. J-9 CMO Directorate.......................................................................................6-9
B. Joint Task Force (JTF)...................................................................................6-10
C. Joint CMO Task Force (JCMOTF)................................................................. 6-11
D. Humanitarian Operations Center (HOC).......................................................6-12
E. Humanitarian Assistance Coordination Center (HACC)................................6-13
F. Civil-Military Operations Center (CMOC).......................................................6-13
G. Civil-Military Teams.......................................................................................6-16
e
H. NATO CIMIC.................................................................................................6-17
I. UN Operations................................................................................................6-17
J. Other Organizational Humanitarian Structures..............................................6-18
pl
II. Civil Affairs Forces & Operations.............................................6-19
I. Civil Affairs Responsibilities............................................................................6-19
II. Supporting the Operations Process...............................................................6-20
m
Multinational
Chap 7
Operations
Multinational Operations (Overview)..............................................7-1
I. Strategic Context..............................................................................................7-1
II. Security Cooperation (SC)...............................................................................7-2
III. Nature of Multinational Operations.................................................................7-3
IV. Rationalization, Standardization, and Interoperability (RSI)...........................7-4
I. Multinational Command and Coordination.................................7-5
I. Command and Control of U.S. Forces in Multinational Operations..................7-5
II. Unified Action...................................................................................................7-5
III. Multinational Force.........................................................................................7-5
IV. Command Structures of Forces in Multinational Operations..........................7-6
A. Integrated Command Structure.................................................................7-6
B. Lead Nation Command Structure..............................................................7-6
C. Parallel Command Structure.....................................................................7-6
Table of Contents-9
(Sample Only) Find this and other SMARTbooks at [Link]
Interorganizational
Chap 8
Cooperation
Interorganizational Cooperation (Overview).................................8-1*
I. Foundations of Interorganizational Coordination............................................ 8-2*
II. Unity of Effort................................................................................................. 8-2*
III. US Government Department and Agency Coordination............................... 8-3*
IV. Coordinating Efforts...................................................................................... 8-4*
- Applying the Military Component............................................................... 8-4*
- Capitalizing on Organizational Diversity.................................................... 8-4*
- Gathering the Right Resources.................................................................. 8-5*
- Identifying Authorities................................................................................. 8-5*
V. Whole-of-Government Approach................................................................... 8-6*
e
VI. Working Relationships and Practices........................................................... 8-6*
VII. Considerations for Effective Cooperation.................................................... 8-6*
I. Joint Planning Considerations....................................................8-7*
pl
I. Whole-of-Government Approach.................................................................... 8-7*
II. Joint Planning and Interorganizational Cooperation...................................... 8-8*
- The National Security Council (NSC)......................................................... 8-9*
m
A. Plan Development and Coordination..................................................... 8-10*
B. Guidance for Employment of the Force (GEF)...................................... 8-10*
C. Annex V (Interagency Coordination)...................................................... 8-14*
D. Joint Interagency Coordinating Group (JIACG)..................................... 8-14*
Sa
III. Stakeholders................................................................................................8-11*
A. International Organizations.....................................................................8-11*
B. Nongovernmental Organizations (NGOs)...............................................8-11*
C. The Private Sector..................................................................................8-11*
IV. Joint Task Forces (JTFs) in the Interagency Process................................. 8-12*
- Joint Interagency Task Force (JIATF)...................................................... 8-13*
- Joint Support Force (JSF)........................................................................ 8-13*
II. Foreign Considerations............................................................8-15*
I. USG Structure in Foreign Countries............................................................. 8-15*
A. The Diplomatic Mission.......................................................................... 8-15*
B. Combatant Commands (CCMDs).......................................................... 8-15*
II. Foreign Operations...................................................................................... 8-18*
A. The Political-Military Dimension............................................................. 8-18*
B. Theater or Regional Focus.................................................................... 8-18*
C. CCMD Campaign Plans, Crisis Response, and Limited........................ 8-16*
Contingency Operations
D. Crisis Action Organization..................................................................... 8-20*
III. Stakeholders............................................................................................... 8-19*
IV. Joint Task Force (JTF) Considerations....................................................... 8-22*
V. Civil-Military Teams (JIATFs/PRCs)............................................................. 8-22*
VI. Civil-Military Operations Center (CMOC)................................................... 8-23*
VII. Aligning Words with Deeds........................................................................ 8-24*
10-Table of Contents
(Sample Only) Find this and other SMARTbooks at [Link]
Military Ops
Range of
Chap 1
The Conflict Continuum
(Range of Military Ops)
Ref: JP 3-0, Joint Operations (Jan ‘17), chap. V.
Range of
e
Crisis Response and Limited Contingency Operations Military
Operations
pl
Military Engagement, Security Cooperation, and Deterrence
m
Ref: JP 3-0, fig. V-2. Notional Operations Across the Conflict Continuum.
Military engagement, security cooperation, and deterrence activities develop local
and regional situational awareness, build networks and relationships with partners,
Sa
shape the OE, keep day-to-day tensions between nations or groups below the
threshold of armed conflict, and maintain US global influence. Many missions asso-
ciated with crisis response and limited contingencies, such as DSCA and FHA, may
not require combat. But others, such as Operation RESTORE HOPE in Somalia,
can be dangerous and may require combat operations to protect US forces.
The complex nature of the strategic environment may require US forces to conduct
different types of joint operations and activities simultaneously across the conflict
continuum. Although this publication discusses specific types of operations and
activities under the various categories in the range of military operations, each type
is not doctrinally fixed and could shift within that range.
• Military Engagement, Security Cooperation, and Deterrence. See pp. 1-3 to 1-12.
• Crisis Response and Limited Contingency Operations. See pp. 1-13 to 1-18.
• Large-Scale Combat Operations. See pp. 1-19 to 1-30.
For further discussion and an overview of these types of military operations and
activities, see:
• Military Engagement, Security Cooperation, and Deterrence. See pp. 1-3 to 1-12.
• Crisis Response and Limited Contingency Operations. See pp. 1-13 to 1-18.
• Large-Scale Combat Operations. See pp. 1-19 to 1-30.
Military Ops
Range of
Chap 1
I. Engagement, Security
Cooperation & Deterrence
Ref: JP 3-0, Joint Operations (Jan ‘17), chap. VI.
Military engagement, security cooperation, and deterrence missions, tasks, and
actions encompass a wide range of actions where the military instrument of national
power is tasked to support other instruments of national power as represented by
interagency partners, as well as cooperate with international organizations (e.g., UN,
NATO) and other countries to protect and enhance national security interests, deter
conflict, and set conditions for future contingency operations. This may also involve
domestic operations that include supporting civil authorities. These activities gener-
ally occur continuously in all GCCs’ AORs regardless of other ongoing joint opera-
tions. Military engagement, security cooperation, and deterrence activities usually
involve a combination of military forces and capabilities separate from but integrated
with the efforts of interorganizational participants. These activities are conducted as
part of a CCDR’s routine theater or functional campaign plan and country plan objec-
tives and may support deterrence.
Projecting US military force invariably requires extensive use of international waters,
e
international airspace, space, and cyberspace. Military engagement, security
cooperation, and deterrence help assure operational access for crisis response and
contingency operations despite changing US overseas defense posture and the
pl
growth of A2/AD capabilities around the globe. The more a GCC can promote favor-
able access conditions in advance across the AOR and in potential OAs, the better.
Relevant activities include KLEs; security cooperation activities, such as bilateral and
multinational exercises to improve multinational operations; missions to train, advise,
m
and equip foreign forces to improve their national ability to contribute to access; ne-
gotiations to secure basing and transit rights, establish relationships, and formalize
support agreements; the use of grants and contracts to improve relationships with
Sa
Military Engagement
Military engagement is the routine contact and interaction between individuals or ele-
ments of the Armed Forces of the United States and those of another nation’s armed
forces, or foreign and domestic civilian authorities or agencies, to build trust and
confidence, share information, coordinate mutual activities, and maintain influence.
Military engagement occurs as part of security cooperation, but also extends to inter-
action with domestic civilian authorities. GCCs seek out partners and communicate
with adversaries to discover areas of common interest and tension. This military
engagement increases the knowledge base for subsequent decisions and resource
allocation. Such military engagements can reduce tensions and may preclude
conflict; or, if conflict is unavoidable, allow a more informed USG to enter into it with
stronger alliances or coalitions.
Security Cooperation
Security cooperation involves all DOD interactions with foreign defense establish-
ments to build defense relationships that promote specific US security interests,
develop allied and friendly military capabilities for self-defense and multinational
operations, and provide US forces with peacetime and contingency access to the
HN. The policy on which security cooperation is based resides in Presidential Policy
Directive-23, Security Sector Assistance. This directive refers to the policies, pro-
grams, and activities the US uses to work with foreign partners and help shape their
policies and actions in the security sector; help foreign partners build and sustain
the capacity and effectiveness of legitimate institutions to provide security, safety,
and justice for their people; and, enable foreign partners to contribute to efforts that
address common security challenges.
Security cooperation is a key element of global and theater shaping activities and
critical aspect of communication synchronization. GCCs shape their AORs through
security cooperation and stability activities by continually employing military forces to
complement and support other instruments of national power that typically provide
development assistance or humanitarian assistance to PNs. The GCC’s TCP
provides a framework within which CCMDs conduct cooperative security cooperation
activities and development with PNs. Ideally, security cooperation activities mitigate
the causes of a potential crisis before a situation deteriorates and requires US mili-
tary intervention. Security assistance and security force assistance (SFA) normally
provide some of the means for security cooperation activities.
Deterrence e
Deterrence prevents adversary action through the presentation of a credible threat
of unacceptable counteraction and belief that the cost of the action outweighs the
pl
perceived benefits. The nature of deterrent options varies according to the nature of
the adversary (e.g., traditional or irregular, state or non-state), the adversary’s actions,
US national objectives, and other factors. Deterrence stems from an adversary’s belief
that the opponent’s actions have created or can create an unacceptable risk to the
m
decisive operations immediately. However, if available forces lack the combat power
to conduct decisive operations, they conduct defensive operations while additional
forces deploy. Effective deterrence requires a TCP and a coordinated CCS effort that
emphasize security cooperation activities with PNs that support US interests, DOD
force posture planning, and contingency plans that prove the willingness of the US to
employ forces in defense of its interests. Various joint operations (e.g., show of force
and enforcement of sanctions) support deterrence by demonstrating national resolve
and willingness to use force when necessary. Other TCP actions that help maintain
or set the CCDR’s desired conditions support deterrence by enhancing a climate of
peaceful cooperation and FHA, thus promoting stability. Joint actions such as antiter-
rorism, DOD support to CD operations, show of force operations, and arms control are
applied to meet military engagement, security cooperation, and deterrence objectives.
Sustained presence contributes to deterrence and promotes a secure environment
in which diplomatic, economic, and informational programs designed to reduce the
causes of instability can perform as designed. Presence can take the form of forward
basing, forward deploying, or pre-positioning assets. Forward presence activities
demonstrate our commitment, lend credibility to our alliances, enhance regional stabil-
ity, and provide a crisis response capability while promoting US influence and access.
In addition to forces stationed overseas and afloat, forward presence involves periodic
rotational deployments and redeployments, access and storage agreements, multina-
tional exercises, port visits, foreign military training, foreign community support, and
both military-to-military and military-to-civilian contacts. Given their location and knowl-
edge of the region, forward presence forces could be the first to respond to a crisis.
*1-4 (ROMO) I. Military Engagement, Security Cooperation, & Deterrence
(Sample Only) Find this and other SMARTbooks at [Link]
Military Ops
Range of
The Conflict Continuum
Ref: JP 3-0, Joint Operations (Jan ‘17),pp. VI-1 to VI-3.
ranging from 5 percent to 50 percent of original cost, or provided as a grant. While Con-
gress has established ceiling amounts and specific country restrictions, exceptions and
exemptions still provide significant transfers. Recipient nations pay for all transportation,
repairs, and upgrades.
Exchange Programs
Exchange programs are intended to foster understanding and familiarize each force
with the capabilities and differences of the other. Programs include Individual Exchange
Program, the Personnel Exchange Program (a 1-3 year PCS move) and Reciprocal Unit
Exchanges.
Military Ops
Range of
Humanitarian Assistance
Examples: Protection or support to agencies or organizations providing relief outside the
U.S.; humanitarian demining (although the U.S. military rarely actually does demining, it
does provide training for demining schools, publicity in local languages, and selected fund-
ing for demining groups)
declare excess but certifies as not required for the period of the lease. Recipients, including
the UN, generally pay leasing costs including a rental charge for depreciation, transporta-
tion fees and any repairs. “No-cost” leases, such as those offered recently for F-16 aircraft,
still include payment for transportation and repairs.
B. Emergency Preparedness e
Emergency preparedness consists of measures taken in advance of an emergency
to reduce the loss of life and property and to protect a nation’s institutions from all
pl
types of hazards through a comprehensive emergency management program of
preparedness, mitigation, response, and recovery. At the strategic level, emer-
gency preparedness encompasses those planning activities, such as continuity of
operations and continuity of government, undertaken to ensure DOD processes,
m
procedures, and resources are in place to support the President and SecDef in a
designated national security emergency.
• Continuity of operations ensures continuous conduct of functions, tasks,
Sa
Military Ops
Range of
Chap 1
II. Crisis Response &
Limited Contingency Ops
Ref: JP 3-0, Joint Operations (Jan ‘17), chap. VII.
Crisis response and limited contingency operations typically are focused in scope
and scale and conducted to achieve a very specific strategic or operational-level ob-
jective in an OA. They may be conducted as a stand-alone response to a crisis (e.g.,
NEO) or executed as an element of a larger, more complex operation. Joint forces
conduct crisis response and limited contingency operations to achieve operational
and, sometimes, strategic objectives.
CCDRs plan for various situations that require military operations in response
to natural disasters, terrorists, subversives, or other contingencies and crises as
directed by appropriate authority. The level of complexity, duration, and resources
depends on the circumstances. Limited contingency operations ensure the safety of
US citizens and US interests while maintaining and improving the ability to operate
with multinational partners to deter hostile ambitions of potential aggressors. Many
of these operations involve a combination of military forces and capabilities operat-
ing in close cooperation with interorganizational participants. APEX integrates crisis
e
action and deliberate planning into one unified construct to facilitate unity of effort
and transition from planning to execution.
pl
Initial Response
When crises develop and the President directs, CCDRs respond. If the crisis re-
volves around external threats to a regional partner, CCDRs employ joint forces to
deter aggression and signal US commitment (e.g., deploying joint forces to train in
m
Kuwait). If the crisis is caused by an internal conflict that threatens regional stability,
US forces may intervene to restore or guarantee stability (e.g., Operation RESTORE
DEMOCRACY, the 1994 intervention in Haiti). If the crisis is within US territory (e.g.,
Sa
natural or man-made disaster, deliberate attack), US joint forces will conduct DSCA
and HD operations as directed by the President and SecDef. Prompt deployment
of sufficient forces in the initial phase of a crisis can preclude the need to deploy
larger forces later. Effective early intervention can also deny an adversary time to set
conditions in their favor, achieve destabilizing objectives, or mitigate the effects of a
natural or man-made disaster. Deploying a credible force rapidly is one step in deter-
ring or blocking aggression. However, deployment alone will not guarantee success.
Achieving successful deterrence involves convincing the adversary that the deployed
force is able to conduct decisive operations and the national leadership is willing to
employ that force and to deploy more forces if necessary.
Strategic Aspects
Two important aspects about crisis response and foreign limited contingency opera-
tions stand out. First, understanding the strategic objective helps avoid actions
that may have adverse diplomatic or political effects. It is not uncommon in some
operations, such as peacekeeping, for junior leaders to make decisions that have
significant strategic implications. Second, commanders should remain aware of
changes not only in the operational situation, but also in strategic objectives that may
warrant a change in military operations. These changes may not always be obvious.
Therefore, commanders must strive to detect subtle changes, which may eventually
lead to disconnects between national objectives and military operations. Failure to
recognize changes in national objectives early may lead to ineffective or counterpro-
ductive military operations.
consent of all major parties to a dispute, designed to monitor and facilitate implemen-
tation of an agreement (cease fire, truce, or other such agreements) and support dip-
lomatic efforts to reach a long-term political settlement. Such actions are often taken
under the authority of Chapter VI, Pacific Settlement of Disputes, of the UN Charter.
• Peace Enforcement Operations (PEO). PEO are the application of military force
or threat of its use, normally pursuant to international authorization, to compel
compliance with resolutions or sanctions designed to maintain or restore peace and
order. PEO may include the enforcement of sanctions and exclusion zones, protec-
tion of FHA, restoration of order, and forcible separation of belligerent parties or
parties to a dispute. Unlike PKO, such operations do not require the consent of the
states involved or of other parties to the conflict.
• Peace Building (PB). PB consists of stability actions (predominantly diplomatic,
economic, and security related) that strengthen and rebuild governmental infra-
structure and institutions, build confidence, and support economic reconstruction
to prevent a return to conflict. Military support to PB may include rebuilding roads,
reestablishing or creating government entities, or training defense forces.
• Peacemaking (PM). This is the process of diplomacy, mediation, negotiation, or
other forms of peaceful settlement that arranges an end to a dispute or resolves
issues that led to conflict. It can be an ongoing process, supported by military,
economic, diplomatic, and informational instruments of national power. The purpose
is to instill in the parties an understanding that reconciliation is a better alternative
DSCA is support provided by US federal military forces; DOD civilians, DOD contract
personnel, DOD component assets, DOD agencies, and National Guard forces (when
SecDef, in coordination with the governors of the affected states, elects and requests
Sa
to use those forces in Title 32, USC status) in response to requests for assistance
from civil authorities for domestic emergencies, law enforcement support, and other
domestic activities, or from qualifying entities for special events. For DSCA operations,
DOD supports and does not supplant civil authorities. The majority of DSCA operations
are conducted IAW the NRF, which establishes a comprehensive, national, all-hazards
approach to domestic incident response. Within a state, that state’s governor is the key
decision maker and commands the state’s National Guard forces when they are not in
federal Title 10, USC, status. When the governor mobilizes the National Guard, it will
most often be under state active duty when supporting civil authorities.
Other DSCA operations can include CD activities, support to national special security
events, or other support to civilian law enforcement IAW specific DOD policies and US
law. Commanders and staffs must carefully consider the legal and policy limits imposed
on intelligence activities in support of LEAs, and on intelligence activities involving US
citizens and entities by intelligence oversight regulations, policies, and executive orders.
Military Ops
Range of
Chap 1
III. Large-Scale
Combat Operations
Ref: JP 3-0, Joint Operations (Jan ‘17), chap. VIII.
Campaign
Traditionally, campaigns are the most extensive joint operations, in terms of the
amount of forces and other capabilities committed and duration of operations. In the
context of large-scale combat, a campaign is a series of related major operations
aimed at achieving strategic and operational objectives within a given time and space.
Major Operations
A major operation is a series of tactical actions, such as battles, engagements, and
strikes, and is the primary building block of a campaign. Major operations and cam-
paigns typically include multiple phases (e.g., the 1990-1991 Operations DESERT
SHIELD and DESERT STORM and 2003 OIF). Campaign planning is appropriate when
the contemplated military operations exceed the scope of a single major operation.
Campaigns can occur across the continuum of conflict. In campaigns characterized
by combat, the general goal is to prevail against the enemy as quickly as possible;
e
conclude hostilities; and establish conditions favorable to the HN, the US, and its
multinational partners. Establishing these conditions may require joint forces to con-
duct stability activities to restore security, provide essential services and humanitarian
pl
relief, and conduct emergency reconstruction. Some crisis-response or contingency
operations may not involve large-scale combat, but could meet the definition of a ma-
jor operation or campaign based on their scale and duration (e.g., the Tsunami relief
m
efforts in Indonesia or Hurricane Katrina relief efforts in the US, both in 2005).
Campaigns are joint in nature—functional and Service components of the joint force
conduct supporting operations, not independent campaigns. Within a campaign,
forces of a single or several Services, coordinated in time and space, conduct opera-
Sa
The six general groups of activity provide a convenient basis for thinking about a joint
operation in notional phases, as Figure V-7 depicts.
Phasing an Operation
Phase 0 Phase I Phase II Phase III Phase IV Phase V Phase 0
Shape Deter Seize Dominate Stabilize Enable Shape
Initiative Civil
Authority
Enable
Level of Military Effort
Stabilize Activities
Activities
e
Seize Initiative Activities
Deter Activities
pl
Operation Shaping Activities
Theater Shaping Activities
Ref: JP 3-0, fig. V-7. Phasing an Operation Based on Predominant Military Activities.
A. Shape
In general, shaping activities help set conditions for successful theater operations. Shap-
ing activities include long-term persistent and preventive military engagement, security
cooperation, and deterrence actions to assure friends, build partner capacity and capa-
bility, and promote regional stability. They help identify, deter, counter, and/or mitigate
competitor and adversary actions that challenge country and regional stability. A GCC’s
TCP provides these and other activities tasked by SecDef/CJCS strategic guidance in
pursuit of national objectives. Likewise, CCDRs may direct more focused geographic
and functional shaping activities at the potential execution of specific contingency plans
for various types of operations. In the best case, shaping activities may avert or diminish
conflict. At the least, shaping provides a deeper, and common, understanding of the OE.
Preparatory intelligence activities inform operation assessment, planning, and execution
to improve the JFC’s understanding of the OE.
B. Deter
Successful deterrence prevents an adversary’s undesirable actions, because the adver-
sary perceives an unacceptable risk or cost of acting. Deterrent actions are generally
weighted toward protection and security activities that are characterized by preparatory
actions to protect friendly forces, assets, and partners, and indicate the intent to execute
subsequent phases of the planned operation. A number of FDOs, FROs, and force
Military Ops
Range of
enhancements could be implemented during this phase. The nature of these options
varies according to the nature of the adversary (e.g., traditional or irregular, state or
non¬state), the adversary’s actions, US national objectives, and other factors. Once a
crisis is defined, these actions may include mobilization, tailoring of forces, and other
predeployment activities; initial deployment into a theater; employment of intelligence
collection assets; and development of mission-tailored C2, intelligence, force protection,
and logistic requirements to support the JFC’s CONOPS. CCDRs continue to conduct
military engagement with multinational partners to maintain access to areas, thereby
providing the basis for further crisis response. Many deterrent actions build on security
cooperation activities. They can also be part of stand-alone operations.
C. Seize Initiative
JFCs seek to seize the initiative in all situations through decisive use of joint force capa-
bilities. In combat, this involves both defensive and offensive operations at the earliest
possible time, forcing the enemy to culminate offensively and setting the conditions for
decisive operations. Rapid application of joint combat power may be required to delay,
impede, or halt the enemy’s initial aggression and to deny the enemy its initial objectives.
Operations to gain access to theater infrastructure and expand friendly freedom of action
continue during this phase, while the JFC seeks to degrade enemy capabilities with the
intent of resolving the crisis at the earliest opportunity.
D. Dominate
These actions focus on breaking the enemy’s will to resist or, in noncombat situations, to
e
control the OE. Successful domination depends on overmatching enemy capabilities at
critical times and places. Joint force options include attacking weaknesses at the leading
pl
edge of the enemy’s defensive perimeter to roll enemy forces back, and striking in depth
to threaten the integrity of the enemy’s A2/AD, offensive weapons and force projection
capabilities, and defensive systems. Operations can range from large-scale combat to
various stability actions depending on the nature of the enemy. Dominating activities may
m
establish the conditions to achieve strategic objectives early or may set the conditions for
transition to a subsequent phase of the operation.
E. Stabilize
Sa
These actions and activities are typically characterized by a shift in focus from sustained
combat operations to stability activities. These operations help reestablish a safe and
secure environment and provide essential government services, emergency infrastruc-
ture reconstruction, and humanitarian relief. The intent is to help restore local political,
economic, and infrastructure stability. Civilian officials may lead operations during part
or all of this period, but the JFC typically will provide significant supporting capabili-
ties and activities. The joint force may be required to perform limited local governance
(i.e., military government), and integrate the efforts of other supporting interagency and
multinational partners until legitimate local entities are functioning. The JFC continu-
ously assesses the impact of operations on the ability to transfer authority for remaining
requirements to a legitimate civil entity.
* Editor’s Note: For the purposes of this book, only pertinent material related to
“military engagement, security cooperation and stability activities” have been
included in the following discussion of large combat operations and campaigns from
JP 3-0 Joint Operations (Jan ‘17). For the complete discussion from JP 3-0, refer to
JFODS5: The Joint Forces & Operations Doctrine SMARTbook.
(FDOs/FROs)
FDOs are preplanned, deterrence-oriented actions carefully tailored to bring an
issue to early resolution without armed conflict. Both military and nonmilitary FDOs
can be used to dissuade actions before a crisis arises or to deter further aggression
during a crisis. FROs, usually used in response to terrorism, can also be employed
in response to aggression by a competitor or adversary.
See following pages (pp. 1-24 to 1-25) for further discussion.
Stability Activities
Combat in this phase provides an opportunity to begin various stability activities that
will help achieve military strategic and operational-level objectives and create the
conditions for the later stability and enable civil authority phases. Operations to neu-
Military Ops
Range of
Preparing the Operational Area
(Deterrence)
Ref: JP 3-0, Joint Operations (Jan ‘17), pp. VIII-7 to VIII-8.
Chap 2
Train, Advise
& Assist
Train, Advise
& Assist
Ref: JP 3-20, Security Cooperations (May ‘17); ADRP 3-07, Stability (Sept ‘12); and
adaptations from FM 3-07.1, Security Force Assistance (May ‘09, rescinded).
Security Relationships
e
pl
m
Sa
Security Cooperation (SC) uses a combination of programs and activities by which DOD,
in coordination with DOS, encourages and enables countries and organizations to part-
Train, Advise
Foreign Assistance
Foreign assistance consists of a number of legally authorized programs that can be grouped
into the general categories of development assistance, humanitarian assistance, and SA
with the strategic purpose of promoting long-term host nation (HN) and regional stability.
Security Assistance (SA)
SA is a group of programs the USG uses to provide defense articles, military training,
and other defense-related services by grant, loan, credit, or cash sales to advance
national policies and objectives. SA is generally overseen by DOS, and in many cases
administered by DOD as SC.
Security Cooperation (SC)
SC is the group of programs or activities employed by DOD in cooperation with PNs to
achieve US security objectives, and some SC is foreign assistance, but not all. Secu-
rity force assistance is the set of DOD SC activities that contribute to unified action by
the USG to support the development of the capacity and capabilities of FSF and their
e
supporting institutions, whether of a PN or an international organization (e.g., regional
security organization), in support of US objectives.
pl
Security Sector Reform (SSR)
Security sector reform (SSR) is a comprehensive set of programs and activities that an HN
government undertakes with USG assistance to improve the way it provides safety, security,
m
and justice. Defense institution building (DIB) is a primary form of DOD support to SSR.
headquarters, and related agency/supporting entity level to develop the strategic and
operational aspects of a PN’s defense institutions.
Counterinsurgency (COIN)
Counterinsurgency (COIN) is the comprehensive civilian and military effort designed
to simultaneously defeat and contain insurgency and address its root causes. COIN is
primarily a political struggle and incorporates a wide range of activities by the HN gov-
ernment of which security is only one, albeit an important one.
Counterterrorism (CT)
Counterterrorism are those activities and operations conducted to neutralize terror-
Train, Advise
ists and their organizations and networks in order to render them incapable of using
& Assist
violence to instill fear and coerce governments or societies to achieve their goals.
Stability Activities
Stability activities include military missions, tasks, and activities conducted outside the
US in coordination with or in support of other instruments of national power to maintain
e
or reestablish a safe and secure environment, and provide essential governmental
services, emergency infrastructure reconstruction, and humanitarian relief.
pl
Foreign Humanitarian Assistance (FHA)
Foreign humanitarian assistance consists of DOD activities conducted outside the US
and its territories to directly relieve or reduce human suffering, disease, hunger, or
privation.
m
rebuilding between two or more factions within the indigenous population, and facilitate
the transition to legitimate governance.
ments of national power to protect and enhance national security interests and deter
& Assist
conflict.
Security Cooperation
INDIRECT SUPPORT
Security Assistance
Security Cooperation
Security Cooperation
Exchange Programs
Joint/Multinational Exercises
e
DIRECT SUPPORT
pl
(not involving combat operations)
Civil-Military Operations
m
COMBAT OPERATIONS
Security Cooperation
Ref: JP 3-22, fig. I-3. Foreign Internal Defense: Integrated Security Cooperation Activities.
Chap 2
I. Security Force
Assistance (SFA)
Train, Advise
Ref: Joint Doctrine Note (JDN) 1-13, Security Force Assistance (Apr ‘13); ADRP
& Assist
3-07, Stability (Sept ‘12), chap. 3; and adaptations from FM 3-07.1, Security Force
Assistance (May ‘09, rescinded).
Security force assistance (SFA) is the set of Department of Defense (DOD) activities
that contribute to unified action by the United States Government (USG) to support
the development of capability and capacity of foreign security forces (FSF) and sup-
porting institutions. FSF are all organizations and personnel under host nation (HN)
control that have a mission of protecting the HN’s sovereignty from internal as well
as external threats. SFA activities are primarily used to assist an HN in defending
against internal and transnational threats to stability (i.e., supporting foreign internal
defense [FID], counterterrorism, counterinsurgency [COIN], or stability operations).
A Organize
Sa
B Train
C Equip
This requires a force capable of securing borders, protecting the population, holding
individuals accountable for criminal activities, regulating the behavior of individuals
or groups that pose a security risk, and setting conditions in the operational area that
enable the success of other actors.
A. Organize
Organize is a SFA task that encompasses all measures taken to assist FSF in im-
proving its organizational structure, processes, institutions, and infrastructure. U.S.
forces must understand the existing security organizations of FSF to better assist
them. Subsequently, SFA personnel may help the host nation organize its security
forces to meet the needs of its security environment.
Train, Advise
Organizing a foreign security force depends on the host nation’s social and eco-
& Assist
nomic conditions, cultural and historical factors, and security threats. SFA aims to
create an efficient organization with a command, intelligence, logistic, and operations
structure viable for the host nation. Conventional forces with limited special purpose
teams (such as explosive ordnance disposal) are preferred. Doctrine or standing op-
erating procedures should apply across the force, as should unit structures. The or-
ganization must facilitate the collection, processing, and dissemination of intelligence
across and throughout all security forces. As the foreign security force strengthens,
U.S. leaders and trainers should expect more independent organizational decisions.
The host nation determines the structure of its military forces, to include approving
all organizational designs. These may include changing the numbers of forces, types
of units, and internal organizational designs.
Organization should address all FSF, from the ministerial level to the patrolling police
officer and soldier. Building a competent FSF infrastructure—including civilian infor-
mation systems—is critical for success.
Organizing a foreign security force requires resolving issues related to: recruiting,
e
promotion screening and selection, pay and benefits, leader recruiting and selection,
personnel accountability, and demobilization of security force personnel.
pl
B. Train
Train is a SFA task to assist FSF by developing programs and institutions to train
and educate. These efforts must fit the nature and requirements of their security
m
environment.
Establishing Training Standards
Training in SFA involves many of the individual and collective skills performed in con-
Sa
ventional military operations. All levels of training for all components should include
values training. Metrics for evaluating units should include subjective measures,
such as loyalty to the host-nation government, as well as competence in military
tasks. Soldiers know how to evaluate military training. However, the acceptance
of values, such as ethnic equality or the rejection of corruption, may be a better
measure of training effectiveness. Gauging this acceptance is far more difficult than
evaluating task performance. While the operational environment varies widely, FSF
and trainers can still establish clear measures to evaluate the training of individuals,
leaders, and units.
Training Foreign Security Forces
Members of FSF develop through a systematic training program (individual training
and education as well as collective training). The program builds basic skills, then
teaches them to work as a team, and finally allows them to function as a unit. Basic
military, intelligence, or law enforcement training focuses first on basic skills such as
legal considerations, first aid, marksmanship, and fire discipline. Leaders have train-
ing in tactics, including patrolling, urban operations, and legal evidence collection.
Everyone must master rules of engagement and the law of armed conflict. FSF units
should train to standard for conducting the major operations they will face.
Train, Advise
campaign and contingency planning to support GCC’s strategic objectives. SFA should be
integrated into the specific operation or campaign plans in all phases, not just as an after-
& Assist
thought for the stabilize and enable civil authority phases following combat operations.
Security
Major Combat Deter/defeat
Cooperation Operations external threat
Title 22, USC –
Foreign Relations Foreign Internal Deter/defeat
Defense internal threat
FMS
IMET
FMF Counterinsurgency Defeat
SFA insurgency
Title 10, USC – Activities
Armed Forces Counterterrorism Disrupt/defeat
PEP
JCET
PfP
e
Organize
Unconventional
terrorists
Defeat enemy/
pl
Warfare illegitimate
Train
authority
Other
Equip
Section 1206 Stability Operations Provide security
Section 1208 and essential
m
Section 1033 Rebuild/
services
Build
Federal Law
Enforcement Peace Operations Separate the
opponents
Title 28, USC
(DOJ, FBI) Maritime Security Provide security
Title 14, USC Operations in the maritime
(USCG) domain
Train, Advise
prevent an insurgency or other forms of lawlessness or subversion by forestalling and
& Assist
defeating the threat and by working to correct conditions that prompt violence. The
HN government mobilizes its population to participate in IDAD efforts. Thus, the IDAD
program is ideally preemptive/Phase 0; however, if an insurgency, illicit drug, terrorist,
or other threat develops, the IDAD program evolves to combat that threat. Commanders
and their staffs must understand the HN’s IDAD program and its objectives if they are to
plan effectively to support it. The objectives of FID will be to assist the HN in formulating
an appropriate IDAD program, which often includes fusing several separate strategic
plans and programs into one broader strategy.
An IDAD program should integrate security force and civilian actions into a coherent,
comprehensive effort. Security force actions provide a level of internal security that per-
mits and supports growth through balanced development. This development requires
change to meet the needs of vulnerable groups of people. This change may in turn
promote unrest in the society. The strategy, therefore, includes measures to maintain
conditions under which orderly development can take place.
IDAD Functions e
An IDAD program blends four interdependent functions to prevent or counter internal threats.
These functions are balanced development, security, neutralization, and mobilization.
pl
Balanced development attempts to achieve national goals through political, social, and
economic programs. It allows all individuals and groups in the society to share in the
rewards of development, thus alleviating frustration. Balanced development satisfies
legitimate grievances that the opposition attempts to exploit. The government must
m
recognize conditions that contribute to the internal threat and instability and take pre-
ventive measures. Correcting conditions that make a society vulnerable is the long term
solution to the problem.
Sa
Security includes all activities implemented in order to protect the populace from
violence and to provide a safe environment for national development. Security of the
populace and government resources is essential to countering the threat. Protection
and control of the populace permit development and deny the adversary access to
popular support. The security effort should establish an environment in which the HN
can provide for its own security with limited US support. Neutralization is a political
concept that:
• makes an insurgent or criminal element irrelevant to the political process
• is the physical and psychological separation of the threatening elements from the
population
• includes all lawful activities (except those that degrade the government’s legiti-
macy) to disrupt, preempt, disorganize, and defeat the insurgent organization
• can involve public exposure and the discrediting of insurgent and criminal leaders
during a period of low-level unrest with little political violence
• can involve arrest and prosecution when laws have been broken, or
• can involve combat action when the adversary’s violent activities escalate
All neutralization efforts must be legal. They must scrupulously observe HN laws and
policy provisions regarding rights and responsibilities. The need for security forces to
act lawfully is essential not only for humanitarian reasons but also because this reinforc-
es government legitimacy while denying the adversary an exploitable issue.
A comprehensive planning process at both the national and theater level is vital in
order to provide the means to bolster the internal stability and security of the support-
Train, Advise
ed nation. The type of planning necessary is dictated by the type or types of support
& Assist
e
• Ensure Unity of Effort/Unity of Purpose. Planning should consider and, where
appropriate, integrate all instruments of national power and intergovernmental
organizations, nongovernmental organizations, and HN capabilities in order to re-
pl
duce inefficiencies and enhance strategy in support of FID and HN IDAD efforts.
• Understand US Foreign Policy. NSC directives, plans, or policies are the guid-
ing documents; however, US policy may change as a result of developments in
m
the HN or broader political changes in either country. DOD planners should seek
guidance from the COM and country team in interpreting foreign policy and guid-
ing US efforts in a particular country.
• Understand the Information Environment. In an environment characterized
Sa
C. Trainer/Advisor Checklists
Ref: JP 3-22, Foreign Internal Defense (Jul ‘10), chap. 5, pp. 5-7 to 5-10.
The predeployment site survey (PDSS) leader—along with any subordinates he may
Train, Advise
specify—establishes effective initial rapport with the HN unit commander. The PDSS
& Assist
leader:
• Conducts introductions in a businesslike, congenial manner using the HN language
• Briefs the HN commander on the joint force advisors’ PDSS mission and the restric-
tions and limitations imposed on the unit by the higher US commander. The PDSS
leader should use the HN language and, if required, visual aids translated into the
HN language.
• Assures the HN commander that all PDSS team members are fully supportive of
the HN’s position and that they firmly believe a joint and HN-unit effort will be suc-
cessful
• Assures the HN commander that his assistance is needed to develop the tentative
objectives for advisory assistance to include advisory team agreements with the HN
commander on training objectives
• Deduces or solicits the HN commander’s actual estimate of his unit’s capabilities
and perceived advisory assistance and material requirements
e
• Explains the PDSS team’s initial plan for establishing counterpart relationships,
obtains approval from the HN commander for the plan, and requests to conduct the
counterpart linkup under the mutual supervision of the PDSS leader and the HN
pl
commander
• Supervises the linkup between PDSS team members and their HN counterparts to
determine if the HN personnel understand the purpose of the counterpart relation-
m
ship and their responsibilities within it
• Identifies reachback requirements
• The PDSS leader should not make any promises or statements that could be con-
Sa
• Prepare written or verbal estimates of COAs that will correct the deficiencies or
negate their effects on the tentatively selected advisory assistance COAs
• Supervise the preparation of the facilities and inform the JFC of the status of the
preparations compared to the plans for them
Once received, the PDSS leader supervises the processing of the survey results. The
Train, Advise
PDSS leader then:
& Assist
• Recommends to the HN unit commander the most desirable COAs emphasizing
how they satisfy actual conditions and will achieve the desired advisory assistance
objectives
• Ensures that his counterpart understands that the desired COAs are still tentative
contingent on the tasking US commander’s decision
• Selects the COAs to be recommended to the follow-on joint units, after obtaining
input from the HN unit commander
• Ensures the higher in-country US commander is informed of significant findings in
the team survey for HN assistance
The PDSS team plans its security in accordance with the anticipated threat. Adjustments
are made as required by the situation on the ground. The PDSS team members:
• Fortify their positions (quarters, communications, medical, command) in accordance
with the available means and requirements to maintain low visibility
• Maintain a team internal guard system, aware of the locations of all other joint force
e
advisors, and ready to react to an emergency by following the alert plan and start-
ing defensive actions
pl
• Maintain a team internal alert plan that will notify all team members of an emergen-
cy Maintain communications with all subordinate team members deployed outside
of the immediate area controlled by the team
• Establish plans for immediate team defensive actions in the event of an insurgent
m
Unit Training
Much of the training necessary to prepare personnel to support FID activities may be
conducted within the unit. This training can be individually focused or, in the case of unit-
size participation, may involve large-scale collective training. Training resources may be
drawn from a variety of sources, but SOF are particularly valuable because of their area
orientation and FID focus. When feasible, units should conduct operational rehearsals of
the FID mission. These rehearsals allow participants to become familiar with the opera-
tion and to visualize the plan. Such rehearsals should replicate, as much as possible, the
potential situations that a unit may encounter during a FID mission.
Chap 2
IV. Working with
Host-Nation Forces
Train, Advise
& Assist
Ref: FM 3-24 (MCWP 3-33.5), Insurgencies and Countering Insurgencies (May ‘14),
chap. 11, pp. 11-1 to 11-10.
To enable a host-nation (HN) security force to conduct counterinsurgency opera-
tions, United States (U.S.) or multinational forces conduct various security coopera-
tion activities. Commanders often view host-nation security force development as
an essential task and one of their primary lines of effort. The resulting increase in a
host nation’s ability to secure its own population yields significant benefits because
host-nation troops are normally more effective in conducting operations among the
local population than U.S. or multinational forces. Transitioning responsibility for
operations to the host-nation security force reduces the visible presence of U.S. or
multinational troops, further enhancing the legitimacy of the host-nation government.
e
pl
m
Sa
all be assessed according to their specific mission requirements, while taking into
consideration that host nation’s federal or local laws, political considerations, culture,
and tribal affiliations.
The use of security cooperation tools to build governmental capability, including
building a host nation’s forces, may be essential. In the eyes of a local population,
the credibility of the host-nation government is vital in counterinsurgency efforts to
Train, Advise
address the threat and conditions of instability. The host nation’s military, police, and
paramilitary forces are often the most visible elements of a host-nation government’s
& Assist
power and authority. Therefore, building the capacity of a host nation’s security
forces should work toward improving the security force’s competence, capability,
commitment, and confidence.
Chap 2
VI. Working Effectively
w/Foreign Security Forces
Train, Advise
& Assist
Ref: FM 3-22, Army Support to Security Cooperation (Jan ‘13), chap. 6.
I. Relationship Building
Building relationships can lead to partnerships, and is central to security cooperation
whether conducting military engagement with a foreign partner in Europe and Asia,
or conducting Soldier and leader engagements with foreign security forces (Foreign
security forces) during operations that may include counterinsurgency. It is essential
for the Soldier, particularly the advisor, to place a considerable amount of time and
energy in establishing solid relationships among U.S. forces and Foreign security
forces. By its very nature, the advisor mission forces its members out of their tradi-
tional roles. An advisor must purposefully look to build solid relationships between
U.S. and foreign security force commanders, staffs, and the defense establishment,
as well as a variety of governmental and nongovernmental entities.
e
pl
m
Sa
II. Rapport
Since Soldiers conducting security cooperation missions that include security force
assistance are in a unique military position, they establish rapport with their foreign
counterparts. This position is one in which the leader has no positional authority
over the actions of their foreign counterparts. This lack of authority means that the
doctrinal view of leadership is modified to emphasize interpersonal relationships and
de-emphasize authoritarian roles. Soldiers use their interpersonal skills to build rap-
port. Soldiers cannot simply order a specific action; instead, they use interpersonal
skills to positively affect the actions and decisions of their foreign counterparts and
(Train, Advise & Assist) VI. Working Effectively with Security Forces 2-49
(Sample Only) Find this and other SMARTbooks at [Link]
Chap 3
Stability in Operations
(Actions/Tasks/Efforts)
Ref: JP 3-07, Stability (Aug ‘16), chap. 1 and ADP/ADRP 3-07, Stability (Aug ‘12).
Stability is achieved through the process of stabilization through the balanced ap-
plication of the instruments of national power in partnership with the host nation (HN)
and local communities. Stabilization is the process by which military and nonmilitary
actors collectively apply various instruments of national power to address drivers of
conflict, foster HN resiliencies, and create conditions that enable sustainable peace
Operations
Stability in
and security. Stability can be described as the overarching characterization of the
effects created by activities of the United States Government (USG) outside the US
using one or more of the instruments of national power to minimize, if not eliminate,
economic and political instability and other drivers of violent conflict across one or
more of the five USG stability sectors.
I. Stability in Operations
Stability ultimately aims to create a condition so the local populace regards the situa-
tion as legitimate, acceptable, and predictable. These conditions consist of the level
e
of violence; the functioning of governmental, economic, and societal institutions; and
the general adherence to local laws, rules, and norms of behavior.
pl
Sources of instability manifest themselves locally. First, instability stems from
decreased support for the government based on what locals actually expect of their
government. Second, instability grows from increased support for anti-government
elements, which usually occurs when locals see spoilers as helping to solve the
m
priority grievance. Lastly, instability stems from the undermining of the normal func-
tioning of society where the emphasis must be on a return to the established norms.
Stabilization is a process in which personnel identify and mitigate underlying sources
of instability to establish the conditions for long-term stability. While long-term devel-
Sa
opment requires stability, stability does not require long-term development. There-
fore, stability tasks focus on identifying and targeting the root causes of instability
and by building the capacity of local institutions.
based framework—derived from work within the USG and led by the United States Institute
of Peace with the Army’s Peacekeeping and Stability Operations Institute—is founded on
five broad conditions that describe the desired end state of a successful stability operation.
In turn, a series of objectives link the execution of tactical tasks to that end state.
This framework provides the underpinnings for strategic, whole-of-government planning,
yet also serves as a focal point for integrating operational- and tactical-level tasks. It is
flexible and adaptive enough to support activities across the range of military operations
but relies on concrete principles and fundamentals in application.
1. Safe and Secure Environment e
Security is the most immediate concern of the military force, a concern typically shared by
pl
the local populace. A safe and secure environment is one in which these civilians can live
their day-to-day lives without fear of being drawn into violent conflict and being victimized
by criminals or by the forces there to protect them. Achieving security requires extensive
collaboration with civil authorities, the trust and confidence of the people, immediate atten-
m
tion to any reported civilian harm as a result of operations, and strength of perseverance.
In the aftermath of conflict or disaster, conditions often create a significant security vacuum
within the state. The government institutions are either unwilling or unable to provide secu-
rity. In many cases, these institutions do not operate within internationally accepted norms.
Sa
They are rife with corruption, abusing the power entrusted to them by the state. Sometimes
these institutions actually embody the greatest threat to the populace. These conditions
only serve to ebb away at the very foundation of the host nation’s stability.
Many challenges threaten a safe and secure environment. Generally, the immediate threat
to a safe and secure environment is a return to fighting by former warring parties. However,
insurgent forces, criminal elements, and terrorists also significantly threaten the safety and
security of the local populace.
2. Established Rule of Law
While military forces aim to establish a safe and secure environment, the rule of law re-
quires much more—security of individuals and accountability for crimes committed against
them. These basic elements are critical for a broader culture of rule of law to take hold in a
society emerging from conflict. A broad effort integrates activities of many actors, focus-
ing civilian and military law and order capabilities to support host-nation civil institutions
in establishing and supporting the rule of law. These activities come from a shared sense
of confidence among the population that the justice sector focuses on serving the public
rather than pursuing narrow interests. Planning, preparing, and executing the transfer of re-
sponsibility from military to host-nation control for rule of law—although critical for building
public confidence—often proves the most difficult and complex transition conducted in a
stability operation. Failure to ensure continuity of rule of law through this transition threat-
ens the safety and security of the local populace, erodes the legitimacy of the host nation,
and impedes long-term development and achieving the desired end state.
3. Social Well-Being
The immediate needs of a host-nation population emerging from conflict or disaster
generally consist of food, water, shelter, basic sanitation, and health care. International
aid typically responds quickly, often due to their presence in, or proximity to, the affected
area. If allowed, and once forces stabilize and secure the situation, local and interna-
tional aid organizations provide for the immediate humanitarian needs of the people,
establish sustainable assistance programs, and assist with displaced civilians.
However, forces also must attend to long-term requirements: developing educational
systems, avoiding inadvertent civilian harm, addressing past abuses, and promoting
peaceful coexistence among the host-nation people. These requirements most appropri-
ately get supported from civilian actors, including other government agencies, intergov-
ernmental organizations, and NGOs. Resolving issues of truth and justice are paramount
to this process, and systems of amends, compensation, and reconciliation are essential.
Operations
Stability in
4. Stable Governance
Since the end of the Cold War, all international interventions have aimed to establish stable
governments with legitimate systems of political representation at the national, regional,
and local levels. In a stable government, the host-nation populace regularly elects a repre-
sentative legislature according to established rules and in a manner generally recognized
as free and fair. Legislatures must be designed consistently with a legal framework and
legitimate constitution. Officials must be trained, processes created, and rules established.
Typically, early elections in a highly polarized society empower elites, senior military
e
leaders, and organized criminal elements. However, the local populace often seeks early
and visible signs of progress. Effective reform processes begin with elections at the
provincial or local level to minimize the likelihood of national polarization and reemer-
pl
gence of violent divisions in society. Popular leaders—capable of delivering services and
meeting the demands of their constituents—and effective processes can emerge. Since
elections can also become flashpoints for violence and instability between groups, U.S.
m
forces consider security measures as part of the election process.
Successful, stable governments also require effective executive institutions. Such capac-
ity building generally requires a long-term commitment of effort from the international
community to reestablish effective ministries and a functional civil service at all levels
Sa
of government. Stable governments also require free and responsible media, multiple
political parties, and a robust civil society. Further, in many countries, formal systems of
governance exist alongside informal governance systems, such as tribal elders. Such
informal systems can play an important stabilization role, acting as an enduring and ef-
fective alternative to formal structures, which may have limited reaches within a country.
5. Sustainable Economy
Following conflict or a major disaster, economies tend toward a precarious state. They
often suffer from serious structural problems that need immediate attention. However,
they also possess significant growth potential. Commerce—legitimate and illicit—previ-
ously inhibited by circumstances emerges quickly to fill market voids and entrepreneur-
ial opportunities. International aid and the requirements of intervening military forces
often infuse the economy with abundant resources, stimulating rapid growth across the
economic sector. However, much of this growth is temporary. It tends to highlight increas-
ing income inequalities, the host-nation government’s lagging capacity to manage and
sustain growth, and expanding opportunities for corruption.
Rather than focus efforts toward immediately achieving economic growth, intervening
elements aim to build on those aspects of the economic sector that enable the economy
to become self-sustaining. These aspects include physical infrastructure, a sound fiscal
and economic policy, an effective and predictable regulatory and legal environment, a
viable workforce, business development and increased access to capital, and effective
management of natural resources
The root causes are critical to understanding why a state is unstable, but additional
analysis is required to understand how they have manifested in specific political
dynamics that threaten the HN. To develop an effective plan for stabilization, the
joint force must analyze the immediate drivers of instability. Opportunity, motive, and
means are central to understanding and mapping the drivers of instability as a basis
for the design and detailed planning to create stability.
Opportunity
Opportunity may emerge slowly over time due to a decline in HN capacity to control
its territory and population. It can also arise when HN security force capacity remains
Operations
Stability in
level, but the willingness of the HN population to cooperate with HN forces declines.
Conversely, opportunity can also emerge suddenly as the result of a natural, indus-
trial, or humanitarian disaster that overwhelms the capacity of the HN government to
maintain control. In these cases, the HN government may face criminal or political
opportunists seeking to exploit a sudden vacuum of authority.
Motive
The motives for violence vary between individuals and communities, and between
elites, combatants, and supporters. For a joint force conducting stability activities, it
e
is important to distinguish between the root causes that made a society vulnerable
to instability, and how those conditions were transformed into drivers of instability by
established or aspiring elites. The existence of grievances does not automatically
pl
cause instability: poverty, unemployment, economic inequality, inadequate essential
services, political marginalization, and repression are unfortunately commonplace, and
exist in many places that are reasonably stable. It takes leaders to build a compelling
narrative that links grievances to a political agenda. Those leaders use that narra-
m
tive to mobilize support for some political purpose, including possibly undermining the
government’s ability to constrain their freedom of action. The narrative explains who
is to blame for the grievances, how the grievances should be addressed and what the
Sa
population should do. The success of a narrative is based not only on the substance
of its promises and threats, but how it is presented to the target audience. Successful
narratives typically frame grievances in terms of an ethnic, religious, political, class,
or geographic identity, emphasizing its marginalization by the HN government. The
identity provides the symbols, myths, and historical references that are woven into the
narrative to bolster its credibility and appeal.
Means
Finally, acquiring the means to mount a violent challenge to the incumbent govern-
ment authorities is a significant task for armed actors, and the way such groups go
about securing those resources can strongly influence their behavior. The leaders
of destabilizing actors must assemble and organize personnel, funds, weapons, and
systems of secure communications and logistics—often covertly. Leveraging exist-
ing social networks, diaspora support, illicit economies, or state sponsorship can all
provide armed actors with the means to challenge HN authority, but each comes with
drawbacks as well. Relying on existing social networks can provide a resilient, deeply
rooted source of people and funds, but that social identity may limit the ability to win
broader support. Diaspora politics and priorities can diverge significantly from those in
the theater of operations, creating tensions between local factions and their geograph-
ically removed backers. Deepening involvement in illicit economies can transform
organizations into criminal organizations as profit becomes an end in itself. State
sponsors can often prove the strongest support base, but have their own agendas and
expect to wield influence or even outright control.
While the assignment of specific tasks and prioritization among them depends on the
mission and conditions of the OE, the stability sectors are a tool to help visualize the
scope of stabilization efforts within a joint operation. JIPOE, mission analysis, and the
CONOPS sequence necessary activities within the LOEs aligned to operational and
tactical objectives and develop appropriate priorities for those activities and resource
allocation. Individually, the joint stability functions encompass the distinct yet interrelated
tasks that constitute stability activities in a stability sector. Collectively, they are the
framework through which the USG identifies the possible tasks required in a stabilization
effort. Incorporating tasks within each sector into coherent LOEs is required to ensure
that efforts are properly aligned to their specific objective and integrated to create cross-
Operations
Stability in
cutting effects.
Foreign
e Line of Effort 2
pl
Political Political
Humanitarian Settlement
Assistance Strategy Line of Effort 3
Line of Effort 4
Rule of Law
m
Economic
Stabilization and
Infrastructure Each line of effort integrates
elements of all the stability
Sa
functions to achi
eve a specific
operational objective.
Ref: JP 3-07, Stability (Aug ‘16), fig. III-2. An Integrated Approach to Stabilization.
Although some tasks are executed sequentially, success necessitates an integrated
approach that focuses on synchronized actions, whether concurrent or sequential,
throughout the OE. These tasks are inextricably linked; positive results in one area of
stabilization depend upon the successful integration and synchronization of activities
across the other areas. The JFC should establish LOEs based on the political strategy
that integrates the stability functions within each LOE. Preferably, the JFC should use
them simply as a guide to action, ensuring broader unity of effort across all sectors of the
HN. In hostile environments, joint forces may be tempted to utilize all available capac-
ity on security efforts. However, security is usually conditional on a degree of popular
consent and this, in turn, is conditional on the restoration of basic governance functions.
Accordingly, the JFC should not presume that others could implement, for example,
governance functions once the joint force has managed to reduce the level of violence.
Some tasks are interdependent and a minimal level of security, governance, and rule of
law will be necessary to facilitate an initial sense of stabilization.
The joint stability functions are security, FHA, economic stabilization and infrastructure,
rule of law, and governance and participation. These functions are based upon the sec-
tors developed in the stability ETM as interagency guidance on stability and reconstruc-
tion activities across the USG.
A. Security
Security activities seek to protect and control civil populations, territory, and national
assets such as infrastructure or natural resources. Such activities may be performed as
part of a military occupation during or after combat; as a component of a COIN or peace-
keeping operation; or in response to a natural disaster. They seek to reassure rather
than compel the civil population, while communicating a clear, credible threat of force to
opportunists or potential adversaries.
B. Humanitarian Assistance
The humanitarian assistance function includes programs conducted to meet basic human
needs to ensure the well-being of the population. Well-being is characterized by access to
and delivery of basic needs and services (i.e., water, food, shelter, sanitation, and health
services), the provision of primary and secondary education, the return or voluntary
resettlement of those displaced by violent conflict, and the restoration of a social fabric
Operations
Stability in
and community life.
C. Economic Stabilization and Infrastructure
The economic stabilization and infrastructure function includes programs conducted to
ensure an economy in which people can pursue opportunities for livelihoods within a predict-
able system of economic governance bound by law. A sustainable economy is characterized
by market based macroeconomic stability, control over the illicit economy and economic-
based threats to the peace, development of a market economy, and employment generation.
D. Rule of Law
e
The rule of law function refers to programs conducted to ensure all individuals and
institutions, public and private, and the state itself are held accountable to the law, which
pl
is supreme. The rule of law in a country is characterized by just legal frameworks, public
order, accountability to the law, access to justice, and a culture of lawfulness. Rule of law
requires laws that are publicly promulgated, equally enforced, and independently adjudi-
cated, and that are consistent with international human rights principles. It also requires
m
measures to ensure adherence to the principles of supremacy of law, equality before the
law, accountability to the law, fairness in applying the law, separation of powers, partici-
pation in decision making, and legal certainty.
Sa
Operations
Stability in
judges and legal professionals, looted or destroyed courts and prisons, damaged or
destroyed records, and any surviving vestiges of the justice system stripped of essen-
tials. With a transitional military authority, intervening forces may perform both judicial
and correctional functions. Promoting the rule of law in these cases requires that
military forces abide by the law and are held accountable for any crimes committed.
To provide for the safety and security of the populace successfully, an effective
judiciary branch and a functioning corrections system must complement the state’s
security institutions. Together with governance and civil security, civil control is a
e
core element of security sector reform. This reform sets the foundation for broader
government and economic reform and successful humanitarian relief and social
development. Establishing civil control protects the integrity of the security sector
pl
reform program. Civil control tasks prevent corruption that threatens security institu-
tions when institutions lack the support of judges to apply the law and prisons to
incarcerate the convicted.
m
Building host-nation capacity for civil control is paramount to establishing the founda-
tion for lasting civil order. Community-oriented police services under civilian control
that clearly separate the roles of the police and military are essential to success. As
with host-nation security forces, the development of police forces proves integral to
Sa
providing a safe, secure environment for the local populace. Military forces first need to
restore and then maintain civil order until formed police units trained in stability policing
skills can perform these functions and begin training host-nation police forces. In some
cases, military forces also train, or oversee the training of, host-nation police forces.
Host-nation justice system actors who participated with a corrupt or authoritarian
regime and continued their service in such capacities are inconsistent with institu-
tional reform programs. As with other elements of the civil security and governance
sectors, an appropriate authority vets the judiciary, police, and corrections staffs and
oversees their activities as part of the security sector reform program. Conducted in
parallel with other reform processes, near-term efforts focus on building host-nation
capacity by restoring the components of the justice system. Long-term develop-
ment aims to institutionalize a rule of law culture within the government and society.
Establishing this culture often relies on the delicate balance between retribution and
reconciliation in a state recovering from the effects of collapse. Successful develop-
ment depends on the ability of the host nation to reconcile with its past—determining
whom to punish, whom to forgive, whom to exclude, and whom to accept within the
new order of the state.
Civil control regulates selected behavior and activities of individuals and groups. It
reduces risk to individuals or groups and promotes security. Within the justice and
reconciliation stability sector, initial response tasks aim to develop interim mecha-
nisms for establishing rule of law. Transformation tasks focus on restoring the justice
system and processes for reconciliation. Fostering sustainability tasks serve to
units quickly transfer the lead for these efforts to the U.S. country team.
Civil control includes the following necessary conditions:
• Just legal frameworks
• Public order
• Accountability to the law
• Access to justice
• Culture of lawfulness
e
Establish Civil Security Subordinate Tasks
pl
• Enforce cessation of hostilities, peace agreements, and other arrangements
• Determine disposition and composition of national armed and intelligence
services
m
• Conduct disarmament, demobilization, and reintegration
• Conduct border control, boundary security, and freedom of movement
• Support identification
Sa
Chap 3
III. Stabilization
Planning
Ref: JP 3-07, Stability (Aug ‘16), chap, IV and ADRP 3-07, Stability (Aug ‘12), chap. 4.
I. Stabilization Planning
The development of OPLANs that integrate offense, defense, and stability actions
and integrate the military’s stabilization efforts with the activities of interorganizational
partners is the responsibility of JFCs and their staffs. JFCs must also ensure that
subordinate commanders executing stability actions understand the overall planning
Operations
Stability in
of the operation, including, in particular, how various military and civilian stability
efforts interrelate and, when possible, integrate with each other and with combat mis-
sions, tasks, and activities, if any.
It is the responsibility of CCDRs and their subordinate JFCs to incorporate stability
actions into the deliberate and crisis action planning processes when directed by
the President or the Chairman of the Joint Chiefs of Staff (CJCS). In addition to the
important role stability actions play in major operations or campaigns and limited
contingency operations, stability actions contribute to shaping the operational envi-
ronment (OE) and supporting the GCCs’ Theater Campaign Plans (TCPs).
Stability Actions
e
pl
Stability actions can be an integral part of joint operations that focus on achieving
both elements essential to strategic success—defeating the adversary and ensuring
that in the aftermath that secure and stable conditions are in place that enable recon-
struction and development toward a lasting peace. Stabilization efforts are executed
m
do this by preparing HNs for crisis and by anticipating and addressing the possible
drivers of conflict long before the onset of hostilities or disaster. There is no separate
planning process for stability from that used for combat operations. The balance and
simultaneity in execution of offense, defense, and stability actions within each phase
of a joint operation demands a similar balance and simultaneity in planning efforts.
appropriate for the operational area, and achievable based on JFC capabilities
and available resources.
• Consider relevant aspects of the OE during the planning and execution of
activities and operations that produce lethal and nonlethal effects.
• Determine second and third order effects.
• Inform the feedback loop from the JFC to policy makers about the operational
feasibility of policy objectives for a given stabilization mission.
The OE is a composite of conditions, circumstances, and influences that affect how
e
the JFC uses available capabilities and makes decisions. The OE typically en-
compasses the relevant actors and physical areas and factors of physical domains
pl
and information environment (which includes cyberspace). Understanding the OE
requires a holistic view of operationally relevant aspects of the OE. Decision making
and associated behavior of relevant actors are particularly important to understand.
Success during stabilization efforts ultimately depends on the ability of the JFC and
m
partners to apply lethal and nonlethal state power in a manner that influences the
behavior of people in accordance with US stabilization objectives. Understanding the
OE requires an understanding of factors that shape the decision making and associ-
ated behavior of relevant actors. A holistic understanding of all relevant components
Sa
within the OE, helps the JFC to understand how the OE can be shaped, how the OE
affects capabilities, and how friendly, adversary, and neutral actors’ actions affect or
shape the conflict. Importantly, understanding relevant aspects of the OE enables
the JFC to leverage aspects of the OE to achieve its stabilization objectives.
Planning
To perform the mission analysis process during planning, a planner needs an under-
standing of the OE. It helps identify the true nature of the problem, the mission, and
the factors within the OE that must be targeted through lethal and nonlethal means
to attain the desired end state. Understanding the OE enables planning missions
and activities that make sense for the nature of the conflict and that are appropriate
in the context of the operational area. It also enables JFC planners to improve plan-
ning by better understanding potential second- and third-order effects.
Execution
Once a mission or activity in support of the operation is planned, understanding of
relevant factors within the OE enables operators to better execute their missions
in a manner that furthers progress toward the objectives of the stabilization efforts.
Stability Mechanisms
Commanders use stability mechanisms to visualize how to employ the force to conduct
stability tasks in unified land operations. A stability mechanism is the primary method
through which friendly forces affect civilians in order to attain conditions that support
establishing a lasting, stable peace (ADRP 3-0). Some of these mechanisms recover
quickly from change in terms of conflict transformation, as they can act as mitigators for
drivers of conflict. Combinations of stability mechanisms produce complementary and re-
inforcing effects that help shape the human dimension of operational environments more
effectively and efficiently than a single mechanism applied in isolation. The four stability
Operations
Stability in
sensitive sites, population centers, and individuals; and physically occupying key
terrain and facilities. As a stability mechanism, control closely relates to the primary
stability task—establish civil control. However, control is also fundamental to effec-
tive, enduring security. When combined with the stability mechanism compel, it is
inherent to the activities that compose disarmament, demobilization, and reintegra-
tion, as well as broader security sector reform programs. Without effective control,
efforts to establish civil order—including efforts to establish both civil security and
control over an area and its population—will not succeed. Establishing control
requires time, patience, and coordinated, cooperative efforts.
• Influence involves altering the opinions and attitudes of the host-nation population
through inform and influence activities, presence, and conduct. It applies nonlethal
capabilities to complement and reinforce the compelling and controlling effects of
stability mechanisms. Influence aims to affect behavioral change through nonlethal
means. It is more a result of public perception than a measure of operational suc-
cess. It reflects the ability of forces to operate successfully among the people of the
host nation, interacting with them consistently and positively while accomplishing
the mission. Here, consistency of actions and messages is vital. Influence requires
legitimacy. Military forces earn the trust and confidence of the people through the
constructive capabilities inherent to combat power, not through lethal or coercive
means. Positive influence is absolutely necessary to achieve lasting control and
compliance. It contributes to success across the lines of effort and engenders sup-
port among the people.
Operations
Stability in
necessary for aid organizations to function effectively.
Defeat Mechanisms
Defeat mechanisms primarily apply in combat operations against an active enemy
force. A defeat mechanism is a method through which friendly forces accomplish their
mission against enemy opposition (ADRP 3-0). They are defined in terms of the broad
operational and tactical effects they produce—physical or psychological. Commanders
translate these effects into tactical tasks, formulating the most effective method to de-
feat enemy aims. Physical defeat deprives enemy forces of the ability to achieve those
e
aims; psychological defeat deprives them of the will to do so. Military forces prove
most successful when applying deliberate combinations of defeat mechanisms. As
pl
with stability mechanisms, this produces complementary and reinforcing effects not at-
tainable with a single mechanism. The four defeat mechanisms are destroy, dislocate,
disintegrate, and isolate:
• Destroy involves identifying the most effective way to eliminate enemy capabili-
m
ties. It may be attained by sequentially applying combat power over time or with a
single, decisive attack.
• Dislocate involves compelling the enemy to expose forces by reacting to a spe-
Sa
Operation assessment is a process that measures progress of the joint force toward
mission accomplishment. A constant challenge during stabilization efforts is the difficulty to
effectively analyze progress using systematic reliable indicators and data collection methods.
Assessment Metrics
The staff should develop metrics to determine if stability actions are properly linked to
the JFC’s overall plan and the larger hierarchy of operational and national objectives.
Assessment indicators include Measures of Effectiveness (MOEs) and Measures of
Performance (MOPs).
Operations
Stability in
Assessment Tools
• Interagency Conflict Assessment Framework (ICAF). The ICAF is a framework
that can be used to help people from different USG departments and agencies work
together to reach a shared understanding of a country’s conflict dynamics and consen-
sus on potential entry points for additional USG efforts. This assessment will provide
for a deeper understanding of the underlying conflict dynamics in a country or region.
• USAID Conflict Assessment Framework (CAF). USAID carries out conflict as-
sessments in a country where changes in conditions or circumstances on the ground
e
are needed to enable an environment for sustainable development, the environment
requires a blend of immediate relief and stabilization assistance, or where the coun-
pl
try context requires contingency or scenario planning due to the likelihood of a rapid
change in the environment requiring resources to be redirected in response to a new
or renewed crisis.
• Measuring Progress in Conflict Environments (MPICE). The USACE, US Institute for
m
Peace, Office of the Sec of Defense, and US Army Peacekeeping and Stability Opera-
tions Institute developed MPICE as a framework. Fundamentally, the ICAF is an assess-
ment to ascertain the root causes, the drivers of conflict, and the potential resiliency of a
HN. Measuring Progress in Conflict Environments (MPICE) complements the ICAF.
Sa
The JFC is responsible for the detailed planning and operations of the transitional
military authority under the general guidelines received from the President and
SecDef. The structure and organization of the transitional military authority depend on
international law; UN Security Council resolution; the mission of the military force; the
organization, capabilities, and capacities of deployed forces; the military and political
conditions of the OE, the nature, structure, and organization of the existing or former
HN government; and the physical, political, economic, and cultural geography of the
HN. The JFC may execute the authorities of civil administration directly, invest the
authority in subordinate operational commanders, or establish a separate JCMOTF.
Operations
Stability in
A transitional military authority restores and maintains public order, ensures the safety
and security of the local populace, and provides essential civil services. Transitional
military authority is not limited to the occupation of enemy territory. During operations
outside the United States and its territories, necessity may also require establishing
transitional military authority in various situations, including:
• An allied or neutral territory liberated from enemy forces
• A technically neutral or allied territory proven to be hostile
• Ungoverned areas
e
The time during which a transitional military authority exercises authority varies based
on the requirements of both the military operation and international law. To establish
transitional military authority, commanders may require from the host-nation population
pl
a level of obedience commensurate with military necessity. Such obedience provides
security of military forces, maintenance of law and order, and proper administration of
the operational area. Commanders can reward civil obedience by reducing infringe-
ment on the individual liberties of the local populace.
m
The degree of control exercised by a transitional military authority varies greatly due to
several factors, including:
• The legal authorities of the military commander under international law
Sa
• The relationship that previously existed between the U.S. Government and the
host-nation government
• Existing attitudes and the level of cooperation among the host nation’s national,
regional, and local leaders and the local populace
• Ongoing and projected military operations
• The presence of hostile or enemy forces
• The level of civil obedience
As conditions in the territory subject to transitional military authority stabilize, the
degree of control exercised by a military authority can decrease. Authority and control
can transfer either to the legitimate sovereign or to another civil authority.
Chap 3
VI. Small Unit Stability
Tasks & Activities
Ref: FM 3-07.31, Peace Operations (Oct ’03), chap. IV and FM 3-21.10 (FM 7-10),
The Infantry Rifle Company (Jul ‘06), chap. 6.
This section highlights small unit tasks and activities related to stability, peace
and counterinsurgency operations. For discussion of tasks and activities more
closely related to peace operations -- protected areas, separation/neutralization
of belligerent forces, interpositioning, nonlethal weapons, and noncombatant
evacuation operations (NEO) -- see pp. 4-27 to 4-34.
Operations
Stability in
Stability, peace and counterinsurgency operations encompass various military mis-
sions, tasks, and activities conducted outside the United States in coordination with
other instruments of national power to maintain or reestablish a safe and secure
environment, provide essential governmental services, emergency infrastructure
reconstruction, and humanitarian relief. Stability operations can be conducted in
support of a host-nation or interim government or as part of an occupation when no
government exists.
e
pl
m
Sa
Stability operations involve both coercive and constructive military actions. They
help to establish a safe and secure environment and facilitate reconciliation among
local or regional adversaries. Stability operations can also help establish political,
legal, social, and economic institutions and support the transition to legitimate local
governance. It is essential that stability operations maintain the initiative by pursing
objectives that resolve the causes of instability. Stability operations cannot succeed if
they only react to enemy initiatives. (Dept. of Army photo)
Coordination, integration, and synchronization between host-nation elements, other
government agencies, and Army forces are enhanced by transparency and cred-
ibility. The degree to which the host nation cooperates is fundamental. Commanders
publicize their mandate and intentions. Within the limits of operations security, they
make the populace aware of the techniques used to provide security and control.
Actions on the ground reinforced by a clear and consistent message produce trans-
parency. This transparency reinforces credibility. Credibility reflects the populace’s
assessment of whether the force can accomplish the mission.
(Stability) VI. Small Unit Tasks & Activities 3-79
(Sample Only) Find this and other SMARTbooks at [Link]
A. Patrolling
Ref: FM 3-07.31, Peace Operations (Oct ’03), pp. IV-1.
Patrolling is also a high-frequency task during stability operations. The primary advan-
tage of the dismounted patrol is that they provide a strong presence and enable regu-
lar interface with the local population. This procedure greatly helps in gathering vital
information as well as in developing the base of knowledge of the unit’s AO. Planning
and execution of an area security patrol and presence patrol are similar to procedures
for other tactical patrols except that the patrol usually occurs in urban areas and patrol
leaders must consider political implications and ROE.
Patrolling is the basis of operations in a hostile area. It is aimed at acquiring informa-
tion, identifying and apprehending persons, and neutralizing hostile groups. The kind
of patrol depends on the mission and can be either mounted or dismounted.
Operations
Stability in
Types of patrols can include the following:
1. Presence Patrols
PO forces use presence patrols when the situation in the area is stabilized and there is
no direct danger for the forces. The patrol is recognized as a unit of the PO force. The
intention is to show the local people that forces are in the area and alert. The patrol
is armed, but is acting in a friendly and frank way. The patrols are conducted during
daylight hours.
2. Combat Patrols e
Conducted in areas where forces may encounter armed, organized groups may be
encountered, it may be necessary to conduct combat patrols. In such circumstances,
pl
imposing a curfew will ensure that the combat patrol is not placed at a disadvantage
it will usually be sensible to impose a curfew so as not to place the combat patrol at a
disadvantage.
m
3. Ambush Patrols
Ambushes are sometimes useful in rural operations. If conducted under cover of a
curfew and the necessary precautions are taken to ensure that innocent people do
not get involved, it is possible to set a conventional style ambush designed to capture
Sa
hostile persons.
4. Reconnaissance Patrols
Reconnaissance patrols play a major role in PO for several reasons. They will need to
visit all outlying communities in order to both acquire information and provide the reas-
surance of a security force presence. These patrols may have to search areas and
they may need to set up hasty roadblocks.
5. Air and Space Assets
Use air and space assets to cover large areas and gain certain types of information
quickly. For example, the use of thermal imaging cameras can gain timely information,
both day and night, for monitoring movement and activity. The threat of applying lethal
air power can limit movement of hostile forces.
6. Naval Patrolling
Naval assets provide operational support, including anything from patrolling inland wa-
terways to major ocean coastlines. Other missions commonly performed can include
search and rescue (SAR) operations, observation and reporting on pollution damage
to the marine environment, and combined training missions with ground elements of
the PO force. Examples of training missions include insertion and extraction of person-
nel at coastal remote sites, re-supply, SAR exercises, small arms live fire exercises,
and familiarization rides to encourage mutual understanding and cohesion among
contingents.
Stages
m
The five stages of movement are preflight and flight, arrival, asylum, repatriation,
and reintegration.
• Preflight and flight. Call on military forces to provide intelligence support to
Sa
Chap 4
Peace
Operations (PO)
Ref: JP 3-07.3, Peace Operations (Aug ‘12), chap. I, and ATP 3-07.31, Peace
Operations (Nov ‘14), chap. I.
Peace operations (PO) are crisis response and limited contingency operations, and
normally include international efforts and military missions to contain conflict, redress
the peace, and shape the environment to support reconciliation and rebuilding and
to facilitate the transition to legitimate governance. PO may be conducted under the
sponsorship of the United Nations (UN), another intergovernmental organization
(IGO), within a coalition of agreeing nations, or unilaterally.
Operations
Peace
e
pl
m
Sa
Peace operations (PO) are crisis response and limited contingency operations,
including international efforts and military missions to contain conflict, redress the
peace, and shape the environment in support of reconciliation and rebuilding and
facilitating the transition to legitimate governance. (United Nations photo.)
e
See pp. 4-15 to 4-18 for further discussion.
4. Peacemaking (PM)
Peacemaking is the process of diplomacy, mediation, negotiation, or other forms of
peaceful settlement that arranges an end to a dispute and resolves the issues that
led to the conflict.
Military support to the peacemaking process includes military-to-military relations,
security assistance, or other activities, which influence disputing parties to seek a
diplomatic settlement.
An example of military support to peacemaking was the involvement of the Supreme
Allied Commander Europe and the Joint Staff plans directorate during the develop-
ment of the Dayton Accords by the presidents of Bosnia, Croatia, and Serbia outlin-
ing a General Framework Agreement for Peace in Bosnia and Herzegovina.
5. Conflict Prevention
Conflict prevention employs complementary diplomatic, civil, and military means to
monitor and identify the causes of a conflict, and takes timely action to prevent the
occurrence, escalation, or resumption of hostilities. Chapter VI of the United Na-
tions (UN) Charter covers activities aimed at conflict prevention. Conflict prevention
includes fact-finding missions, consultations, warnings, inspections, and monitoring.
An example of military support to conflict prevention is Operation ABLE SENTRY.
The United States (US) participates in a broad range of military operations (ROMO),
including counterinsurgency, crisis response, and contingency operations, necessitat-
ing interaction with indigenous populations and institutions. Peace operations (PO) are
crisis response and limited contingency operations, including international efforts and
military missions to contain conflict, redress the peace, and shape the environment
in support of reconciliation and rebuilding and facilitating the transition to legitimate
governance.
The typical PO operational area is characterized by complex and ambiguous situations
and may possess the following:
• Asymmetrical threats
• Failed states
• Absence of rule of law
• Gross violations of human rights
• Collapse of civil infrastructure
• Presence of dislocated civilians (DCs)
Operations
Political mandates or constraints affect tactical operations and operations at the tacti-
Peace
e
cal level can have strategic implications.
Risk management is a key consideration. PO are dangerous and leaders at every level
pl
must continuously assess the risk to their forces and take appropriate risk mitigation
actions.
PO involve multiple agencies within the US Government (USG) including the De-
partment of Defense (DOD), Department of State (DOS), United States Agency for
m
PEO tasks may include some of those conducted in PKO as well as enforcement of
sanctions and exclusion zones, protection of FHA, operations to restore order, and
forcible separation of belligerent parties or parties to a dispute.
See pp. 4-27 to 4-34 for discussion of related multi-service TTPs.
2. Protection
PEO contingent forces may be tasked to provide protection for FHA missions. This
could include protection for IGOs, NGOs, OGAs, and other military personnel who are
providing FHA. Such protection may include establishing secure base areas, protect-
ing routes or corridors for the transport of relief supplies, and providing security for
distribution sites. If belligerent parties oppose the delivery of relief supplies by IGOs,
NGOs, or other agencies, PEO forces may deliver the supplies by providing airlift or
Operations
other forms of logistic support. The CMOC, when established, serves as the focal point
Peace
e
for requests for support from US forces.
ing forcible separation require extensive offensive combat capability, as well as combat
support and combat service support (CSS). The goal is to force the belligerent parties
to disengage, withdraw and, subsequently, to establish a BZ or DMZ.
Chap 4
V. Multi-Service Tactics,
Techniques & Procedures
Ref: ATP 3-07.31 [FM 3-07.31], Peace Operations Multi-Service TTPs (Nov ’14) and
adaptations from FM 3-07.31, Peace Operations (Oct ’03).
Operations
A. Principles
Peace
•
e
Focus the operation at the tactical level
pl
• Sustain consent for the operation
• Keep the entire operation transparent
• Act as liaison to all key parties and local authorities
• Belligerents must fully participate for success
m
Chap 5
Counterinsurgency
Operations (COIN)
Ref: JP 3-24, Counterinsurgency (Nov ‘13), chap. 1 and FM 3-24, Insurgencies and
Countering Insurgencies (May ‘14), chap. 1.
I. Insurgency
Insurgency is the organized use of subversion and violence to seize, nullify, or
challenge political control of a region. Insurgency uses a mixture of subversion,
sabotage, political, economic, psychological actions, and armed conflict to achieve
its political aims. It is a protracted politico-military struggle designed to weaken the
control and legitimacy of an established government, a military occupation govern-
ment, an interim civil administration, or a peace process while increasing insurgent
control and legitimacy—the central issues in an insurgency. Each insurgency has
its own unique characteristics but they have the following aspects: a strategy, an
ideology, an organization, a support structure, the ability to manage information,
and a supportive environment. It is these aspects that set an insurgency apart from
other spoilers and present a significant threat. Typically, insurgents will solicit, or be
offered, external support from state or non-state actors.
e
Insurgencies will continue to challenge security and stability around the globe in the
21st century. While the possibility of large scale warfare remains, few nations are
pl
likely to engage the US, allies, and partner nations. Globalization, numerous weak
nation-state governments, demographics, radical ideologies, environmental con-
cerns, and economic pressures are exacerbated by the ease of interaction among
insurgent groups, terrorists, and criminals; and all put both weak and moderately
insurgency
m
Counter-
governed states at risk. Today, a state’s failure can quickly become not only a
misfortune for its local communities, but a threat to global stability and US national
interests.
Long-standing external and internal tensions tend to exacerbate or create core
Sa
grievances within some countries, which can result in political strife, instability, or, if
exploited by some groups to gain political advantage, even insurgency. Moreover,
some transnational terrorists with radical political and religious ideologies may in-
trude in weak or poorly governed states to form a wider, more networked threat.
The United States Government (USG) has supported numerous allies and partner
nations to prevent or disrupt threats to their stability and security through foreign
assistance and security cooperation (SC) activities as part of geographic combat-
ant commanders’ (GCCs’) theater campaign plans in conjunction with other USG
efforts. The Department of Defense’s (DOD’s) efforts can include counterterrorism
(CT) operations and foreign internal defense (FID) programs supported by stability
operations tasks. If a friendly nation appears vulnerable to an insurgency, and it is in
the best interest of the USG to help the host nation (HN) mitigate that insurgency, the
USG would support the affected nation’s internal defense and development (IDAD)
strategy and program through a FID program. When an HN government supported
by a FID program appears to be overwhelmed by internal threats, and if it is in the
national security interests of the USG, then the third category of FID, US combat
operations, may be directed by the President. Those US combat operations would
be in the form of counterinsurgency (COIN) operations, whether in conjunction with
the HN forces, or in place of them, until the HN has the necessary capability and
capacity to take on combat operations. However, the HN must retain responsibility
for dealing with the insurgency even though US forces may temporarily be conduct-
ing COIN operations.
Whatever type of strategy and operational approach that a counterinsurgency takes, sev-
eral strategic principles are normally relevant. Whether the U.S. is enabling a host nation
with certain capabilities or directly using its land forces, the principles listed in below are
relevant to most counterinsurgency operations. However, these principles are not meant to
be exclusive rules for every conflict. They are provided for the practitioner and planner as a
foundation for how they think about planning and executing counterinsurgency operations.
1. Legitimacy is the Main Objective
Fostering development of effective governance by a legitimate government that can
provide security and acts in the best interests of its people may be essential to counter-
ing an insurgency. Legitimacy can be seen as the willing acceptance of a government
by its population. Counterinsurgency forces may achieve this objective by the balanced
application of both military and nonmilitary means. Governments rule through a combina-
tion of consent and coercion. Governments that are “legitimate” normally rule with the
consent of the governed; those described as “illegitimate” tend to rely mainly or entirely
on coercion. Citizens of the latter tend to obey the state for fear of the consequences of
doing otherwise, rather than because they voluntarily accept its rule. Legitimacy is a per-
ceived condition by the population that can only be achieved by host-nation government
actions that lead to an acceptance of its primacy by the people.
e
2. COIN Forces Must Understand the Environment
Successful conduct of counterinsurgency operations depends on thoroughly understand-
pl
ing the society and culture within which they are being conducted. In most counterinsur-
gency operations in which foreign forces participate, insurgents hold a distinct advantage
in their level of local knowledge. They speak the language, move easily within the soci-
ety, and are more likely to understand the population’s interests. Thus, for foreign forces
insurgency
m
Counter-
insurgency. Only through understanding the operational environment can the counterin-
surgent plan and execute successful operations to counter the conditions that allow the
insurgency to exist in the first place. Nevertheless, U.S. forces must never assume they
will be welcomed by a local population. They may even be viewed as occupiers.
3. Intelligence Drives Operations
Effective counterinsurgency operations are shaped by timely, relevant, tailored, predic-
tive, accurate, and reliable intelligence, gathered and analyzed at the lowest possible
level and disseminated throughout the force. Without accurate and predictive intel-
ligence, it is often better to not act rather than to act. Gaining situational understanding
before action is often essential in avoiding long term damage to mission objectives. In
environments where commanders do not have situational understanding, the first action
they should take is to use forces to gain that understanding while not creating unintended
and lasting harm to the mission.
Because of the dispersed nature of counterinsurgency operations, the actions of coun-
terinsurgency forces are key generators of intelligence. In counterinsurgency operations,
a cycle often develops where intelligence drives operations, which produces additional
intelligence that facilitates subsequent operations. Reporting by tactical units and civilian
agencies is often of greater importance than reporting by specialized national intelligence
assets. These factors, along with the need to generate a favorable tempo (rate of military
operations) drive the requirement to produce and disseminate intelligence at the lowest
practical level. Commanders are responsible for driving the intelligence process.
insurgency
m
Counter-
6. Manage Information and Expectations
Information and expectations are related; skillful counterinsurgency forces manage
both. To limit discontent and build support, the affected government and any counterin-
surgency forces assisting it create and maintain a realistic set of expectations among
Sa
the population, friendly military forces, and the international community. The key tools
to accomplish this are information operations through the effective coordination and
synchronization of information related capabilities. Effective counterinsurgency com-
manders tell the truth; they refuse to give projections; and they do not promise more than
can be provided. Achieving steady progress toward a set of reasonable expectations can
increase the population’s tolerance for the inevitable inconveniences of ongoing counter-
insurgency operations. Where a large foreign force is present to help establish a regime,
this progress can extend the period until foreign forces are perceived by the population
as an army of occupation.
Effective counterinsurgency forces must ensure that their deeds match their words and
Continued on next page
both are consistent with the broader narrative. They should also understand that any
action has an information reaction. Counterinsurgency forces should carefully consider
that information reaction’s impact on the many audiences involved in the conflict and on
the sidelines. They should work actively to shape responses that further their ends. In
particular, messages to different audiences must be consistent. In the global informa-
tion environment, people in the area of operations can access the internet and satel-
lite television to determine the messages counterinsurgency forces are sending to the
international community. Any perceived inconsistency reduces credibility and undermines
counterinsurgency efforts.
Counterinsurgency
(No Host Nation)
Counterinsurgency in Support
of Foreign Internal Defense Foreign Internal
Defense
(Not Countering an
Insurgency)
e Host-Nation Governance
pl
Coalition Civilian Governance
insurgency
m
Military Governance
Counter-
Failed State Failing State Recovering State
Sa
Active
Normalization
Insurgency
Chap 5
VI. Indirect
Approaches
Ref: FM 3-24, Insurgencies and Countering Insurgencies (May ‘14), chap. 10.
insurgency
m
promoting sustainable development and growth of responsive institutions. The goal
Counter-
is to promote long-term regional stability.
Nation assistance involves other government agencies that provide expertise in
building civil institutions. This is an essential element in counterinsurgency because
Sa
the military lacks the expertise to build civil control over the population, perform
economic reforms, or aid in other basic functions that a host nation may need to
prevent or prevail against an insurgency. Using a whole-of-government approach is
essential in conducting nation assistance to prevent insurgencies from developing
freedom of movement by exploiting the root causes of conflict within an operational
environment.
Security cooperation is all Department of Defense interactions with foreign defense
establishments to build defense relationships that promote specific US security
interests, develop allied and friendly military capabilities for self-defense and multina-
tional operations, and provide US forces with peacetime and contingency access to
a host nation. (JP 3-22). This includes-
• Military to military exchanges (for example, seminars and symposia)
• Combined exercises
• Humanitarian assistance
• Security assistance
When these activities are used to defeat an insurgency, they are part of a counter-
insurgency operation. While not all security cooperation activities are in support of
counterinsurgency, security cooperation can be an effective counterinsurgency tool.
See chap. 1 and chap. 2 for further discussion of these activities.
e
pl
insurgency
m
Counter-
Sa
Chap 6
Civil-Military
Operations
Ref: JP 3-57, Civil-Military Operations (Sept ‘13), chap. 1.
Civil-Military
Unified Operations
Action, Civil-Military Operations, and Civil Affairs
Unified Action
e
The synchronization, coordination, and integration of the activities of
governmental and nongovernmental entities with military operations to
pl
achieve unity of effort
Takes place within unified commands, subordinate unified commands,
and joint task forces under the direction of these commanders
m
Civil-Military Operations
The responsibility of a commander
Sa
CMO may occur in any phase of military operations. CMO can be broadly separated
into population-centric actions and support to civil actions, though at times these opera-
tions can become mixed depending upon the OE.
CMO planners should forecast and continuously reevaluate CMO requirements by ana-
lyzing the mission to determine specific tasks. This includes establishing guidance for
the specific CMO tasks and developing estimates of the situation to include area stud-
ies. In denied areas, CMO planners use intelligence products to access, gather, and
validate information for area or functional oriented studies. Planners should consider
their knowledge of CMO, geographic areas of specialization, language qualifications,
civil sector functional technical expertise, and contacts with IPI. This will allow for timely
and critical information on the civilian capabilities and resources in the operational area.
Civilian contacts may provide more extensive insight than information collected through
intelligence channels, but CMO planners should validate all critical information and
assumptions through intelligence capabilities. CA area studies and area assessments
provide operational analysis of the civil component of the OE.
CMO tasks vary throughout operation phases. Although JFCs determine the number
and actual phases used during a campaign or operation, use of the phases provides a
flexible model to arrange CMO. These activities may be performed by CA personnel,
e
other military forces, or combination.
Phase 0—Shape
pl
During the implementation of the CCDR’s security cooperation planning objectives
CMO can mitigate the need for other military operations in response to a crisis. CA
support FID and contribute to contingency and crisis action planning. In a crisis, CA
forces working with HNs, regional partners, and IPI can shape the environment. Shap-
m
ing operations can include regional conferences to bring together multiple factions with
competing concerns and goals, economic agreements designed to build interdepen-
dency, or regional aid packages to enhance stability.
Sa
Phase I—Deter
CMO should be integrated with flexible deterrent options to generate maximum stra-
tegic or operational effect. CMO in the deter phase builds on activities from the shape
Civil-Military
Operations
phase. CA forces support NA, SA, FID, and PO. CA can also conduct area studies and
update area assessments to identify potential civil sector and civilian COGs.
Phase III—Dominate
CMO also help minimize HN civilian interface with joint operations so that collateral
damage to IPI from offensive, defensive, or stability operations is limited. Limiting collat-
eral damage may reduce the duration and intensity of combat and stability operations.
Stability operations are conducted as needed to ensure a smooth transition to the next
phase, relieve suffering, and set conditions for civil-military transition.
Phase IV—Stabilize
The stabilize phase is required when there is no fully functional, legitimate civil govern-
ing authority. The joint force may be required to perform limited local governance,
integrate the efforts of other supporting or contributing multinational, IGO, NGO, or
USG department and agency participants until legitimate local entities are functioning.
This phase can be marked by transition from sustained combat operations to stability
operations. As this occurs, CMO facilitate humanitarian relief, civil order, and restoration
of public services as fighting subsides. Throughout this segment, the JFC continuously
assesses whether current operations enable transfer of overall regional authority to a
legitimate civil entity, which marks the end of the phase.
repair/rebuilding projects.
Stabilize: self-sufficiency/stability at
Enable Civil Authority: train/equip law
pre-event levels or better.
enforcement and military, political
elections, mentoring of government Enable Civil Authority: self-
Civil-Military
sufficient/legitimate military and law
Operations
officials.
enforcement, legitimate/unquestioned
political elections, legitimate
government.
Dislocated Civilian (DC) operations are designed to minimize civil-military friction, reduce
civilian casualties, alleviate human suffering, and control DC movements.
CMO coordinates with civilian agencies to implement measures to locate and identify
population centers. CMO also coordinate with civilian agencies to create, restore, and
maintain public order. CMO coordinate resources (e.g., labor, supplies, and facilities).
CMO coordinate immediate life sustaining services to civilians in the operational area(s)
and assist with planning for disease control measures to protect joint forces.
CMO assets may designate routes and facilities for DCs to minimize their contact with
forces engaged in combat.
CMO may help contribute to logistics operations. CMO planners can help logistic plan-
ners identify available goods and services by using their contacts within the civilian
sector.
Liaison
Effective CMO require extensive liaison and coordination among US, multinational,
and indigenous security forces and other engaged government departments and
e
agencies as well as NGOs, IGOs, IPI, or the private sector. Liaison officers are
commonly employed to establish close, continuous, and physical communications
between organizations resulting in enhanced interoperability and increased mission
pl
success.
Unified Action
One of the major challenges facing the JFC in CMO is successfully coordinating the
m
activities of the joint force with those of the multinational forces (MNFs) and multiple
civilian organizations within the joint operations area (JOA), with each potentially
having their own purpose and goals. The joint force operates under a single respon-
Sa
sible commander, but unified action requires interagency coordination among all
USG participants and interorganizational coordination among all participants. CMO
should be closely coordinated with interagency partners such as the US embassy
Civil-Military
country team. The JFC should coordinate CMO amongst components, supporting
Operations
forces, the country team, and HN. This is particularly important for lethal opera-
tions involving tactical air support or indirect fires. CMO operations at the tactical,
operational, and strategic levels should be nested to ensure unity of effort. Effective
planning and coordination for unified action should result in unity of effort during
execution.
Civilian-Military Relations
Civilian-military relations are normally the responsibility of the JFC. CMO have
proven essential for those relations and typically facilitate accomplishment of the
commander’s overall mission. Adversaries may use irregular warfare (IW) to avoid
direct confrontation with the US. They may target civilian populations instead of
military forces. This erodes distinction between civilian and military institutions, infra-
structures, and systems; military and civilian “dual use” infrastructures are becom-
ing more prevalent. Cities and social and cultural hubs are often centers of gravity
(COGs) or decisive points rather than military forces or geographic locations. As
more people and the influence of their greater numbers migrate to densely popu-
lated urban areas, the joint force is more likely to be operating in urban areas than
in remote locations. Consequently, CMO should be considered in the planning and
execution of military operations.
United Nations
UNICEF
e Military CARE
Doctors of the
pl
World
United Nations
World Food IGOs NGOs Save the
Programme Children
United Nations CMOC International
m
High Rescue
Commissioner Committee
Other
for Refugees Government Other Relief
Departments
and Agencies CMT and Benefit
Sa
Organizations
Civil-Military
Operations
Legend
CARE Cooperative for Assistance and Relief IGO intergovernmental organization
Everywhere NGO nongovernmental organization
CMOC civil-military operations center OFDA Office of US Foreign Disaster Assistance
CMT civil-military team UNICEF United Nations Children’s Fund
DART disaster assistance response team USDA United States Department of Agriculture
DOS Department of State
Chap 7
Multinational
Operations
Ref: JP 3-16, Multinational Operations (Jul ‘13), chap. I and executive summary.
Alliance
An alliance is the relationship that results from a formal agreement between two or
more nations for broad, long-term objectives that further the common interests of the
members.
Coalition
e
A coalition is an arrangement between two or more nations for common action.
Coalitions are typically ad hoc, formed by different nations, often with different objec-
tives, usually for a single event or for a longer period while addressing a narrow sec-
pl
tor of common interest. Operations conducted with units from two or more coalition
members are referred to as coalition operations.
I. Strategic Context
m
Nations form partnerships in both regional and worldwide patterns as they seek op-
portunities to promote their mutual national interests, ensure mutual security against
real and perceived threats, conduct foreign humanitarian assistance (FHA) and
Sa
disaster relief operations, and engage in peace operations (PO). Cultural, diplo-
matic, psychological, economic, technological, and informational factors all influence
multinational operations and participation. However, a nation’s decision to employ
military capabilities is always a political decision.
US commanders should expect to conduct military operations as part of a multina-
tional force (MNF). These operations could span the range of military operations and
require coordination with a variety of US Government (USG) departments and agen-
cies, foreign military forces, local authorities, IGOs, and nongovernmental organiza-
tions (NGOs). The move to a more comprehensive approach toward problem solv-
ing, particularly in regard to counterinsurgency or stability operations, increases the
need for coordination and synchronization among military and nonmilitary entities.
Multinational
Operations
No single command structure meets the needs of every multinational command but one
absolute remains constant; political considerations will heavily influence the ultimate
shape of the command structure. Organizational structures include the following:
Legitimizing
Operations
National Command
Command Authority Delegated to Multinational Force Cdr
Nation to Nation Communication
See pp. 8-16 to 8-17 for discussion and listing of US organizational structures in foreign
countries: Ambassadors, Chiefs of Mission, Country Team, Defense Attaches, etc.
Chap 7
II. Multinational
Planning & Execution
Ref: JP 3-16, Multinational Operations (Jul ‘13), chap. III and executive summary.
Leader Development
Equipment
History
Sa
Defense Budget
Domestic Law
Treaties
Chap 8
Interorganizational
Cooperation
Ref: JP 3-08, Interorganizational Cooperation (Oct ‘16), chap. I.
JP 3-08 describes the joint force commander’s (JFC’s) coordination with various
external organizations that may be involved with, or operate simultaneously with,
joint operations. This coordination includes the Armed Forces of the United States;
United States Government (USG) departments and agencies; state, territorial, local,
and tribal government agencies; foreign military forces and government agencies;
international organizations; nongovernmental organizations (NGOs); and the private
sector. Interagency coordination describes the interaction between USG depart-
ments and agencies and is a subset of interorganizational cooperation.
Interorganizational Cooperation
e
pl
Interagency Coordination
(Engaged US Government Departments
and Agencies)
m
Department
Department of
of Defense
State
Department
Department of Homeland
Sa
of Security
Justice
NOTE:
The organizations listed under each category are included for example purposes only.
Key Considerations
Joint planning should include key external stakeholders, ideally starting with mission
analysis. Within the area of responsibility (AOR) and the joint operations area (JOA),
Sa
structures are established at the CCMD, subordinate joint task force (JTF) headquar-
ters (HQ), task force, and Service component levels to coordinate and resolve military,
political, humanitarian, and other issues. The crux of interorganizational cooperation is
understanding the civil-military relationship as collaborative rather than competitive.
Organizational Environments
Sharing information among department and agency participants is critical to ensure no
participant is handicapped by a lack of situational awareness, uncertainties are reduced
as much as possible, and interagency decision making is empowered by a common
operational picture. Common unifying goals should be clarified with a discussion on the
way to achieve them based upon the roles and responsibilities of each organization with
their assigned resources.
Commander’s Communication Synchronization (CCS)
The USG uses strategic guidance and direction to coordinate use of the informational in-
strument of national power in specific situations. Commander’s communication guidance
is a fundamental component of national security direction.
See pp. 3-50 to 3-51 for further discussion.
Cyberspace Considerations
Interorganizational
Cooperation
Access to the Internet provides adversaries the capability to compromise the integrity of US
critical infrastructures/key resources in direct and indirect ways. Threats to all interorganiza-
tional networks present a significant risk to national security and global military missions.
Chap 8
I. Joint Planning
Considerations
Ref: JP 3-08, Interorganizational Cooperation (Oct ‘16), chap. II.
USG organizations working to achieve national security objectives require increased
and improved communications and coordination. This section provides a frame of
reference that reflects all levels of interorganizational involvement.
Joint Planning
Joint planning should include key external stakeholders, ideally starting with mission
analysis. Where direct participation is not feasible, joint planners should consider
the activities and interests of external stakeholders that affect the command’s mis-
sion. The CCDR, through the campaign plan, works with civilian organizations to
build annex V (Interagency Coordination) of the joint plan. Emphasis should be
placed on operationalizing the theater TCP or functional campaign plan (FCP) to
facilitate cooperation among all partners, awareness of non-partners, and collec-
tive problem framing and synchronization of the CCDR’s campaign plan with other
interagency planning products. Subordinate JFCs leverage the planning efforts of
the CCMD while also building civilian organization participation into their plan and
e
participate in integrated planning with the embassies. Within the area of responsi-
bility (AOR) and the joint operations area (JOA), structures are established at the
pl
CCMD, subordinate joint task force (JTF) headquarters (HQ), task force, and Service
component levels to coordinate and resolve military, political, humanitarian, and
other issues. This section identifies tools for the commander to facilitate interorgani-
zational cooperation in domestic or foreign operations.
m
I. Whole-of-Government Approach
A whole-of-government approach integrates the collaborative efforts of USG de-
partments and agencies to achieve unity of effort. Under unified action, a whole-
Sa
Cooperation
CCMD campaign plans, also known as TCPs and FCPs, implement the military por-
tion of national policy and defense strategy as identified in the Guidance for Employ-
Sa
ment of the Force (GEF) or other issuances, and implement the military portion of
national policy and defense strategy. Designated CCMD campaign plans direct the
activities the command will do to shape the operational environment and deter crises
on a daily basis. The commander identifies the resources assigned and allocated
to the CCMD, prioritizes objectives (to include the contingencies the command is
directed to prepare for), and commits those resources to shape the operational en-
vironment and support the national strategic objectives. The commander assesses
the commitment of resources and makes recommendations to civilian leadership on
future resources and national efforts in the region. CCMD campaign plans direct
military activities (including ongoing operations, security cooperation activities, intel-
ligence collection, exercises, and other shaping or preventive activities) that shape
the operational environment to prevent, prepare for, or mitigate contingencies.
Strategic Guidance
CCDRs develop objectives based on strategic guidance provided by the President,
SecDef, and CJCS. CCDRs coordinate planning for operations, actions, and activi-
ties at the theater, strategic, and operational levels to achieve strategic objectives.
Once approval has been provided within the proper chains of command, the CCDRs
coordinate with affected USG entities throughout the Adaptive Planning and Execu-
tion (APEX) enterprise to align the instruments of national power. The CCDR is guid-
The NSC is the President’s principal forum to consider and decide national security
policy. The NSC is the President’s principal arm to coordinate these policies among
various USG departments and agencies.
Within the JS, the offices of the CJCS, Secretary of the JS, Joint Staff J-2 [Intelligence
Directorate], Joint Staff J-3 [Operations Directorate], Joint Staff J-4 [Logistics Director-
ate], Joint Staff J-5 [Plans Directorate], and Joint Staff J-7 [Joint Force Development
Directorate] are focal points for NSC-related actions. The JS J-3 provides advice on
execution of military operations, the JS J-4 assesses logistic implications of contem-
plated operations, and the JS J-5 often focuses on a particular NSC matter for policy
and planning purposes. Each JS directorate solicits Service input through the Military
Departments. SecDef may also designate one of the Service Chiefs or functional
CCDRs as the executive agent for direction and coordination of DOD activities for
specific mission areas.
For more information on the NSC and its membership, refer to JP 1, Doctrine for
the Armed Forces of the United States, and Chairman of the Joint Chiefs of Staff
Instruction (CJCSI) 5715.01, Joint Staff Participation in Interagency Affairs.
and commander of a JTF. While forces in the field under a GCC are exempt from
the COM’s statutory authority, the COM confers with the GCC regularly to coordi-
nate US military activities with the foreign policy direction being taken by the USG
toward the HN. The COM’s political role is important to the success of military
operations involving the Armed Forces of the United States. Generally, each COM
has a formal agreement with the GCC as to which DOD personnel fall under the
security responsibility of each.
• Deputy Chief of Mission (DCM). The DCM is chosen from the ranks of career for-
eign service officers through a rigorous selection process to be the principal deputy
to the ambassador. Although not appointed by the President, the DCM wields
considerable power, especially when acting as the COM while in chargé. The DCM
is usually responsible for the day-to-day activities of the embassy.
• The Embassy. The HQ of the mission is the embassy, located in the political
capital city of the HN. Although the various USG agencies that make up the mis-
sion may have individual HQ elsewhere in the country, the embassy is the focal
point for interagency coordination. The main building of the embassy is termed the
chancery; the ambassador’s house is known as the residence.
Interorganizational
Regional Strategy
In further analyzing the mission, consider how the theater or functional strategy will
affect joint force planning and operations in the projected JOA. The NSC, DOS,
COM, and the supported CCDR will provide the regional strategy and an apprecia-
tion for how the regional strategy affects the countries involved in projected opera-
tions. This may affect COA development, themes and messages, and planning and
execution activities. A well-defined regional strategy will delineate the military mission
and assist in determining force requirements and defining the theater objectives.
dition to military operations, these structures should include political, civil, admin-
istrative, legal, and humanitarian elements, as well as international organizations,
NGOs, private sector entities, and the media. The CJTF should consider how joint
force actions and those of other organizations contribute to the desired objectives.
This consideration requires liaison and routine contact with all parties, as well as
reliable communications. An assessment team can develop recommendations for
the CJTF concerning formation of an executive steering group (ESG), CMOC, and
liaison teams.
(TAA2)
Index
Index
Counterterrorism, 5-51
A Civil-Military Integration
Structures, 3-70 Criminal Justice Sector
Advise and Assist, 2-8 Assessment Rating Tool,
Civil-Military Operations
Advising, 2-9, 2-41 (CMO), 6-1 3-67
Advisor, 2-10 Civil-Military Operations Cen- Crisis Action Organization,
Aligning Words with Deeds, ter (CMOC), 6-13, 6-22, 8-20
8-24 8-23 Crisis Response and Limited
American Experience with Civil-Military Teaming (PRT/ Contingency Operations,
Stability, 3-22 JIACG/JCMOTF/JIATF), 1-13
Analytical Frameworks, 5-26, 3-69, 6-16, 8-22 Cross-Cultural Negotiation,
5-35 Combating Terrorism, 1-9 2-54
Annex V (Interagency Coor- Command and Control of Crowd Control, 3-95
dination), 8-14 U.S. Forces in Multina- Culmination, 5-46
Anticipation, 5-46 tional Operations, 7-5 Cultural Assessments, 2-31
Applying the Military Compo- Commander’s Communica- Curfews, 3-94
nent, 8-4
Arbitration, 2-62
e
tion Synchronization
(CCS), 3-25 D
pl
Arms Control, Nonprolifera- Common Operational Picture
Decisive Points, 3-63, 5-43
tion, and Disarmament, (COP), 3-56
Demilitarization, 3-91
1-8 Communication, 2-53
De-mining, 3-98
Army Stability Tasks, 3-21 Comprehensive Approach,
m
Assessing Relevant Actors, Conflict Resolution & Meet- Essential Tasks, 3-26
5-4 ings, 2-55
Deterrence 1-22
Assessment of Stability Convoy Operations, 3-92
Deterrence, 1-3
Activities, 3-66 Coordinating Efforts, 8-4
Diplomatic Mission, 8-15
Associated Threats, 5-31 Counterguerrilla Operations,
Direct Approaches, 5-43,
Attack the Network (AtN), 5-52
5-55
5-54 Countering Insurgencies,
Disarmament, Demobiliza-
Augmenting, 2-9 5-39
tion, and Reintegration
Counterinsurgency and (DDR), 3-44, 4-21
C Foreign Internal Defense
Displaced Persons, 3-98
Interaction Scale, 5-49
Campaigns, 1-19 District Stability Framework
Counterinsurgency (COIN),
Centers of Gravity (COGs), (DSF), 3-67
1-12, 3-48, 5-1
5-42 Dominance, 1-26
Counterinsurgency Ap-
Civil Affairs Forces and Op- Dynamics of Insurgency,
proach, 5-2
erations, 6-19 5-18
Counterinsurgency Opera-
Civil Affairs, 6-1
tional Environment (OE),
Civil Considerations 5-33 E
(ASCOPE), 5-37
Counterinsurgency Opera- Economic Stabilization and
Civil Disturbances, 3-96 tions, 5-1 Infrastructure Mission,
Civil-Military Integration Counterinsurgency Para- 3-25, 3-27, 4-24
Mechanisms, 3-69 doxes, 5-41 Effective Cooperation, 8-6
Index-1
(Sample Only) Find this and other SMARTbooks at [Link]
Index
Index
Joint Support Force (JSF), Military Engagement Activi-
8-13 in Operations, 3-62
ties, 1-8
Joint Task Forces (JTFs) in Operational Environment
Military Information Support
the Interagency Process, (OE), 3-54, 3-55, 5-4,
Operations (MISO), 3-50
8-12 5-33
Military Operational Consid-
Justice and Reconciliation Operational Reach, 5-46
erations, 5-48
Mission, 3-27, 4-22 Operational Variables
Military Operations and
(PMESII-PT), 5-36
Related Missions, Tasks
K and Actions, 1-2 Opportunity, 5-12
Key Documents in Peace Military Tactics, 5-28 Organizational Diversity, 8-4
Operations, 4-10 Mission Variables (METT- Organize, 2-5
Key Leader Engagements TC), 5-36
(KLE), 2-31 Monitor Compliance with an P
Agreement, 3-90 Parallel Command Structure,
L Motive, 5-13 2-40, 7-6
Large-Scale Combat Opera- Movement Control (Road- Partnered, 2-41
tions, 1-19 blocks and Checkpoints), Partnering, 2-9, 5-54
Lead Nation Command 3-86 Patrolling, 3-81
Structure, 2-41, 7-6 Multinational, 7-1 Peace Building (PB), 4-19
Legal Basis of Peace Opera- Multinational Command and Peace Enforcement Opera-
tions, 4-4 Coordination, 7-5 tions (PEO), 4-15
Legitimacy, 5-6
Lethal and Non-Lethal Ac-
e
Multinational Force, 7-5
Multinational Operations,
7-1
Peace Enforcement Tasks,
4-16
pl
tions, 3-52 Peace Operations (PO),
Limited Contingency Opera- Multinational Planning and 1-14, 4-1
tions, 1-13 Execution, 7-7 Peace Operations (PO),
Lines of Effort (LOEs), 3-64, Multinational Relationships, 3-40, 5-52
m
Index-4
(Sample Only) Find this and other SMARTbooks at [Link]
SMARTbooks
INTELLECTUAL FUEL FOR THE MILITARY
Recognized as a “whole of government” doctrinal reference standard by
military, national security and government professionals around the world,
SMARTbooks comprise a comprehensive professional library designed
with all levels of Soldiers, Sailors, Airmen, Marines and Civilians in mind.
e
pl
m
Sa
[Link]
The Lightning Press is a service-disabled, veteran-owned small business, DOD-
approved vendor and federally registered — to include the SAM, WAWF, FBO, and FEDPAY.
(Sample Only) Find this and other SMARTbooks at [Link]
SMARTbooks
INTELLECTUAL FUEL FOR THE MILITARY
MILITARY REFERENCE:
JOINT & SERVICE-LEVEL
Recognized as a “whole of government” doctrinal reference standard by military profes-
sionals around the world, SMARTbooks comprise a comprehensive professional library.
MILITARY REFERENCE:
MULTI-SERVICE & SPECIALTY e
pl
SMARTbooks can be used as quick reference guides during operations, as study
guides at professional development courses, and as checklists in support of training.
m
Sa
HOMELAND
HOMELANND DEFENSE,
DEFENSE DSCA,
DSCA
& DISASTER RESPONSE
Disaster can strike anytime, anywhere. It takes many forms—a hurricane, an
HDUWKTXDNHDWRUQDGRDÀRRGD¿UHDKD]DUGRXVVSLOORUDQDFWRIWHUURULVP
THREAT, OPFOR, e
REGIONAL & CULTURAL
pl
In today’s complicated and uncertain world, the military must be ready to meet the
FKDOOHQJHVRIDQ\W\SHRIFRQÀLFWLQDOONLQGVRISODFHVDQGDJDLQVWDOONLQGVRIWKUHDWV
m
Sa
[Link]
(Sample Only) Find this and other SMARTbooks at [Link]
[Link] Purchase/Order
SMARTsavings on SMARTbooks! Save big when you order our titles
together in a SMARTset bundle. It’s the most popular & least expensive way
to buy, and a great way to build your professional library. If you need a quote
or have special requests, please contact us by one of the methods below!
[Link]
Order SECURE Online
Web: [Link]
Email: SMARTbooks@[Link]
Government/Unit/Bulk Sales
The Lightning Press is a service-disabled,
veteran-owned small business, DOD-approved
vendor and federally registered—to include the
SAM, WAWF, FBO, and FEDPAY.
We accept and process both Government
Purchase Cards (GCPC/GPC) and Purchase
Orders (PO/PR&Cs).
[Link]
TAA2
The Military Engagement,
Security Cooperation & Stability
SMARTBOOK
Train, Advise & Assist
Military engagement, security cooperation, and stability missions, tasks,
and actions encompass a wide range of actions where the military instrument
of national power is tasked to support OGAs and cooperate with IGOs (e.g.,
UN, NATO) and other countries to protect and enhance national security
interests, deter conflict, and set conditions for future contingency operations.
Use of joint capabilities in these and related activities such as security force
assistance and foreign internal defense helps shape the operational envi-
ronment and keep the day-to-day tensions between nations or groups below
the threshold of armed conflict while maintaining US global influence.
e
Stability operations are various military missions, tasks, and activities
conducted outside the US in coordination with other instruments of national
power to maintain or reestablish a safe and secure environment, provide
pl
essential governmental services, emergency infrastructure reconstruction,
and humanitarian relief.
Peace operations are crisis response and limited contingency operations
conducted by a combination of military forces and nonmilitary organizations
m
to contain conflict, redress the peace, and shape the environment to support
reconciliation and rebuilding and to facilitate the transition to legitimate governance.
A counterinsurgency campaign is a mix of offensive, defensive, and
stability operations conducted along multiple lines of operations. It requires
military forces to employ a mix of familiar combat tasks and skills more often
Sa
9 781935 886693
[Link]