Foreign Internal Defense September 2011

Total Page:16

File Type:pdf, Size:1020Kb

Load more

FM 3-05.2 (FM 3-05.137/FM 3-05.202) Foreign Internal Defense September 2011 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 1 August 2011. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-CDI-JA, 3004 Ardennes Street, Stop A, Fort Bragg, NC 28310-9610. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. FOREIGN DISCLOSURE RESTRICTION (FD 6): This publication has been reviewed by the product developers in coordination with the United States Army John F. Kennedy Special Warfare Center and School foreign disclosure authority. This product is releasable to students from foreign countries on a case-by-case basis only. Headquarters, Department of the Army This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *FM 3-05.2 (FM 3-05.137/3-05.202) Field Manual Headquarters No. 3-05.2 (FM 3-05.137/FM 3-05.202) Department of the Army Washington, DC, 1 September 2011 Foreign Internal Defense Contents Page PREFACE ..............................................................................................................v Chapter 1 INTRODUCTION ................................................................................................ 1-1 Overview ............................................................................................................. 1-2 Internal Defense and Development .................................................................... 1-3 Comprehensive Approach of Foreign Internal Defense ..................................... 1-4 Holistic Interaction .............................................................................................. 1-6 Rule of Law ......................................................................................................... 1-7 Relationship With Other Operations ................................................................... 1-7 Department of Defense Tools .......................................................................... 1-10 United States National Objectives and Policy .................................................. 1-18 Chapter 2 ORGANIZATION AND RESPONSIBILITIES .................................................... 2-1 Overview ............................................................................................................. 2-1 Support From the United States ......................................................................... 2-1 The Instruments of National Power .................................................................... 2-2 National-Level Organizations ............................................................................. 2-5 National-Level Intelligence Organizations .......................................................... 2-5 Combatant Command Organization ................................................................. 2-10 Subordinate Commands ................................................................................... 2-11 Joint Task Forces ............................................................................................. 2-11 United States Diplomatic Mission and Country Team ...................................... 2-12 Distribution Restriction: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 1 August 2011. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DTD-JA, 2175 Reilly Road, Stop A, Fort Bragg, NC 28310-5000. Destruction Notice: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Foreign Disclosure Restriction (FD 6): This publication has been reviewed by the product developers in coordination with the United States Army John F. Kennedy Special Warfare Center and School foreign disclosure authority. This product is releasable to students from foreign countries on a case-by-case basis only. *This publication supersedes FM 3-05.137, Army Special Operations Forces Foreign Internal Defense, 30 June 2008, and FM 3-05.202, Special Forces Foreign Internal Defense Operations, 2 February 2007. i Contents Supported Host Nation......................................................................................2-15 Multinational Force ............................................................................................2-16 Role of Conventional Forces in Foreign Internal Defense ................................2-16 Role of Army Special Operations Forces in Foreign Internal Defense .............2-18 Army Support to Coalitions ...............................................................................2-22 Chapter 3 PLANNING .........................................................................................................3-1 Overview .............................................................................................................3-1 Planning Imperatives ..........................................................................................3-2 Department of State Guidance ...........................................................................3-3 Department of Defense Guidance ......................................................................3-4 Theater of Operations Planning Requirements ..................................................3-6 Security Cooperation Planning ...........................................................................3-7 Phases ................................................................................................................3-8 Planning Procedures and Considerations ..........................................................3-8 Regional, Transnational, and International Concerns ......................................3-13 Foreign Internal Defense Assessment..............................................................3-13 Environment and Training Assessment ............................................................3-14 Handoff Considerations ....................................................................................3-14 Training Plan .....................................................................................................3-17 Planning for Protection ......................................................................................3-18 Chapter 4 TRAINING ...........................................................................................................4-1 Overview .............................................................................................................4-1 Responsibilities for Training ................................................................................4-1 Training and Skills Needed for Success .............................................................4-2 Training Strategy .................................................................................................4-7 Training and Advisory Assistance to the Host Nation.........................................4-9 Chapter 5 EMPLOYMENT CONSIDERATIONS .................................................................5-1 Overview .............................................................................................................5-1 Employment Factors ...........................................................................................5-1 Military Information Support Operations Estimate of the Situation .....................5-7 Health Service Support .....................................................................................5-12 Site Survey Procedures ....................................................................................5-15 Advising the Host Nation Military ......................................................................5-20 Chapter 6 OPERATIONS ....................................................................................................6-1 Overview .............................................................................................................6-1 Indirect Support ...................................................................................................6-1 Direct Support .....................................................................................................6-6 Combat Operations ...........................................................................................6-14 Considerations for Combat Operations ............................................................6-15 Sustainment ......................................................................................................6-19 Insurgency and Counterinsurgency ..................................................................6-19 Terrorism ...........................................................................................................6-20 ii FM 3-05.2 1 September 2011 Contents Chapter 7 REDEPLOYMENT.............................................................................................. 7-1 Overview ............................................................................................................
Recommended publications
  • Stability and Arms Control in Europe: the Role of Military Forces Within a European Security System

    Stability and Arms Control in Europe: the Role of Military Forces Within a European Security System

    Stability and Arms Control in Europe: The Role of Military Forces within a European Security System A SIPRI Research Report Edited by Dr Gerhard Wachter, Lt-General (Rtd) and Dr Axel Krohn sipri Stockholm International Peace Research Institute July 1989 Copyright © 1989 SIPRI All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN 91-85114-50-2 Typeset and originated by Stockholm International Peace Research Institute Printed and bound in Sweden by Ingeniörskopia Solna Abstract Wachter, G. and Krohn, A., eds, Stability and Arms Control in Europe: The Role of Military Forces within a European Security System, A SIPRI Research Report (SIPRI: Solna, Sweden, 1989), 113 pp. This report presents the outcome of a project which was initiated at SIPRI in 1987. It was supported by a grant from the Volkswagen Stiftung of the Federal Republic of Germany. The introductory chapter by the editors presents a scenario for a possible future European security system. Six essays by active NATO and WTO military officers focus on the role of military forces in such a system. Various approaches to the tasks and size of military forces in this regime of strict non-provocative defence are presented with the intent of providing new ideas for the debate on restructuring of forces in Europe. There are 3 maps, 7 tables and 11 figures. Sponsored by the Volkswagen Stiftung. Contents Preface vi Acknowledgements viii The role of military forces within a European security system 1 G.
  • Military Guide to Terrorism in the Twenty-First Century

    Military Guide to Terrorism in the Twenty-First Century

    US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No.
  • The Evolution of U.S. Military Policy from the Constitution to the Present

    The Evolution of U.S. Military Policy from the Constitution to the Present

    C O R P O R A T I O N The Evolution of U.S. Military Policy from the Constitution to the Present Gian Gentile, Michael E. Linick, Michael Shurkin For more information on this publication, visit www.rand.org/t/RR1759 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9786-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2017 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface Since the earliest days of the Republic, American political and military leaders have debated and refined the national approach to providing an Army to win the nation’s independence and provide for its defense against all enemies, foreign and domestic.
  • Meeting the Anti-Access and Area-Denial Challenge

    Meeting the Anti-Access and Area-Denial Challenge

    Meeting the Anti-Access and Area-Denial Challenge Andrew Krepinevich, Barry Watts & Robert Work 1730 Rhode Island Avenue, NW, Suite 912 Washington, DC 20036 Meeting the Anti-Access and Area-Denial Challenge by Andrew Krepinevich Barry Watts Robert Work Center for Strategic and Budgetary Assessments 2003 ABOUT THE CENTER FOR STRATEGIC AND BUDGETARY ASSESSMENTS The Center for Strategic and Budgetary Assessments is an independent public policy research institute established to promote innovative thinking about defense planning and investment strategies for the 21st century. CSBA’s analytic-based research makes clear the inextricable link between defense strategies and budgets in fostering a more effective and efficient defense, and the need to transform the US military in light of the emerging military revolution. CSBA is directed by Dr. Andrew F. Krepinevich and funded by foundation, corporate and individual grants and contributions, and government contracts. 1730 Rhode Island Ave., NW Suite 912 Washington, DC 20036 (202) 331-7990 http://www.csbaonline.org CONTENTS EXECUTIVE SUMMARY .......................................................................................................... I I. NEW CHALLENGES TO POWER PROJECTION.................................................................. 1 II. PROSPECTIVE US AIR FORCE FAILURE POINTS........................................................... 11 III. THE DEPARTMENT OF THE NAVY AND ASSURED ACCESS: A CRITICAL RISK ASSESSMENT .29 IV. THE ARMY AND THE OBJECTIVE FORCE ..................................................................... 69 V. CONCLUSIONS AND RECOMMENDATIONS .................................................................... 93 EXECUTIVE SUMMARY During the Cold War, the United States defense posture called for substantial forces to be located overseas as part of a military strategy that emphasized deterrence and forward defense. Large combat formations were based in Europe and Asia. Additional forces—both land-based and maritime—were rotated periodically back to the rear area in the United States.
  • US Military Policy in the Middle East an Appraisal US Military Policy in the Middle East: an Appraisal

    US Military Policy in the Middle East an Appraisal US Military Policy in the Middle East: an Appraisal

    Research Paper Micah Zenko US and Americas Programme | October 2018 US Military Policy in the Middle East An Appraisal US Military Policy in the Middle East: An Appraisal Contents Summary 2 1 Introduction 3 2 Domestic Academic and Political Debates 7 3 Enduring and Current Presence 11 4 Security Cooperation: Training, Advice and Weapons Sales 21 5 Military Policy Objectives in the Middle East 27 Conclusion 31 About the Author 33 Acknowledgments 34 1 | Chatham House US Military Policy in the Middle East: An Appraisal Summary • Despite significant financial expenditure and thousands of lives lost, the American military presence in the Middle East retains bipartisan US support and incurs remarkably little oversight or public debate. Key US activities in the region consist of weapons sales to allied governments, military-to-military training programmes, counterterrorism operations and long-term troop deployments. • The US military presence in the Middle East is the culmination of a common bargain with Middle Eastern governments: security cooperation and military assistance in exchange for US access to military bases in the region. As a result, the US has substantial influence in the Middle East and can project military power quickly. However, working with partners whose interests sometimes conflict with one another has occasionally harmed long-term US objectives. • Since 1980, when President Carter remarked that outside intervention in the interests of the US in the Middle East would be ‘repelled by any means necessary’, the US has maintained a permanent and significant military presence in the region. • Two main schools of thought – ‘offshore balancing’ and ‘forward engagement’ – characterize the debate over the US presence in the Middle East.
  • Military Policy and the Causes of War: Eight Hypotheses

    Military Policy and the Causes of War: Eight Hypotheses

    1 MIT / 17.42 / Causes and Prevention of War Stephen Van Evera MILITARY POLICY AND THE CAUSES OF WAR: EIGHT HYPOTHESES I. FIRST MOVE ADVANTAGE (or "crisis instability"). "The greater the advantage that accrues to the side mobilizing or striking first, the greater the risk of war." See Schelling, Arms and Influence, chapter 6 (assigned). A. When does it pay / not pay / to move (mobilize or strike) first? 1. The problem is two-sided. If you have a first-move advantage, it pays your opponent to move first just to deny you the first-move advantage. 2. First-strike vs. first-mobilization advantages. Both are dangerous. B. Dangers raised by a first-move advantage (FMA): 1. Opportunistic war. ("If we strike first we win, so let's strike and capture the benefits of winning!") Not a profound point but many analysts don't get beyond it. 2. Preemptive war. "We fear they will strike, so we must strike." Examples: Israel's 1967 attack on Egypt; Russia's 1914 mobilization. And two extensions: -- "Accidental War." Example: 1890 Battle of Wounded Knee. -- "The Reciprocal Fear of Surprise Attack"--Schelling. ("We fear they fear we fear they will strike; so they may strike; so we must.") This is the common formulation of the problem but the least realistic. History shows that reciprocal fear almost never happens, perhaps because states seldom see themselves as threats to others so they seldom expect others to fear them. 3. The Dangers of Candor--the most serious of these 3 risks. States conceal their grievances and their capabilities because they think: "we must lull them into believing we are weak and benign; otherwise we can't gain surprise." This makes inadvertent war and wars of false optimism more likely.
  • STRIKING FIRST – Preemptive and Preventive Attack in U.S. National

    STRIKING FIRST – Preemptive and Preventive Attack in U.S. National

    THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. STRIKINGFIRST Preemptive and Preventive Attack in U.S. National Security Policy KARL P. MUELLER JASEN J. CASTILLO FORREST E. MORGAN NEGEEN PEGAHI BRIAN ROSEN Prepared for the United States Air Force Approved for public release; distribution unlimited The research described in this report was sponsored by the United States Air Force under Contract F49642-01-C-0003.
  • Ground Combat Overmatch Through Control of the Atmospheric

    Ground Combat Overmatch Through Control of the Atmospheric

    Romanian soldier fires rocket propelled grenade at range near Bemowo Piskie Training Area, Poland, January 24, 2018, as part of multinational battle group comprised of U.S., UK, Croatian, and Romanian soldiers supporting NATO’s Enhanced Forward Presence (U.S. Army/Andrew McNeil) he U.S. military is seeking dis- Ground Combat ruptive innovations to sustain T its technological advantage despite rapid advances by potential adversaries. The need is particularly Overmatch Through acute in ground combat, where most U.S. casualties are sustained and where game-changing technical innovations Control of the have been less common than in other military mission areas. The Search for Tactical Atmospheric Littoral Overmatch In addition to increasing technologi- By George M. Dougherty cal pressure, recent coalition combat experiences and defense studies suggest that the future battlefield will be more complex than in the past. Combat in built-up areas including megacities will become commonplace. As concluded Colonel George M. Dougherty, USAF, is the Individual Mobilization Augmentee to the Deputy Assistant Secretary of the Air Force for Science, Technology, and Engineering, Office of the Assistant Secretary of by a recent report, “Urban operations the Air Force for Acquisition and Logistics, in Washington, DC. in the 21st century are not just another 64 Features / Control of the Atmospheric Littoral JFQ 94, 3rd Quarter 2019 type of operation; they will become this tion of robotics and autonomy to forces can move, concentrate, and century’s signature form of warfare.”1 the land domain has focused largely disperse without hindrance, much The pivotal battles in Iraq and Syria on unmanned ground vehicles.
  • JP 2-02 National Intelligence Support to Joint Operations

    JP 2-02 National Intelligence Support to Joint Operations

    Joint Pub 2-02 National Intelligence Support to Joint Operations 28 September 1998 PREFACE 1. Scope from organizing the force and executing the mission in a manner the JFC deems most This joint publication describes national appropriate to ensure unity of effort in the intelligence organizations and their support accomplishment of the overall mission. to joint military operations. Also addressed is the special support and augmentation 3. Application available for joint operations by national joint elements such as the Military Intelligence a. Doctrine and guidance established in this Board, the National Military Joint Intelligence publication apply to the commanders and Center, and National Intelligence Support intelligence staff of combatant commands, Teams. This joint publication covers Service subordinate unified commands, joint task forces, intelligence organizations and centers, as combat support agencies, and subordinate well as nonmilitary agencies and components of these commands. These nongovernmental organizations. The principles and guidance also may apply when recommended target audience for this joint significant forces of one Service are attached to publication is commanders and intelligence forces of another Service or when significant staffs of combatant commands, subordinate forces of one Service support forces of another unified commands, joint task forces, combat Service. support agencies, and supporting Service components. b. The guidance in this publication is authoritative; as such, this doctrine (or JTTP) 2. Purpose will be followed except when, in the judgment of the commander, exceptional circumstances This publication has been prepared under dictate otherwise. If conflicts arise between the the direction of the Chairman of the Joint contents of this publication and the contents of Chiefs of Staff.
  • AFDD 2-3.1 Foreign Internal Defense

    AFDD 2-3.1 Foreign Internal Defense

    FOREIGN INTERNAL DEFENSE Air Force Doctrine Document 3-22 15 September 2007 Interim Change 2 (Last Review), 1 November 2011 This document complements related discussion found in Joint Publication 3-22, Foreign Internal Defense. BY ORDER OF THE AIR FORCE DOCTRINE DOCUMENT 3-22 SECRETARY OF THE AIR FORCE 15 SEPTEMBER 2007 INCORPORATING INTERIM CHANGE 2, 1 NOVEMBER 2011 SUMMARY OF CHANGES The Air Force Doctrine Working Group has reviewed this document and recommended that it remains valid and will again be reviewed no later than September 2012. AFDD numbering has also been changed to correspond with the joint doctrine publication numbering architecture. AFDD titles and content remain unchanged until updated in the next full revision. A margin bar indicates newly revised material. Old Number New Number Title AFDD 2-1 changed to AFDD 3-1 Air Warfare AFDD 2-1.1 changed to AFDD 3-01 Counterair Operations AFDD 2-1.2 changed to AFDD 3-70 Strategic Attack AFDD 2-1.3 changed to AFDD 3-03 Counterland Operations AFDD 2-1.4 changed to AFDD 3-04 Countersea Operations AFDD 2-1.6 changed to AFDD 3-50 Personnel Recovery Operations AFDD 2-1.7 changed to AFDD 3-52 Airspace Control AFDD 2-1.8 changed to AFDD 3-40 Counter-CBRN AFDD 2-1.9 changed to AFDD 3-60 Targeting AFDD 2-10 changed to AFDD 3-27 Homeland Operations AFDD 2-12 changed to AFDD 3-72 Nuclear Operations AFDD 2-2 changed to AFDD 3-14 Space Operations AFDD 2-2.1 changed to AFDD 3-14.1 Counterspace Operations AFDD 2-3 changed to AFDD 3-24 Irregular Warfare AFDD 2-3.1 changed to AFDD 3-22 Foreign
  • Fm 1-114 Air Cavalry Squadron and Troop Operations

    Fm 1-114 Air Cavalry Squadron and Troop Operations

    FM 1-114 AIR CAVALRY SQUADRON AND TROOP OPERATIONS DISTRIBUTION STATEMENT A: Approved for public release; distribution is unlimited HEADQUARTERS, DEPARTMENT OF THE ARMY PCN 32000075200 *FM 1-114 Field Manual Headquarters No. 1-114 Department of the Army Washington, DC, 1 February 2000 Air Cavalry Squadron and Troop Operations Contents Page PREFACE.......................................................................................................... vii Chapter 1 RECONNAISSANCE AND SECURITY HELICOPTER FUNDAMENTALS............... 1-0 Section I—Primary Roles and Missions.......................................................... 1-0 Essential Characteristics of Army Operations ..................................................... 1-0 Squadron Mission............................................................................................. 1-1 Troop Mission .................................................................................................. 1-2 Capabilities and Limitations ............................................................................... 1-2 Section II—Organizations .............................................................................. 1-3 Cavalry Organizations ....................................................................................... 1-3 Regimental Aviation Squadron ........................................................................... 1-3 Division Cavalry Squadron ................................................................................. 1-4 Air Cavalry Squadron .......................................................................................
  • Army Fires Capabilities for 2025 and Beyond

    Army Fires Capabilities for 2025 and Beyond

    Army Fires Capabilities for 2025 and Beyond John Gordon IV, Igor Mikolic-Torreira, D. Sean Barnett, Katharina Ley Best, Scott Boston, Dan Madden, Danielle C. Tarraf, Jordan Willcox C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/RR2124 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9967-9 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2019 RAND Corporation R® is a registered trademark. Cover: Army photo by Spc. Josselyn Fuentes. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report documents research and analysis conducted as part of a project entitled Army Fires for Army 2025, sponsored by the Field Artil- lery School at Fort Sill, Oklahoma (a part of the U.S.