Foreign Internal Defense

Total Page:16

File Type:pdf, Size:1020Kb

Foreign Internal Defense Joint Publication 3-22 T OF THE N A E W E' L L I S D E F E R H N D M T M T Y R • A P A E C D I U • R N E I T M E A D F S O TAT E S Foreign Internal Defense 17 August 2018 PREFACE 1. Scope This publication provides joint doctrine to plan, conduct, assess, and support foreign internal defense. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations, and it provides considerations for military interaction with governmental and nongovernmental agencies, multinational forces, and other interorganizational partners. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs), and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing and executing their plans and orders. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of objectives. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subordinate unified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine should be followed unless exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the CJCS, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the US, commanders should evaluate and follow the multinational command’s doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff: DANIEL J. O’DONOHUE Lieutenant General, USMC Director, Joint Force Development i Preface Intentionally Blank ii JP 3-22 SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 3-22 DATED 12 JULY 2010 • Updates the text to align with the new Joint Publication (JP) 3-20, Security Cooperation. • Synchronizes the use of foreign security force with JP 3-20. • Clarifies the role of Air Force Special Operations Command combat aviation advisor in foreign internal defense (FID). • Enhances the discussion of commander’s communication synchronization, public affairs, defense support to public diplomacy, and information operations. • Enhances the text to include discussions about the importance of threat networks in FID. • Incorporates discussion about countering violent extremism association with FID, violent extremist organization, and the whole-of-government and international proactive actions. • Incorporates discussion concerning Chief, National Guard Bureau, roles in accordance with (IAW) Title 10, United States Code, Section 342. • Includes discussion of information as a joint function. • Clarifies planning and execution of FID in permissive, uncertain, and hostile environments. • Enhances discussion of humanitarian and civic assistance coordination for supporting projects, IAW Department of Defense Instruction 2205.02, Humanitarian and Civic Assistance Activities. • Adds text concerning the importance of multinational support and planning for multi-domain and transregional associations FID. iii Summary of Changes Intentionally Blank iv JP 3-22 TABLE OF CONTENTS EXECUTIVE SUMMARY ............................................................................................... ix CHAPTER I INTRODUCTION General ........................................................................................................................ I-1 Foreign Internal Defense ............................................................................................. I-2 Relationship of Foreign Internal Defense to Internal Defense and Development ...... I-3 Foreign Internal Defense and the Instruments of National Power .............................. I-7 Security Cooperation ................................................................................................ I-14 Foreign Internal Defense Within the Range of Military Operations ........................ I-17 Foreign Internal Defense Categories ........................................................................ I-18 CHAPTER II INTERNAL DEFENSE AND DEVELOPMENT General .......................................................................................................................II-1 Construct ....................................................................................................................II-1 Functions ....................................................................................................................II-2 Tenets of Effective Foreign Internal Defense Operations .........................................II-4 Organizational Guidance ...........................................................................................II-6 CHAPTER III ORGANIZATION AND RESPONSIBILITIES General ..................................................................................................................... III-1 National-Level Organizations .................................................................................. III-3 Combatant Commands ............................................................................................. III-5 Subordinate Unified Commands .............................................................................. III-7 Joint Task Forces ..................................................................................................... III-9 The United States Diplomatic Mission and Country Team ..................................... III-9 Multinational Foreign Internal Defense Force ....................................................... III-12 Nongovernmental Organization Coordination ....................................................... III-12 CHAPTER IV PLANNING General ..................................................................................................................... IV-1 Planning Imperatives ............................................................................................... IV-2 Department of Defense Guidance ............................................................................ IV-4 Theater Planning Requirements ............................................................................... IV-6 Planning Procedures and Considerations ................................................................. IV-7 Planning for Force Protection ................................................................................ IV-12 Foreign Internal Defense Assessment .................................................................... IV-15 United States Foreign Internal Defense Capabilities ............................................. IV-15 v Table of Contents CHAPTER V TRAINING Section A. Training Joint Forces ................................................................................... V-1 General ...................................................................................................................... V-1 Training, Knowledge, and Skills Needed for Success .............................................. V-1 Foreign Internal Defense Training Strategy ............................................................. V-3 Section B. Training Host Nation Forces ........................................................................ V-4 Training Plan ............................................................................................................. V-4 Training and Advising .............................................................................................. V-5 CHAPTER VI OPERATIONS Section A. Employment Considerations ....................................................................... VI-1 General ..................................................................................................................... VI-1 Employment Factors ................................................................................................ VI-1 Health Service Support ............................................................................................ VI-8 Section B. Indirect Support ........................................................................................... VI-9 General ..................................................................................................................... VI-9 Security Assistance ................................................................................................ VI-10 Joint and Multinational Exercises .......................................................................... VI-12 Exchange Programs ............................................................................................... VI-12 Section C. Direct Support (Not Involving United States Combat Operations) .......... VI-13 General ..................................................................................................................
Recommended publications
  • Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto
    Human Rights Brief Volume 17 | Issue 1 Article 3 2009 Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Sperotto, Federico. "Counter-Insurgency, Human Rights, and the Law of Armed Conflict." Human Rights Brief 17, no. 1 (2009): 19-23. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Sperotto: Counter-Insurgency, Human Rights, and the Law of Armed Conflict Counter-Insurgency, Human Rights, and the Law of Armed Conflict by Federico Sperotto* introduCtion ounter-insurgency is the dominant aspect in the United States-led Operation Enduring Freedom (OEF) in CAfghanistan, and, since the NATO-led International Security Assistance Force (ISAF) has assumed growing respon- sibility throughout insurgents’ sanctuaries, also a mission for Europeans. According to the U.S. military, insurgency represents an intermediate step in the spectrum of conflict, which ranges from stable peace to general war.1 The frame in which military opera- tions are conducted is known as irregular warfare, a violent struggle among state and non-state actors for legitimacy and influence over a population.2 This form of conflict is charac- terized by three principle activities: insurgency, counter-insur- gency, and unconventional warfare, referring to the avoidance of Association of the Courtesy of the Revolutionary Afghanistan.
    [Show full text]
  • Decision-Making Process in Combat Operations
    DECISION-MAKING PROCESS IN MILITARY COMBAT OPERATIONS 4120/002 10.2013 2000 10.2013 4120/002 International Committee of the Red Cross 19, avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org © ICRC, October 2013 DECISION-MAKING PROCESS IN MILITARY COMBAT OPERATIONS PREFACE Every state has an obligation to ensure respect for the law of armed conflict. The ICRC is mandated to support states in these efforts and does so through a range of activities, including promoting the integration of appropriate com- pliance measures into military doctrine, education, training and sanctions, with a view to ensuring that behaviours of those engaged in armed conflict comply with the law. The present note is designed to support the integration of the Law of Armed Conflict into military decision-making processes, primarily at the operational level. It is not based on any specific national doctrine. It is designed to support those responsible for developing national doctrine and operational planning procedures in their efforts to integrate the Law of Armed Conflict into military practice. The desired outcome is staff procedures which ensure the development of military plans and orders that accurately and effectively integrate compliance with the Law of Armed Conflict into operational practice, thereby reducing the effects of armed conflict on those who do not, or no longer, participate in the hostilities. The techniques of warfare change rapidly, particularly at times when combat operations are commonplace. The humanitarian impact of conflict is timeless. The Law of Armed Conflict is designed to limit the humanitarian consequences of war.
    [Show full text]
  • Thoughts on Grand Strategy and the United States in the Twenty-First Century
    Journal of Military and Strategic VOLUME 13, ISSUE 1, FALL 2010 Studies Thoughts on Grand Strategy and the United States in the Twenty-first Century Williamson Murray One might begin an examination of the issues involved in grand strategy with an effort to describe what we mean by the term. Over the centuries, some governments and leaders have attempted to chart a course for their nations that has involved something more than simply reacting to the course of events. In most cases they have confronted sudden and major changes in the international environment, often resulting from the outbreak of great conflicts, but at times involving economic, strategic, or political alterations that threaten the stability or even existence of their polities. Yet, grand strategy is a matter of great states and great states alone. No small states, and few medium size states, possess the possibility of crafting a grand strategy. For the most part their circumstances condemn them to suffer what Athens negotiators suggested to their Melian counterparts in 416 BC about the nature of international relations: "The standard of justice depends on the equality of power to compel and that in fact the strong do what they have the power to do and the weak accept what they have to accept."1 1 Thucydides, History of the Peloponnesian War, trans. by Rex Warner (London, 1954), p. 402. There are two exceptions to the rule. Both the Swiss and the Finns were able to exercise a certain independence that allowed them to maintain a grand strategic frame work: the former by balancing great powers off against each other; the latter by creating the distinct impression in the minds of the Soviets that they were willing to fight to the last man and woman in defense of their independence.
    [Show full text]
  • Photo Section to PDF.Indd
    Photographs Each item in the list below is a hyperlink to a corresponding photograph. 1. Armstrong Whitworth “Whitley” Mk IV heavy bomber 2. AVRO Lancaster heavy bomber 3. Halifax heavy bomber 4. Sterling heavy bomber 5. Dehavilland Mosquito light bomber 6. Early-model B-17 over Washington, DC 7. B-17 bombing, Palermo, Sicily 8. Maj Gen Henry H. Arnold 9. Maj Gen Carl A. Spaatz 10. Maj Gen Frederick L. Anderson 11. General Arnold 12. General Arnold and Air Chief Marshal Charles A. Portal 13. The slipstream spreads four-pound incendiaries over a marked target. 14. B-17G over Frankfurt, 1944 15. B-17G with H2X radar 16. Late-model P-47s 17. P-38s of the Fifteenth Air Force 18. Fifteenth Air Force P-51Ds. 19. Me-110 night fi ghter 20. “Big Week.” 21. Generals Spaatz and Doolittle 22. Abbey of Monte Cassino 23. B-17 unloads on Berlin 24. Lt Gen Spaatz and Lt Gen Nathan F. Twining 25. B-24 releases 500-pound bombs over Ploesti 26. Liberator heads for home 27. The end of the road. 28. Damaged Air Force B-17 29. Budapest’s smashed refi neries 30. 6 October 1944 raid on the Hamburg/Glinde area 31. Preparation for mission over northern Italy 32. Cologne cathedral 33. Low-level aerial photo of the cathedral 34. Medium-altitude photo of the Cologne 35. Lieutenant General Doolittle and Maj Gen Fred Anderson 36. A B-17 goes down over Berlin. 37. Operation Thunderclap 38. Me-262 jet-propelled aircraft 39. Bombing Berlin 40. Generals Spaatz and Doolittle The Armstrong Whitworth “Whitley” Mk IV heavy bomber has two Rolls-Royce “Merlin” engines.
    [Show full text]
  • Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II.
    [Show full text]
  • American Grand Strategy for an Emerging World Order Scott Lawless
    STRATEGIC STUDIES QUARTERLY - PERSPECTIVE American Grand Strategy for an Emerging World Order SCOTT LAWLESS Abstract Since the end of the Second World War, the United States has secured its core national interests primarily through the creation and maintenance of the liberal international order. Today, this order is being challenged in ways that will define the twenty- first century context. America’s most pressing foreign policy challenge is finding strategies to counter a poten- tially illiberal global order. Neo-authoritarian states are seeking to establish spheres of influence by violating territorial norms, undermining the liberal order via coercive economic measures, and weakening democratic regimes through unconventional political warfare. The current liberal order is ill- equipped to face these challenges because of two global trends: the erosion of its legitimacy and the shifting global balance of power. In a changing environment such as this, where the ends of American grand strategy re- main fixed while its relative means are eroding, the US must revise the ways in which it seeks to achieve its strategic objectives. The shifts in geopolitics today necessitate a revitalization of American grand strategy and the estab- lishment of a new security order—namely, a Concert of Democracies—to secure American interests, reestablish liberal legitimacy, and shape the emerging international order toward a stable future. ***** he liberal international order that emerged triumphant over fas- cism and communism during the twentieth century is a testament to the institutions, alliances, and norms US statesmen established Tto avoid the revival of great power conflict. Though these structures have granted the United States and its allies several decades of unparalleled security and prosperity, it is unclear as to what is invoked by the term lib- eral international order.
    [Show full text]
  • Army Field Support Brigade Tactics, Techniques, and Procedures
    *FMI 4-93.41(FM 63-11) ARMY FIELD SUPPORT BRIGADE TACTICS, TECHNIQUES, AND PROCEDURES February 2007 Expires: February 2009 HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTON: Approved for public release; distribution is unlimited. *FMI 4-93.41 (FM 63-11) Field Manual Interim Headquarters No. 4-93.41 Department of the Army Washington, DC, 22 February 2007 Expires: 22 February 2009 Army Field Support Brigade Tactics, Techniques, and Procedures Contents Page PREFACE .............................................................................................................iii Chapter 1 The Army Field Support Brigade Organization and Operations Overview 1-1 Mission and Responsibilities .............................................................................. 1-1 Organization and Structure ................................................................................ 1-2 Command and Control ....................................................................................... 1-3 Commmand and Coordinating Staff................................................................... 1-4 Primary Functions and Capabilities Overview.................................................... 1-5 Chapter 2 Plans and Operations....................................................................................... 2-1 Early Entry Module ............................................................................................. 2-1 Main Command Post.......................................................................................... 2-2
    [Show full text]
  • Royal Navy Warrant Officer Ranks
    Royal Navy Warrant Officer Ranks anisodactylousStewart coils unconcernedly. Rodolfo impersonalizing Cletus subducts contemptibly unbelievably. and defining Lee is atypically.empurpled and assumes transcriptively as Some records database is the database of the full command secretariat, royal warrant officer Then promoted for sailing, royal navy artificer. Navy Officer Ranks Warrant Officer CWO2 CWO3 CWO4 CWO5 These positions involve an application of technical and leadership skills versus primarily. When necessary for royal rank of ranks, conduct of whom were ranked as equivalents to prevent concealment by seniority those of. To warrant officers themselves in navy officer qualified senior commanders. The rank in front of warrants to gain experience and! The recorded and transcribed interviews help plan create a fuller understanding of so past. Royal navy ranks based establishment or royal marines. Marshals of the Royal Air and remain defend the active list for life, example so continue to use her rank. He replace the one area actually subvert the commands to the Marines. How brave I wonder the records covered in its guide? Four stars on each shoulder boards in a small arms and royals forming an! Courts martial records range from detailed records of proceedings to slaughter the briefest details. RNAS ratings had service numbers with an F prefix. RFA and MFA vessels had civilian crews, so some information on tracing these individuals can understand found off our aim guide outline the Mercantile Marine which the today World War. Each rank officers ranks ordered aloft on royal warrant officer ranks structure of! Please feel free to distinguish them to see that have masters pay.
    [Show full text]
  • Meserole Brookings CV 2021
    CHRISTOPHER O. MESEROLE 1775 Massachusetts Ave NW, Washington DC 20036 (202) 797-6180 | [email protected] POSITIONS Director of Research and Policy, Brookings AI & Emerging Tech Initiative (2020-) Deputy Director, Brookings AI & Emerging Tech Initiative (2019-2020) Fellow, Foreign Policy, Brookings Institution (2017-) Post-Doctoral Fellow in Foreign Policy, Brookings Institution (2016-2017) Pre-Doctoral Fellow in Foreign Policy, Brookings Institution (2015-2016) AFFILIATIONS Co-Facilitator, GIFCT CAPPI Working Group (2020-) Co-PI, Brookings High-Level Working Group on Disinformation (2019-2020) Member, Christchurch Call Advisory Network (2019-) Adjunct Professor, Georgetown University (2019-) Member, Research Advisory Council, RESOLVE Network (2019-) Member, Digital Freedom Forum, CNAS (2019-) EDUCATION A.B., highest honors in field, Harvard University, Cambridge, MA, 2002 M.Div., S.T.M, Yale University, NeW Haven, CT, 2009, 2010 Ph.D., University of Maryland, College Park, MD, 2017 RESEARCH Artificial intelligence, emerging technology, international security; digital INTERESTS authoritarianism; counterterrorism and countering violent extremism; nonparametric machine learning, interpretable machine learning, differential privacy and homomorphic encryption, decentralized ledger technology WRITING “Exporting Digital Authoritarianism,” Brookings Institution, September 2019. (With Alina Polyakova.) “HoW Big Tech Can Fight White Supremacist Terrorism,” Foreign Affairs, August 2019. (With Daniel Byman.) “Terrorist Definitions and Designation
    [Show full text]
  • Highlights of Recent RAND Research on Counterinsurgency
    Highlights of Recent RAND Research on Counterinsurgency For more information, contact Shirley Ruhe, Director of Congressional Relations, at 703-413-1100, x5632 or [email protected], or Kurt Card, National Security Legislative Analyst, at 703-413-1100 x5259 or [email protected] As the leading research authority on counterinsurgency, the RAND Corporation has developed a wide selection of materials for policy makers. With multiple insurgencies operating in several theaters this research was developed to provide a historical, geographical, and functional understanding of past and present insurgencies and counterinsurgency operations. Social Science for Counterterrorism Putting the Pieces Together Darcy Noricks et al., 2009 This report from an interdisciplinary project to survey and integrate the scholarly social- science literature relevant to counterterrorism answers questions related to why some individuals become terrorists, how terrorists generate public support, how terrorist organizations make decisions, and why individuals disengage. A Stability Police Force for the United States Justification and Options for Creating U.S. Capabilities Terrence K. Kelly et al., 2009 Establishing security is the sine qua non of stability operations, since it is a prerequisite for reconstruction and development. Security requires a mix of military and police forces to deal with a range of threats from insurgents to criminal organizations. This research examines the creation of a high-end police force, which the authors call a Stability Police Force. 1 Underkill Scalable Capabilities for Military Operations amid Populations David C. Gompert et al., 2009 The battle for Gaza revealed an extremist strategy: hiding in cities and provoking attack to cause civilian deaths that can be blamed on the attacking forces.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • A Leader's Guide to Conducting Research Staff Rides
    A Leader’s Guide to Conducting Research Staff Rides The Modern War Institute Liam Collins at West Point Lionel Beehner A Leader’s Guide to Conducting Research Staff Rides August 18, 2020 A Leader’s Guide to Conducting Research Staff Rides Table of Contents Preface .................................................................................................................................................................................. 1 Acknowledgments............................................................................................................................................................ 4 Introduction ....................................................................................................................................................................... 5 Chapter I — Why Study Contemporary Battlefields? ........................................................................................... 8 Chapter II — The Army Staff Ride and Learning Theory ................................................................................. 10 Tactical Exercises Without Troops, Battlefield Tours, Staff Rides, and Research Staff Rides ............. 10 Research Staff Ride ............................................................................................................................................ 12 Learning Theory ................................................................................................................................................. 13 Chapter III — Research Staff Ride Design
    [Show full text]