JP 3-05, Special Operations

Total Page:16

File Type:pdf, Size:1020Kb

JP 3-05, Special Operations Joint Publication 3-05 Special Operations 16 July 2014 PREFACE 1. Scope This publication provides overarching doctrine for special operations and the employment and support for special operations forces across the range of military operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders and prescribes joint doctrine for operations, education, and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the joint force commander from organizing the force and executing the mission in a manner the joint force commander deems most appropriate to ensure unity of effort in the accomplishment of the overall objective. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the CJCS, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the United States, commanders should evaluate and follow the multinational command’s doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff: DAVID L. GOLDFEIN, Lt Gen, USAF Director, Joint Staff i Preface Intentionally Blank ii JP 3-05 SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 3-05 DATED 18 APRIL 2011 • Merges material from Joint Publication (JP) 3-05.1, Joint Special Operations Task Force, which is consequently rescinded following approval of JP 3-05, Special Operations. • Expands the discussion of special operations joint task force, to include the addition of a vignette and a definition. • Clarifies and defines preparation of the environment, operational preparation of the environment, and advance force operations. • Revises special operations activities. • Defines and discusses counter threat finance. • Modifies doctrine in regard to command and control of special operations forces. • Expands discussion of intelligence support to special operations. • Adds sections on civil affairs operations, countering weapons of mass destruction, military working dogs, and engineer support. • Adds numerous vignettes throughout publication. • Adds Appendix A, “Joint Special Operations Task Force Organization,” and Appendix B, “Joint Special Operations Task Force Headquarters Staff Checklist.” • Modifies, adds, and removes multiple terms and definitions from JP 1-02, DOD Dictionary of Military and Associated Terms. iii Summary of Changes Intentionally Blank iv JP 3-05 TABLE OF CONTENTS EXECUTIVE SUMMARY ............................................................................................... ix CHAPTER I OVERVIEW OF SPECIAL OPERATIONS Introduction ................................................................................................................. I-1 Special Operations ...................................................................................................... I-1 Designated Special Operations Forces........................................................................ I-3 Characteristics of Special Operations ......................................................................... I-5 Special Operations Across the Range of Military Operations .................................... I-8 CHAPTER II SPECIAL OPERATIONS CORE ACTIVITIES Introduction ................................................................................................................II-1 Special Operations Core Activities ............................................................................II-2 CHAPTER III COMMAND AND CONTROL OF SPECIAL OPERATIONS FORCES Introduction .............................................................................................................. III-1 Assignment of Special Operations Forces ............................................................... III-4 Special Operations Forces Joint Task Force ............................................................ III-4 Command and Control of Special Operations Forces in Theater ............................ III-5 Command and Control of Special Operations Forces across the Range of Military Operations ................................................................................................ III-12 Special Operations Coordination, Liaison, and Distributed Command Elements ............................................................................................... III-18 Interdependence of Conventional Forces and Special Operations Forces ............. III-23 Interorganizational Coordination ........................................................................... III-24 Multinational Forces and Operations ..................................................................... III-25 CHAPTER IV SUPPORT CONSIDERATIONS FOR SPECIAL OPERATIONS FORCES Introduction .............................................................................................................. IV-1 Intelligence Support ................................................................................................. IV-1 Operational Contract Support .................................................................................. IV-5 Logistic Support ....................................................................................................... IV-5 Host-Nation Support ................................................................................................ IV-7 Multinational Support .............................................................................................. IV-8 Intergovernmental and Nongovernmental Organizations Support .......................... IV-8 Service-Provided Capabilities .................................................................................. IV-9 Communications Systems Support .......................................................................... IV-9 Public Affairs Support ........................................................................................... IV-10 v Table of Contents Combat Camera Support ........................................................................................ IV-10 Legal Support ......................................................................................................... IV-11 Protection ............................................................................................................... IV-11 Fire Support ........................................................................................................... IV-11 Air Support............................................................................................................. IV-12 Maritime Support ................................................................................................... IV-12 Space Support ........................................................................................................ IV-13 Meteorological and Oceanographic Support ......................................................... IV-14 Cyberspace Operations Support ............................................................................. IV-14 Electronic Warfare ................................................................................................. IV-15 Civil Affairs Operations ......................................................................................... IV-15 Countering Weapons of Mass Destruction Support ............................................... IV-15 Military Working Dogs/Multipurpose Canines ..................................................... IV-16 Counter-Improvised Explosive Device Support Element ...................................... IV-16 Counter Threat Finance .......................................................................................... IV-16 Explosive Ordnance Disposal ................................................................................ IV-17 APPENDIX A Joint Special Operations Task Force Organizational Considerations ....... A-1 B Joint Special Operations Task Force Headquarters Staff Checklists .........B-1 C References ..................................................................................................C-1 D Administrative Instructions ....................................................................... D-1 GLOSSARY Part I Abbreviations and Acronyms .................................................................
Recommended publications
  • Limiting Terrorist Use of Advanced Conventional Weapons
    THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Homeland Security Program View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Stealing theSword Limiting Terrorist Use of Advanced Conventional Weapons James Bonomo Giacomo Bergamo David R.
    [Show full text]
  • Improvised Firearms in the Collection of the Forensic Laboratory
    FORENSIC PRACTICE Sławomir Kudełka Forensic Laboratory, Voivodeship Police Headquarters in Kraków [email protected] Tomasz Konopka Department of Forensic Medicine, Collegium Medicum, Jagiellonian University [email protected] Improvised firearms in the collection of the Forensic Laboratory, Voivodeship Police Headquarters in Kraków and the Department of Forensic Medicine, Collegium Medicum, Jagiellonian University — towards a systematics Summary Despite a very large variety of improvised firearms, repeatability of certain actions of the manufacturers can be observed, reflecting the purpose to which such weapons are produced (e.g. poaching), and the availability of appropriate technologies. The aim of this article is to make an attempt to systematize improvised firearms on the basis of the expert opinions elaborated at the Weapon Research and Ballistics Department of the Voivodeship Police Headquarters in Kraków (LK KWP) as well as studies carried out on weapons belonging to the collection of the Department of Forensic Medicine (ZMS) in Kraków. Research material included both primitive devices made by using simple methods and without concern for accuracy or aesthetics, as well as fine-tuned pieces with individual design solutions or copies of factory-made weapons. Improvised firearms can generally be divided into conversions and own designs. The conversion most frequently applies to alarm, gas or pneumatic weapons. It consists in removing factory safety mechanisms or, in the case of pneumatic weapons, in introducing technical modifications, which enable to blast off the cartridge and discharge the projectile by means of gas pressure arising during combustion of the propellant. Own designs may contain certain factory elements, most frequently the barrel, however, in most cases, they are manufactured from scratch.
    [Show full text]
  • JP 3-11, Operations in Chemical, Biological, Radiological, and Nuclear Environments, 04 October 2013
    Joint Publication 3-11 OF NT TH E E W M I S E' L L H D T E F T E N A R D R A M P Y E D • • U A N C I I T R E E D M S A T F AT E S O Operations in Chemical, Biological, Radiological, and Nuclear Environments 29 October 2018 PREFACE 1. Scope This publication provides doctrine for planning, conducting, and assessing military operations in chemical, biological, radiological, and nuclear environments. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations, and it provides considerations for military interaction with governmental and nongovernmental agencies, multinational forces, and other interorganizational partners. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs), and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing and executing their plans and orders. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of objectives. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subordinate unified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies.
    [Show full text]
  • The Abu Ghraib Convictions: a Miscarriage of Justice
    Buffalo Public Interest Law Journal Volume 32 Article 4 9-1-2013 The Abu Ghraib Convictions: A Miscarriage of Justice Robert Bejesky Follow this and additional works at: https://digitalcommons.law.buffalo.edu/bpilj Part of the Human Rights Law Commons, and the Military, War, and Peace Commons Recommended Citation Robert Bejesky, The Abu Ghraib Convictions: A Miscarriage of Justice, 32 Buff. Envtl. L.J. 103 (2013). Available at: https://digitalcommons.law.buffalo.edu/bpilj/vol32/iss1/4 This Article is brought to you for free and open access by the Law Journals at Digital Commons @ University at Buffalo School of Law. It has been accepted for inclusion in Buffalo Public Interest Law Journal by an authorized editor of Digital Commons @ University at Buffalo School of Law. For more information, please contact [email protected]. THE ABU GHRAIB CONVICTIONS: A MISCARRIAGE OF JUSTICE ROBERT BEJESKYt I. INTRODUCTION ..................... ..... 104 II. IRAQI DETENTIONS ...............................107 A. Dragnet Detentions During the Invasion and Occupation of Iraq.........................107 B. Legal Authority to Detain .............. ..... 111 C. The Abuse at Abu Ghraib .................... 116 D. Chain of Command at Abu Ghraib ..... ........ 119 III. BASIS FOR CRIMINAL CULPABILITY ..... ..... 138 A. Chain of Command ....................... 138 B. Systemic Influences ....................... 140 C. Reduced Rights of Military Personnel and Obedience to Authority ................ ..... 143 D. Interrogator Directives ................ ....
    [Show full text]
  • Easier Said Than Done: Legal Reviews of Cyber Weapons
    Easier Said Than Done: Legal Reviews of Cyber Weapons Gary D. Brown* & Andrew O. Metcalf** INTRODUCTION On June 1, 2012, author and New York Times reporter David Sanger created a sensation within the cyber-law community. Just over a year previously, Vanity Fair, among other media outlets, reported that a malware package of unprec- edented complexity had effectively targeted the Iranian nuclear research pro- gram.1 The malware, which came to be known as Stuxnet, was also discovered on many computer systems outside Iran, but it did not appear to do any damage to these other systems. Just as the discussions spurred by the discovery of Stuxnet had begun to die down, the New York Times published an interview with Mr. Sanger to discuss his newest book, in which he alleged that the Stuxnet malware had been part of a U.S. planned and led covert cyber operation. The assertion that a nation state had used a “cyber attack” in support of its national objectives reinvigorated the attention of cyber-law commentators, both in and out of government. What makes Stuxnet interesting as a point of discussion is that the basic functioning of the software is easy to understand and easy to categorize. A piece of software was deliberately inserted into the target systems, and physical damage was the result. However, resulting physical damage is not characteristic of most cyber operations, and the legal analysis of Stuxnet is of limited utility when examining a broad range of cyber activities.2 A distinct lack of physical effects is much more characteristic of cyber operations, and the absence of physical effects has continued to complicate the legal analysis of cyber in the context of military operations.
    [Show full text]
  • Operation Greif and the Trial of the “Most Dangerous Man in Europe.”
    Operation Greif and the Trial of the “Most Dangerous Man in Europe.” A disheveled George S. Patton reported to Dwight Eisenhower with unsettling news from the front. “Ike, I’ve never seen such a goddamn foul-up! The Krauts are infiltrating behind our lines, raising hell, cutting wires and turning around road signs!”1 Such was the characteristic response in the aftermath of Operation Greif, orchestrated by Germany’s top commando, Otto Skorzeny. Through his actions during the Ardennes Offensive of 1944, and his acquittal while on trial, Skorzeny effectively utilized disinformation and covert operations to both earn his credibility and infamous reputation. Born in Vienna in 1908, Skorzeny led a mundane life during the years of the First World War. Despite his inability to concentrate on his studies, he managed to graduate in 1931 from the Technischen Hochschule in Wien with an engineering degree.2 His participation in the Schlagende Verbindungen (dueling societies) during his academic career gave Skorzeny the reputation of being a fierce fighter and resulted in his characteristic scars that covered both sides of his face. With the unification of Austria into Germany in 1938, Skorzeny had his first contact with the Nazi party. While visiting Vienna, he came upon Austrian President Miklas in the midst of an attempt on his life by Nazi roughnecks. Skorzeny, always a man of action, blocked the way of the would-be assassins and ended the confrontation. Word spread across the Germany of the bold Austrian who had saved the President’s life on a whim. 1 Glenn B Infield, Skorzeny (New York: St.
    [Show full text]
  • Rebuilding Iraqi Television: a Personal Account
    Rebuilding Iraqi Television: A Personal Account By Gordon Robison Senior Fellow USC Annenberg School of Communication October, 2004 A Project of the USC Center on Public Diplomacy Middle East Media Project USC Center on Public Diplomacy 3502 Watt Way, Suite 103 Los Angeles, CA 90089-0281 www.uscpublicdiplomacy.org USC Center on Public Diplomacy – Middle East Media Project Rebuilding Iraqi Television: A Personal Account By Gordon Robison Senior Fellow, USC Annenberg School of Communication October 27, 2003 was the first day of Ramadan. It was also my first day at a new job as a contractor with the Coalition Provisional Authority, the American-led administration in Occupied Iraq. I had been hired to oversee the news department at Iraqi television. I had been at the station barely an hour when news of a major attack broke: at 8:30am a car bomb had leveled the Red Cross headquarters. The blast was enormous, and was heard across half the city. When the pictures began to come in soon afterwards they were horrific. The death toll began to mount. Then came word of more explosions: car bombs destroying three Iraqi police stations. A fourth police station was targeted but the bomber was intercepted in route. At times like this the atmosphere in the newsroom at CNN, the BBC or even a local television station is focused, if somewhat chaotic. Most news operations have a plan for dealing with big, breaking stories. Things in the newsroom move quickly, and they can get very stressful, but things do happen. Also, this was hardly the first time an atrocity like this had taken place.
    [Show full text]
  • Improvised Weapons
    Updated Apr 2009 The purpose of this presentation is to make you better aware of the numerous improvised weapons and ingenious hiding places that have been created and are in use by today’s criminals. The majority of the material used in this presentation comes from various law enforcement officer safety bulletins throughout the world. This presentation attempts to combine information from those bulletins into one easy to view presentation. In the interest of keeping the focus to the threat on hand, many of the circumstances surrounding the identification of these items has been removed. Knowledge is safety. Unless you stay informed, danger will find you… Improvised Weapon Any item that has been designed, modified, or disguised to function as a weapon. California’s Dangerous Weapon Law (12020 P.C.) 12020(a) PC Any person in this state who does any of the following is punishable by imprisonment in a county jail not exceeding one year or in the state prison: (1) Manufactures or causes to be manufactured, imports into the state, keeps for sale, or offers or exposes for sale, or who gives, lends, or possesses any cane gun or wallet gun, any undetectable firearm, any firearm which is not immediately recognizable as a firearm, any camouflaging firearm container, any ammunition which contains or consists of any flechette dart, any bullet containing or carrying an explosive agent, any ballistic knife, any multiburst trigger activator, any nunchaku, any short-barreled shotgun, any short-barreled rifle, any metal knuckles, any belt buckle knife, any leaded cane, any zip gun, any shuriken, any unconventional pistol, any lipstick case knife, any cane sword, any shobi-zue, any air gauge knife, any writing pen knife, any metal military practice handgrenade or metal replica hand grenade, or any instrument or weapon of the kind commonly known as a blackjack, slungshot, billy, sandclub, sap, or sandbag.
    [Show full text]
  • In the Shadow of General Marshall-Old Soldiers in The
    In The Shadow of General Marshall: Old Soldiers in the Executive Branch Ryan Edward Guiberson Anaconda, Montana Bachelor of Science, United States Air Force Academy, 1992 Master of Arts-Political Science, University of Florida, 1994 A Dissertation presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Doctor of Philosophy Department of Politics University of Virginia August, 2013 2 Abstract: The usurpation of political authority by tyrannical military figures is a theme that pervades the history of politics. The United States has avoided such an occurrence and the prospect of a military coup d’etat rarely registers as a realistic concern in American politics. Despite the unlikelihood of this classic form of military usurpation, other more insidious forms lurk and must be guarded against to protect civilian control of the military. One potential manifestation has been referred to as a military colonization of the executive branch. This form implies that retired senior military officers increasingly pursue executive branch positions and unduly promote the interests of the active duty military, its leaders, and military solutions to national security issues. This work addresses military colonization claims by examining the number of retired senior military officers that have served in executive branch positions, trends in where they participate, and their political behavior in these positions. It also uses interviews with retired senior military officers to gain their perspectives on the incentives and disincentives of executive branch service. The study concludes that in the post-Cold War period, participation rates of retired senior military officers in key executive branch positions do not diverge significantly from broader post-World War II patterns.
    [Show full text]
  • Norway, That Could Affect Norwegian Security and Damage National Interests in the Coming Year
    Analyses of Crisis Scenarios 2019 DSB ANALYSES OF CRISIS SCENARIOS 2019 1 DISASTERS THAT MAY AFFECT NORWEGIAN SOCIETY Issued by: Norwegian Directorate for Civil Protection (DSB) 2019 ISBN: 978-82-7768-472-7 (PDF) Cover and design: Dinamo Printed by: ETN Grafisk, Skien 2 ANALYSES OF CRISIS SCENARIOS 2019 DSB SEVERE WEATHER Hurricane on the coast. Frøya municipality, Trøndelag. / SAMPHOTO WUTTUDAL TORE PHOTO DSB ANALYSES OF CRISIS SCENARIOS 2019 3 4 NASJONALTANALYSES OF RISIKOBILDE CRISIS SCENARIOS 2013 DSB 2019 DSB NATIONAL RISK AND THREAT ASSESSMENTS The DSB’s Analyses of Crisis Scenarios (ACS)1 is one of four threat and risk assessments published every year. The others are published by the Norwegian Police Security Service (PST), the Norwegian Intelligence Service (NIS) and the Norwegian National Security Authority (NSM). The PST’s primary responsibility is to prevent and investigate crimes against national security. The PST’s annual threat assessment discusses situations, usually in Norway, that could affect Norwegian security and damage national interests in the coming year. These include threats from state actors in the form of foreign intelligence services, their current intelligence targets and the services’ operational patterns in Norway. The assessments also deal with threats from non-state actors, especially threats of politically motivated violence by extremist groups or individuals. The assessments have a time horizon of one year and are published in the first quarter. The NIS’s primary task is to warn of external threats and support the development of Norwegian security, foreign and defence policy. The service publishes an annual assessment of the international situation and foreign threats of significance to Norway and Norwegian interests.
    [Show full text]
  • Dodsenior Leadership Compiled by June Lee, Editorial Associate
    DODSenior Leadership Compiled by June Lee, Editorial Associate KEY: ADUSD Assistant Deputy Undersecretary of Defense ASD Assistant Secretary of Defense ATSD Assistant to the Secretary of Defense DASD Deputy Assistant Secretary of Defense DATSD Deputy Assistant to the Secretary of Defense DUSD Deputy Undersecretary of Defense PADUSD Principal Assistant Deputy Undersecretary of Defense PDASD Principal Deputy Assistant Secretary of Defense PDATSD Principal Deputy Assistant to the Secretary of Defense PDUSD Principal Deputy Undersecretary of Defense USD Undersecretary of Defense Secretary of Defense Deputy Secretary of Defense Robert M. Gates Gordon England ASD, Legislative Affairs ASD, Networks & Information ASD, Public Affairs ATSD, Intelligence Robert Wilkie Integration & Chief Information Officer Vacant Oversight John G. Grimes William Dugan (acting) PDASD, Legislative Affairs DASD, PA (Media) Robert R. Hood PDASD, NII Bryan Whitman DASD, Senate Affairs Cheryl J. Roby DASD, PA (Internal Communications Robert Taylor DASD, Information Management, & Public Liaison) Allison Barber DASD, House Affairs Integration, & Technology Virginia Johnson David M. Wennergren DASD, C3 Policies, Programs, & Space Programs Ron Jost DASD, Resources Bonnie Hammersley (acting) DASD, C3ISR & IT Acquisition Tim Harp (acting) DASD, Information & Identity Assurance Robert Lentz Dir., Administration & Dir., Operational Dir., Program Analysis General Counsel Inspector General Management Test & Evaluation & Evaluation William J. Haynes II Claude M. Kicklighter Michael B. Donley Charles E. McQueary Bradley M. Berkson 50 AIR FORCE Magazine / March 2008 Acquisition, Technology, & Logistics Dir., Acquisition, Resources & Analysis DUSD, Installations & Environment Nancy L. Spruill Alex A. Beehler (acting) Dir., International Cooperation ADUSD, Installations Alfred D. Volkman John C. Williams Dir., Special Programs ADUSD, Environment, Safety, & Occupational Brig. Gen. Paul G.
    [Show full text]
  • Disjointed War: Military Operations in Kosovo, 1999
    Disjointed War Military Operations in Kosovo, 1999 Bruce R. Nardulli, Walter L. Perry, Bruce Pirnie John Gordon IV, John G. McGinn Prepared for the United States Army Approved for public release; distribution unlimited R Arroyo Center The research described in this report was sponsored by the United States Army under contract number DASW01-01-C-0003. Library of Congress Cataloging-in-Publication Data Disjointed war : military operations in Kosovo, 1999 / Bruce R. Nardulli ... [et al.]. p. cm. “MR-1406.” Includes bibliographical references. ISBN 0-8330-3096-5 1. Kosovo (Serbia)—History—Civil War, 1998—Campaigns. 2. North Atlantic Treaty Organization—Armed Forces—Yugoslavia. I. Nardulli, Bruce R. DR2087.5 .D57 2002 949.703—dc21 2002024817 Cover photos courtesy of U.S. Air Force Link (B2) at www.af.mil, and NATO Media Library (Round table Meeting) at www.nato.int. RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND® is a registered trademark. RAND’s publications do not necessarily reflect the opinions or policies of its research sponsors. Cover design by Stephen Bloodsworth © Copyright 2002 RAND All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from RAND. Published 2002 by RAND 1700 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 201 North Craig Street, Suite 102, Pittsburgh, PA 15213 RAND URL: http://www.rand.org/ To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] PREFACE Following the 1999 Kosovo conflict, the Army asked RAND Arroyo Center to prepare an authoritative and detailed account of military operations with a focus on ground operations, especially Task Force Hawk.
    [Show full text]