Indigenous Forces and Sanctuary Denial: Enduring Counterinsurgency Imperatives

Total Page:16

File Type:pdf, Size:1020Kb

Indigenous Forces and Sanctuary Denial: Enduring Counterinsurgency Imperatives SMALL WARS JOURNAL www.smallwarsjournal.com Indigenous Forces and Sanctuary Denial: Enduring Counterinsurgency Imperatives LTC ROBERT M. CASSIDY SWJ Magazine -- INTERIM New! & Improved? ☺ (BETA) This is an interim edition of an article that has been peer-reviewed for its content and quality, and accepted for publication in SWJ Magazine. The article, its author, and its audience deserve better editing and formatting than we have provided at the moment, i.e. none. It is being released in this format because the Small Wars Community of Interest needs this material, and this is the way we can get it out without further delay (which, in some cases, has already been substantial). The throughput of our publishing has not kept pace with the enthusiasm of our audience and the productivity of our contributing authors. We’re working on that, but the author’s ideas are ready now. So this article is provided “as is” for the moment. Revised versions of this article for edits, format, and presentation will be posted when they are available and as site improvements are made. SWJ Magazine and Small Wars Journal are published by Small Wars Journal LLC. COPYRIGHT © 2008 by Small Wars Journal LLC. Permission is granted to print single copies for personal, non-commercial use. This work is licensed under a Creative Commons Attribution – Non-Commercial –Share Alike 3.0 License per our Terms of Use. We are in this together. No FACTUAL STATEMENT should be relied upon without further investigation on your part sufficient to satisfy you in your independent judgment that it is true. Contact: [email protected] Visit www.smallwarsjournal.com Cover Price: Your call. Support SWJ here. Indigenous Forces and Sanctuary Denial: \ Enduring Counterinsurgency Imperatives LTC ROBERT M. CASSIDY U.S. Army officer and fellow with the Center for Advanced Defense Studies ABSTRACT: This article examines the twin imperatives to employ indigenous forces and to deny sanctuary in order to succeed in counterinsurgency. It examines American counterinsurgency doctrine from the Vietnam era and from the current era to glean enduring tenets for these two essential components of any counterinsurgency campaign. The article concludes with a distillation of some best practices for using indigenous forces to deny sanctuary and suggests some operational concepts for denying sanctuary in this long war. “Learning from experience is a faculty almost never practiced.” - The March of Folly1 The war against Al-Qaeda and other non-state armed groups is a perennial and global counterinsurgency. However, history shows that insurgents require sanctuary and external support to succeed. The converse is also most often true – counterinsurgents cannot prevail if they allow the existence of insurgent sanctuaries. U.S. and coalition partners are fighting a war against insurgents animated by ideas stemming from a fundamentalist interpretive Islamist ideology. Non-state groups affiliated with al Qaeda are indeed leveraging a paradigm shift in irregular war to supply trained fighters across borders to fight as insurgents in Afghanistan and Iraq. This article sets out to briefly examine past U.S. counterinsurgency doctrine and present U.S. counterinsurgency doctrine to glean the practices and principles for employing indigenous formations to help deny sanctuary. I focus on two American eras of great ferment in counterinsurgency doctrine – the Vietnam era and the current era of counterinsurgency. This quick glimpse at the doctrine from these two periods will, to be sure, reveal more congruence than incongruence, even though forty years have elapsed between that era and this one. More saliently, this article concludes by associating enduring doctrinal imperatives with historical best practices to illumine some more successful and aggressive counterinsurgency methods, ones which are germane to denying the enemy sanctuary in this perennial struggle. If American-led coalitions cannot deny or eliminate the sanctuaries of the global insurgent network and its supporters, we will not prevail in this conflict. Past and Present U.S. Counterinsurgency Doctrine on Indigenous Forces Inspired by the German Army’s World War II jagdkommando anti-partisan doctrine, the U.S. Army’s 1951 FM 31-20, Operations Against Guerrilla Forces, prescribed the organization, training, and functions for a prototypical indigenous counter-guerrilla unit of platoon size. Intended to operate independently for prolonged periods, specialized anti-guerrilla units were to be armed with light automatic weapons and radios for night operations such as raids and ambushes. This manual also recommended that anti-guerrilla units should consider masquerading as guerrillas to deceive irregular adversaries. FM 31-20 included indigenous formations in a separate category of forces and encouraged U.S. commanders to employ local civilians as intelligence agents, propagandists, administrators, guides, policemen, and special anti- guerrilla units. This manual further observed that indigenous forces were invaluable because, in addition to freeing U.S. forces for other duties, local forces’ familiarity with the population, terrain, and language “endowed them with a unique ability to uncover enemy guerrillas.”2 In 1961, the U.S. Army published a new chapter of counterinsurgency doctrine, entitled “Military Operations against Irregular Forces,” as Change 1 to its FM 100-1, Doctrinal Guidance. This addition to the then evolving doctrine essentially cascaded from the Office of the Deputy Chief of Staff for Operations (OCOPS) handbook on counterinsurgency entitled, “Counterinsurgency Operations: a Handbook for the Suppression of Communist Guerrillas and Terrorist Operations.” This chapter recommended the maximum use of indigenous forces and manpower as Soldiers, policemen, and militiamen. It likewise advocated employing and maintaining troops in the same general operational area as much as possible, over time, to reap benefits that come from the knowledge and familiarity of local political and military topography. The 1963 FM 31-22, U.S. Army Counterinsurgency Forces also prescribed several major roles for indigenous paramilitary forces. Among these were the protection of villages, the performance of security functions at fixed and static sites, the enforcement of curfews, and the prosecution of food denial measures. Moreover, the doctrine considered that any employment of local forces would yield political, military, and intelligence advantages. The 1963 U.S. Army FM 31-16, Counterguerrilla Operations, also assigned native police and paramilitary forces the functions of population control and pacification. This manual deemed these functions as the best use of the local knowledge and linguistic skills that inhered in indigenous troop contingents.3 During the course of the Vietnam War, the United States Army experimented with a variety of techniques and approaches for improving the pacification effort by prudently employing indigenous forces. During the late 1960s, several U.S. Army units provided operational training and assistance to their counterpart organizations in the Army of the Republic of Vietnam (ARVN), and to other paramilitary forces. For example, during 1968, the 4th Infantry Division used 27 civic action teams, which lived in hamlets and helped train Popular Force (PF) units and helped generate skills and support toward the goal of self-help and security. During 1967, the 173rd Airborne Brigade created Security Training Assistance Group teams that trained local troops and conducted combined operations with People’s Self-Defense Force Units.4 The U.S. Army’s and Marine Corps’ 2006 doctrine (FM 3-24) for counterinsurgency also emphasizes the requirement for training and employing indigenous security forces. This manual stresses that “helping others to help themselves is critical to winning the long war” and prescribes the development of indigenous security forces that “can take over primary responsibility for combating the insurgency.” Although it may seem quicker for American forces to counter insurgents themselves, the doctrine in FM 3-24 avers that it is better to strengthen and to assist local forces. This most current counterinsurgency doctrine underlines the need for assistance from the military, along with other government agencies and coalition partners, to organize the host nation security forces required to establish and maintain security and stability within their borders. This assistance may include developing, training, equipping, and employing indigenous security forces and it entails the combined employment of coalition and local security forces to help prosecute the counterinsurgency. This latest U.S. counterinsurgency doctrine underscores the importance of training the host nation to conduct counterinsurgency, declaring that training indigenous forces for counterinsurgency is a required competency for reserve and regular formations, from all the services. Training indigenous forces therefore is a critical path to success in counterinsurgency.5 There are three chapters in FM 3-24 that emphasize the importance of local forces in the context of countering insurgents. The very first chapter observes that “nothing is more demoralizing to insurgents than realizing that people inside their movement or supporters are deserting or providing information to government forces.” One highlighted successful practice is to embed advisors and Special Forces. Further still, the manual identifies the development of host-nation security forces
Recommended publications
  • Unlocking NATO's Amphibious Potential
    November 2020 Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE J.D. WILLIAMS, GENE GERMANOVICH, STEPHEN WEBBER, GABRIELLE TARINI Unlocking NATO’s Amphibious Potential Lessons from the Past, Insights for the Future orth Atlantic Treaty Organization (NATO) members maintain amphibious capabilities that provide versatile and responsive forces for crisis response and national defense. These forces are routinely employed in maritime Nsecurity, noncombatant evacuation operations (NEO), counterterrorism, stability operations, and other missions. In addition to U.S. Marine Corps (USMC) and U.S. Navy forces, the Alliance’s amphibious forces include large ships and associated landing forces from five nations: France, Italy, the Netherlands, Spain, and the United Kingdom (UK). Each of these European allies—soon to be joined by Turkey—can conduct brigade-level operations, and smaller elements typically are held at high readiness for immediate response.1 These forces have been busy. Recent exercises and operations have spanned the littorals of West and North Africa, the Levant, the Gulf of Aden and Arabian Sea, the Caribbean, and the Pacific. Given NATO’s ongoing concerns over Russia’s military posture and malign behavior, allies with amphibious capabilities have also been exploring how these forces could contribute to deterrence or, if needed, be employed as part of a C O R P O R A T I O N combined and joint force in a conflict against a highly some respects, NATO’s ongoing efforts harken back to the capable nation-state. Since 2018, NATO’s headquarters Cold War, when NATO’s amphibious forces routinely exer- and various commands have undertaken initiatives and cised in the Mediterranean and North Atlantic as part of a convened working groups to advance the political intent broader strategy to deter Soviet aggression.
    [Show full text]
  • FEBRUARY/MARCH 2017. Issue 01
    FEBRUARY/MARCH 2017. Issue 01. READY FOR WHEREVER YOUR MISSION TAKES YOU ELAMS TOC: The ELAMS TOC Primary mission is to provide effective, reliable space for execution of battlefield C4I. MECC® Shower/Latrine: The AAR MECC® is a fully customizable ISO that allows you to mobilize your mission. SPACEMAX® The SPACEMAX® shelter provides lightweight, durable solutions for rapidly deployable space that reduces costs and risk. 2 armadainternational.com - february/march 2017 MADE IN armadainternational.com - february/march 2017 3 www.AARMobilitySystems.com THE USA FEBRUARY/MARCH 2017 www.armadainternational.com 08 AIR POWER COST VERSUS CREDIBILITY Andrew Drwiega examines maritime patrol aircraft procurement, and the options available for air forces and navies on a budget. 14 20 26 LAND Warfare TURING STIRLING CLASS WAR CATCH-22 VEHICLES FOR CHANGE Stephen W. Miller examines how the designs of Thomas Withington examines the Link-22 tactical Andrew White uncovers some of the latest light armoured vehicles are changing around data link, its workings and what it heralds for advances in vehicle technology to help the world. tomorrow’s naval operations. commandos reach their objectives. 32 38 FUTURE TECHNOLOGIES SEA POWER 44 THE MAN WHO FELL TO EARTH WHAT LIES BENEATH LAND Warfare Parachute technology is over a century old and is Warship definitions are becoming increasingly PREVENTION IS BETTER THAN CURE being continually refined, thanks to advances in blurred due to technological advances. Are we Claire Apthorp explores some of the innovative design and manufacturing, Peter Donaldson moving towards the multipurpose combatant, asks methods being adopted for military vehicle finds out. Dr.
    [Show full text]
  • Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
    Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • JP 3-13.4, Military Deception
    Joint Publication 3-13.4 Military Deception 26 January 2012 EXECUTIVE SUMMARY COMMANDER’S OVERVIEW • Provides an Overview of Military Deception (MILDEC) and the Goals, Objectives, Functions, and Principles • Describes the Relationship between MILDEC and Information Operations • Explains MILDEC Planning Methodology and Planning Steps • Discusses Execution of MILDEC Operations Military Deception and Its Goals, Objectives, Functions, and Principles Military deception Specific guidance from the joint force commander (JFC) or (MILDEC) is actions higher authority during planning will determine the military executed to deliberately deception (MILDEC) role in a joint operation. MILDEC mislead adversary is intended to deter hostile actions, increase the success military, paramilitary, or of friendly defensive actions, or to improve the success violent extremist of any potential friendly offensive action. Use of organization decision MILDEC during any phase of an operation should help to makers, thereby causing mislead adversaries as to the strength, readiness, locations, the adversary to take and intended missions of friendly forces. In combat specific actions (or situations, the focus is on driving the adversary to inactions) that will culmination and achieving the objectives defined by the contribute to the JFC. In noncombat situations, the JFC seeks to dominate accomplishment of the the situation with decisive operations designed to establish friendly mission. conditions for an early, favorable conclusion. MILDEC and Information Care should be taken to protect the quality of information Quality available for friendly decisions and public dissemination. This will help ensure the JFC has accurate information by not allowing staffs to unknowingly perceive the joint task force’s MILDEC efforts as accurate information.
    [Show full text]
  • Fm 6-27 Mctp 11-10C the Commander's Handbook on the Law of Land Warfare
    FM 6-27 MCTP 11-10C THE COMMANDER'S HANDBOOK ON THE LAW OF LAND WARFARE AUGUST 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 27-10/MCTP 11-10C, dated 18 July 1956. HEADQUARTERS, DEPARTMENT OF THE ARMY HEADQUARTERS, UNITED STATES MARINE CORPS Foreword The lessons of protracted conflict confirm that adherence to the law of armed conflict (LOAC) by the land forces, both in intern ational and non-international armed conflict, must serve as the standard that we train to and apply across the entire range of military operations. Adhering to LOAC enhances the legitimacy of our operations and supports the moral framework of our armed forces. We have learned th at we deviate from these norms to our detriment and risk undercutting both domesti c and international support for our operations. LOAC has been and remains a vital guide for all military operations conducted by the U.S. Governm ent. This fi eld manual provides a general description of the law of land warfare for Soldiers and Marines, delineated as statements of doctrine and practice, to gui de the land forces in conducting di sci plined military operations in accordance with the rule of law. The Department of Defense Law of War Manual (June 20 15, updated December 2016) is the authoritative statement on the law of war for the Department of Defense. In the event of a conflict or discrepancy regarding the legal standards addressed in this publication and th e DOD Law of War Manual, the latter takes precedence.
    [Show full text]
  • The Portuguese Colonial War: Why the Military Overthrew Its Government
    The Portuguese Colonial War: Why the Military Overthrew its Government Samuel Gaspar Rodrigues Senior Honors History Thesis Professor Temma Kaplan April 20, 2012 Rodrigues 2 Table of Contents Introduction ..........................................................................................................................3 Before the War .....................................................................................................................9 The War .............................................................................................................................19 The April Captains .............................................................................................................33 Remembering the Past .......................................................................................................44 The Legacy of Colonial Portugal .......................................................................................53 Bibliography ......................................................................................................................60 Rodrigues 3 Introduction When the Portuguese people elected António Oliveira de Salazar to the office of Prime Minister in 1932, they believed they were electing the right man for the job. He appealed to the masses. He was a far-right conservative Christian, but he was less radical than the Portuguese Fascist Party of the time. His campaign speeches appeased the syndicalists as well as the wealthy landowners in Portugal. However, he never was
    [Show full text]
  • Constraints on the Waging of War, an Introduction to International
    ISBN 2-88145-115-2 © International Committee of the Red Cross, Frits Kalshoven and Liesbeth Zegveld, Geneva, March 2001 3rd edition Frits Kalshoven and Liesbeth Zegveld CONSTRAINTS ON THE WAGING OF WAR An Introduction to International Humanitarian Law 19, Avenue de la Paix, CH-1202 Geneva T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] Web: www.icrc.org Design: Strategic Communications SA Original: English March 2001 Produced with environment-friendly materials I must retrace my steps, and must deprive those who wage war of nearly all the privileges which I seemed to grant, yet did not grant to them. For when I first set out to explain this part of the law of nations I bore witness that many things are said to be ‘lawful’ or ‘permissible’ for the reason that they are done with impunity, in part also because coactive tribunals lend to them their authority; things which nevertheless, either deviate from the rule of right (whether this has any basis in law strictly so called, or in the admonitions of other virtues), or at any rate may be omitted on higher grounds and with greater praise among good men. Grotius: De jure belli ac pacis Book III, Chapter X, Section I.1. (English translation: Francis G. Kelsey, Oxford, 1925). TABLE OF CONTENTS PREFACE ........................................................... 7 FOREWORD ........................................................... 9 CHAPTER I INTRODUCTION ........................................................ 11 I 1 Object and purpose ............................................... 12 I 2 Custom and treaty ................................................. 15 I 3 Implementation and enforcement ................................. 16 I 4 Structure .......................................................... 17 CHAPTER II THE MAIN CURRENTS: THE HAGUE, GENEVA, NEW YORK .....
    [Show full text]
  • Saved by the Civil War: African 'Loyalists' in the Portuguese Armed Forces and Angola's Transition to Independence
    Saved by the civil war: African ‘loyalists’ in the Portuguese armed forces and Angola’s transition to independence Pedro Aires Oliveira Instituto de História Contemporânea, Faculdade de Ciências Sociais e Humanas, Universidade Nova de Lisboa, 1069-061 Lisboa [email protected] Abstract: The article examines the trajectories of ‘loyal’ African troops in Angola before and after the demise of Portugal’s authoritarian regime in 1974. It starts by placing the ‘Africanization’ drive of the Portuguese counterinsurgency campaign in a historical perspective; it then explores the rocky transition from colonial rule to independence in the territory between April 1974 and November 1975, describing the course of action taken by the Portuguese authorities vis-à-vis their former collaborators in the security forces. A concluding section draws a comparison between the fate of Portugal’s loyalists in Angola and the one experienced by similar groups in other ex-Portuguese colonies. The choice of Angola has the advantage of allowing us to look into a complex scenario in which the competition amongst rival nationalist groups, and a number of external factors, helped to produce a more ambiguous outcome for some of the empire’s local collaborators than what might have been otherwise expected. Keywords: Angola; colonial troops; Loyalists; counter-insurgency; Decolonization The dissolution of Portugal’s overseas empire in 1975 happened after a protracted counterinsurgency war which took place in three of its African territories (Angola, Guinea-Bissau and Mozambique), a 13 year conflict (1961- 74) that put an enormous strain on the limited demographic and economic resources of what was then Western Europe’s poorest and most undeveloped 1 state.
    [Show full text]
  • Protecting the Global Information Space in Times of Armed Conflict
    WORKING PAPERS Protecting the global information space in times of armed conflict ROBIN GEISS AND HENNING LAHMANN* FEBRUARY 2021 *The authors wish to thank Dr Kubo Mačák for his helpful comments on an earlier draft of the paper. TABLE OF CONTENTS Introduction ................................................................................................................................................ 1 Mapping the Threat Landscape: Risks to the Information Space in Contemporary Armed Conflict ......................................................................................................................................................... 3 Scenario A – Social Media-Enabled Foreign Electoral Interference ....................................................... 3 Scenario B – Large-scale Distortion of the Media Ecosystem ................................................................... 4 Scenario C – Manipulation of Civilian Behaviour to Gain Military Advantage ................................ 4 Scenario D – Compromising and Extorting of Civilian Individuals Through Information Warfare .....................................................................................................................................................................5 Scenario E – Disinformation as Incitement to Violence ........................................................................... 5 Variants of Distorting the Information Ecosystem in War and Peace............................................ 5 Protecting Information Spaces under Existing
    [Show full text]
  • Sanctuary Lost: the Air War for ―Portuguese‖ Guinea, 1963-1974
    Sanctuary Lost: The Air War for ―Portuguese‖ Guinea, 1963-1974 Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Matthew Martin Hurley, MA Graduate Program in History The Ohio State University 2009 Dissertation Committee: Professor John F. Guilmartin, Jr., Advisor Professor Alan Beyerchen Professor Ousman Kobo Copyright by Matthew Martin Hurley 2009 i Abstract From 1963 to 1974, Portugal and the African Party for the Independence of Guinea and Cape Verde (Partido Africano da Independência da Guiné e Cabo Verde, or PAIGC) waged an increasingly intense war for the independence of ―Portuguese‖ Guinea, then a colony but today the Republic of Guinea-Bissau. For most of this conflict Portugal enjoyed virtually unchallenged air supremacy and increasingly based its strategy on this advantage. The Portuguese Air Force (Força Aérea Portuguesa, abbreviated FAP) consequently played a central role in the war for Guinea, at times threatening the PAIGC with military defeat. Portugal‘s reliance on air power compelled the insurgents to search for an effective counter-measure, and by 1973 they succeeded with their acquisition and employment of the Strela-2 shoulder-fired surface-to-air missile, altering the course of the war and the future of Portugal itself in the process. To date, however, no detailed study of this seminal episode in air power history has been conducted. In an international climate plagued by insurgency, terrorism, and the proliferation of sophisticated weapons, the hard lessons learned by Portugal offer enduring insight to historians and current air power practitioners alike.
    [Show full text]
  • African Troops in the Portuguese Colonial Army, 1961-1974
    J. P. BORGES COELHO, PORTUGUESE STUDIES REVIEW 10 (1) (2002): 129-50 African Troops in the Portuguese Colonial Army, 1961-1974: Angola, Guinea-Bissau and Mozambique1 João Paulo Borges Coelho Eduardo Mondlane University, Maputo, Mozambique Abstract: The colonial powers systematically included Africans in the wars waged to preserve their order. Portugal was not an exception in this respect. Since 1961, with the beginning of the liberation wars in her colonies, Portugal incorporated Africans in her war effort in Angola, Guinea-Bissau and Mozambique through a process enveloped in an ideological discourse based on “multi-racialism” and on the preservation of the empire. African engagement varied from marginal roles as servants and informers to more important ones as highly operational combat units. By the end of the Portuguese colonial war, in 1974, African participation had become crucial, representing about half of all operational colonial troops. This paper explores in a comparative framework the three cases of Angola, Guinea- Bissau and Mozambique, seeking the rationale behind the process and the shapes it took. The abrupt end of the colonial war, triggered by a military coup in Portugal, paved the way for the independence of the colonies, but left a legacy difficult to manage by the newly independent countries. Shedding some light on the destiny of the former African collaborators during this period, the paper suggests that they played a role in the post- independence civil conflicts in Angola and Mozambique. © 2002 Portuguese Studies Review. All rights reserved. (...) if it isn’t to be a poor character with little utility, the European soldier will cost us too much.
    [Show full text]