Field Manual (FM) 3-24/ Marine Corps Warfighting Publication (MCWP) 3-33.5 Provides Doctrine for Army and Marine Units That Are Countering an Insurgency

Total Page:16

File Type:pdf, Size:1020Kb

Field Manual (FM) 3-24/ Marine Corps Warfighting Publication (MCWP) 3-33.5 Provides Doctrine for Army and Marine Units That Are Countering an Insurgency FM 3-24 MCWP 3-33.5 INSURGENCIES AND COUNTERING INSURGENCIES MAY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY FM 3-24/MCWP 3-33.5, C1 Change No. 1 Headquarters Department of the Army Washington, DC, 2 June 2014 Insurgencies and Countering Insurgencies 1. Change 1 to FM 3-24/MCWP 3-33.5, 13 May 2014, amends text as necessary. 2. A plus sign (+) marks new material. 3. FM 3-24/MCWP 3-33.5, 13 May 2014, is changed as follows: Remove Old Pages Insert New Pages pages 1-13 through 1-14 pages 1-13 through 1-14 pages 2-3 through 2-4 pages 2-3 through 2-4 pages 4-1 through 4-2 pages 4-1 through 4-2 pages 4-5 through 4-6 pages 4-5 through 4-6 pages 4-11 through 4-12 pages 4-11 through 4-12 pages 7-5 through 7-10 pages 7-5 through 7-10 4. File this transmittal sheet in front of the publication for reference purposes. DISTRUBUTION RESTRICTION: Approved for public release; distribution is unlimited. FM 3-24/MCWP 3-33.5, C1 2 June 2014 By Order of the Secretary of the Army: RAYMOND T. ODIERNO General, United States Army Chief of Staff Official: GERALD B. O’KEEFE Administrative Assistant to the Secretary of the Army 1414902 BY DIRECTION OF THE COMMANDANT OF THE MARINE CORPS: DISTRIBUTION: Active Army, Army National Guard, and U.S. Army Reserve: To be distributed in accordance with the initial distribution number 121724, requirements for FM 3-24. Marine Corps: PCN 143 000124 00 This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp *FM 3-24/MCWP 3-33.5 Field Manual Headquarters No.3-24 Department of the Army Washington, DC Marine Corps Warfighting Publication Headquarters No. 3-33.5 Marine Corps Combat Development Command Department of the Navy Headquarters United States Marine Corps Washington, DC 13 May 2014 Insurgencies and Countering Insurgencies Contents Page PREFACE............................................................................................................... v INTRODUCTION .................................................................................................. vii PART ONE STRATEGIC AND OPERATIONAL CONTEXT Chapter 1 UNDERSTANDING THE STRATEGIC CONTEXT............................................ 1-1 United States’ Strategy and Policy to Counter an Insurgency ........................... 1-4 Land Forces and the Range of Military Operations ............................................ 1-6 Legitimacy and Control ....................................................................................... 1-8 Understanding Unified Action ........................................................................... 1-10 Strategic Principles ........................................................................................... 1-19 Chapter 2 UNDERSTANDING AN OPERATIONAL ENVIRONMENT ............................... 2-1 Demographic and Urbanization Trends .............................................................. 2-1 The Operational Variables .................................................................................. 2-2 The Mission Variables and Civil Considerations .............................................. 2-10 Chapter 3 CULTURE........................................................................................................... 3-1 Understanding Culture ........................................................................................ 3-1 Assessing a Cultural Situation ............................................................................ 3-2 Organizing to Understand Culture ...................................................................... 3-4 Distribution Restriction: Approved for public release; distribution is unlimited. *This publication supersedes FM 3-24/MCWP 3-33.5, dated 15 December 2006. Marine Corps PCN: 143 000124 00 i Contents PART TWO INSURGENCIES Chapter 4 INSURGENCY PREREQUISITES AND FUNDAMENTALS .............................. 4-1 Intrastate War ...................................................................................................... 4-1 Insurgency Prerequisites .................................................................................... 4-3 Insurgency Fundamentals ................................................................................... 4-5 Other Analytical Frameworks ............................................................................ 4-22 Chapter 5 INSURGENCY THREAT CHARACTERISTICS ................................................. 5-1 Disposition and Activities .................................................................................... 5-1 Support Activities ................................................................................................ 5-3 Associated Threats ............................................................................................. 5-5 PART THREE COUNTERINSURGENCIES Chapter 6 MISSION COMMAND AND COMMAND AND CONTROL ................................ 6-1 Command in Counterinsurgency ........................................................................ 6-1 Headquarters Use In Counterinsurgency ........................................................... 6-4 Conventional Forces and Special Operations Forces Synchronization .............. 6-5 Chapter 7 PLANNING FOR COUNTERING INSURGENCIES ........................................... 7-1 Conceptual Planning ........................................................................................... 7-4 Transitions ......................................................................................................... 7-10 Operational Considerations .............................................................................. 7-12 Information Operations ..................................................................................... 7-18 Chapter 8 INTELLIGENCE .................................................................................................. 8-1 Intelligence Fundamentals .................................................................................. 8-2 All-Source Intelligence ........................................................................................ 8-3 Human Intelligence ............................................................................................. 8-4 Chapter 9 DIRECT APPROACHES TO COUNTER AN INSURGENCY ............................ 9-1 Shape-Clear-Hold-Build-Transition Framework .................................................. 9-1 Other Direct Enablers ....................................................................................... 9-11 Chapter 10 INDIRECT METHODS FOR COUNTERING INSURGENCIES........................ 10-1 Nation Assistance and Security Cooperation ................................................... 10-1 Generational Engagement ................................................................................ 10-2 Negotiation and Diplomacy ............................................................................... 10-4 Identify, Separate, Isolate, Influence, and Reintegrate ..................................... 10-6 Other Indirect Enablers ................................................................................... 10-10 Chapter 11 WORKING WITH HOST-NATION FORCES .................................................... 11-1 Assessing and Developing a Host-Nation Force .............................................. 11-2 Relationships ..................................................................................................... 11-6 Security Cooperation Planning ......................................................................... 11-8 Chapter 12 ASSESSMENTS ............................................................................................... 12-1 Assessment Frameworks .................................................................................. 12-1 Assessment Methods ........................................................................................ 12-2 Assessment Considerations ............................................................................. 12-2 Developing Measurement Criteria .................................................................... 12-3 ii FM 3-24/MCWP 3-33.5 13 May 2014 Contents Chapter 13 LEGAL CONSIDERATIONS ............................................................................ 13-1 Authority to Assist A Foreign Government ....................................................... 13-1 Rules of Engagement ....................................................................................... 13-2 Law of War ....................................................................................................... 13-2 Non-International Armed Conflict ..................................................................... 13-7 Detention and Interrogation .............................................................................. 13-8 Enforcing Discipline of U.S. Forces ................................................................ 13-10 Training and Equipping Foreign Forces ......................................................... 13-11 Commander’s Emergency Response Program .............................................. 13-12 Claims and Solatia .......................................................................................... 13-13 Establishing the Rule of Law .......................................................................... 13-13 SOURCE
Recommended publications
  • Maritime Terrorism
    1 Maritime terrorism naval bases, offshore oil and gas facilities, other By Emilio Bonagiunta, Maritime Security Consultant critical infrastructure, or the maritime trade itself.ii Operations of this kind are reportedly part of Al-Qaeda's maritime strategy.iii Past here are two main forms in which attacks against oil facilities and tankers in Saudi terrorist groups benefit from the Arabia and Yemen demonstrate that terrorist T vastness and lawlessness of the sea: by networks in the region have ambitions to conducting attacks against sea-based targets and severely disrupt energy supplies from the by using the sea to transport weapons, militants Arabian Peninsula. A successful series of large- and other support means from one place to the scale attacks against the oil industry would have i other. In both cases, the low level of control and tremendous impacts on international energy law enforcement provides a beneficial markets and the global economy. It is from this environment for preparation and conduction perspective that Al-Qaeda poses a serious threat terrorist operations in the maritime domain, against maritime trade.iv unthinkable of on the ground. Yet, the fact that these fears have not Along with this, offshore assets and critical materialized can be attributed to a variety of infrastructure on the coast are seen as high-value factors: greater vigilance and measures adopted targets for terrorist groups. Operations against by sea-users and maritime security providers, the USS Cole (2000) and the tanker Limburg lack of confidence by terrorist groups in the (2002), attributed to Al-Qaeda, are good success of major attacks against sea-based examples of maritime terrorism in the Arabian targets due to insufficient expertise and Peninsula, where small crafts laden with experienced militants for conducting such explosives have proven successful in causing operations.
    [Show full text]
  • Floating Armories: a Legal Grey Area in Arms Trade and the Law of the Sea
    FLOATING ARMORIES: A LEGAL GREY AREA IN ARMS TRADE AND THE LAW OF THE SEA BY ALEXIS WILPON* ABSTRACT In response to maritime piracy concerns, shippers often hire armed guards to protect their ships. However, due to national and international laws regarding arms trade, ships are often unable to dock in foreign ports with weapons and ammunition. As a response, floating armories operate as weapons and ammuni­ tion storage facilities in international waters. By operating solely in interna­ tional waters, floating armories avoid national and international laws regard­ ing arms trade. However, there is a significant lack of regulations governing floating armories, and this leads to serious safety concerns including lack of standardized weapon storage, lack of records documenting the transfer of weapons and ammunitions, and lack of regulation from flags of convenience. Further, there is no publically available registry of floating armories and so the number of floating armories operating alongside the quantity of arms and ammunition on board is unknown. This Note suggests several solutions that will increase the transparency and safety of floating armories. Such solutions include requirements that floating armory operators register their vessels only to states in which a legitimate relationship exists, minimum standards that operators must follow, and the creation of a publically available registry. Finally, it concludes by providing alternative mechanisms by which states may exercise jurisdiction over foreign vessels operating in the High Seas. I. INTRODUCTION .................................... 874 II. THE PROBLEM OF MARITIME PIRACY ..................... 877 III. HOW FLOATING ARMORIES OPERATE..................... 878 IV. FLOATING ARMORIES AND THE LEGAL GRAY AREA............ 880 A. The Lack of Laws and Regulations .................
    [Show full text]
  • Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto
    Human Rights Brief Volume 17 | Issue 1 Article 3 2009 Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Sperotto, Federico. "Counter-Insurgency, Human Rights, and the Law of Armed Conflict." Human Rights Brief 17, no. 1 (2009): 19-23. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Sperotto: Counter-Insurgency, Human Rights, and the Law of Armed Conflict Counter-Insurgency, Human Rights, and the Law of Armed Conflict by Federico Sperotto* introduCtion ounter-insurgency is the dominant aspect in the United States-led Operation Enduring Freedom (OEF) in CAfghanistan, and, since the NATO-led International Security Assistance Force (ISAF) has assumed growing respon- sibility throughout insurgents’ sanctuaries, also a mission for Europeans. According to the U.S. military, insurgency represents an intermediate step in the spectrum of conflict, which ranges from stable peace to general war.1 The frame in which military opera- tions are conducted is known as irregular warfare, a violent struggle among state and non-state actors for legitimacy and influence over a population.2 This form of conflict is charac- terized by three principle activities: insurgency, counter-insur- gency, and unconventional warfare, referring to the avoidance of Association of the Courtesy of the Revolutionary Afghanistan.
    [Show full text]
  • Unlocking NATO's Amphibious Potential
    November 2020 Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE J.D. WILLIAMS, GENE GERMANOVICH, STEPHEN WEBBER, GABRIELLE TARINI Unlocking NATO’s Amphibious Potential Lessons from the Past, Insights for the Future orth Atlantic Treaty Organization (NATO) members maintain amphibious capabilities that provide versatile and responsive forces for crisis response and national defense. These forces are routinely employed in maritime Nsecurity, noncombatant evacuation operations (NEO), counterterrorism, stability operations, and other missions. In addition to U.S. Marine Corps (USMC) and U.S. Navy forces, the Alliance’s amphibious forces include large ships and associated landing forces from five nations: France, Italy, the Netherlands, Spain, and the United Kingdom (UK). Each of these European allies—soon to be joined by Turkey—can conduct brigade-level operations, and smaller elements typically are held at high readiness for immediate response.1 These forces have been busy. Recent exercises and operations have spanned the littorals of West and North Africa, the Levant, the Gulf of Aden and Arabian Sea, the Caribbean, and the Pacific. Given NATO’s ongoing concerns over Russia’s military posture and malign behavior, allies with amphibious capabilities have also been exploring how these forces could contribute to deterrence or, if needed, be employed as part of a C O R P O R A T I O N combined and joint force in a conflict against a highly some respects, NATO’s ongoing efforts harken back to the capable nation-state. Since 2018, NATO’s headquarters Cold War, when NATO’s amphibious forces routinely exer- and various commands have undertaken initiatives and cised in the Mediterranean and North Atlantic as part of a convened working groups to advance the political intent broader strategy to deter Soviet aggression.
    [Show full text]
  • Meserole Brookings CV 2021
    CHRISTOPHER O. MESEROLE 1775 Massachusetts Ave NW, Washington DC 20036 (202) 797-6180 | [email protected] POSITIONS Director of Research and Policy, Brookings AI & Emerging Tech Initiative (2020-) Deputy Director, Brookings AI & Emerging Tech Initiative (2019-2020) Fellow, Foreign Policy, Brookings Institution (2017-) Post-Doctoral Fellow in Foreign Policy, Brookings Institution (2016-2017) Pre-Doctoral Fellow in Foreign Policy, Brookings Institution (2015-2016) AFFILIATIONS Co-Facilitator, GIFCT CAPPI Working Group (2020-) Co-PI, Brookings High-Level Working Group on Disinformation (2019-2020) Member, Christchurch Call Advisory Network (2019-) Adjunct Professor, Georgetown University (2019-) Member, Research Advisory Council, RESOLVE Network (2019-) Member, Digital Freedom Forum, CNAS (2019-) EDUCATION A.B., highest honors in field, Harvard University, Cambridge, MA, 2002 M.Div., S.T.M, Yale University, NeW Haven, CT, 2009, 2010 Ph.D., University of Maryland, College Park, MD, 2017 RESEARCH Artificial intelligence, emerging technology, international security; digital INTERESTS authoritarianism; counterterrorism and countering violent extremism; nonparametric machine learning, interpretable machine learning, differential privacy and homomorphic encryption, decentralized ledger technology WRITING “Exporting Digital Authoritarianism,” Brookings Institution, September 2019. (With Alina Polyakova.) “HoW Big Tech Can Fight White Supremacist Terrorism,” Foreign Affairs, August 2019. (With Daniel Byman.) “Terrorist Definitions and Designation
    [Show full text]
  • Highlights of Recent RAND Research on Counterinsurgency
    Highlights of Recent RAND Research on Counterinsurgency For more information, contact Shirley Ruhe, Director of Congressional Relations, at 703-413-1100, x5632 or [email protected], or Kurt Card, National Security Legislative Analyst, at 703-413-1100 x5259 or [email protected] As the leading research authority on counterinsurgency, the RAND Corporation has developed a wide selection of materials for policy makers. With multiple insurgencies operating in several theaters this research was developed to provide a historical, geographical, and functional understanding of past and present insurgencies and counterinsurgency operations. Social Science for Counterterrorism Putting the Pieces Together Darcy Noricks et al., 2009 This report from an interdisciplinary project to survey and integrate the scholarly social- science literature relevant to counterterrorism answers questions related to why some individuals become terrorists, how terrorists generate public support, how terrorist organizations make decisions, and why individuals disengage. A Stability Police Force for the United States Justification and Options for Creating U.S. Capabilities Terrence K. Kelly et al., 2009 Establishing security is the sine qua non of stability operations, since it is a prerequisite for reconstruction and development. Security requires a mix of military and police forces to deal with a range of threats from insurgents to criminal organizations. This research examines the creation of a high-end police force, which the authors call a Stability Police Force. 1 Underkill Scalable Capabilities for Military Operations amid Populations David C. Gompert et al., 2009 The battle for Gaza revealed an extremist strategy: hiding in cities and provoking attack to cause civilian deaths that can be blamed on the attacking forces.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • Deterring Rebels: Political Persuasion and Manipulation in the Divergent Trilogy Films
    MONOGRÁFICO Círculo de Lingüística Aplicada a la Comunicación ISSN: 1576-4737 http://dx.doi.org/10.5209/CLAC.66600 Deterring Rebels: Political Persuasion and Manipulation in the Divergent Trilogy Films Raquel Sánchez Ruiz1 Recibido: 14 de noviembre de 2019/ Aceptado: 24 de noviembre de 2019 Abstract. The aim of this paper is to analyze the persuasive and manipulative strategies and devices used in the political propaganda in the films of the Divergent Series. Special attention is paid to Insurgent, since the outbreak of a war between different ideological and political factions and the government is a breeding ground for manipulative, political strategies to persuade the population to side with the former or the latter, which they use to try to win. In this scenario, political discourse also serves both deterring rebellious Divergents threatening the established system and controlling the masses from the different factions. To this end, I follow the parameters of different theoretical frameworks, such as critical-political discourse analysis, Appraisal Theory –focusing on attitude or attitudinal positioning– and the phenomena of polarization and legitimation. The results will allow us to see how the political agents of the film managed to influence their audiences with their speeches by using rhetorical means, subjectivity to present situations, objects or people positively or negatively at the speaker’s convenience or interests, and different types of power. Key Words: Divergent Series; political discourse; persuasion; manipulation; totalitarianism; attitudinal positioning [es] Disuadiendo a los rebeldes: persuasión política y manipulación en las películas de la trilogía Divergente Resumen. El objetivo de este artículo es analizar las estrategias y recursos de persuasión y manipulación que se emplean en la propaganda política de las películas de la trilogía Divergente.
    [Show full text]
  • The Crucial Development of Heavy Cavalry Under Herakleios and His Usage of Steppe Nomad Tactics Mark-Anthony Karantabias
    The Crucial Development of Heavy Cavalry under Herakleios and His Usage of Steppe Nomad Tactics Mark-Anthony Karantabias The last war between the Eastern Romans and the Sassanids was likely the most important of Late Antiquity, exhausting both sides economically and militarily, decimating the population, and lay- ing waste the land. In Heraclius: Emperor of Byzantium, Walter Kaegi, concludes that the Romaioi1 under Herakleios (575-641) defeated the Sassanian forces with techniques from the section “Dealing with the Persians”2 in the Strategikon, a hand book for field commanders authored by the emperor Maurice (reigned 582-602). Although no direct challenge has been made to this claim, Trombley and Greatrex,3 while inclided to agree with Kaegi’s main thesis, find fault in Kaegi’s interpretation of the source material. The development of the katafraktos stands out as a determining factor in the course of the battles during Herakleios’ colossal counter-attack. Its reforms led to its superiority over its Persian counterpart, the clibonarios. Adoptions of steppe nomad equipment crystallized the Romaioi unit. Stratos4 and Bivar5 make this point, but do not expand their argument in order to explain the victory of the emperor over the Sassanian Empire. The turning point in its improvement seems to have taken 1 The Eastern Romans called themselves by this name. It is the Hellenized version of Romans, the Byzantine label attributed to the surviving East Roman Empire is artificial and is a creation of modern historians. Thus, it is more appropriate to label them by the original version or the Anglicized version of it.
    [Show full text]
  • Fm 3-21.5 (Fm 22-5)
    FM 3-21.5 (FM 22-5) HEADQUARTERS DEPARTMENT OF THE ARMY JULY 2003 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *FM 3-21.5(FM 22-5) FIELD MANUAL HEADQUARTERS No. 3-21.5 DEPARTMENT OF THE ARMY WASHINGTON, DC, 7 July 2003 DRILL AND CEREMONIES CONTENTS Page PREFACE........................................................................................................................ vii Part One. DRILL CHAPTER 1. INTRODUCTION 1-1. History................................................................................... 1-1 1-2. Military Music....................................................................... 1-2 CHAPTER 2. DRILL INSTRUCTIONS Section I. Instructional Methods ........................................................................ 2-1 2-1. Explanation............................................................................ 2-1 2-2. Demonstration........................................................................ 2-2 2-3. Practice................................................................................... 2-6 Section II. Instructional Techniques.................................................................... 2-6 2-4. Formations ............................................................................. 2-6 2-5. Instructors.............................................................................. 2-8 2-6. Cadence Counting.................................................................. 2-8 CHAPTER 3. COMMANDS AND THE COMMAND VOICE Section I. Commands ........................................................................................
    [Show full text]
  • MCCA Report on the 2020 Protest and Civil Unrest
    Major Cities Chiefs Association Intelligence Commanders Group Line Length Represents the Number of Protests in Each City/County MCCA Report on the 2020 Protests and Civil Unrest October1 2020 REPORT ON THE 2020 PROTESTS AND CIVIL UNREST October 2020 The Major Cities Chiefs Association (MCCA) is a professional organization of police executives representing the largest cities in the United States and Canada. The MCCA provides a unique forum for urban chiefs, sheriffs and other law enforcement executives to share ideas, experiences and strategies. MCCA provides a collaborative forum for the advancement of public safety through innovation, research, policy development, government engagement, community outreach, and leadership development. MCCA membership is comprised of Chiefs and Sheriffs of the sixty-nine largest law enforcement agencies in the United States and nine largest in Canada. They serve 79.9 million people (65.7 US and 14.2 Canada) with a workforce of 251,082 (222,973 US and 28,110 Canada) officers and non-sworn personnel. The MCCA Intelligence Commanders Group (ICG) functions as a subset of the MCCA that focuses on law enforcement intelligence and national security matters. The ICG is comprised of intelligence commanders from each MCCA agency that represents their organization’s intelligence and/or national security mission. The group serves as a mechanism for advising the Chiefs and Sheriffs on security matters, exchanging intelligence between MCCA members, and developing programs for combatting crime and terrorism globally.
    [Show full text]
  • Air-To-Ground Battle for Italy
    Air-to-Ground Battle for Italy MICHAEL C. MCCARTHY Brigadier General, USAF, Retired Air University Press Maxwell Air Force Base, Alabama August 2004 Air University Library Cataloging Data McCarthy, Michael C. Air-to-ground battle for Italy / Michael C. McCarthy. p. ; cm. Includes bibliographical references and index. ISBN 1-58566-128-7 1. World War, 1939–1945 — Aerial operations, American. 2. World War, 1939– 1945 — Campaigns — Italy. 3. United States — Army Air Forces — Fighter Group, 57th. I. Title. 940.544973—dc22 Disclaimer Opinions, conclusions, and recommendations expressed or implied within are solely those of the author and do not necessarily represent the views of Air University, the United States Air Force, the Department of Defense, or any other US government agency. Cleared for public release: distribution unlimited. Air University Press 131 West Shumacher Avenue Maxwell AFB AL 36112–6615 http://aupress.maxwell.af.mil ii Contents Chapter Page DISCLAIMER . ii FOREWORD . v ABOUT THE AUTHOR . vii PREFACE . ix INTRODUCTION . xi Notes . xiv 1 GREAT ADVENTURE BEGINS . 1 2 THREE MUSKETEERS TIMES TWO . 11 3 AIR-TO-GROUND BATTLE FOR ITALY . 45 4 OPERATION STRANGLE . 65 INDEX . 97 Photographs follow page 28 iii THIS PAGE INTENTIONALLY LEFT BLANK Foreword The events in this story are based on the memory of the author, backed up by official personnel records. All survivors are now well into their eighties. Those involved in reconstructing the period, the emotional rollercoaster that was part of every day and each combat mission, ask for understanding and tolerance for fallible memories. Bruce Abercrombie, our dedicated photo guy, took most of the pictures.
    [Show full text]