Special Operations

Total Page:16

File Type:pdf, Size:1020Kb

Special Operations Joint Publication 3-05 Special Operations 16 July 2014 PREFACE 1. Scope This publication provides overarching doctrine for special operations and the employment and support for special operations forces across the range of military operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders and prescribes joint doctrine for operations, education, and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the joint force commander from organizing the force and executing the mission in a manner the joint force commander deems most appropriate to ensure unity of effort in the accomplishment of the overall objective. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the CJCS, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the United States, commanders should evaluate and follow the multinational command’s doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff: DAVID L. GOLDFEIN, Lt Gen, USAF Director, Joint Staff i Preface Intentionally Blank ii JP 3-05 SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 3-05 DATED 18 APRIL 2011 • Merges material from Joint Publication (JP) 3-05.1, Joint Special Operations Task Force, which is consequently rescinded following approval of JP 3-05, Special Operations. • Expands the discussion of special operations joint task force, to include the addition of a vignette and a definition. • Clarifies and defines preparation of the environment, operational preparation of the environment, and advance force operations. • Revises special operations activities. • Defines and discusses counter threat finance. • Modifies doctrine in regard to command and control of special operations forces. • Expands discussion of intelligence support to special operations. • Adds sections on civil affairs operations, countering weapons of mass destruction, military working dogs, and engineer support. • Adds numerous vignettes throughout publication. • Adds Appendix A, “Joint Special Operations Task Force Organization,” and Appendix B, “Joint Special Operations Task Force Headquarters Staff Checklist.” • Modifies, adds, and removes multiple terms and definitions from JP 1-02, DOD Dictionary of Military and Associated Terms. iii Summary of Changes Intentionally Blank iv JP 3-05 TABLE OF CONTENTS EXECUTIVE SUMMARY ............................................................................................... ix CHAPTER I OVERVIEW OF SPECIAL OPERATIONS Introduction ................................................................................................................. I-1 Special Operations ...................................................................................................... I-1 Designated Special Operations Forces........................................................................ I-3 Characteristics of Special Operations ......................................................................... I-5 Special Operations Across the Range of Military Operations .................................... I-8 CHAPTER II SPECIAL OPERATIONS CORE ACTIVITIES Introduction ................................................................................................................II-1 Special Operations Core Activities ............................................................................II-2 CHAPTER III COMMAND AND CONTROL OF SPECIAL OPERATIONS FORCES Introduction .............................................................................................................. III-1 Assignment of Special Operations Forces ............................................................... III-4 Special Operations Forces Joint Task Force ............................................................ III-4 Command and Control of Special Operations Forces in Theater ............................ III-5 Command and Control of Special Operations Forces across the Range of Military Operations ................................................................................................ III-12 Special Operations Coordination, Liaison, and Distributed Command Elements ............................................................................................... III-18 Interdependence of Conventional Forces and Special Operations Forces ............. III-23 Interorganizational Coordination ........................................................................... III-24 Multinational Forces and Operations ..................................................................... III-25 CHAPTER IV SUPPORT CONSIDERATIONS FOR SPECIAL OPERATIONS FORCES Introduction .............................................................................................................. IV-1 Intelligence Support ................................................................................................. IV-1 Operational Contract Support .................................................................................. IV-5 Logistic Support ....................................................................................................... IV-5 Host-Nation Support ................................................................................................ IV-7 Multinational Support .............................................................................................. IV-8 Intergovernmental and Nongovernmental Organizations Support .......................... IV-8 Service-Provided Capabilities .................................................................................. IV-9 Communications Systems Support .......................................................................... IV-9 Public Affairs Support ........................................................................................... IV-10 v Table of Contents Combat Camera Support ........................................................................................ IV-10 Legal Support ......................................................................................................... IV-11 Protection ............................................................................................................... IV-11 Fire Support ........................................................................................................... IV-11 Air Support............................................................................................................. IV-12 Maritime Support ................................................................................................... IV-12 Space Support ........................................................................................................ IV-13 Meteorological and Oceanographic Support ......................................................... IV-14 Cyberspace Operations Support ............................................................................. IV-14 Electronic Warfare ................................................................................................. IV-15 Civil Affairs Operations ......................................................................................... IV-15 Countering Weapons of Mass Destruction Support ............................................... IV-15 Military Working Dogs/Multipurpose Canines ..................................................... IV-16 Counter-Improvised Explosive Device Support Element ...................................... IV-16 Counter Threat Finance .......................................................................................... IV-16 Explosive Ordnance Disposal ................................................................................ IV-17 APPENDIX A Joint Special Operations Task Force Organizational Considerations ....... A-1 B Joint Special Operations Task Force Headquarters Staff Checklists .........B-1 C References ..................................................................................................C-1 D Administrative Instructions ....................................................................... D-1 GLOSSARY Part I Abbreviations and Acronyms .................................................................
Recommended publications
  • The Erosion of Strategic Stability and the Future of Arms Control in Europe
    Études de l’Ifri Proliferation Papers 60 THE EROSION OF STRATEGIC STABILITY AND THE FUTURE OF ARMS COntrOL IN EUROPE Corentin BRUSTLEIN November 2018 Security Studies Center The Institut français des relations internationales (Ifri) is a research center and a forum for debate on major international political and economic issues. Headed by Thierry de Montbrial since its founding in 1979, Ifri is a non- governmental, non-profit organization. As an independent think tank, Ifri sets its own research agenda, publishing its findings regularly for a global audience. Taking an interdisciplinary approach, Ifri brings together political and economic decision-makers, researchers and internationally renowned experts to animate its debate and research activities. The opinions expressed in this text are the responsibility of the author alone. ISBN: 978-2-36567-932-9 © All rights reserved, Ifri, 2018 How to quote this document: Corentin Brustlein, “The Erosion of Strategic Stability and the Future of Arms Control in Europe”, Proliferation Papers, No. 60, November 2018. Ifri 27 rue de la Procession 75740 Paris Cedex 15 – FRANCE Tel.: +33 (0)1 40 61 60 00 – Fax: +33 (0)1 40 61 60 60 Email: [email protected] Website: Ifri.org Author Dr. Corentin Brustlein is the Director of the Security Studies Center at the French Institute of International Relations. His work focuses on nuclear and conventional deterrence, arms control, military balances, and U.S. and French defense policies. Before assuming his current position, he had been a research fellow at Ifri since 2008 and the head of Ifri’s Deterrence and Proliferation Program since 2010.
    [Show full text]
  • The Future of Weapons of Mass Destruction an Update
    A NATIONAL INTELLIGENCE UNIVERSITY PRESIDENTIAL SCHOLAR’S PAPER THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE By John P. Caves, Jr. NIU Presidential Scholar November 2019 – November 2020 and W. Seth Carus THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE John P. Caves, Jr. and W. Seth Carus National Intelligence University National Intelligence Press Washington, DC February 2021 The views expressed in this paper are solely those of the authors and do not necessarily reflect those of the National Intelligence University, National Defense University, or any other part of the U.S. government. ACKNOWLEDGMENTS While the authors are solely responsible for the final content of this paper, they benefited greatly from the time, expertise and support freely availed to them by many knowledgeable individuals and organizations. They include Mr. Caves’ colleagues at National Intelligence University (NIU), where he worked on this paper while on a detail assignment from National Defense University (NDU). Mr. Caves expresses par- ticular gratitude to Dr. Brian Holmes, dean of the Anthony G. Oettinger School of Science and Technol- ogy Intelligence, for his leadership, knowledge, and support. Dr. Sharon Adams, Ms. Beverly Barnhart, Mr. George Clifford, Dr. LaMesha Craft, and Dr. R. Carter Morris offered helpful comments on the paper at various stages. They and Mr. Damarius Alston, LTC Jeffrey Bacon, Lt Col Frances Deutch, Ms. Thelma Flamer, Mr. Julian Meade, and Ms. Christina Sanders were among others at NIU whose assistance and support made Mr. Caves’ assignment at NIU enjoyable as well as productive. Both authors are deeply indebted to their colleagues at NDU’s Center for the Study of Weapons of Mass Destruction (CSWMD), especially Mr.
    [Show full text]
  • Army Field Support Brigade Tactics, Techniques, and Procedures
    *FMI 4-93.41(FM 63-11) ARMY FIELD SUPPORT BRIGADE TACTICS, TECHNIQUES, AND PROCEDURES February 2007 Expires: February 2009 HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTON: Approved for public release; distribution is unlimited. *FMI 4-93.41 (FM 63-11) Field Manual Interim Headquarters No. 4-93.41 Department of the Army Washington, DC, 22 February 2007 Expires: 22 February 2009 Army Field Support Brigade Tactics, Techniques, and Procedures Contents Page PREFACE .............................................................................................................iii Chapter 1 The Army Field Support Brigade Organization and Operations Overview 1-1 Mission and Responsibilities .............................................................................. 1-1 Organization and Structure ................................................................................ 1-2 Command and Control ....................................................................................... 1-3 Commmand and Coordinating Staff................................................................... 1-4 Primary Functions and Capabilities Overview.................................................... 1-5 Chapter 2 Plans and Operations....................................................................................... 2-1 Early Entry Module ............................................................................................. 2-1 Main Command Post.......................................................................................... 2-2
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Ground Electronic Warfare: Background and Issues for Congress
    Ground Electronic Warfare: Background and Issues for Congress September 17, 2019 Congressional Research Service https://crsreports.congress.gov R45919 SUMMARY R45919 Ground Electronic Warfare: Background and September 17, 2019 Issues for Congress John R. Hoehn Ground electronic warfare (EW) is a group of programs directed by the Army and Marine Corp Analyst in Military which are designed to effect ground forces use of the electromagnetic spectrum. The U.S. Capabilities and Programs military has several ground EW programs that are used for different missions. These programs can broadly be categorized into counter-improvised explosive device (C-IED) systems, counter- unmanned aerial systems (C-UAS), and communications and radar jammers. Over the past several years, senior leaders in the Army and Marine Corps have testified about the need to improve EW capabilities. Role of EW in Ground Operations EW is a component of modern warfare, particularly in response to threats posed by potential adversaries such as Russia and China. EW refers to operations that use the electromagnetic spectrum (i.e., the “airwaves”) to detect, listen to, jam, and deceive (or “spoof”) enemy radars, radio communication systems, data links, and other electronic systems. EW also refers to operations that defend against enemy attempts to do the same. Ground EW programs have gained importance in an era of “great power competition.” Countries like Russia and China have developed so-called anti-access/area denial (A2/AD) systems, some of which are designed to prevent U.S. military access to radio and satellite communications, and to deny the use of radars for artillery and air defense operations.
    [Show full text]
  • Defense Primer: Electronic Warfare
    Updated October 29, 2020 Defense Primer: Electronic Warfare Electronic warfare (EW), as defined by the Department of Electronic protection involves actions to protect access Defense (DOD), are military activities that use to the spectrum for friendly military assets. electromagnetic energy to control the electromagnetic Electronic attack uses electromagnetic energy to spectrum (“the spectrum”) and attack an enemy. The degrade or deny an enemy’s use of the spectrum. spectrum is a range of frequencies for electromagnetic EW support identifies and catalogues emissions of energy. EW supports command and control (C2) by friendly or enemy forces to either protect U.S. forces or allowing military commanders’ access to the spectrum to develop a plan to deny an enemy’s access to the communicate with forces, while preventing potential spectrum. adversaries from accessing the spectrum to develop an These subsets of EW often mutually support each other in operational picture and communicate with their forces. operations. EW support uses equipment to assess both Some have argued that EW is a component of anti- friendly and adversary electronic emissions. This access/area denial (A2/AD) campaigns. information can then be used to develop a protection plan to maintain access to the spectrum or an attack plan to deny Role of EW in Military Operations adversaries vital access. Radar jamming (electronic attack) Since the introduction of two-way radios, militaries have can serve a protection function for friendly forces to become dependent on the spectrum. This reliance has penetrate defended airspace, and it prevents an adversary expanded over the past century to include nearly every from having a complete operating picture.
    [Show full text]
  • Protecting US Security by Minimizing the Role of Nuclear Weapons
    Blechman and Rumbaugh Protecting US Security by Minimizing the Role of Nuclear Weapons: A NEW US NUCLEAR POLICY Barry Blechman and Russell Rumbaugh MAY 2015 STIMSON | 1 Protecting US Security by Minimizing the Role of Nuclear Weapons: a New US Nuclear Policy This paper was prepared in September 2014 and commissioned by the Center for Strategic and International Studies (CSIS). It will be published in “Project Atom: A Competitive Strategies Approach to Defining U.S. Nuclear Strategy and Posture for 2025- 2050” (Washington, DC: CSIS, 2015.) 2 | APRIL 2015 CONTENTS Introduction . 5 US Conventional Military Dominance . 5 The Limited Role of Nuclear Weapons . 8 Minimizing the Roles of Nuclear Weapons in US Policies and Those of Other Nations . 12 Contingencies . 19 Conclusion . 23 “After seventy years of indulging fantasies of what nuclear weapons can do, it is high time to acknowledge that they do very little and adapt US nuclear policy, strategy, and forces to those facts.” Blechman and Rumbaugh INTRODUCTION Nuclear weapons remain the most potent destructive force known to humanity . Yet, US nuclear policies and doctrines remain encumbered by Cold War beliefs in the potential utility of nuclear weapons, even though the United States enjoys a dominant geopolitical position in the world, un- derpinned by a conventional military superiority greater than any ever known before . These false hopes that nuclear weapons can play a range of political and military roles in US security policy cause the United States to mistakenly pursue a nuclear strategy that is costly — not only in material terms, but also in geopolitical terms . In the worst case scenarios, this strategy could be catastroph- ic in terms of human lives and the nation’s future .
    [Show full text]
  • All but War Is Simulation: the Military Entertainment Complex
    1 THEATERS OF WAR: THE MILITARY-ENTERTAINMENT COMPLEX Tim Lenoir and Henry Lowood Stanford University To appear in Jan Lazardzig, Helmar Schramm, Ludger Schwarte, eds., Kunstkammer, Laboratorium, Bühne--Schauplätze des Wissens im 17. Jahrhundert/ Collection, Laboratory, Theater, Berlin; Walter de Gruyter Publishers, 2003 in both German and in English War games are simulations combining game, experiment and performance. The U.S. Department of Defense (DoD) has been the primary proponent of war game design since the 1950s. Yet, commercial game designers produced many of the ideas shaping the design of military simulations, both before and after the advent of computer-based games. By the 1980s, the seeds of a deeper collaboration among military, commercial designers, the entertainment industry, and academic researchers in the development of high-end computer simulations for military training had been planted. They built “distributed interactive simulations” (DIS) such as SIMNET that created virtual theaters of war by linking participants interacting with distributed software or hardware simulators in real time. The simulators themselves presented synthetic environments—virtual worlds—by utilizing advances in computer graphics and virtual reality research. With the rapid development of DIS technology during the 1990s, content and compelling story development became increasingly important. The necessity of realistic scenarios and backstory in military simulations led designers to build databases of historical, geographic and physical data, reconsider the role of synthetic agents in their simulations and consult with game design and entertainment talents for the latest word on narrative and performance. Even when this has not been the intention of their designers and sponsors, military simulations have been deeply embedded in commercial forms of entertainment, for example, by providing content and technology deployed in computer and video games.
    [Show full text]
  • Leadership in the Military Organization in the Context of the Current Military Phenomenon
    International Conference KNOWLEDGE-BASED ORGANIZATION Vol. XXIV No 1 2018 LEADERSHIP IN THE MILITARY ORGANIZATION IN THE CONTEXT OF THE CURRENT MILITARY PHENOMENON Laurențiu Mihail GRIGORE “Nicolae Bălcescu” Land Forces Academy Sibiu, Romania [email protected] Abstract: Military action is a specific type of human action which takes place in a particular physical, geographic and psychological environment. In this article we refer to the specific conditions in which military leadership is running. Also, we refer to the qualities of the military leader. Keywords: leadership, military organization, military phenomenon, leader, commander 1. Introduction defined and guided situation, courtesy of Human society has evolved and developed communication processes, to achieve a over the course of history due to social, determined goal or purposes." (1) economic, and organizational-political T.M. Newcomb, R.H. Turner and P.E. factors. Man as a social being participates Converse (1965) define leadership as "a intensely and directly in the activity of the relationship of facilitating roles" (2) in community to which he belongs and in order to achieve the goals. which he fulfills a certain role and holds a By interpreting these two definitions in a certain status. Man thinks, works, creates, creative manner, it results in respect to consumes, fights, etc., having a clearly leadership: defined position in the hierarchical structure - leadership is done by a person who of the society belonging to. Somewhere at has the role of leader and has the mission to the top of the pyramid, there is someone lead the group in achieving the set goal; who is leading, by taking a number of - not all the actions undertaken by the actions, which are more or less leader of the group are included in the scientifically grounded.
    [Show full text]
  • Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action
    ARTICLE Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action Andru E. Wall* Abstract Modern warfare requires close integration of military and intelligence forces. The Secretary of Defense possesses authorities under Title 10 and Title 50 and is best suited to lead US government operations against external unconventional and cyber threats. Titles 10 and 50 create mutually supporting, not mutually exclusive, authorities. Operations conducted under military command and control pursuant to a Secretary of Defense-issued execute order are military operations and not intelligence activities. Attempts by congressional overseers to redefine military preparatory operations as intelligence activities are legally and historically unsupportable. Congress should revise its antiquated oversight structure to reflect our integrated and interconnected world. I. Introduction After being hunted for nearly ten years, Osama Bin Laden was shot and killed by U.S. Navy SEALs in the early hours of May 2, 2011. The identity of the elite special operations unit that conducted the raid on bin Laden's compound in Pakistan was not immediately released, as the * Senior Associate with Alston & Bird LLP; former senior legal advisor for U.S. Special Operations Command Central (2007 to 2009). While this article was cleared for publication as required by my security clearance and nondisclosure agreements, the views expressed herein are my own and do not necessarily reflect the position of the U.S. government or Department of Defense. I thank Harvard Law School for its generous support of this paper andJack Goldsmith, Hagan Scotten., Mark Grdovic, Nick Dotti, Chris Costa, Michael Bahar, and Lenn Ferrer for their invaluable comments and suggestions.
    [Show full text]
  • Transportation Operations Ï*
    f M œ- %\ m4r U FM 55 2 fh CopŸ H&L iDd~^ (iKj2ir QX{V<^î S^IruQj^ ™! JJ j:; j *- ROO M FSI8 PF*-V7\J r.r; DIVISION TRANSPORTATION OPERATIONS ï* 1 í i! # FIELD MANUAL FM 55-2 NO. 55-2 HEADQUARTERS DEPARTMENT OF THE ARMY sj6 .Washington, DC, 3 July 1980 / %£ DIVISION TRANSPORTATION OPERATIONS PREFACE Transportation links the other logistics functions together into á system dedicated to supporting the division weapon systems. Transportation support ikprovided to the division by organic motor and air transport units, with backup support from the corps support command and theater Air Force airlift. TheS. division transportation officer and the division support command movement control officer coordinate and control division transportation\pperations. Organizational and functional concepts described herein are applicable to any type of US Army division operating in an oversea wartime environ- ment. Concepts and procedures are flexible enough to permit the com- mander to organize and use his resources in the manner best suited to meet specific mission requAements. Users of this manual Vre encouraged to recommend changes and submit comments for improving its clarity and accuracy. Comments should be keyed to the specific page, Wragraph, and line of text in which the change is recommended. Reasons shWld be provided for each comment to insure understanding and complette evaluation. DA Form 2028, Recommended Changes to Publications anol Blank Forms, is the preferred format for submitting recommendations. Forward the form to Commandant, US Army Transportation School, ATTN: \ATSP-CD-D, Fort Eustis, Virginia 23604. NOTE: The words “he,” “hW’ “man,” and “men,” refer to both the masculine and feminine genders unless otherwise specifically stated.
    [Show full text]