FM 3-05.137 Army Special Operations Forces Foreign Internal Defense

Total Page:16

File Type:pdf, Size:1020Kb

FM 3-05.137 Army Special Operations Forces Foreign Internal Defense FM 3-05.137 Army Special Operations Forces Foreign Internal Defense June 2008 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 18 April 2008. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DTD-JA, Fort Bragg, NC 28310-9610, or by e-mail to [email protected]. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. FOREIGN DISCLOSURE RESTRICTION (FD 6): This publication has been reviewed by the product developers in coordination with the United States Army John F. Kennedy Special Warfare Center and School foreign disclosure authority. This product is releasable to students from foreign countries on a case-by-case basis only. Headquarters, Department of the Army This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). FM 3-05.137 Field Manual Headquarters No. 3-05.137 Department of the Army Washington, DC, 30 June 2008 Army Special Operations Forces Foreign Internal Defense Contents Page PREFACE .............................................................................................................iv Chapter 1 INTRODUCTION................................................................................................ 1-1 Overview............................................................................................................. 1-1 Relationship to Internal Defense and Development........................................... 1-1 Internal Defense and Development.................................................................... 1-2 Operational Framework for Foreign Internal Defense........................................ 1-2 Relationship With Other Operations................................................................... 1-4 Department of Defense Tools ............................................................................ 1-5 United States National Objectives and Policy .................................................. 1-10 Chapter 2 ORGANIZATION AND RESPONSIBILITIES .................................................... 2-1 Overview............................................................................................................. 2-1 Support From the United States......................................................................... 2-1 Diplomatic, Information, Military, and Economic: The Four Pillars of the Support Framework............................................................................................ 2-2 National-Level Organizations ............................................................................. 2-4 Combatant Command Organization................................................................... 2-8 Subordinate Unified Commands ........................................................................ 2-8 Joint Task Forces ............................................................................................... 2-9 United States Diplomatic Mission and Country Team........................................ 2-9 Supported Host Nation ..................................................................................... 2-12 Distribution Restriction: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 18 April 2008. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DTD-JA, Fort Bragg, NC 28310-9610, or by e-mail to [email protected]. Destruction Notice: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Foreign Disclosure Restriction (FD 6): This publication has been reviewed by the product developers in coordination with the United States Army John F. Kennedy Special Warfare Center and School foreign disclosure authority. This product is releasable to students form foreign countries on a case-by-case basis only. i Contents Multinational Force............................................................................................2-13 Role of Army Special Operations Forces in Foreign Internal Defense.............2-13 Army Special Operations Forces Support to Coalitions ...................................2-16 Chapter 3 PLANNING .........................................................................................................3-1 Overview .............................................................................................................3-1 Planning Imperatives ..........................................................................................3-1 Department of State Guidance ...........................................................................3-2 Department of Defense Guidance ......................................................................3-2 Theater Planning Requirements .........................................................................3-4 Security Cooperation Planning ...........................................................................3-5 Planning Procedures and Considerations ..........................................................3-6 Regional, Transregional, and International Concerns ........................................3-8 Foreign Internal Defense Assessment................................................................3-9 Training Plan.....................................................................................................3-10 Planning for Force Protection ...........................................................................3-11 Chapter 4 TRAINING...........................................................................................................4-1 Overview .............................................................................................................4-1 Responsibilities for Training................................................................................4-1 Training and Skills Needed for Success.............................................................4-2 Training Strategy.................................................................................................4-5 Training and Advisory Assistance.......................................................................4-7 Chapter 5 EMPLOYMENT CONSIDERATIONS.................................................................5-1 Overview .............................................................................................................5-1 Employment Factors ...........................................................................................5-1 Civil-Military Operations Estimate of the Situation..............................................5-6 Psychological Operations Estimate of the Situation ...........................................5-8 Health Service Support .....................................................................................5-10 Site Survey Procedures ....................................................................................5-13 Advising the Host-Nation Military......................................................................5-16 Chapter 6 OPERATIONS ....................................................................................................6-1 Overview .............................................................................................................6-1 Indirect Support...................................................................................................6-1 Direct Support .....................................................................................................6-5 Chapter 7 COMBAT OPERATIONS ...................................................................................7-1 Overview .............................................................................................................7-1 Considerations for United States Combat Operations........................................7-2 Command and Control........................................................................................7-5 Sustainment ........................................................................................................7-5 Insurgency and Counterinsurgency....................................................................7-5 Terrorism.............................................................................................................7-6 Information Operations .......................................................................................7-7 Chapter 8 REDEPLOYMENT ..............................................................................................8-1 Overview .............................................................................................................8-1 Termination of Operations ..................................................................................8-1 Mission Handoff Procedures...............................................................................8-2 Postmission Debriefing Procedures....................................................................8-5
Recommended publications
  • The Erosion of Strategic Stability and the Future of Arms Control in Europe
    Études de l’Ifri Proliferation Papers 60 THE EROSION OF STRATEGIC STABILITY AND THE FUTURE OF ARMS COntrOL IN EUROPE Corentin BRUSTLEIN November 2018 Security Studies Center The Institut français des relations internationales (Ifri) is a research center and a forum for debate on major international political and economic issues. Headed by Thierry de Montbrial since its founding in 1979, Ifri is a non- governmental, non-profit organization. As an independent think tank, Ifri sets its own research agenda, publishing its findings regularly for a global audience. Taking an interdisciplinary approach, Ifri brings together political and economic decision-makers, researchers and internationally renowned experts to animate its debate and research activities. The opinions expressed in this text are the responsibility of the author alone. ISBN: 978-2-36567-932-9 © All rights reserved, Ifri, 2018 How to quote this document: Corentin Brustlein, “The Erosion of Strategic Stability and the Future of Arms Control in Europe”, Proliferation Papers, No. 60, November 2018. Ifri 27 rue de la Procession 75740 Paris Cedex 15 – FRANCE Tel.: +33 (0)1 40 61 60 00 – Fax: +33 (0)1 40 61 60 60 Email: [email protected] Website: Ifri.org Author Dr. Corentin Brustlein is the Director of the Security Studies Center at the French Institute of International Relations. His work focuses on nuclear and conventional deterrence, arms control, military balances, and U.S. and French defense policies. Before assuming his current position, he had been a research fellow at Ifri since 2008 and the head of Ifri’s Deterrence and Proliferation Program since 2010.
    [Show full text]
  • Decision-Making Process in Combat Operations
    DECISION-MAKING PROCESS IN MILITARY COMBAT OPERATIONS 4120/002 10.2013 2000 10.2013 4120/002 International Committee of the Red Cross 19, avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org © ICRC, October 2013 DECISION-MAKING PROCESS IN MILITARY COMBAT OPERATIONS PREFACE Every state has an obligation to ensure respect for the law of armed conflict. The ICRC is mandated to support states in these efforts and does so through a range of activities, including promoting the integration of appropriate com- pliance measures into military doctrine, education, training and sanctions, with a view to ensuring that behaviours of those engaged in armed conflict comply with the law. The present note is designed to support the integration of the Law of Armed Conflict into military decision-making processes, primarily at the operational level. It is not based on any specific national doctrine. It is designed to support those responsible for developing national doctrine and operational planning procedures in their efforts to integrate the Law of Armed Conflict into military practice. The desired outcome is staff procedures which ensure the development of military plans and orders that accurately and effectively integrate compliance with the Law of Armed Conflict into operational practice, thereby reducing the effects of armed conflict on those who do not, or no longer, participate in the hostilities. The techniques of warfare change rapidly, particularly at times when combat operations are commonplace. The humanitarian impact of conflict is timeless. The Law of Armed Conflict is designed to limit the humanitarian consequences of war.
    [Show full text]
  • Tstable of Content
    ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 North Atlantic Treaty Organization London International Model United Nations 18th Session | 2017 tsTable of Content 1 ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 Table of Contents Table of Contents WELCOME TO THE NORTH ATLANTIC TREATY ORGANIZATION .............................................................. 3 INTRODUCTION TO THE COMMITTEE .................................................................................................................. 4 TOPIC A: FORMING A NATO STRATEGY IN CYBERSPACE ............................................................................. 5 INTRODUCTION ............................................................................................................................................................... 5 HISTORY OF THE PROBLEM ............................................................................................................................................. 6 Timeline of notable attacks ....................................................................................................................................... 7 1998 – 2001 “MOONLIGHT MAZE” ....................................................................................................................... 7 2005 – 2011 TITAN RAIN & BYZANTINE HADES .................................................................................................. 8 2007 Estonia DDoS Campaigns ...............................................................................................................................
    [Show full text]
  • Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II.
    [Show full text]
  • ENGLISH Only
    The OSCE Secretariat bears no responsibility for the content of this document FSC.DEL/31/21 and circulates it without altering its content. The distribution by OSCE 29 January 2021 Conference Services of this document is without prejudice to OSCE decisions, as set out in documents agreed by OSCE participating States. ENGLISH only STATEMENT on the Joint Turkish-Azerbaijani Large-Scale Military Exercise as delivered by the Delegation of the Republic of Armenia at the 966th Plenary Meeting of the Forum for Security Co-operation 27 January 2021 Madam Chairperson, On 17 January the Ministry of Defense of Turkey announced through its official website about conducting the «Winter-2021» joint Turkish-Azerbaijani military exercise in Kars from 1 to 12 February. This was followed by information disseminated by the Ministry of Defense of Azerbaijan on the departure of the military personnel and equipment of the Nakhijevan Combined Army of Azerbaijan to Turkey to take part in the joint military exercise. According to the Turkish media reports, the planned exercise is expected to be one of the largest winter military drills of recent times aimed, among others, at improving cooperation and coordination during joint military operations and testing combat capabilities under extreme weather conditions. Reportedly, the military exercise will involve tank divisions, heavy artillery, sniper teams, helicopters and special forces. At the previous meeting of the FSC we drew the attention of the participating States to this exercise. In response to our inquiry Turkish delegation here in Vienna insisted that the exercise was not notified under the Vienna Document because of the small number of the military personnel and equipment to be engaged in it.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • American War and Military Operations Casualties: Lists and Statistics
    American War and Military Operations Casualties: Lists and Statistics Updated July 29, 2020 Congressional Research Service https://crsreports.congress.gov RL32492 American War and Military Operations Casualties: Lists and Statistics Summary This report provides U.S. war casualty statistics. It includes data tables containing the number of casualties among American military personnel who served in principal wars and combat operations from 1775 to the present. It also includes data on those wounded in action and information such as race and ethnicity, gender, branch of service, and cause of death. The tables are compiled from various Department of Defense (DOD) sources. Wars covered include the Revolutionary War, the War of 1812, the Mexican War, the Civil War, the Spanish-American War, World War I, World War II, the Korean War, the Vietnam Conflict, and the Persian Gulf War. Military operations covered include the Iranian Hostage Rescue Mission; Lebanon Peacekeeping; Urgent Fury in Grenada; Just Cause in Panama; Desert Shield and Desert Storm; Restore Hope in Somalia; Uphold Democracy in Haiti; Operation Enduring Freedom (OEF); Operation Iraqi Freedom (OIF); Operation New Dawn (OND); Operation Inherent Resolve (OIR); and Operation Freedom’s Sentinel (OFS). Starting with the Korean War and the more recent conflicts, this report includes additional detailed information on types of casualties and, when available, demographics. It also cites a number of resources for further information, including sources of historical statistics on active duty military deaths, published lists of military personnel killed in combat actions, data on demographic indicators among U.S. military personnel, related websites, and relevant CRS reports. Congressional Research Service American War and Military Operations Casualties: Lists and Statistics Contents Introduction ....................................................................................................................................
    [Show full text]
  • A Leader's Guide to Conducting Research Staff Rides
    A Leader’s Guide to Conducting Research Staff Rides The Modern War Institute Liam Collins at West Point Lionel Beehner A Leader’s Guide to Conducting Research Staff Rides August 18, 2020 A Leader’s Guide to Conducting Research Staff Rides Table of Contents Preface .................................................................................................................................................................................. 1 Acknowledgments............................................................................................................................................................ 4 Introduction ....................................................................................................................................................................... 5 Chapter I — Why Study Contemporary Battlefields? ........................................................................................... 8 Chapter II — The Army Staff Ride and Learning Theory ................................................................................. 10 Tactical Exercises Without Troops, Battlefield Tours, Staff Rides, and Research Staff Rides ............. 10 Research Staff Ride ............................................................................................................................................ 12 Learning Theory ................................................................................................................................................. 13 Chapter III — Research Staff Ride Design
    [Show full text]
  • Fm 3-21.5 (Fm 22-5)
    FM 3-21.5 (FM 22-5) HEADQUARTERS DEPARTMENT OF THE ARMY JULY 2003 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *FM 3-21.5(FM 22-5) FIELD MANUAL HEADQUARTERS No. 3-21.5 DEPARTMENT OF THE ARMY WASHINGTON, DC, 7 July 2003 DRILL AND CEREMONIES CONTENTS Page PREFACE........................................................................................................................ vii Part One. DRILL CHAPTER 1. INTRODUCTION 1-1. History................................................................................... 1-1 1-2. Military Music....................................................................... 1-2 CHAPTER 2. DRILL INSTRUCTIONS Section I. Instructional Methods ........................................................................ 2-1 2-1. Explanation............................................................................ 2-1 2-2. Demonstration........................................................................ 2-2 2-3. Practice................................................................................... 2-6 Section II. Instructional Techniques.................................................................... 2-6 2-4. Formations ............................................................................. 2-6 2-5. Instructors.............................................................................. 2-8 2-6. Cadence Counting.................................................................. 2-8 CHAPTER 3. COMMANDS AND THE COMMAND VOICE Section I. Commands ........................................................................................
    [Show full text]
  • Cyber Conflicts As a New Global Threat
    future internet Article Cyber Conflicts as a New Global Threat Alexander Kosenkov Information Society Research Center, Chernihiv 14000, Ukraine; [email protected]; Tel.: +380-930570382 Academic Editor: Jiankun Hu Received: 7 June 2016; Accepted: 5 September 2016; Published: 9 September 2016 Abstract: In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction. Keywords: cyber conflict; information warfare; cyber warfare; information operations 1. Introduction During the last decade, global social and political landscapes were changed by the revolutionary development of information and communications technologies (ICT). New ICT has also significantly influenced warfare, among other ways through the emergence of network-centric warfare doctrine and unconventional, hybrid, information, and asymmetric warfare. The most significant transformation brought by the ICT was the emergence of a totally new form of conflict—cyber conflict (in this paper, cyber conflict is defined as conflict with the application of cyberspace capabilities in order to achieve objectives in or through cyberspace)—the rise of which we are witnessing worldwide today.
    [Show full text]
  • NATO's Post-Cold War Relevance in Counter Terrorism
    NATO’s post-Cold War Relevance in Counter Terrorism By Austin Maness Submitted to the graduate degree program in Global and International Studies and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Master of Arts. ________________________________ Chairperson Dr Nazli Avdan ________________________________ Dr Michael Wuthrich ________________________________ Dr Robert Baumann Date Defended: 12 May 2016 The Thesis Committee for Austin Maness certifies that this is the approved version of the following thesis: NATO’s post-Cold War Relevance in Counter Terrorism ________________________________ Chairperson Dr Nazli Avdan Date approved: 12 May 2016 ii Abstract From the end of the Cold War, through the process of globalization, national security has transitioned from an idea of purely state versus state interaction into a concept including both state and non-state actors. The North Atlantic Treaty Organization (NATO), once the counter balance to the Soviet Union, has evolved into an alliance that has expanded its attention to include non-state actors, such as international terrorist organizations. Scholars have theorized on the lifespan of NATO post-Cold War, however the majority of these theories have focused on state versus state issues, a common paradigm of the 20th century, and not included state versus non-state issues, such as international terrorism. As NATO continues to be a post-Cold War, state alliance has it been able to transition to a relevant counter terrorism force and reduce the number of terrorist attacks within each member state, the alliance as a whole, and/or in the international community? With statistical data of terrorist attacks within NATO member states from the Global Terrorism Database this study focuses on each new member that joined during three influential time periods before and after the end of the Cold War in order to determine if becoming a member correlates to an increase or decrease in the number of terrorist attacks.
    [Show full text]