Out of Bounds : Transnational Sanctuary in Irregular Warfare / by Thomas A

Total Page:16

File Type:pdf, Size:1020Kb

Out of Bounds : Transnational Sanctuary in Irregular Warfare / by Thomas A Out of Bounds OP 17 Transnational Sanctuary in Irregular Warfare Thomas A. Bruscino, Jr. Global War on Terrorism Occasional Paper 17 Combat Studies Institute Press Fort Leavenworth, Kansas Out of Bounds OOPP 1177 Transnational Sanctuary in Irregular Warfare by Thomas A. Bruscino, Jr. Combat Studies Institute Press Fort Leavenworth, Kansas Library of Congress Cataloging-in-Publication Data Bruscino, Thomas A. Out of bounds : transnational sanctuary in irregular warfare / by Thomas A. Bruscino, Jr. p. cm. -- (Global War on Terrorism occasional paper 17) 1. Transnational sanctuaries (Military science)--Case studies. 2. Transnational sanctuaries (Mili- tary science)--History--20th century. 3. Vietnam War, 1961-1975--Campaigns. 4. Afghanistan--History--Soviet occupation, 1979-1989--Campaigns. I. Title. II. Series. U240.B78 2006 958.104’5--dc22 2006027469 CSI Press publications cover a variety of military history topics. The views expressed in this CSI Press publication are those of the author and not necessarily those of the Department of the Army or the Department of Defense. A full list of CSI Press publications, many of them available for downloading, can be found at http://www.cgsc.army.mil/carl/resources/csi/csi.asp. For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop IDCC, Washington, DC 20402-0001 ISBN 0-16-076846-2 Foreword In this timely Occasional Paper, Dr. Tom Bruscino analyzes a critical issue in the GWOT, and one which has bedeviled counterinsurgents past and present. He examines the role played by sanctuaries as they relate to irregular warfare in two conflicts. An active sanctuary refers to the prac- tice of using territory outside the geographical limits of an irregular war to provide various forms of support to one side, usually the insurgent or guerrilla force. In the first case study, he looks at the United States’ efforts to defeat the advantages gained by the Viet Cong (and later the North Vietnamese Army) by the use of sanctuaries in Cambodia and Laos during the Vietnam War. In doing so, he points out the diplomatic, military, and economic challenges which develop when trying to prevent the use of transnational sanctuaries by irregular forces. In the second case study, he examines the Soviet incursion into Afghanistan in the 1980s, but this time he does so from the perspective of the insurgency, the Mujahideen. Bruscino illus- trates the advantages accrued by the Afghan resistance in the use of Paki- stan as a sanctuary; the Soviet efforts to neutralize those advantages; and the Mujahideen’s responses to overcome the Soviet actions. In both cases the author finds that the use of an active sanctuary by the insurgents was a major component of their eventual victory. Without a sanctuary it is hard to see how the Viet Cong/NVA or the Mujahideen could have succeeded. In regards to a sanctuary, it is hard to see how the U.S./South Vietnamese or the Soviet Union could have defeated the in- surgencies. Active sanctuaries present the counterinsurgent with a host of military problems, but denying an insurgent the use of an active sanctuary is far more than a military task. All the elements of national power must be employed if one hopes to defeat the challenge posed by active sanctuar- ies. We at the Combat Studies Institute hope that the insights presented in this monograph will be of great value to military planners in the current war against terrorism. CSI – The Past is Prologue! Timothy R. Reese COL, AR Director, Combat Studies Institute iii Acknowledgements An author incurs many debts in the course of writing any project of this sort, and I am no different. The entire staff of the Combat Studies Institute and the Combined Arms Research Library at Fort Leavenworth have been nothing but supportive throughout the process, but a few indi- viduals deserve special mention. I am indebted to Bob Ramsey for kindly passing on a wealth of material that got me started; John McGrath and Matt Matthews for their thoughtful commentary; and Dr. William G. Rob- ertson for sharing an unpublished paper on the topic of sanctuaries that helped provide focus to this study. The supervisory team and editorial board of Colonel Timothy R. Re- ese, Director Combat Studies Institute; Dr. Robertson, Deputy Director, CSI and CAC Command Historian; Lieutenant Colonel (Retired) Steven E. Clay, Chief, Research and Publications Team; and Major (Retired) Ken- dall D. Gott, Supervisory Historian, Research and Publications Team, all helped usher this paper along with sage advice and needed corrections. On the production side, it was my great good luck to have Robin Kern to make the maps; she did a wonderful job. Likewise, two Combat Studies Institute editors, Angela Bowman and Mike Brooks, did remarkable work in clarifying my muddled thoughts, tightening my writing, preparing the manuscript for publication, and generally saving me from countless mis- takes. I cannot thank them, and everyone else who helped on this project, enough. Of course, any mistakes herein are mine and mine alone. Lastly, my wife Terrie and my sons Dominic and Anthony endured a cross-country move so that I could come to the Combat Studies Institute to work on this project. Their sacrifices made all of this possible, and I could not do it without them. v Contents Foreword ........................................................................................................iii Acknowledgements .........................................................................................v List of Maps ...................................................................................................ix Introduction .....................................................................................................1 Borders in the War ........................................................................1 Sanctuaries and Modern History ..................................................6 American Traditions .....................................................................8 Two Case Studies ..........................................................................9 Chapter 1. Vietnam .......................................................................................15 Indications ..................................................................................15 The Dimensions of the Problem .................................................18 First Options ...............................................................................21 Airpower .....................................................................................25 Pacifi cation and Ground Incursions ............................................30 Ending the War ...........................................................................36 Chapter 2. Soviet–Afghan War .....................................................................49 Shock ..........................................................................................49 Background .................................................................................50 The Resistances and Their Friends .............................................52 The Borders ................................................................................55 Early Fighting, Early Adjustments .............................................58 Those Missiles ............................................................................64 Soviet Wtihdrawal, Afghanistan’s Half Victory .........................67 Conclusion ....................................................................................................79 Vietnam and Afghanistan Compared ..........................................79 Sanctuary Doctrine .....................................................................80 The Contemporary Picture ..........................................................82 What Can Be Done? ...................................................................85 Bibliography .................................................................................................91 About the Author .........................................................................................109 vii List of Maps 1. Vietnam and the Ho Chi Minh Trail Network ......................................... 17 2. The 1970 Cambodia Incursions ............................................................... 33 3. Santuaries on the Afghanistan / Pakistan Border .....................................51 4. Parrot’s Beak Region on Afghanistan / Pakistan Border ......................... 63 ix Introduction Borders in the War The very name the United States has given to its struggle against fundamentalist Muslim terrorists indicates that international borders do not confine the enemy. “The Global War on Terrorism” is just that, a war waged around the globe on a foe bound not by the strands of state or na- tion, but by a perverted and perverse ideology. Nevertheless, because the United States and its allies share a respect for the international system, they have chosen to fight this enemy primarily within the boundaries of two states: Afghanistan and Iraq. Despite their adherence to ideology, the terrorists understand and use the international system; despite their dismissal of nations and states for their version of one united pure religion, they gladly hide behind the veil of state boundaries. Some states oppose the terrorists but are incapable of completely stopping
Recommended publications
  • Operation Lam Son 719 Amid “Vietnamization” Strategy During Vietnam War
    International Journal of Social Science And Human Research ISSN(print): 2644-0679, ISSN(online): 2644-0695 Volume 04 Issue 07 July 2021 DOI: 10.47191/ijsshr/v4-i7-31, Impact factor-5.586 Page No: 1790-1798 Operation Lam Son 719 amid “Vietnamization” Strategy during Vietnam War Assoc. Prof. Nguyen Ngọc Dung1, MA. Nguyen Minh Son2 1University of Social Sciences and Humanities, Ho Chi Minh City, Vietnam;International Relations Program, Thu Dau Mot University, Binh Duong, Vietnam, 2Ph.D. student, University of Social Sciences and Humanities, Ho Chi Minh City, Vietnam\ ABSTRACT: Fifty years ago, Operation Lam Son 719 was organized by the US Army and the Army of the Republic of Vietnam (ARVN) to realize their scheme to cut off the Indochina battlefield separating the Vietnam revolutionary forces from the revolutionary movement of Laos and Cambodia. Based on historical evidence from previous Vietnamese and USA documents, this article aims to prove that Operation Lam Son 719 made many strategic mistakes in assessing the military power of ARVN and the revolutionary alliance of Vietnam - Laos – Cambodia during the Vietnam War, as well as the tactical mistakes on the battlefield of ARVN. The failure of Operation Lam Son 719 dealt a heavy blow to the Vietnamization strategy, showing the passive strategic approach in the Doctrine of Vietnamization. Operation Lam Son 719 played a big role in forcing the U S to agree to negotiate with Democratic Republic of Vietnam in Paris. KEYWORDS: Operation Lam Son 719, Nixon, Vietnamization, People’s Army of Vietnam (PAVN), Army of the Republic of Vietnam (ARVN).
    [Show full text]
  • US Involvement in the Vietnam War, 1954-75 Key Terms/Concepts
    US involvement in the Vietnam War, 1954-75 Key terms/concepts Key Events Colony A place controlled by another country, politically and economically 1954 Defeat at Dien Bien Phu leads to French Communist A communist government owns all the businesses and land in the country it controls. Everyone works withdrawal for the government. In return, the government provides everyone in the country with everything they need. 1956 Ndo Dinh Diem refuses to hold elections Dien Bien Phu A place in North Vietnam where the Vietnminh beat the French in battle 1961 President Kennedy increases US ARVN Army of the Republic of Vietnam - South Vietnamese army involvement in Vietnam Vietcong/NVA North Vietnamese Army 1963 Quang Duc, a Buddhist monk, sets fire to Accord A formal agreement himself in Saigon DMZ (demilitarised An area where all military activity is forbidden 1964 Gulf of Tonkin zone) Domino theory The fear that once one country falls to communism, others will follow 1964 Operation Rolling Thunder launched Limited war A war where a country supports a side in a conflict by, for example, sending them supplies and 1968 Battle for Khe Sanh and Teto Offensive training their troops, but not by sending any of their own troops to fight Referendum A countrywide vote on a single issue 1968 My Lai massacre Ho Chi Minh Trail The trail used by the Vietcong that runs through Laos and Cambodia from North Vietnam to South 1968 President Johnson decides not to run for a Vietnam. It was used to send supplies and support. second term and Nixon becomes President Guerrillas
    [Show full text]
  • Introduction
    Cambridge University Press 978-1-107-16192-4 — Saigon at War Heather Stur Excerpt More Information Introduction It was a tense week in Saigon in October 1974, when a South Vietnamese university student slipped into the office of the city’s archbishop to deliver a letter addressed to North Vietnamese youth. Archbishop Nguyen Van Binh was headed to the Vatican for an international meeting of Catholic leaders, and he promised the student he would hand the letter off to his Hanoi counterpart when he saw him at the conference. The letter implored North Vietnamese students to join southern youth in demanding an end to the fighting that the 1973 Paris Peace Agreement was supposed to have halted. Both the archbishop and the student risked arrest for circulating the letter. Authorities had raided the offices and shut down the operations of four newspapers that had published it. That the leader of South Vietnam’s Catholics would be involved in clandestine communication between North and South Vietnamese students would have been surprising in the early 1960s, but by the mid-seventies, many Vietnamese Catholics had grown weary enough of the war that they saw peace and reconciliation, even if under Hanoi’s control, as the better alternative to endless violence.1 Within days of the Saigon newspapers publishing the letter, splashed across the front page of the Washington Post was an Associated Press photograph of Madame Ngo Ba Thanh, a prominent anti-government activist, leading Buddhist monks and nuns in a protest against the war 1 Telegram from Secretary of State to All East Asian and Pacific Diplomatic Posts, Oct.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • Operation Barrel Roll
    In 1962, the United States began a “secret war” in Laos. The operation wasn’t revealed until 1970, by which time it con- sumed half of all US attack sorties in Southeast Asia. Barrel Roll By John T. Correll n early 1961, the hot spot of lead- ing concern in Southeast Asia was not Vietnam but Laos. The new US President, John IF. Kennedy, rated Laos as “the most im- mediate of the problems that we found upon taking office” in January. On March 23, Kennedy held a news conference, nationally televised, to talk about Laos. He pointed out the communist advance on a large map. The Pathet Lao insur- gents, supported by the Russians and the North Vietnamese, had captured the northeastern part of the country. “Laos is far away from America, but the world is small,” Kennedy said. “The security of all Southeast Asia will be endangered if Laos loses its neutral independence. Its own safety runs with the safety of us all, in real neutrality observed by all.” In itself, Laos had little strategic im- portance. It was remote and landlocked, with a population of only two million. However, it shared borders with six other countries and had traditionally served as a buffer zone between the more powerful neighboring states. Thousands of ancient stone jars dot the plains in the center of Laos. The real concern about Laos was that the insurgency would spread and destabilize the rest of the region. “If the group, about 750 people, left promptly, pilots flying air support for the Laotian communists [are] able to move in and but no more than 40 of the 7,000 North ground forces.
    [Show full text]
  • The Ho Chi Minh Trail Directions: Read the Paragraphs Below and Study the Map Carefully
    aran-0622-ir 11/15/01 3:05 PM Page 51 Name Date GEOGRAPHY APPLICATION: LOCATION CHAPTER 22 The Ho Chi Minh Trail Directions: Read the paragraphs below and study the map carefully. Then answer Section 4 the questions that follow. he Ho Chi Minh Trail developed from a net- North Vietnam’s Inroads into South Vietnam Twork of existing hidden jungle paths. During the 1960s, it became the main route used by North Vietnam to get troops and supplies into South CHINA Vietnam in support of the Vietcong’s fight against South Vietnamese troops and their U.S. allies. The NORTH trail was named for Ho Chi Minh, the leader of VIETNAM North Vietnam at the time. When North Vietnamese soldiers were wounded, they were transported up the trail for treatment. r e v Gulf of Tonkin U.S. and South Vietnamese troops tried repeat- i R g edly to cut or destroy this lifeline. They drenched n o LAOS k the surrounding jungle with defoliants to kill trees e and other vegetation. This effort failed, and North M Vietnam continued to use the trail. Invasion DEMILITARIZED ZONE (DMZ) The Tet Offensive of early 1968 showed how of Laos determined North Vietnam was. The North Hue Da Nang Vietnamese and the Vietcong launched simultane- Ho Chi Minh Trail ous raids on provincial capitals and major cities THAILAND Quangngai throughout South Vietnam at the beginning of Tet, the lunar new year celebration. The U.S. Embassy Pleiku in Saigon was attacked, as were many other suppos- edly secure sites. The planning and coordination Quinhon r e SOUTH needed to carry out such an action stunned v i VIETNAM Americans in Vietnam and in the United States.
    [Show full text]
  • The Ho Chi Minh Trail SecOns: the Ho Chi Minh Trail Was the Route from North Vietnam to South
    JULY 2019 SUPPLEMENT VOL 82.5 Chapter 16 Newsleer Organizaon and Responsibilies: Editor: Glen Craig The Ho Chi Minh Trail Secons: The Ho Chi Minh Trail was the route from North Vietnam to South Message from the President: Stephen Durfee Vietnam thru Laos and Cambodia that North Vietnam used to Treasurers Report: Willi Lindner supply the Viet Cong and the North Vietnamese Army in South Vietnam with Weapons, Ammuni on and other supplies. Sec. Rpt (Staff Meeng Minutes): Mike Barkstrom Sick Call/Obituary: Chaplain Butch Hall Blast from the Past: Glen Craig Special Recognion: Mike Barkstrom Upcoming Events: Mike Barkstrom Calendar: Stephen Durfee Human Interest Story: Chapter at large SFA Naonal HQ Update: Stephen Durfee Aer Acon Report: Jim Lessler Membership Info: Roy Sayer Adversements: Glen Craig Suspense: Newsleer published (Web): 1st of each odd numbered month Input due to editor: 20th of each even numbered month Dra due to President: 27th of each even numbered month Final Dra due 29th of each even numbered month I thought this was interesng and wanted to share it with everyone. I hope you enjoy it. Legend of the Ho Chi Minh Trail Ho Chi Minh Trail Aug14, 2012 Please ask, about our Ho Chi Minh Trail tours! Page 1 Ho Chi Minh trail, painng by Veteran Larry Chambers The Legend of the Ho Chi Minh trail, there are few brand names to match that of the Ho Chi Minh Trail, the secret, shiing, network of deep jungle tracks that led to the Victory for Vietnam war. SA 2 Surface to Air missile, Ho Chi Minh trail Southern Laos, Ho Chi Minh trail Huey helicopter used in the Lamson bale at the Ban Dong war museum Well here I sit in Laos again, I have been pung around the place on and off for 10 years now.
    [Show full text]
  • Applying Irregular Warfare Principles to Cyber Warfare
    Soldier from 3/187th Infantry, 101st Airborne Division, out of Fort Campbell, Kentucky, sets up SATCOM to communicate further with key rear elements as part of search and attack mission in area of Narizah, Afghanistan, July 23, 2002 (U.S. Army/Todd M. Roy) Applying Irregular Warfare Principles to Cyber Warfare By Frank C. Sanchez, Weilun Lin, and Kent Korunka he cyberspace threat exists in a cyberspace and cyberspace threats that and can foresee, rapidly respond to, realm that does not conform to are initiated by faceless, borderless, and and counter cyberspace threats, the T the physical limits of land, sea, sometimes nationless enemies. These U.S. military’s strategy and approach to air, and space. Unlike these traditional enemies manifest in a domain neither cyberspace must adapt and incorporate domains, cyberspace fosters an unpre- confined nor governed by the tradi- unconventional approaches and hybrid dictable threat that can adjust, morph, tional norms and rules of war, which warfare into its operational capability. and reproduce without a national the broader military has no experience Despite its importance, the Nation’s identity or face.1 The challenge of the undertaking. To ensure the United leaders, strategists, and military planners military is to posture its approach to States maintains cyberspace dominance struggle to understand how cyberspace operations (CO) fit into national security as an instrument of national policy. A Commander Frank C. Sanchez, USN, is an Action Officer on the Joint Staff J32, Intelligence, significant shortcoming is due to the Surveillance, and Reconnaissance Operations. Major Weilun Lin, USAF, is Chief of the Central and leaders’ lack of experience and basic South Asia Branch, Joint Cyberspace Center, U.S.
    [Show full text]
  • DRAFT: DO NOT CITE WITHOUT PERMISSION 1 Breaker of Armies: Air Power in the Easter Offensive and the Myth of Linebacker I
    DRAFT: DO NOT CITE WITHOUT PERMISSION Breaker of Armies: Air Power in the Easter Offensive and the Myth of Linebacker I and II Phil Haun and Colin Jackson Abstract: Most traditional accounts identify the Linebacker I and Linebacker II campaigns as the most effective and consequential uses of U.S. air power in the Vietnam War. They argue that deep interdiction in North Vietnam played a central role in the defeat of the Easter Offensive and that subsequent strategic attacks on Hanoi forced the North Vietnamese to accept the Paris Accords. We find that these conclusions are false. The Linebacker campaigns were rather ineffective in either stopping the Communist offensive or compelling concessions. The most effective and consequential use of U.S. air power came in the form of close air support and battlefield air interdiction directly attacking the North Vietnamese Army in South Vietnam. The success of these air strikes hinged on the presence of a U.S.-operated, tactical air control system that incorporated small numbers of ground advisors, air liaison officers, and forward air controllers. This system, combined with abundant U.S. aircraft and a reasonably effective allied army, was the key to breaking the Easter Offensive and compelling Hanoi to agree to the Paris Accords. The effectiveness of CAS and BAI and the failure of interdiction and strategic attack in the Vietnam War have important implications for the use of air power and advisors in contemporary conflicts in Iraq, Syria, and Afghanistan. Most accounts of U.S. air power in the latter phases of the Vietnam War revolve around the Linebacker I and II campaigns of 1972.1 While scholars offer a range of explanations for the success of these campaigns, the U.S.
    [Show full text]
  • Maritime Irregular Warfare
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Characterizing and Exploring the Implications of MARITIME IRREGULAR WARFARE MOLLY DUNIGAN | DICK HOFFMANN PETER CHALK | BRIAN NICHIPORUK | PAUL DELUCA Prepared for the United States Navy Approved for public release; distribution unlimited NATIONAL DEFENSE RESEARCH INSTITUTE The research described in this report was prepared for the United States Navy.
    [Show full text]
  • Fourth-Generation War and Other Myths
    FOURTH-GENERATION WAR AND OTHER MYTHS Antulio J. Echevarria II November 2005 Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. This publication is a work of the United States Government, as defined in Title 17, United States Code, section 101. As such, it is in the public domain and under the provisions of Title 17, United States Code, section 105, it may not be copyrighted. ***** The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government. This report is cleared for public release; distribution is unlimited. ***** This monograph is an expanded version of an article entitled "Deconstructing the theory of Fourth-Generation War," published in the August 2005 symposium of Contemporary Security Policy. ***** Comments pertaining to this report are invited and should be forwarded to: Director, Strategic Studies Institute, U.S. Army War College, 122 Forbes Ave, Carlisle, PA 17013-5244. ***** All Strategic Studies Institute (SSI) monographs are available on the SSI Homepage for electronic dissemination. Hard copies of this report also may be ordered from our Homepage. SSI’s Homepage address is: www.StrategicStudies Institute.army.mil. ***** The Strategic Studies Institute publishes a monthly e-mail newsletter to update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming conferences sponsored by the Institute. Each newsletter also provides a strategic commentary by one of our research analysts.
    [Show full text]
  • 1966 Vietnam Combat Operations
    VIETNAM COMBAT OPERATIONS – 1966 A chronology of Allied combat operations in Vietnam 1 VIETNAM COMBAT OPERATIONS – 1966 A chronology of Allied combat operations in Vietnam Stéphane Moutin-Luyat – 2009 distribution unlimited Front cover: Slicks of the 118th AHC inserting Skysoldiers of the 173d Abn Bde near Tan Uyen, Bien Hoa Province. Operation DEXTER, 4 May 1966. (118th AHC Thunderbirds website) 2 VIETNAM COMBAT OPERATIONS – 1966 A chronology of Allied combat operations in Vietnam This volume is the second in a series of chronologies of Allied headquarters: 1st Cav Div. Task organization: 1st Bde: 2-5 combat operations conducted during the Vietnam War from Cav, 1-8 Cav, 2-8 Cav, 1-9 Cav (-), 1-12 Cav, 2-19 Art, B/2-17 1965 to 1973, interspersed with significant military events and Art, A/2-20 Art, B/6-14 Art. 2d Bde: 1-5 Cav, 2-12 Cav, 1-77 augmented with a listing of US and FWF units arrival and depar- Art. Execution: The 1st Bde launched this operation north of ture for each months. It is based on a chronology prepared for Route 19 along the Cambodian border to secure the arrival of the Vietnam Combat Operations series of scenarios for The the 3d Bde, 25th Inf Div. On 4 Jan, the 2d Bde was committed to Operational Art of War III I've been working on for more than conduct spoiling attacks 50 km west of Kontum. Results: 4 three years, completed with additional information obtained in enemy killed, 4 detained, 6 US KIA, 41 US WIA.
    [Show full text]