Special Warfare The Professional Bulletin of the John F. Kennedy Special Warfare Center and School

Thinking Outside the Box

PB 80Ð97Ð1 Winter 1997 Vol. 10, No. 1 From the Commandant Special Warfare

In this issue of Special Warfare, Lieu- tenant Colonel Kalev Sepp examines the Army’s efforts to plan for the Army After Next. He points out that those efforts demand that military planners, trained to work within established definitions and published doctrine, develop a perspective of war that is more comprehensive than our current view. Certainly, doctrine is valuable as a basis for our training and operations. But in developing concepts for the future, we can- not rely completely on what is already established. Occasionally we need to step outside the realm of the familiar and do what Sepp and others have termed “think- ing new technologies and techniques and ing outside the box.” adapting them to our use. Charles Elliott The ability to develop creative solutions details a procedure used during Operation to problems and to deal with ambiguous sit- Uphold Democracy in Haiti to assess the uations has always been a hallmark of SOF, need for SOF in various regions of Haiti. and this ability will serve us well in the This procedure combined new technology future. In fact, Sepp suggests that SOF is with the techniques of quantitative analy- the type of force that part of the Army will sis. Major Jon Custer explains how tech- need to be by 2010, and that the Army nology is being used in the Warfighter would do well to follow SOF’s example in its exercise to create realistic scenarios that organization, selection and training. Corpo- not only allow SOF to develop their skills ral Len Butler’s report of SF activities in but also afford conventional forces a Bosnia serves as an indicator of the unique opportunity to work with SOF. strengths that SOF and similar organiza- To keep pace with the current environ- tions could bring to future operations. ment, we must train for our assigned mis- SOF must continue to be receptive to sions and be prepared to execute them on new ideas, and this issue of Special War- demand. To prepare for the future, we fare offers several new points of view. must anticipate demands yet unspecified. Among these is Dr. Robert Bunker’s view If we are to succeed, SOF and the entire of the terrorist as a post-Western form of defense establishment must encourage, soldier in terms of both his war-fighting develop and utilize the ability to think orientation and his level of technical outside the box. sophistication. In the article following Bunker’s, Tim Thomas discusses the Russian concept of information activities and explains several differences between the Russian concept and our concept of psychological opera- Major General William P. Tangney tions. Thomas suggests that we can learn much from the Russian viewpoint. Thinking outside the box includes learn- PB 80Ð97Ð1 Contents Winter 1997 Special Warfare Vol. 10, No. 1

Commander & Commandant Major General William P. Tangney Features Editor 2 Preparing for 2010: Thinking Outside the ‘War Box’ Jerry D. Steelman by Lieutenant Colonel Kalev I. Sepp Associate Editor 7 The Terrorist: Soldier of the Future? Sylvia W. McCarley by Dr. Robert J. Bunker Graphics & Design 12 Russian Information-Psychological Actions: Implications Bruce S. Barfield for U.S. PSYOP Automation Clerk by Timothy L. Thomas Gloria H. Sawyer 20 Special Forces and Warfighter: Preparing for BCTP by Major Jon M. Custer 28 Quantitative Analysis in Haiti: Allocation of SOF Assets by Charles W. Elliott

V E AS R I RT T A E S LI B E T 33 Special Forces in Bosnia: Versatile and Effective

Special Warfare is an authorized, official quarterly of the by Corporal Len Butler United States Army John F. Kennedy Special Warfare Center and School, Fort Bragg, North Carolina. Its mission is to promote the professional development of special- operations forces by providing a forum for the examination of established doctrine and new ideas. Views expressed herein are those of the authors and do not necessarily reflect official Army position. This publication does not supersede any information presented in other official Army publications. Articles, photos, artwork and letters are invited and should be addressed to Editor, Special Warfare, USAJFKSWCS, Fort Bragg, NC 28307-5000. Telephone: DSN 239-5703, commercial (910) 432-5703, fax -3147. Special Warfare reserves the right to edit all material. Published works may be reprinted, except where copyrighted, provided credit is given to Special Warfare and the authors. Official distribution is limited to active and reserve special-operations units. Individuals desiring private subscriptions should forward their requests to: Superintendent of Documents, U.S. Government Printing Office, Washington, D.C. 20402.

By Order of the Secretary of the Army: Dennis J. Reimer General, United States Army Departments Chief of Staff 34 Enlisted Career Notes Official: 35 Officer Career Notes 36 Foreign SOF Joel B. Hudson Administrative Assistant to the 38 Update Secretary of the Army 40 Book Reviews 03378 Headquarters, Department of the Army Preparing for 2010: Thinking Outside the ‘War Box’

by Lieutenant Colonel Kalev I. Sepp

here is already a great deal of debate (based on projections of the world political over the issues that will shape the array) and the Army’s organization and TArmy after the year 2010. This missions within a smaller and more thor- debate will help create the Army After oughly joint armed forces. One point not in Next; that is, the Army after Force XXI. contention is that the Army will be a com- Central to this debate is the need to define ponent of the future security force that will the nature of future war and of future war- serve as the tool of our future strategies. fare — the ways in which we will wage war. The definitions that evolve will be crucial Force components in positioning the Army for war-fighting in From the continuing dialogue, an image 2010 and beyond. of the Army component of these future In seeking these definitions, we must security forces is now emerging — an Army constantly admonish ourselves to see war with heavy, light and special elements. differently than it is now perceived by the There are several possible major security American military — in other words, we competitors, or competitive coalitions, that must “think outside the box.” This charge is may rise to challenge the United States in difficult to fulfill, because most national- the next two decades, China and Russia security personnel are rightly dedicated to chief among them. To defend against these fulfilling their requirements strictly within opponents and to overmatch any potential the parameters of published doctrine. enemies in non-nuclear general war, or But current doctrine is insufficient to simply put, conventional war, part of our answer the question, “What military force Army must continue to perform as a heavy must be available to help secure our force — with tanks, armored artillery, national interests in the future?” As we mechanized infantry and attack aviation. debate the issue of how reduced military This heavy force will be complemented by capabilities might handle simultaneous the Army’s light force. regional conflicts, there are two main It is likely, however, that contests with points of contention: the predicted threats our major competitors or coalitions will be played out through proxies in the Third This article is adapted from remarks pre- World. These indirect confrontations will sented by the author at a Yale-U.S. Military be reminiscent of the widespread uncon- Academy strategy workshop and at the JFK ventional struggles, or “wars of national Special Warfare Center and School’s “Army liberation,” that took place during the Cold After Next” conference. Both events were War. held in November 1996. — Editor

2 Special Warfare It is also reasonable to believe that the While OOTW include peacekeeping, U.S. will actively seek to maintain the peace enforcement and peace building, existing nation-state system against the there are other associated peace-promo- contrary forces of regional Balkanizations, tion activities such as disaster relief, civil strife, criminal enterprises, rogue- counterdrug operations, demining, and state dictators, and resurgent ethnic and nation assistance — the replacement term religious movements. Forecasts of wide- for the arguably more appropriate spread decline, such as the pop futurism of “nation-building.” Robert Kaplan and Alvin and Heidi Toffler, Much closer to (and often slightly across) must not distract our attention from the the threshold of violence are deterrence realities of geopolitics. and conflict-resolution missions: shows of If we do seek to maintain the existing force, strikes, raids, counterterrorism, nation-state system, the use of military counterproliferation and, of course, coun- force may not always be appropriate, but terinsurgency and support of insurgency. the use of military forces may often be These last two are often assigned to the essential. This concept is recognized in the realm of unconventional war and special current (and controversial) doctrinal term warfare. “operations other than war.” This term will Accepting this wide range of ambiguous probably soon become doctrinally obsolete, missions will require us to have a fuller but the components of OOTW will be rec- understanding of war than the concept ognized as separate doctrinal entities. now defined by the Army and, hence, New groupings will be created and will depicted to government policy-makers. include, as a minimum, “stability and sup- There are strong similarities between mil- port operations” — the title of the new itary operations other than war and the Army Field Manual 100-20 — and perhaps disappearing doctrinal term, “low-intensity “constabulary operations,” similar to the conflict,” or LIC. It can be argued that LIC British concept of “military assistance to was, in part, created during the Army’s civil authorities,” or the Marines’ “expedi- post-Vietnam reconstruction specifically to tionary warfare.” help the U.S. avoid another enervating

U.S. Marines on a weapons sweep during Operation Restore Hope in Somalia. Army PSYOP teams normal- ly accompanied the Marines to help convince residents to sur- render weapons.

Photo by Perry Heimer

Winter 1997 3 Vietnam-style war. The so-called Weinberg- and War, includes the threat of violence er doctrine drew a line across the spectrum and covert hostilities as types of war and of conflict, and LIC fell below the line, or acknowledges paramilitary and non-national, “outside the box.” In this arena of war — subnational, and transnational forces as where success is relative and not absolute, combatants. The draft version of Army where engagement is necessarily lengthy, Vision 2010 offers a striking and sophisti- and where the enemy’s center of gravity is cated projection of redefined Army mis- perhaps not a part of the enemy force at sions to enable engagement in a spectrum all — if the Army believed that it could not of crises, unconstrained by any arbitrary decisively win (in the classic sense of victo- line between peace and war. Less satisfac- ry), then it would not commit itself. tory are the inferences (there are no defin- itions) regarding war in Joint Vision 2010. Concept of war JV 2010 appears to present a paradox: War, as prescribed in the current FM The publication’s “war box” encompasses 100-5, Operations, and as essentially only conventional high-intensity conflict, understood by the Army, is still conflict presumably to help the U.S. avoid engage- between nation-states, fought with large- ment in what could be called unconven- unit regular forces. LIC and, by extension, tional war (a term never used in JV 2010). OOTW are some vague forms of “not-war.” But JV 2010 recognizes the possibility that Steven Metz has called for a “conceptual military forces may be sent outside the box expansion” of this range of conflict, which by our political leadership, and it deems John Guilmartin foresees as the most like- conventional forces fully adequate to per- ly venue of future U.S. engagements over- form unconventional tasks as well. This seems to echo Earle Wheeler’s 1962 In the U.S. Army, there are “crossover” “Design of Military Power,” which promised the conventional Army and the nation suc- organizations, such as military police, intel- cess in Vietnam. As the corporate con- sciousness of the military’s senior leader- ligence, engineer, aviation, medical and ship places Vietnam into the perspective of logistics units, that handily adapt to OOTW. a longer view of history, there will come — one must hope — a broader view of war. However, U.S. ambassadors and regional Force of the future commanders in chief regard special-opera- Within the Army of today, units and tions forces as their most valuable asset. organizations already exist that are closely tailored to the types of doctrinally margin- seas. Lawrence Freedman differentiates alized military operations that we antici- between “wars of necessity,” fought for pate. In fact, some of these units are cur- national survival, and the all-others cate- rently engaged in operations that are gory of “wars of choice.” Secretary of State remarkably similar. George Schultz recognized the limited use Inside U.S. embassies worldwide, of force to attain limited ends as “ambigu- defense attachés and officers of U.S. mili- ous warfare,” while acknowledging that tary groups, or MILGROUPs, work directly Americans are “uncomfortable” with such for their respective ambassadors. They conflicts. Certainly, Karl von Clausewitz, in integrate and coordinate military, diplo- his comprehensive explication of conflict in matic, economic and informational efforts On War, does not confine the concept to to effect the strategies that are necessary state-on-state contests, and Michael in achieving U.S. policy objectives. The Howard’s key defining word regarding war Army units most commonly employed by is “violence.” the embassies are special-operations The thoroughly Clausewitzian USSO- forces: Civil Affairs, Psychological Opera- COM Pub 1, Special Operations in Peace tions and Special Forces.

4 Special Warfare A soldier from the 3rd SF Group directs soldiers from Mali arriving in Liberia to begin a peacekeeping mis- sion. SF are often the com- mon element in multinational operations. Photo by Erick Saks CA is the lead agency in most nonlethal most directly responsible for the promulga- situations. CA personnel bring their exper- tion and execution of U.S. foreign policy tise from both our military and our nation- abroad when a state of declared war does al communities — in economics, govern- not exist, as has been the norm since 1945. ment, health and sanitation, public works In multilateral operations, SF teams are and safety, and civic planning. CA teams the common element uniting the various are masters of “stability operations,” a military players — all of whom will cer- soon-to-be resurrected and perfectly fitting tainly be present in future multinational concept. Appropriately, the majority of bil- interventions. lets in active-duty CA units are filled by In the U.S. Army, there are “crossover” Special Forces personnel. organizations, such as military police, Some military commanders think of intelligence, engineer, aviation, medical PSYOP as “loudspeakers and leaflets,” but and logistics units, that handily adapt to these are simply two of the tools of OOTW. However, U.S. ambassadors and PSYOP dissemination. PSYOP teams aid regional commanders in chief regard spe- in opinion-shaping, are proficient in mar- cial-operations forces as their most valu- keting and media communications, and able asset. are keenly aware of host-nation public Indigenous armed forces will be critical sentiment and perceptions. PSYOP in future scenarios. While unstable or involvement is necessary throughout an destabilized countries such as Botswana entire military campaign in order to effec- and Colombia are dealing with “the guys tively manage the beliefs and views of the with the Kalashnikovs” — narcotraffickers, target audience. pirates, bandits and insurgents — their SF are considered particularly useful militaries can be approached, guided, and because of their combination of military, remade into “engines of change” to nurture linguistic, cultural and technical skills. democracy and the idea of military subor- Equally as valuable is their detailed dination to civilian rule. Army SOF is the knowledge of the functions of the American element most accomplished to fill this embassies. It is our ambassadors who are influential role.

Winter 1997 5 More broadly, Army schools can have a have to be considered, and consulted, in powerful long-term impact. The School of devising the tools of future strategy. the Americas is acknowledged as a key fac- What requires no prediction is the future tor in the democratization of Latin Ameri- central purpose of the U.S. Army: to fight ca. The George C. Marshall Center in and win our nation’s wars, and to serve and Bavaria is attempting to serve a similar defend our Constitution, as guided by our role for the states of the former Soviet constitutional government. In this effort, Union. Perhaps a U.S. Army school devoted over the past two centuries, the U.S. Army to teaching military leadership could serve has freed more captive peoples, liberated as a potent vaccine against the rabies of more conquered lands, and ensured war on the continent of Africa. greater progress of democracy than any like institution in the planet’s history. RMA vs. AAN In the 21st century, the Army’s missions The success that SOF have achieved in may be accomplished less by campaigns OOTW represents what the Army would like the D-Day landing or Operation like to become in the 21st century. The Desert Storm than by operations other well-publicized Force XXI effort, tied to a than conventional war. Yet these OOTW perceived ongoing revolution in military missions will need to be as effective, as suc- affairs, is basically a wholesale digitaliza- cessful, and as just in their means and tion of the Army. Its goal is to gain a com- ends. Imagining the nature of war in the mon radio-wave battlefield awareness and year 2010 must begin with an understand- to accrue those efficiencies possible from ing of today’s wars — an understanding electronic standardization. Although this that requires a willingness to think outside undertaking is an essential endeavor, it the war box. represents an enhancement and transition of the force, not a fundamental change. Sometime around 2015 to 2025, the real Lieutenant Colonel Kalev revolutions will take hold. Combinations of I. Sepp teaches international beam weapons, power sources, robotics, and strategic history at the and artificial intelligence will bring the U.S. Military Academy at amplified man, envisioned in Robert Hein- West Point. He has served in lein’s Starship Troopers, strikingly close to the 82nd Airborne Division, reality, and the Army’s war box will have to 2nd Ranger Battalion, 7th extend into space. The Army intends for Special Forces Group, 11th Armored Caval- part of the Army After Next to become ry Regiment, and 2nd Infantry Division. He more like today’s SF — smarter, older, also served as a brigade adviser in El Sal- more mature, more culturally aware, and vador. Sepp holds an M.M.A.S. from the more broadly educated — able to handle Army Command and General Staff College, high technologies and diverse responsibili- and an A.M. from Harvard University, ties, whether working alone or in small where he is writing his Ph.D. dissertation teams, or while deployed for long periods in on the U.S. campaign in Central America, either conventional war or OOTW. 1979-91. A significant part of the Army’s future light force may be structured in the fashion described above. Unfortunately, this arrangement could create “roles and mis- sions” mayhem — perhaps a hyper- infantry forced to compete with Rangers and Special Forces, but lacking the full capabilities of either. The Marine Corps — a light force of note — is similarly prepar- ing for the next century. Accordingly, it will

6 Special Warfare The Terrorist: Soldier of the Future? by Dr. Robert J. Bunker

he terrorist bombing of the Centen- nial Olympic Park in downtown TAtlanta on July 27, 1996, represents yet another incident in a pattern of terror- ism taking place upon American citizens and upon the representatives and institu- tions of the government that serves them. “Atlanta” will now be added to our collec- tive memories and mentioned in muted tones, along with a growing roll call that includes TWA Flight 800,1 Dhahran, Okla- homa City, the World Trade Center, Locker- bie and Beirut. In dealing with these heinous crimes, we focus an enormous effort on identifying the perpetrators — who they are and the groups to which they belong. Now that domestic terrorism has become a reality, right-wing militias and radical Islamic sects receive equal attention. The groups DoD photo have strange sounding names: Hezbollah, U.S. and Saudi military personnel survey the damage to the Khobar Towers near Dhahran, Hamas, Viper and Freemen. They repre- Saudi Arabia. The facility was damaged by a terrorist bombing in June 1996. sent extremists of one kind or another, with little stake in or love for American society. While United States governmental

This article examines the nature of ter- rorists and terrorist groups and predicts the implications of future terrorists emerg- ing as “criminal soldiers.” Opinions expressed are the author’s and do not nec- essarily reflect the policies or positions of the Department of the Army or the Depart- ment of Defense. — Editor

Winter 1997 7 authorities attempt to identify who these who is not only non-Western, he is also people are, another equally important con- potentially post-Western in his war-fight- cern, what they are, is too often ignored. It ing orientation and in his level of technical is imperative that the U.S. special-opera- sophistication. For many, this perception tions community not make this oversight. may be both surprising and sobering. It Given the altered nature of the post-Cold reflects the brutal realities of today’s War security environment, asking the changing world — a world where narcocar- question “What is a terrorist?” should tels have gained the capacity to wage war become fundamental in our attempts to against legitimate governments, where better understand the future. The answer intrastate warfare has spread as nation- to that question will give the SOF commu- states continue to implode over many nity insights that can lead to a critical re- regions of the globe, and where competing evaluation of its perceptions of terrorists tribal and cultural groups select ethnic and of war-fighting in general. cleansing as their preferred method of set- Our current legal interpretations define tling disputes. a terrorist as a criminal. This must be a We may be able to accurately assess the correct assumption, because such a person technical sophistication of a terrorist by violates our conventions concerning the examining the following advanced war- conduct of modern warfare. A terrorist is fighting components that help to define his not viewed as a traditional soldier because capabilities: he is not a representative of a nation- • Organic stealth. Because a terrorist state’s military forces. A terrorist does not eschews the traditional symbols of a sol- wear the distinctive uniform of a soldier, dier and does not operate within the and he views all targets, including women boundaries of the Western-defined battle- and children, as legitimate. But the char- field, he is almost invisible to detection. acterization of a terrorist as both a crimi- And with his ability to blend into the civil- nal and a coward, echoed repeatedly by our ian populace of an urban environment, the political and military leadership, may be terrorist is a highly survivable military only partially true. asset, because what cannot be seen cannot be killed. The war-fighting advantage that Advanced form of soldier is gained by the terrorist is no different Like the Roman god Janus, a terrorist from one achieved by a high-technology also bears a second image: the image of an stealth fighter or bomber, but it is pur- advanced form of soldier. This is a soldier chased at a fraction of the cost. • Precision engagement. While we in the

High-technology munitions, such as this Tomahawk cruise missile, provide pre- cision forms of attack. Ter- rorists’ precision weapons are purchased at a fraction of the cost. DoD photo

8 Special Warfare A section of the fuselage from TWA Flight 800 is trans- ferred from a Navy recovery ship. The plane’s explosion has generated terror of strategic significance. Photo by Gordon Peterson West use high-technology precision-guided ing. However, because such an act intro- munitions, such as laser-guided bombs and duces the specter of further violence occur- Tomahawk sea-launched cruise missiles, to ring anywhere and anytime, “terror” is destroy our targets, terrorists have their generated in the minds of our citizens far own forms of precision weaponry. A truck- out of proportion to the terror caused by load of explosives detonated in front of a the initial terrorist act. Thus, an event that building, inside a building, or in a parking should be no more significant than a tacti- garage must be considered a precision form cal-level operation is elevated into an event of attack. Using a radio-controlled bomb in of strategic significance. a culvert over which a head-of-state’s • Environmental and resource conserva- motorcade is traveling, or smuggling plas- tion. Because terrorists engage in tactical tic explosives inside the luggage of an operations that assume strategic-level unsuspecting airline passenger represent importance, terrorists are able to accom- two other methods of precision engage- plish more with lower expenditures of vio- ment. The fact that terrorist capabilities lence than traditional nation-states can. can be purchased cheaply does not mean Mass industrial armies waste huge that they are inferior to Western methods amounts of human and materiel resources of launching precision strikes. in the conduct of war, and in the process • Information warfare. Terrorists are they severely degrade the environments extremely effective in conducting informa- within which they operate. Terrorist tion warfare. Their violent activities are groups are far more sophisticated in their routinely far less significant than the war-making approach. Rather than threat of further violence that the acts destroying peoples, governments, armies themselves create. Within the greater con- and the environment around them, the text of American society, the loss of TWA terrorists use precision in attacking the Flight 800 to a possible act of terrorism, ideological and sociological bonds that while a monumental tragedy to the friends hold a society together. and families of the citizens aboard, is irrel- • Internetted command and control. evant to our society’s continued function- Unlike conventional organizations, terror-

Winter 1997 9 ist groups organize themselves into small dominant form of modern political commu- cells. For the purposes of command and nity. But should that monopoly be shat- control, these cells interact in a web-like tered, nation-states would eventually cease fashion. The internetted structure offers to exist, in the same manner as did their terrorist groups distinct advantages over medieval and classical predecessors. conventional organizations that have more Besides its impact on the nation-state, traditional hierarchical structures. First, the emergence of a criminal soldier would terrorist groups tend to be highly entrepre- alter our perceptions of war and of terror- neurial in nature, which allows them to ism. First, we would have to rethink our quickly adapt to changing “battlefield con- basic definitions of terrorism. The presence ditions,” unlike the more rigid organiza- of an advanced form of soldier, incompati- tions they are opposing. ble with the institutions and the ethical Second, terrorist groups are immune to a system of modern Western civilization, decapitation attack, since no traditional would mean that war as we understand it hierarchical leadership is needed to coordi- is changing. Naturally, our perceptions of nate their actions. Third, the destruction of terrorist attacks upon our nation would a single terrorist cell will have little effect also have to shift. No longer would terror- upon the rest of the network. Finally, ist attacks be viewed as unrelated criminal incidents; rather, they might be perceived The war-making monopoly that is unique to as the opening battles in a global struggle over humanity’s future social and political nation-states is, for now, the underlying reason organization. This would be a struggle not they are considered the dominant form of mod- to determine a victorious nation-state or coalition, but to determine the social and ern political community. But should that political structure that would succeed the nation-state. monopoly be shattered, nation-states would Second, we would have to re-examine our eventually cease to exist, in the same manner as perceptions concerning state-sponsored ter- rorism. Viewed from our new perspective, did their medieval and classical predecessors. terrorist organizations would likely repre- sent an advanced form of mercenary group, because we do not fully understand the one not representative of the minor groups decision-making process of the network, we that have existed during the last few cen- may fail to recognize the terrorist network turies of history. The new terrorist groups in the traditional sense. As a result, acts of would have parallels to those mercenary terrorism may go unnoticed. In reality, the companies that dominated warfare during current rash of church burnings in the the early modern European era. South may be the work of terrorists. The less-technical explosive devices and Although no conspiracy has been found, the small arms employed by early terrorist the unrelated node that each burning rep- groups are now giving way to advanced resents may ultimately be recognized as munitions, precision-guided missiles and part of a more insidious scenario. computer viruses. The 1995 Sarin nerve- gas attack in the Tokyo subway, while it War-fighting implications was not undertaken by a state-sponsored The emergence of a criminal soldier, one group, has shown that given sufficient who is more advanced in technology and funding, many of these groups may soon be who possesses more war-fighting capacity capable of fielding weapons of mass than the traditional soldier fielded by destruction. nation-states, is cause for immense con- Third, we can expect the distinction cern. The war-making monopoly that is between crime and war to become blurred unique to nation-states is, for now, the as an outcome of the development of this underlying reason they are considered the new form of soldier. State-sponsored ter- rorism in the late 1960s initially broke

10 Special Warfare down this barrier. Since that time, the dis- increasingly called upon to respond to inci- tinction has been further eroded by non- dents of domestic terrorism, to shield our national groups (such as narcocartels, reli- foreign bases from terrorist attack, and to gious sects, and ethnic clans) that engage engage in the war against drug cartels. in private wars against nation-states. In During times of uncertainty, such as those some failed nation-states, it is already we now face, we will increasingly place the impossible to distinguish between the burden of our country’s defense upon our criminal activities and the war-making elite troops. We will have no choice, for in activities of local warlords and regional the battle to determine the future social groups. and political structure of humanity, second best is unthinkable. Conclusion The emergence of the terrorist as a crim- inal soldier is likely to have profound Dr. Robert J. Bunker is an adjunct pro- effects upon future American society and fessor in the National Security Studies government. Some of those effects are Program at California State University - apparent today, now that the war over San Bernardino; and a professor in uncon- future social organization, already being ventional warfare at American Military waged across much of the globe, is begin- University, Manassas Park, Va. His ning to take place on American soil. Direct research focuses on the national-security social costs can be measured by our citi- implications of emerging forms of warfare, zens who have been killed or maimed, our and on the influence of technology upon burned-out federal buildings, our loss of warfare and political organization. productivity resulting from communication Bunker’s writings have appeared in and transportation disruptions, and our Parameters, Military Review, Airpower resource expenditures for counterterror- Journal, The Marine Corps Gazette, Mili- ism, such as the $227 million to protect the tary Intelligence and Armed Forces Jour- Olympic Games in Atlanta. nal International. Indirect social costs will be difficult to calculate, but in the long term they may be Notes: 1 Even if the destruction of TWA Flight 800 was due more debilitating. They represent the ero- to mechanical failure, the psychic damage has already sion of immaterial goods such as the sta- been done. bility of our social institutions, the trust between our government and its citizens, and the basic psychological health of our people. Further, new debates can be expect- ed to arise over the rights of citizens vs. the need for new security measures. While such measures will better protect our peo- ple, they are bound to infringe upon the very rights that we so cherish. By necessity, the role of special-opera- tions forces in combating terrorism will increase. Because terrorists represent an advanced form of soldier, our conventional forces will be ineffective against them. Only by fielding our own advanced form of soldier, supported by an array of emerging technologies, will our nation have the capa- bility to defeat this enemy. In the future, we should not be surprised if the U.S. Special Operations Command is

Winter 1997 11 Russian Information-Psychological Actions: Implications for U.S. PSYOP

by Timothy L. Thomas

t is July 18, 1999, and a battle is Defense headquarters in Moscow, coupled with psychological opera- raging somewhere on Russia’s Russian specialists in information- tions, or PSYOP. For the short term, Isouthern border. During a lull in psychological activities coordinate at least, these Russian theories may the fighting, Russian loudspeakers operations and project their impact be only wishful thinking — the emit provocative messages (pro- on the war effort. Years before the recent conflict in Chechnya, during duced through voice-synthesis current conflict, computer-stealth which Russian forces struggled to processors) designed to influence or viruses had been implanted into maintain parity with Chechen “hypnotize” enemy forces. Holo- military sales systems located at rebels, indicates that Russian grams, designed to induce fear or enemy command-and-control units. armed forces have significant prob- uncertainty, display messages and As part of their present plan, the lems with which they must contend images embellished with cultural Russian specialists activate these before they can focus on informa- and religious connotations. One spe- viruses; they conduct “reflexive con- tion-psychological activities. cial hologram, depicting specific trol” and information-warfare oper- However, Russia, like other coun- combinations of colors and num- ations against enemy decision-mak- tries, is seriously studying the bers, reportedly causes some bodily ers; and they transmit morphed impact of the information age on its functions to shut down. Titanium images over the aggressor’s televi- military forces. Russian military robots move about the battlefield, sion networks to manipulate the planners understand that in the shooting leaflets with instructions enemy’s perceptions. information age, everyone is vulner- to the enemy on how to surrender. These specialists also consult with able to some degree. Developments As the fighting resumes, multiple- doctors to ascertain the extent of psy- in information technology will rocket launchers and artillery rock- choses that might be imposed upon enable some technologically defi- et attacks pose yet another type of enemy forces and the number of cient countries to quickly catch up psychological war — one based on depression-induced injuries that to those with more technologically the shock effect of tons of explosive might occur. After gathering this advanced information networks. ordnance. information, the specialists plan Russian military theorists have Meanwhile, at the Ministry of additional information-psychological always been particularly sensitive strikes. As the battle abates on the to the enemy’s ability to control, This article discusses the Russian giant computer-activated TV screens, through either propaganda or the concept of information activities and the loudspeakers once again begin manipulation of information, the the increasing importance of infor- broadcasting soothing messages. psyche of Russian soldiers. They mation operations. Views expressed This future-war scenario com- consider the concept of “moral-psy- are those of the author and do not bines a number of Russian theories chological” preparation of the sol- reflect the official policy or position about 21st-century information dier to be a Russian principle of war. of the Department of Defense or the operations and offers suggestions as In the past, political commissars U.S. government. — Editor to how these operations might be were charged with maintaining the

12 Special Warfare ideological, moral and psychological military operations. In reality there as a means of controlling society stability of the soldier. But Russian is no war or armed conflict, but in and the armed forces. The transi- society is now in a transition period, fact aggression has already been tion from communism to democracy and Russian sociologists consider unleashed. … Therefore, if mea- has left an absence of ideology, but it the populace and the armed forces to sures to counteract information- has created an emphasis on a new be psychologically unstable and psychological aggression are not concept: the information security of extremely vulnerable to foreign- developed and mastered in a prac- society. To adapt to this new con- based and foreign-run information tical manner ahead of time, the con- cept, the Russians have instituted operations. The requirement to sequences for the country could several changes: First, the informa- counteract the information-psycho- turn out to be extremely serious.1 tion-psychological struggle has logical capability of the enemy has When Russia admits that one of replaced the propaganda-agitation become even more important. As one its principles of war is vulnerable struggle of Marxism-Leninism.2 Russian author has noted: to the developing field of informa- Second, some theorists now con- Countering information expan- tion operations, the whole world sider psychological operations to be sionism and protecting the national should take notice — there may be an independent form of military interests of Russia are to a certain lessons for all of us to learn. activity that requires specialized extent synonymous. … More likely personnel and training. Third, as a now is a situation in which “quiet” General definitions consequence, the Russian armed aggression may be unleashed … In the former Soviet Union, the forces may be developing a special several weeks, months or even years Communist Party used propaganda military occupational specialty before the beginning of full-scale devoted to psychological confronta- tion. Fourth, some Russian officers have come to view the information- psychological struggle as an integral part of information warfare. These changes will also have an impact on the future of U.S. PSYOP.3 During the Cold War, it was extremely difficult to obtain infor- mation on the Soviet/Russian con- duct of PSYOP. For years, the Rus- sians held all of their archives, force structure and operating procedures under tight secrecy. Only through the recent declassification of several Russian journals has more informa- tion become available. Since about 1992, the Russians no longer consider information regard- ing the existence and the training of their PSYOP units to be classified. Still, acquiring knowledge about these units and their actions remains difficult. Some sources believe that the military’s main intelligence directorate controls these organizations, which may explain the scarcity of information. The Russian military does not use the term “psychological opera- tions.” In Soviet times, these opera- Russian military theorists have always been sensitive to enemy control of the psyche of Russian soldiers. tions were called “special propa- They consider “moral-psychological” preparation of the soldier to be a Russian principle of war. ganda.” Russian military authors

Winter 1997 13 use the term “information-psycho- includes leaflets, loudspeakers and logical terror produced by artillery logical actions” to refer to what radio/TV transmissions. On occa- and air attacks have long been con- Westerners call PSYOP-related sion, the Russians use TV and sidered by some leadership ele- activities. Therefore, the term radio transmissions to override the ments to be a psychological action. “information-psychological actions” signal of an enemy system. An offi- When Russian tanks attacked the and the more familiar U.S. term cial Russian government signal is Russian parliament building in “PSYOP” are used interchangeably then used to transmit either overt October 1993, the primary purpose throughout this article. or covert information to fool or mis- of the attack was to inflict shock or lead enemy forces. a psychological effect on the occu- Information operations Some nontraditional uses of pants of the building.4 When in The Russian concept of informa- information-psychological actions January 1996, in the town of Per- tion-psychological actions usually have also worked quite well. For vomaiskaya, Russians attacked example, the shock and the psycho- Chechen rebels with massive artillery and multiple-rocket launcher strikes, the Russian com- mander described the action as a form of psychological warfare. Reflexive control Another nontraditional infor- mation-psychological action is the Russian concept of reflexive con- trol, a “branch of the theory of con- trol related to influencing the decisions of others. In a military context, it can be viewed as a means for providing a military commander with the ability to indirectly maintain control over his opponent commander’s deci- sion process.”5 Reflexive control is the process of manipulating infor- mation so that one’s enemy will be compelled to take actions favor- able to one’s own side. Reflexive control is somewhat foreign to a U.S. audience. Rus- sians employ it not only on the strategic, operational and tactical levels of warfare, but also on the strategic level, associated with internal and external politics of the country. Of course, reflexive control has not always been used exclu- sively to Russia’s benefit. Some Russians perceive the Strategic Defense Initiative, or SDI, as a political maneuver designed to compel the Soviets to respond according to a plan favorable to the DoD photo U.S. In its efforts to keep pace with Some Russians believe that the U.S. Strategic Defense Initiative was a reflexive-control measure designed America’s achievements in the SDI to compel the Soviet Union to spend vast sums of money on its own missile-defense system.

14 Special Warfare The Basic Content of Russian Information-Psychological Warfare

Analyzing the moral-psychological environment in Russia, in strategic areas, on the operational axes and in the areas where operations are taking place. Seeking, collecting, analyzing and summarizing information about the capabilities of potential participants in conflict.

Forecasting the probable nature of and possible impact of enemy PSYOP on the Russian forces and population.

Halting (or mitigating the effects of) enemy PSYOP on the strategic level, using all branches of service, branch- es of arms and special forces. Carrying out measures to counteract the constant and large-scale ideological and info-psychological influence on the Russian forces and the Russian population. Neutralizing the negative consequences of the enemy’s influence on the consciousness, the morale and the mental state of service personnel.

Constantly shielding the troops and the populace from info-psychological influences.

Preparing the forces and the means to conduct info-psychological warfare.

Carrying out info-psychological and special operations to lower the morale and the psychological state of the enemy’s forces and population, and to demoralize and disinform them.

Exerting constant info-psychological influence on the enemy’s personnel and population.

Conducting psycho-energetic warfare and other types of nontraditional influence on the consciousness and the mental state of the enemy. Developing the methodology and the theory of info-psychological warfare, and developing recommendations and proposals for government agencies and for military leadership. arena (or at least what we said (deception and disinformation).6 focused on reflexive control.7 He were our achievements), the Soviet In the early 1900s, there was actu- offered several principles for “con- Union exhausted itself economical- ally a Russian military maskirov- trol of the enemy.” First, the ini- ly. Some Russians now question ka school that became the base of tiator must anticipate the whether the concept of information maskirovka thinking from which enemy’s response to the condi- warfare is simply another U.S. manuals for future generations tions he plans to impose. Second, attempt to reflexively control them were created. The school was dis- the initiator should anticipate and to persuade them to invest banded in 1929. that the enemy may uncover the vast sums of money in a subject A recent flurry of articles on activity and institute his own area supposedly beyond both U.S. reflexive control has appeared in countercontrol measures. Third, and Russian technological reach in Russian military writings, indi- the initiator should be aware of the near future. cating that the maskirovka theory the technical level of the enemy’s The Russian armed forces, at is alive and that it is undergoing combat assets, especially recon- the tactical and operational levels, renovation to adjust to current naissance (the higher the level of have long studied the reflexive- conditions, including the intrica- technology, the more likely it is control concept for its value both cies of the computer age. that the disinformation actions in controlling enemy decision- Major General M. Ionov will be exposed). Fourth, the ini- making processes and in develop- (retired) wrote an article in tiator should consider the effect of ing techniques for maskirovka Morskoy Sbornik (1995) that using harsh forms of pressure

Winter 1997 15 against the enemy, taking into forces in balance. tions upon the moral-psychological account social elements and intel- According to one Russian ana- preparation of the soldier. lectual, psychological, ethical and lyst, the events of the 1990s have A system of information-psycho- ideological factors.8 caused a “cardinal change in the logical security is important because: military-political situation in the In the past half century the Psychological support world, and also in the political, potential for working on the con- Many Russian sociologists social-economic, and moral-psycho- sciousness, psyche, or morale of a believe that the Russian armed logical situation inside countries. person, society, or the composition forces (in part because of their lack The modern tendency in the devel- of an armed force has grown dra- of moral-psychological training) opment of forces, means, and capa- matically. One of the main reasons are now vulnerable to an informa- bilities of armed combat … has is the considerable success achieved tion-psychological attack. In the sharply grown in connection with by many countries in their system- past, propaganda departments in these roles, as has the significance atic research in the areas of psy- the school system and in the armed of the laws of the course and the chology, psychotronics, parapsy- forces had fulfilled the moral-psy- outcome of war and their depend- chology, other new psychophysical chological training role. But in the ence on the correlation of the phenomenon, bioenergy, biology, bio absence of political organs and the moral-psychological forces of the fields, and psychoenergy in the Communist Party apparatus, ideol- opposing sides. Therefore, there is fields of security and defense.11 A Russian perspective on informa- Many Russian sociologists believe that the Russian tion-psychological security tasks for friendly troops, as well as the basic armed forces … are now vulnerable to an information- content of information-psychological warfare tasks against enemy troops, psychological attack. In the past, propaganda depart- is shown in the chart on page 15.12 ments in the school system and in the armed forces Psychological attacks had fulfilled the moral-psychological training role. But Some Russian military theorists in the absence of political organs and the Communist believe that contemporary develop- ments in military affairs, especially Party apparatus, … no independent moral-psycholog- the U.S. emphasis on information- warfare techniques, indicate that ical support apparatus exists to fill the gap. the information-psychological con- frontation has become an indepen- ogy no longer dominates or guides a real need to form an understand- dent type of military activity,13 psychology, sociology, psychiatry ing of the moral-psychological sup- much like the defense or the and the other sciences. No indepen- port activity of the armed forces.”9 offense. As a result, in any armed dent moral-psychological support Information-psychological secu- conflict, the use of military force will apparatus exists to fill the gap. rity is “the use of information to be preceded by measures designed Moral-psychological support can guarantee the functional reliability to act on the consciousness, morale be defined as a goal-oriented influ- of the psyche and consciousness of and psyche of people.14 This makes ence on the minds and the psyches a person in peacetime or superiority in the information-psy- of Russian military personnel. wartime.”10 Information-psycholog- chological confrontation necessary Commanding officers, staffs and ical security includes measures to for success. indoctrination bodies are responsi- combat enemy actions that would There is a close link between ble for reinforcing psychological have a negative effect upon the cor- information warfare and the infor- stability among personnel and for relation of moral-psychological mation-psychological confronta- forming their moral readiness so forces, and measures to curtail or tion. One Russian officer noted: that they will be able to perform reverse any information-psycholog- The main objective of informa- effectively under any conditions. ical impact upon population groups tion war is to capture the con- Field commanders must direct spe- or Russian society in general. sciousness of the population of the cial effort toward keeping the cor- Information-psychological security Russian Federation, to undermine relation of moral-psychological should also counteract any nega- the moral-fighting potential of the tive effects of information opera-

16 Special Warfare mation-warfare activities of states hostile to Russia. He concluded that in crisis situations, such activities would cause more mental or trau- ma casualties than in any preced- ing war.16 As a result, the armed forces must address the informa- tion-psychological challenge by cre- ating systems to counteract any information-psychological opera- tion directed against Russia.17 Another Russian officer noted that information-psychological operations should be considered a combat weapon. He believes that the failure to counteract or to respond to these operations, which he calls “propaganda,” can hasten one’s defeat, as in the case of the Iraqi army in the Persian Gulf War. This officer’s study of U.S. operations, written in 1994, came to the following conclusions: • It is essential to ensure the com- prehensive theoretical elabora- tion of the problem of propagan- da and psychological support in peacetime, in periods of aggra- vated military political con- frontation, and in wartime. • It is expedient to unite the bod- ies involved in providing propa- ganda and psychological support for the armed forces of Russia with a common goal and a single command-and-control structure. • Commanders at all levels must become proficient in the use of psychological-support organiza- tions, and there should be a training course on the subject in the military curriculum. Photo by Joel M. Torres • Technical-support equipment U.S. PSYOP persuaded large numbers of Iraqi soldiers to surrender during the Gulf War. Russian theo- must be continuously updated.18 rists consider information-psychological activities to be an independent type of military activity. A new MOS? armed forces; i.e., to set the stage for state structures of traditional ene- One of the more interesting sug- political, economic, and military mies of Russia, but also by its allies gestions by a Russian officer is that penetration. With this goal in mind, and friendly countries.15 it would be wise to form a special both secret information and psycho- The same officer also blamed military occupational specialty logical operations (actions) are most of the current ills of Russian within the Russian military to being prepared and continuously society, including an increase in train specialists in the art of coun- conducted, not just by designated psychological illness, on the infor-

Winter 1997 17 teracting and containing informa- its soldiers because this is a Rus- means of using PSYOP as a tion. Special financing would be sian principle of war. We should weapon, but so are some of Ameri- required because of the unique expect the Russian military to be ca’s enemies, and they may not be nature of the training. vigilant in its attempts to exploit bound by the same rules of This suggestion reaffirms Rus- information operations against the employment of PSYOP weaponry sia’s desire to put in place, during soldiers of other countries. as the U.S. peacetime, specialists who can Discussion of the PSYOP concept Second, U.S. planners must rec- detect information operations ori- and related issues is on the rise. A ognize the increasing synchroniza- ented against either Russian soci- March 1994 Russian TV program tion of PSYOP and information ety or the armed forces, or who can noted that although every military operations — the two may become initiate offensive operations on unit has a psychologist, the prob- inseparable in the near future their own. Such operations could lem of creating a psychological because of the ability of both to range from subtle, provocative service has not been solved.20 A influence the psyches of decision- voice-synthesis operations designed March 29, 1996, report indicated makers and soldiers alike. The to “hypnotize” victims, to virus that a decision had been made to PSYOP/information-actions inter- attacks on computers. Not institut- recreate the unified military news face may indeed become, as many ing such countermeasures could be system, since the first job is to win Russians believe it will, an inde- dangerous: the “news war.” Most likely because pendent type of military activity As specialists note, it’s worse to of media problems during the worthy of closer study and more fall behind here [the information- Chechnya conflict, some military creative utilization. psychological confrontation] than specialists believe that various to fall behind in cybernetics. Non- mass-media elements are waging resolution of the problems of the war against the Army.21 Timothy L. Thom- information-psychological con- Finally, a May 23, 1996, report in as is an analyst for frontation makes the consolidation the Russian newspaper Moskovskiy the Foreign Military of society and the stabilization of Komsomolets speculated that the Studies Office, Fort the situation in the state impossi- Russian military might return to Leavenworth, Kan. ble, even though they are funda- “propaganda” units as a means of Prior to retiring from mental to the rebirth of Russia.19 controlling information. Reported- the Army as a lieu- ly, coded cables were sent to each tenant colonel, Thomas served in Conclusions military district, and commanders the 6th PSYOP Battalion, 4th Russia is extremely interested were asked to offer their opinions PSYOP Group, from 1979 to 1982. in the development and the imple- on subordinating each district From 1987 to 1990, he served as the mentation of information opera- press center to the Main Direc- director of Soviet studies at the for- tions by powerful nations around torate of Educational Work. The mer U.S. Army Russian Institute at the world. Information operations report suggested that such a subor- Garmisch, Germany. Thomas has have serious implications for Rus- dination would eventually lead to written another PSYOP-related sia in both a technical and a moral- the educational directorate’s con- article, “Manipulation and the Age psychological sense. Because of the trol of the press centers, the mili- of the New Persuaders,” scheduled current psychological instability tary press and special propaganda for publication in an upcoming that permeates Russia, the Rus- divisions. In other words, “all those issue of Military Review. sians view information operations services that, prior to 1991, togeth- with alarm, suspicion and mis- er with the political agencies, con- Notes: stituted the Main Political Direc- 1 E.G. Korotchenko, “Informatsionno- trust. The Russians have identi- psikhologicheskoye protivoborstvo v sovre- fied the information security of torate of the Soviet Army and mennykh usloviyakh” [Information-psycho- 22 the individual, of the society and Navy.” logical confrontation under modern condi- of the state as a priority of nation- The above discussion contains tions], Voennoye Mysl [Military Thought], al interest. several suggestions for U.S. plan- January/February 1996, 22-28. ners. First, it is clear that the U.S., 2 Evidence is mounting that the term The Russian military is particu- “information-psychological” is replacing the larly interested in the impact of at the joint-staff or strategic level, term “propaganda.” For example, in the arti- information operations on the must not lose sight of develop- cle “Nezavisimoye voennoye obozreniye” moral-psychological character of ments in the PSYOP arena. Not [The Bloodless and Noiseless Means], 27 only is Russia exploring potential January 1996, 2, author Nikolai Plotnikov

18 Special Warfare discusses “indirect propaganda (informa- 18 N.D. Plotnikov, “Psychological Operations: tion-psychological) actions”; and Andrei Objectives, Tasks, Content,” Military Mikailov’s article “Nezavisimoye voennoye Thought, April 1994, 69. obozreniye” [The Word — Also a Weapon] 13 19 Korotchenko, 27. January 1996, 2, carries the subheading 20 Moscow TV and Dubl Networks, 27 “Information-psychological support of mili- March 1994, as reported in FBIS-SOV-94- tary actions by Russian forces in Chech- 061, 30 March 1994, 28. nya.” The journal Orientir, which appears to 21 “News War at Defense Ministry,” Komso- be devoted to many PSYOP-type articles, molskaya Pravda, 29 March 1996, 3, as very seldom uses the word “propaganda,” reported in FBIS-SOV-96-062, 29 March replacing it with the more popular “infor- 1996, 33. mation-psychological.” 22 Aleksandr Khinshteyn, “Commissars in 3 For the U.S. armed forces, PSYOP Dusty Helmets ... The Political Agencies Are involves changing attitudes or manipulat- Coming Back,” Moskovskiy Komsomolets,23 ing someone’s thoughts, emotions, impres- May 1996, 1, as reported in FBIS-SOV-96- sions or beliefs through intimidation, black- 101, 23 May 1996, 24, 25. mail, disinformation or rumor. PSYOP finds particular utility at the operational and tac- tical levels of military activities. PSYOP techniques are universal, yet cheap, if put into the hands of skilled and competent operators. 4 Boris Yeltsin, The Struggle for Russia (New York: Random House, 1994), 278. 5 Clifford Reid, “Reflexive Control in Sovi- et Military Planning,” in Soviet Strategic Deception, edited by Brian Daily and Patrick Parker (Lexington, Mass.: Lexing- ton Books), 294. 6 Disinformation is a Russian technique for manipulating perceptions and informa- tion, and for misinforming people or groups. Some disinformation procedures are obvi- ous, some are unconvincing, and some work through delayed perceptions, rumors, repe- tition or arguments. Specific persons or par- ticular social groups can serve as disinfor- mation targets. The purpose of a disinfor- mation campaign is to influence the con- sciousness and mind of man. In Russia today, where there is an unstable public- political and socio-economic situation, the entire population could serve as the target of influence for an enemy campaign. 7 M. Ionov, “Control of the Enemy,” Morskoy Sbornik No. 7, July 1995, 29-31, as reported in FBIS-UMA-95-172-S, 6 Septem- ber 1995, 24-27. 8 Ibid., 25. 9 Aleksander Cherkasov, “Formirovat’ gotovnost’ k boyu” [Forming Military Readi- ness] Orientir, June 1995, p. 15. Translation by Robert Love, Foreign Military Studies Office. 10 Ibid., 47. 11 Ibid., 45. 12 Ibid., 25. 13 Aleksander Cherkasov,“The Front Where Shots Aren’t Fired,” Orientir, April 1995, 48. 14 Ibid., 52. 15 Korotchenko, 23. 16 Ibid., 24. 17 Ibid., 27.

Winter 1997 19 Special Forces and Warfighter: Preparing for BCTP

by Major Jon M. Custer

ou are a member of a Special Forces A-detachment deployed to a tropical Yparadise. Your 90-day mission of teaching skill-level-one tasks in the local language has been extended twice. The for- ward operational base, or FOB, notifies you that your unit has been selected to partici- pate in an upcoming rotation of the Battle Command Training Program, or BCTP.You immediately begin thinking of ways to avoid participating, but you soon realize that, barring the development of a major regional conflict in your theater of opera- tions, you must prepare for this mission. BCTP exercises are important to the Special Forces community because they offer SF soldiers a unique training oppor- tunity. The BCTP provides both a corps and a division headquarters, plus $2 mil- lion worth of computer simulation as train- ing aids, to the FOB and the special-opera- tions command-and-control element, or SOCCE. SF soldiers who have an under- standing of the BCTP operational environ- ment prior to attending the program can enhance the effectiveness and the value of their training. This article addresses a number of topics to help prepare soldiers for a successful BCTP mission. What is BCTP? Also known as Warfighter, the BCTP is a computer-dri- ven division and corps staff exercise. It is normally accompanied by a corps element, which may also be one of the players. The goals of the BCTP are to improve

20 Special Warfare advanced collective training at the divi- ly playing in corps BCTP rotations. After sion level and above; to integrate doctrine, Operation Desert Storm, it became appar- command and control, and leadership; ent that SF were inextricably linked to and to become the Army’s focal point for conventional operations, and SF BCTP large-unit collective training. The comput- participation increased. The Army Special er simulation used is called the Corps Forces Command, or USASFC, recently Battle Simulation, or CBS. mandated that in addition to the participa- In order to challenge participants in the tion of SOCCEs, FOBs must also partici- planning and decision-making phases, the pate in all Warfighter exercises. The FOB CBS portrays unit movements and com- commanders, however, are given some lati- bat actions. The system contains seven tude as to the size of their staffs. SF par- terrain databases: Korea, Central Ameri- ticipation in the BCTP has evolved from ca, the Caribbean Basin, Central Europe, the occasional participation of a SOCCE in Bosnia, Southwest Asia, and the central special-reconnaissance, or SR, to SOCCEs United States. The division enters the engaged in coalition warfare at the corps battle in progress and conducts a four-day level. In addition, there are as many as 10 operation against the world-class oppos- FOBs a year working at the level of the ing force, or WCO. joint special-operations task force, or The composition of the WCO varies between scenarios to provide a specific SF participation in the BCTP has evolved from the force ratio with the division and its attach- ments. Typically, the WCO resembles a occasional participation of a SOCCE in special Warsaw Pact force on steroids. Human players position and maneuver both enemy reconnaissance to SOCCEs engaged in coalition and friendly units. When the forces initiate warfare at the corps level. … The process of inte- contact, the computer rolls digital dice and provides battle outcomes and losses to grating SOF into division and corps operations is work cells inside the battle-simulation cen- ter, or BSC. accomplished primarily through the BCTP. Exercise controllers in the BSC (soldiers provided by the player units and trained by JSOTF. The process of integrating SOF the BCTP staff) translate the computer’s into division and corps operations is information into reports (formatted in accomplished primarily through the BCTP. accordance with the unit SOP) and forward the reports to the player headquarters. Preparation This process makes it appear that the Upon being notified of an upcoming reports were submitted by subordinate BCTP rotation, FOB and SOCCE com- units. The work cells within the BSC also manders should become familiar with the make subordinate-unit decisions. For appropriate portions of FM 31-20, Doctrine example, if a computer-simulated A- for Special Forces Operations; FM 100-5, detachment initiates enemy contact, the Operations; and the requirements of human controller decides how the detach- USASFC Regulation 350-1, Annex K. The ment should react: Should it fight? Should Army SF Command normally grants units it evade? Should it continue the mission? permission to conduct direct coordination All of these options can be simulated by the with the corps special-operations coordi- computer. nation element, or SOCOORD, and with the BCTP SF representative. Once the Background coordination has been approved, it should In 1989, General Carl Vouno, at that be accomplished as soon as possible. time the Army chief of staff, directed that For SF units, BCTP preparation begins Special Forces would participate in at the Startex conference, which is held six Warfighter. This led to SOCCEs occasional- months out for active-component units and

Winter 1997 21 12 months out for reserve-component unique requirement for each one, and that units. During the conference, the all-impor- requirement should be validated by the tant details in the Startex agreement are JSOTF role player. Assigning an SF agreed upon and the agreement is signed detachment to perform tactical reconnais- by the participants. The agreement estab- sance in the division deep battle not only lishes the structures, capabilities and mis- wastes a valuable asset, it also teaches the sions of friendly and enemy forces; and the wrong lesson to conventional commanders geographic area, or play box, of the exer- and staffs. Appropriate SF reconnaissance cise. Representatives of all major player missions employ a special-operations elements and selected sections of the team-alpha, or SOT-A; or indigenous forces BCTP attend the Startex conference. The in FID or unconventional-warfare missions representatives from the FOB or SF group, at a strategic depth, requiring SOF infil assisted by the corps SOCOORD and the and exfil platforms. SOF adviser from the BCTP, integrate SF’s Normally, the number of SF A-detach- training objectives with those of the divi- ments in the competitive zone is limited sion. Through this process, the concept for to 10; there can be as many as three SOT- SF operations is established and the joint- As. In a coalition-warfare scenario, how- command structure for the exercise is ever, as many as two battalions have been determined. played with liaison-coordination ele- ments, or LCEs. The level of SF participa- SF operations tion in each exercise is subject to negotia- All SF missions, from direct action to tion — the correlation of blue and red unconventional warfare, can be portrayed forces is carefully managed to produce a in the BCTP. (Lieutenant Colonel Ed challenging situation for player staffs. Phillips’ article, “SF Direct Action and Targeting,” in the April 1995 issue of Spe- Joint SOF command structure cial Warfare explains the use of direct- Although the joint command structure of action missions in the BCTP and the inte- the exercise has little direct impact on the gration of the FOB into the simulation.) simulation, the FOB should consider that The coalition-warfare subset of foreign structure when developing its plans. The exercise simulates a division (under a If SR missions are portrayed, they should be corps) working for a joint task force or a theater army. It is important to determine realistic: There should be an SF-unique a feasible SOF command architecture — requirement for each one. … Assigning an SF one that SF soldiers can use as a model to teach the conventional players about the detachment to perform tactical reconnaissance tasking and command of SOF. The theater special-operations command to which the in the division deep battle not only wastes a player SF unit would be assigned in valuable asset, it also teaches the wrong les- wartime should provide input, if not per- sonnel, to each exercise. son to conventional commanders and staffs. Special Forces fight on a joint battlefield, and they depend on joint assets for infil, internal defense, or FID, in the BCTP sim- exfil and fire support. These joint assets ulation is highly effective — it brings must be allocated and integrated into the additional combat power to the division FOB plans. There are two logical alterna- and provides realistic solutions to any tives for accomplishing this: potential problems involving rear-area • Designate the theater special-opera- security and reconnaissance in the corps tions command as a JSOTF, with the SF and division deep-battle areas. group as a subordinate Army special-oper- If SR missions are portrayed, they ations task force, or ARSOTF. should be realistic: There should be an SF- • Designate the SF group as the

22 Special Warfare Division Warfighter

XX FIELD PLANS & REAL-TIME ORDERS COMMO

BN HQs + CA = DET HQs

CO HQs + SIMULATION CENTER PSYOP = SEC CHIEFs

SF = SOCCE SOF CELL

BN or RGR = REGT HQ CA = 2/SHIFT RGR = 2/SHIFT

HNS = 2/SHIFT SF = 4/SHIFT

(FORCES STAFF TO REACT) PLAYED BY AF PSYOP = 2/SHIFT SOA = & ARMY AVN WORKSTATIONS RESULTS OF EXECUTION

FEEDBACK

JSOTF, with attached Air Force and Navy The time line provides the legend for the SF elements. players and describes SF capabilities and Once the command structure has been limitations to conventional players. The SF established, joint assets can be scripted to Road to War must be coordinated with the provide a realistic, balanced JSOTF. The corps SOCOORD and the BCTP. simulation can employ SEALs, special-boat About four months out, the corps should units, AH-6s, AC-130s, and almost any- be war-gaming and producing its opera- thing else if planners ask in advance. tions order, or OPORD (the OPORD for the reserve-component divisions is written by Time line the BCTP). The corps SOCOORD, the pri- After the SF player unit has determined mary advocate for SOF during the plan- the SF concept of operations, it must pro- ning process, is intimately involved in writ- duce a time line, called the SF Road to War. ing the OPORD. The FOB should provide The time line sets the stage for the unit’s input to the OPORD process and, if possi- entry into Warfighter: It describes the com- ble, send a representative from the SOCCE mand relationships, locations and past and to begin integration with the corps staff. current activities of all SOF units in theater. At the same time, the home-station FOB should be conducting a mission analysis,

Winter 1997 23 based on its SF Road to War and the corps visit the seminar. The regulation should concept of operations, to determine the be revised to place greater emphasis on composition of the player elements and the seminar attendance by the division LNO communications requirements. The com- team. It is essential that the SOCCE’s mand-and-control structure normally senior LNO attend the seminar and be requires a SOCCE at the corps level and a prepared to brief the division staff on SF substantial liaison team, or LNO team, at capabilities and limitations. The senior the division level. An exception could be LNO serves as the division commander’s made in a forced-entry scenario in which primary adviser on SF, and he should only one division is initially present in the establish a relationship with the staff and operational area. familiarize himself with staff procedures The focus of the SOCCE must be the as early as possible. corps. If the corps is an active player in the After the seminar, the BCTP and the exercise, the SOCCE should work in the FOB must work together to produce a corps main headquarters. If the corps play JSOTF operations order. The JSOTF oper- is merely scripted, the SOCCE should ations order provides the joint command- function within the element that plays the er’s guidance to the FOB and, in conjunc- role of the corps headquarters. The employ- tion with the SF Road to War, describes to ment of the LNO team at the division level the player staffs the past and current activities of SOF in theater. This order pro- vides the FOB and the SOCCE with infor- mation necessary to conduct their mission planning. The FOB should also prepare SF A-detachment mission profiles and isola- tion packets in order to provide the SOCCE with the same level of information it would have in an actual mission. Prior to the exercise, the FOB and the BCTP must also determine the suspense dates for providing subordinate-unit locations and activities to the BCTP. USASFC Regulation 350-1 requires two briefings for USASOC, one at D-90 and a prebrief to the commanding general of USASOC. A unit representative must pro- vide slides to the USASFC G3 not less than three days prior to the D-90 briefing.

must be justified by division control of SF Train-up exercises elements, such as LCEs, or by imminent The division normally conducts a train- linkup with SR elements. If there are no up exercise, or a series of them, at its home SOF units under division control, there station. Active-component divisions exer- should not be an LNO team. cise in separate terrain boxes for train-up The next step is the Warfighter semi- and Warfighter exercises, and they use two nar, which takes place about five months distinct OPORDs. Reserve divisions use out. The division staff deploys to Fort the same OPORD and terrain box for train- Leavenworth, Kan., receives training on up and Warfighter exercises. the simulation and rehearses its planning In determining the degree of SF partici- procedures under the guidance of the pation, the SF group and the FOB must BCTP staff. USASFC Regulation 350-1 consider costs. Participation in train-up requires that the SOCCE commander and exercises is funded by the SF player unit, one NCO attend the seminar and that the and it can be very expensive. At a mini- group commander or his representative

24 Special Warfare mum, the SOCCE and the FOB must par- real-time communications to the supported ticipate in the five-day final or ramp-up corps and division. training exercise, which is normally con- The FOB may set up at its home station, ducted 30 to 60 days before the Warfighter collocate with the corps, or deploy to a exercise. third location. The primary factors affect- All SOCCE and FOB staff procedures ing the location should be the preferences should be established in advance of the of the supported unit, the available com- train-up exercise. Communications links to munications links, and the actual missions be used in Warfighter should also be exer- (outside the BCTP) that are being moni- cised. USASFC Regulation 350-1 states that the USASOC commander expects It is important to remember that the role group commanders or their representa- tives to accompany the SOCCE to the players in the simulation center are the train-up exercise, where they can become brains for the deployed elements. During the acquainted with the division commander and his G3. planning process, units must select soldiers The Warfighter exercise is conducted at the division’s home station (reserve-compo- who are tactically proficient and computer nent units play at Fort Leavenworth). The literate, or the entire SF portion of the simu- division normally stands up its main and alternate command posts, brigade com- lation could fail. mand posts and battalion command posts. Usually, the division sets up its headquar- tored by the FOB. The FOB may partici- ters in the field, while the corps main com- pate at full strength, actually isolating mand post or response cell sets up in per- teams, or it may provide a response cell manent buildings. Although the situation manned by key staff members working in can vary depending upon the mission shifts. The FOB commander determines analysis, the SOCCE is usually located in the level of FOB participation based on an or near the corps main command post and evaluation of his ongoing missions. an LNO team is assigned to the division main command post. Battle simulation center The exercise control cell and the BCTP SOCCE staff operate out of the BSC, where con- The primary missions of the SOCCE are troller cells from the player units (using to command and control special-operations soldiers from the player units to operate forces in the corps area and to act, in con- the workstations) input commands to junction with the SOCOORD, as a special- their subordinate units. It is important to operations adviser to the corps command- remember that the role players in the er. SOCCE communication connectivity simulation center are the brains for the with both the FOB and the SF detach- deployed elements. During the planning ments in the field is critical. process, units must select soldiers who are The composition of the SOCCE is deter- tactically proficient and computer liter- mined by the mission, but, typically, it ate, or the entire SF portion of the simu- resembles the configuration shown in the lation could fail. If possible, the same sol- chart on page 26. diers who were chosen to work in the BSC The FOB plans missions in accordance during the train-up exercise should with the JSOTF mission taskings, provides return for the Warfighter. forces to the SOCCE, and isolates addition- In order to serve as controllers and to al SF detachments for infiltration. The man the workstations, BSC personnel FOB also brings additional intelligence must meet specific requirements outlined and signal assets to assist the SOCCE in in USASFC Regulation 350-1, Table H-2, providing quality intelligence and near- and shown in the chart on page 26.

Winter 1997 25 SOCCE Personnel BSC Controller Personnel

CORPS MAIN SOCCE ■ 1 X MAJ 18A SOCCE Commander ■ 1 X MAJ 18A SF Cell OIC ■ 1 X SGM 18Z SOCCE SGM ■ 2 X CPT 18A Shift OIC ■ 2 X CPT/WO 18A/180A Shift Leader ■ 2 X CPT/WO 18A/180A Ops Officers ■ 2 X MSG/SFC 18Z/18F SOCCE Shift NCOIC ■ 2 X WO 180A SF SME ■ 2 X SGT/SSG CMF18 Fire Support NCO ■ 2 X NCO CMF 18 SF Ops NCO ■ 4 X SGT/SSG 18E SOCCE Commo ■ 2 X NCO 18E Communications ■ 2 X SFC/SSG 18F Intelligence NCO ■ 2 X SSG/SFC 92Y/54B Support NCO DIVISION LNO TEAM ■ 2 X CPT/WO 18A/180A Shift Leader ■ 2 X SGT/SSG CMF18 Ops/intel NCO ■ 2 X SGT/SSG 18E Commo 22 Total

Controllers in the BSC are task-organ- The BSC must ascertain what the team ized according to the particular mission. would realistically see, evaluate the report BSC mission requirements fall into the fol- against the reporting priorities from the lowing categories: FOB and the SOCCE, and send the player • Higher HQ replication. The BSC units an accurate but brief report. For must be able to answer FOB and SOCCE example, a three-page computer printout questions about the commitment of SF listing vehicles and personnel could be con- forces, additional A-detachments, SOT- densed into a report as simple as “081830Z As, AC-130s, etc. (Psychological Opera- three T-72 tanks moving north from NAI tions and Civil Affairs units have their One.” The BICM will provide a complete own controllers.) report of all units within detection range, • Subordinate-unit replication. The BSC including unit identifications. If the exer- is responsible for planning and recording cise employs a simulated SOT-A, the SOT- subordinate-unit actions and movements. A’s task can be simplified by having an For example, the BSC plans infil and exfil intelligence officer or a SOT-A NCO pro- routes, and it records the actions of A- vide subject-matter expertise on electronic detachments or SOT-As as well as their warfare. reactions to factors such as the terrain and • Communications. The BSC must sub- enemy. The BSC then enters this data into mit reports (formatted according to the the computer. unit SOP) to the SOCCE or the FOB. These • Intelligence. The BSC receives intelli- reports provide necessary mission and gence reports from A-detachments and intelligence data to the player staffs. By from SOT-As. The A-detachment intelli- translating computer printouts into prop- gence comes from the CBS, and the SOT-A erly formatted reports, the BSC makes it intelligence comes from the BCTP intelli- easier for the players to focus on the staff gence-collection model, or BICM. The BSC problems at hand rather than on the converts the intelligence into seemingly mechanics of the simulation. Communica- realistic reports from subordinate units. tions should follow the contact schedule

26 Special Warfare developed during the team isolation tion with corps and division staffs. An (regardless of whether the isolation was obvious benefit of this preparation is actual or simulated). The reporting guid- that it will help the Special Forces units ance for the exercise dictates whether the deal with problems they are likely to BSC should make a real-time transmission encounter on the battlefield. Experiences or wait for a scheduled contact. in Panama, Kuwait and Haiti have The enemy is played by the WCO from shown that proactive planning and the BCTP at Fort Leavenworth. When aggressive liaison with other staffs, in friendly reconnaissance elements “see” an addition to ensuring the proper employ- enemy unit, intelligence reports are gener- ment of SF soldiers, contribute greatly to ated by the BICM. The BSC role players mission accomplishment. follow their reporting guidance and send a message (formatted according to unit SOP) to the SOCCE. The range at which an A- Major Jon M. Custer is the detachment conducting SR can detect an S3 for the 1st Battalion, 19th enemy unit varies according to the capabil- SF Group. As the Special ities outlined in the Startex agreement. Forces plans and operations Normally, an A-detachment can detect officer for the XVIII Airborne enemy units within a 500-meter radius at Corps SOCOORD, he has night and within a 2-km radius during the worked as OPFOR, as a con- day. A SOT-A can normally detect units troller, and as a corps planner for various within a 15-km radius. Warfighter exercises. In previous assign- It should be explained here that the ments, he commanded A Company, 3rd Bat- BCTP computer-simulation program is not talion, 7th SF Group, and several SF designed to predict the outcome of an actu- detachments in the 7th and 3rd SF groups. al battle between two forces. It is an exer- He served as the civil-defense adviser in El cise driver that presents staffs with realis- Salvador, as a detachment commander tic problems. The computer cannot predict during Operation Just Cause, and as a bat- whether a given course of action will suc- talion staff officer and a detachment com- ceed or fail in reality, but it can present the mander during Operation Desert Storm. SOCCE with teams who send reports, fail to make radio contact, request fire support, have wounded soldiers, and require resup- ply or exfiltration. As the battle progresses, the SOCCE terminates communications, analyzes and passes intelligence, and inte- grates SF actions with corps and division operations. The FOB supports the SOCCE, provides additional intelligence analysis and makes decisions about the commit- ment of additional forces. The situational challenges produced by the BCTP simula- tion cover the spectrum of staff actions that units face in the real world. The BCTP is the Army’s focal point for large-unit collective training. By partici- pating, SF not only trains its FOBs and SOCCEs, it also ensures that convention- al staffs gain invaluable experience in the integration of SF into their unit oper- ations. Prior to the exercise, it is critical that SF units become familiar with staff procedures and rehearse their integra-

Winter 1997 27 Quantitative Analysis in Haiti: Allocation of SOF Assets

by Charles W. Elliott

n 1994, a United States-led multina- Haiti. Although the author had developed tional force, or MNF, entered Haiti to a similar system for the Defense Commis- Iassist in re-establishing the democra- sary Agency in Europe a year earlier, the cy of President Jean-Bertrand Aristide. new assignment included an additional In March 1995, when the U.S. turned its requirement: the SOTF-Haiti allocation operations over to the United Nations system had to be capable of measuring the Mission in Haiti, or UNMIH, it estab- success of SOF missions in the various lished Special Operations Task Force- locations. This article explains both the Haiti (as an element of the U.N mission) development and the operations of the for the purpose of conducting special system, with the hope that the process operations throughout the country. used to determine the allocation of SOF SOTF-Haiti consisted of soldiers from assets in Haiti will have a useful function U.S. Civil Affairs and Psychological in future SOF operations. Operations units, as well as soldiers from The concept used in the development of the active- and reserve-component U.S. the SOTF system was based on the gener- Special Forces groups. In many areas, the al facility-placement business model, SOTF-Haiti personnel were the only U.N. which is used to identify, quantify and eval- forces present. uate factors that can affect the success of a To maximize the operational capabili- business. These factors can be categorized ties of his personnel upon deployment, the as demographics, culture, infrastructure commander of SOTF-Haiti, Lieutenant and nature. Colonel David Fridovich, required a high- ly efficient means of ranking strategic Building the model locations throughout Haiti. The author The process of developing the model con- was given the assignment of developing sisted of eight steps. The first step was to an allocation system that could be used to gain an understanding of the local envi- determine the relative need for a special- ronment. Before leaving for Haiti, the operations presence among the cities in author had gathered information on the country from various sources — maps, This article is based on the author’s expe- area studies, and interviews with people rience during Operation Uphold Democra- who had been there (a good source is The cy in Haiti. It is presented here to illustrate World Factbook on the Worldwide Web – how such a plan may be useful in the allo- http://www.odci.gov/cia/publications/nsolo/ cation of special-operations assets during factbook.htm). From this information, the future military operations. — Editor

28 Special Warfare location and the population of the major showed the presence of the multinational towns and cities of Haiti were derived. civilian police force. The factor was assigned The second step was to gain an under- a number between zero and five, with zero standing of the mission. Fridovich had indicating “not present in an area” and five, provided six clear, discrete mission tasks: “making a strong, positive contribution.” maintain a stable environment; maintain F4-United Nations Mission in Haiti a secure environment; facilitate free elec- presence. This factor showed the pres- tions; facilitate fair elections; assist in the ence of UNMIH troops. The factor was return of a functional government; and assigned a number between zero and five, embed the democratic process. with zero indicating “not present in an The third step was to identify the factors area,” three, “frequent patrolling,” and that could affect each mission task. five, “fixed installations.” Fridovich identified 12 factors, shown F5-Local support for the U.N. This fac- below as F1 through F12. With his tor showed the level of local support for approval, two more factors, F13 and F14, the U.N. presence. The factor was were added. assigned a number between one and five, F1-Haitian National Police presence. with one indicating “no support” and This factor showed the presence of the five, “maximum support.” HNP, which was replacing the Interim F6-Local support for the government of Police Security Force, or IPSF. The factor Haiti. This factor showed the level of local was assigned a number between zero and support for the Haitian government. The five, with zero indicating “not present in an factor was assigned a number between one area” and five, “making a strong, positive and five, with one indicating “no support” contribution.” and five, “maximum support.” F2-IPSF presence. This factor showed F7-Infrastructure. This factor showed the presence of the IPSF, which was the combined condition of all infrastruc- being replaced by the HNP. The factor ture. The factor was assigned a number was assigned a number between zero between one and five, with one indicating and five, with zero indicating “not pres- “extremely poor infrastructure” and five, ent in an area” and five, “making a “excellent infrastructure.” strong, positive contribution.” F8-Election turmoil. This factor showed F3-Civilian police presence. This factor the amount of turmoil among the popula-

Mission - Tasks Matrix

Mission Tasks F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 F13 F14

Maintain a stable X X X X X X X X X X X environment Maintain a secure X X X X X X X X X X environment

Facilitate free elections X X X X X X X X X

Facilitate fair elections X X X X X

Assist in the return of a X X X X X functional government Embed the democratic X process

Winter 1997 29 Factor Weights

NUMBER FACTOR RANK WEIGHT F1 Haitian National Police presence 4 .09 F2 Interim Police Security Force presence 10 .06 F3 Civilian police presence 3 .09 F4 United Nations Mission in Haiti presence 1 .12 F5 Local support for UN 6 .08 F6 Local support for government of Haiti 9 .06 F7 Infrastructure 7 .07 F8 Election turmoil 14 .04 F9 Judicial system 8 .07 F10 Lines-of-communication mobility 5 .08 F11 Vigilante and gang activity 11 .05 F12 Haitian-on-Haitian violence and crime 13 .04 F13 SOTF locations 2 .10 F14 Population 12 .05

NOTE: This chart illustrates the relative ranking of each factor and its assigned weight.

tion in regard to the upcoming election. assigned a number between one and five, The factor was assigned a number between with one indicating “overwhelming activi- one and five, with one indicating “frequent ty” and five, “very little activity.” disturbances” and five, “perfect conduct.” F12-Haitian-on-Haitian violence and F9-Judicial system. This factor showed crime. This factor showed the trend in the combined condition of the court system Haitian-on-Haitian violence and crime. and the prison system. The factor was The factor was assigned a number between assigned a number between one and five, one and five, with one indicating “an with one indicating “no functioning sys- increased trend,” three “no change,” and tem” and five, “a fully functioning system.” five, “a decreasing trend.” F10-Lines-of-communication mobility. F13-SOTF locations. This factor showed This factor showed the condition of roads. the proximity of SOTF locations. The factor (Haiti’s road network served as the only was assigned a number between one and line of communication for the Haitian pop- five, with one indicating “an ODA/ODB ulation.) The factor was assigned a number facility in the immediate vicinity,” two, “a between one and five, with one indicating coalition support team,” three, “a facility “no road network” and five, “a well-main- within range and capable of responding to tained road network.” or monitoring local conditions,” four, “a F11-Vigilante and gang activity. This facility capable of responding within 2.5 to factor showed the level of vigilante and 4 hours,” and five, “no facility close enough gang activity and the impact of that activi- to respond or to monitor local conditions in ty upon the population. The factor was less than four hours.” (This information

30 Special Warfare was based on the assumption that SOTF seventh step would have been to collect the elements had been initially placed in loca- data. And the eighth step, had it been nec- tions where there was a perceived need.) essary, would have been to normalize or F14-Population. This factor was used as scale the data. However, SOTF-Haiti had an indicator of the population density. The accomplished the sixth and seventh steps factor was assigned a number between one before the author’s arrival in Haiti, and the and five: the lower the number, the higher data collected was fully satisfactory. the population density. (This analysis was The task force had collected data from useful in scaling the population count.) written surveys conducted by the S2 of The fourth step consisted of developing a SOTF-Haiti in January and August of mission-tasks matrix. Fridovich marked 1995. The S2 surveyed Special Forces A- each factor with an “X” to link it to the six detachments stationed throughout Haiti. mission tasks. SF personnel are highly trained, mature In the fifth step, Fridovich was asked to troops who speak the local language. They determine the relative importance of the were living in their respective communi- 14 factors. First, he ranked the factors by ties and interacting with the local popula- order of importance. Next, he assigned a tion daily.The data provided by the SF per- weight to each factor. (Ranking was done sonnel was deemed highly reliable. only to help in assigning the weights.) The The SOTF Facility Location Model dia- assigned weights had to add up to 1. gram represents the final model for the Normally, the sixth step would have been analysis. A spreadsheet was used in to design the data-collection project. The preparing the model. The 14 factors were

SOTF Facility Location Model

HAITIAN CITIES POPULATION F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 F13 F14 Weights = 0.09 0.06 0.09 0.12 0.08 0.06 0.07 0.04 0.07 0.08 0.05 0.04 0.100.05 1.00 Limbe 43,000 1 0 1 5 1 1 1 1 1 3 1 1 1 4 1.7 Jeremie 90,000 0 1 3 3 5 3 3 1 1 2 1 3 1 2 2.1 Cap Haitien 107,000 2 0 3 5 1 1 3 1 1 3 3 1 1 2 2.1 Magasin (island) 80,000 0 4 1 1 5 3 1 3 3 1 5 5 1 2 2.2 Les Cayes 132,000 0 1 3 3 5 3 1 3 3 3 3 3 1 1 2.3 Miragoane 68,000 0 3 3 3 3 1 3 3 3 3 3 3 1 3 2.4 Grand Rivere du Nord 35,000 1 0 1 5 5 1 1 2 2 4 3 3 1 4 2.4 Deschapelles 5,000 4 0 2 3 5 4 4 2 5 1 5 5 4 5 3.4 Thiote 20,000 4 0 3 3 5 4 4 2 5 1 5 5 4 5 3.5 Petionville 114,000 4 0 4 3 5 4 5 3 3 5 4 5 3 1 3.6 Ft. Liberte 24,000 4 0 4 4 5 3 4 2 5 3 5 5 2 4 3.6 Delmas 229,000 4 0 4 4 5 4 5 3 3 5 4 3 3 1 3.6 Aquin 50,000 4 0 4 3 5 4 4 2 5 3 5 5 4 3 3.7 Mt. Organise 16,000 4 0 2 3 5 4 3 2 5 3 5 5 4 5 3.7 Port au Prince 772,000 4 0 4 5 5 4 5 4 3 5 4 3 3 1 3.8 Cities Total 3,058,000 Population Total 7,000,000 Rural Total 3,942,000 Percent of factor optimized = 39 21 67 68 88 65 61 50 64 58 74 73 38 58 59

NOTE:A break was made in the chart to save space. The original speadsheet contained 33 cities; the population figures and the percentages in the bottom row are for all 33 cities.

Winter 1997 31 entered as column headings; the factor approval from the commander of the weights as an individual row; the city UNMIH, Major General Joseph Kinzer, to names as row headings; and the various use the statistical data from the model as a data as cell entries. All that remained was basis for withdrawing and redeploying to enter the appropriate formulas for the selected special-operations forces from mathematical calculations, and the model Haiti. (Because of the rapid accomplish- would be ready to run. The results are dis- ment of its mission, SOTF-Haiti used the played on the SOTF Facility Location model to develop an order of withdrawal Model spreadsheet on page 31. from various locations rather than an order of deployment.) Reading the model The quantitative analysis model does The individual cells of the spreadsheet not replace the judgment of a decision- indicate the status of a specific factor maker. It should be only one of several and the need for SOTF assistance in inputs into the decision-making process. A improving it. A “5” indicates that the fac- conflict between the relative ranking gen- tor had been optimized and that no fur- erated by the model and the information ther SOTF-Haiti resources were needed. generated by another source does not The general condition of each city is negate the value of either. However, if the determined by combining the factors statistical data in the model confirms other across that row. The number in each cell is sources of information, the decision-maker first multiplied by the weight assigned to can place a high degree of confidence not its corresponding factor. Then the weighted only in his sources but also in the results results are added across each row, and he will achieve. their sum is shown in the cell at the far right. A comparison of the numbers in the Author’s note: I would like to thank the column at the far right indicates the cities’ men and the women of SOTF-Haiti for their relative need for a SOTF-Haiti element: excellent support in developing the quantita- The lower the number, the worse the con- tive-analysis model during September of dition of a city, and the greater the need for 1995. During my time in Haiti, I saw a a SOTF-Haiti element. united team of dedicated and cheerful profes- The overall degree to which each factor sionals accomplishing their missions while had progressed toward its desired end living under austere conditions. I especially state is obtained by adding the numbers in thank the commander of SOTF-Haiti, Lieu- each column and dividing that sum by the tenant Colonel David Fridovich, and the S2, sum of the optimal numbers (in this case, Captain Edward J. DeSantis. I could not 33 cities x 5, or 165). The answers are have completed the model without their help. expressed as percentages: 100 percent indi- cates that the factor had been optimized and that no further resources were needed Charles W. Elliott is chief for that factor in any location. If all mission of the Systems Analysis tasks had been completed, each column Branch in the Office of the total be 100 percent. (F2, however, is a Comptroller, 8th Army, Seoul, unique case — as F1 nears 100 percent, F2 Korea. During Operation should near 0 percent, which is the desired Uphold Democracy, he was end state.) an operations research ana- lyst with the U.S. Army Special Operations Using the model Command at Fort Bragg, N.C. Elliott has The former commander of the U.S. Army worked with the federal government in Special Operations Command, Lieutenant Asia, Europe and Washington, D.C. He General James T. Scott, approved the holds an MBA and an MA. Elliott has pub- model’s use in the SOTF-Haiti decision- lished numerous articles on government making process. Fridovich then sought operations.

32 Special Warfare the local civilian population. Working with Civil Affairs has also given Special Forces an opportunity to get to know the local population. “We just basically sit in and lis- ten to what they have to say,” Betz said. “We interact with them, Special Forces in Bosnia: drink coffee, and ask how they are feeling.” Versatile and Effective A primary goal of every Special Forces team is to teach and to train future teachers. Recently, the U.S. State Depart- by Corporal Len Butler ment sponsored a program in which four SF demining teams were dispatched to the Croat, Mus- lim and Serb areas of Bosnia- pecial Forces soldiers have guys here know Russian, which has Herzegovina. Their objective was been involved in so many helped us in the Russian sector, as to teach demining techniques to Soperations within the Ameri- well as in the local population.” the local citizens so that the citi- can sector of Bosnia that many The SF soldiers have achieved zens (with special training and people believe that SF detach- much interaction with the Russian proper assistance) could, in turn, ments are the size of companies. Brigade in Bosnia. SF troops have become trainers themselves and Thanks to Hollywood, there are participated in joint patrols and in teach others. still those who think of Special rifle-range exercises with their Special Forces, with their spe- Forces as heavily armed men with Russian counterparts, and SF and cialized training and their techno- their faces disguised by camou- Russian troops have assisted each logically advanced equipment, flage. Others perceive them as qui- other in monitoring Bosnian and indeed create an illusion of a much etly paddling in rafts to secret Bosnian-Serb observation posts. larger force. objectives, or dropping out of the During the Thanksgiving Day Although seldom seen and often sky, deep behind enemy lines. 1996 visit by then-Defense Secre- shrouded in a perception of secrecy, “What a lot of people think is tary William J. Perry, four SF sol- Special Forces soldiers assigned to that we are some kind of ninja war- diers served as interpreters for Task Force Eagle in Bosnia contin- riors,” said Captain Roy Weidanz of Russian generals attending the ue to live up to their nickname, Company B, 1st Battalion, 10th ceremony. “the quiet professionals.” Special Forces Group. “But we use “With language capabilities our brains more than our muscles.” come liaison capabilities,” said Weidanz, 36, the outgoing com- Staff Sergeant Joseph R. Betz, Corporal Len Butler is a member mander of the special-operations 31, of Glastonbury, Conn. “When of the U.S. Army Reserve’s 100th command-and-control element, you speak another language, you Mobile Public Affairs Detachment, stated that the versatility of Special may think a little differently of based in Austin, Texas. Forces is the attribute that makes people, because you may get a SF a successful organization. better idea of how they may feel “Every SF soldier has had some about something.” type of schooling in a foreign lan- Betz noted that although Serbo- guage,” Weidanz said. “Most of our Croatian is somewhat different from Russian, the two languages This article is reprinted from have similar words and phrases the Dec. 20, 1996, issue of The that can be understood. Talon, the DoD newspaper pub- Civil Affairs and Special Forces lished for U.S. troops in Bosnia. — have worked together to achieve Editor and maintain good relations with

Winter 1997 33 Enlisted Career Notes Special Warfare

CMF 37 gains additional Enlisted Career Management Field 37, psychological-operations specialist, has authorizations gained six authorizations that offer senior NCOs the opportunity to excel out- side the 4th PSYOP Group. The positions are for one staff sergeant with the Army Land Information War Center, Fort Belvoir,Va.; one master sergeant and two sergeants first class with the 8th Army in Korea; one sergeant first class with the Southern European Task Force in Italy; and one sergeant first class with the 3rd Army, Fort McPherson, Ga. Soldiers interested in applying for one of these positions should submit a request through their S1. Applicants must have served in the key leader position for their current grade and must not be currently assigned to a TDA position. For more information telephone SFC Timothy Prescott at the Special Forces Enlisted Branch, DSN 221-5395 or com- mercial (703) 325-5395.

SF Branch seeks The SF Enlisted Branch is seeking volunteers for drill-sergeant duty.Applicants drill-sergeant volunteers must be an 18B, 18C or 18F and in the grade of E6 or E7. Successful candidates will serve a two-year tour of duty in basic-training units at Fort Sill, Okla.; Fort Jackson, S.C.; Fort Knox, Ky.; or Fort Leonard Wood, Mo.

PERSCOM points of contact Staff members of the Special Forces Enlisted Branch, Enlisted Personnel Directorate, U.S. Total Army Personnel Command, are as follows: LTC Michael W. Grant SF Enlisted Branch chief MSG R.B. Gardner Senior career adviser SFC Timothy Prescott CMFs 18, 37; USACAPOC; 4th POG; 96th CA Bn.; CMF 18/37 ANCOC, schools; drill sergeants; recruiters SFC Tod Young Career branch integrator; analyst Ms. Faye Matheny 1st, 3rd, 5th, 7th and 10th SF groups; USASOC; USASFC; JFKSWCS; JRTC; JOTB; SFOD-K; ROTC; All SOCs and SOTSEs Ms. Dyna Amey SFAS; SFQC Assignment-related questions should be directed to the assignment manager. Career-development questions should be directed to the PDNCO or senior career adviser. SFQC students who have assignment questions should contact their student PAC or their company first sergeant or sergeant major. Questions regarding NCOES should be directed to the SF unit’s schools NCO. Telephone inquiries may be made by calling DSN 221-5395 or commercial (703) 325-5395. Address correspondence to Commander, U.S. Total Army Personnel Command; Attn: TAPC-EPK-S; 2461 Eisenhower Ave.; Alexandria, VA 22331-0452. The e-mail address is [email protected].

34 Special Warfare Officer Career Notes Special Warfare

Prerequisites for The Special Forces Warrant Officer, MOS 180A, provides tactical and tech- SF warrants explained nical expertise necessary for effectively conducting SF missions world- wide. An applicant for 180A must: • Be serving as a staff sergeant or above. • Possess a Career Management Field 18 MOS. • Be a graduate of the Special Forces Operations and Intelligence Sergeant Course (nonresident or resident) or be a graduate of SF ANCOC after Oct. 1, 1994. • Have a minimum of three years’ experience at the SF ODA level. • Have a current 1+/1+ language proficiency, or have a score of 85 or high- er on the Defense Language Aptitude Battery. • Meet the medical-fitness standards for SF duty and for the SERE Level- C Course according to AR 40-501. • Pass the Army Physical Readiness Test (must complete a minimum of 50 pushups and 60 situps within two minutes and a two-mile run in 14:54 or less, regardless of age). • Have a secret security clearance or higher. • Have recommendations of company and battalion commanders. • Have an endorsement from the servicing personnel office verifying that appli- cant is not under a suspension of favorable action or a bar to re-enlistment. The SWCS Special Operations Proponency Office also requires a letter of rec- ommendation from the applicant’s SF group commander and from a senior SF warrant officer.An applicant who is not currently assigned to an SF group must furnish two letters of recommendation from his former SF company chain of command. Active-duty applicants can be no older than 36; National Guard applicants can be no older than 42. For more information, telephone CW4 Wayne Searcy, 180A manager in SOPO, at DSN 239-2415/8423 or commercial (910) 432-2415/8423.

Branch proponent sets Every officer branch has a personnel proponent that develops the major poli- career-development policies cies affecting the career development of officers in that branch. The personnel proponent for Special Forces is the JFK Special Warfare Center and School. Within SWCS, personnel-proponent functions are performed by the Special Operations Proponency Office, or SOPO. A sampling of SOPO tasks includes: • Planning the fill of the force, including yearly recruiting requirements. • Monitoring promotion-board results and making recommendations to DA for future SF officer promotions. • Recommending to PERSCOM the functional-area breakout for the yearly cohort of SF captains pending FA designation. • Developing branch-qualification requirements. Officers who have questions or comments may telephone SOPO’s 18A manager, Major Dan Adelstein, at DSN 239-2415 or commercial (910) 432-2415.

Winter 1997 35 Foreign SOF Special Warfare

Military counterdrug roles Thailand’s promises to vigorously attack the burgeoning drug trade have debated raised the prospect of greater Thai military participation in counterdrug activities. Among the options being considered — all of which have gener- ated sharp discussion or controversy — is the possibility of giving military personnel limited arrest powers; assigning second-year conscripts and mil- itary police to community-policing duties; and developing other approach- es of military-police cooperation. While many specialists acknowledge that the Thai drug problems exceed the capabilities of the Thai police, fears of military human-rights abuses and greater drug corruption within the mil- itary itself promise to temper the most ambitious proposals for armed forces’ participation. Meanwhile, on another continent, Argentina is addressing similar issues. Namely, Argentina’s air force and navy are con- sidering ways by which to monitor air and maritime drug-trafficking activ- ities, which have increased in recent years. In part, these efforts may involve increased radar coverage of Argentina’s borders with Brazil and Paraguay, with other military support possible. But in Argentina, as in Thailand and a number of other countries, using the military in law- enforcement roles — combined with the danger of a too-close association with the corrupting influence of international drug criminals — evokes controversy and discussion in and out of the Argentine armed forces. An Argentine commentator posed the same question that other states have recently asked: “If the militaries do not destroy the drug traffic, who will?” This question will clearly continue to preoccupy security establishments in those states facing drug trafficking and transit problems that exceed tra- ditional law-enforcement resources.

Colombian guerrillas The ambush of a Venezuelan army and national-guard patrol in February concern Venezuela 1997 in the western state of Apure, an apparent reduction of Colombian military and police presence in parts of the border area with Venezuela, and the increased activities of Colombian drug traffickers and other vio- lent criminals crossing into Venezuela have generated worry among the border residents and have evoked a Venezuelan government protest to Colombian authorities. Clashes with Colombian guerrillas — along with coca-planting activity and cross-border kidnappings and robberies — have led to closer interaction among Venezuelan forces near border areas; more focused intelligence work; and the creation of the Sierra Nueve Special Command, whose role, in part, is to eliminate drug crops on Venezuelan soil. In planning for more effective border countermeasures, Venezuelan authorities recognize that Bogota’s efforts to counter the attacks of the Colombian Revolutionary Armed Forces, or FARC, and the National Lib- eration Army, or ELN, in other parts of Colombia have reduced the Colom- bian army’s border presence. As a consequence, it seems likely that Venezuela’s attention to the cross-border activity of guerrilla and criminal groups — and to the progress of FARC and ELN insurgent efforts in Colombia — will remain concentrated.

36 Special Warfare Russian assessment calls In Russia, struggles to formulate and to implement military reforms have for special-ops reform sparked criticisms of past and current approaches regarding the organiza- tion, equipment, employment and affiliation of Soviet and Russian special- operations forces. A 1997 assessment by a Russian general-staff officer highlights many examples of such organizational and performance short- falls and singles out the past association of “spetsnaz” and military intel- ligence as a particularly flawed and incompatible relationship. The assess- ment is also critical of the performance in Chechnya by the Ministry of Internal Affairs, or MVD, and the Federal Security Service, or FSB. For the armed forces, the assessment calls for the creation of a General Staff Spe- cial Operations Directorate (within the Main Operations Directorate). With regard to all of Russia’s other special-security units, a Federal Spe- cial Operations Committee would handle the restructuring of Russian spe- cial-operations forces (e.g., the MVD, the FSB, the Federal Border Service, etc.). Under a proposed scheme for the military, there would be nine cate- gories of “special operations” or “special actions.” They are as follows: com- mando operations (direct action against command and control and other military targets during a period of threat or at the start of military opera- tions); reconnaissance operations (collection prior to the start of operations and in support of the first and subsequent conventional operations); psy- chological operations (altering civilian or military behavior and countering enemy efforts); operations to support internal security and constitutional order (of the Russian Federation, foreign nations, and regions or territo- ries); operations to protect the rights and the property of Russia and its cit- izens (in and out of Russia); search-and-rescue operations (of Russian mil- itary and civilian personnel, including hostage rescue); operations to form, support and employ foreign irregular forces (on behalf of Russian military objectives or Russian Federation interests); auxiliary operations (to sup- port the security of peacekeeping operations, of humanitarian-assistance operations and of various kinds of support to civil authorities); and other unspecified operations or actions that the minister of defense or the pres- ident might designate. Whatever the merits of the arguments outlined in the assessment, it is the slow, under-funded status of Russian military reform that makes a major change in military special-operations forces unlikely in the near future.

Colombian authorities link Against a backdrop of strong, continuing guerrilla activity that is chal- guerrillas to drug trafficking lenging government forces, Colombian authorities continue to highlight the evidence of enduring narco-insurgent linkages. In February 1997, Colombian national police discovered near Cali a cache of automatic weapons, grenades, explosives, uniforms, and an antitank missile, togeth- er with 500 kg of cocaine — an indication of drug-insurgent linkage. The director of the Colombian national police echoed views heard often over the last decade in Colombia and elsewhere, “One does not know if the drug trafficker is a guerrilla or if the guerrilla is a drug trafficker. The line is now blurred; it is a brotherhood community.”

Articles in this section are written by Dr. Graham H. Turbiville Jr. of the Foreign Military Studies Office, U.S. Army DUSA-IA, Fort Leavenworth, Kan. All information is unclassified.

Winter 1997 37 Update Special Warfare

Bragg thoroughfare renamed will find he was more than a hero. and 20th SF groups — are sched- for SF MOH winner He was, and still is, the epitome of uled to complete three blocks of what each of us is capable of intelligence-related instruction via Fort Bragg’s Community Access becoming. He will continue to the Internet in April, Ramirez said. Road was officially renamed inspire others to be what he was Zabitosky Road March 7 in honor of and what made him a Medal of Special Warfare available retired Master Sergeant Fred W. Honor recipient.” — SGT Brian on Worldwide Web Zabitosky, a Special Forces Medal of Thomas, USASOC PAO Honor recipient who died in 1996. Special Warfare is now available A native of Trenton, N.J., SF ANCOC to offer on the Worldwide Web as part of the home page of the U.S. Army Zabitosky enlisted in the Army in distance learning 1959 and later served as a member Special Operations Command. of the 1st, 5th, 7th and 20th Special Students in the Special Forces The Special Warfare site con- Forces groups. He served four tours Advanced NCO Course, or SF tains all issues from March 1992 to in Southeast Asia between 1964 ANCOC, will soon receive some of the present. Eventually, all issues and 1972. their instruction by means of dis- from the first, April 1988, will be On Feb. 19, 1968, Zabitosky was tance learning. available. The site also features an an assistant team leader of a nine- By October 1997, SF ANCOC is index of the articles that are avail- man, long-range reconnaissance scheduled to be connected to a dis- able on-line. patrol in Laos, when the patrol was tance-learning network that will The issues and the index are in attacked by a numerically superior give SF ANCOC instructors and stu- portable document format, or PDF. North Vietnamese army unit. The dents access to the Internet and to To read PDF files, users will need to 25-year-old staff sergeant worked to video teletraining and teleconferenc- download a copy of Acrobat Reader rally his team members and to ing, according to Command Sergeant software from the Web site. The soft- deploy them defensively. Rescue Major Henry Ramirez, commandant ware allows users to read, copy and helicopters picked up the team, but of the SWCS NCO Academy. print from the files. It also has a Zabitosky’s helicopter was immedi- Currently 18 weeks of resident “find” feature that can be used to ately shot down, and Zabitosky was training, SF ANCOC contains search for particular words through- thrown from the craft. After regain- three weeks of common leader out an issue. ing consciousness, and despite seri- training, two weeks of MOS-specif- The universal resource locator is ous burns and crushed ribs, ic training, 12 weeks of operations- www.usasoc.soc.mil. Once on the Zabitosky returned to the helicopter and-intelligence training, and a USASOC home page, click on the and pulled the pilot to safety. For his one-week field-training exercise. item, “USASOC Public Affairs Office- actions, he was awarded the Medal The Army Training and Doctrine approved command web pages.” of Honor by President Richard M. Command has provided $934,000 When the “What’s New” list appears, Nixon in March 1969. Zabitosky to the Special Warfare Center and click on “Special Warfare Magazine” retired from the Army Nov. 11, 1977. School for a course conversion, to access the magazine site. Ramirez said. SF ANCOC will be “With the renaming of Commu- Air Force school nity Access Road to Zabitosky divided into 10 weeks of resident Road, it is hoped that our soldiers training and eight weeks of dis- offers SOF courses will be reminded of who he was,” tance learning. The U.S. Air Force Special Opera- said Major General Kenneth R. In preparation for this new train- tions School, located at Hurlburt Bowra, commander of the U.S. ing strategy, 40 students — 20 from Field, Fla., offers courses that focus on Army Special Forces Command. the Operations and Intelligence special-operations missions and func- “Once they learn more about him Transition Course at the SWCS tions, regional and cultural orienta- and of his values and ethics, they NCO Academy and 20 from the 19th tion, antiterrorism, joint planning

38 Special Warfare and crisis-response skills. The school’s (June 14-18) focuses on Asian-Pacific dination operations in all environ- mission is to educate U.S. military culture, history and politics. It also ments, including coalition warfare. and other personnel in the mission covers personal security and antiter- Publication of the final draft is and the functions of special opera- rorism training for the region. scheduled for May 1997. tions in the evolving world threat. Latin American Orientation For more information, telephone Over the next few months, the fol- Course (June 21-25) provides an the SF Training and Doctrine Divi- lowing courses will be offered: introduction to the Latin American sion at DSN 239-5333/3416 or com- Cross-Cultural Communications region, with an emphasis on cultur- mercial (910) 432-5333/3416. Course (May 5-9 and July 7-11) al, military, political and security offers a look at the development of issues. Speakers will discuss coun- New SWCS directorate American culture and provides a terdrug operations, security assist- to design future ARSOF brief overview of different world ance, regional terrorist threat The commander of the Army Spe- regions and of ways to interact with assessments and country studies. cial Operations Command has people of different cultures. Joint Senior Psychological Opera- recently designated the Special Dynamics of International Terror- tions Course (July 8-10) is for senior- Warfare Center and School as the ism (May 5-9 and June 23-27) pro- level officers and equivalent civilians architect of future Army special- vides a basic awareness of the ter- who need to know about psychological operations forces. rorist threat on both an internation- operations and how to request and To deal with that new function, al and a regional basis. Emphasis is obtain PSYOP. The course requires a the SWCS commander, Major Gen- placed on individual protective top-secret clearance. eral William P.Tangney, has created measures that government person- All USAFSOS courses are free. the Concept Development Direc- nel and their families can employ to Sponsoring units fund the lodging, torate. The new directorate is minimize the terrorist threat. per diem and travel costs for per- staffed with personnel transferred Introduction to Special Operations sonnel attending. Application proce- from USASOC’s Deputy Chief of Course (May 13-16 and July 22-25) dures and detailed course descrip- Staff for Requirements Integration. covers the forces assigned to USSO- tions are contained in the USAF The director of the SWCS Direc- COM and uses case studies to pro- Special Operations School FY 97 torate of Training and Doctrine will vide analyses of select special-opera- course catalog. For further informa- also serve as the Director of the tions missions. tion, telephone the USAFSOS regis- Concept Development Directorate. Joint Psychological Operations trar at DSN 579-4731 or commer- The Concept Development Direc- Course (May 19-23) provides officers, cial (904) 884-4731. torate is composed of three divi- NCOs (E5 and above), and equiva- SWCS to publish sions: Concept, Science and Technol- lent civilian students with an aware- ogy, and Experimentation. The ness of PSYOP doctrine and tech- new SF training circulars directorate’s mission is to: niques. The course requires a secret The Special Warfare Center and • Manage the execution of the clearance. School’s Special Forces Training TRADOC Requirements Deter- Middle East Orientation Course and Doctrine Division is in the mination Process. (May 19-23) is a one-week orienta- process of publishing two new doc- • Manage the development of oper- tion to the region. The course will uments that apply to current Spe- ational concepts and the estab- enhance the students’ historical, cial Forces operations. lishment of future operational cultural and political background In November 1996, SWCS held capabilities, or FOCs, for ARSOF. and help them to develop cross-cul- the initial draft conference on TC • Integrate ARSOF FOCs into the tural strategies. 31-34, Humanitarian Demining TRADOC FOC-development Aviation in Foreign Internal Operations Handbook. Because of process. Defense Course (May 19-23) is a recent U.S. legislative changes to • Develop and manage the week-long seminar that addresses the humanitarian demining pro- USASOC future technology plan. planning and executing aviation gram, publication of the final draft • Develop the USASOC experi- activities in support of joint foreign- of TC 31-34 has been rescheduled mentation plan. internal-defense operations. Guest for June 1997. • Integrate ARSOF into advanced lecturers will address legal issues, TC 31-27, Army Special Forces war-fighting experiments. interagency air operations, employ- Liaison Coordination Element ing airpower in support of internal- Handbook, is intended to provide a defense-and-development strategies, doctrinal base for Special Forces and joint-planning requirements. personnel engaged in liaison/coor- Asia-Pacific Orientation Course

Winter 1997 39 Book Reviews Special Warfare

From Hitler’s Doorstep: The ods often proved effective. Early in Wartime Intelligence Reports the war, he developed his own list of , 1942-1945. Edit- of “useful Germans.” British intel- ed with Commentary by Neal H. ligence regarded American efforts Petersen. University Park, Pa.: The to work with the resistance as Pennsylvania State University ill-advised amateurism. The Brits Press, 1996. ISBN: 0-271-01485-7. also threw back Fritz Kolbe, 684 pages. $85. an anti-Nazi walk-in from the German Foreign Office, dismiss- Of the approximately 500 record ing him as a Nazi plant. Kolbe groups maintained by the National later became one of the most Archives, Record Group 226, the important agents-in-place of Records of the Office of Strategic World War II, providing Dulles Services, or OSS, is among the with more than 2,000 document most heavily referenced. texts and summaries. Many a researcher has used With the assistance of Kolbe and these records to great advantage. other German agents, Dulles An outstanding example is Neal revealed the German penetration Petersen’s From Hitler’s Doorstep: of the British embassy in Ankara The Wartime Intelligence Reports of (code name Cicero) and determined Allen Dulles, 1942-1945. the launch sites of the V-1 and V-2. Under the leadership of the 1942, he brought his knowledge Before July 20, 1944, Dulles dynamic William (“Wild Bill”) and experience of State Depart- advised Washington of the immi- Donovan, the OSS developed the ment methods and procedures to nent attempt on Hitler’s life, iden- entire intelligence cycle: collection, his , , office at tifying the major plotters. His evaluation, collation, analysis, syn- 23. Spies were every- best-known success was his clan- thesis, interpretation, presenta- where in Switzerland, a neutral destine negotiation of a surrender tion, and dissemination of nation surrounded by Axis powers. of German forces in Italy (Opera- processed intelligence. The OSS Pouch mail was unsafe, so radi- tion Sunrise). Only the disarray of also conducted covert-action oper- ograms and cablegrams provided the German general officers in ations behind enemy lines, perfect- the only reliable means of contact Italy and the hesitancy of Washing- ed an astonishing array of special with Washington and other OSS ton and London, writes Petersen, weapons and devices, disseminat- posts. delayed Sunrise and precluded a ed black propaganda, developed Over the course of years, as he more timely capitulation that could special-operations units that was researching for his biography have changed the face of postwar became the prototypes of the Spe- of Allen Dulles, Petersen studied Europe. cial Forces, laid the groundwork the Bern cables thoroughly. His Dulles made some mistakes. for the postwar Nazi trials, pro- careful selection from the OSS Order-of-battle intelligence provid- duced films and did much more. cable files, arranged with com- ed by the OSS Bern office was One could almost write a history of ments and abundant citations, decidedly poor at first, but in time World War II from the OSS records makes a highly useful and surpris- it improved enough to be used to alone. ingly readable history of the war — confirm and supplement Ultra Like other members of his family the view from Herrengasse 23. intercepts. Petersen also adds that before him, Allen Dulles served Though Petersen finds that Dulles doubtless spent too much with distinction in the American Dulles’ reports had little influence effort on ineffectual intellectuals, diplomatic corps. In November on high-level policy, Dulles’ meth- British castoff sources, and danger-

40 Special Warfare ous political renegades. He also using his own analytical frame- contributed to the idea that the work to form a representative Germans were preparing to make a sampling of raiding and coups de last-ditch stand in an alpine main throughout history. redoubt. Although no alpine Specifically developed to redoubt actually existed, the Ger- encourage the analysis of issues mans encouraged the notion as a such as the importance of sur- deliberate deception operation. prise, the need for integration of Petersen’s bibliography is thor- general-purpose forces and special ough and well-annotated. He notes, forces, and the impact of special however, that the OSS’s “collection operations on war, this work also totals over 3,000 cubic feet of covers the range of missions asso- records.” In fact, despite their var- ciated with the U.S. special-opera- ied history, the OSS records are not tions forces of today. Intertwined a collection, but an organic body of with dramatic stories of raids by records created and received by a specially manned and equipped federal agency and maintained by forces are enlightening portrayals successor agencies. They total more of unconventional warfare, foreign than 6,500 cubic feet: some 1,800 internal defense, reconnaissance cubic feet accessioned from the and counterterrorism. State Department and more than Beyond its intended purpose, 4,700 cubic feet accessioned to date this varied array of writings from the Central Intelligence From Troy to Entebbe: Special addresses the vital factor of per- Agency. These are minor distinc- Operations in Ancient and sonal character in the military tions, however, of far more concern Modern Times. Edited by John profession, along with examples of to an archivist than to historians Arquilla. Lanham, Md.; Universi- leadership (effective and other- and other researchers. ty Press of America, 1996. ISBN: wise), and an insightful story of This book of select documents 0-7618-0186-3. 360 pages. $19.95. courage and fear in combat writ- and commentary is the work of a ten by a keen observer of the mature historian, one who has Was the Trojan Horse a distant human condition: Leon Tolstoy. researched his subject well. It is forerunner of the Combat Talon In summary, From Troy to the finest book of its kind to be II? Dr. John Arquilla, who teaches Entebbe is an excellent vehicle for found. It includes a sound intro- in the Special Operations and Low expanding the literary horizons of duction, is well-footnoted and pro- Intensity-Conflict curriculum at the casual reader of military his- vides a highly useful list of code the Naval Postgraduate School, tory. More importantly, it is a names and cover names. Its thor- would have you believe so, as he valuable source of material for the ough index will make it a major takes you through a diverse set of serious discussion of special oper- asset to scholars who seek to factual, fictional and even mythi- ations in professional-develop- explain the origins of the American cal cases of special operations ment sessions and in professional- intelligence community and to throughout history. military-education courses. understand the largest single From Troy to Entebbe is an event in history, the Second World anthology of literary and eyewit- GEN Henry H. Shelton War. ness accounts of military and USSOCOM paramilitary operations that fell MacDill AFB, Fla. Dr. Lawrence H. McDonald outside the realm of conventional National Archives warfare during their respective College Park, Md. time periods. Arquilla ties the individual accounts together,

Special Warfare adopts quarterly designation Beginning with this issue, Special Warfare will designate each issue by the quarter during which it appears rather than by the month. — Editor

Winter 1997 41 Special Warfare

This publication is approved for public release; distribution is unlimited ■ Headquarters, Department of the Army

Department of the Army SPECIAL STANDARD B JFK Special Warfare Center and School POSTAGE & FEES PAID ATTN: AOJK Ð DT Ð MDM CLAYSBURG, PA 16625 Fort Bragg, NC 28307 Ð 5000 PERMIT NO. 6

PIN: 075377Ð000