FM 3-05.20. Special Forces Operations

Total Page:16

File Type:pdf, Size:1020Kb

FM 3-05.20. Special Forces Operations FM 3-05.20 (FM 31-20) SPECIAL FORCES OPERATIONS June 2001 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 5 December 2003. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DT-SFD, Fort Bragg, North Carolina 28310-5000. DESTRUCTION NOTICE: Destroy by any method that must prevent disclosure of contents or reconstruction of the document. Headquarters, Department of the Army C1, FM 3-05.20 (FM 31-20) Change No. 1 Headquarters Department of the Army Washington, DC, 1 April 2004 SPECIAL FORCES OPERATIONS This change corrects the application of the 96-hour planning process in Special Forces operations. FM 3-05.20 (FM 31-20), 26 June 2001, is changed as follows: 1. New or changed material is identified by a vertical bar ( ) in the margin opposite the changed material. 2. File this transmittal sheet in front of the publication for reference purpose. 3. Remove old pages and insert new pages as indicated below: Remove old pages: Insert new pages: 6-1 through 6-18 6-1 through 6-19 C-3 and C-4 C-3 and C-4 Index-1 through Index-3 Index-1 through Index-3 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 5 December 2003. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DT-SFD, Fort Bragg, North Carolina 28310-5000. DESTRUCTION NOTICE: Destroy by any method that must prevent disclosure of contents or reconstruction of the document. C1, FM 3-05.20 (FM 31-20) 1 APRIL 2004 By Order of the Secretary of the Army: PETER J. SCHOOMAKER General, United States Army Chief of Staff Official: JOEL B. HUDSON Administrative Assistant to the Secretary of the Army 0407104 DISTRIBUTION: Active Army, Army National Guard, and U. S. Army Reserve: To be distributed in accordance with the initial distribution number 110531, requirements for FM 3-05.20. This publication is available at Army Knowledge Online www.us.army.mil *FM 3-05.20 Field Manual Headquarters No. 3-05.20 Department of the Army Washington, DC, 26 June 2001 SPECIAL FORCES OPERATIONS Contents Page PREFACE ..................................................................................................................iv Chapter 1 INTRODUCTION TO SPECIAL FORCES .............................................................. 1-1 The Evolution of Special Forces.............................................................................. 1-1 Special Forces Applications in Today’s Environment.............................................. 1-4 Regional Orientation................................................................................................ 1-5 Core Competencies................................................................................................. 1-6 Role of Special Forces in National Security Strategy.............................................. 1-9 Overt, Low-Visibility, Covert, and Clandestine Operations.................................... 1-14 Special Forces and the Principles of War ............................................................. 1-15 Army Values .......................................................................................................... 1-18 Special Forces Core Values.................................................................................. 1-18 Army Special Operations Forces Truths ............................................................... 1-18 Special Operations Imperatives ............................................................................ 1-20 Special Operations Mission Criteria ...................................................................... 1-22 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 5 December 2003. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DT-SFD, Fort Bragg, North Carolina 28310-5000. DESTRUCTION NOTICE: Destroy by any method that must prevent disclosure of contents or reconstruction of the document. * This publication supersedes FM 31-20, 20 April 1990. i FM 3-05.20 Page Chapter 2 SPECIAL FORCES MISSIONS ...............................................................................2-1 Unconventional Warfare...........................................................................................2-1 Foreign Internal Defense ........................................................................................2-11 Direct Action ...........................................................................................................2-12 Special Reconnaissance ........................................................................................2-15 Combatting Terrorism.............................................................................................2-17 Counterproliferation ................................................................................................2-18 Information Operations...........................................................................................2-19 Collateral Activities .................................................................................................2-21 Multiple and Follow-On Missions............................................................................2-24 Special Forces Support for U.S. Tactical Operations.............................................2-24 Special Forces Operations in Rear Areas ..............................................................2-25 Force Protection .....................................................................................................2-26 Chapter 3 SPECIAL FORCES ORGANIZATION .....................................................................3-1 Special Forces Group (Airborne)..............................................................................3-1 Headquarters and Headquarters Company..............................................................3-1 Group Support Company........................................................................................3-10 Special Forces Battalion.........................................................................................3-17 Battalion Headquarters and Headquarters Detachment (SFODC) ........................3-17 Battalion Support Company....................................................................................3-23 Special Forces Company .......................................................................................3-25 Special Forces Operational Detachment A ............................................................3-28 Chapter 4 COMMAND AND CONTROL OF SPECIAL FORCES OPERATIONS ...................4-1 Command Environment............................................................................................4-1 United States Army Special Operations Command .................................................4-1 United States Army Special Forces Command (Airborne) .......................................4-2 Theater Special Operations Command ....................................................................4-2 Joint Special Operations Task Force .......................................................................4-3 Operational Bases ....................................................................................................4-4 Battle Staff ................................................................................................................4-5 Liaison and Coordination Operations .......................................................................4-5 Special Forces Command and Control During Stability Operations.........................4-6 Special Forces Command and Control During Contingency Operations .................4-8 Special Forces Command and Control of Conventional Forces ............................4-11 ii FM 3-05.20 Page Chapter 5 SPECIAL FORCES OPERATIONAL BASES ......................................................... 5-1 Base Location Considerations ................................................................................. 5-1 Base Organization.................................................................................................... 5-2 Alternate Bases........................................................................................................ 5-2 Base Displacement .................................................................................................. 5-2 Operations Center.................................................................................................... 5-2 Support Center......................................................................................................... 5-9 Signal Center ......................................................................................................... 5-12 Base Defense .......................................................................................................
Recommended publications
  • Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action
    ARTICLE Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action Andru E. Wall* Abstract Modern warfare requires close integration of military and intelligence forces. The Secretary of Defense possesses authorities under Title 10 and Title 50 and is best suited to lead US government operations against external unconventional and cyber threats. Titles 10 and 50 create mutually supporting, not mutually exclusive, authorities. Operations conducted under military command and control pursuant to a Secretary of Defense-issued execute order are military operations and not intelligence activities. Attempts by congressional overseers to redefine military preparatory operations as intelligence activities are legally and historically unsupportable. Congress should revise its antiquated oversight structure to reflect our integrated and interconnected world. I. Introduction After being hunted for nearly ten years, Osama Bin Laden was shot and killed by U.S. Navy SEALs in the early hours of May 2, 2011. The identity of the elite special operations unit that conducted the raid on bin Laden's compound in Pakistan was not immediately released, as the * Senior Associate with Alston & Bird LLP; former senior legal advisor for U.S. Special Operations Command Central (2007 to 2009). While this article was cleared for publication as required by my security clearance and nondisclosure agreements, the views expressed herein are my own and do not necessarily reflect the position of the U.S. government or Department of Defense. I thank Harvard Law School for its generous support of this paper andJack Goldsmith, Hagan Scotten., Mark Grdovic, Nick Dotti, Chris Costa, Michael Bahar, and Lenn Ferrer for their invaluable comments and suggestions.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]
  • Special Operations
    Joint Publication 3-05 Special Operations 16 July 2014 PREFACE 1. Scope This publication provides overarching doctrine for special operations and the employment and support for special operations forces across the range of military operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders and prescribes joint doctrine for operations, education, and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the joint force commander from organizing the force and executing the mission in a manner the joint force commander deems most appropriate to ensure unity of effort in the accomplishment of the overall objective. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the CJCS, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance.
    [Show full text]
  • Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms
    Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms 8 November 2010 (As Amended Through 15 February 2016) As Amended Through 15 February 2016 PREFACE 1. Scope The Joint Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated Terms, sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components. 2. Purpose This publication supplements standard English-language dictionaries and standardizes military and associated terminology to improve communication and mutual understanding within DOD, with other federal agencies, and among the United States and its allies. 3. Application This publication applies to the Office of the Secretary of Defense, the Services, the Joint Staff, combatant commands, DOD agencies, and all other DOD components. It is the primary terminology source when preparing correspondence, to include policy, strategy, doctrine, and planning documents. Criteria for inclusion of terminology in JP 1-02 is enumerated in Department of Defense Instruction 5025.12, Standardization of Military and Associated Terminology, and Chairman of the Joint Chiefs of Staff Instruction (CJCSI) 5705.01, Standardization of Military and Associated Terminology. 4. Publication Format This edition of JP 1-02 has been published in two basic parts: a. Terms and definitions. These are annotated with the source publication. b. Abbreviations and acronyms. The source publication establishes the authoritative context for proper understanding and management of the associated term. 5. JP 1-02 Online Availability and Update Schedule JP 1-02 is accessible online as a searchable database and in PDF format at the following Internet address: http://www.dtic.mil/doctrine/dod_dictionary and at the following NIPRNET i Preface As Amended Through 15 February 2016 address: https://jdeis.js.mil/jdeis/.
    [Show full text]
  • Offensive Cyberspace Operations: a Gray Area in Congressional Oversight
    OFFENSIVE CYBERSPACE OPERATIONS: A GRAY AREA IN CONGRESSIONAL OVERSIGHT DR. CHRISTOPHER E. BAILEY, SJD ABSTRACT In past 15 years offensive cyberspace operations have become a significant instrument of national power, with state practice ranging from relatively benign intelligence collection to uses of force that threaten international peace and security. Cyberspace operations offer many advantages to the attacker, including the ability to conduct discrete operations that promise a high pay-off at an apparent low-risk. For the defender, there are difficult problems in characterizing an event and identifying the responsible parties. These offensive cyberspace operations raise important questions under international and domestic law concerning the use of force “short of hostilities” in advancing identifiable foreign policy objectives and national security interests of the United States. Recent changes in U.S. law that have allowed the Department of Defense (“DoD”) and the U.S. Cyber Command (“U.S. CYBERCOM”) broader legal authority to conduct offensive cyberspace operations raise serious problems with executive and congressional oversight. In effect, the 2019 National Defense Authorization Act (“NDAA”), signed into law by President Donald Trump on August 13, 2018, muddies the traditional distinctions between Title 10 (Armed Forces) and Title 50 (War and National Defense) authorities, which allows the DoD to conduct coercive and covert actions— to “defend forward” through “persistent engagement” — that it considers “short of hostilities.” This authority creates a risk that DoD would commit an internationally wrongful act, such as a use of force in violation of the Charter of the United Nations, that would jeopardize important national interests. Thus, Congress should act to require pre-operational presidential approval for specified activities, define key Dr.
    [Show full text]
  • The United States Cyber Warfare Strategy Toward Iran: Operation Olympic Games and Cyber Warfare As the New International Security Threat (2010- 2016)
    THE UNITED STATES CYBER WARFARE STRATEGY TOWARD IRAN: OPERATION OLYMPIC GAMES AND CYBER WARFARE AS THE NEW INTERNATIONAL SECURITY THREAT (2010- 2016) By Hinayah Nur M. Asri 016201300066 A thesis presented to Faculty of Humanities, President University In partial fulfillment of the requirements for Bachelor’s Degree in International Relations Concentration of Strategic and Defense Studies 2017 THESIS ADVISOR RECOMMENDATION LETTER This thesis entitled “THE UNITED STATES CYBER WARFARE STRATEGY TOWARD IRAN: OPERATION OLYMPIC GAMES AND CYBER WARFARE AS THE NEW INTERNATIONAL SECURITY THREAT (2010-2016)” prepared and submitted by Hinayah Nur M. Asri in partial fulfillment of the requirements for the degree of Bachelor Degree in the Faculty of Humanities has been reviewed and found to have satisfied the requirements for a thesis fit to be examined. I therefore recommend this thesis for Oral Defense. Cikarang, Indonesia, May 26th, 2017 Prof. Anak Agung Banyu Perwita, Ph.D. ii DECLARATION OF ORIGINALITY I declare that this thesis, entitled “THE UNITED STATES CYBER WARFARE STRATEGY TOWARD IRAN: OPERATION OLYMPIC GAMES AND CYBER WARFARE AS THE NEW INTERNATIONAL SECURITY THREAT (2010-2016)” is, to the best of my knowledge and belief, an original piece of work that has not been submitted, either in whole or in part, to another university to obtain a degree. Cikarang, Indonesia, May 26th, 2017. Hinayah Nur M. Asri iii PANEL OF EXAMINERS APPROVAL SHEET The Panel of examiners stated that the thesis entitled “THE UNITED STATES CYBER WARFARE STRATEGY TOWARD IRAN: OPERATION OLYMPIC GAMES AND CYBER WARFARE AS THE NEW INTERNATIONAL SECURITY THREAT (2010- 2016)” that was submitted by Hinayah Nur M.
    [Show full text]
  • Wisdom Begins with the Definition of Terms -- Socrates
    OFFICE OF COUNTERINTELLIGENCE (DXC) DEFENSE CI & HUMINT CENTER DEFENSE INTELLIGENCE AGENCY 2 May 2011 GLOSSARY (UNCLASSIFIED) TERMS & DEFINITIONS OF INTEREST FOR DoD COUNTERINTELLIGENCE PROFESSIONALS Wisdom begins with the definition of terms -- Socrates 2X The counterintelligence and human intelligence advisor to the C/J/G/S-2. Denotes the 2X positions at all echelons. The 2X staff conducts technical control and oversight for all counterintelligence and human intelligence entities with[in] their operational purview. It coordinates, de-conflicts, and synchronizes all counterintelligence and human intelligence activities at each level of command. (Army FM 2-22.2, Counterintelligence, Oct 2009) Also see J2X. -- Also, the manager of the counterintelligence and human intelligence missions at various levels of DoD structure, including joint, command, service, and task force. The 2X structure includes the Counterintelligence Coordinating Authority (CICA) and the Human Intelligence Operations Center (HOC). (AR 381-20, Army CI Program (U), 25 May 2010) 811 Referral. See Section 811 Referral. A-Space. An abbreviation for Analytical Space. A virtual work environment that provides analyst from across the Intelligence Community a common platform to do their research and analysis and to easily connect with colleagues working the same or similar issues to collaboratively achieve common mission objectives. (Intellipedia; accessed 22 Oct 2010) Also see J-Space. Abort. To terminate a mission for any reason other than enemy action. It may occur at any point after the beginning of the mission and prior to its completion. (JP 1-02)* This unclassified glossary is periodically updated. Recommended changes, corrections, and/or additions are encouraged. For recommended additions provide a source for the definition.
    [Show full text]
  • Unacknowledged Special Operations and Covert Action 5B
    DIFFERENT WORLDS: UNACKNOWLEDGED SPECIAL OPERATIONS AND COVERT ACTION BY COLONEL RICHARD C. GROSS United States Army DISTRIBUTION STATEMENT A: Approved for Public Release. Distribution is Unlimited. USAWC CLASS OF 2009 This SRP is submitted in partial fulfillment of the requirements of the Master of Strategic Studies Degree. The views expressed in this student academic research paper are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. Strategy Research Project U.S. Army War College, Carlisle Barracks, PA 17013-5050 Form Approved Report Documentation Page OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 30 MAR 2009 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Different Worlds: Unacknowledged Special Operations and Covert 5b. GRANT NUMBER Action 5c. PROGRAM ELEMENT NUMBER 6.
    [Show full text]
  • Clandestine Cell System
    Clandestine cell system “Sleeper cell” redirects here. For other uses, see Sleeper passage of time and changes in contemporary thinking cell (disambiguation). and technology.[1] Officially, the PIRA is hierarchical, but, especially as A clandestine cell structure is a method for organizing a British security forces became more effective, changed group of people in such a way that it can more effectively to a semiautonomous model for its operational and cer- resist penetration by an opposing organization. Depend- tain of its support cells (e.g., transportation, intelligence, ing on the group’s philosophy, its operational area, the cover and security).[2] Its leadership sees itself as guid- communications technologies available, and the nature of ing and consensus-building. The lowest-level cells, typ- the mission, it can range from a strict hierarchy to an ex- ically of 2-5 people, tend to be built by people with an tremely distributed organization. It is also a method used existing personal relationship. British counterinsurgents by criminal organizations, undercover operatives, and un- could fairly easily understand the command structure, but conventional warfare (UW) led by special forces. Histor- not the workings of the operational cells. ically, clandestine organizations have avoided electronic The IRA has an extensive network of inactive or sleeper communications, because signals intelligence is a strength cells, so new ad hoc organizations may appear for any of conventional militaries and counterintelligence organi- specific operation. zations. In the context of tradecraft, covert and clandestine are not synonymous. As noted in the definition (which has 1.2 World War II French Resistance been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is In World War II, Operation Jedburgh teams parachuted concealed, while in a clandestine operation the operation into occupied France to lead unconventional warfare itself is concealed.
    [Show full text]
  • A New Clandestine Service 105
    Hoover Press : Berkowitz/Intelligence hberai ch4 Mp_103_rev1_page 103 A New 4 Clandestine Service: The Case for Creative Destruction Reuel Marc Gerecht LET US START with an assertion with which all members of Con- gress and the Bush administration, including the current director of the Central Intelligence Agency, would agree: The Clandestine Service hasn’t performed well against the Islamic extremist target. Now let us make another assertion that is harder to prove (few outsiders have had the opportunity to peruse pre-9/11 operational and intelligence-production files at Langley): The Directorate of Operations (DO)—responsible within the CIA for covert opera- tions—performed poorly against all “hard targets” throughout the entire Cold War, if we measure performance by the CIA’s ability to recruit or place intelligence-producing agents inside the critical organizations of hard-target countries or groups. In “spookese,” these assets are called foreign-intelligence, or FI, agents. The DO had some luck and accomplishment in handling hard-target “walk- ins,” foreigners volunteering information to the United States. According to former Soviet–East Europe (SE) division case officers, Hoover Press : Berkowitz/Intelligence hberai ch4 Mp_104_rev1_page 104 104 Reuel Marc Gerecht all of the important Soviet assets we had during the Cold War were walk-ins. They came to us. We didn’t recruit them, though occa- sionally CIA case officers turned would-be defectors into agents willing to commit espionage inside their homelands. The CIA didn’t, of course, admit this datum to the Clandestine Service’s junior-offi- cer classes—or to anyone else—during the Cold War.
    [Show full text]
  • Cyber Operations in DOD Policy and Plans: Issues for Congress
    Cyber Operations in DOD Policy and Plans: Issues for Congress Catherine A. Theohary Specialist in National Security Policy and Information Operations Anne I. Harrington APSA Congressional Fellow January 5, 2015 Congressional Research Service 7-5700 www.crs.gov R43848 Cyber Operations in DOD Policy and Plans: Issues for Congress Summary Cyberspace is defined by the Department of Defense as a global domain consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Attacks in cyberspace have seemingly been on the rise in recent years with a variety of participating actors and methods. As the United States has grown more reliant on information technology and networked critical infrastructure components, many questions arise about whether the nation is properly organized to defend its digital strategic assets. Cyberspace integrates the operation of critical infrastructures, as well as commerce, government, and national security. Because cyberspace transcends geographic boundaries, much of it is outside the reach of U.S. control and influence. The Department of Homeland Security is the lead federal agency responsible for securing the nation’s non-security related digital assets. The Department of Defense also plays a role in defense of cyberspace. The National Military Strategy for Cyberspace Operations instructs DOD to support the DHS, as the lead federal agency, in national incident response and support to other departments and agencies in critical infrastructure and key resources protection. DOD is responsible for defensive operations on its own information networks as well as the sector- specific agency for the defense of the Defense Industrial Base.
    [Show full text]
  • Sharpening the Dagger Optimising Special Forces for Future Conflict
    Whitehall Report 1-21 Sharpening the Dagger Optimising Special Forces for Future Conflict Jack Watling Royal United Services Institute for Defence and Security Studies Sharpening the Dagger Optimising Special Forces for Future Conflict Jack Watling RUSI Whitehall Report 1-21, May 2021 Royal United Services Institute for Defence and Security Studies ii Sharpening the Dagger 190 years of independent thinking on defence and security The Royal United Services Institute (RUSI) is the world’s oldest and the UK’s leading defence and security think tank. Its mission is to inform, influence and enhance public debate on a safer and more stable world. RUSI is a research-led institute, producing independent, practical and innovative analysis to address today’s complex challenges. Since its foundation in 1831, RUSI has relied on its members to support its activities. Together with revenue from research, publications and conferences, RUSI has sustained its political independence for 190 years. The views expressed in this publication are those of the author(s), and do not reflect the views of RUSI or any other institution. Published in 2021 by the Royal United Services Institute for Defence and Security Studies. This work is licensed under a Creative Commons Attribution – Non-Commercial – No-Derivatives 4.0 International Licence. For more information, see <http://creativecommons.org/licenses/by-nc-nd/4.0/>. RUSI Whitehall Report 1-21, May 2021. ISSN 1750-9432. Printed in the UK by Stephen Austin. Royal United Services Institute Cover image: Courtesy of kaninstudio/Adobe Stock for Defence and Security Studies Whitehall London SW1A 2ET United Kingdom +44 (0)20 7747 2600 www.rusi.org RUSI is a registered charity (No.
    [Show full text]