The By-With-Through Operational Approach JFQ 89, 2Nd Quarter 2018 Conflicts Locally, Potentially Putting U.S

Total Page:16

File Type:pdf, Size:1020Kb

The By-With-Through Operational Approach JFQ 89, 2Nd Quarter 2018 Conflicts Locally, Potentially Putting U.S Explosive Ordnance Disposal Technician assigned to Commander, Task Group 56.1, explains underwater navigation system to Kuwait naval force technicians during training evolution as part of exercise Eager Response 18, Mohammed Al-Ahmad Naval Base, Kuwait, January 8, 2018 (U.S. Navy/Louis Rojas) through U.S. authorities and partner agreements. By, with, and through has The By-With-Through proved agile, adaptive, and tailorable in pursuing American interests in the USCENTCOM area of responsibility Operational Approach (AOR). Moreover, this approach will become increasingly useful globally in a complex, resource-constrained environ- By Joseph L. Votel and Eero R. Keravuori ment with advantages from use before, during, and after conflict. The U.S. military must organize, resource, and Our approach is by, with, and through our Allies, so train the joint force to operate by, with, and through with greater efficiency that they own these spaces and the U.S. does not. and effectiveness with various types of partners and whole-of-government —SECRETARY JAMES N. MAttIS involvement. Executing this approach in current and future multipolar and resource-constrained environments he U.S. Central Command requires common understanding and (USCENTCOM) definition of the development of joint force doctrine. T the by-with-through (BWT) oper- ational approach is that operations are Overview General Joseph L. Votel, USA, is Commander of led by our partners, state or nonstate, Regional conflicts can arise when state U.S. Central Command. Colonel Eero R. Keravuori, USA, is Division Chief of the Combined Strategic with enabling support from the United or nonstate actors do not have the Analysis Group, CCJ5. States or U.S.-led coalitions, and capacity and resources to resolve their 40 Special Feature / The By-With-Through Operational Approach JFQ 89, 2nd Quarter 2018 conflicts locally, potentially putting U.S. Although for USCENTCOM it is mil- in Yemen. The BWT approach in this interests in the region at risk. Tradi- itarily focused, by, with, and through case is a hybrid or multilayered example tional U.S. military solutions can inhibit complements the whole-of-government involving a stable ally as the regional local responsibility for resolving those approach to regional conflicts that impli- partner, who in turn is enabling a local problems and may even provide oppor- cate U.S. national interests. partner in Yemen. This is also an example tunities for adversaries to challenge With this definition and broad of using the BWT operational approach and reverse the legitimacy of “foreign concept, the discussion is presented in support of aligned regional interests: power” solutions. Also, despite an invi- in two parts. In the first part, several countering al Qaeda in the Arabian tation of the host government, a large USCENTCOM examples are discussed Peninsula (AQAP). Specifically, the and protracted U.S. military presence to develop a better understanding of the United States contributes counterterror- is often perceived as an invasion or an BWT approach. These examples assist the ism advising, intelligence, and logistics occupation by significant numbers of explanation of essential components in capabilities to the UAE as part of an Arab the host-country’s citizens. Aware of decisions on where, when, with whom, coalition targeting AQAP in Yemen.5 In these challenges, Secretary of Defense and how the BWT approach is used. an additional layer, U.S. military support James Mattis stated, “U.S. forces Based on USCENTCOM experience, the enables UAE, with its greater cultural, have evolved to work by, with, and second part identifies strategic and oper- historical, and tribal knowledge, in its through our allies”1 and would defeat ational selection criteria, advantages, and own BWT approach to enhance the the so-called Islamic State (IS) “by, risks that must be considered at the onset capabilities of local Yemeni counterterror- with, and through other nations.”2 The and reassessed throughout execution. ism forces in the common fight against current USCENTCOM Theater Strat- Ultimately, how this approach impacts AQAP.6 Supporting allied missions by, egy states, “‘by, with and through’ is an the joint force and considerations for with, and through our regional partners important component of our strategic current and future doctrine and readiness is one way to secure common interests approach,”3 and “we choose to prevail are presented. and share responsibility and resource ‘by, with and through’ . nations that burdens. Furthermore, it exemplifies how share our interests.”4 The USCENTCOM AOR the joint force could use the approach to As this approach gains increasing Current examples in the USCENT- reassure and strengthen existing alliances usage, it is important to address what it COM AOR of BWT operational and deepen interoperability as envisioned entails and its implications for the joint approaches include: in the 2018 National Defense Strategy.7 force. The phrase has many potential Afghanistan. Contrastingly, the interpretations; therefore, along with the • Multilayered approach to counterter- Afghanistan mission gradually evolved definition above, a conceptual framing rorism in Yemen into a BWT approach as recognition of of its meaning is necessary. The BWT • U.S. Forces–Afghanistan’s Operation the need for domestic legitimacy and operational approach seeks to achieve Freedom’s Sentinel (OFS) ownership increased. In 2001, the United U.S. national interests by engaging and • North Atlantic Treaty Organization States entered Afghanistan to destroy al enabling partners’ local and regional (NATO) Operation Resolute Support Qaeda and defeat the Taliban without capabilities and leadership. Through (ORS) in Afghanistan an accurate appreciation for the Afghans’ American authorities and partner agree- • Operation Inherent Resolve (OIR) in capacity to retain these gains.8 General ments, joint force enablers can support, the campaign against IS. Stanley McChrystal, USA (Ret.), re- organize, train, equip, build/rebuild, and flected that in Afghanistan, as in Vietnam, advise partners’ security forces and their After several interviews and discus- the adversary was able to ratchet up and supporting institutions from the tactical sions with the leadership involved in these down both the size and composition to ministerial levels. operations, the recognized value of a of its forces to counter U.S. strengths. By, with, and through is not yet a BWT operational approach is consistent, The U.S. military was employing greater doctrine or a strategy or a formal military as are some of the concerns. The compo- numbers of conventional forces and gain- program. Instead, it is considered an op- sition and application of U.S. support to ing increasing ownership of the problem.9 erational approach to be used during the each of these conflicts are not identical. In Afghanistan, this cycle culminated with course of security cooperation activities In each, U.S. force structure and em- the conclusion of Operation Enduring or military campaigns. The approach ployment reflect the agile and tailorable Freedom and the start of OFS and ORS, pursues more culturally acceptable and nature of a BWT approach and illustrate both taking a BWT approach to the durable solutions by developing and the unique challenges that develop in the problem. supporting partner participation and various conflicts. ORS is established under a Status of operational ownership. By, with, and Yemen. Before exploring larger scale Forces Agreement (SOFA) between the through is a way of conducting military efforts in Afghanistan, Iraq, and Syria, Afghanistan government and NATO. activities and operations with less direct it is worth exploring the operational The SOFA authorizes NATO forces to combat employment of U.S. forces. approach supporting counterterrorism provide noncombat training, advising, JFQ 89, 2nd Quarter 2018 Votel and Keravuori 41 and assistance to the Afghan National forward operating base advise-and-assist significant change from the previous mil- Defense and Security Forces (ANDSF).10 programs to expeditionary advising pro- itary involvement. As Brigadier General The United Nations Security Council grams that accompanied Iraqi Security John Richardson points out, in 2008 the adopted Resolution 2189, welcoming Forces into its operations to liberate Iraqi U.S. military was still telling the Iraqi mil- ORS as an expression of the international territory. Similarly, U.S. and coalition itary what to do and when to do it, even commitment to Afghanistan stability and special operations forces (SOF) in Syria when the Iraqis were the lead element. the financial sustainment of the ANDSF operated near the forward line of troops Although the United States and its coali- through 2020.11 The execution of the with the partner unit of action. In Iraq, tion partners were building ISF capacity, current BWT approach in support of the force-protection concerns initially limited their ownership of the conflict was inhib- ANDSF fosters domestic legitimacy and the influence that our enablers could ited by our lack of tactical patience to let ownership of Afghan security by its indig- provide.14 It is now recognized that them lead.15 Lieutenant General Stephen enous security institutions and bolsters partnering at the right level with the unit Townsend further notes that in 2007, the international legitimacy for the mission. of action creates better use and influence Iraqis did not ask for the surge of U.S. Even so, in 2016 and 2017, it was from the enabling assets. troops to fight the insurgency. In 2014, recognized that the mission and ANDSF In the USCENTCOM AOR, this is by comparison, the Iraqi government were still facing challenges in maintaining often, but not always, at the brigade level. asked the world for help. The differ- consistent progress against the Taliban. Advising with a broader set of expertise ence in operational success, Lieutenant Several of the commanders we inter- and down to the kandak (battalion) level General Townsend states, was not in ISF viewed, with multiple tours in Iraq and in Afghanistan will be the third evolution capability from 2007 to 2014.
Recommended publications
  • Military Guide to Terrorism in the Twenty-First Century
    US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No.
    [Show full text]
  • Meeting the Anti-Access and Area-Denial Challenge
    Meeting the Anti-Access and Area-Denial Challenge Andrew Krepinevich, Barry Watts & Robert Work 1730 Rhode Island Avenue, NW, Suite 912 Washington, DC 20036 Meeting the Anti-Access and Area-Denial Challenge by Andrew Krepinevich Barry Watts Robert Work Center for Strategic and Budgetary Assessments 2003 ABOUT THE CENTER FOR STRATEGIC AND BUDGETARY ASSESSMENTS The Center for Strategic and Budgetary Assessments is an independent public policy research institute established to promote innovative thinking about defense planning and investment strategies for the 21st century. CSBA’s analytic-based research makes clear the inextricable link between defense strategies and budgets in fostering a more effective and efficient defense, and the need to transform the US military in light of the emerging military revolution. CSBA is directed by Dr. Andrew F. Krepinevich and funded by foundation, corporate and individual grants and contributions, and government contracts. 1730 Rhode Island Ave., NW Suite 912 Washington, DC 20036 (202) 331-7990 http://www.csbaonline.org CONTENTS EXECUTIVE SUMMARY .......................................................................................................... I I. NEW CHALLENGES TO POWER PROJECTION.................................................................. 1 II. PROSPECTIVE US AIR FORCE FAILURE POINTS........................................................... 11 III. THE DEPARTMENT OF THE NAVY AND ASSURED ACCESS: A CRITICAL RISK ASSESSMENT .29 IV. THE ARMY AND THE OBJECTIVE FORCE ..................................................................... 69 V. CONCLUSIONS AND RECOMMENDATIONS .................................................................... 93 EXECUTIVE SUMMARY During the Cold War, the United States defense posture called for substantial forces to be located overseas as part of a military strategy that emphasized deterrence and forward defense. Large combat formations were based in Europe and Asia. Additional forces—both land-based and maritime—were rotated periodically back to the rear area in the United States.
    [Show full text]
  • Ground Combat Overmatch Through Control of the Atmospheric
    Romanian soldier fires rocket propelled grenade at range near Bemowo Piskie Training Area, Poland, January 24, 2018, as part of multinational battle group comprised of U.S., UK, Croatian, and Romanian soldiers supporting NATO’s Enhanced Forward Presence (U.S. Army/Andrew McNeil) he U.S. military is seeking dis- Ground Combat ruptive innovations to sustain T its technological advantage despite rapid advances by potential adversaries. The need is particularly Overmatch Through acute in ground combat, where most U.S. casualties are sustained and where game-changing technical innovations Control of the have been less common than in other military mission areas. The Search for Tactical Atmospheric Littoral Overmatch In addition to increasing technologi- By George M. Dougherty cal pressure, recent coalition combat experiences and defense studies suggest that the future battlefield will be more complex than in the past. Combat in built-up areas including megacities will become commonplace. As concluded Colonel George M. Dougherty, USAF, is the Individual Mobilization Augmentee to the Deputy Assistant Secretary of the Air Force for Science, Technology, and Engineering, Office of the Assistant Secretary of by a recent report, “Urban operations the Air Force for Acquisition and Logistics, in Washington, DC. in the 21st century are not just another 64 Features / Control of the Atmospheric Littoral JFQ 94, 3rd Quarter 2019 type of operation; they will become this tion of robotics and autonomy to forces can move, concentrate, and century’s signature form of warfare.”1 the land domain has focused largely disperse without hindrance, much The pivotal battles in Iraq and Syria on unmanned ground vehicles.
    [Show full text]
  • Army Fires Capabilities for 2025 and Beyond
    Army Fires Capabilities for 2025 and Beyond John Gordon IV, Igor Mikolic-Torreira, D. Sean Barnett, Katharina Ley Best, Scott Boston, Dan Madden, Danielle C. Tarraf, Jordan Willcox C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/RR2124 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9967-9 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2019 RAND Corporation R® is a registered trademark. Cover: Army photo by Spc. Josselyn Fuentes. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report documents research and analysis conducted as part of a project entitled Army Fires for Army 2025, sponsored by the Field Artil- lery School at Fort Sill, Oklahoma (a part of the U.S.
    [Show full text]
  • Towards a Visual Analysis of Videogames and Social Media
    This is a repository copy of Visualizing war? : Towards a visual analysis of videogames and social media. White Rose Research Online URL for this paper: https://eprints.whiterose.ac.uk/116956/ Version: Accepted Version Article: Robinson, Nick and Schulzke, Marcus Brady orcid.org/0000-0002-5998-138X (2016) Visualizing war? : Towards a visual analysis of videogames and social media. Perspectives on Politics. pp. 995-1010. ISSN 1537-5927 https://doi.org/10.1017/S1537592716002887 Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ This is an author produced version of Visualising War? Towards A Visual Analysis of Videogames and Social Media. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/97841/ Article: Robinson, NT and Schulzke, M (2016) Visualising War? Towards A Visual Analysis of Videogames and Social Media. Perspectives on Politics, 14 (4). pp. 995-1010. ISSN 1537-5927 https://doi.org/10.1017/S1537592716002887 (c) 2016, American Political Science Association.
    [Show full text]
  • Understanding Why Terrorist Operations Succeed Or Fail
    HOMELAND SECURITY PROGRAM Project supported by a RAND Investment in People and Ideas THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Homeland Security Program View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occasional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress.
    [Show full text]
  • Summary of the 2018 National Defense Strategy
    Summary of the 2 0 1 8 National Defense Strategy of The United States of America Sharpening the American Military’s Competitive Edge Table of Contents Introduction ………………………………………………………………………………….…. 1 Strategic Environment ………………………………………………………………………….. 2 Department of Defense Objectives ……………………………………………………………... 4 Strategic Approach ……………………………………………………………………………… 4 Build a More Lethal Force ………………………………………………………………. 5 Strengthen Alliances and Attract New Partners …………………………………………. 8 Reform the Department for Greater Performance and Affordability ……………………10 Conclusion …………………………………………………………………………….……….. 11 NATIONAL DEFENSE STRATEGY INTRODUCTION The Department of Defense’s enduring mission is to provide combat-credible military forces needed to deter war and protect the security of our nation. Should deterrence fail, the Joint Force is prepared to win. Reinforcing America’s traditional tools of diplomacy, the Department provides military options to ensure the President and our diplomats negotiate from a position of strength. Today, we are emerging from a period of strategic atrophy, aware that our competitive military advantage has been eroding. We are facing increased global disorder, characterized by decline in the long-standing rules-based international order—creating a security environment more complex and volatile than any we have experienced in recent memory. Inter-state strategic competition, not terrorism, is now the primary concern in U.S. national security. China is a strategic competitor using predatory economics to intimidate its neighbors while militarizing features in the South China Sea. Russia has violated the borders of nearby nations and pursues veto power over the economic, diplomatic, and security decisions of its neighbors. As well, North Korea’s outlaw actions and reckless rhetoric continue despite United Nation’s censure and sanctions. Iran continues to sow violence and remains the most significant challenge to Middle East stability.
    [Show full text]
  • 2020 Biennial National Strategy for Transportation Security Report to Congress May 29, 2020
    2020 Biennial National Strategy for Transportation Security Report to Congress May 29, 2020 Transportation Security Administration Message from the Administrator May 29, 2020 I am pleased to present the “2020 National Strategy for Transportation Security (NSTS),” a forward-looking, risk-based strategy designed to protect the Nation’s transportation systems from attack or disruption by terrorists or other hostile forces over the period spanning years 2020- 2025. The Transportation Security Administration (TSA) prepared the NSTS pursuant to title 49 of the United States Code, section 114(s), which requires a biennial update. TSA led the development of the NSTS, and the appended modal and intermodal security plans, with the U.S. Department of Transportation and in consultation with government and industry stakeholders. Although the NSTS is focused on counter-terrorism, TSA along with DOT, and United States Coast Guard has taken a whole-of-government approach to advance the national preparedness mission in response to the 2020 COVID-19 pandemic. All partners have continuously engaged with industry partners in the transportation systems sector to instill confidence in the return to normal operations. In a recent audit of the 2018 NSTS, TSA concurred with the Government Accountability Office’s recommendation to better communicate with key stakeholders how the document aligns to related strategies to guide federal security efforts. TSA is committed to demonstrating how the NSTS is the governing document for federal transportation security efforts and should be used by all stakeholders in securing our Nation’s transportation system. The NSTS also aligns with other related Agency strategies and supports the strategic objectives and actions outlined in the National Cybersecurity Strategy, the National Strategy for Maritime Security and the National Strategy for Aviation Security.
    [Show full text]
  • Russian Strategic Intentions
    APPROVED FOR PUBLIC RELEASE Russian Strategic Intentions A Strategic Multilayer Assessment (SMA) White Paper May 2019 Contributing Authors: Dr. John Arquilla (Naval Postgraduate School), Ms. Anna Borshchevskaya (The Washington Institute for Near East Policy), Dr. Belinda Bragg (NSI, Inc.), Mr. Pavel Devyatkin (The Arctic Institute), MAJ Adam Dyet (U.S. Army, J5-Policy USCENTCOM), Dr. R. Evan Ellis (U.S. Army War College Strategic Studies Institute), Mr. Daniel J. Flynn (Office of the Director of National Intelligence (ODNI)), Dr. Daniel Goure (Lexington Institute), Ms. Abigail C. Kamp (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Roger Kangas (National Defense University), Dr. Mark N. Katz (George Mason University, Schar School of Policy and Government), Dr. Barnett S. Koven (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Jeremy W. Lamoreaux (Brigham Young University- Idaho), Dr. Marlene Laruelle (George Washington University), Dr. Christopher Marsh (Special Operations Research Association), Dr. Robert Person (United States Military Academy, West Point), Mr. Roman “Comrade” Pyatkov (HAF/A3K CHECKMATE), Dr. John Schindler (The Locarno Group), Ms. Malin Severin (UK Ministry of Defence Development, Concepts and Doctrine Centre (DCDC)), Dr. Thomas Sherlock (United States Military Academy, West Point), Dr. Joseph Siegle (Africa Center for Strategic Studies, National Defense University), Dr. Robert Spalding III (U.S. Air Force), Dr. Richard Weitz (Center for Political-Military Analysis at the Hudson Institute), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Prefaces Provided By: RDML Jeffrey J. Czerewko (Joint Staff, J39), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Editor: Ms.
    [Show full text]
  • MARO: Mass Atrocity Response Operations: a Military Planning
    MARO MASS ATROCITY RESPONSE OPERATIONS: A MILITARY PLANNING HANDBOOK A Collaborative Effort Between the Carr Center for Human Rights Policy, Harvard Kennedy School and the US Army Peacekeeping and Stability Operations Institute w “ An important addition to the very limited and fragmented body of work related to the subject of atrocities in our time. Well done.” GENERAL (Retired) GORDON R. SULLIVAN, US Army, Former Chief of Staff of the US Army MARO “ Sarah Sewall and her team have produced an impressive contribution that shifts the debate on intervention from ‘whether’ to ‘how.’ With this critical recognition that mass atrocities present unique operational challenges, ‘MARO’ is a step closer to incorporation into military doctrine. MASS ATROCITY RESPONSE OPERATIONS: National governments and the international community badly need the MARO framework as an A MILITARY PLANNING HANDBOOK effective template for ‘soft’ and ‘hard’ power responses before, during, and after preventable mass atrocities are committed.” SENATOR (Retired Lieutenant General) ROMÉO A. DaLLAIRE, Canadian Forces, Former Force Commander United Nations Assistance Mission for Rwanda “ The MARO Project provides a solid framework for Geographic Combatant Commander develop- ment of contingency plans for mass atrocity situations. Tailored ‘on the shelf’ plans would be invaluable in increasing speed of framing the problem and developing appropriate response.” MAJOR GENERAL (Retired) GEOFFREY C. LAMBERT, US Army, Former Commander, US Army Special Forces Command Copyright © 2010 By
    [Show full text]
  • Paths to Victory: Lessons from Modern Insurgencies
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. Paths to Victory Lessons from Modern Insurgencies Christopher Paul Colin P. Clarke Beth Grill Molly Dunigan C O R P O R A T I O N NATIONAL DEFENSE RESEARCH INSTITUTE Paths to Victory Lessons from Modern Insurgencies Christopher Paul Colin P.
    [Show full text]
  • Section 2: China's Pursuit of Advanced Weapons
    SECTION 2: CHINA’S PURSUIT OF ADVANCED WEAPONS Key Findings • China is pursuing a range of advanced weapons with disruptive military potential. Six types that China’s leaders have priori- tized are maneuverable reentry vehicles, hypersonic weapons, directed energy weapons, electromagnetic railguns, counterspace weapons, and unmanned and artificial intelligence-equipped weapons. • China’s advanced weapons programs align with the People’s Liberation Army’s overall modernization drive over the past several decades, but appear to reflect a more careful degree of planning as to the U.S. weaknesses they are designed to exploit. • Current technological trends increase the difficulty of preserv- ing an advantage in developing advanced weapons. The United States for the first time faces a peer technological competitor—a country that is also one of its largest trading partners and that trades extensively with other high-tech powers—in an era in which private sector research and development with dual-use implications increasingly outpaces and contributes to military developments. • The requirements for developing advanced weapons are fun- damental scientific knowledge, unique materials, and abstract skill-based enablers (i.e., abilities, tools, and techniques). China has clear policies to exploit government funding, commercial technological exchange, foreign investment and acquisitions, and talent recruitment to bolster its dual-use technological ad- vances. For China, the only ultimate barrier to such advances is likely to be effort—time, will, and money—and it will be difficult for the United States and its allies and partners to deter this. • While China has only achieved incremental innovation in mil- itary technologies in the past, its research efforts at the tech- nological frontier indicate it may be moving from a phase of “catching-up” to pursuing “leap-ahead” technologies.
    [Show full text]