FM 3-05.130 Army Special Operations Forces Unconventional Warfare

Total Page:16

File Type:pdf, Size:1020Kb

FM 3-05.130 Army Special Operations Forces Unconventional Warfare FM 3-05.130 Army Special Operations Forces Unconventional Warfare September 2008 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 28 August 2008. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DTD-JA, Fort Bragg, NC 28310-9610, or by e-mail to [email protected]. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. FOREIGN DISCLOSURE RESTRICTION (FD 6): This publication has been reviewed by the product developers in coordination with the United States Army John F. Kennedy Special Warfare Center and School foreign disclosure authority. This product is releasable to students from foreign countries on a case-by-case basis only. Headquarters, Department of the Army This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). FM 3-05.130 Field Manual Headquarters No. 3-05.130 Department of the Army Washington, DC, 30 September 2008 Army Special Operations Forces Unconventional Warfare Contents Page PREFACE..............................................................................................................iv Chapter 1 INTRODUCTION ................................................................................................ 1-1 Overview............................................................................................................. 1-1 Unconventional Warfare..................................................................................... 1-2 Conventional Warfare......................................................................................... 1-4 Irregular Warfare ................................................................................................ 1-5 Chapter 2 UNITED STATES NATIONAL POWER............................................................. 2-1 The International Environment ........................................................................... 2-1 Instruments of United States National Power..................................................... 2-1 The Effectiveness of Integrated National Power .............................................. 2-14 Chapter 3 POLICY AND DOCTRINE.................................................................................. 3-1 National Policy.................................................................................................... 3-1 Conventional Warfare and Major Combat Operations ..................................... 3-15 Irregular Warfare .............................................................................................. 3-21 Chapter 4 PLANNING CONSIDERATIONS ....................................................................... 4-1 Unconventional Warfare Planning...................................................................... 4-1 Seven Phases of Unconventional Warfare......................................................... 4-5 Unconventional Warfare Termination of Operations ........................................ 4-12 Army Special Operations Forces...................................................................... 4-14 Supporting Elements and Activities.................................................................. 4-20 Interagency Activities........................................................................................ 4-20 Distribution Restriction: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 28 August 2008. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DTD-JA, Fort Bragg, NC 28310-9610, or by e-mail to [email protected]. Destruction Notice: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Foreign Disclosure Restriction (FD 6): This publication has been reviewed by the product developers in coordination with the United States Army John F. Kennedy Special Warfare Center and School foreign disclosure authority. This product is releasable to students from foreign countries on a case-by-case basis only. i Contents Chapter 5 SPECIAL FORCES OPERATIONS ................................................................... 5-1 Introduction......................................................................................................... 5-1 Phase I: Preparation........................................................................................... 5-1 Phase II: Initial Contact....................................................................................... 5-2 Phase III: Infiltration............................................................................................ 5-2 Phase IV: Organization....................................................................................... 5-3 Phase V: Buildup ................................................................................................ 5-6 Phase VI: Employment....................................................................................... 5-7 Phase VII: Transition .......................................................................................... 5-8 Chapter 6 PSYCHOLOGICAL OPERATIONS ................................................................... 6-1 Introduction......................................................................................................... 6-1 Phase I: Preparation........................................................................................... 6-1 Phase II: Initial Contact....................................................................................... 6-4 Phase III: Infiltration............................................................................................ 6-5 Phase IV: Organization....................................................................................... 6-6 Phase V: Buildup ................................................................................................ 6-9 Phase VI: Employment..................................................................................... 6-11 Phase VII: Transition ........................................................................................ 6-12 Chapter 7 CIVIL AFFAIRS OPERATIONS......................................................................... 7-1 Introduction......................................................................................................... 7-1 Phase I: Preparation........................................................................................... 7-1 Phase II: Initial Contact....................................................................................... 7-3 Phase III: Infiltration............................................................................................ 7-4 Phase IV: Organization....................................................................................... 7-5 Phase V: Buildup ................................................................................................ 7-6 Phase VI: Employment....................................................................................... 7-6 Phase VII: Transition ........................................................................................ 7-10 Chapter 8 SUPPORTING ELEMENTS AND ACTIVITIES ................................................. 8-1 Introduction......................................................................................................... 8-1 Communications Support ................................................................................... 8-1 Logistics Support ................................................................................................ 8-5 Force Health Protection...................................................................................... 8-8 Aviation Support ............................................................................................... 8-11 Appendix A THE DIPLOMATIC INSTRUMENT OF NATIONAL POWER............................A-1 Appendix B THE INFORMATIONAL INSTRUMENT OF NATIONAL POWER....................B-1 Appendix C THE INTELLIGENCE INSTRUMENT OF NATIONAL POWER........................C-1 Appendix D THE ECONOMIC INSTRUMENT OF NATIONAL POWER ..............................D-1 Appendix E THE FINANCIAL INSTRUMENT OF NATIONAL POWER............................... E-1 Appendix F THE LAW ENFORCEMENT INSTRUMENT OF NATIONAL POWER ............. F-1 Appendix G THE MILITARY INSTRUMENT OF NATIONAL POWER .................................G-1 Appendix H THE ROLE OF HISTORY AND CULTURE .......................................................H-1 Appendix I A HISTORICAL SURVEY OF UNCONVENTIONAL WARFARE ...................... I-1 Appendix J AN OUTLINE HISTORY OF THE UNCONVENTIONAL WARFARE DEFINITION ....................................................................................................... J-1 ii FM 3-05.130 30 September 2008 Contents GLOSSARY ..........................................................................................Glossary-1 REFERENCES ..................................................................................References-1
Recommended publications
  • Collision Course
    FINAL-1 Sat, Jul 7, 2018 6:10:55 PM Your Weekly Guide to TV Entertainment for the week of July 14 - 20, 2018 HARTNETT’S ALL SOFT CLOTH CAR WASH Collision $ 00 OFF 3ANY course CAR WASH! EXPIRES 7/31/18 BUMPER SPECIALISTSHartnett's Car Wash H1artnett x 5` Auto Body, Inc. COLLISION REPAIR SPECIALISTS & APPRAISERS MA R.S. #2313 R. ALAN HARTNETT LIC. #2037 DANA F. HARTNETT LIC. #9482 Ian Anthony Dale stars in 15 WATER STREET “Salvation” DANVERS (Exit 23, Rte. 128) TEL. (978) 774-2474 FAX (978) 750-4663 Open 7 Days Mon.-Fri. 8-7, Sat. 8-6, Sun. 8-4 ** Gift Certificates Available ** Choosing the right OLD FASHIONED SERVICE Attorney is no accident FREE REGISTRY SERVICE Free Consultation PERSONAL INJURYCLAIMS • Automobile Accident Victims • Work Accidents • Slip &Fall • Motorcycle &Pedestrian Accidents John Doyle Forlizzi• Wrongfu Lawl Death Office INSURANCEDoyle Insurance AGENCY • Dog Attacks • Injuries2 x to 3 Children Voted #1 1 x 3 With 35 years experience on the North Insurance Shore we have aproven record of recovery Agency No Fee Unless Successful While Grace (Jennifer Finnigan, “Tyrant”) and Harris (Ian Anthony Dale, “Hawaii Five- The LawOffice of 0”) work to maintain civility in the hangar, Liam (Charlie Row, “Red Band Society”) and STEPHEN M. FORLIZZI Darius (Santiago Cabrera, “Big Little Lies”) continue to fight both RE/SYST and the im- Auto • Homeowners pending galactic threat. Loyalties will be challenged as humanity sits on the brink of Business • Life Insurance 978.739.4898 Earth’s potential extinction. Learn if order can continue to suppress chaos when a new Harthorne Office Park •Suite 106 www.ForlizziLaw.com 978-777-6344 491 Maple Street, Danvers, MA 01923 [email protected] episode of “Salvation” airs Monday, July 16, on CBS.
    [Show full text]
  • The Use of Helicopters Against Guerrillas the Israeli Model
    JEMEAA - FEATURE The Use of Helicopters against Guerrillas The Israeli Model DR. TAL TOVY ince its establishment, the State of Israel has been facing a bloody struggle against terrorism and guerrilla warfare, in addition to four conventional wars.1 The Israeli war against guerrilla fighters or terrorists began almost Simmediately after the War of Independence. Palestinian terrorists attempted to infiltrate Israel from the surrounding Arab countries and perform sabotage ac- tions near the border, which were little more than lines drawn on a map and proved wholly inadequate in stopping the infiltrations. After the 1967 war, most terrorists crossed over from Jordan. Following the “Black September” conflict in 1970 and up until 1982 (Operation Peace for Galilee), most terrorists infiltrated through the Lebanese border. In the 1980s and 1990s, Israel fought against the Shiite Amal Movement and Hezbollah organization in Lebanon. Since October 2000, Israel has struggled against widespread military uprisings in the West Bank and the Gaza Strip. To counter these activities, the Israel Defense Forces (IDF) uses various opera- tional methods. Special Forces have raided known terrorist bases and routine se- curity activities have been conducted along the borders and in the major cities. A third method has been targeting specific terrorist leaders or installations in the Middle East and in Europe. Most operations of the first and third categories are still classified. The IDF has launched a few large attacks targeting terrorist infra- structure—for example Karameh and Litany—with the most extensive one being the Lebanon War (1982), at least initially. In these large-scale operations, Israel has deployed massive infantry, armor, and artillery forces.
    [Show full text]
  • The Plight of ABC Produced Programs and Staff and Can Be Found at Plight-Of-Abc-Produced-Programs-And-Staff
    Re: Recent ABC programming decisions From: Ken McKay Tuesday August 30th, 2011 Please find here the contents of a web page I have uploaded to the watvhistory.com web site. It is titled The plight of ABC produced programs and staff and can be found at http://watvhistory.com/2011/08/the- plight-of-abc-produced-programs-and-staff/ Because the site deals with WA television history matters, the emphasis given to the story is that of change, and the impact it has. Most of the content relates directly to the issues the Senate Hearing will be considering... The plight of ABC produced programs and staff POSTED BY KEN ON AUGUST - 29 - 2011 This is an examination of current issues facing the ABC. Fulfilling the ABC charter, program cuts, outsourcing, centralisation, technological change and job losses. As to be expected, there are a number of points of view, which this article will endeavour to report accurately in a fair and balanced manner. They are very contentious issues, which have been evolving over many years as broadcasting facilities, techniques and management styles change, from the previous bureaucratic, slow moving public service structure to one more aware of modern business philosophies, and capable of great innovation. The earlier days were more labour intensive when Perth was an isolated outpost, separated from the rest of the country by not only distance and poor roads, but also primitive communications. The history of change gave witness to a variety of predicaments as our ancestors approached the industrial age. Change manifests itself in different forms over time, and even though the circumstances vary, there is still an impact as people try to cope with a new age.
    [Show full text]
  • De Pa Rtme N T O F F in a N Ce
    Department of Finance Annual Report 2018 –19 ANNUAL Overview REPORT Performance Agency Statements Financial Indicators PerformanceKey Disclosures Overview Statement of compliance Performance Agency For the year ended 30 June 2019 About this report Disclosure and compliance HON BEN WYATT MLA Welcome to our 2018-19 Annual Report. Includes our financial statements TREASURER; MINISTER FOR FINANCE; The Report outlines and actual results for both financial ABORIGINAL AFFAIRS; LANDS our operational, financial and business and non-financial performance. performance for the financial year and is In accordance with section 63 of the Financial We encourage feedback. Statements Financial structured Management Act 2006, I hereby submit for Please email us so we can improve in the following areas: your information and presentation to Parliament, our Annual Report next year. the Annual Report of the Department of Finance for the financial year ended 30 June 2019. Overview Contact details for the Department Includes comments from the Director are listed on the back of the report. The Annual Report has been prepared General, Jodi Cant, outlines the changes [email protected] in accordance with the provisions of the made to the organisation over the Financial Management Act 2006. year and provides a snapshot of our Department of Finance Annual Report performance. 2018-19 © Department of Finance 2019 Agency performance Showcases the achievements ISN 2203-594X (Print) Jodi Cant of our people across our main functional ISN 2203-5958 (Online) Director General Indicators PerformanceKey areas – Advise, Build, 23 August 2019 Buy and Collect. Key legislation The Department of Finance Significant issues complies with all relevant legislation Outlines the issues we faced over the that governs its functions.
    [Show full text]
  • Dominant Land Forces for 21St Century Warfare
    No. 73 SEPTEMBER 2009 Dominant Land Forces for 21st Century Warfare Edmund J. Degen A National Security Affairs aperP published on occasion by THE INSTITUTE OF LAND WARFARE ASSOCIATION OF THE UNITED STATES ARMY Arlington, Virginia Dominant Land Forces for 21st Century Warfare by Edmund J. Degen The Institute of Land Warfare ASSOCIATION OF THE UNITED STATES ARMY AN INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of ILW’s editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper, but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER NO. 73, September 2009 Dominant Land Forces for 21st Century Warfare by Edmund J. Degen Colonel Edmund J. Degen recently completed the senior service college at the Joint Forces Staff College and moved to the Republic of Korea, where he served as the U.S. Forces Korea (USFK) J35, Chief of Future Operations. He is presently the Commander of the 3d Battlefield Coordination Detachment–Korea. He previously served as Special Assistant to General William S.
    [Show full text]
  • Warfare in a Fragile World: Military Impact on the Human Environment
    Recent Slprt•• books World Armaments and Disarmament: SIPRI Yearbook 1979 World Armaments and Disarmament: SIPRI Yearbooks 1968-1979, Cumulative Index Nuclear Energy and Nuclear Weapon Proliferation Other related •• 8lprt books Ecological Consequences of the Second Ihdochina War Weapons of Mass Destruction and the Environment Publish~d on behalf of SIPRI by Taylor & Francis Ltd 10-14 Macklin Street London WC2B 5NF Distributed in the USA by Crane, Russak & Company Inc 3 East 44th Street New York NY 10017 USA and in Scandinavia by Almqvist & WikseH International PO Box 62 S-101 20 Stockholm Sweden For a complete list of SIPRI publications write to SIPRI Sveavagen 166 , S-113 46 Stockholm Sweden Stoekholol International Peace Research Institute Warfare in a Fragile World Military Impact onthe Human Environment Stockholm International Peace Research Institute SIPRI is an independent institute for research into problems of peace and conflict, especially those of disarmament and arms regulation. It was established in 1966 to commemorate Sweden's 150 years of unbroken peace. The Institute is financed by the Swedish Parliament. The staff, the Governing Board and the Scientific Council are international. As a consultative body, the Scientific Council is not responsible for the views expressed in the publications of the Institute. Governing Board Dr Rolf Bjornerstedt, Chairman (Sweden) Professor Robert Neild, Vice-Chairman (United Kingdom) Mr Tim Greve (Norway) Academician Ivan M£ilek (Czechoslovakia) Professor Leo Mates (Yugoslavia) Professor
    [Show full text]
  • The Vulnerabilities of Developed States to Economic Cyber Warfare
    Working Paper The Vulnerabilities of Developed States to Economic Cyber Warfare Paul Cornish Head, International Security Programme and Carrington Professor of International Security, Chatham House June 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author and Chatham House should be credited, preferably with the date of the publication. Working Paper: The Vulnerabilities of Developed States to Economic Cyber Warfare INTRODUCTION The central features of the ‘cybered’ world of the early 21st century are the interconnectedness of global communications, information and economic infrastructures and the dependence upon those infrastructures in order to govern, to do business or simply to live. There are a number of observations to be made of this world. First, it is still evolving. Economically developed societies are becoming ever more closely connected within themselves and with other, technologically advanced societies, and all are becoming increasingly dependent upon the rapid and reliable transmission of ideas, information and data. Second, where interconnectedness and dependency are not managed and mitigated by some form of security procedure, reversionary mode or redundancy system, then the result can only be a complex and vitally important communications system which is nevertheless vulnerable to information theft, financial electronic crime, malicious attack or infrastructure breakdown.
    [Show full text]
  • ASNE “A Vision of Directed Energy Weapons in the Future”
    A Vision for Directed Energy and Electric Weapons In the Current and Future Navy Captain David H. Kiel, USN Commander Michael Ziv, USN Commander Frederick Marcell USN (Ret) Introduction In this paper, we present an overview of potential Surface Navy Directed Energy and Electric Weapon (DE&EW) technologies being specifically developed to take advantage of the US Navy’s “All Electric Warship”. An all electric warship armed with such weapons will have a new toolset and sufficient flexibility to meet combat scenarios ranging from defeating near-peer competitors, to countering new disruptive technologies and countering asymmetric threats. This flexibility derives from the inherently deep magazines and simple, short logistics tails, scalable effects, minimal amounts of explosives carried aboard and low life cycle and per-shot costs. All DE&EW weaponry discussed herein could become integral to naval systems in the period between 2010 and 2025. Adversaries Identified in the National Military Strategy The 2004 National Military Strategy identifies an array of potential adversaries capable of threatening the United States using methods beyond traditional military capabilities. While naval forces must retain their current advantage in traditional capabilities, the future national security environment is postulated to contain new challenges characterized as disruptive, irregular and catastrophic. To meet these challenges a broad array of new military capabilities will require continuous improvement to maintain US dominance. The disruptive challenge implies the development by an adversary of a breakthrough technology that supplants a US advantage. An irregular challenge includes a variety of unconventional methods such as terrorism and insurgency that challenge dominant US conventional power.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • State Defense Force Times Winter 2020
    State Defense Force Times Message from the President Winter 2020 MG Jay Coggan • Increase our external California State Guard communications to educate the public and government at all First, as we start off a new year, let me levels as to our mission congratulate BG Hayhurst and BG • Expand training opportunities Santiago for a great annual conference in across the country and online Biloxi, MS. Unfortunately, prior California State Guard commitments kept Internal communications have been me from attending, but I received great driven mostly by our web, newsletter, and feedback from our members. Your periodic announcements. We will be dedication and work is appreciated! updating our email capabilities to provide As we move into 2020 we have the more relevant and timely information to opportunity to build on our past success our members. To make this effort and make this a transformative year. My successful, I ask that each member please singular mission focus for SAGUS this go to their member profile in the SGAUS year is to improve our communications to web site make sure your contact and make us the most effective organization email information is current. We are that we can be. My key strategies to establishing a team to evaluate and accomplish this goal are: implement new strategies for internal communications. More information on • Improve our communications with this effort will be forthcoming. members 1 Now, regarding external communications, opportunity for SGAUS to SDF help our I firmly believe that this year SGAUS can respective states deal with this issue. take it to the next level in how we make It’s never too early to start planning for ourselves known outside our association the 2020 SAGUS Annual Conference.
    [Show full text]
  • Nuclear Deterrence and Conventional Conflict
    VIEW Sticks and Stones Nuclear Deterrence and Conventional Conflict DR. KATHRYN M.G. BOEHLEFELD n the night of 15 June 2020, Sino- Indian tensions flared into fighting along the disputed border in the region known as the Galwan Valley. The fighting led to the first casualties along the border in 45 years. However, Ono one on either side fired a single shot.1 Instead, soldiers threw rocks and used wooden clubs wrapped in barbed wire to attack one another. Two of the most powerful armies in the world, both of which possess nuclear weapons, clashed with one another using sticks and stones. Nuclear weapons prevent nuclear states from engaging in large-scale conven- tional war with one another, or at least, the existence of such advanced weapons has correlated with a significant decrease in conventional war between nuclear- armed adversaries over the past 80 years. Nuclear weapons tend to make nuclear adversaries wearier of engaging in conventional warfare with one another because they fear inadvertent escalation: that a war will spiral out of control and end in a nuclear exchange even if the war’s aims were originally fairly limited. However, this fear has not fully prevented the Chinese and Indian militaries from engaging in skirmishes, like the one that occurred in June 2020. Where does escalation to- ward nuclear war start, and what does this conflict teach both us and major world players about the dangers and opportunities associated with low levels of conflict between nuclear powers? Escalation to nuclear use may occur as a deliberate and premeditated choice or inadvertently as the result of a security dilemma, the offensive nature of militaries, and/or due to the fog of war.2 This article argues that the Sino- Indian border dispute demonstrates that the drivers of inadvertent escalation may be present even at exceptionally low levels of conflict.
    [Show full text]
  • Southern Nigerian Cinema Author: Añulika Agina Toolkit: Southern Nigerian Cinema 2 by Añulika Agina
    Toolkit: Southern Nigerian Cinema Author: Añulika Agina Toolkit: Southern Nigerian Cinema 2 By Añulika Agina Copyright: Genevieve Nnaji/TEN - The Entertainment Network Toolkit: Southern Nigerian Cinema 3 By Añulika Agina Toolkit: Southern Nigerian Cinema A significant amount of literature exists on the southern Nigerian cinema, which was inaugurated with the 1992 Igbo-language film, Living in Bondage. Little is known and documented about the colonial cinema of Nigeria and the period immediately after colonial rule. Although films were made in the 1970s and 1980s by filmmakers such as Eddie Ugboma, Ola Balogun and Ladi Ladebo, such films and critical analyses about them are not readily accessible. Hyginus Ekwuazi, Jonathan Haynes and Onookome Okome (see texts below) have written excellent accounts of the history of Nigerian cinema, especially of the Nollywood boom and the socio- cultural contexts that gave rise to them. The film industry in southern Nigeria is today the largest in Africa, producing over a thousand film titles per annum with locally sourced funds and distributed internationally. Foreign investment in Nigerian film is on the rise given the visibility that local productions have created at home and abroad. The government has also taken notice of the commercial viability of the industry and pledged billions of naira through the Bank of Industry to support the film business. The films receive critical acclaim and are commercial hits within Africa and among Africans in the diaspora. The sections below provide some critical texts and film titles to guide new comers to the nature and scholarship on the Nigerian film industry. The lists are by no means exhaustive; they only serve as a tip of the iceberg in the hope that interested parties can request additional information by emailing aa207@ soas.ac.uk or [email protected] Some Key Texts Ekwuazi, H.
    [Show full text]