Foreign Internal Defense

Total Page:16

File Type:pdf, Size:1020Kb

Foreign Internal Defense Joint Publication 3-22 Foreign Internal Defense 12 July 2010 PREFACE 1. Scope This publication establishes joint doctrine for the Armed Forces of the United States involved in or supporting foreign internal defense (FID). It discusses how joint operations, involving the application of all instruments of national power, support host nation efforts to build capability and capacity to free and protect its society from subversion, lawlessness, and insurgency. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the joint activities and performance of the Armed Forces of the United States in operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations while conducting or supporting FID. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations, education, and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall objectives. 3. Application a. Joint doctrine established in this publication applies to the joint staff, commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, the Services, and defense agencies in support of joint operations. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence for the activities of joint forces unless the Chairman of the Joint Chiefs of Staff, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or i Preface coalition) military command should follow multinational doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the United States, commanders should evaluate and follow the multinational command’s doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff: LLOYD J. AUSTIN III Lieutenant General, USA Director, Joint Staff ii JP 3-22 SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 3-07.1, DATED 30 APRIL 2004 - RENUMBERED AS JOINT PUBLICATION 3-22 • Changes title from Joint Tactics, Techniques, and Procedures for Foreign Internal Defense to Foreign Internal Defense and the publication number from Joint Publication (JP) 3-07.1 to JP 3-22 • Adds discussion of foreign internal defense (FID) within the range of military operations • Elevates the internal defense and development appendix to a chapter, explaining FID construct, functions, principles, and organizational guidelines for FID • Adds paragraph on United States FID capabilities • Introduces FID assessment paragraph • Expands training chapter into a section on training joint forces for FID and a section on training host nation forces • Provides discussion of site survey considerations and health service and medical civil-military operations as part of employment considerations • Integrates military information support operations (MISO) paragraph into the direct support section, explaining MISO goals within FID • Incorporates discussion of security force assistance (SFA) and explains the relationship between FID and SFA. • Adds section on transition and redeployment, to include termination of operations, terminations approaches, military considerations, mission handoff procedures, and post mission debriefing procedures • Removes appendices on civil affairs estimate of the situation, MISO and estimate of the situation, and health service support • Updates the definitions of FID, security assistance, and security cooperation organization • Creates new terms and definitions security force and security force assistance • Removes the term and definition for security assistance organization iii Summary of Changes Intentionally Blank iv JP 3-22 TABLE OF CONTENTS PAGE EXECUTIVE SUMMARY .............................................................................................. ix CHAPTER I INTRODUCTION • General ....................................................................................................................... I-1 • Background ................................................................................................................ I-2 • Relationship of Foreign Internal Defense to Internal Defense and Development ..... I-3 • Foreign Internal Defense Within the Range of Military Operations .......................... I-4 • The Foreign Internal Defense Operational Framework and Instruments of National Power............................................................................................................ I-5 • Department of Defense Foreign Internal Defense Tools ......................................... I-10 CHAPTER II INTERNAL DEFENSE AND DEVELOPMENT • General ..................................................................................................................... II-1 • Construct .................................................................................................................. II-1 • Functions .................................................................................................................. II-2 • Principles .................................................................................................................. II-4 • Organizational Guidance .......................................................................................... II-6 CHAPTER III ORGANIZATION AND RESPONSIBILITIES FOR FOREIGN INTERNAL DEFENSE • General .................................................................................................................... III-1 • National-Level Organizations ................................................................................. III-3 • Combatant Commands ............................................................................................ III-6 • Subordinate Unified Commands ............................................................................. III-9 • Joint Task Forces .................................................................................................. III-10 • The United States Diplomatic Mission and Country Team .................................. III-10 • Multinational Foreign Internal Defense Force ...................................................... III-15 CHAPTER IV PLANNING FOR FOREIGN INTERNAL DEFENSE • General .................................................................................................................... IV-1 • Planning Imperatives ............................................................................................... IV-2 • Department of Defense Guidance ........................................................................... IV-4 • General Theater Planning Requirements ................................................................ IV-5 • Planning Procedures and Considerations ................................................................ IV-7 v Table of Contents • Planning for Force Protection ............................................................................... IV-13 • Foreign Internal Defense Assessment ................................................................... IV-14 • United States Foreign Internal Defense Capabilities ............................................ IV-15 CHAPTER V TRAINING SECTION A. TRAINING JOINT FORCES FOR FOREIGN INTERNAL DEFENSE ........................................................................................... V-1 • General ..................................................................................................................... V-1 • Training and Skills Needed for Success in Foreign Internal Defense ..................... V-1 • Foreign Internal Defense Training Strategy ............................................................. V-3 SECTION B. TRAINING HOST NATION FORCES ................................................. V-4 • Training Plan ............................................................................................................ V-4 • Training and Advising .............................................................................................. V-5 CHAPTER VI FOREIGN INTERNAL DEFENSE OPERATIONS SECTION A. EMPLOYMENT CONSIDERATIONS .............................................. VI-1 • General .................................................................................................................... VI-1 • Employment Factors ............................................................................................... VI-1 • Site Survey Considerations ..................................................................................... VI-9 • Health Service Support and Medical Civil-Military Operations............................ VI-10 SECTION B. INDIRECT SUPPORT ......................................................................
Recommended publications
  • Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto
    Human Rights Brief Volume 17 | Issue 1 Article 3 2009 Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Sperotto, Federico. "Counter-Insurgency, Human Rights, and the Law of Armed Conflict." Human Rights Brief 17, no. 1 (2009): 19-23. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Sperotto: Counter-Insurgency, Human Rights, and the Law of Armed Conflict Counter-Insurgency, Human Rights, and the Law of Armed Conflict by Federico Sperotto* introduCtion ounter-insurgency is the dominant aspect in the United States-led Operation Enduring Freedom (OEF) in CAfghanistan, and, since the NATO-led International Security Assistance Force (ISAF) has assumed growing respon- sibility throughout insurgents’ sanctuaries, also a mission for Europeans. According to the U.S. military, insurgency represents an intermediate step in the spectrum of conflict, which ranges from stable peace to general war.1 The frame in which military opera- tions are conducted is known as irregular warfare, a violent struggle among state and non-state actors for legitimacy and influence over a population.2 This form of conflict is charac- terized by three principle activities: insurgency, counter-insur- gency, and unconventional warfare, referring to the avoidance of Association of the Courtesy of the Revolutionary Afghanistan.
    [Show full text]
  • Tstable of Content
    ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 North Atlantic Treaty Organization London International Model United Nations 18th Session | 2017 tsTable of Content 1 ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 Table of Contents Table of Contents WELCOME TO THE NORTH ATLANTIC TREATY ORGANIZATION .............................................................. 3 INTRODUCTION TO THE COMMITTEE .................................................................................................................. 4 TOPIC A: FORMING A NATO STRATEGY IN CYBERSPACE ............................................................................. 5 INTRODUCTION ............................................................................................................................................................... 5 HISTORY OF THE PROBLEM ............................................................................................................................................. 6 Timeline of notable attacks ....................................................................................................................................... 7 1998 – 2001 “MOONLIGHT MAZE” ....................................................................................................................... 7 2005 – 2011 TITAN RAIN & BYZANTINE HADES .................................................................................................. 8 2007 Estonia DDoS Campaigns ...............................................................................................................................
    [Show full text]
  • Thoughts on Grand Strategy and the United States in the Twenty-First Century
    Journal of Military and Strategic VOLUME 13, ISSUE 1, FALL 2010 Studies Thoughts on Grand Strategy and the United States in the Twenty-first Century Williamson Murray One might begin an examination of the issues involved in grand strategy with an effort to describe what we mean by the term. Over the centuries, some governments and leaders have attempted to chart a course for their nations that has involved something more than simply reacting to the course of events. In most cases they have confronted sudden and major changes in the international environment, often resulting from the outbreak of great conflicts, but at times involving economic, strategic, or political alterations that threaten the stability or even existence of their polities. Yet, grand strategy is a matter of great states and great states alone. No small states, and few medium size states, possess the possibility of crafting a grand strategy. For the most part their circumstances condemn them to suffer what Athens negotiators suggested to their Melian counterparts in 416 BC about the nature of international relations: "The standard of justice depends on the equality of power to compel and that in fact the strong do what they have the power to do and the weak accept what they have to accept."1 1 Thucydides, History of the Peloponnesian War, trans. by Rex Warner (London, 1954), p. 402. There are two exceptions to the rule. Both the Swiss and the Finns were able to exercise a certain independence that allowed them to maintain a grand strategic frame work: the former by balancing great powers off against each other; the latter by creating the distinct impression in the minds of the Soviets that they were willing to fight to the last man and woman in defense of their independence.
    [Show full text]
  • American Grand Strategy for an Emerging World Order Scott Lawless
    STRATEGIC STUDIES QUARTERLY - PERSPECTIVE American Grand Strategy for an Emerging World Order SCOTT LAWLESS Abstract Since the end of the Second World War, the United States has secured its core national interests primarily through the creation and maintenance of the liberal international order. Today, this order is being challenged in ways that will define the twenty- first century context. America’s most pressing foreign policy challenge is finding strategies to counter a poten- tially illiberal global order. Neo-authoritarian states are seeking to establish spheres of influence by violating territorial norms, undermining the liberal order via coercive economic measures, and weakening democratic regimes through unconventional political warfare. The current liberal order is ill- equipped to face these challenges because of two global trends: the erosion of its legitimacy and the shifting global balance of power. In a changing environment such as this, where the ends of American grand strategy re- main fixed while its relative means are eroding, the US must revise the ways in which it seeks to achieve its strategic objectives. The shifts in geopolitics today necessitate a revitalization of American grand strategy and the estab- lishment of a new security order—namely, a Concert of Democracies—to secure American interests, reestablish liberal legitimacy, and shape the emerging international order toward a stable future. ***** he liberal international order that emerged triumphant over fas- cism and communism during the twentieth century is a testament to the institutions, alliances, and norms US statesmen established Tto avoid the revival of great power conflict. Though these structures have granted the United States and its allies several decades of unparalleled security and prosperity, it is unclear as to what is invoked by the term lib- eral international order.
    [Show full text]
  • ENGLISH Only
    The OSCE Secretariat bears no responsibility for the content of this document FSC.DEL/31/21 and circulates it without altering its content. The distribution by OSCE 29 January 2021 Conference Services of this document is without prejudice to OSCE decisions, as set out in documents agreed by OSCE participating States. ENGLISH only STATEMENT on the Joint Turkish-Azerbaijani Large-Scale Military Exercise as delivered by the Delegation of the Republic of Armenia at the 966th Plenary Meeting of the Forum for Security Co-operation 27 January 2021 Madam Chairperson, On 17 January the Ministry of Defense of Turkey announced through its official website about conducting the «Winter-2021» joint Turkish-Azerbaijani military exercise in Kars from 1 to 12 February. This was followed by information disseminated by the Ministry of Defense of Azerbaijan on the departure of the military personnel and equipment of the Nakhijevan Combined Army of Azerbaijan to Turkey to take part in the joint military exercise. According to the Turkish media reports, the planned exercise is expected to be one of the largest winter military drills of recent times aimed, among others, at improving cooperation and coordination during joint military operations and testing combat capabilities under extreme weather conditions. Reportedly, the military exercise will involve tank divisions, heavy artillery, sniper teams, helicopters and special forces. At the previous meeting of the FSC we drew the attention of the participating States to this exercise. In response to our inquiry Turkish delegation here in Vienna insisted that the exercise was not notified under the Vienna Document because of the small number of the military personnel and equipment to be engaged in it.
    [Show full text]
  • Army Field Support Brigade Tactics, Techniques, and Procedures
    *FMI 4-93.41(FM 63-11) ARMY FIELD SUPPORT BRIGADE TACTICS, TECHNIQUES, AND PROCEDURES February 2007 Expires: February 2009 HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTON: Approved for public release; distribution is unlimited. *FMI 4-93.41 (FM 63-11) Field Manual Interim Headquarters No. 4-93.41 Department of the Army Washington, DC, 22 February 2007 Expires: 22 February 2009 Army Field Support Brigade Tactics, Techniques, and Procedures Contents Page PREFACE .............................................................................................................iii Chapter 1 The Army Field Support Brigade Organization and Operations Overview 1-1 Mission and Responsibilities .............................................................................. 1-1 Organization and Structure ................................................................................ 1-2 Command and Control ....................................................................................... 1-3 Commmand and Coordinating Staff................................................................... 1-4 Primary Functions and Capabilities Overview.................................................... 1-5 Chapter 2 Plans and Operations....................................................................................... 2-1 Early Entry Module ............................................................................................. 2-1 Main Command Post.......................................................................................... 2-2
    [Show full text]
  • Meserole Brookings CV 2021
    CHRISTOPHER O. MESEROLE 1775 Massachusetts Ave NW, Washington DC 20036 (202) 797-6180 | [email protected] POSITIONS Director of Research and Policy, Brookings AI & Emerging Tech Initiative (2020-) Deputy Director, Brookings AI & Emerging Tech Initiative (2019-2020) Fellow, Foreign Policy, Brookings Institution (2017-) Post-Doctoral Fellow in Foreign Policy, Brookings Institution (2016-2017) Pre-Doctoral Fellow in Foreign Policy, Brookings Institution (2015-2016) AFFILIATIONS Co-Facilitator, GIFCT CAPPI Working Group (2020-) Co-PI, Brookings High-Level Working Group on Disinformation (2019-2020) Member, Christchurch Call Advisory Network (2019-) Adjunct Professor, Georgetown University (2019-) Member, Research Advisory Council, RESOLVE Network (2019-) Member, Digital Freedom Forum, CNAS (2019-) EDUCATION A.B., highest honors in field, Harvard University, Cambridge, MA, 2002 M.Div., S.T.M, Yale University, NeW Haven, CT, 2009, 2010 Ph.D., University of Maryland, College Park, MD, 2017 RESEARCH Artificial intelligence, emerging technology, international security; digital INTERESTS authoritarianism; counterterrorism and countering violent extremism; nonparametric machine learning, interpretable machine learning, differential privacy and homomorphic encryption, decentralized ledger technology WRITING “Exporting Digital Authoritarianism,” Brookings Institution, September 2019. (With Alina Polyakova.) “HoW Big Tech Can Fight White Supremacist Terrorism,” Foreign Affairs, August 2019. (With Daniel Byman.) “Terrorist Definitions and Designation
    [Show full text]
  • Uncertainty and Civil War Onset
    Uncertainty and Civil War Onset Iris Malone∗ Abstract Why do some armed groups escalate their campaigns to civil war, while others do not? Only 25% of the 960 armed groups formed between 1970 and 2012 became violent enough to surpass the 25-battle death threshold, often used to demarcate \civil conflict.” I develop a new theory that argues this variation occurs because of an information problem. States decide how much counterinsurgency effort to allocate for repression on the basis of observable characteristics about an armed group's initial capabilities, but two scenarios make it harder to get this decision right, increasing the risk of civil war. I use fieldwork interviews with intelligence and defense officials to identify important group characteristics for civil war and apply machine learning methods to test the predictive ability of these indicators. The results show that less visible armed groups in strong states and strong armed groups in weak states are most likely to lead to civil war onset. These findings advance scholarly understanding about why civil wars begin and the effect of uncertainty on conflict. ∗Department of Political Science, 100 Encina Hall West, Stanford University, Stanford, CA 94305. ([email protected], web.stanford.edu/~imalone). 1 Introduction Why do some armed groups escalate their campaigns to civil war, while most do not? Using an original dataset, I show that only 25% of the 960 armed groups formed between 1970 and 2012 became violent enough to surpass the 25-battle death threshold, often used to demarcate \civil conflict.”1 Only 8% of armed groups surpassed the higher \civil war" threshold of 1000 fatalities per year.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • The Russian Integration of Cyber Power Into Grand Strategy by James J
    Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy by James J. Wirtz Chapter 3 in Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015 In Chapter 3, James J. Wirtz, Dean of the Naval Postgraduate School in California, describes the global context surrounding these events. Today, nation-states are integrating cyber tactics into their political and military strategies. Professor Wirtz posits that when it comes to the use of cyber, ‘national styles’ might be emerging as states attempt to use cyber capabilities to achieve strategic objectives. He suggests that it is wrong to treat cyber attacks as a silver bullet, and that it is better to consider how a sort of combined arms approach will prevail. On a positive note, the need for legal and bureaucratic integration of policies and programmes should produce national idiosyncrasies on the cyber battlefield that can help with the vexing challenge of attribution. Disclaimer This publication is a product of the NATO Cooperative Cyber Defence Centre of Ex- cellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publica- tion. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non-profit and non-commercial purpose, provided that copies bear a full citation.
    [Show full text]
  • The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics by Zachary Abuza
    STRATEGIC PERSPECTIVES 6 The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics by Zachary Abuza Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Technology and National Security Policy, Center for Complex Operations, and Center for Strategic Conferencing. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, and publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Thai and U.S. Army Soldiers participate in Cobra Gold 2006, a combined annual joint training exercise involving the United States, Thailand, Japan, Singapore, and Indonesia. Photo by Efren Lopez, U.S. Air Force The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics By Zachary Abuza Institute for National Strategic Studies Strategic Perspectives, No. 6 Series Editors: C. Nicholas Rostow and Phillip C. Saunders National Defense University Press Washington, D.C.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]