JP 3-24, Counterinsurgency Operations

Total Page:16

File Type:pdf, Size:1020Kb

JP 3-24, Counterinsurgency Operations Joint Publication 3-24 T OF THE N A E W E' L L I S D E F E R H N D M T M T Y R • A P A E C D I U • R N E I T M E A D F S O TAT E S Counterinsurgency 25 April 2018 PREFACE 1. Scope This publication provides joint doctrine to plan, execute, and assess counterinsurgency operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations, and it provides considerations for military interaction with governmental and nongovernmental agencies, multinational forces, and other interorganizational partners. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs), and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing and executing their plans and orders. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of objectives. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subordinate unified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the CJCS, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the US, commanders should evaluate and follow the multinational command’s doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff: KEVIN D. SCOTT Vice Admiral, USN Director, Joint Force Development i Preface Intentionally Blank ii JP 3-24 SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 3-24 DATED 22 NOVEMBER 2013 • Deleted the paragraphs that cover operational assessment model and operational assessment steps due to redundancy with Joint Publication 5-0, Joint Planning. • Replaced the term “generational engagement” with “generational approach” in order to better reflect long-term partnering as well as engagement. • Replaced the phrase “counterinsurgency environment” with “operational environment.” • Revised the term “violent extremist” to include “violent extremist organizations.” • Revised the phrase “root causes of the insurgency” to “roots of the insurgency.” • Updated paragraphs to delineate between information operations and military information support operations. • Added a discussion on the roles of women in an insurgency, such as combatants, members of the auxiliary, and suicide bombers. • Added more in-depth discussion on disarmament, demobilization, and reintegration and how it can be applied while an insurgency is ongoing and after an insurgency ends. • Added discussion on criminal networks within counterinsurgency operations. iii Summary of Changes Intentionally Blank iv JP 3-24 TABLE OF CONTENTS PAGE EXECUTIVE SUMMARY ............................................................................................... ix CHAPTER I OVERVIEW Introduction ................................................................................................................ I-1 Approach to Counterinsurgency ................................................................................ I-3 Governance and Legitimacy ...................................................................................... I-6 Insurgency and Counterinsurgency Narratives .......................................................... I-8 CHAPTER II INSURGENCY Overview ...................................................................................................................II-1 Nature of Insurgency ................................................................................................II-2 Conditions for Insurgency ........................................................................................II-4 Insurgency Objectives and End State .....................................................................II-10 Insurgency Narrative and Strategy .........................................................................II-12 Insurgency Organization .........................................................................................II-16 Stages and Outcomes of Insurgency .......................................................................II-21 CHAPTER III COUNTERINSURGENCY Overview ................................................................................................................. III-1 Counterinsurgency Mindset .................................................................................... III-4 Tenets of Counterinsurgency .................................................................................. III-7 United States Government Activities ................................................................... III-16 Operational Approaches ....................................................................................... III-21 Roles and Responsibilities .................................................................................... III-22 Command and Organizational Relationships ....................................................... III-25 Employment Considerations ................................................................................. III-28 Conventional Forces Considerations .................................................................... III-30 Special Operations Considerations ....................................................................... III-31 Force Protection Considerations ........................................................................... III-32 Disarmament, Demobilization, and Reintegration ............................................... III-33 Economic and Infrastructure Development .......................................................... III-35 CHAPTER IV THE OPERATIONAL ENVIRONMENT Introduction ............................................................................................................. IV-1 Operational Environment in Counterinsurgency .................................................... IV-2 Tools and Methods for Understanding the Operational Environment .................... IV-3 v Table of Contents Establish an Evolving Common Operational Picture ............................................. IV-9 Joint Intelligence Preparation of the Operational Environment for Counterinsurgency ................................................................................................ IV-10 CHAPTER V PLANNING General ..................................................................................................................... V-1 Additional Considerations for Counterinsurgency .................................................. V-5 Termination and Transitions .................................................................................. V-10 Disarmament, Demobilization, and Reintegration Planning ................................. V-12 Assessment Planning ............................................................................................. V-14 CHAPTER VI ASSESSMENT Introduction to Assessing a Counterinsurgency Operation or Campaign .............. VI-1 Organizing for Assessment ..................................................................................... VI-4 The Assessment Process and Assessment Plan ...................................................... VI-4 Operation Assessment Methods ........................................................................... VI-11 CHAPTER VII COUNTERINSURGENCY OPERATIONS Section A. Execution .................................................................................................... VII-1 General ................................................................................................................... VII-1 Support the Counterinsurgency Narrative ............................................................. VII-2 Distributed Operations ........................................................................................... VII-2 Command and Control ........................................................................................... VII-2 Rules of Engagement ............................................................................................. VII-3 Operational Methods for Counterinsurgency ........................................................ VII-3 Generational Approach .......................................................................................... VII-4 Network Engagement Activities ............................................................................ VII-5 Shape, Clear, Hold, Build, and Transition ............................................................
Recommended publications
  • RUNNING HEAD: Paramilitary Police Paramilitary Police Organizations
    RUNNING HEAD: Paramilitary Police Paramilitary Police Organizations Abstract After providing the reader with examples of paramilitary structures and formalizing a definition of paramilitary, this manuscript analyzes the literature available and discusses several important themes, including: the rise of police militarization, international perspectives, community policing, hierarchy, subculture, and training. As the topic of community policing reemerges, the philosophical appeal remains, despite its use as a form of face saving and as a means to fund tactical units. On a subtler level, this study proposes that police subculture in the United States contrasts the general populace significantly, which could explain tensions between the police and public. Examination of the characteristics of this subculture shed some light onto the policing paradigm and on how communication unfolds inside and outside of police organizations. Through this synthesis, the appropriateness of a quasi-military paradigm and its resulting structure, language, and behavior, is brought into question. PARAMILITARY POLICE 2 “Every art and every inquiry, and similarly every action and choice, is thought to aim at some good; and for this reason the good has rightly been declared to be that at which all things aim.” (Aristotle, 2009, p. 3) Introduction Law enforcement is one of the most interactive pieces of government with the public. Most people, across all cultures, have some notion of what policing is and some opinion of what it should be. In the past three decades a rise in the militarization of policing in the United States has been speculated, observed, and critiqued by many scholars in academia and professionals in law enforcement.
    [Show full text]
  • Maritime Terrorism
    1 Maritime terrorism naval bases, offshore oil and gas facilities, other By Emilio Bonagiunta, Maritime Security Consultant critical infrastructure, or the maritime trade itself.ii Operations of this kind are reportedly part of Al-Qaeda's maritime strategy.iii Past here are two main forms in which attacks against oil facilities and tankers in Saudi terrorist groups benefit from the Arabia and Yemen demonstrate that terrorist T vastness and lawlessness of the sea: by networks in the region have ambitions to conducting attacks against sea-based targets and severely disrupt energy supplies from the by using the sea to transport weapons, militants Arabian Peninsula. A successful series of large- and other support means from one place to the scale attacks against the oil industry would have i other. In both cases, the low level of control and tremendous impacts on international energy law enforcement provides a beneficial markets and the global economy. It is from this environment for preparation and conduction perspective that Al-Qaeda poses a serious threat terrorist operations in the maritime domain, against maritime trade.iv unthinkable of on the ground. Yet, the fact that these fears have not Along with this, offshore assets and critical materialized can be attributed to a variety of infrastructure on the coast are seen as high-value factors: greater vigilance and measures adopted targets for terrorist groups. Operations against by sea-users and maritime security providers, the USS Cole (2000) and the tanker Limburg lack of confidence by terrorist groups in the (2002), attributed to Al-Qaeda, are good success of major attacks against sea-based examples of maritime terrorism in the Arabian targets due to insufficient expertise and Peninsula, where small crafts laden with experienced militants for conducting such explosives have proven successful in causing operations.
    [Show full text]
  • Department of Military Science 1
    Department of Military Science 1 DEPARTMENT OF MILITARY SCIENCE Scholarships and Allowances Scholarships are available for two, three, or four years. Students enrolled in the Advanced Course receive a tax-free subsistence allowance each month. They also receive about $700 for attending a five-week Advanced Camp (between the junior and senior year). Total remuneration for the final two years is approximately $7,500. All uniforms and equipment are furnished at no cost to students. Military Science Extracurricular Activities In addition to ROTC classes, the Military Science Department offers unique opportunities in various activities. These activities are designed to create new and lasting friendships as well as to develop leadership skills. The extracurricular activities are: the Color Guard, Intramural Sports, and Ranger Challenge Team (the varsity sport of Cadet Command). For further information, contact the Military Science Department, Room 217, Gullickson Hall, or call 304-696-6450. Summer Training Opportunities In addition to the Leaders Training Course and the Leader Development and Assessment Course, ROTC offers other training opportunities to broaden experience and leadership. These include the Basic Airborne Course, Air Assault Course, Mountain Warfare, Northern Warfare, United Kingdom Officer Training Course, Cadet Troop Leadership Training, Drill Cadet Leadership Training, Army Science Board, Cadet Intern Program, Nurse Summer Training Program, JFK Special Warfare Internship Program and Cultural Leadership Program. Some of these programs are conducted outside of the continental United States and with foreign countries. All programs are competitive and require the approval of the Professor of Military Science. Some cadets may also elect to train with a local Army Reserve or National Guard unit, each with additional training opportunities and benefits.
    [Show full text]
  • Floating Armories: a Legal Grey Area in Arms Trade and the Law of the Sea
    FLOATING ARMORIES: A LEGAL GREY AREA IN ARMS TRADE AND THE LAW OF THE SEA BY ALEXIS WILPON* ABSTRACT In response to maritime piracy concerns, shippers often hire armed guards to protect their ships. However, due to national and international laws regarding arms trade, ships are often unable to dock in foreign ports with weapons and ammunition. As a response, floating armories operate as weapons and ammuni­ tion storage facilities in international waters. By operating solely in interna­ tional waters, floating armories avoid national and international laws regard­ ing arms trade. However, there is a significant lack of regulations governing floating armories, and this leads to serious safety concerns including lack of standardized weapon storage, lack of records documenting the transfer of weapons and ammunitions, and lack of regulation from flags of convenience. Further, there is no publically available registry of floating armories and so the number of floating armories operating alongside the quantity of arms and ammunition on board is unknown. This Note suggests several solutions that will increase the transparency and safety of floating armories. Such solutions include requirements that floating armory operators register their vessels only to states in which a legitimate relationship exists, minimum standards that operators must follow, and the creation of a publically available registry. Finally, it concludes by providing alternative mechanisms by which states may exercise jurisdiction over foreign vessels operating in the High Seas. I. INTRODUCTION .................................... 874 II. THE PROBLEM OF MARITIME PIRACY ..................... 877 III. HOW FLOATING ARMORIES OPERATE..................... 878 IV. FLOATING ARMORIES AND THE LEGAL GRAY AREA............ 880 A. The Lack of Laws and Regulations .................
    [Show full text]
  • Decision-Making Process in Combat Operations
    DECISION-MAKING PROCESS IN MILITARY COMBAT OPERATIONS 4120/002 10.2013 2000 10.2013 4120/002 International Committee of the Red Cross 19, avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org © ICRC, October 2013 DECISION-MAKING PROCESS IN MILITARY COMBAT OPERATIONS PREFACE Every state has an obligation to ensure respect for the law of armed conflict. The ICRC is mandated to support states in these efforts and does so through a range of activities, including promoting the integration of appropriate com- pliance measures into military doctrine, education, training and sanctions, with a view to ensuring that behaviours of those engaged in armed conflict comply with the law. The present note is designed to support the integration of the Law of Armed Conflict into military decision-making processes, primarily at the operational level. It is not based on any specific national doctrine. It is designed to support those responsible for developing national doctrine and operational planning procedures in their efforts to integrate the Law of Armed Conflict into military practice. The desired outcome is staff procedures which ensure the development of military plans and orders that accurately and effectively integrate compliance with the Law of Armed Conflict into operational practice, thereby reducing the effects of armed conflict on those who do not, or no longer, participate in the hostilities. The techniques of warfare change rapidly, particularly at times when combat operations are commonplace. The humanitarian impact of conflict is timeless. The Law of Armed Conflict is designed to limit the humanitarian consequences of war.
    [Show full text]
  • Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II.
    [Show full text]
  • Highlights of Recent RAND Research on Counterinsurgency
    Highlights of Recent RAND Research on Counterinsurgency For more information, contact Shirley Ruhe, Director of Congressional Relations, at 703-413-1100, x5632 or [email protected], or Kurt Card, National Security Legislative Analyst, at 703-413-1100 x5259 or [email protected] As the leading research authority on counterinsurgency, the RAND Corporation has developed a wide selection of materials for policy makers. With multiple insurgencies operating in several theaters this research was developed to provide a historical, geographical, and functional understanding of past and present insurgencies and counterinsurgency operations. Social Science for Counterterrorism Putting the Pieces Together Darcy Noricks et al., 2009 This report from an interdisciplinary project to survey and integrate the scholarly social- science literature relevant to counterterrorism answers questions related to why some individuals become terrorists, how terrorists generate public support, how terrorist organizations make decisions, and why individuals disengage. A Stability Police Force for the United States Justification and Options for Creating U.S. Capabilities Terrence K. Kelly et al., 2009 Establishing security is the sine qua non of stability operations, since it is a prerequisite for reconstruction and development. Security requires a mix of military and police forces to deal with a range of threats from insurgents to criminal organizations. This research examines the creation of a high-end police force, which the authors call a Stability Police Force. 1 Underkill Scalable Capabilities for Military Operations amid Populations David C. Gompert et al., 2009 The battle for Gaza revealed an extremist strategy: hiding in cities and provoking attack to cause civilian deaths that can be blamed on the attacking forces.
    [Show full text]
  • Legal Advisers in Armed Forces
    ADVISORY SERVICE ON INTERNATIONAL HUMANITARIAN LAW ____________________________________ Legal advisers in armed forces By ratifying the Geneva Conventions of 1949 and their Additional Protocols of 1977, a State commits itself to respecting and ensuring respect for these international legal instruments in all circumstances. Knowledge of the law is an essential precondition for its proper application. The aim of requiring legal advisers in the armed forces, as stipulated in Article. 82 of Additional Protocol I, is to improve knowledge of – and hence compliance with – international humanitarian law. As the conduct of hostilities was becoming increasingly complex, both legally and technically, the States considered it appropriate when negotiating Additional Protocol I to provide military commanders with legal advisers to help them apply and teach international humanitarian law. An obligation for States and for provisions of international humanitarian law if they are to parties to conflict humanitarian law as widely as advise military commanders possible, in particular by including effectively. “The High Contracting Parties at all the study of this branch of law in times, and the Parties to the conflict their military training programmes. This obligation is analogous to that in time of armed conflict, shall contained in Article 6 of the same ensure that legal advisers are protocol (Qualified persons), under available, when necessary, to The role of the legal adviser which the States Parties must advise military commanders at the endeavour to train qualified appropriate level on the application Article 82 gives a flexible definition personnel to facilitate the application of the Conventions and this Protocol of the legal adviser’s role, while still of the Conventions and of Additional and on the appropriate instruction to laying down certain rules.
    [Show full text]
  • Modeling and Analysis of Resolve and Morale for the `Long War'
    Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 12-5-2007 Modeling and Analysis of Resolve and Morale for the `Long War' Michael J. Artelli Follow this and additional works at: https://scholar.afit.edu/etd Part of the Defense and Security Studies Commons Recommended Citation Artelli, Michael J., "Modeling and Analysis of Resolve and Morale for the `Long War'" (2007). Theses and Dissertations. 2648. https://scholar.afit.edu/etd/2648 This Dissertation is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. MODELING AND ANALYSIS OF RESOLVE AND MORALE FOR THE ‘LONG WAR’ DISSERTATION Michael J Artelli, Major, USAF AFIT / DS / ENS / 07-02 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY IR ORCE NSTITUTE F ECHNOLOGY AF I O T Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. The views expressed in this dissertation are those of the author and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the United States Government. AFIT/DS/ENS/07-02 MODELING AND ANALYSIS OF RESOLVE AND MORALE FOR THE ‘LONG WAR’ DISSERTATION Presented to the Faculty Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Michael J. Artelli, B.S., M.S.
    [Show full text]
  • Warfare in a Fragile World: Military Impact on the Human Environment
    Recent Slprt•• books World Armaments and Disarmament: SIPRI Yearbook 1979 World Armaments and Disarmament: SIPRI Yearbooks 1968-1979, Cumulative Index Nuclear Energy and Nuclear Weapon Proliferation Other related •• 8lprt books Ecological Consequences of the Second Ihdochina War Weapons of Mass Destruction and the Environment Publish~d on behalf of SIPRI by Taylor & Francis Ltd 10-14 Macklin Street London WC2B 5NF Distributed in the USA by Crane, Russak & Company Inc 3 East 44th Street New York NY 10017 USA and in Scandinavia by Almqvist & WikseH International PO Box 62 S-101 20 Stockholm Sweden For a complete list of SIPRI publications write to SIPRI Sveavagen 166 , S-113 46 Stockholm Sweden Stoekholol International Peace Research Institute Warfare in a Fragile World Military Impact onthe Human Environment Stockholm International Peace Research Institute SIPRI is an independent institute for research into problems of peace and conflict, especially those of disarmament and arms regulation. It was established in 1966 to commemorate Sweden's 150 years of unbroken peace. The Institute is financed by the Swedish Parliament. The staff, the Governing Board and the Scientific Council are international. As a consultative body, the Scientific Council is not responsible for the views expressed in the publications of the Institute. Governing Board Dr Rolf Bjornerstedt, Chairman (Sweden) Professor Robert Neild, Vice-Chairman (United Kingdom) Mr Tim Greve (Norway) Academician Ivan M£ilek (Czechoslovakia) Professor Leo Mates (Yugoslavia) Professor
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • A Historical Assessment of Amphibious Operations from 1941 to the Present
    CRM D0006297.A2/ Final July 2002 Charting the Pathway to OMFTS: A Historical Assessment of Amphibious Operations From 1941 to the Present Carter A. Malkasian 4825 Mark Center Drive • Alexandria, Virginia 22311-1850 Approved for distribution: July 2002 c.. Expedit'onaryyystems & Support Team Integrated Systems and Operations Division This document represents the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the Department of the Navy. Approved for Public Release; Distribution Unlimited. Specific authority: N0014-00-D-0700. For copies of this document call: CNA Document Control and Distribution Section at 703-824-2123. Copyright 0 2002 The CNA Corporation Contents Summary . 1 Introduction . 5 Methodology . 6 The U.S. Marine Corps’ new concept for forcible entry . 9 What is the purpose of amphibious warfare? . 15 Amphibious warfare and the strategic level of war . 15 Amphibious warfare and the operational level of war . 17 Historical changes in amphibious warfare . 19 Amphibious warfare in World War II . 19 The strategic environment . 19 Operational doctrine development and refinement . 21 World War II assault and area denial tactics. 26 Amphibious warfare during the Cold War . 28 Changes to the strategic context . 29 New operational approaches to amphibious warfare . 33 Cold war assault and area denial tactics . 35 Amphibious warfare, 1983–2002 . 42 Changes in the strategic, operational, and tactical context of warfare. 42 Post-cold war amphibious tactics . 44 Conclusion . 46 Key factors in the success of OMFTS. 49 Operational pause . 49 The causes of operational pause . 49 i Overcoming enemy resistance and the supply buildup.
    [Show full text]