Small Wars Journal

28 Articles -- Practical Application 101

Sun, 01/14/2007 - 11:01am
From time to time I will make a blog entry here based on a "post of note" from the Small Wars Journal's discussion board - the Small Wars Council.

A recent and energetic discussion at the Council elicited a wide range of responses from military theorists, experienced operators and casual observers. The genesis of this discussion centered on Dave Kilcullen's Twenty-Eight Articles: Fundamentals of Company-level Counterinsurgency.

One particular reply that caught my eye was posted by RTK -- a two-tour Iraqi Freedom veteran who served as a platoon and troop commander with the 3rd Armored Regiment. In that post RTK broke down each of the 28 articles of company-level COIN (counterinsurgency) and provided a short example of its utilization and / or utility based on his personal experiences and observations. Where a military acronym is used I have inserted an explanation.

--------------------

Article 1: Know your turf - Very little difference from saying "conduct IPB" (Intelligence Preparation of the Battlespace).

Article 2: Diagnose the problem - Looks like mission analysis.

Article 3: Organize for intelligence - Companies don't have intelligence sections. Smart and innovative companies have developed in-house intelligence sections that collect and analyze intelligence from the platoons. These ad-hoc sections were more often than not better suited and outperformed battalion-level intelligence sections with actual intelligence trained soldiers.

Article 4: Organize for interagency operations - In your typical mission rehearsal exercise, a company doesn't even touch interagency operations. In-theater, maximizing the effectiveness of interagency operations, particularly in the realm of civil-military projects, can make or break your combat tour.

Article 5: Travel light and harden CSS (Combat Service Support) - It doesn't take a Rhodes Scholar to see that CSS convoys were getting hammered right off the bat (remember PVT Lynch). We didn't do a good job in training our logisticians to fight on the roads. Conversely, for every tank or Bradley with a good load plan in theater I saw 8 gypsy wagons for tanks with all kinds of crap hanging off them that their crew would never use. Utilization of the conex-box for junk not used is an important PCI (Pre-Combat Inspection).

Article 6: Find a political / cultural advisor - Why did SF (Special Forces) traditionally conduct UW (Unconventional Warfare) and FID (Foreign Internal Defense) missions? Because being culturally astute are SF imperatives in their doctrine. We, in the conventional force, were never trained that way. Good units pulled in people who knew what they were talking about. I remember learning a great deal from Dr. Hashim. Once in theater, I got hooked into a sheiks family who brought me up to speed on the specific cultural dos and don'ts in my area. It helped place my soldiers in my troop on a higher plain of understanding than other units in theater. Our performance and results spoke to that.

Article 7: Train the squad leaders, then trust them - On the high intensity battlefield, I, as a troop commander, can maneuver individual sections much easier than in a COIN environment. The abilities of my junior leaders are of vital importance to everything I do. They conduct independent operations. Most of my patrols in my troop were led by an E5 or E6. I had 3 officers in my troop and they couldn't be everywhere. I, as did my PLs (Platoon Leaders), had to trust my NCOs (Non-Commissioned Officers) to do the right thing consistent with the commander's intent I wrote.

Article 8: Rank is nothing, talent is everything - Goes back to the rule of thirds that Tom Ricks talks about in Fiasco (one third get it, one third are trying to get it, and one third just want to use the hammer as the only tool in their box). Some are really good at COIN, some suck. Some of our best COIN operators are E5s and E4s who are out there every day. They understand how 2nd and 3rd order effects work. They see them up close and personal.

Article 9: Have a game plan - It may be surprising to you that many units go into an area without one. Ties back to Articles 1-4.

Article 10: Be there - Near and dear to my heart. As a reconnaissance tactics instructor, it's my job to communicate to the force that R&S planning and operations work in COIN just like they do in HIC environments. If you're unable to place effective fires at the critical point and time (which in OCIN is 3-7 seconds) you'll lose the engagement. Developing NAI (Named Areas of Interest) on areas that have a high IED (Improvised Explosive Device) threat and over-watching them will eliminate IEDs in given area. Again, goes back to IPB and planning

Article 11: Avoid knee jerk responses to first impressions - First reports are wrong 95% of the time. Insurgents know when RIP/TOA (Relief in Place / Transfer of Authority) is happening. Depending on where you are - some lay low and some hammer the new unit. Those laying low can paralyze a new unit into inaction. Going into the game with a plan and sticking to it is better than initial improvisation.

Article 12: Prepare for handover from day 1 - We reinvent the wheel on each rotation. It has been said we fought the Vietnam War for one year 11 times, rather than for 11 years. Many units get the RIP/TOA files and paperwork and never look at them again. That's a travesty. Additionally, some units are preparing to RIP/TOA with indigenous forces. That needs to be planned from Day 1.

Article 13: Build trusted networks - May seem like common sense but many units think they can do it on their own. There are people in the community who want to help, despite great risk to themselves and their family. Taking them in and getting them to help your unit will make the unit successful. This goes back to the cultural advisor piece. If the tree branches are overt operations, the tree's roots are relationships with and in the local populace.

Articles 14 and 15: Start easy and seek early victories - Some go in and try to take down the entire AQIZ network in Iraq in their first 48 hours. The easiest victories have very little to do with kinetic operations; SWEAT-MS (Security, Water, Electricity, Transportation Network, Medical and Sanitation) victories, tribal engagements, and equipping of security forces are the easiest 3 things to focus on. The populace sees this and will warm to your unit quickly.

Article 16: Practice deterrent patrolling - Firebase concepts, which conventional units were completely against initially, lend well to this. Dominating the environment through sheer presence to deter attacks goes back to R&S (Reconnaissance and Surveillance) planning.

Article 17: Be prepared for setbacks - Things don't go perfectly, despite even the best of plans. Western logic doesn't always translate well. Despite your best effort to explain a specific COA (Course of Action) to a sheik, he may not roll with it. If you've hinged your entire plan on the COA he's refuted, you probably needed to plan a bit better. Stuff happens. Deal with it.

Article 18: Engage the women; beware the children - Iraq, despite the men's perspective, is a matriarchal society. Getting into the women's networks influences the family network and gets 14 year old Joe Jiahist grounded and beaten with a wooden stick by his mom. Aside from the pure comedic value of these types of events, the women's circles are often the untapped venues of success in this type of society. Conversely, the insurgents are more ruthless than we are. They use kids because they're impressionable and, to them, expendable. It's much easier, seemingly, to deal with the kids, but they're distracters and oftentimes scout for insurgents.

Article 19: Take stock regularly - It may seem like common sense, but after continuous operations for prolonged periods, it's tougher to do than you'd think. Determining the metrics of progress can change from week to week. But it lets us know where we are and where we need to go.

Article 20: Remember the global audience - Perception is reality, even if it's wrong. The way this war is covered, a private flashing a group of kids with the muzzle of his weapon on routine patrol can be cut and spliced into a nasty IO (Information Operations) message for the insurgents. We are always on stage and they have the benefit of the doubt globally right now.

Article 21: Exploit single narrative - This goes right into the IO plan. It must be tailored to fit your specific area. Again, this is something we don't train regularly and we learn by doing.

Article 22: Local forces should mirror enemy, not ourselves - Further, they should mirror local operational requirements. What's the use in providing the village doctor with an endocrinology lab that he doesn't know how to use? I don't know either, but some division surgeon thought it was a good idea. Additionally, just because we have bells and whistles for equipment doesn't mean our partnering Iraqi unit does too. We need to remember that. Often we don't.

Article 23: Practice armed civil affairs - CMO (Civil-Military Operations) can be a decisive operation depending on where you are. You must be able to transition from CA to combat operations quickly. Additionally, the CA (Civil Affairs) bubba isn't the only one doing CA work; your 19D1O is probably doing more CA in a day than the Civil Affairs officer will do in 3 days.

Article 24: Small is beautiful -- The Iraqis want to see results. The proliferation of small programs that work does wonders. Also, small is recoverable and cheap. They don't need to know that.

Article 25: Fight the enemy's strategy, not his forces - The strategy is the iceberg, his forces are the tip. Ask Capt Smith from the Titanic what was more important. We often look for the 10 meter target and forget what's downrange.

Article 26: Build your own solution, attack only when he gets in the way - Combat operations do not win COIN. For a company, since combat operations are what we've trained for, they're our comfort zone. CMO, IO, economic development, and the sustainment of security forces are all bigger moneymakers in COIN than combat operations. It's tough to get to work, but more productive once you do.

Article 27: Keep extraction plan secret - Everyone has a farewell tour with the sheiks, tribal leaders, political leaders, and others in the AO (Area of Operations) they've worked with over the year. That gets back to the insurgents. We need to watch it, but I was guilty of this too. It's where human instinct and developed relationships interfere with what is doctrinally right.

Article 28: Keep the initiative - Insurgents are used to the initiative. Hell, our battle drills are all named "react to ____." By good planning and intelligence development, you can kick an insurgent in the teeth by making him react. Insurgents can handle the "initiate ambush" piece but aren't too good at the react to contact game and usually die in place.

Remember, Remember, the 5th of November

Fri, 01/12/2007 - 9:30pm
One of my favorite public speaking techniques, which I probably borrowed from Paul Harvey's "The Rest of the Story", is to tell an obscure story as if it were a familiar one. Thus, when I want to introduce an audience to the Austro-Prussian War of 1866, I start by talking about the "great civil war of the mid-nineteenth century, where the Northerners wore blue and the Southerners wore grey ..."

A couple of years ago, while giving an after-dinner talk to a group of dentists in Manhattan, I used this technique to introduce the subject of terrorism. I told the story of a man who had a career that was remarkably similar to that of Osama bin Ladin. The subject of the story, however, was not a present-day Saudi terrorist, but an English contemporary of William Shakespeare by the name of Guy Fawkes.

Though separated by more than three centuries, the careers of the two men were remarkably similar. Each had been born into a family that, by dint of hard work and royal favor, had risen from obscurity to prominence in a short period of time. Each had spent several years as a volunteer with the forces that were fighting campaigns of attrition against one of the leading "infidel" states of the day. (In the case of Guy Fawkes, the "infidel" state was the Protestant Dutch Republic, which was fighting a century-long war against Roman Catholic Spain.) After returning home, each used the connections he made while at war as the foundation for a terrorist organization that specialized in blowing up large public buildings.

The parallel between Fawkes and bin Ladin is, of course, less than perfect. Fawkes was a hands-on type of guy who led from the front and operated on a scale that would strike bin Ladin as painfully modest. Where bin Ladin is the purveyor of a perverse sort of globalism, Fawkes was primarily concerned with regime change in his own back yard. In particular, he thought that if he could only succeed in exploding an improvised explosive device under the reigning king of England - the same James I who lent his name to the Jamestown colony, the James River and the King James Bible - he would be able to replace him with a Catholic monarch.

As it turned out, the bomb that Fawkes and his co-conspirators were building under the Houses of Parliament was discovered well before it could be set off. (The idea was to blow up James I, as well as his most powerful supporters and immediate heirs, while he was giving the seventeenth-century version of the "state of the union" address.) Thus, rather than being the anniversary of an act of terrorism, Guy Fawkes Day, which is still celebrated in England on the 5th of November, is the anniversary of the uncovering of the plot.

My first point in telling this story was to separate the phenomenon of blowing things up for political purposes from its connection to radical Islam. That is, I wanted to remind people that while radical Islam and terrorism have, at late, been closely intertwined, one does not have to be a follower of that particular ideology in order to plant a bomb. My second point was to commend James I - a king who, if remembered at all, has come down in history as smelly, pedantic egomaniac with an excessive fondness for handsome young men - for his response to the discovery of the plot to blow him up. Rather than condemning all English Catholics for the actions of a few, James took every opportunity to distinguish between the conspirators and the vast majority of his Roman Catholic subjects who, notwithstanding their disobedience in matters of religion, were entirely innocent of treason.

After having had two years to reflect upon the Guy Fawkes story, I would like to add a third point. One of the prerequisites to terrorism is the existance of an explicit ideology - a well-developed set of opinions, grievances, explanations and goals that allows terrorists to believe that their actions serve a higher purpose. Not all who embrace this ideology, however, are terrorists. Indeed, in every case that I am familiar with, the terrorists are invariably outnumbered by those who simultaneously share their point of view and decline to adopt their methods.

A Framework for thinking about Iraq Strategy

Fri, 01/12/2007 - 1:51pm
The President's new Iraq strategy has prompted much discussion, informed and otherwise. I'm not going to add to it here. Rather, I want to tentatively suggest a framework for thinking about Iraq, which (if you accept its underlying assumptions) might prove helpful in evaluating the new strategy and the enemy's likely response.

I developed this framework about two years ago, while writing the October 2004 version of Countering Global Insurgency, mainly the appendix on Iraq. I have since presented it in various forums, including during the Quadrennial Defense Review in 2004-5, the Eisenhower Series in early 2006, during a series of lectures at the Naval War College and at the State Department's Foreign Service Institute, and during the Irregular Warfare conference in Summer 2006. I also briefed it to the Pentagon's "Plan B" team in November 2006.

So if you were in any of those discussions, read no further since you've heard it all before.

This is a model, not a strategy. That is, it is a systematic oversimplification, designed to clarify an extremely complex, rapidly-changing reality. It does not tell us what to do in Iraq, but is a basis for evaluating options. It is wrong -- all models are -- but applied tentatively, with skepticism, and with constant and rigorous "ground truth" from first-hand observation in theater, I have sometimes found it useful. Here is the model, expressed graphically.

The "Four Problems" concept

In essence, the model suggests that Iraq comprises four strategic problems:

  • an underlying nation-building problem, resulting from the fact that Iraq is a weak and fragile state, and
  • three overlapping security problems that sit "above" that underlying problem, and make it harder to get at it. The three problems are:

    • Terrorism -- that is, the presence of terrorist entities including (but not limited to) AQI who seek to exploit the situation in Iraq to further extremist or trans-national aims
    • Insurgency -- the (primarily Sunni) rebellion against the new post-Saddam order in Iraq, including rebellion against both the coalition presence and the new Iraqi government, and
    • Communal Conflict -- including sectarian conflict between Sunni and Shi'a elements, and ethnic conflict between Kurds, Arabs and other ethnic groups.

These three security problems overlap: incidents may involve elements of more than one dimension -- for example, some terrorism is "pure" AQI activity, while other terrorist acts are insurgent-motivated, and yet others incorporate a sectarian dimension. Most incidents in fact include elements of two dynamics, or all three. You might think of the three problems as a Venn diagram of overlapping circles, each constantly changing in size, with any incident able to be plotted somewhere within the interaction of the three dynamics -- terrorism, insurgency and communal conflict.

They prevent us getting at the underlying problems (crime, weak infrastructure, economic and social alienation, weak governance, an so on) that we need to address in order to deal with the nation-building requirement. The inability to get at this underlying problem perpetuates and exacerbates the security problems.

The three security problems are also mutually reinforcing -- each makes the others worse. Terrorism provokes communal conflict, which in turn makes the insurgency more intractable, which in turn gives rise to terrorism, and so on.

The solution sets to each problem also tend to be countervailing -- the solution to one tends to make the others worse. For example, defeating the insurgency requires building indigenous security forces. But in a society with weak national institutions, divided along sectarian lines, this can tend to make the communal conflict worse. Resolving the communal conflict requires outreach out to all community groups including those (such as some Sunni groups in Anbar) who support the terrorists. But this can create safe havens for terrorists. Countering terrorist cells implies disrupting these safe havens, but that can make the insurgency worse -- and so on, in an endless Iraq do-loop.

Another conundrum is that our presence in Iraq is both essential for a solution, and a source of irritation which tends to exacerbate the situation.

The Regional Dynamic

This whole "four-problem set" sits within a region that straddles a Sunni Arab world (Arabia and the Sunni parts of the Levant) and a Persian Shi'a world (primarily Iran, but also Iranian proxies and allies) with a long history of internal and intra-regional conflict and tension. As General Zinni remarked recently, in toppling Saddam we have created the first Shi'a Arab state in modern history, with profound implications for the long-standing regional dynamic, and the global relationship between Sunni and Shi'a Islam, that we are only just starting to appreciate.

This implies two things. First, conflict within Iraq that threatens to spill into the broader region or drag Sunni states into increased confrontation with Iran, is by definition more strategically ominous than forms of conflict that remain within Iraq. By this measure, the model was already predicting in 2004 that communal conflict would turn out to have broader strategic significance than the insurgency itself (though this tends to change over time).

Second, it is critical that we conduct the campaign in Iraq within a broader regional campaign (diplomatic, economic and informational), rather than conducting it as if Iraq was an island somewhere in the Indian Ocean rather than a central puzzle-piece in a complex regional chessboard. We have to approach the region as a region. This seems like a statement of the obvious, but not everyone seems to have seen the issues this way so far.

Iraq, then, is not a "pure" Insurgency problem

In this sense, Secretary Rumsfeld was perfectly correct when he denied that Iraq was an insurgency and rejected the comparison with Vietnam. This is quite true -- Iraq is not just an insurgency, it is an insurgency plus a terrorist campaign plus a sectarian civil war, sitting on top of a fragile state within a divided region.

And Vietnam is indeed not an apt comparison. The insurgency part of the problem resembles Vietnam to some extent, but insurgency is only one small part of a much bigger problem in Iraq. If we were to draw historical analogies, we might say that the problem in Iraq is like trying to defeat the Viet Cong (insurgency) while simultaneously rebuilding Germany (nation-building), keeping peace in the Balkans (communal conflict) and defeating the IRA (terrorism). And, oh by the way, these all have to be done at the same time, in the same place, and changes in one part of the problem significantly affect the others.

Thus, Iraq is a fiendishly difficult, complex and constantly-changing problem. Look no further for the reason why we have found it so difficult -- put simply, because it is. It's an incredibly complex, tough problem, which requires constant adaptation and agility of response.

(Without getting all theoretical on you, this is what we might call a "wicked" problem, according to the very specific meaning that planners and systems theorists give to that term, in describing a class of problems that has no single solution, no "stopping rule" that tells you when the problem is solved, and where the very act of attempting to solve the problem changes the nature of the problem to be solved. Incidentally, there is a solid and very useful body of research into how to deal with this type of problem, which I have found very helpful in thinking about approaches to Iraq, as have others).

From a practitioner's standpoint, this means that improvements in counterinsurgency technique and capability, while important in addressing the insurgency part of the problem, are not enough to deal with the broader strategic problem in Iraq. Instead, we need solutions that deal with all four problems simultaneously in an integrated fashion, and try to control and impose order on an overall complex environment.

The term I and some of my Australian colleagues developed to describe this form of operation, during work in 2003, was "Control Operations" -- operations that are neither enemy-centric (as in traditional counterterrorism) nor population-centric (as in traditional counterinsurgency) but rather environment-centric, seeking to control and reduce the chaos and violence within a highly complex, multi-sided overall environment. (More about this idea, which I and others have been working on for several years now, in subsequent posts).

So much for theory. In practice, for commanders on the ground, does this help? Not much, I would suggest. The basic techniques of peace operations, counterinsurgency (if executed properly), information operations, counterterrorism, and institution-building are all well-known and at the tactical level our people are well skilled in applying most of them.

Hence the requirement for things like the "Twenty-Eight Articles" -- they don't tell you anything new, nor help address the overall strategic problem (which is well above tactical commanders' pay-grade, thank God), but they help deal with the tactical issues that are already well-understood, and provide memory joggers for guys in the field who have to deal with one discrete part of a larger problem.

Where the model makes a difference is at the strategic level, in prioritizing actions between the various problems, deciding whether and where to expend resources, and -- most important -- developing metrics and "reading the environment" to understand how it changes over time. In a sense, this a prototypical "operational design" for the Iraq theater.

In terms of evaluating options, it allows you to develop checklists or metrics to understand how a plan might function. Does it help us get at the underlying problem? Does it exacerbate the other security problems? Does it address more than one security problem simultaneously? Does it help prevent spill-over of conflict to the regional level? Does it cement state authority? -- and so on. The questions are different each time, but the model helps frame them and work out which factors matter most in a given situation.

Hardly rocket science, of course, just an effort to simplify complex reality and identify macro-trends, which then allow you to work out which bits of detail matter, so that you can drill back down into the detail to think about issues.

Bottom line

I have found this useful as a way of thinking about Iraq and evaluating strategic options. In considering strategic initiatives like those just announced, you need some kind of framework, and this is mine.

If it works for you, use it. If you think of refinements, suggest them (a very senior USN officer whose views I greatly respect did just that in a recent meeting). If it doesn't help you, discard it and think up your own. Either way, you need some kind of model for thinking about Iraq, lest the sheer complexity of events and the difficulty of knowing just exactly what is actually happening overwhelm you.

For what it's worth.....

SWJ Blog Kick-Off

Wed, 01/10/2007 - 8:21am

Welcome to the SWJ Blog. The content will start to flow over the next several days from our illustrious Editor-in-Chief, and several contributing authors who we are very glad to have aboard. This is a short opening note on terrain appreciation, while we continue to clear the dust.

First, many thanks to Marvin Hutchens of ThreatsWatch and other sites, for making all of this technology insertion possible, and for putting up with us in the interest of national security and like-mindedness. S/F.

Second, we require a TypeKey registration for all comments. This is to reduce spam and frivolous comments, as there is enough noise out there in the e-world. We hope all of you serious posters will jump over that low hurdle and join us. Our Privacy Policy has been updated with information on TypeKey.

Finally, we hope this blog becomes a welcome addition to the Small Wars community, and look forward to better serving you through continued enhancements to our site.