TACTICS IN COUNTERINSURGENCY

[Pages:300]FM 3-24.2

(FM 90-8, FM 7-98)

TACTICS IN COUNTERINSURGENCY

APRIL 2009

DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited.

HEADQUARTERS DEPARTMENT OF THE ARMY

This publication is available at Army Knowledge Online (us.army.mil) and General Dennis J. Reimer Training and Doctrine

Digital Library at (train.army.mil).

Field Manual No. 3-24.2

* FM 3-24.2 (FM 90-8, FM 7-98)

Headquarters Department of the Army Washington, DC, 21 April 2009

Tactics in Counterinsurgency

Chapter 1 Chapter 2

Contents

Page

PREFACE ................................................................................................................. viii

INTRODUCTION ......................................................................................................... ix

OPERATIONAL ENVIRONMENT OF COUNTERINSURGENCY ........................... 1-1 Section I--OVERVIEW............................................................................................. 1-1

Insurgency........................................................................................................... 1-1 Counterinsurgency.............................................................................................. 1-2 Influences on Current Operational Environments............................................... 1-2 Section II--OPERATIONAL AND MISSION VARIABLES ..................................... 1-3 Operational Variables ......................................................................................... 1-3 Mission Variables ................................................................................................ 1-6 Section III--ANALYSIS OF CIVIL CONSIDERATIONS USING ASCOPE............. 1-8 Methodology........................................................................................................ 1-8 Civil Considerations Overlay............................................................................... 1-9 Civil Consideration Matrixes ............................................................................. 1-10 Section IV--EFFECTS ........................................................................................... 1-16 Prerequisites ..................................................................................................... 1-16 Root Causes ..................................................................................................... 1-17 Section V--CULTURAL COMPETENCE AND SITUATIONAL AWARENESS ... 1-18 Culture............................................................................................................... 1-18 Cultural Capability ............................................................................................. 1-24 Cultural Proficiency Levels................................................................................ 1-24 Culturally Influenced Situational Awareness .................................................... 1-25

FOUNDATIONS OF INSURGENCY ......................................................................... 2-1 Section I--OVERVIEW............................................................................................. 2-1

Components........................................................................................................ 2-1 Manifestations ..................................................................................................... 2-1 Historical Insurgency........................................................................................... 2-2 Section II--ELEMENTS ........................................................................................... 2-2 Leaders ............................................................................................................... 2-3 Guerrillas ............................................................................................................. 2-3

Distribution Restriction: Approved for public release; distribution is unlimited. * This publication supersedes FM 90-8, 29 August 1986 and FM 7-98, 19 October 1992.

FM 3-24.2

i

Contents

Chapter 3

Underground....................................................................................................... 2-4 Auxiliaries ........................................................................................................... 2-4 Mass Base .......................................................................................................... 2-4 Example.............................................................................................................. 2-5

Section III--DYNAMICS .......................................................................................... 2-5 Leadership .......................................................................................................... 2-5 Objective............................................................................................................. 2-7 Ideology .............................................................................................................. 2-9 Environment and Geography ........................................................................... 2-10 External Support ............................................................................................... 2-11 Internal Support ................................................................................................ 2-12 Phasing and Timing.......................................................................................... 2-15 Organizational and Operational Patterns ......................................................... 2-16

Section IV--STRATEGIES .................................................................................... 2-16 Urban Strategy ................................................................................................. 2-17 Military-Focused Strategy................................................................................. 2-17 Protracted Popular War Strategy ..................................................................... 2-17 Identity-Focused Strategy ................................................................................ 2-18 Conspiratorial Strategy ..................................................................................... 2-18

Section V--TACTICS ............................................................................................ 2-20 Violent Tactics .................................................................................................. 2-20 Nonviolent Tactics ............................................................................................ 2-23

Section VI--STRENGTHS AND VULNERABILITIES .......................................... 2-24 Strengths .......................................................................................................... 2-24 Vulnerabilities ................................................................................................... 2-25

FOUNDATIONS OF COUNTERINSURGENCY ...................................................... 3-1

Section I--OVERVIEW ............................................................................................ 3-1 Definition of Counterinsurgency ......................................................................... 3-1 Goal of Counterinsurgency Operations .............................................................. 3-1 Foreign Internal Defense .................................................................................... 3-2 Internal Defense and Development.................................................................... 3-2 Joint, Interagency, Intergovernmental, Multinational.......................................... 3-2 Interagency Coordination in COIN ..................................................................... 3-5 Lines of Effort in Counterinsurgency .................................................................. 3-7

Section II--HISTORICAL THEORIES ..................................................................... 3-9 Robert Thompson's Principles for Successful COIN.......................................... 3-9 David Galula's Four Laws for Successful COIN................................................. 3-9 Charles Callwell's Ideas for Successful COIN ................................................. 3-10

Section III--TACTICAL CONSIDERATIONS........................................................ 3-10 Terrain .............................................................................................................. 3-10 Troops .............................................................................................................. 3-14

Section IV--CLEAR-HOLD-BUILD OPERATIONS .............................................. 3-17 Overview........................................................................................................... 3-18 Clear ................................................................................................................. 3-19 Hold .................................................................................................................. 3-20 Build.................................................................................................................. 3-21

ii

FM 3-24.2

21 April 2009

Contents

Chapter 4 Chapter 5

Section V--OTHER MAJOR COIN TACTICAL OPERATIONS............................3-23 Strike Operations .............................................................................................. 3-23 Populace and Resource Control Operations .................................................... 3-24

Section VI--PHASES.............................................................................................3-27 Initial Response Phase ..................................................................................... 3-27 Transformation Phase.......................................................................................3-28 Fostering Sustainability Phase ......................................................................... 3-28

COMPREHENSIVE TACTICAL PLANNING IN COIN ............................................. 4-1

Section I--OVERVIEW............................................................................................. 4-1 End State ............................................................................................................ 4-1 Measures of Performance and Effectiveness ..................................................... 4-2 Planning Horizons ............................................................................................... 4-3

Section II--TACTICAL DESIGN .............................................................................. 4-5 Considerations .................................................................................................... 4-5 The Seven Counterinsurgency Lines of Effort .................................................... 4-6

Section III--MDMP AND TLP ................................................................................ 4-14 Military Decision-Making Process.....................................................................4-14 Troop-Leading Procedures ............................................................................... 4-22

Section IV--TARGETING INSURGENTS ............................................................. 4-25 Role in COIN ..................................................................................................... 4-25 Counterinsurgency Targeting Process ............................................................. 4-27 Targeting Battle Rhythm ................................................................................... 4-30

OFFENSIVE CONSIDERATIONS IN COIN.............................................................. 5-1

Section I--OVERVIEW............................................................................................. 5-1 Purpose in COIN ................................................................................................. 5-1 Characteristics of the Offense ............................................................................ 5-1 Types of Offensive Operations ........................................................................... 5-2 Offensive Operations in Clear, Hold, Build Operations ...................................... 5-3 Mission Variables in COIN .................................................................................. 5-3

Section II--CIVIL SECURITY AND CONTROL....................................................... 5-4 Search and Attack...............................................................................................5-4 Cordon and Search............................................................................................. 5-8 Search Operations ............................................................................................ 5-15 Site Exploitation ................................................................................................ 5-17 Raid ................................................................................................................... 5-22 Ambush ............................................................................................................. 5-24 Sniper Operations ............................................................................................. 5-30 COIN Patrols ..................................................................................................... 5-32

Section III--OTHER LINES OF EFFORT .............................................................. 5-38 Support Host Nation Security Forces ............................................................... 5-38 Support to Governance.....................................................................................5-38 Restore Essential Services ............................................................................... 5-38 Support to Economic and Infrastructure Development.....................................5-39 Conduct Information Engagement .................................................................... 5-39

21 April 2009

FM 3-24.2

iii

Contents

Chapter 6

Chapter 7 Chapter 8 Appendix A

DEFENSIVE CONSIDERATIONS IN COIN ............................................................. 6-1

Section I--OVERVIEW ............................................................................................ 6-1 Area Defense...................................................................................................... 6-1 Mobile Defense................................................................................................... 6-1 Retrograde.......................................................................................................... 6-2 Major Counterinsurgency Operations ................................................................ 6-2

Section II--CIVIL SECURITY AND CONTROL ...................................................... 6-2 Site Selection...................................................................................................... 6-2 Protection ........................................................................................................... 6-7 Counterinsurgency Bases .................................................................................. 6-8 Planning Considerations for a Base Defense .................................................. 6-10 Combat Outpost Construction Considerations................................................. 6-12 Base Defense ................................................................................................... 6-14 Counter Ambush............................................................................................... 6-17 Countering IEDs ............................................................................................... 6-18 Countersniper or Sniper Defeat........................................................................ 6-26 Countering Drive-By Shootings ........................................................................ 6-30

Section III--OTHER LINES OF EFFORT.............................................................. 6-31 Support Host Nation Security Forces ............................................................... 6-31 Support to Governance .................................................................................... 6-31 Restore Essential Services .............................................................................. 6-31 Support to Economic and Infrastructure Development .................................... 6-31 Conduct Information Engagement.................................................................... 6-32

STABILITY OPERATIONS CONSIDERATIONS IN COIN ...................................... 7-1

Section I--OVERVIEW ............................................................................................ 7-1 Nature of Stability Operations ............................................................................ 7-1 Clear-Hold-Build Operations .............................................................................. 7-2

Section II--FIVE PRIMARY STABILITY TASKS.................................................... 7-2 Establish Civil Security ....................................................................................... 7-2 Establish Civil Control......................................................................................... 7-5 Support to Governance .................................................................................... 7-15 Restore Essential Services .............................................................................. 7-20 Support to Economic and Infrastructure Development .................................... 7-22

SUPPORT TO HOST NATION SECURITY FORCES ............................................. 8-1

Section I--BENEFITS, CHALLENGES, AND GOALS ........................................... 8-1 Benefits............................................................................................................... 8-1 Challenges.......................................................................................................... 8-2 Goals .................................................................................................................. 8-4

Section II--THE FRAMEWORK .............................................................................. 8-4 Developing a Plan .............................................................................................. 8-4 Developing HN Security Forces ......................................................................... 8-7 Employment of Newly Trained Forces in COIN ............................................... 8-23

IPB IN COIN..............................................................................................................A-1 Overview............................................................................................................. A-1 Signifigant Characteristics in COIN .................................................................... A-2

iv

FM 3-24.2

21 April 2009

Contents

Appendix B READINGS FOR COIN TACTICAL LEADERS IN A TIME-CONSTRAINED ENVIRONMENT ................................................................................................................................. B-1

Appendix C

TWENTY-EIGHT ARTICLES: FUNDAMENTALS OF COMPANY-LEVEL COIN .. C-1 Introduction ........................................................................................................ C-1 What is Counterinsurgency?.............................................................................. C-1 Preparation......................................................................................................... C-2 Golden Hour....................................................................................................... C-4 Groundhog Day.................................................................................................. C-6 Getting Short ...................................................................................................... C-8 Four "What Ifs" ................................................................................................... C-8

Appendix D TWENTY-SEVEN ARTICLES OF T.E. LAWRENCE .............................................. D-1

GLOSSARY ................................................................................................ Glossary-1

REFERENCES ........................................................................................ References-1

INDEX................................................................................................................ Index-1

Figures

Figure 1-1. Comparison of insurgent's and counterinsurgent's perspectives of time. ..............1-6 Figure 1-2. ASCOPE. ..............................................................................................................1-8 Figure 1-3. Civil considerations overlay. ................................................................................1-10 Figure 1-4. Taxonomy of culture............................................................................................1-19 Figure 1-5. Changes in cultural capability over time. .............................................................1-24 Figure 2-1. Insurgency.............................................................................................................2-1 Figure 2-2. Components of Malaysian Insurgency (circa 1950)...............................................2-2 Figure 2-3. Organizational elements of an insurgency. ...........................................................2-3 Figure 2-4. Example insurgent organization. ...........................................................................2-5 Figure 2-5. Range of popular support....................................................................................2-12 Figure 2-6. Shifts between strategies and phases.................................................................2-20 Figure 3-1. Full-spectrum operations.......................................................................................3-6 Figure 3-2. Example lines of effort for a counterinsurgency.....................................................3-8 Figure 3-3. Rheostat approach to the lines of effort.................................................................3-9 Figure 3-4. Example format for AO platoon requirements worksheet. ...................................3-15 Figure 3-5. Clear-hold-build framework. ................................................................................3-18 Figure 4-1. Lines of effort. .......................................................................................................4-8 Figure 4-2. COIN MDMP. ......................................................................................................4-16 Figure 4-3. Course of action analysis (wargame). .................................................................4-19 Figure 4-4. Example expanded synch(ronization) matrix.......................................................4-21 Figure 4-5. TLPs in COIN. .....................................................................................................4-22 Figure 4-6. Lethal and nonlethal targeting. ............................................................................4-26 Figure 4-7. Targeting and MDMP. .........................................................................................4-27 Figure 4-8. Targeting battle rhythm. ......................................................................................4-30 Figure 5-1. Infiltration by company. .........................................................................................5-7 Figure 5-2. Infiltration by squad/platoon. .................................................................................5-7 Figure 5-3. Comparison of cordon and search methods..........................................................5-8

21 April 2009

FM 3-24.2

v

Contents

Figure 5-4. Typical organization for cordon and search operations. ......................................5-11 Figure 5-5. Typical establishment of an urban cordon. ..........................................................5-13 Figure 5-6. Urban inner cordon..............................................................................................5-14 Figure 5-7. Example site exploitation sketch. ........................................................................5-17 Figure 5-8. Example raid concept. .........................................................................................5-23 Figure 5-9. Linear formation ambush.....................................................................................5-28 Figure 5-10. L-shaped formation ambush..............................................................................5-29 Figure 5-11. Satellite patrol movement. .................................................................................5-37 Figure 6-1. Example format for Vulnerability Prioritization Matrix. ...........................................6-3 Figure 6-2. Example completed CARVER-P Vulnerability Prioritization Matrix. .......................6-3 Figure 6-3. Criteria evaluation tool...........................................................................................6-4 Figure 6-4. Facility categories..................................................................................................6-6 Figure 6-5. Typical US combat outpost design. .....................................................................6-13 Figure 6-6. Organization of base command...........................................................................6-15 Figure 6-7. Base defense elements forces. ...........................................................................6-16 Figure 6-8. Key base defense structures. ..............................................................................6-16 Figure 6-9. Coordinates register. ...........................................................................................6-20 Figure 6-10. Example pattern-analysis plot sheet..................................................................6-21 Figure 6-11. Example activities matrix. ..................................................................................6-22 Figure 6-12. Example association matrix...............................................................................6-23 Figure 6-13. Example link diagram. .......................................................................................6-23 Figure 6-14. Types of snipers. ...............................................................................................6-27 Figure 7-1. Example BCT using LOEs.....................................................................................7-2 Figure 7-2. Well-equipped snap checkpoint layout. ...............................................................7-10 Figure 7-3. Typical enduring checkpoint layout......................................................................7-11 Figure 7-4. Legitimate governance. .......................................................................................7-15 Figure 8-1. Partnership benefits. .............................................................................................8-2 Figure 8-2. Host nation contributions. ......................................................................................8-2 Figure 8-3. Characteristics of well-trained HN security forces. ................................................8-5 Figure 8-4. Possible duties of the advisor team. ......................................................................8-7 Figure 8-5. Seven framework tasks. ........................................................................................8-8 Figure 8-6. Example format for readiness assessment............................................................8-9 Figure 8-7. Augmentation of an example unit. .......................................................................8-18 Figure 8-8. Principles of advising...........................................................................................8-21 Figure 8-9. Team-building process. .......................................................................................8-22 Figure 8-10. Example Host Nation security force AAR--operation summary. .......................8-24 Figure A-1. The steps of IPB. ................................................................................................. A-1 Figure A-2. Significant terrain characteristics common to COIN operations. .......................... A-4 Figure A-3. Societal considerations. ....................................................................................... A-6

vi

FM 3-24.2

21 April 2009

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download