This publication outlines the planning process as it relates to a Special Forces (SF) operational detachment-alpha (ODA) conducting deliberate planning for special operations. Planning is an essential task common to all aspects of SF operations. More content available at: doguedebordeauxsurvival.com
Planning, Command and Control of Special Forces Unconventional Warfare Operations.TC 18-01.3 provides practical procedures and examples useful to mission planning of unconventional warfare (UW). This publication is designed primarily for use at national and international training centers and home station unit training events. It is intended to be used in conjunction with current relevant doctrine and supporting products. TC 18-01.3 is a UW mission planning guide designed specifically for the operational detachment-charlie (ODC) level. This ODC level incorporates all basic element functions that occur in or outside but in support of the unconventional warfare operating area (UWOA). It isbased on the traditional ODC, but is deliberately inclusive of any size element (including special activities elements) appropriate to this echelon and is based primarily not on specific units but on functions required (command, operational planning and support, joint and interagency coordination, military information support operations [MISO], Civil Affairs [CA], and so on). Planning guidance designed specifically for the operational detachment-alpha (ODA) may be found in TC 18-01.1, and guidance designed specifically for the operational detachment-bravo (ODB) may be found in TC 18-01.2.The principal audience for TC 18-01.3 is commanders, staff officers, and operational personnel at the ODA, ODB, and ODC levels, and all observers/controllers responsible for evaluation and training assistance to those units. TC 18-01.3 is also useful to conventional force commanders and staffs in better understanding the parameters of special operations forces (SOF) and conventional forces (CF) interdependence when SOF is engaged in UW.This publication is a collaborative effort between the Special Operations Training Detachment Joint Readiness Training Center cadre and the Special Forces (SF) Doctrine Division at the U.S. Army Special Operations Center of Excellence, USAJFKSWCS. It is intended to be revised on a regular basis based on interaction between observers/controllers, the using units, and the publication authors.
In this book, two national-security experts put the exploits of America’s special operation forces in historical and strategic context. David Tucker and Christopher J. Lamb offer an incisive overview of America’s turbulent experience with special operations. Starting with in-depth interviews with special operators, the authors illustrate the diversity of modern special operations forces and the strategic value of their unique attributes. Despite longstanding and growing public fascination with special operators, these forces and their contribution to national security are poorly understood. With this book, Tucker and Lamb dispel common misconceptions and offer a penetrating analysis of how these unique and valuable forces can be employed to even better effect in the future. The book builds toward a comprehensive assessment of the strategic utility of special operations forces, which it then considers in light of the demands of future warfare. This second edition of United States Special Operations Forces, revised throughout to account for lessons learned in the twelve years since its first publication, includes two new case studies, one on High Value Target Teams and another on Village Stability Operations, and two new appendixes charting the evolution of special operation missions and the best literature on all aspects of U.S. special operation forces.
"There are plenty of Special Operations Forces and plenty of elements that claim to be Special or Special Operations Forces, but there is only one organization that is Special Forces--the Green Berets ... Mark Boyatt's new book is an insider's guide to the U.S. military's Green Beret Special Forces--who they are, what they do, and what their role is in unconventional warfare ... The term 'special forces' is often misused by well-meaning but ill-informed people, including the news media, pundits, and even those in the military. The Army's Green Berets are the only Special Forces in the United States military and represent the most adaptable and specialized organization in the nation's arsenal. And their exploits hold a special fascination for the American public. Special Forces also defines 'unconventional warfare.' Boyatt makes the case that unconventional warfare is a U.S.-supported and conceivably inspired insurgency or revolution. It is total warfare for the indigenous population, who must use every means at their disposal to effect regime change, whether they are a tyrannical government or an occupying power. The Green Berets' adopted motto, 'De Oppresso Liber,' which is Latin for 'to free the oppressed,' is a call to duty special to this elite military force. While attending the Army War College, Colonel Boyatt authored a paper that originated and defined the term 'through, with and by,' which is now codified in military doctrine and is the subtitle of his book. It describes the manner in which Special Forces meet the military and political objectives of the United States, working 'through, with and by' other people, such as indigenous populations, rebels and revolutionaries, the oppressed and persecuted, displaced persons and refugees. Special Forces accomplishes this unique work by living with, training with, fighting alongside and even, at times, leading these groups"--Publisher's website.
Karoline Eickhoff provides an in-depth analysis of the role that national ownership as a key policy principle of international development and peacebuilding plays in shaping the discourses and practices of external interventions in the context of the peace process in Mali. Engaging critically with the day-to-day work experience and perceptions of practitioners working on supporting the reform of the Malian security sector in 2015-2016,the author explores how external actors ‘make sense’ of an abstract policy model vis-à-vis other organisational demands and constraints arising at the field level. This book concludes with policy recommendations on how the gap between ownership policy and external actors’ field-level practices can be addressed.
The war against ISIS is often explained through the group's own rise to power. The American side of the story has not yet been told. This book records how the United States and its allies chose to fight the group, what the consequences have been for transatlantic relations, and how these factors may shape future wars the West decides to pursue. The book is based on first-person interviews with U.S. and European policymakers, and members of the military in direct combat against ISIS - from U.S and allied forces on the ground to the Kurdish fighters who fought beside them. These interviews show precisely how the West fights wars through the eyes of the people most involved in them and includes key insights about civilian decision-making as it happened. In tracing the war as it developed, the book examines the West's approach to conflict and reveals new insights such as why both the U.S. military and the civilian bureaucracy underestimated Russian military capabilities. The war was always meant to be small and focused, but its repercussions have been considerable and far-reaching, including a serious rupture in Turkish-Western relations and Russia's return to the Middle East. Aaron Stein shows why mistakes were made in the war against ISIS and what happens when a narrow policy focus on counter terrorism is pursued at the expense of almost all wider regional security and political concerns. At a time when the U.S might be called again to stem the rise of a terror group or to fight against a collective threat, the lessons in this book are essential.
How should we analyze and assess new terrorist behaviors? What are the particular risks and challenges from new terrorism? Should we negotiate with terrorists, and, if so, how? When should we use force against terrorists? Countering New(est) Terrorism: Hostage-Taking, Kidnapping, and Active Violence—Assessing, Negotiating, and Assaulting improves our knowledge of new terrorist behaviors, and our skills in responding to such attacks. The term "new terrorism" has been in circulation since the late 90’s. This book analyzes the "newest terrorism" that has emerged in recent years—characterized by increased hostage-taking, kidnapping, and active violence—and develops best practices for countering these emerging threats. Along the way, it challenges fashionable wishful thinking that all terrorists are open to rational negotiation or de-radicalization, that military responses always reflect badly on the official side, and that terrorists are not constrained by their own doctrines. The new terrorists are dramatically more ideological, murderous, and suicidal. They are generally less reconcilable, less trusting of official negotiators, less likely to release detainees, and more likely to kill detainees. They are less likely to demand ransoms yet more likely to release hostages in cases in which they do demand ransom. They are more informed about the official side’s policies, tactics, techniques, and procedures. They are more likely to use new information and communication technologies against responding agencies and officials. They are more capable fighters—they kill more people despite deploying fewer fighters per hostage. Most disturbing is the fact that they take advantage of free-er societies to access easier targets. Features: Includes evidence-based definitions and descriptions of political, religious, Jihadi, and new terrorism Presents the first large-n comparison of old and new terrorism, using an original extension of the Global Terrorism Database (GTD), with added codes for each of 10,735 hostage crises and more than 500,000 data points from 1970 through 2016 Details a further extension of the GTD covering all terrorist events from 2004 through 2016, roughly 5 million data points. Offers prescriptive advice and visual decision trees on how to negotiate crises, assess the risk of terrorism, and how and when to assault terrorists Reviews official practices, interviews with experienced officials, and real-world simulations of recent terrorist events and attacks Countering New(est) Terrorism will be of interest to researchers, students enrolled in terrorism and Homeland Security programs, crisis negotiators, and police, security, intelligence, and military authorities tasked with counterterrorism and anti-terrorism efforts.