Insurgency

From Wikipedia, the free encyclopedia

Jump to: navigation, search

An insurgency is a violent internal uprising against a sovereign government that lacks the organization of a revolution. Its definition is similar to that of "resistance," but has different connotations. Usage of the term varies widely, and is highly subjective. For example, from the perspective of US leaders, the Viet Cong in the Vietnam War were insurgents.[1] But according to the majority of the population of South Vietnam, they were leaders of the nationalist resistance movement to US occupation.[2]

The following discussion illustrates how the definition becomes blurred under political influence.

The French expert on Indochina and Vietnam, Bernard Fall, entitled one of his major books Street without joy: insurgency in Indochina, 1946-63. [3] Fall himself, however, wrote later on that "revolutionary warfare" might be a more accurate term. [4] Insurgency has been used for years in professional military literature. Under the British, the situation in Malaya (now Malaysia) was often called the "Malayan insurgency". [5], or "the Troubles" in Northern Ireland. Insurgencies have existed in many countries and regions, including the Philippines, Afghanistan, Chechnya, Kashmir, Yemen, Djibouti, Colombia, Sri Lanka, and Democratic Republic of the Congo, the American colonies of Great Britain, and the Confederate States of America.[6] Each had different specifics but share the property of an attempt to disrupt the central government by means considered illegal by that government. North points out, however, that insurgents today need not be part of a highly organized movement:

"Some are networked with only loose objectives and mission-type orders to enhance their survival. Most are divided and factionalized by area, composition, or goals. Strike one against the current definition of insurgency. It is not relevant to the enemies we face today. Many of these enemies do not currently seek the overthrow of a constituted government...weak government control is useful and perhaps essential for many of these “enemies of the state” to survive and operate."[7]

The term Iraqi insurgency has been used to describe the guerilla resistance to the US-led coalition forces and the new Iraqi Government in Iraq[8]

A variety of terms, none precisely defined, all fall under the category of insurgency: rebellion, uprisings, etc. The value of the formal models discussed below is to have a taxonomy to categorize insurgencies. No two insurgencies are identical. The basis of the insurgency can be political, economic, religious, or ethnic, or a combination of factors. For example, "The Troubles" of Northern Ireland are most often described as Protestant versus Catholic, but there was significant economic disparity that contributed to the conflict. Fall [4] as well as the United States Marine Corps have used "small wars"; the Marine Small Wars Manual was a pre-World War II classic reference.[9] The Northern Irish situation has been called terrorism,[10] an ethnic conflict,[11] a guerrilla war,[12] a low intensity conflict, and sometimes a civil war. The term Irish Civil War is, however, more often used for the 1922-1923 conflict.

Iraq is not unique in having only a government and multiple sets of insurgents. Historic insurgencies, such as the Russian Civil War, have been multipolar rather than a straightforward model made up of two sides. While the Angolan Civil War had two main sides, MPLA and UNITA. FLEC, however, was a simultaneous separatist movement for the independence of the Cabinda region. Multipolarity extends the definition of insurgency to situations where there is no recognized authority, as in the Somali Civil War, especially the period, from 1998 to 2006, where it broke into quasi-autonomous smaller states, fighting among one another in changing alliances.

Contents

[edit] Working toward definition

Insurgency is most commonly used to describe a movement's unlawfulness by virtue of not being authorized by or in accordance with the law of the land. When used by a state or an authority under threat, "insurgency" implies an illegitimacy of cause upon those rising up, whereas those rising up will see the authority itself as being illegitimate. The term "insurgency" is still neutral. In cases of rebellions, the term insurgents refers to those who are not part of the decision-making entity that has the ability to make laws, but it is still an insurgency. In coups, the insurgents are largely or exclusively part of the existing government.

The Third Geneva Convention, as well as the other Geneva Conventions, are oriented to conflict involving nation-states, and only loosely address irregular forces:

"Members of other militias and members of other volunteer corps, including those of organized resistance movements, belonging to a Party to the conflict and operating in or outside their own territory, even if this territory is occupied, provided that such militias or volunteer corps, including such organized resistance movements..."[13]

Many factions began with what might have been considered a small violent act. For example, a seemingly small act, such as a group of rebels firing on Fort Sumter, starting the insurgency called the American Civil War.

The United States Department of Defense (DOD) defines it as "An organized movement aimed at the overthrow of a constituted government through use of subversion and armed conflict." [14] The new United States counterinsurgency Field Manual,[15] proposes a structure that includes both insurgency and counterinsurgency[COIN]. (italics in original)

Insurgency and its tactics are as old as warfare itself. Joint doctrine defines an insurgency as an organized movement aimed at the overthrow of a constituted government through the use of subversion and armed conflict.[14] These definitions are a good starting point, but they do not properly highlight a key paradox: though insurgency and COIN are two sides of a phenomenon that has been called revolutionary war or internal war, they are distinctly different types of operations. In addition, insurgency and COIN are included within a broad category of conflict known as irregular warfare.

This definition does not consider the morality of the conflict, or the different viewpoints of the government and the insurgents. It is focused more on the operational aspects of the types of actions taken by the insurgents and the counterinsurgents.

The Department of Defense’s (DOD) definition focuses on the type of violence employed (unlawful) towards specified ends (political, religious or ideological). This characterization fails to address the argument from moral relativity that “one man’s terrorist is another man’s freedom fighter.” In essence, this objection to a suitable definition submits that while violence may be “unlawful” in accordance with a victim’s statutes, the cause served by those committing the acts may represent a positive good in the eyes of neutral observers.

Michael F. Morris[16]

[edit] Tactics

Insurgencies differ in their use of tactics. Some elements of an insurgency may use bombs, kidnappings, hostage-taking, hijackings, shootings and other techniques to target the establishment's power structure and other facilities, often with little regard for civilian casualties or deliberately targetting civilians in a terrorist campain. Other elements may restrict their attacks to military objectives and avoid the targeting of civilians. Many times, insurgent groups conduct violent attacks but do not reveal the group's identity or leader.

As an example of a definition that does not cover all insurgencies, consider that of Robert R. Tomes, and then consider the French Revolution (e.g., no cell system), American Revolution (e.g., little to no attempt to terrorize civilians), or consecutive coups in 1977 and 1999 Pakistan (e.g., initial actions focused internally to the government rather than seeking broad support). Tomes spoke of four requisites:[17] in a 2004 article, identifies four elements that "typically encompass an insurgency":

  1. cell-networks that maintain secrecy
  2. terrorism used to foster insecurity among the population and drive them to the movement for protection
  3. multifaceted attempts to cultivate support in the general population, often by undermining the new regime
  4. attacks against the government

This definition fits well with Mao's Phase I [18], but does not deal well with larger civil wars. Mao does assume terrorism is usually part of the early phases, but it is not always present in revolutionary insurgency.

Tomes offers an indirect definition of insurgency, drawn from Trinquier's definition of counterinsurgency: "an interlocking system of actions—political, economic, psychological, military—that aims at the [insurgents’ intended] overthrow of the established authority in a country and its replacement by another regime" [19]

Metz [20] observes that past models of insurgency do not perfectly fit modern insurgency, in that current instances are far more likely to have a multinational or transnational character than those of the past. Several insurgencies may belong to more complex conflicts, involving "third forces (armed groups which affect the outcome, such as militias) and fourth forces (unarmed groups which affect the outcome, such as international media), who may be distinct from the core insurgents and the recognized government. While overt state sponsorship becomes less common, sponsorship by transnational groups is more common. "The nesting of insurgency within complex conflicts associated with state weakness or failure..." [see the discussion of failed states below] Metz suggests that contemporary insurgencies have far more complex and shifting participation than traditional wars, where discrete belligerents seek a clear strategic victory.

General dictionary definitions[21][22][23][24][25] are rarely adequate[original research?], as the reality is that there is no simple definition that will fit into the few paragraphs available in such references. Unfortunately, public statements by politicians and media, for a variety of reasons, tend to oversimplify conflicts to a point where major issues and tactics are lost.[citation needed]

[edit] Terrorism

Not all insurgencies include terrorism, with the caveat that there is no universally accepted definition of terrorism. While there is no accepted definition in international law, a United Nations-sponsored working definitions include one drafted by Alex P. Schmid for the Policy Working Group on the United Nations and Terrorism. Reporting to the Secretary-General in 2002, the Working Group stated the following:

Without attempting a comprehensive definition of terrorism, it would be useful to delineate some broad characteristics of the phenomenon. Terrorism is, in most cases, essentially a political act. It is meant to inflict dramatic and deadly injury on civilians and to create an atmosphere of fear, generally for a political or ideological (whether secular or religious) purpose. Terrorism is a criminal act, but it is more than mere criminality. To overcome the problem of terrorism it is necessary to understand its political nature as well as its basic criminality and psychology. The United Nations needs to address both sides of this equation.”[26]

Yet another conflict of definitions involves insurgency versus terrorism. The winning essay of the 24th Annual United States Chairman of the Joint Chiefs of Staff Strategic Essay Contest, by Michael F. Morris, said [A pure terrorist group] "may pursue political, even revolutionary, goals, but their violence replaces rather than complements a political program."[16] Morris made the point that the use, or non-use, of terrorism does not define insurgency, "but that organizational traits have traditionally provided another means to tell the two apart. Insurgencies normally field fighting forces orders of magnitude larger than those of terrorist organizations." Insurgencies have a political purpose, and may provide social services and have an overt, even legal, political wing. Their covert wing carries out attacks on military forces with tactics such as raids and ambushes, as well as acts of terror such as attacks that cause deliberate civilian casualties.

Mao considered terrorism a basic part of his first part of the three phases of revolutionary warfare.[18] Several insurgency models recognize that completed acts of terrorism widen the security gap; the Marxist guerrilla theoretician Carlos Marighella specifically recommended acts of terror, as a means of accomplishing something that fits the concept of opening the security gap.[27] Mao considered terrorism to be part of forming a guerilla movement.

[edit] Subversion

While not every insurgency involves terror, most involve an equally hard to define tactic, subversion. "When a country is being subverted it is not being outfought; it is being out-administered. Subversion is literally administration with a minus sign in front." [4] The exceptional cases of insurgency without subversion are those when there is no accepted government that is providing administrative services.

While it is less commonly used by current U.S. spokesmen, that may be due to the hyperbolic way it was used in the past, in a specifically anticommunist context. U.S. Secretary of State Dean Rusk did in April 1962, when he declared that urgent action was required before the “enemy’s subversive politico-military teams find fertile spawning grounds for their fish eggs.” [28]

In a Western context, Rosenau cites a British Secret Intelligence Service definition as "a generalized intention to (emphasis added) “overthrow or undermine parliamentary democracy by political, industrial or violent means.” While insurgents do not necessarily use terror, it is hard to imagine any insurgency meeting its goals without undermining aspects of the legitimacy or power of the government or faction it opposes. Rosenau mentions a more recent definition that suggests subversion includes measures short of violence, which still serve the purposes of insurgents.[28] Rarely, subversion alone can change a government; this arguably happened in the liberalization of Eastern Europe.[citation needed] To the Communist government of Poland, Solidarity appeared subversive but not violent.[citation needed]

[edit] Overt and covert wings

An insurgency often splits its programs into a covert armed faction and an overt "front group", denying connections between them.[28] One example would be the appropriate incarnation of the Irish Republican Army coupled with the overt political party, Sinn Fein. See the Green Book for the training manual for new IRA recruits. Groups such as Hezbollah and Hamas provide overt social services as well as having armed wings, the latter sometimes with a different name. The Vietnamese National Liberation Front,[29] the FMLN in El Salvador, and the Tamil Eelam separatists in Sri Lanka all use a dual political/social and armed approach.

[edit] Coups

A coup is a special case of subversion, in which the group in opposition to the established government may be partially or exclusively a faction within that government. [30] It is not at all uncommon to have a coup, by members of the government, while that government is simultaneously fighting an insurgency against a group outside the government. For example, the 1963 South Vietnamese coup against President Ngo Dinh Diem came principally from military officers displeased less with the government's fight with the National Liberation Front and more with repression of the nation's Buddhist majority (see Buddhist Crisis).

[edit] Civil War

There is no single accepted definition of "civil war", but it is a manifestation of insurgency, widely considered to meet two definitions:[31]

  • The major warring groups must be from the same country and fighting for control of the political center, control over a separatist state or to force a major change in policy. There may be volunteers from other countries under the command of one or more of the warring groups.
  • The second says that at least 1,000 people must have been killed in total, with at least 100 from each side.

The Third Geneva Convention speaks of the "armed conflict not of an international character",[13] interpreted by the International Committee of the Red Cross to include civil wars. Among those conditions listed are these four basic requirements.

  • The party in revolt must be in possession of a part of the national territory.
  • The insurgent civil authority must exercise de facto authority over the population within the determinate portion of the national territory.
  • The insurgents must have some amount of recognition as a belligerent.
  • The legal Government is “obliged to have recourse to the regular military forces against insurgents organized as military.”

[edit] Potential for insurgency and historical examples

Two broad categories of country are likely candidates for insurgency. The obvious category is of weak and failed states, but there are also needs in generally strong states that face specific problems. A special case is that of resistance movements in occupied areas, even when there a new government has formed and has international recognition.

As regards the United States, the 4th and 5th chapters of Robert Struble, Jr.’s Treatise on Twelve Lights,, 2007-08 ed., distinguish between an agenda for an Article V Constitutional Convention (“Insurrection of Suede”, chapter 4),[32], and his plan B, (“Recourse to the Sword,” chapter 5), wherein insurgents might turn, as a last resort, to armed insurrection.[33] With either means, violent or not, the aim is radically to alter (or restore) the Constitution of a strong state.

There is much media and political focus on transnational terrorism, but insurgency can be national, or at least separatist within one nation and not involve terror. There is also a widespread and incorrect assumption, based on equating terror and insurgency, that insurgency is usually Islamic. Such an assumption can easily be challenged by examples, of which those marked with an asterisk clearly fall into more than one category, and the categories themselves are arbitrary. If a categorization seems incorrect, that reflects the difficulty in analyzing movements.

Religion and region codes in table below
Abbreviation Religion Abbreviation Region
C Christian PK Pakistan
Cc Christian Catholic BQ Basque
Cp Christian Protestant PL Palestine
H Hindu Ka Kashmir
J Jewish IN India
M Muslim IL Israel
- - JP Japan
- - PI Philippines
Examples of motivations of insurgencies (see table of religions and regions above)
Anticolonialist Resistance to occupation Nationalist or separatist Civil war Marxist Religious and/or Racist
American colonists American colonists Confederate States of America Confederate States of America Weather Underground Ku Klux Klan
Irish nationalists prior to 1922 Armia Krajowa Polish Home Army Irish nationalists prior to 1922 Spanish Loyalists 26th of July Movement (Cuba) al-Qaeda
Viet Minh* French Resistance[ Liberation Tigers of Tamil Eelam Viet Minh* Viet Minh* Hezbollah
Provisional IRA, Real IRA, Official IRA Provisional IRA, Real IRA, Official IRA Free Thai Movement Anbar Salvation Council (IN) National Liberation Army (Bolivia)(ELN) Lord's Resistance Army (C)(UG,SD)
National Liberation Front/Viet Cong* Yugoslav Partisans Sudan People's Liberation Army National Liberation Front/Viet Cong* National Liberation Front/Viet Cong* Jaish-e-Mohammed (M)(PK/KS)
Mau Mau (Kenya) Baathists (Iraq) Baathists (Iraq) National Liberation Front pro-Patrice Lumumba Simba (DRC) al-Qaeda in Iraq, Islamic State of Iraq
Boxer Rebellion Badr Organization Badr Organization Badr Organization Khmer Rouge Gush Emunim Underground(J)(IL)
Boers Hukbalahap (WWII) Chechen Republic of Ichkeria, Caucasian Emirate African National Congress Hukbalahap (post-WWII)* Armed Islamic Group (Algeria)
Abu Sayyaf (Philippines) Norwegian Resistance (WWII) Front de Liberation Quebecois Irish Republican Army 1922-1927 Red Brigades Abu Sayyaf (Philippines)
Shining Path (Peru) July 20 plot (Germany) Mahdi Army (SD) Spanish Nationalists Indian Communist Party Mahdi Army (SD)
FRELIMO (Angolan) Chinese Communist Party* Caprivi Liberation Army Chinese Communist Party* Chinese Communist Party* Lashkar-e-Toiba (M) (Pak/Kash)
National Liberation Front (Algeria)(FLN) Holger Danske (Denmark) Bolsheviks* (Russia) Bolsheviks* (Russia) Bolsheviks* (Russia) Army of God (C) (US)
EOKA (Greek Cypriot) Soviet Partisans Túpac Amaru Revolutionary Movement (MRTA) (Peru)* Chetniks Túpac Amaru Revolutionary Movement (MRTA) (Peru)* Hizbul Mujahideen (M)(PK/Ka)
Euskadi Ta Askatasuna (ETA) (BQ) Czech Resistance movement Republic of Biafra Satsuma domain (JP) Malayan National Liberation Army* Harkat-ul-Mujahideen
Hungarian Revolution of 1956* Hamas (Palestine) Hungarian Revolution of 1956* Albigensians Red Army Faction Orthodox Serbs (C)
Party for a Free Life in Kurdistan Mahdi Army(Iraq) (M) Moro Islamic Liberation Front (PI) Mahdi Army(Iraq)(M) Japanese Red Army Moro Islamic Liberation Front (PI)
Euskadi Ta Askatasuna (ETA) (BQ) Czech Resistance movement Malayan National Liberation Army* Greek People's Liberation Army (ELAS)* Malayan National Liberation Army* Babbar Khalsa(S)(IN)

In the U.S., there tends to be an incorrect assumption that insurgencies are Islamic[citation needed]. A general point here is not only that they are not always Islamic, but not always religious. It is well to expand on Cordesman/s point that

[the US] must show that the US focus on counterterrorism is not anti-Islamic and anti-Arab, and does not put counterterrorism before the same values in the rule of law and human rights that the US seeks to encourage throughout the world. The US should build on its very real successes in quiet bilateral cooperation in counterterrorism, and publicly recognize regional successes as well as point out occasional delays and failures. It must also recognize that every country in the region has a different set of threat perceptions than the US, defines terrorism and terrorist in different ways. Cooperation means partnership, not imposing a US view or issuing threats, sanctions, and demands.[34]

[edit] Political rhetoric, myths and models

In arguing against the term Global War on Terror, Fukuyama went on to point out that the United States was not fighting terrorism generically, as in Chechnya or Palestine. He said the slogan "war on terror" is directed at "radical Islamism, a movement that makes use of culture for political objectives." He suggested it might be deeper than the ideological conflict of the Cold War, but it should not be confused with Huntington's "clash of civilizations". Addressing Huntington's thesis,[35] Fukuyama stressed that the United States and its allies need to focus on specific radical groups, rather than clash with global Islam.

Fukuyama argued that political means, rather than direct military measures, are the most effective ways to defeat that insurgency. [36] David Kilcullen wrote "We must distinguish Al Qa’eda and the broader militant movements it symbolises – entities that use terrorism – from the tactic of terrorism itself."[37]

There may be utility in examining a war not specifically on the tactic of terror, but in coordination among multiple national or regional insurgencies. It may be politically infeasible to refer to a conflict as an "insurgency" rather than by some more charged term, but military analysts, when concepts associated with insurgency fit, should not ignore those ideas in their planning. Additionally, the recommendations can be applied to the strategic campaign, even if it is politically unfeasible to use precise terminology[38]

While it may be reasonable to consider transnational insurgency, Cordesman points out some of the myths in trying to have a worldwide view of terror:[34]

  • Cooperation can be based on trust and common values: One man’s terrorist is another man’s terrorist.
  • A definition of terrorism exists that can be accepted by all.
  • Intelligence can be freely shared.
  • Other states can be counted on to keep information secure, and use it to mutual advantage.
  • International institutions are secure and trustworthy.
  • Internal instability and security issues do not require compartmentation and secrecy at national level.
  • The “war on terrorism” creates common priorities and needs for action.
  • Global and regional cooperation is the natural basis for international action.
  • Legal systems are compatible enough for cooperation.
  • Human rights and rule of law differences do not limit cooperation.
  • Most needs are identical.
  • Cooperation can be separated from financial needs and resources

Social scientists, soldiers, and sources of change have been modeling insurgency for nearly a century, if one starts with Mao.[18] Counterinsurgency models, not mutually exclusive from one another, come from Kilcullen, McCormick, Barnett and Eizenstat. Kilcullen describes the "pillars" of a stable society, while Eizenstat addresses the "gaps" that form cracks in societal stability. McCormick's model shows the interplay among the actors: insurgents, government, population and external organizations. Barnett discusses the relationship of the country with the outside world, and Cordesman focuses on the specifics of providing security.

[edit] Kilcullen's Pillars

Kilcullen Figure 1: Ecosystem of Insurgency
Kilcullen Figure 1: Ecosystem of Insurgency[39]

Kilcullen gives a useful visual overview[39] of the actors in the models, which generally agrees with a model represents home as a box defined by geographic, ethnic, economic, social, cultural, and religious characteristics. Inside the box are governments, counterinsurgent forces, insurgent leaders, insurgent forces, and the general population, which is made up of three groups:

  1. those committed to the insurgents
  2. those committed to the counterinsurgents
  3. those who simply wish to get on with their lives.

Often, but not always, states or groups that aid one side or the other are outside the box. Outside-the-box intervention has dynamics of its own.[40]

The three pillar model repeats later as part of the gaps to be closed to end an insurgency.

Kilcullen's Three Pillars
Kilcullen's Three Pillars

"Obviously enough, you cannot command what you do not control. Therefore, unity of command (between agencies or among government and non-government actors) means little in this environment." Unity of command is one of the axioms of military doctrine[41] that change with the use of swarming:[42]. In Edwards' swarming model, as in Kilcullen's mode, unity of command becomes "unity of effort at best, and collaboration or deconfliction at least.[39].

As in swarming, Kilcullen "depends less on a shared command and control hierarchy, and more on a shared diagnosis of the problem (i.e., the distributed knowledge of swarms), platforms for collaboration, information sharing and deconfliction. Each player must understand the others’ strengths, weaknesses, capabilities and objectives, and inter-agency teams must be structured for versatility (the ability to perform a wide variety of tasks) and agility (the ability to transition rapidly and smoothly between tasks)."

[edit] Eizenstat and closing gaps

Insurgencies, according to Eizenstat et al. grow out of "gaps".[43] To be viable, a state must be able to close three "gaps", of which the first is most important:

  • security: protection "against internal and external threats, and preserving sovereignty over territory. If a government cannot ensure security, rebellious armed groups or criminal nonstate actors may use violence to exploit this security gap—as in Haiti, Nepal, and Somalia."
  • capacity: The most basic are the survival needs of water, electrical power, food and public health, closely followed by education, communications and a working economic system.[44] "An inability to do so creates a capacity gap, which can lead to a loss of public confidence and then perhaps political upheaval. In most environments, a capacity gap coexists with—or even grows out of—a security gap. In Afghanistan and the Democratic Republic of the Congo, for example, segments of the population are cut off from their governments because of endemic insecurity. And in postconflict Iraq, critical capacity gaps exist despite the country’s relative wealth and strategic importance."
  • legitimacy: closing the legitimacy gap is more than an incantation of "democracy" and "elections", but a government that is perceived to exist by the consent of the governed, has minimal corruption, and has a working law enforcement and judicial system that enforce human rights.

Note the similarity between Eizenstat's gaps and Kilcullen's three pillars.[39] In the table below, do not assume that a problematic state is not able, while closing its own gaps, is unable to assist other less developed states

Rough Classification of States
State type Needs Representative examples
Militarily strong but weak in other institutions Lower tensions before working on gaps Cuba, North Korea
Good performers Continuing development of working institutions. Focused private investment El Salvador, Ghana, Mongolia, Senegal, Nicaragua, Uganda
Weak states Close one or two gaps Afghanistan, Egypt, Indonesia, Iraq, Ivory Coast, Kazakhstan, Kyrgyzstan, Myanmar, Pakistan, Republic of the Congo, Sudan, Syria, Tajikistan, Uzbekistan, Zimbabwe
Failed states Close all gaps Angola, the Democratic Republic of the Congo, Haiti, Liberia, Palestine, Somalia

[edit] McCormick Magic Diamond

McCormick’s model[45] is designed as a tool for counterinsurgency (COIN), but develops a symmetrical view of the required actions for both the Insurgent and COIN forces to achieve success. In this way the counterinsurgency model can demonstrate how both the insurgent and COIN forces succeed or fail. The model’s strategies and principle apply to both forces, therefore the degree the forces follow the model should have a direct correlation to the success or failure of either the Insurgent or COIN force.

McCormick insurgency model
McCormick insurgency model

The model depicts four key elements or players:

  1. Insurgent Force
  2. Counterinsurgency force (i.e., the government)
  3. Population
  4. International community.

All of these interact, and the different elements have to assess their best options in a set of actions:

  1. Gaining Support of the Population
  2. Disrupt Opponent’s Control Over the Population
  3. Direct Action Against Opponent
  4. Disrupt Opponent’s Relations with the International Community
  5. Establish Relationships with the International Community

[edit] Barnett and connecting to the core

In Thomas Barnett's paradigm,[46] the world is divided into a "connected core" of nations enjoying a high level of communications among their organizations and individuals, and those nations that are disconnected internally and externally. In a reasonably peaceful situation, he describes a "system administrator" force, often multinational, which does what some call "nation-building", but, most importantly, connects the nation to the core and empowers the natives to communicate -- that communication can be likened to swarm coordination. If the state is occupied, or in civil war, another paradigm comes into play: the leviathan, a first-world military force that takes down the opposition regular forces. Leviathan is not constituted to fight local insurgencies, but major forces. Leviathan may use extensive swarming at the tactical level, but its dispatch is a strategic decision that may be made unilaterally, or by an established group of the core such as NATO or ASEAN.

[edit] Cordesman and Security

Other than brief "Leviathan" takedowns, security building appears to need to be regional, with logistical and other technical support from more developed countries and alliances (e.g., ASEAN, NATO). Noncombat military assistance in closing the security gap begins with training, sometimes in specialized areas such as intelligence. More direct, but still noncombat support, includes intelligence, planning, logistics and communications.

Anthony Cordesman notes that security requirements differ by region and state in region. Writing on the Middle East, he identified different security needs for specific areas, as well as the US interest in security in those areas.[34]

  • In North Africa, the US focus should be on security cooperation in achieving regional stability and in counterterrorism.
  • In the Levant, the US must largely compartment security cooperation with Israel and cooperation with friendly Arab states like Egypt, Jordan, and Lebanon, but can improve security cooperation with all these states.
  • In the Gulf, the US must deal with the strategic importance of a region whose petroleum and growing gas exports fuel key elements of the global economy.

It is well to understand that counterterrorism, as used by Cordesman, does not mean using terrorism against the terrorism, but an entire spectrum of activities, nonviolent and violent, to disrupt an opposing terrorist organization. The French general, Joseph Gallieni, observed, while a colonial administrator in 1898,

A country is not conquered and pacified when a military operation has decimated its inhabitants and made all heads bow in terror; the ferments of revolt will germinate in the mass and the rancours accumulated by the brutal action of force will make them grow again[47]

Both Kilcullen and Eizenstat define a more abstract goal than does Cordesman. Kilcullen's security pillar is roughly equivalent to Eizenstat's security gap:

  • Military security (securing the population from attack or intimidation by guerrillas, bandits, terrorists or other armed groups)
  • Police security (community policing, police intelligence or “Special Branch” activities, and paramilitary police field forces).
  • Human security, building a framework of human rights, civil institutions and individual protections, public safety (fire, ambulance, sanitation, civil defense) and population security.

"This pillar most engages military commanders’ attention, but of course military means are applied across the model, not just in the security domain, while civilian activity is critically important in the security pillar also ... all three pillars must develop in parallel and stay in balance, while being firmly based in an effective information campaign."[39]

Anthony Cordesman, while speaking of the specific situation in Iraq, makes some points that can be generalized to other nations in turmoil.[48] Cordesman recognizes some value in the groupings in Samuel Huntington's idea of the clash of civilizations,[35] but, rather assuming the civilizations must clash, these civilizations simply can be recognized as actors in a multinational world. In the case of Iraq, Cordesman observes that the burden is on the Islamic civilization, not unilaterally the West, if for no other reason that the civilization to which the problematic nation belongs will have cultural and linguistic context that Western civilization cannot hope to equal.

The heart of strengthening weak nations must come from within, and that heart will fail if they deny that the real issue is the future of their civilization, if they tolerate religious, cultural or separatist violence and terrorism when it strikes at unpopular targets, or if they continue to try to export the blame for their own failures to other nations, religions, and cultures.

[edit] National Problems and Transnational Spillover

See also: Foreign internal defense#National Problems and Transnational Spillover

Developed and stable countries have their own reasons for helping weak states deal with insurgency, because insurgencies can have direct (e.g., terrorism, epidemic disease) or indirect (e.g., drug trade, economic instability in resources) effects on them. While ideological or religious terrorism is most frequently mentioned, it is, by no means, the only multinational problem that FID addresses, starting at the national level. When one of these problems is present in a state, it is likely to cause transnational "spillover effects".[49] Problems include:

  • Blood diamonds
  • Piracy
  • Disease
  • Illicit drugs
  • Terrorism
  • Ethnic cleansing
  • Economic instability

Not only HN, but regional conflicts threaten to widen gaps. "Pretending that the conflicts in Afghanistan, Chechnya, Darfur, Iraq, Palestine and Sri Lanka are the problems of others or are going to solve themselves is not a solution. It should be noted that some states, especially in the ASEAN group, can be quite strong, but still have difficulties with piracy, terrorism, and drug traffic. There are a number of intelligence-sharing arrangements among countries in this area and the US FID assistance needs can involve economically strong countries in other regions. "Nigeria is among the top ten exporters of crude oil to the United States. ...when rebel leaders in the oil-rich Niger delta vowed to launch an “all-out war on the Nigerian state,” instability helped propel global oil prices to more than $50 per barrel.[43]

[edit] Blood diamonds

Main article: Blood diamond

These effects are not limited to terrorism, but include displaced population, often bearing disease. Transnational criminal networks may use weak nations as sanctuaries for high-value, low-volume commodities such as diamonds[50]

[edit] Illicit drug trade

Drugs also are high-value and low-volume. The United Nations Office on Drugs and Crime (UNODOC) observes

Drug cultivation thrives on instability, corruption and poor governance. The world's biggest drug producing centres are in regions beyond the control of the central government, like South Afghanistan, South-West Colombia and East Myanmar. Until government control, democracy and the rule of law are restored, these regions will remain nests of insurgency and drug production - and represent the biggest challenge to containment.[51]

When a country's legitimate government is weak compared to its drug trade infrastructure, part of FID may be defeating that infrastructure, or, minimally, reducing its ability to corrupt or destroy government institutions.[52].

[edit] Piracy

Piracy is very real in the international waters of weak and failed states, such as Somalia.[53] When pirates are active, providing FID supplies by water is impractical unless the transport vessels are armed, or travel in convoy.

Piracy also may feed into security violations at ports, and as a means by which terrorists transport personnel and materials.[54] An Organization for Economic Cooperation and Development (OECD) study on the ownership and control of ships reports that anonymous ownership is more the rule than the exception.[55]. There are reports that 15 cargo ships are linked to al-Qaeda.[56] The reputed strongholds in Pakistan hardly will be bases for ships, and weak and failed states become the logical ports.

[edit] Disease

Bad health is a very real problem, especially from domestic conflict that displaces refugees across borders. HIV is the most obvious, especially in Africa, but it is not the only major concern.[57]

Military health specialists, as distinct from special operations forces, can have an enormous impact. Training and equipping health and education facilities are key FID capabilities.

[edit] Terrorism

Organized transnational terrorists can flourish in weak states. A globally-oriented group using terrorist methods can coexist with a local insurgency, or perhaps in the country that offers sanctuary to a border-crossing insurgency in a neighboring state. Developed country terrorism programs can benefit from FID in weak states, by strengthening those states, with due regard to human rights and the rule of law. FID can complement the global war on terrorism by reducing these contributing factors. The defensive measures of anti-terrorism (AT) and offensive counterterrorism efforts can be part of the FID program developed for a HN.

In many cases, measures increasing the capacity of a state to fight terrorism also will strengthen its overall IDAD program. These measures can include the following:

(a) Developing the ability of the HN to track illicit financial transactions, break funding streams for criminal and insurgent groups, and prosecute their members. This may involve greater USHN cooperation in developing regulated financial institutions. See financial intelligence (FININT)
(b) Ensuring that HN security personnel have access to appropriate equipment and training to conduct all phases of combating terrorism operations.
(c) Training personnel at entry and exit points (including airports, seaports, and border crossings) to identify and apprehend individuals and materials being used by international terrorist groups.[54]
(d) Assisting HN security and intelligence agencies to be included into international networks that can share information on terrorist activities.
(e) Developing effective judicial systems, and minimizing corruption and intimidation of HN officials.[58]

[edit] Ethnic cleansing

FID specialists in Information Operations can help reduce the intensity of ethnic struggle. They have a range of techniques, from presenting things advantageous to all sides, to shutting down inflammatory propaganda outlets.

[edit] Counterinsurgency

See the articles on counter-insurgency, or, for U.S. doctrine and historical French and British methods, see foreign internal defense. Before one counters an insurgency, however, one must understand what one is countering. Typically the most successful counterinsurgencies have been the British in the Malay Emergency[59] and the Filipino government's countering of the Huk Rebellion.

[edit] National doctrines

[edit] See also

[edit] References

  1. ^ [Pentagon Papers]http://www.mtholyoke.edu/acad/intrel/pentagon/pent11.htm
  2. ^ [American Power and the New Mandarins]
  3. ^ Fall, Bernard B. (1964), Street without joy: insurgency in Indochina, 1946-63 (3rd ed.), Literature House (China) 
  4. ^ a b c Fall, Bernard B. (April 1965 Issue), "The Theory and Practice of Insurgency and Counterinsurgency", U.S. Naval War College Review, <http://www.au.af.mil/au/awc/awcgate/navy/art5-w98.htm> 
  5. ^ Grau, Lester W. (May-June, 2004), "Counterinsurgency Lessons from Malaya and Vietnam: Learning to Eat Soup with a Knife", Military Review, <http://findarticles.com/p/articles/mi_m0PBZ/is_2004_May-June/ai_n6123976> 
  6. ^ Anderson, Edward G., Jr. (August 2007), "A Proof-of-Concept Model for Evaluating Insurgency Management Policies Using the System Dynamics Methodology", Strategic Insights VI(5), <http://www.ccc.nps.navy.mil/si/2007/Aug/andersonAug07.asp> 
  7. ^ North, Chris (January-February 2008), "Redefining Insurgency", Military Review (U.S. Army Combined Arms Center), <http://usacac.army.mil/CAC/milreview/English/JanFeb08/NorthINSIGHTSJanFeb08.pdf> 
  8. ^ Alexander, Christopher; Kyle, Charles & McCallister, William (November 14, 2003), The Iraqi Insurgent Movement, Commonwealth Institute, <http://www.comw.org/warreport/fulltext/03alexander.pdf> 
  9. ^ United States Marine Corps (1940), Small Wars Manual, <http://www.smallwars.quantico.usmc.mil/sw_manual.asp> 
  10. ^ Northern Ireland, MI5, <http://www.mi5.gov.uk/output/Page24.html>. Retrieved on 2 October 2007 
  11. ^ Coakley, John. "Ethnic Conflict and the Two-state Solution: The Irish Experience of Partition". Retrieved on 2007-10-02.
  12. ^ Knickerbocker, Brad (2004-09-20). "Classic Guerrilla war forming in Iraq". Christian Science Monitor. Retrieved on 2007-10-02.
  13. ^ a b "Commentary on Article 3", Convention (III) relative to the Treatment of Prisoners of War (Third Geneva Convention), 12 August 1949, <http://www.icrc.org/ihl.nsf/FULL/375?OpenDocument> 
  14. ^ a b US Department of Defense (12 July 2007), Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms, JP 1-02, <http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf>. Retrieved on 21 November 2007 
  15. ^ Nagl, John A.; Petraeus, David H.; Amos, James F. & Sewall, Sarah (December 2006), Field Manual 3-24 Counterinsurgency, US Department of the Army, <http://www.fas.org/irp/doddir/army/fm3-24.pdf>. Retrieved on 3 February 2008 
  16. ^ a b Morris, Michael F. (2005), Al Qaeda as Insurgency, United States Army War College, <http://www.strategicstudiesinstitute.army.mil/pdffiles/ksil234.pdf> 
  17. ^ Tomes, Robert R. (2004), "Relearning Counterinsurgency Warfare", Parameters (United States Army War College), <http://www.carlisle.army.mil/USAWC/PARAMETERS/04spring/tomes.pdf> 
  18. ^ a b c Mao Tse-tung (1967), On Protracted War, Foreign Languages Press, <http://www.marx2mao.com/Mao/PW38.html> 
  19. ^ Trinquier, Roger (1961), Modern Warfare: A French View of Counterinsurgency, Editions de la Table Ronde, <http://www-cgsc.army.mil/carl/resources/csi/trinquier/trinquier.asp> 
  20. ^ Metz, Steven (5 June 2007), Rethinking Insurgency, Strategic Studies Institute, U.S. Army War College, <http://www.strategicstudiesinstitute.army.mil/Pubs/display.cfm?pubID=790> 
  21. ^ Merriam-Webster's Online Dictionary [1]
  22. ^ Ask Oxford [2]
  23. ^ Dictionary.com [3]
  24. ^ Cambridge Advanced Learner's Dictionary [4]
  25. ^ One Look Dictionary Search [5]
  26. ^ Secretary General's Policy Working Group on the United Nations and Terrorism (December 2004), "Preface", Focus on Crime and Society 4, (A/57/273-S/2002/875, annex), <http://www.unodc.org/documents/data-and-analysis/Forum/V05-81059_EBOOK.pdf> 
  27. ^ Marighella, Carlos (1969), Minimanual of the Urban Guerrilla, <http://www.marxists.org/archive/marighella-carlos/1969/06/minimanual-urban-guerrilla/index.htm> 
  28. ^ a b c Rosenau, William (2007), Subversion and Insurgency, RAND National Defense Research Institute 
  29. ^ Pike, Douglas (1968), Viet Cong: The Organization and Technique of the National Liberation Front of South Vietnam, MIT Press 
  30. ^ Luttwak, Edward (1968), Coup d'etat: a practical handbook, Harvard University Press 
  31. ^ Wong, Edward (November 26, 2006), "A Matter of Definition: What Makes a Civil War, and Who Declares It So?", New York Times, <http://www.nytimes.com/2006/11/26/world/middleeast/26war.html?pagewanted=print> 
  32. ^ Robert Struble, Jr., Treatise on Twelve Lights, 2007-08 ed., chapter four, "Insurrection of Suede."
  33. ^ Struble, ibid., chapter 5, "Recourse to the Sword."
  34. ^ a b c Cordesman, Anthony H. (29 October 2007), Security Cooperation in the Middle East, Center for Strategic and International Studies, <http://www.csis.org/component/option,com_csis_pubs/task,view/id,4139/type,1/> 
  35. ^ a b Huntington, Samuel P. (1996). The Clash of Civilizations and the Remaking of World Order. Simon & Schuster. 
  36. ^ Fukuyama, Francis (May 2003), "Panel III: Integrating the War on Terrorism with Broader U.S. Foreign Policy", Phase III in the War on Terrorism: Challenges and Opportunities, Brookings Institution, <http://www.brook.edu/comm/events/summary20030514.pdf> 
  37. ^ Kilcullen, David (2004), Countering Global Insurgency: A Strategy for the War on Terrorism, <http://www.smallwars.quantico.usmc.mil/search/articles/counteringglobalinsurgency.pdf> 
  38. ^ Canonico, Peter J. (December 2004). "An Alternate Military Strategy for the War on Terrorism". U.S. Naval Postgraduate School.
  39. ^ a b c d e Kilcullen, David (28 September 2006). "Three Pillars of Counterinsurgency".
  40. ^ Lynn, John A. (July-August 2005), "Patterns of Insurgency and Counterinsurgency", Military Review, <http://usacac.army.mil/CAC/milreview/download/English/JulAug05/lynn.pdf> 
  41. ^ (14 June 2001) Field Manual 3-0: Operations (PDF), Washington, D.C.: Department of the Army. 
  42. ^ Edwards, Sean J.A. (September 2004). Swarming and the Future of War, PhD thesis. Pardee RAND Graduate School. 
  43. ^ a b Eizenstat, Stuart E. (January/February 2005), "Rebuilding Weak States", Foreign Affairs (1), <http://www.cgdev.org/doc/commentary/15_Eizenstat.pdf> 
  44. ^ Sagraves, Robert D (April 2005), The Indirect Approach: the role of Aviation Foreign Internal Defense in Combating Terrorism in Weak and Failing States, Air Command and Staff College, <https://research.maxwell.af.mil/papers/ay2005/acsc/3569%20-%20Sagraves.pdf> 
  45. ^ McCormick, Gordon. "The Shining Path and Peruvian terrorism". RAND Corporation. Document Number: P-7297
  46. ^ Barnett, Thomas P.M. (2005). The Pentagon's New Map: The Pentagon's New Map: War and Peace in the Twenty-first Century. Berkley Trade. Barnett-2005. 
  47. ^ McClintock, Michael (November 2005). "Great Power Counterinsurgency". Human Rights First.
  48. ^ Cordesman, Anthony H. (August 1, 2006). "The Importance of Building Local Capabilities: Lessons from the Counterinsurgency in Iraq". Center for Strategic and International Studies.
  49. ^ Weinstein, Jeremy M; John Edward Porter and Stuart E. Eizenstat (06/08/2004). "On the Brink, Weak States and US National Security". Center for Global Development.
  50. ^ "Conflict Diamonds". United Nations Department of Public Information (March 21, 2001).
  51. ^ United Nations Office of Drugs and Crime, World Drug Report 2007, <http://www.unodc.org/unodc/en/data-and-analysis/WDR-2007.html> 
  52. ^ Comodeca, Thomas J. (07-04-2003), The Need for Special Operations Forces in the Andean Region's Counter Drug Efforts, U.S. Army War College, <http://stinet.dtic.mil/cgi-bin/GetTRDoc?AD=ADA415480&Location=U2&doc=GetTRDoc.pdf>. Retrieved on 15 December 2007 
  53. ^ Winter, Peter J. (15 March 2006), The Role of the U.S. Navy in Support of the National Strategy for Marine Security, U.S. Army War College, <http://www.strategicstudiesinstitute.army.mil/pdffiles/ksil546.pdf> 
  54. ^ a b Frittelli, John F. (May 27, 2005). "Port and Maritime Security: Background and Issues for Congress". Congressional Research Service.
  55. ^ OECD Maritime Transport Committee (March 2003). "Ownership and Control of Ships". Organization for Economic Cooperation and Development.
  56. ^ Robinson, Colin (August 20, 2003). "Al Qaeda's 'Navy' - How Much of a Threat?". Center for Defense Information.
  57. ^ National Intelligence Estimate 99-17D: The Global Infectious Disease Threat and Its Implications for the United States, January 2000, <http://www.fas.org/irp/threat/nie99-17d.htm> 
  58. ^ Afghanistan: Judicial Reform and Transitional Justice, ICG Asia Report N°45, International Crisis Group, 28 January 2003, <http://unpan1.un.org/intradoc/groups/public/documents/APCITY/UNPAN016653.pdf> 
  59. ^ [Thomas Willis, "Lessons from the past: successful British counterinsurgency operations in Malaya 1948-1960", July-August 2005, Infantry Magazine]
Personal tools