Analytic Support to Intelligence in Counterinsurgencies


Book Description

Operations in Iraq and Afghanistan have shown that U.S. forces need more-effective techniques and procedures to conduct counterinsurgency. They will most likely face similar, irregular warfare tactics from future enemies. This monograph examines the nature of the contemporary insurgent threat and provides insights on using operational analysis techniques to support intelligence operations in counterinsurgencies.




Assessing Irregular Warfare


Book Description

Provides an analytic framework and procedure for the intelligence analysis of irregular warfare (IW) environments that can serve as the basis for IW intelligence curriculum development efforts. Defines IW in terms of two stylized situations: population-centric (such as counterinsurgency) and counterterrorism. Provides a detailed review of IW-relevant defense policy and strategy documents and a list of relevant doctrinal publications.







Assessing Irregular Warfare: A Framework for Intelligence Analysis


Book Description

The aim of this study was to assist the Department of the Army's National Ground Intelligence Center (NGIC) in better understanding the intelligence analytic requirements of irregular warfare (IW). To do this, RAND was to develop an analytic framework for IW that could be used as the basis for an educational and training curriculum that would enhance NGIC analysts' capabilities for assessing IW situations. The outcomes of IW situations depend on both the level of one's understanding of the population and the deftness with which non-military and indirect means are employed to influence and build legitimacy. Accordingly, the study team's principal efforts were devoted to developing an analytic framework for understanding IW situations, whether population-centric (such as counterinsurgency) or counterterrorism, that focused on "irregular features" of the operating environment -- that is, the central environmental and operational variables whose interplay determines the overall trajectory of an irregular conflict toward either success or failure. The central idea of the framework is that it is an analytic procedure by which an analyst, beginning with a generic and broad understanding of a conflict and its environment and then engaging in successively more-focused and more-detailed analyses of selective topics, can develop an understanding of the conflict and can uncover the key drivers behind such phenomena as orientation toward principal protagonists in the conflict, mobilization, and recruitment, and choice of political bargaining or violence. Put another way, the framework allows the analyst to efficiently decompose and understand the features of IW situations -- whether they are of the population-centric or the counterterrorism variety -- by illuminating areas in which additional detailed analysis could matter and areas in which it probably will not matter. This analytic procedure involves three main activities and eight discrete steps.




Assessing the Tradecraft of Intelligence Analysis


Book Description

This report assesses intelligence analysis across the main U.S. intelligence agencies and makes a number of recommendations, some of which parallel initiatives that have begun in the wake of the December 2004 legislation, for instance, create a Deputy Director of National Intelligence as a focal point for analysis, establish a National Intelligence University, build a Long Term Analysis Unit at the National Intelligence Council, and form an Open Source Center for making more creative use of open-source materials.




Leading Intelligence Analysis


Book Description

Written by an experienced professional who has led Navy Intelligence and CIA analysts in high-stakes situations, Leading Intelligence Analysis: Lessons from the CIA’s Analytic Front Lines introduces the fundamental managerial skills and practical tools needed to lead analysis projects conducted by individuals and teams. Author Bruce Pease provides insights into key questions such as What kind of environment draws out a team’s best work? What brings out their creativity? When does pressure bring out their best insights? When does pressure sap their intellectual energy? and What kind of team builds new knowledge rather than engaging in group-think? This book draws on the author’s perspective from decades of leading intelligence analysts on critical issues, including war in the Middle East, terrorism after 9/11, and nuclear threats.




Paths to Victory


Book Description

When a country is threatened by an insurgency, what efforts give its government the best chance of prevailing? Contemporary discourse on this subject is voluminous and often contentious. Advice for the counterinsurgent is often based on little more than common sense, a general understanding of history, or a handful of detailed examples, instead of a solid, systematically collected body of historical evidence. A 2010 RAND study challenged this trend with rigorous analyses of all 30 insurgencies that started and ended between 1978 and 2008. This update to that original study expanded the data set, adding 41 new cases and comparing all 71 insurgencies begun and completed worldwide since World War II. With many more cases to compare, the study was able to more rigorously test the previous findings and address critical questions that the earlier study could not. For example, it could examine the approaches that led counterinsurgency forces to prevail when an external actor was involved in the conflict. It was also able to address questions about timing and duration, such as which factors affect the duration of insurgencies and the durability of the resulting peace, as well as how long historical counterinsurgency forces had to engage in effective practices before they won.




The U. S. Army/Marine Corps Counterinsurgency Field Manual


Book Description

This field manual establishes doctrine for military operations in a counterinsurgency (COIN) environment. It is based on lessons learned from previous counterinsurgencies and contemporary operations. It is also based on existing interim doctrine and doctrine recently developed. Counterinsurgency operations generally have been neglected in broader American military doctrine and national security policies since the end of the Vietnam War over 40 years ago. This manual is designed to reverse that trend. It is also designed to merge traditional approaches to COIN with the realities of a new international arena shaped by technological advances, globalization, and the spread of extremist ideologies--some of them claiming the authority of a religious faith. This is a comprehensive manual that details every aspect of a successful COIN operation from intelligence to leadership to diplomacy. It also includes several useful appendices that provide important supplementary material.




A History of Counterinsurgency


Book Description

This two-volume history of counterinsurgency covers all the major and many of the lesser known examples of this widespread and enduring form of conflict, addressing the various measures employed in the attempt to overcome the insurgency and examining the individuals and organizations responsible for everything from counterterrorism to infrastructure building. How and when should counterinsurgency be pursued as insurgency is growing in frequency and, conversely, while conventional warfare continues to decline as a means by which political rivals seek to impose their will upon each other? What lessons from the past should today's policymakers, strategists, military leaders, and soldiers in the field keep in mind while facing off against 21st-century insurgents? This two-volume set offers a comprehensive history of modern counterinsurgency, covering the key examples of this widespread and enduring form of conflict. It identifies the political, military, social, and economic measures employed in attempting to overcome insurgency, examining the work of the individuals and organizations involved, demonstrating how success and failure dictated change from established policy, and carefully analyzing the results. Readers will gain valuable insight from the detailed assessments of the history of counterinsurgency that demonstrate which strategies have succeeded and which have failed—and why. After an introductory essay on the subject, each chapter provides historical background to the insurgency being addressed before focusing on the specific policies pursued and actions taken by the counterinsurgency force. Each section also provides an assessment of those operations, including in most cases an analysis of lessons learned and, where appropriate, their relevance to counterinsurgency operations today. The set's coverage spans modern counterinsurgencies from Europe to Asia to Africa since 1900 and includes the ongoing counterinsurgency operations in Afghanistan today. Its wide, international approach to the subject makes the set a prime resource for readers seeking specific information on a particular conflict or a better understanding of the general theories and practices of counterinsurgency.




The Future of Counterinsurgency


Book Description

This thought-provoking work analyzes the major debates surrounding counterinsurgency campaigns and uncovers the internal security problems derailing effective strategies for restoring stability. As countries across the globe continue to adjust their security operations to counter an increasingly volatile political landscape, the issue of how to identify and derail a host of violent groups remains of considerable interest. This comprehensive volume offers an examination of the effectiveness of contemporary counterinsurgency efforts, revealing which approaches offer the greatest chances of success internally, regionally, and internationally. Featuring perspectives from experts and analysts in the field of irregular warfare and international security, this is an unparalleled exploration of all types of insurgency from warlordism, to piracy, to guerilla movements. The book looks beyond the popular focus on Iraq and Afghanistan, delving into the internal security operations of regions not normally studied. Chapters cover goal setting and measurements for restoring security, information operations and strategic communications between insurgent groups and governments, and the different approaches of governments in combating political unrest. Case studies include movements in Sierra Leone, Sri Lanka, Egypt, and South Africa.