Influence Operations and the Human Domain - Strategic Aims of Joint Special Operations Task Force Philippines, Abu Sayyaf Group (ASG) and Jema'ah Islamiy'ah (JI), PSYOP, Intelligence Support


Book Description

This unique case study which addresses a common problem: how to influence the human domain--a local population--as part of a strategic plan. The U.S. Army Special Operations Command strategic document ARSOF 2022 places particular emphasis on the human domain, which is amplified in this case study. As the authors argue, successful influence operations such as those carried out in support of the strategic aims of Joint Special Operations Task Force -Philippines (JSOTF-P) between 2004-2008 can undermine support for an adversary, disrupt their operations and strategies, prevent recruitment and logistical support, and ensure that the adversary does not receive sanctuary and support in the future. Moreover, as new threats from armed groups continue to emerge around the world, there is a strong demand signal for in-depth analysis of successful influence operations from a variety of cases, including JSOTF-P. The challenge in crafting and implementing effective influence operations that influence this human domain is threefold. The first is how to clearly define influence operations. The argument that Lopacienski and Scanzillo make is that the commonly misrepresented and ambiguous term "Information Operations" does not comprehensively or adequately address the scope of such operations. Instead they propose and clearly define a new joint doctrinal term - Influence Operations. Influence Operations builds on existing joint doctrine and skill sets and does not require expensive new technology or weapons platforms. Instead, the authors argue, it is about adopting a particular mindset and applying core skill sets for which Special Operations Forces such as Army Special Forces, Psychological Operations, Naval Special Warfare, Civil Affairs teams, and Marine Special Operations units are selected for and are trained to achieve.Chapter I * The Foundations of Influence Operations * A. Definitions and Clarifications * B. The Human Domain: Competing for Attitudes, Perceptions, and a Vocal Majority * Chapter II * Joint Special Operations Task Force - Philippines (JSOTF-P) Method of Engagement * A. Capacity Building * B. Civil-Military Engagement * C. Information Engagement and Psychological Operations * D. PSYOP: A Core SOF Capability * E. Intelligence Support Operations * Chapter III * Influence Operations in Action * A. Together In the Islamic City of Marawi * B. Sulu: Message, Messenger, and Medium * C. After Sulu: Shoring Up Basilan and Zamboanga * Chapter IV * Alternating Effort to Maximize Influence Effects * Chapter V * The Future of Influence Operations * A. Preparing SOF as the Executors of Influence Operations * B. Conclusion * Teaching Questions * Appendix A: Threat Groups in the Philippines * Appendix B: Selected Bibliography * Footnotes




Unconquerable Nation: Knowing Our Enemy, Strengthening Ourselves


Book Description

The author presents a clear-sighted and sobering analysis of where we are today in the struggle against terrorism. Jenkins, an internationally renowned authority on terrorism, distills the jihadists?? operational code and outlines a pragmatic but principled approach to defeating the terrorist enterprise. We need to build upon our traditions of determination and self-reliance, he argues, and above all, preserve our commitment to American values.




Modern Warfare


Book Description




Understanding Dark Networks


Book Description

Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (SNA) method. Written in an accessible manner, it provides an introduction to SNA, presenting tools and concepts, and showing how SNA can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks.




Impunity: Countering Illicit Power in War and Transition


Book Description

Successful outcomes in armed conflict require confronting illicit networks. The case studies contained within this illustrated text that confront illicit power requires coping with political and human dynamics in complex, uncertain environments. It touches upon America's strategic relationships for capacity building with world partners to combat terrorism and destabilizing forms of corruption throughout the world. Chapter topics covered include: Weapons trafficking Recruitment and Radicalization with forms of social media and new technologies Financial tools and sanctions Security sector reconstruction and more Related products: After the Wars: International Lessons Learned from the U.S. Wars in Iraq and Afghanistan can be found here: https://bookstore.gpo.gov/products/after-wars-international-lessons-us-wars-iraq-and-afghanistan Beyond Convergence: World Without Order is available here: https://bookstore.gpo.gov/products/beyond-convergence-world-without-order-0 Armed Groups: Studies in National Security, Counterterrorism, and Counterinsurgency eBook format available from Google Play eBookstore -- Please use ISBN: 9780160866999 to search their platform for this title. PRISM: Journal of t:he Center of Complex Operations that focuses on U.S. defense policy, counterinsurgency, and warfare strategy is available as a print quarterly periodical subscription that can be ordered here: https://bookstore.gpo.gov/products/prism-journal-center-complex-operations Other products produced by the US Army, National Defense University can be found here: https://bookstore.gpo.gov/agency/national-defense-university-ndu




Eradicating Terrorism from the Middle East


Book Description

This book analyzes the contributing factors responsible for the emergence of terrorism in the Middle East with specific case studies based on empirical data that anchors the analyses in real life observation and posits unbiased, bipartisan solutions. Terrorists are targeting civilian populations around the world and increasing pressure on civil liberties, public policy and democratic institutions. With the defeat of one terrorist organization several more take its place. This book includes case studies in public administration initiatives from various Middle Eastern countries, and investigates regulation, public information, monetary and financial responsibilities, security, and civic infrastructure as possible solutions to this ever-worsening problem. With terrorism emerging as a major global policy issue this book speaks to global security and public policy and administrative issues in the Middle East, and will be of interest to researchers in terrorism and security in the Middle East, public administration, international relations, political economy, and to government officials, security analysts and investors.​




How Armies Respond to Revolutions and Why


Book Description

An exploration of military responses to revolutions and how to predict such reactions in the future We know that a revolution's success largely depends on the army's response to it. But can we predict the military's reaction to an uprising? How Armies Respond to Revolutions and Why argues that it is possible to make a highly educated guess—and in some cases even a confident prediction—about the generals' response to a domestic revolt if we know enough about the army, the state it is supposed to serve, the society in which it exists, and the external environment that affects its actions. Through concise case studies of modern uprisings in Iran, China, Eastern Europe, Burma, and the Arab world, Zoltan Barany looks at the reasons for and the logic behind the variety of choices soldiers ultimately make. Barany offers tools—in the form of questions to be asked and answered—that enable analysts to provide the most informed assessment possible regarding an army's likely response to a revolution and, ultimately, the probable fate of the revolution itself. He examines such factors as the military's internal cohesion, the regime's treatment of its armed forces, and the size, composition, and nature of the demonstrations. How Armies Respond to Revolutions and Why explains how generals decide to support or suppress domestic uprisings.




Blood Year


Book Description

In 2014, a resurgent and bellicose Russia took over Crimea and fueled a civil war in Eastern Ukraine; post-Saddam Iraq lost a third of its territory to an army of hyper-violent millennialists; and the peace process in Israel seemed to completely collapse. In short, the post-Cold War security order that the US had constructed after 1991 seemed to be coming apart at the seams. David Kilcullen was one of the architects of America's strategy in the late phases of the second Gulf War, and he has also spent time in Afghanistan and other hotspots. In Blood Year, he provides a wide-angle view of the current situation in the Middle East and analyzes how America and the West ended up in such dire circumstances. Kilcullen lays much of the blame on Bush's initial decision to invade Iraq (which had negative secondary effects in Afghanistan), but also takes Obama to task for simply withdrawing and adopting a "leading from behind" strategy. As events have proven, Kilcullen contends, withdrawal was a fundamentally misguided plan. The U.S. had uncorked the genie, and it had a responsibility to at least attempt to keep it under control. Instead, the U.S. is at a point where administration officials state that the losses of Ramadi and Palmyra are manageable setbacks. Kilcullen argues that the U.S. needs to re-engage in the region, whether it wants to or not, because it is largely responsible for the situation that is now unfolding. Blood Year is an essential read for anyone interested in understanding not only why the region that the U.S. invaded a dozen years ago has collapsed into utter chaos, but also what the U.S. can do to alleviate the grim situation.




Historical Dictionary of Terrorism


Book Description

The United States Department of Defense defines terrorism as 'the calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.' While terrorism has been around for centuries, it was the al Qa'eda attacks of September 11, 2001, that brought home to the world, and most particularly the United States, just how dangerous terrorism can be. The third edition of the Historical Dictionary of Terrorism presents the full spectrum of forms of political violence through a chronology, an introductory essay, a bibliography, and hundreds of cross-referenced dictionary entries on major terrorist groups and their leaders, significant terrorist events, cyber-terrorism, counterterrorism, and social science concepts regarding the motivations and group dynamics of terrorist groups. Authors Sean K. Anderson and Stephen Sloan move beyond the gut reaction we have to this volatile and divisive topic by providing a reliable and objective reference on terrorism.