1. An OH-58 helicopter was shot down by insurgents while conducting an attack run, resulting in the deaths of two service members.
2. A quick reaction force en route to secure the crash site hit an IED, killing five more service members and damaging an armored vehicle.
3. During recovery of the damaged vehicle, a second IED exploded, killing one more service member. In total, the insurgent attack resulted in eight service members killed.
The ongoing terror attacks in Turkey are a continuation of long-standing domestic issues facing Ankara, overlaid by the new,
evolving threat posed by Islamic extremist groups. The attacks, which reflect each terror groups’ strategic intentions, can be
summarised into three broad groupings, with each group following a differing agenda and operational approach:
• Kurdish militant (such as the Kurdistan Workers Party [PKK])
• Domestic extremist ( including Marxist Leninist, anti-Western and anti-NATO groups – such as the Revolutionary People’s
Liberation Party–Front [DHKP-C])
• Islamic militant (specifically, Islamic State [IS])
Many of the world's poorest citizens live in peripheral spaces their states have chosen
not to control. Leaving these spaces ungoverned poses challenges for development, global
terrorism, and conflict. Can the international community induce countries to invest in
controlling their territory? I consider the Bush Administration's foreign policy, which,
following the September 11th attacks, demanded countries take active steps to reduce
terrorist safe havens or risk a US invasion. Drawing upon recent work on the determinants
of government control, I develop a difference-in-difference strategy to test for evidence
of government expansions and implement this test using subnational conflict data from Africa. Across a wide range of specifications and measures, I consistently find precise
estimates suggesting African states did not engage in these expansions. The results suggest that broad-based deterrence is an ineffective policy strategy to reduce ungoverned spaces.
Do Peacekeeping Advance China’s African Economic And Securityinterests? an In...QUESTJOURNAL
ABSTRACT: China’s interest in Africa has become a common point of discussion among analysts, academics, politicians and the general population. Understanding the role or meaning of China’s African interests can shed light on the goals the leadership want to achieve. This paper identifies peacekeeping as a foreign policy instrument which explains security and economic goals, placed within the framework of the national interest. In the African security and economic environment,goals towards a path of direction determine China’s actions, which affect the protection of interests. By using peacekeeping as an inclusive means to achieve peace, security and economic development, China’s goal-seeking behaviour can be partially answered. The analysis reveals that certain conditions of peace and development have a high priority and properly labeled in the ‘national interest’.
The ongoing terror attacks in Turkey are a continuation of long-standing domestic issues facing Ankara, overlaid by the new,
evolving threat posed by Islamic extremist groups. The attacks, which reflect each terror groups’ strategic intentions, can be
summarised into three broad groupings, with each group following a differing agenda and operational approach:
• Kurdish militant (such as the Kurdistan Workers Party [PKK])
• Domestic extremist ( including Marxist Leninist, anti-Western and anti-NATO groups – such as the Revolutionary People’s
Liberation Party–Front [DHKP-C])
• Islamic militant (specifically, Islamic State [IS])
Many of the world's poorest citizens live in peripheral spaces their states have chosen
not to control. Leaving these spaces ungoverned poses challenges for development, global
terrorism, and conflict. Can the international community induce countries to invest in
controlling their territory? I consider the Bush Administration's foreign policy, which,
following the September 11th attacks, demanded countries take active steps to reduce
terrorist safe havens or risk a US invasion. Drawing upon recent work on the determinants
of government control, I develop a difference-in-difference strategy to test for evidence
of government expansions and implement this test using subnational conflict data from Africa. Across a wide range of specifications and measures, I consistently find precise
estimates suggesting African states did not engage in these expansions. The results suggest that broad-based deterrence is an ineffective policy strategy to reduce ungoverned spaces.
Do Peacekeeping Advance China’s African Economic And Securityinterests? an In...QUESTJOURNAL
ABSTRACT: China’s interest in Africa has become a common point of discussion among analysts, academics, politicians and the general population. Understanding the role or meaning of China’s African interests can shed light on the goals the leadership want to achieve. This paper identifies peacekeeping as a foreign policy instrument which explains security and economic goals, placed within the framework of the national interest. In the African security and economic environment,goals towards a path of direction determine China’s actions, which affect the protection of interests. By using peacekeeping as an inclusive means to achieve peace, security and economic development, China’s goal-seeking behaviour can be partially answered. The analysis reveals that certain conditions of peace and development have a high priority and properly labeled in the ‘national interest’.
Strategic Communication: A Department of Defense Perspective. Robert HastingsRobert T. Hastings
Presentation by Robert Hastings, former Assistant Secretary of Defense for Public Affairs, at Leeds University for the European PR Education and Research Association annual congress.
This study interrogates the place of leadership and strategic communication in the actualization of overall national security in Nigeria. These tools of communication have been used to both incite violence as well as carry messages that help prevent violent conflict, and promote peace and reconciliation and Nigerian military is not exceptional. For instance, countering the Boko Haram insurgency was psychological operations. The Army was more successful in using this approach when Boko Haram’s use of violence was at its peak. Details for this are not hard to decipher, though they have never publicly explained why they engaged in psychological operations nor have they even admitted using them. There was a collective fear then, even among journalists and media establishments, some of whom were victims of Boko Haram’s attacks. The support the security services received from the media might have come from the need to address this for lasting solution in the nearest future. Due to government negligence on strategic communicate for national security, these gaps have unavoidably resulted in the resilience and devastating consequences in the state. Therefore, there is need for leaders to integrate a new culture of communication among agencies which can leads to greater efficiency in information and intelligence sharing under the established Strategic Communication Inter – Agency Policy Coordination Committee in overseeing strategic communication for national security.
A specially trained military unit, an "IDT Prevention Wing of the Military" uses IDT to reduce stress in the national collective consciousness.
The IDT soldier's daily routine includes the practice of the Transcendental Meditation® technique and its advanced "TM-Sidhi program.
Mass Atrocities and Armed Conflict: Links, Distinctions and Implications for ...frameworkteam
Presentation from a brown bag lunch discussion organized by the UN Interagency Framework Team for Preventive Action on "Mass Atrocities and Armed Conflict: Links, Distinctions and Implications for Prevention", held on 23 March 2011.
Please note that the designations employed and the presentation of material in this information product do not imply the expression of any opinion whatsoever on the part of the United Nations concerning the legal or development status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The mention of specific companies or products of manufacturers, whether or not these have been patented, does not imply that these have been endorsed or recommended by the United Nations in preference to others of a similar nature that are not mentioned.
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxjoellemurphey
Running head: ASSIGNMENT 4
ASSIGNMENT 4
Assignment 4: Data Collection
Student Name
Affiliate Institution
Evidence-based researched data to indicate there is a problem
Terrorism is considered a historical and major problem for the U.S. Since 2001, the significance of the problem has increased. Therefore, several organizations and facilities collect and store terrorism data for events like attempted and occurred activities. The main data source for terrorism activities is the U.S. Department of Homeland Security. The mandate of this arm of government is to protect Americans both in locally and internationally against crime activities but terrorism seems the greatest enemy of American citizen wherever they are in the world.
Numerous and most useful data for terrorism is found from the following federal agency and private databases:
· The National Security Agency (NSA)
· Federal Bureau of Investigation (FBI)
· National Consortium for the Study of Terrorism and Response to Terrorism (NCSTRT) and
· Global Terrorism Database (GTD). (FBI, 2014; GTD, 2014)
Information from the above databases are analyzed to present diverse quantitative and qualitative terrorism data that cover several years including life threats to the U.S. soil. According to these databases, terrorism is an old problem and continues to intensify due to availability of uninterrupted new technology as well as growing financial power of their organizations. The Federal Agencies data bases provide information on terrorism activities and information on several strategies that have been used in the past and are currently used to curb the vice (FBI, 2014).
The other terrorist’s data sources are the media agencies. News agencies such as online newspapers and broadcasting corporations provide terrorism data as it occurs. Although these agencies might not provide analyzed data, their role is to increase public awareness about terrorism occurrences and development.
References
Federal Bureau of Investigation (2014). Crime Statistics. Retrieved on May 22, 2015 from http://www.fbi.gov/stats-services/crimestats
Global Terrorism Database (2014). Overview of the GTD. Retrieved on May 22, 2015 from http://www.start.umd.edu/gtd/about/
2
Running Head: Terrorism Stakeholders
Terrorism
Terrorism Stakeholders
Student name
Affiliate Institution
Terrorism
Modern day terrorism has caused sufficient harm to the society both in the political, social and the economic sectors. External and internal forces have influenced terrorism activities within the governments therefore increasing the intensity of the terrorism acts (Chong, 2007). After the terror attack that occurred in the U.S on the 9/11, 2001, it was realised that there have been low information sharing amongst the agencies that conducts the security surveillance of the country. Various institutions and agencies directly or indirectly are linked to the terrorist attack that takes p ...
SSR and human rights are intertwined each other. The focus of this study is to assess security sector reform in Ethiopia and its implication for human right protection in Debre Markos Town Administration. The central objective of the study was to explore the positive and negative implication and challenges of SSR in Ethiopia with a particular reference to protecting human rights in Debre Markos Town. The researchers employed qualitative research method with case study research design.
In New York in June 2011, Nonviolent Peaceforce (NP) conducted five trainings, consultations and presentations to United Nations and UN-related organizations, including the Inter-Agency Standing Committee (IASC). Marking NP and unarmed civilian peacekeeping's (UCP) biggest exposure ever at the UN, the presentations create further opportunities to advance policy and funding for UCP.
The UN’s invitation and sponsorship of the trainings attest to the international recognition unarmed civilian peacekeeping is gaining through NP’s civilian protection efforts in Sri Lanka, the Philippines and Sudan.
In a May 9, 2024 paper, Juri Opitz from the University of Zurich, along with Shira Wein and Nathan Schneider form Georgetown University, discussed the importance of linguistic expertise in natural language processing (NLP) in an era dominated by large language models (LLMs).
The authors explained that while machine translation (MT) previously relied heavily on linguists, the landscape has shifted. “Linguistics is no longer front and center in the way we build NLP systems,” they said. With the emergence of LLMs, which can generate fluent text without the need for specialized modules to handle grammar or semantic coherence, the need for linguistic expertise in NLP is being questioned.
Strategic Communication: A Department of Defense Perspective. Robert HastingsRobert T. Hastings
Presentation by Robert Hastings, former Assistant Secretary of Defense for Public Affairs, at Leeds University for the European PR Education and Research Association annual congress.
This study interrogates the place of leadership and strategic communication in the actualization of overall national security in Nigeria. These tools of communication have been used to both incite violence as well as carry messages that help prevent violent conflict, and promote peace and reconciliation and Nigerian military is not exceptional. For instance, countering the Boko Haram insurgency was psychological operations. The Army was more successful in using this approach when Boko Haram’s use of violence was at its peak. Details for this are not hard to decipher, though they have never publicly explained why they engaged in psychological operations nor have they even admitted using them. There was a collective fear then, even among journalists and media establishments, some of whom were victims of Boko Haram’s attacks. The support the security services received from the media might have come from the need to address this for lasting solution in the nearest future. Due to government negligence on strategic communicate for national security, these gaps have unavoidably resulted in the resilience and devastating consequences in the state. Therefore, there is need for leaders to integrate a new culture of communication among agencies which can leads to greater efficiency in information and intelligence sharing under the established Strategic Communication Inter – Agency Policy Coordination Committee in overseeing strategic communication for national security.
A specially trained military unit, an "IDT Prevention Wing of the Military" uses IDT to reduce stress in the national collective consciousness.
The IDT soldier's daily routine includes the practice of the Transcendental Meditation® technique and its advanced "TM-Sidhi program.
Mass Atrocities and Armed Conflict: Links, Distinctions and Implications for ...frameworkteam
Presentation from a brown bag lunch discussion organized by the UN Interagency Framework Team for Preventive Action on "Mass Atrocities and Armed Conflict: Links, Distinctions and Implications for Prevention", held on 23 March 2011.
Please note that the designations employed and the presentation of material in this information product do not imply the expression of any opinion whatsoever on the part of the United Nations concerning the legal or development status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The mention of specific companies or products of manufacturers, whether or not these have been patented, does not imply that these have been endorsed or recommended by the United Nations in preference to others of a similar nature that are not mentioned.
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxjoellemurphey
Running head: ASSIGNMENT 4
ASSIGNMENT 4
Assignment 4: Data Collection
Student Name
Affiliate Institution
Evidence-based researched data to indicate there is a problem
Terrorism is considered a historical and major problem for the U.S. Since 2001, the significance of the problem has increased. Therefore, several organizations and facilities collect and store terrorism data for events like attempted and occurred activities. The main data source for terrorism activities is the U.S. Department of Homeland Security. The mandate of this arm of government is to protect Americans both in locally and internationally against crime activities but terrorism seems the greatest enemy of American citizen wherever they are in the world.
Numerous and most useful data for terrorism is found from the following federal agency and private databases:
· The National Security Agency (NSA)
· Federal Bureau of Investigation (FBI)
· National Consortium for the Study of Terrorism and Response to Terrorism (NCSTRT) and
· Global Terrorism Database (GTD). (FBI, 2014; GTD, 2014)
Information from the above databases are analyzed to present diverse quantitative and qualitative terrorism data that cover several years including life threats to the U.S. soil. According to these databases, terrorism is an old problem and continues to intensify due to availability of uninterrupted new technology as well as growing financial power of their organizations. The Federal Agencies data bases provide information on terrorism activities and information on several strategies that have been used in the past and are currently used to curb the vice (FBI, 2014).
The other terrorist’s data sources are the media agencies. News agencies such as online newspapers and broadcasting corporations provide terrorism data as it occurs. Although these agencies might not provide analyzed data, their role is to increase public awareness about terrorism occurrences and development.
References
Federal Bureau of Investigation (2014). Crime Statistics. Retrieved on May 22, 2015 from http://www.fbi.gov/stats-services/crimestats
Global Terrorism Database (2014). Overview of the GTD. Retrieved on May 22, 2015 from http://www.start.umd.edu/gtd/about/
2
Running Head: Terrorism Stakeholders
Terrorism
Terrorism Stakeholders
Student name
Affiliate Institution
Terrorism
Modern day terrorism has caused sufficient harm to the society both in the political, social and the economic sectors. External and internal forces have influenced terrorism activities within the governments therefore increasing the intensity of the terrorism acts (Chong, 2007). After the terror attack that occurred in the U.S on the 9/11, 2001, it was realised that there have been low information sharing amongst the agencies that conducts the security surveillance of the country. Various institutions and agencies directly or indirectly are linked to the terrorist attack that takes p ...
SSR and human rights are intertwined each other. The focus of this study is to assess security sector reform in Ethiopia and its implication for human right protection in Debre Markos Town Administration. The central objective of the study was to explore the positive and negative implication and challenges of SSR in Ethiopia with a particular reference to protecting human rights in Debre Markos Town. The researchers employed qualitative research method with case study research design.
In New York in June 2011, Nonviolent Peaceforce (NP) conducted five trainings, consultations and presentations to United Nations and UN-related organizations, including the Inter-Agency Standing Committee (IASC). Marking NP and unarmed civilian peacekeeping's (UCP) biggest exposure ever at the UN, the presentations create further opportunities to advance policy and funding for UCP.
The UN’s invitation and sponsorship of the trainings attest to the international recognition unarmed civilian peacekeeping is gaining through NP’s civilian protection efforts in Sri Lanka, the Philippines and Sudan.
In a May 9, 2024 paper, Juri Opitz from the University of Zurich, along with Shira Wein and Nathan Schneider form Georgetown University, discussed the importance of linguistic expertise in natural language processing (NLP) in an era dominated by large language models (LLMs).
The authors explained that while machine translation (MT) previously relied heavily on linguists, the landscape has shifted. “Linguistics is no longer front and center in the way we build NLP systems,” they said. With the emergence of LLMs, which can generate fluent text without the need for specialized modules to handle grammar or semantic coherence, the need for linguistic expertise in NLP is being questioned.
Future Of Fintech In India | Evolution Of Fintech In IndiaTheUnitedIndian
Navigating the Future of Fintech in India: Insights into how AI, blockchain, and digital payments are driving unprecedented growth in India's fintech industry, redefining financial services and accessibility.
27052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
03062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
role of women and girls in various terror groupssadiakorobi2
Women have three distinct types of involvement: direct involvement in terrorist acts; enabling of others to commit such acts; and facilitating the disengagement of others from violent or extremist groups.
Welcome to the new Mizzima Weekly !
Mizzima Media Group is pleased to announce the relaunch of Mizzima Weekly. Mizzima is dedicated to helping our readers and viewers keep up to date on the latest developments in Myanmar and related to Myanmar by offering analysis and insight into the subjects that matter. Our websites and our social media channels provide readers and viewers with up-to-the-minute and up-to-date news, which we don’t necessarily need to replicate in our Mizzima Weekly magazine. But where we see a gap is in providing more analysis, insight and in-depth coverage of Myanmar, that is of particular interest to a range of readers.
हम आग्रह करते हैं कि जो भी सत्ता में आए, वह संविधान का पालन करे, उसकी रक्षा करे और उसे बनाए रखे।" प्रस्ताव में कुल तीन प्रमुख हस्तक्षेप और उनके तंत्र भी प्रस्तुत किए गए। पहला हस्तक्षेप स्वतंत्र मीडिया को प्रोत्साहित करके, वास्तविकता पर आधारित काउंटर नैरेटिव का निर्माण करके और सत्तारूढ़ सरकार द्वारा नियोजित मनोवैज्ञानिक हेरफेर की रणनीति का मुकाबला करके लोगों द्वारा निर्धारित कथा को बनाए रखना और उस पर कार्यकरना था।
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
ys jagan mohan reddy political career, Biography.pdfVoterMood
Yeduguri Sandinti Jagan Mohan Reddy, often referred to as Y.S. Jagan Mohan Reddy, is an Indian politician who currently serves as the Chief Minister of the state of Andhra Pradesh. He was born on December 21, 1972, in Pulivendula, Andhra Pradesh, to Yeduguri Sandinti Rajasekhara Reddy (popularly known as YSR), a former Chief Minister of Andhra Pradesh, and Y.S. Vijayamma.
31052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
‘वोटर्स विल मस्ट प्रीवेल’ (मतदाताओं को जीतना होगा) अभियान द्वारा जारी हेल्पलाइन नंबर, 4 जून को सुबह 7 बजे से दोपहर 12 बजे तक मतगणना प्रक्रिया में कहीं भी किसी भी तरह के उल्लंघन की रिपोर्ट करने के लिए खुला रहेगा।
1. David J. Kilcullen Special Advisor for Counterinsurgency to the Secretary of State RAND Insurgency Board May 8, 2008 Dinosaurs versus Mammals: Insurgent and Counterinsurgent Adaptation in Iraq, 2007
3. 1. Diagnosing the Problem – a Vicious Circle Extremists infiltrate Sunni communities, establish base areas through intimidation Sunni extremists attack neighboring Shi’a communities Shi’a militias and “death squads” attack Sunni communities Sectarian attacks intimidate Sunni communities, which close ranks Accelerants: AQI terrorism Foreign fighters Iranian infiltration Crime & unemployment 1 2 3 4
4. 2. Breaking the Cycle – Sustainable Stability De-celerants: Political reconciliation Competent, non-sectarian governance & institutions Extremists infiltrate Sunni communities, establish base areas through intimidation Sunni extremists attack neighboring Shi’a communities Shi’a militias and vigilantes attack Sunni communities Sectarian attacks intimidate Sunni communities, which close ranks 1 2 3 4 Joint Security Stations & EPRT civil programs protect communities, render them resistant to infiltration Joint Security Stations protect people in their homes Market and district hardening programs, and Joint Security Stations protect public places against terrorism Domination of “belts” and control of access to Baghdad prevents “commuter insurgents” and infiltration Access controls prevent Sunni extremists entering Shi’a areas Gated communities prevent Sunni extremists infiltrating Sunni areas Gated communities prevent Shi’a extremists entering Sunni areas
5. Lines of Operation (generic) April 2007 Developing Security Forces Support Government Insurgent Neutral or Passive Support Government Insurgent Neutral or Passive Attitude of Populace Security Operations Develop Security Forces Better Governance Essential Services Economic Development Information Operations Starting Conditions End State
6. Lines of Operation (JSAT) Campaign Goal Near Term - End to large scale sectarian violence, improved population security, and substantial progress on political accommodation Intermediate Term - The establishment of a negotiated political agreement that leads to sustainable security Long Term - Iraq at peace with its neighbors and an ally in the War on Terror, with a representative government that respects the human rights of all Iraqis, and security forces sufficient to maintain domestic order and to deny Iraq as a safe haven for terrorists. COMMUNICATION & ENGAGEMENT COMMUNICATION & ENGAGEMENT COMMUNICATION & ENGAGEMENT POLITICAL SECURITY ECONOMIC DIPLOMATIC LOO Goal – Political accommodation agreement leading to a sustainable security situation, marked by a significant reduction in aggregate political violence LOO Goal - End large scale violence; defeat irreconcilables; develop leverage to bring reconcilables to the table; reform ISF; reduce destabilizing external influences LOO Goal - Progress in key sectors of the Iraqi economy supports and reflects movement towards sustainable stabilization and political accommodation LOO Goal - Negative influences from neighbors reduced. Increased Iraqi outreach to region, more acceptance of Iraqi government by region
7. Campaign Concept 2007-8 (JSAT, Mar 07) Coalition Force Level CRITICAL FACTORS: Time, Leverage, US political will, GOI performance MNF-I applies increased force levels, intimate cooperation with ISF and a focus on population security, to improve security situation between now and February 2008. USM-I exploits improved security, to force key actors toward GOI reform, confidence building measures (‘07) & political accommodation (‘08) resulting in sustainable stability . MNF-I progressively reduces force levels through 2008, aiming for steady state early ‘09 . MAIN EFFORT: Political & diplomatic lines of operation translate security progress into sustainable political stability. window of opportunity Now Feb 08 July 07 Dec 08
8.
9.
10.
11.
12. Tentative theoretical model for Insurgent & Counterinsurgent Learning The “Metz Threshold” Time Performance “ Acceptability Gradient” (politically defined) Counterinsurgent Performance Insurgent Performance Counterinsurgent starts behind acceptability gradient 1 Insurgent starts ahead of acceptability gradient 2 Counterinsurgent’s adaptation prompts evolution in insurgent 4 Rising expectations invoke “red queen effect” for counterinsurgent 6 Insurgent and counterinsurgent performance converge through co-evolution 7 Counterinsurgent failure to meet rising expectations may prompt insurgent “take-off” 8 Counterinsurgent adapts to environment and improves 3 Counterinsurgent must achieve acceptable performance before Metz threshold reached 5
13.
14.
15. Example adaptations Institutional Adaptation Institutional Evolution Operational Evolution Operational Adaptation New TTPs New personnel systems New collective training New individual training New In-theater organizations New permanent units Budget changes Supplemental funding Permanence Scope
16.
17.
18.
19. Iraq – Sunni insurgent Networks UNCLASSIFIED Derived from OSINT DJ Kilcullen / JSAT / March 07 Mujahideen Central Command Coordination Department of the Jihad Brigades Jeish al-Ta'eifa al-Mansoura Victorious Army Group Jama’a al Murabitin Jaish al Sunna wa’l Jama’a Ansar al Tawhid Brigades Islamic Jihad Brigades Tanzim Qa’idat fil Balad ar Rafidayn Al Qa’ida in Mesopotamia Strangers’ Brigades Horror Brigades 1920s Revolutionary Brigades Islamic Iraqi Resistance Front Ja’ami Jaish al Mujahidin Islamic Army in Iraq Ansar al Sunna Blended org, FREs + jihadists, formerly Ansar al Islam Kurdish Shia & Sunni Leaders, long-standing personal links to AMZ, home ground advantage in KRG area (Ba’athists / Former Regime Elements) Muslim Ulema Council (former Ba’athist Society of Islamic Scholars ) Green Brigades Jaish Muhammad Mujahidin Shura Council (ISI may have taken over) Abdullah Janabi friends with Izzat al-Duri & Harith al-Dari (all three Baathists, sufis, fedayeen, IIS – Not Salafists, sufis [tarekat links] Kamis al-Sirhan Muhammad Yunis Ahmad al Hamdani (al Duri’s deputy in Mil Bureau – Saddam’s network for religious-based organization of insurgency, kept eye on tribes, mosques & security orgs – old boy network ) Larger in numbers Iraqi Turkmen Front (Turkish govt links?)
20. Insurgent Organizational Evolution – Jaish al Mahdi Political Leadership Propaganda wing Social Services / Charity Militia / Local insurgents Special Groups Criminal elements JAM 2005-6 Political leadership divided Propaganda efforts weak Social services growing JAM 2007 Crafting a “Hizb’allah model” Propaganda and social services strengthened, Criminal elements starting to be eliminated Political Leadership Propaganda wing Social Services / Charity Militia / Local insurgents Special Groups
24. 28 MAY 07 - DOWNED OH-58 - TIMELINE AS OF 29 0630D MAY 07 LEGEND LOCATION WHO: MND-N WHAT: DOWNED OH-58 WHEN: 281816D MAY 07 WHERE: 38S MC 7696 5353 28 MAY 1816D- 0H-58 (SB 56) DOWNED 38S MC 7696 5353, 16KM W. OF MUQDADIYAH. SWT RECEIVED SAFIRE FROM SINGLE POO. SB 56 CONDUCTED ATTACK RUN RESULTING IN CATASTROPHIC DAM TO SB 56. B26 EVADED ENEMY FIRE. 1820D- 3-1 CAV RECEIVED MAYDAY CALL FROM DOWNED OH-58. QRF ALERTED. ANOTHER AWT RESPONDED TO CRASH SITE AND ASSISTS SB26 IN SECURING SITE. 1842D- CAS (2X F-16) OVERHEAD. 1848D- A UH-60 TEAM (LIGHTNING 06) IVO CRASH SITE LANDED AND PICKED UP OH-58 CREW. AWT PROVIDED SUPPRESSIVE FIRE – 2X CF (US) KIA . UH-60 CASEVACED CAS TO FOB WARHORSE. 1940D- AWT (REDWOLF 06) ENGAGED 3X AIF AT CRASH SITE – 2X AIF KIA. 2006D- GROUND QRF IN ROUTE (3-1 CAV QRF – 4X M1114, 2X M2, 24X PAX) 2024D- 5W’s SENT TO COMMAND GROUP FROM MNFI CHOPS (OIC). 2034D- DART INBOUND TO DO PHO. 2035D- QRF HIT IED ENROUTE TO CRASH SITE, 5X CF (US) KIA, 3X CF (US) WIA AND 1X M2 BFV DAMAGED. 2048D- A10 HAD EYES ON DOWNED A/C CRASH SITE. 2051D- AASLT QRF LANDED AND SECURED THE CRASH SITE. TEAM INCLUDED EOD AND MAINT TECH. 2200D- A/C TI CONDUCTED – A/C TOTAL LOSS. 2309D- EOD DESTROYED A/C. 29 MAY 290265D DURING RECOVERY OF THE M2 BFV FROM IED STRIKE, A SECOND IED EXPLODED UNDER THE M2 BFV, 1X CF (US) KIA BDA: 8X CF (US) KIA, 3X CF (US) WIA, 2X AIF KILLED, 1X OH-58 DESTROYED, 1X BFV DAMAGED 2048D - QRF HIT IED SAF/HMG POO 1816D - OH-58 CRASH SITE
27. 29 MAY 07, TF 2-15 ICW 4/6 IA OPSUM, EAGLE RAZOR SOUTH II DETAINEES: 13 X LN DETAINED INJURIES: 1 X US WIA BR# SM0998; MEDEVAC, GS WOUND TO LEG, TREATED AND RTD STATUS Cache Found : 1. MB 241 444 2. MB 242 442 3. MB 241 442 4. MB 238 441 5. MB 257 421 6 X BAGS UBE 4 X CANS 30MM 1 X SPARE BARREL AA 2000 X PROPAGANDA CD’S 1800 X BLANK CD’S 1 X CD WRITER 2 X GRNADE FUSES 1 X AK-47 WITH MAGAZINE 300 X CASSETTES 1 X WASHINE MACHINE TIMER COPPER WIRE
39. New Tactics 1 -- Urban Oilspot HYPOTHETICAL EXAMPLE Reconstruction Zone Initial focus of ops. Selected where pop most supports CF. PRT main effort. Permanently garrisoned. Must protect population 24/7. No kinetic ops in here without PRT clearance. No expansion until fully secure. 1 Security & Influence Zone BCT main effort. Mission is to protect RZ from enemy infil. Pop in this area are denied benefits of RZ, kept under intrusive control. Joint Influence Teams work here, using progress in RZ as ”object lesson” to convince community leaders to “sign on”. Pop must meet criteria (control youth, report en acty, no anti-CF activity etc.) to be eligible for PRT benefits. Once criteria met, RZ expands into this zone. 2 Disruption Zone Remainder of AOR. Focus of intel and SOF activity. Aim to disrupt enemy, keep off balance, select next oilspot location. 3
40. New Tactics 2 – IED counter-ambush A B Chokepoint – likely IED site somewhere in here Of all key locations, the actual IED site is least important. Look for early warning OPs, firing and assembly points, infil/exfil routes. Use friendly convoy movement as bait to trigger en action. Pre-position sigint and recon assets to identify teams moving into position, listen for the calls between OP and firing team. Use tank, atk helo or snipers for point engagement of firing team, with ground patrol follow up. Capture OP teams and exploit cellphone data. Spring elements to capture and exploit observation teams, kill or capture firing team, trace back to assembly point, local and district caches. This will require detainee exploitation and THT ops as well as physical exploitation of the firing point. Occupy the assembly point until done. Early warning zone Early warning zone OP OP Firing Point IED site Assembly Point cache Local cache District cache Sponsor
48. Albu Mahal NW Anbar, Nineveh First to turn against AQI Vines, McMaster The Iraqi revolt -- tribal ladder Revolt takes off Albu Isa Anbar, Ramadi Split btw AQI & tribal allegiance Albu Risha Minor tribe of Dulaim qabila Sitar Abu Risha Killed with 2 sons Sheikh Abd el Sittar ar Rishawi (youngest) survives Zobai Anbar, Zaytun, Baghdad Abu Abed (tribal military leader) (links to 1920s Bde and Moderate imams in Baghdad) Anbar People’s Council Anbar/Tigris Valley Smashed brutally by AQI Jan-Feb 2006 Sahawa al-Anbar (“The Awakening”) Abna al-Anbar / al ‘Iraq (sons of Anbar/Iraq) Battle of Ameriya 2-7 June 07 Ameriya Freedom Fighters Ghazaliya Guardians Concerned Local Citizens etc etc Allen, MacFarland L’Etoile, Burton Abu Abed Kuehl
49.
50.
51. The logic of local partnerships Option 1 – insert 50 000 U.S. troops into theater FOB security, logistics, HQ, rear area or other non-combat tasking: 30 000 Force available for combat tasking on a 1:1 or 2:1 rotation model: 20,000 Force actually out on the ground at any time (ie net effect): 7-10,000 Effect on enemy forces and recruiting base: NIL NET EFFECT: 7-10,000 pax improvement in force ratio Option 2 – win over 50 000 Iraqis into LSFs FOB security, logistics, HQ, rear area or other non-combat tasking: NIL Force available for combat tasking on a 1:1 or 2:1 rotation model: 50,000 Force actually out on the ground at any time (ie net effect): 40,000 Coalition forces required for partnering, mentoring and supervision: 5,000 Effect on enemy forces and recruiting base: -50,000+ NET EFFECT: 80-95,000 pax improvement in force ratio (ie 8 to 12 times the value of inserting CF)