irregular warfare & indirect approaches - contemporary security challenges

Upload: impellotyrannis

Post on 05-Apr-2018

217 views

Category:

Documents


1 download

TRANSCRIPT

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    1/106

    JSOUReport09-3

    Conte

    mporarySecurityChallenges:IrregularWarfareandIndirectApproaches

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    2/106

    Joint Special Operations Universityand the Strategic Studies Department

    Te Joint Special Operations University (JSOU) provides its publications

    to contribute toward expanding the body o knowledge about joint special

    operations. JSOU publications advance the insights and recommendations

    o national security proessionals and the Special Operations Forces (SOF)

    students and leaders or consideration by the SOF community and deense

    leadership.

    JSOU is the educational component o the United States Special Opera-

    tions Command (USSOCOM), MacDill Air Force Base, Florida. Te JSOU

    mission is to educate SOF executive, senior, and intermediate leaders a nd

    selected other national and international security decision makers, both

    military and civilian, through teaching, outreach, and research in the

    science and art o joint special operations. JSOU provides education to the

    men and women o SOF and to those who enable the SOF mission in a joint

    environment.

    JSOU conducts research through its Strategic Studies Department where

    eort centers upon the USSOCOM mission and the commanders priorities.

    Mission.Provide ully capable special operations orces to deend theUnited States and its interests. Plan and synchronize operations against

    terrorist networks.

    Priorities. Deter,disrupt,anddefeatterroristthreats.

    Developandsupportourpeopleandtheirfamilies.

    Sustainandmodernizetheforce.

    Te Strategic Studies Department also provides teaching and curricu-

    lum support to Proessional Military Education institutionsthe sta

    colleges and war colleges. It advances SOF strategic inuence by its interac-

    tion in academic, interagency, and United States military communities.

    Te JSOU porta l is https://jsoupublic.socom.mil.

    Joint Special Operations University

    Brian A. Maher, Ed.D., SES, President

    Lieutenant Colonel Michael C. McMahon, U.S. Air Force, Strategic Studies Department Director

    William W. Mendel, Colonel, U.S. Army, Ret.; Jerey W. Nelson, Colonel, U.S. Army, Ret.;and William S. Wildrick, Captain, U.S. Navy, Ret Resident Senior Fellows

    Editorial Advisory Board

    John B. AlexanderPh.D., Education, Te Apollinaire Group

    and JSOU Senior Fellow

    Joseph D. Celeski

    Colonel, U.S. Army, Ret.

    JSOU Senior FellowChuck CunninghamLieutenant General, U.S. Air Force, Ret.

    Proessor o Strategy, Joint AdvancedWarghting School and JSOU Associate Fellow

    Gilbert E. DoanMajor, U.S. Army, Ret.,JSOU

    Institutional Integration Division Chie

    Brian H. Greenshields

    Colonel, U.S. Air ForceSOF Chair, Naval Postgraduate School

    Tomas H. HenriksenPh.D., History, Hoover Institution

    Stanord University and JSOU Senior Fellow

    Russell D. HowardBrigadier General, U.S. Army, Ret.Faculty Associate, Deense Critical Language/

    Culture Program, Manseld Center, Universityo Montana and JSOU Senior Fellow

    John D. JogerstColonel, U.S. Air Force, Ret.

    18thUSAF Special Operations SchoolCommandant

    Alvaro de Souza PinheiroMajor General, Brazilian Army, Ret.

    JSOU Associate Fellow

    James F. Powers, Jr.Colonel, U.S. Army, Ret.

    Director o Homeland Security,Commonwealth o Pennsylvania andJSOU Associate Fellow

    Richard H. Shultz, Jr.Ph.D., Political ScienceDirector, International Security

    Studies Program, Te Fletcher School, usUniversity and JSOU Senior Fellow

    Stephen SloanPh.D., Comparative PoliticsUniversity o Central Florida

    Robert G. Spulak, Jr.Ph.D., Physics/Nuclear EngineeringSandia National Laboratories

    and JSOU Associate Fellow

    Joseph S. StringhamBrigadier General, U.S. Army, Ret.

    Alutiiq, LLC and JSOU Associate Fellow

    Graham H. urbiville, Jr.

    Ph.D., History, Courage Services, Inc.and JSOU Senior Fellow

    Jessica Glicken urnley

    Ph.D., Cultural Anthropology/Southeast Asian StudiesGalisteo Consulting Group

    and JSOU Senior Fellow

    Rich YargerPh.D., History, Proessor o National

    Security Policy, U.S. Army War Collegeand JSOU Associate Fellow

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    3/106

    On the cover. A U.S. Special Forces soldier conducts Security Assistance

    raining or members o the Armed Forces o the Philippines in March2003, on the Zamboanga Peninsula o the Philippine Island o Mindanao.

    Tis trainingto help Philippine orces rene their counterterrorism

    capabilitieswas provided as part o Operation Enduring Freedom-

    Philippines (OEF-P). U.S. Navy photo by Petty Ocer First Class Edward

    G. Martens.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    4/106

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    5/106

    JSOU Report 09-3

    he JSOU Press

    Hurlburt Field, Florida

    Contemporary

    Security Challenges:

    Irregular Warfare and

    Indirect Approaches

    Richard D. Newton, Travis L. Homiak,

    Kelly H. Smith, Isaac J. Peltier, and D. Jonathan White

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    6/106

    Comments about this publication are invited and should be orwarded to Director,Strategic Studies Department, Joint Special Operations University, 357 ully Street,

    Alison Building, Hurlburt Field, Florida 32544. Copies o this publication may be

    obtained by calling JSOU at 850-884-1569; FAX 850-884-3917.

    *******

    Te JSOU Strategic Studies Department is currently accepting written works relevant

    to special operations or potential publication. For more inormation please contact

    Mr. Jim Anderson, JSOU Director o Research, at 850-884-1569, DSN 579-1569,

    [email protected]. Tank you or your interest in the JSOU Press.

    *******

    Tis work was cleared or public release; distribution is unlimited.

    ISBN ---

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    7/106

    Te views expressed in this publication are entirely those o

    the authors and do not necessarily reect the views, policyor position o the United States Government, Department o

    Deense, United States Special Operations Command, or the

    Joint Special Operations University.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    8/106

    Recent Publications of the JSOU Press

    2006 JSOU/NDIA SO/LIC Chapter Essays, June

    One Valley at a Time, August , Adrian . Bogart III

    Special Operations Aviation in NATO, September , Richard D. Newton

    Beyond Draining the Swamp: Urban Development andCounterterrorism in Morocco, October , Stephen R. Dalzell

    Filling Special Operations Gaps with Civilian Expertise, December ,James F. Powers, Jr.

    Educating for Strategic Thinking in the SOF Community, January ,

    Harry R. YargerThe Israeli Approach to Irregular Warfare and Implications for the U.S.,February , Tomas H. Henriksen

    Psychological Operations: Learning Is Not a Defense Science Project,March , Curtis D. Boyd

    2007 JSOU and NDIA SO/LIC Division Essays, April

    Hunting Leadership Targets in Counterinsurgency and CounterterroristOperations, June , Graham H. urbiville, Jr.

    Executive Report, JSOU Second Annual Symposium ( April May )

    A Theory of Special Operations, October , Robert G. Spulak, Jr.

    Block by Block: Civic Action in the Battle of Baghdad, November ,Adrian . Bogart III

    Private Security Infrastructure Abroad, November ,Graham H. urbiville, Jr.

    Intelligence in Denied Areas, December , Russell D. Howard

    Is Leaving the Middle East a Viable Option, January ,Tomas H. Henriksen

    Retaining a Precarious Value as Special Operations Go Mainstream,February , Jessica Glicken urnley

    Disrupting Threat Finances, April , Wesley J.L. Anderson

    USSOCOM Research Topics 2009

    Indias Northeast: The Frontier in Ferment, September , Prakash Singh

    What Really Happened in Nortern Irelands Counterinsurgency,October , Tomas H. Henriksen

    Guerrilla Counterintelligence: Insurgent Approaches to NeutralizingAdversary Intelligence Operations, January , Graham H. urbiville, Jr.

    Policing and Law Enforcement in COIN the Thick Blue Line,February , Joseph D. Celeski

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    9/106

    vii

    Contents

    Foreword ................................................................................ix

    James D. Anderson

    The Seeds of Surrogate Warfare ............................................. 1

    Richard D. Newton

    Expanding the American Way of War: Working Through,With, or By Non-U.S. Actors .............................................. 19

    Travis L. Homiak

    Surrogate Warfare for the 21st Century ............................... 39

    Kelly H. Smith

    Surrogate Warfare: The Role of U.S. Army Special Forces ..... 55Isaac J. Peltier

    Legitimacy and Surrogate Warfare ....................................... 85

    D. Jonathan White

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    10/106

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    11/106

    ix

    Foreword

    The JSOU Press presents this collection o writings rom ve currentand ormer practitioners in the eld o irregular warare. Te writers

    delve into the concept osurrogate warare, dened as a substitute

    orce acting on behal o the interests o another as well as its own interests.

    For many special operators, the concept o unconventional warare provides

    the paradigm or working through, with, or by other orces to achieve stra-

    tegic objectives. Here the authors expand the concept by exploring surrogate

    warare. Tis volume provides insights into this aspect o modern warareand should be considered by senior military leaders and policymakers.

    Drawing upon their recent experiences in the eld, the authors provide

    practical lessons or their colleagues consideration.

    Te rst oering in this collection was contributed by Mr. Richard

    Newton, a JSOU aculty member and a retired air commando. Mr. Newton

    outlines the increased use and ramications o indirect approaches, made

    essential by the post-World War II rise o the two superpowers, the United

    States and the ormer Soviet Union. His account o three th century useso the through, with, or by concept (Philippines, El Salvador, and Aghani-

    stan) makes clear that this type o conict is ofen strategically pragmatic

    and eective at achieving U.S. as well as host national objectives.

    Major ravis Homiak, U.S. Marine Corps, denes the ideas o working

    through, with, or by surrogate orces to achieve national security objectives.

    He oers three historical examples to illustrate the added value o indirect

    approaches, including the nonpromotion o hegemonic intent. Major

    Homiak posits that the through, with, or by principles are critical to U.S.

    SOF, but applicable to conventional orces as well.

    Major Kelly Smith, a U.S. Army Special Forces ocer, provides an

    analysis o surrogate warare, mandating changes in policy and doctrine

    to include comprehensive guidance rom the U.S. government to develop

    and employ this capability. MAJ Smith outlines several advantages to the use

    o surrogates, including decreased demand on U.S. orces, gaining political

    legitimacy, and providing capabilities that U.S. orces lack. He also highlightsthe benets o a holistic approach, including conventional orces linkage

    to surrogates as well as SOF. Smith oers nite methods to integrating these

    concepts into U.S. policy and doctrine.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    12/106

    x

    Major Isaac Peltier, a U.S. Army Special Forces ocer, examines in detail

    two recent historical operations, illustrating success in leveraging surro-

    gate orces. His position is Army Special Forces-centric and concludes thatcultural/regional expertise, not amiliarity, was the single most important

    actor in these successes. MAJ Peltier also calls or improvements in the

    ability o U.S. SOF to establish and unction as an operational-level joint

    headquarters in order to plan, execute, and support an unconventional

    warare campaign.

    Mr. D. Jonathan White, a retired Special Forces ocer, discusses many

    salient points o surrogate warare, including legitimacy o allied regimes,

    commonality o interests between the United States and host nations, and theeects o human rights considerations on the legitimacy o the relationships

    involved. Te cautionary notes Mr. White examines in this essay must be

    analyzed by any prudent planner regarding surrogate warare operations.

    American military orces have served alongside host-nation orces

    throughout history and across the globe. Te surrogate relationships orged

    are critical to the continued deense against modern threats, and the points

    put orth in this volume will contribute to operational and strategic successesin uture campaigns. Tese writings all ampliy the need or developing and

    rening expertise in the use o surrogate orces in modern warare. I believe

    the military proessional will benet rom reading and understanding the

    various opinions oered in this volume.

    James D. Anderson, Director o ResearchJSOU Strategic Studies Department

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    13/106

    1

    Newton: The Seeds of Surrogate Warfare

    The Seeds of Surrogate Warfare

    Richard D. NewtonThe tenets of surrogate warfare as described in the following essays

    by Majors Peltier, Smith, and Homiakadvising, assisting, and train-

    ing indigenous forces in order to achieve the sponsors goals

    were developed, tested, and perfected during the U.S.-Soviet Union

    proxy wars of the Cold War. This essay examines three of those con-

    icts: Philippines from 19471952, El Salvador from 19771989, and

    Afghanistan from 19791989. They serve as examples ofcombatdevelopment laboratories where the principals of through, with,

    or by were perfectedprinciples that a new generation of SOF

    leaders would apply to surrogate warfare in the 21st century.

    Introduction

    In July o 1969, President Richard Nixon articulated a new approach to

    U.S. national security objectives. As a newly elected president who had

    inherited an unpopular war, President Nixons vision was to pursue

    American national security goals through partnership with riends and

    allies o the United States. Tat announcement, aferwards known as the

    Nixon Doctrine, armed to the world that the United States would keep

    all o its treaty commitments and in the case o aggression short o nuclear

    conrontation, the U.S. would urnish military and economic assistance but

    would look to the host nations to assume the primary responsibility or ur-nishing the manpower to deend themselves.1 Te Nixon Doctrine, allowing

    advice and assistance, but eschewing direct military involvement, has been

    rearmed by everyU.S. President since, albeit to diering degrees. More

    importantly or the purpose o this volume, however, Nixons 40-year-old

    pronouncement provided the policy basis or modern surrogate warare.

    Mr. Rick Newton retired from Air Force Special Operations Command in

    1999 after 21 years as an air commando and combat rescue pilot. He is

    currently a faculty member of the Joint Special Operations University and

    serves as an adjunct faculty member at the U.S. Army School of Advanced

    Military Studies and the NATO School.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    14/106

    2

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    Troughout the Cold War, both the United States and the Soviet Union

    used a collection o surrogates to urther their political, and by extension

    their military, agendas around the world. In an era o mutual nuclear deter-rence, both the U.S. and the Soviet Union chose to support surrogates in

    a series o proxy wars. Over 50 years o indirect conrontation between

    the superpowers maniested itsel in scores o limited conicts in Arica,

    the Middle East, Southeast Asia, South Asia, Central America, and South

    America.2 Te Soviets and the U.S. conronted each other or inuence

    and access on the periphery o what both considered the main arenathe

    central plains o Europe. Te unexpected (perhapsunintended) result o

    ve decades o indirect superpower conrontation was that U.S. SpecialOperations Forces (SOF) developed the skills, attitude, and ethos they

    later needed or the very successul surrogate warare campaigns waged in

    Aghanistan (2001) and northern Iraq (2003).

    Te seeds to modern surrogate warare, at least in the U.S. version, go all

    the way back to beore the Revolutionary War. Te Special Forces philoso-

    phy o conducting operations through, with, or by indigenous populations

    has its origins in the beginning o the Republic.3

    Both the British and theFrench enlisted native American surrogates in their rontier battles o the

    17th and 18th centuries. During the westward expansion beore and afer

    the Civil War, the Army recruited or coerced Indians to ght against those

    Indians who opposed the settlers, ranchers, and miners moving west. In

    1901, afer the Spanish-American War, the U.S. Army organized riendly

    Filipinos into the Philippine Constabulary to ght and paciy the indigenous

    groups opposed to the U.S. occupation. Troughout World War II, the U.S.

    Army Oce o Special Services, the orerunner to todays Special Forcesand the Central Intelligence Agency, used surrogates in Southeast Asia to

    ght against the Japanese and in Europe to ght against the Axis powers.

    It was only natural, then, or the U.S. to continue using native surrogates

    during the Cold War to counter Soviet aspirations.

    Aer the Allied victory in World War II many ormer European colonies

    in Asia and Arica saw an opportunity to assert their native nationalism and

    gain independence rom the colonial powers. Te Soviet Union used these

    independence movements as opportunities to export the Communist orm

    o socialism and to gain international supporters as a counter to the U.S. and

    its European allies. Te U.S., ush with victory but tired afer years o war,

    sought a low cost means o supporting its treaty commitments, assisting its

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    15/106

    3

    Newton: The Seeds of Surrogate Warfare

    allies, and countering the spread o Communism. As the U.S. government

    provided equipment and unds, training indigenous orces and advising

    riendly oreign governments and their armed orces became the SpecialForces raison dtre.

    Te U.S. Army and the U.S. Air Force retained their organizational, train-

    ing, procurement, and planning eorts to a near-exclusive ocus on peer

    versus peer, conventional warare.4 Both the Army and Air Force lef the

    uncomortable and oen messy environment o limited warare, guerrilla

    warare, insurgency, counterinsurgency, counterterrorism, counterrevolu-

    tionary warare, and irregular warare to their respective SOF.5,6

    Tis division o labor was not necessarily a bad thing. While the biggreen Army and the big blue Air Force ocused on what the national

    leadership perceived to be the most dangerous threat to the U.S. national

    survivaldeterring direct conrontation with the Soviet Union, SOF con-

    ducted economy-o-orce activities on the periphery o the main arena. For

    over ve decades, the U.S. Army Special Forces, and to a lesser extent, the

    Air Commandos o the U.S. Air Force, quietly practiced and perected the

    regional, cultural, diplomatic, and trainer skills so necessary or success insurrogate warare. Teir quiet eorts in the ar-ung regions o the world

    bred a cadre o special operators comortable with surrogate warare, away

    rom the comortable and robust inrastructure o the conventional Army

    and Air Force based primarily in central Europe.

    Although these low intensity conicts 7 were the most prevalent orm o

    conict the United States engaged in during the 1960s, 1970s, and 1980s, they

    were decidedly an economy-o-orce eort. Small SOF teams would deploy

    or months at a time to remotelocations; their ocus was to train,

    assist, and advise the indigenous

    orces and governments that

    supported U.S. national goals. In

    addition to the small-unit tactical

    skills they employed and taught

    their hosts, Special Forces train-

    ing included a healthy dose o regional amiliarity, local languages, cul-

    tural acumen, and instructor development. A Special Forces soldier had to

    become part anthropologist, part diplomat, part organizational developer,

    and part cultural attach as well as being an excellent soldier and trainer.

    Small SOF teams would deploy for

    months at a time to remote locations;

    their focus was to train, assist, and

    advise the indigenous forces and

    governments that supported U.S.

    national goals.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    16/106

    4

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    Operating embedded with or alongside their native hosts around the world,

    the Special Forces became this nations principal tool to recruit, organize,

    train, and lead surrogate orces sympathetic to U.S. national interests.Te Special Forces operational methodologyembedding with their

    host-nation counterparts, speaking the hosts languages, and using the hosts

    equipmentproved to be relatively inexpensive or the United States to

    sustain, kept the American presence to a minimum in areas that may have

    political aversion to oreign involvement, and improved the ability o the

    host orces to provide or their nations deenses. In return, U.S. Special

    Forces gained tactical skills related to the native environment (e.g., jungle

    warare or desert warare) they were able to bring home and teach to theirU.S. counterparts. Te lessons learned in scores o anti-Communist cam-

    paigns around the world were applied with great success during the uncon-

    ventional warare campaigns in Aghanistan (2001) and in northern Iraq

    (2003). Te seeds o 21st century surrogate warare were sown during those

    ve decades o anti-Soviet experiences and cultivated to maturity by the

    Special Forces core purpose and core valuesaccomplishing their assigned

    missions through, with, or by indigenous orces.8

    The Philippines, 19461954

    By 1942, the Hukbalahap (Peoples Anti-Japanese Army in agalog, nick-

    named the Huks)the military arm o the Communist Philippines Party

    (PKP)was actively attacking Japanese outposts and units in Luzon to gain

    weapons and supplies. Americans who had reused General MacArthurs

    surrender order and took to the hills helped the Huks organize their units,set up training camps, and served as advisors to the tactical units ghting

    a guerrilla campaign against the Japanese. When MacArthur and the U.S.

    Sixth Army landed on Luzon, they met a large, highly organized indig-

    enous military orce led byU.S. advisors. Te 20,000 Filipino guerrillas

    had eectively contained the Japanese to a series o coastal ortsthereby

    providing a sae and secure, anti-Japanese environment or the populace.9

    TePKP

    , meanwhile redistributed lands rom absent large landowners tothe peasants, set up schools, and ormed local governments to manage the

    villages.10

    Afer the war, when the government o the Philippines returned

    rom exile, it ailed to address the single greatest issue plaguing Filipino

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    17/106

    5

    Newton: The Seeds of Surrogate Warfare

    societyland reorm.11 When the government, the wealthy landowners,

    and the industrialists returned aer the war, they reasserted their historical

    claims to the land and returned to the 400-year-old plantation and tenantarming system that had been originally set up by the Spanish and main-

    tained by the Americans and then the Filipino oligarchy. It was an unair

    system that gave the PKP and the Huks the cause they needed, land or the

    landless, to oppose the government.12

    Te Huks did not initially oppose the return o the popular and power-

    ul American military. Also, the ruman Administration had committed

    to Filipino independence and was pumping reconstruction aid into the

    islands. Tis quiet period gave the PKP time to organize itsel and gaincontrol o the many disparate socialist and Communist groups throughout

    the Philippine archipelago. Te PKP, with Chinese and Soviet assistance,

    reoriented itsel against the pro-Western government o President Manuel

    Roxas and began a Maoist-style, protracted popular war to take over the

    country. From 1946 to 1949, the Philippine governments mailed st tac-

    tics and heavy handed anti-Huk policies ailed to address the root causes o

    the insurgency and drove many disaected peasants into the ranks o theinsurgents.13 Philippine Army leaders and their American advisors ghting

    against the Huks noted the success o the Huks integrated civil-military

    programs, but their reports were ignored by conventional military leaders

    who had been trained to ght against other organized armies in Western

    sta schools and were ocused exclusively on a military solution.14

    President Roxas was succeeded by President Elpidio Quirino. He recog-

    nized that a new strategy was needed to counter the Huks and in 1949 began

    a series o nancial and land reorms. President Quirino appointed a newsecretary or national deense in 1950, Ramon Magsaysay, a gied and char-

    ismatic ormer guerrilla leader who had ought against the Japanese with

    the U.S. Army Forces Far East, to lead the security eort. Also in 1950, the

    U.S. recognized how close the Filipino government was to collapse. President

    ruman committed the United States to support the Philippines eorts

    against the Communist-supported Huks. Te Joint U.S. Military Advisory

    Group (JUSMAG) Philippines was expanded, and aid and assistance began

    to ow. In addition to money, equipment, and training, American advi-

    sors helped the Philippine government develop a comprehensive assistance

    program to complement the military, political, and social reorms being

    instituted by Magsaysay.15

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    18/106

    6

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    Almost immediately afer assuming his duties, Magsaysay began an

    intense eort to reorm the Army o the Philippines, weeding out corrupt

    or inept senior leaders, demanding accountability or human rights abuses,and promoting ocers who supported his views on winning the support

    o the populace. Magsaysay was tireless in his eorts to change the peoples

    perception o the Philippine Army and National Police, spurred in part

    by his close riend and advisor, U.S. Air Force Lieutenant Colonel Edward

    Lansdale.

    Lt Col Lansdale led the American program to assist Magsaysay. It is

    interesting to note that U.S. eorts in the Philippines were constrained by

    some very ortunate circumstances. First, the U.S. military was committedto the reconstruction o Europe and Japan, and also to the war in Korea.

    Tere were no conventional U.S. Army units available or a counterinsur-

    gency eort in the Philippines. Second, all arms and materiel given to the

    Filipinos were taken rom excess World War II stocksthe weapons were

    amiliar to the Filipinos, the arms and ammunition were plentiul and were

    essentially ree, and they were airly easy to maintain. And third, Lansdales

    leadership style and close riendship with Ramon Magsaysay encouragedthe Filipinos to take responsibility or the success or ailure o their war

    against the Huks.

    Te American advisors in the Philippines, rom the battalion level to

    President Magsaysay, advised their counterparts on counterguerrilla tactics

    and encouraged them to orm local solutions. During an interview aer he

    had retired rom the Air Force, Lansdale noted that, the Filipinos best knew

    the problems, best knew how to solve them, and they did itwith U.S. aid

    and advice, but without U.S. domination o their eort. 16 American advi-sors were instructed to take a back seat and give their Filipino counterparts

    credit or successes.

    U.S. military trainers began teaching patrolling skills, especially night

    patrolling, squad and platoon tactics o the main lines o communica-

    tions, and the same hit-and-run tactics used by the Huk guerrillas. 17 More

    important than teaching tactics, U.S. trainers imparted Magsaysays pas-

    sion or improving the Armys treatment o the civilian population, and

    they helped reorganize the Army o the Philippines (AFP) into lighter and

    more mobile battalion combat teams. Tey also built a unctioning logistics

    system to sustain the units and equipment.18U.S. trainers were prohibited

    rom accompanying AFP units as advisors and observers during combat

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    19/106

    7

    Newton: The Seeds of Surrogate Warfare

    operations, however. Te thought was that the Americans would take over

    or be thrust into a de acto leadership role at the tactical level and the Huks

    would turn the presence o the Americans against the government by adver-tising their cause as a ght to expel another oreign occupier. Despite the

    advisors desire to get into the eld with their units, at the strategic level,

    this restriction proved to be sound.

    In 1953, though, an important change took place in the U.S. philoso-

    phyAmerican military advisors were nally permitted to accompany and

    observe, but not actively participate in, AFP combat operations. Whenever

    advice was shared, it was given directly to the tactical Filipino leader who

    needed it, as low in the organization as possible, and given by an advisorwho the recipient knew and trusted. In addition, the advisors/observers

    took note o the tactics employed, the eect military actions were having

    on the populace, and the how the U.S.-supplied equipment was used. When

    the advisors/observers returned to their base camps, these real-time lessons

    were used to update and improve training programs.

    Even though the U.S. government provided most o the material, arms,

    and money to und the AFP and provided advice when it was needed, it wasFilipinos who ought the battles against the Communist-sponsored Huks

    and ran the social and economic programs. By 1954, Filipino police, military,

    and civilian ocials, along with their American trainers and advisors, had

    successully neutralized the Huks through a coordinated military and civil-

    ian campaign, addressed the peasants social, economic, and educational

    grievances, and restored the legitimacy o the government. Te Filipinos,

    with the help o American advisors, had taken back their country rom the

    Communist insurgents.19

    El Salvador, 19771992

    In 1969, Salvador Cayetano Carpio, then the secretary-general o El

    Salvadors Communist Party (PCES), recommended starting a Maoist-style

    protracted popular war to overthrow the most recent military junta gov-

    erning El Salvador. Tis position was rejected by thePCES

    , and CayetanoCarpio was expelled rom the Party. In 1971, though, Cayetano Carpio and

    a group o El Salvadoran Communists returned rom years o training and

    indoctrination in Cuba and Vietnam to organize the countrys rst guerrilla

    movement, the Farabundo Marti Popular Forces o Liberation.20 Trough

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    20/106

    8

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    the 1970s, competing dissident groups ought the successive corrupt, ofen

    incompetent, and repressive governments and each other, struggling or

    control o a nation racked by poverty, corruption, violence, and disease.Human rights abuses by both the rebels and the government orces were

    common. By 1979 at least ve major insurgent groups were seeking to impose

    a Communist-style socialist government in El Salvador.

    Te governments internal problems, its string o human rights abuses,

    and the ailure to address the root causes o popular dissatisaction

    unemployment, lack o educational opportunities, desperately needed land

    reorm, and rampant government arrogancecaused disaected young

    men to ock to the rebels cause. Even priests in the normally noncommittalRoman Catholic Church began to dey their superiors counsel to remain

    neutral and took a more activist stance against the government. In 1979, the

    PCES nally accepted armed struggle as the only means o changing the

    government in El Salvador a position rst recommended 10 years earlier

    by Cayetano Carpio.21

    In December 1979, the ve major Salvadoran revolutionary groups

    gathered in Havana, Cuba at Fidel Castros invitation to organize into asingle, coordinated eort. Although the groups had disparate goals and

    backgrounds, the common theme was their desire to impose a Communist-

    style government in El Salvador to rectiy the missteps and abuses o centu-

    ries o colonial, then military, rule. In 1980, the Farabundo Mart National

    Liberation Front (FMLN) asserted itsel as the single revolutionary party in

    El Salvador. Te FMLN was able to secure economic and military aid, nanc-

    ing, and training rom the Soviet Union, Libya, Cuba, Nicaragua, and even

    radical groups in the United States to support its revolutionary goals.Although purporting itsel to be the single voice o revolutionary change

    in El Salvador, the FMLN was an inherently weak organization. Te FMLN

    had tenuous control at best o the various rebel groups.22 More a loose coned-

    eration o local guerrilla organizations than a strong, united revolutionary

    ront committed to new El Salvador, the FMLN was never able to reconcile

    the diverging and usually competing strategies employed by the dierent

    actions.23 For example, a Cuban-style oco model employed by an urban-

    based group ofen conicted with the Maoist popular war strategy used by

    a rural group. Te result was contradictory political, social, and military

    FMLN operations over the course o the war that gave the government much

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    21/106

    9

    Newton: The Seeds of Surrogate Warfare

    needed time to adjust its own social and economic programs, change its

    military tactics, and address its internal deciencies.

    In January 1981, the FMLN called or a nal oensive, a Maoist-styleStage 3 eort to deeat the government using conventional military orce.

    Te move was premature, however, and the army deeated the rebels and sent

    the insurgents into the mountains or sanctuary. Te Carter Administration

    in the United States reacted to this FMLN/Communist threat by restoring $5

    million in military aid. In 1982, the newly elected Reagan Administration

    committed the U.S. to political, economic, and military assistance in El

    Salvador to counter Soviet-sponsored Communist expansion in the Western

    hemisphere.24

    Remembering the recent lessons o Vietnam, the size o the U.S. con-

    tingent was limited to 55 military advisors and trainers. Te Americans

    set up training camps in El Salvador and in neighboring Honduras; they

    also sent two to three ocers or NCOs to live and work with each o the six

    Salvadoran brigades. Te mission o these assigned advisors was to reinorce

    the lessons taught in the training centers, provide assessments o the units

    eectiveness, and change the El Salvadoran Armys historically terriblehuman rights record.

    More like the American experience in the Philippines than in Vietnam,

    advisors were prohibited rom engaging in combat operations in order to

    maintain the perception that this

    was an El Salvadoran war to be

    won or lost by the El Salvadorans.

    Another consequence o the small

    U.S. presence was the ease by whichU.S. advisors and the accompany-

    ing aid package could be withdrawn rom those units not actively correct-

    ing their human rights problems. Te Armys treatment o noncombatants,

    innocent civilians, and prisoners radically and quickly improved because

    o this carrot and stick approach to behavior modication.

    Changing the El Salvadoran Armys attitude towards its civilian popu-

    lation allowed the government to begin ocusing on the root causes o the

    insurgencyland reorm, the lack o educational opportunities, a sickly

    economy, and a corrupt electoral process. Basing U.S. military aid on dem-

    onstrated social and political improvements was beginning to pay o as

    More like the American experience

    in the Philippines than in Vietnam,

    advisors were prohibited from

    engaging in combat operations

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    22/106

    10

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    popular support or the FMLN began to swing to the government. But in

    1983, FMLN guerrillas adjusted their tactics and sent small, highly trained

    teams o commandos to execute a series o successul raids against heav-ily deended El Salvadoran bases. U.S. advisors also adjusted quickly and

    reoriented the training and advisory programs to ocus on small-unit tac-

    tics more appropriate to a counterguerrilla style o warare.25 More impor-

    tantly, however, the changes in tactics, attitudes, and treatment o civilians

    that resulted rom the actions oU.S. trainers and advisors supported the

    larger, longer-term eorts o El Salvadors multiaceted national campaign

    or deeating the FMLN.

    As the El Salvadoran Army changed its tactics, its attitude, and its trackrecord, the climate or political change improved too. In March 1984, Jos

    Napolen Duartea previous mayor o the capital, San Salvador, a graduate

    o Notre Dame, and the president o El Salvador rom 1980 to 1982was

    reelected to the presidency on a platorm o social and economic reorms,

    eliminating human rights abuses, and negotiation with the FMLN. Duartes

    election, El Salvadors rst ree election in 50 years, was marred by the act

    that El Salvador was in near ull civil war. Over the next ew years, Duartewas unable to institute most o his promised economic and social programs

    due to intransigence by both the insurgents and the hard-liners in his own

    administration. In 1989 Duartes Christian Democratic Party was deeated

    by Alredo Christiani and the ARENA party, the rst peaceul transer o

    power to an opposition candidate in El Salvadors history.26

    Te Soviet Unions troubles at home and abroad contributed to chang-

    ing the FMLNs reluctance to negotiate. Te Soviets were trying to extricate

    themselves rom Aghanistan, were dealing with nationalist independencemovements among their client states in the Soviet Union and the Warsaw

    Pact, and had a ailing economy at home. In neighboring Nicaragua, the

    newly elected Violeta Chamorro government had decided to ocus on inter-

    nal problems; they also stopped supporting the FMLN insurgents. With the

    insurgents external military, economic, and nancial support reduced to a

    trickle, and the U.S. Congress threatening decreased support to the govern-

    ment, both sides came to the negotiating table in 1990. By 1991, negotiations

    with the FMLN produced a truce that ended the war in 1992, created a new

    Constitution, established a civilian police orce, and transormed the FMLN

    into a legal political party.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    23/106

    11

    Newton: The Seeds of Surrogate Warfare

    Te government o El Salvador and its military and police orceswith

    the aid, advice, and assistance o the United States and the U.S. military

    advisorshad deeated the Communist-sponsored FMLN insurgency.

    Afghanistan, 19791989

    Aghanistan sits astride the crossroads o civilizations. For over two millen-

    nia, trade routes rom China and India to Europe and Arabia have passed

    through this mountainous and oen barren land. Great invading armies

    rom Alexander to the Mongols, the British, the Soviets, and now the U.S.

    and its European allieshave had to deal with the quandary that was andis Aghanistan.

    Troughout its thousands o years o history, Aghanistan has main-

    tained its traditional tribal and amilial culture. When Islam arrived with

    Arab invaders in the 7th century, it provided a loose sense o pseudo-nation-

    alism, giving the tribes a sense o culture, morality, and tradition that would

    normally have come rom a shared development and common history. But

    when aced with stress or conict, Aghans normally reverted to their ami-lies, clans, and tribes or security, saety, and comort. Te Soviets, during

    their 50 years o involvement with Aghanistan during the Cold War, ailed

    to address this key trait o Aghan society and culture.

    As early as 1919, just afer the Russian Revolution, the Soviet Union

    was unneling money, arms, and training to support Aghan rebels ght-

    ing the British in India (present day Pakistan). According to Dr. Stephen

    Blank at the U.S. Air Force Air University, Soviet involvement had turned

    Aghanistan into a virtual client state. 27 By the mid-1960s, the Soviet Unionwas sending millions o dollars each year in economic, military, and political

    aid to Aghanistan. Soviet investment in Aghanistan guaranteed they held a

    strategic position between two U.S. allies in the region, Pakistan and Iran.

    In 1973, Mohammed Daoud Khan became the rst president o

    Aghanistan aer overthrowing the monarchy o Zahir Shah in a bloodless

    coup. Daoud was a Pashtun who supported an independent Pashtunistan.

    Tis position ensured theU.S.

    would not look avorably on supportingAghanistan against the Soviets, as an independent homeland or the

    Pashtuns would require the U.S. ally, Pakistan, to give up major portions

    o its territory. In an eort to secure his position in the region, aced with

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    24/106

    12

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    a complex and unstable internal political situation, and recognizing that

    Aghanistan was one o the poorest, least educated, and backward societies

    in the world, Daoud continued Zahir Shahs policies o accepting Soviet aid,advice, and assistance.28 In 1977, however, Daoud began to move away rom

    the Soviet Union and the Cuban-led nonaligned movement. With U.S. sup-

    port and concurrence, he requested and received training rom Egypt and

    aid rom both Iran and Saudi Arabia. Daoud began the process o shifing

    Aghanistans orientation towards the oil-rich and pro-Western nations o

    the Arabian Gul.29

    In August 1978, a group o Soviet-trained Aghan ocers and the pro-

    Soviet Peoples Democratic Party o Aghanistan (PDPA) seized control othe government and ounded the Democratic Republic o Aghanistan.

    President Daoud was assassinated and a Marxist, Nur araki, was installed

    as president.30 Unortunately, the PDPA was not ready to govern such a

    large and diverse country as Aghanistan. With its urban base, its Marxist-

    Leninist orientation, and with the concurrence o its Soviet advisors, the

    PDPA attempted to change Aghan traditions.31 Te PDPAs Marxist-Leninist

    antipathy towards both religion and the peasantry resulted in misguidedpolicies regarding land reorm, emale emancipation, language, and religious

    observances. Tese unpopular changes were strongly resisted by the local

    political and religious leaders and resulted in open rebellion against the

    PDPA-led government.

    With entire units deecting and the Aghan army down to hal its

    strength, the Aghan government looked to the Soviet Union or help to

    quell the rebellion. In July 1979, the Soviets sent an airborne battalion to

    Bagram Air Base to protect President araki. Shortly thereaer, the arakigovernment requested an additional two motorized rie divisions and an

    airborne division be deployed to Aghanistan. While the Soviets were anx-

    ious to keep Aghanistan in their sphere o inuence, they were not in a

    hurry to honor the araki governments requests or a large commitment

    o troops and equipment, however.

    By December 1979, the situation in Kabul had deteriorated to the point

    that the Soviet General Sta sent a group o specialized airborne and intel-

    ligence troops to help liberate Aghanistan. Te Soviets installed Babrak

    Karmal into power.32 In the spring o 1980, Soviet ground troops deployed

    to Aghanistan and an airborne division deployed to Bagram Air Base. Te

    Soviet incursion had the opposite o the desired eectinstead o calming

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    25/106

    13

    Newton: The Seeds of Surrogate Warfare

    or controlling the rebellion, the Soviets presence incited an unexpected

    eeling o Aghan nationalism. It was as i the only thing the disparate tribes

    would agree on was that they did not want oreigners in their country.From 1980 to 1985, the ght in Aghanistan devolved into a classic guer-

    rilla campaign. Te Soviets and their Aghan clients occupied the cities and

    controlled the main transportation arteries, while 80 percent o the coun-

    tryside was controlled by the opposing tribes.33 By 1985, over 110,000 Soviet

    troops were deployed to Aghanistan to combat approximately 100,000

    mujahideen ghterssignicantly short o the doctrinally recommended

    ratio o 10 soldiers or every guerrilla combatant.34

    Almost as soon as the Soviets began their deployment to Aghanistan,the United States sought ways o countering the Soviet incursion. President

    Carter and then President Reagan both authorized intelligence and aid

    packages to assist the Aghan guerrillas. President Reagan increased the

    pressure on the Soviets by encouraging U.S. allies and regional partners to

    provide arms, money, and training to surrogates willing to challenge the

    Soviets growing inuence and presence in South Asia.

    U.S. support o the Aghans was intentionally low key. Although theCarter and Reagan administrations were keen to challenge Soviet expansion

    in South and Southwest Asia, they had to be mindul o national and cul-

    tural sensitivities in the region and o provoking the Soviets to expand the

    conict by engaging their own proxies in the regionIndia, Iraq, and Syria.

    Te U.S. supported Middle Eastern surrogates rom Saudi Arabia, the United

    Arab Emirates, Egypt, and Iran to supply military, humanitarian, and nan-

    cial aid to the mujahideen, through Pakistan.35 Te external aid consisted o

    modern light inantry weapons, primarily rom the Soviet Union and theWarsaw Pact, and the training provided built upon the Aghans traditional

    ghting methodsambushes and raids against the vulnerabilities inherent

    in the Soviets mechanized, conventional style o warare. Tese were the

    same guerrilla techniques the Aghans oreathers had employed in the 19th

    century against British conventional battalions.

    From sanctuaries outside o Aghanistan, primarily in Pakistan, advi-

    sors and trainers worked with the Aghan resistance on individual and

    small-unit skills. More importantly, though, they developed communi-

    cations techniques and ostered coordinated operations between tactical/

    tribal unitsan inherent deciency in the Aghans clan-based and amilial

    traditions. With a supply o amiliar arms and ammunition assured rom

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    26/106

    14

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    external sources, the Aghans learned to integrate modern heavier weap-

    ons such as machine guns, wired-guided antiarmor missiles, and rocket-

    propelled grenades in a supporting role, yet still retaining their traditionalghting methods.

    Te Soviets countered improved Aghan guerrilla tactics with air mobil-

    ity and aerial re support to great eect. Mi-24 attack helicopters and Su-25

    attack aircraf oset the Aghans inherent mobility, knowledge o the ter-

    rain, and improved weapons.36 In 1986, though, the U.S. changed the equa-

    tion again in avor o their surrogates by providing Stinger antiaircraf

    missiles and training to the Aghans.37 Te threat o the Stingers neutral-

    ized the Soviets heliborne advantage, and the war returned to its previousunpopular, costly, and near stalemate conditions.

    When Mikhail Gorbachev became the prime minister o the Soviet Union

    in 1988, he promised to withdraw Soviet orces rom Aghanistan within the

    year. Te rst Soviet units began their withdrawal by the spring o 1988, and

    the entire Soviet Army had lef Aghanistan by February 1989.38 Te Soviet

    Union paid a terrible price or its adventure in Aghanistanin lost con-

    dence in the Communist ideology at home and among its client states, intens o thousands o physical and psychological casualties, and in lost power

    and prestige worldwide. Tough it was not one o the expected outcomes o

    U.S. actions in Aghanistan at the time, U.S. surrogates and their American

    advisors helped orce the eventual collapse o the Soviet Union.

    Conclusion

    Te war in Vietnam ocially ended in April 1975 when North Vietnamesearmored columns deeated the Army o the Republic o South Vietnam,

    although U.S. involvement had ended in 1973 with the signing o the Paris

    Peace Accords. In the afermath o Vietnam, Americas ocer corps reori-

    ented itsel away rom those activities they perceived had ailed to win in

    Vietnam.39 Among their rustrations was that despite years o military assis-

    tance, the South Vietnamese Army had been unable to eliminate Viet Cong

    insurgents in the South or to stem the invasion by North Vietnamese regularorces attacking rom the north.

    Te Nixon Doctrine reected the Presidents rustration and the nations

    determination to not place large bodies o American soldiers in harms way

    again, deending another nation against an internal or an external aggressor.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    27/106

    15

    Newton: The Seeds of Surrogate Warfare

    Tough the series o proxy wars over the next three decades was widespread

    and requent, these politically uncertain, unconventional, irregular, and/or

    low intensity conicts provided a persistent and unwanted distraction romthe Department o State and Department o Deenses main task o deter-

    ring direct conict with the Soviet Union. Conventionally minded Deense

    leaders happily passed responsibility or the U.S. militarys response to the

    Soviets proxy wars to the nations SOF. Tat orce evolved into a low cost

    and low ootprint unconventional orceorganized, trained, and equipped

    to advise, assist, and train U.S. surrogates in distant regions and to counter

    Soviet-sponsored aggression in the developing world.

    Over the course o the Cold Wars proxy wars, the U.S. had to relearnthat indigenous opposition groups were rarely unied. Tey, like con-

    stituent groups in every country, had personal agendas and specic goals.

    Successul U.S. advisors studied and learned as much as they could about

    their opponents objectives, ideologies, cultures, motivations, heritage, and

    traditionsthis was the anthropologist, diplomat, and cultural attach part

    o their advisory role. Special operations advisors exploited those dierences

    and sensitivities when helping their hosts develop, implement, and adjustthe social, economic, political, and security programs needed to counter

    insurgents around the world. Tose young Special Forces ocers held onto

    the lessons they learned during these surrogate/proxy conicts around the

    world; and as they became senior leaders and mentors, they passed those

    lessons on to the next generations o special operations advisors.

    Te Philippines, El Salvador, and Aghanistan are three o the major

    instances where U.S. military advisors developed and rened the tactics,

    techniques, and procedures or successul surrogate warare. Te Kennedyand Johnson Administrations seemingly ignored the lessons learned in the

    Philippines, Americanized the South Vietnamese Army into a modern

    conventional orce, and thus the U.S. and their South Vietnamese allies

    ailed to deeat the Communist North Vietnamese.40 In El Salvador and

    against the Soviets in Aghanistan, political restrictions kept the U.S. pres-

    ence small, but the U.S. took great advantage oSOFs unconventional war-

    are skills in physically and politically risky environments. Te indigenous

    surrogates, with the economic and military aid and the corresponding

    training originally promised by the Nixon Doctrine and implemented by

    Presidents Carter and Reagan, deeated the Soviets and Soviet-sponsored

    adversaries.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    28/106

    16

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    By the time U.S. and Aghan Northern Alliance orces had deeated

    the aliban, the Soviet Union had died and the ideological motivation had

    changed. In the Philippines, El Salvador, and Aghanistan, U.S. advisorsand trainers developed and perected the principles o through, with, or

    by described in the essays by Majors Homiak, Peltier, and Smith. Te doc-

    trine and the integrated social, political, economic, and military tactics,

    techniques, and procedures or surrogate warare these ocers and their

    contemporaries applied as combat leaders in Aghanistan and Iraq are the

    product o ve decades o uncomortable, politically dicult, and ofen

    messy proxy wars between the U.S. and the Soviet Union.

    Endnotes. Richard M. Nixon, Address to the Nation on the War in Vietnam, November

    ; available rom www.presidency.ucsb.edu/ws/index.php?pid= (accessedon December ).

    Also Bard E. ONeill, Insurgency & errorism: Inside Modern RevolutionaryWarare (Dulles, VA: Brasseys, Inc., ), .

    . Afer the end o the World War II, and once the Soviets gained nuclear weap-ons and the ability to deliver those weapons onto U.S. soil, the two superpowersengaged in over ve decades o surrogate conrontation. In proxy wars romVietnam to Angola, El Salvador, Aghanistan, and Yemen (and the list goes on),the U.S. and the U.S.S.R. armed, equipped, trained, and at times lead the soldiersand the guerrillas o rd World nations, seeking to bring or retain those nationsin their competing camps o democracy or communism.

    . COL Mark Boyatt, Special Forces: Who Are We and What Are We? SpecialWarare, Summer , .

    . A conventional American general told an interviewer rom the Rand Corporationin , Ill be damned i I permit the United States Army, its institutions, itdoctrine, and its traditions to be destroyed just to win this lousy war. Quotedin Ian F. W. Beckett,Modern Insurgencies and Counter-Insurgencies (London:Routledge, ), .

    . GEN John Galvin, as the commander o U.S. Southern Command, coined theterm Uncomortable Wars when reerring to this environment in the winter edition oParameters, the U.S. Army War College proessional journal.

    . Air Force Manual -, actical Air OperationsSpecial Air Warare (Washington,DC: HQ Air Force, March ), . Basically, the task o Air Force COIN orces

    is to provide advice, training, and assistance to indigenous orces.

    . Low intensity conict was a pseudonym used in the s and s to reer to theconicts usually ought by guerrillas, most oen revolutionaries and insurgents,seeking to change the political status quo. Unortunately, the term is misleading,

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    29/106

    17

    Newton: The Seeds of Surrogate Warfare

    as combat may have been contained to a particular country or region, or by thedestructive capacity o the weapons involved, but it was rarely o low intensity.

    . Boyatt, . Te Special Forces core purpose is to accomplish its missions through,with, or by indigenous populations, and their core values are unconventionalism,strength o character, doing what is right, and making a dierence.

    . Robert B. Asprey, War in the Shadows: Te Guerrilla in History, Vol. 1 (New York:William Morrow and Co, ), .

    . Ian F.W. Beckett, Modern Insurgencies and Counter-Insurgencies (London:Routledge, ), .

    . Asprey, .

    . Walter Laqueur, Guerrilla: A Historical and Critical Study (Boulder, CO: Westview

    Press, ), . Potentially, the Huks had even greater peasant appealthan had either the Chinese or Vietnamese Communists; they had laid the broadoundations or it during the war on the dual count o ghting the invader andtheir insistence on a just redistribution o the land.

    . Beckett, .

    . Napoleon D. Valeriano, Counter-Guerrilla Seminar at Fort Bragg, NC, June; received rom www.icdc.com/~paulwol/colombia/hukcampaignju-neI.htm (accessed on December ). COL Valeriano led the Filipinoth Battalion Combat eam against the Huks.

    . MAJ Lawrence M. Greenberg, Te Hukbalahap Insurrection: A Case Study o aSuccessul Anti-Insurgency Operation in the Philippines, 1946-1955 (Washington,DC: U.S. Army Center or Military History, ), .

    . Greenberg, .

    . Greenberg, . Luis aruc, leader o the Huks, noted that American aid andadvice was causing the tide o battle to change as the Philippine governmentwas changing its tactics and addressing the social and economic causes o theinsurgency.

    . Greenberg, .

    . Ibid., .

    . Asprey, .

    . Ibid., .

    . Ibid., .

    . ONeill, .

    . Ibid., .

    . Aprey, .

    . www.nationsencyclopedia.com/Americas/El-Salvador-History.html (accessed on

    December ).. Dr. Stephen Blank, Soviet Russian and Central Asia, in Low-intensity Confict in

    the Tird World, Lewis B. Ware, editor (Maxwell AFB, AL: Air University Press,August ), .

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    30/106

    18

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    . Asprey, .

    . Blank, .

    . Ali Ahmad Jalali and Lester W. Grau, Te Other Side o the Mountain: Mujahideenactics in the Soviet-Aghan War(Quantico, VA: U.S. Marine Corps Studies andAnalysis Division, no date), vxi.

    . Anthony J. Joes, Resisting Rebellion: Te History and Politics o Counterinsurgency(Lexington, KY: University o Kentucky Press, ), .

    . Asprey,.

    . Beckett, .

    . Joes, .

    . Grau, xviii.

    . Richard A. Clarke,Against All Enemies: Inside Americas War on error(NewYork: Simon & Schuster, Inc., ), .

    . Beckett, and Clarke, -. Clarke goes on to quote Assistant Secretary oDeense, Richard Perle, as insisting that the U.S. Army advisors conduct all Stingertraining rom bases in Pakistan.

    . Clarke, .

    . Te Economist, Afer Smart Weapons, Smart Soldiers, no author given, October , .

    . Joes, .

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    31/106

    19

    Homiak: Expanding the American Way of War

    Expanding the American Way of War:

    Working Through, With, or ByNon-U.S. ActorsTravis L. Homiak

    The indirect method of through, with, or by seeks to use relation-

    ships with non-U.S. actors and shared recognition of a common

    problem to produce mutually benecial outcomes. This indirect

    approach supports achieving U.S. operational objectives with-out promoting perceptions of U.S. hegemony. Consequently, this

    method offers the combatant commander a viable alternative to

    traditional, direct applications of U.S. military power.

    Te U.S. is widely perceived as emphasising military power as a tool

    o oreign policy, at the expense o the complexities o diplomacy and

    other orms o sof power. Francois Heisbourg, American Hegemony? Perceptions

    o the U.S. Abroad, Survival, (Winter 19992000), 13

    Introduction

    T

    he United States has unparalleled national power and global reach.

    Logic dictates that such power should acilitate the United States

    achieving its national objectives. Americas national power has reallimits in what it can achieve, however.

    Te United States currently has no peer competitors able to realisti-

    cally challenge them in a conventional military conict. As a result, the

    Major Travis Homiak is a U.S. Marine Corps Intelligence ofcer currently

    serving as the Plans Ofcer, Marine Forces Special Operations Command.

    He submitted this paper while attending the School of Advanced Warghting

    (Quantico, Virginia) where he was pursuing his M.S. in Operational Studies.

    He would like to thank Lieutenant Colonel Anthony Abati, U.S. Army, for

    acting as his mentor during this project and Messrs. Wade Ishimoto and Mark

    Boyatt for reviewing earlier drafts.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    32/106

    20

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    U.S. increasingly chooses direct applications o military power to achieve

    national security objectives.1 Te direct use o military power (or the threat

    thereo) is one element o the nations hard power and constitutes a tradi-tional approach to employing military orce.2 Te invasions o Aghanistan

    in 2001 and Iraq in 2003 are both examples o Americas traditional employ-

    ment o hard power.

    Yet, U.S. military power, applied traditionally in Iraq and Aghanistan,

    has proven incapable o achieving its intended policy goals. Particularly in

    the case o Iraq, one can argue that Americas decision to directly apply mili-

    tary powernotwithstanding the act that the U.S. arguably acted unilat-

    erallyhas signicantly hamperedits ability to realize stated policy

    objectives. Tis example illustrates

    a concern upon which this paper

    is basedthat the direct applica-

    tion o military power to achieve a

    policy objective, at the expense o

    less obtrusive military alternativesand balanced employment o national power, may retard rather than enable

    the realization o those objectives.

    According to Robert Kagan, Americas preeminent military power spawns

    a proclivity or direct, unilateral action in pursuit o its policy goals. Kagan

    maintains that it is precisely Americas vast military power relative to the

    rest o the world that makes its direct use so dicult to sanction.3 Moreover,

    the direct, unbalanced employment o military power tends to paint the

    United States as a hegemon vis--vis the rest o the world. Consequentlyother nations, to include potential partners, eel threatened by Americas

    actions and tend to oppose them as a counterbalance.4

    I Americas preeminent military power makes direct applications o

    military power problematicspecically, traditional applications o military

    powerthe United States must develop an alternative approach. Such an

    alternative must include a less intrusive, indirect method that emphasizes

    nontraditional applications o military power. Unlike the of ill-perceived

    direct approach, this indirect technique should ocus on building mutually

    benecial relationships with other agents or actorsnamely, relationships

    that enhance our partners capacity and will to take actions that promote

    the realization oU.S. national security goals.

    the direct application of military

    power to achieve a policy objec-

    tive, at the expense of less obtrusive

    military alternatives and balanced

    employment of national power,

    may retard rather than enable the

    realization of those objectives.

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    33/106

    21

    Homiak: Expanding the American Way of War

    It is useul to consider unconventional warare (UW), a acet o military

    operations that emphasizes indirect methods while seeking to dene and

    develop an indirect alternative to the traditional, direct approach. A keycomponent oUW ocuses on working through, with, or by indigenous

    or surrogate orces that are organized, trained, equipped, supported, and

    directed in varying degrees by an external source. 5 Working through,

    with, or by non-U.S. actors oers combatant commanders an indirect

    method or resolving dynamic, highly complex problems and achieving

    operational-level objectivesa method that, depending on circumstances,

    can be politically more palatable and practically easible than employing a

    traditional, direct approach. Tis paper will explore through, with, or byas a methodology: dening the terms, discussing the methodologys appli-

    cation at the operational level, and considering the associated implications

    at the combatant-command level.

    What is Really Meant by the PhraseThrough, With, or By? 6

    Te phrase through, with, or by can be explained by examining dierent

    relationships between two notional actors (i.e., Actor A and Actor B) and

    their relative capacities and will or undertaking action. In broad terms,

    working through, with, or by reers to the idea that Actor A directly or

    indirectly builds Actor Bs capacity and will to take action to address a

    given problem, the resolution o which benets both parties. Within this

    construct, capacity reers to an actors ability to undertake action in a given

    situation, while willreers to an actors ability to decide his own actions. Willhas three components: recognition o the problem, desire to take action,

    and determination to see that action through to completion. For clarity, the

    terms through, with, or by will be addressed rom most to least visible

    with regard to the overt nature o underlying interactions, rather than den-

    ing them in the order in which they appear in the Joint UW denition.

    With is the most overt association in the methodology, necessitating

    a physical presence and associated interaction between Actors A and B.

    Accompanied by or accompanying best denes the concept o working

    with another agent. 7 In a relationship dened as working with, Actor A

    works alongside Actor B to address a given problem while providing Actor B

    with the capacity, will, or both required to act. In this relationship, Actor A

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    34/106

    22

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    works side by side with Actor B, while acilitating the resolution o a mutual

    problem.8 Working with another actor is an on-the-scene activity where

    Actor A is physically present with Actor Bthat is, sharing ideas, providingadvice, and combining resources.

    A special operations assistance mission whereby Actor A trains and

    equips (builds capacity) in Actor B and then ghts alongside him (provides

    will) demonstrates working with in terms o a military task. An excellent

    historical example is provided by Special Operations Executive/Oce o

    Strategic Services (SOE/OSS) operatives who equipped and ought alongside

    itos partisans in Yugoslavia during World War II. SOE/OSS operatives

    built the partisans capacity or action through aerial-delivered equipment,bolstered their will through their presence as representatives o the Western

    Allies (at least initially), and ought side by side to deeat the Germans in

    the Balkans.9

    Te second o the three relationships in order o observability is working

    through and reers to achieving an objective by means o. 10 Working

    through implies a relationship in which Actor A works behind the scenes

    to provide Actor B with the capacity, will, or both to take action against agiven problem, the resolution o which benets both actors. Te key compo-

    nent to working through is Actor As reduced level o direct involvement

    in eorts to address the shared problem. In a through relationship, Actor

    A employs Actor B as a surrogate, enabling actions intended to resolve a

    shared problem by precursor counsel, training, equipping, or combination

    thereo.

    According to this denition o through, capacity building is not

    restricted to increasing physical capability, but can also apply to empower-ing the actions o other actors. I Actor B possesses the physical capability

    to take action but lacks the reedom to do so, and Actor A can sanction

    Actor Bs actions, then Actor A is working through Actor B by granting

    Actor B permission to act. Furthermore, in contrast to working with,

    working through necessitates sharing ideas and providing advice with-

    outovertly taking action against the common problem. While through

    demands cooperation between the actors, it has no requirement or com-

    bined action.11

    In terms o military tasks, through can best be illustrated by advising

    and training missions that all under the aegis o oreign internal deense

    (FID). Since 2002, the U.S. has perormed multiple FID missions, working

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    35/106

    23

    Homiak: Expanding the American Way of War

    through several countries. Specically, a low-visibilityFID mission was

    conducted in Yemen in mid-2003, providing their security orces with

    enhanced capacity.12

    In June o that same year, Yemen used its increasedcapacity to eliminate elements o the Islamic Army o Aden-Abyan (IAA), an

    Al Qaeda aliate linked to the bombing o the USSCole.13 Tus, by working

    through Yemen to eliminate a terrorist threat, the U.S. enhanced Yemens

    internal security while concurrently supporting the war on terrorism.

    By is the third and nal relationship o the indirect context, promoting

    achievement o a desired outcome through the agency or instrumentality

    o another.14 By assumes that an actor, who possesses the capacity and

    will sucient to address a given problem, is going to engage that problem.Te essence o by is that Actor B takes action to achieve an objective

    desired by Actor A, without Actor A necessarily prompting Actor B to do so.

    One can reasonably expect Actor B to address the problem, because Actor

    B recognizes the problem and has both the capacity and will to undertake

    action toward resolving it.

    When the relationship o by is operative in a system composed o

    at least three actors, the system can be considered to be sel-regulatingbecause no input is required rom Actor A to elicit action on the part o

    Actor B. What is required or by to unction is that both actors recognize

    the problem and perceive that solving it will yield a benecial outcome. By

    is the least obtrusive o the three relationships because it may not require

    any initiating action on the part o Actor A. Actor B simply acts because

    he recognizes the benet. In Actor Bs mind, it may be merely coincidental

    that Actor A also benets rom Bs actions. On the other hand, a relation-

    ship characterized as by can be the result o having previously workedthrough and with an actor, building the capacity and will required or

    the uture action. Tus, working through and with may be viewed as

    stepping stones to creating a sel-regulating system in which actors take care

    o problems that aect the entire system without the prompting or direct

    involvement o others to do so.

    Te Iranian role in the Dhoar Rebellion in Oman (19621975) is an

    excellent example o the U.S. working by another actor. Beginning in 1959

    and continuing into the late 1970s, the U.S. worked through Iran in an

    eort to contain the Soviet Union.15 During this period, America provided

    the Pahlavi monarchy with signicant military assistance against exter-

    nal, notably communist, threats.16 In 1973, Iran used its increased military

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    36/106

    24

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    capacitywithout America promptingto intervene in the Sultan o Omans

    ongoing counterinsurgency campaign against the communist Peoples Front

    or the Liberation o Oman (PFLO). Irans military and economic supportmade an indispensable contribution toward turning the tide in Oman. 17

    Tis case demonstrates working by because the Shah o Iran indepen-

    dently took action against a mutual problem. In act, Americas previous

    eorts to build Iranian capacity to counteract regional Soviet inuence

    activities conducted under a through relationshipenabled a subsequent

    by relationship in which Iran achieved U.S. objectives, while pursuing its

    own interests.

    What Makes Through, With, or Bya Compelling Alternative to Direct Action?

    Te strategy o through, with, or by relies on the proposition that an actor,

    possessing or provided with sucient capacity and will to act upon a given

    problem, can be reasonably expected to address that problem. Te actors

    motivation or action is the perceived benecial outcome that will resultrom solving the problem. Perceived benet is also the motivating actor in

    cases where Actor A supplies capacity or will to Actor B. In the latter case,

    both parties engage in a relationship that will yield an outcome perceived as

    being mutually benecial. In other words, both actors cooperate with one

    another to achieve a better endstate than that achievable by acting alone.

    At a minimum, three prerequisites must exist or a mutually benecial

    exchange to occur between two actors: each actor must have inormation

    about the other, each must believe that the exchange will bring about anadvantageous result, and each must be willing to enter into a relationship

    with the other. More directly stated, Actor Awhether an individual, orga-

    nization, or nation statemust be aware o Actor Bs existence and have

    some idea o Bs capacity or action. Without both actors having inormation

    or awareness o the other, a relationship would have no basis to develop.

    Inormation about the other actor becomes particularly important at the

    international level or in cross-cultural exchanges. Cultural knowledge acili-

    tates identiying points o commonality between dierent actors that, when

    exploited, might yield a mutually benecial result.

    Second, each participant in the exchange must believe, or have reason-

    able assurance, that the exchange will result in a benecial outcome (i.e., the

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    37/106

    25

    Homiak: Expanding the American Way of War

    actor will be better o in the end). Tis implies that each actor is rational

    and will choose the option that benets him most rom a range o pos-

    sibilities.18

    Understanding the other actors rationale, although desirable,is not required to achieve a mutually benecial exchange. Indeed, many

    conicts are the result o diculties inherent in understanding the ratio-

    nale o another nation or culture. Each actor must merely acknowledge

    that the other actor is making the best choice or himsel and is, thereore,

    acting rationally.19 What really matters is that the two actors are aware o

    one another and have recognized that cooperation will result in a mutually

    benecial exchange.

    In order to cooperate, the two actors must enter into a relationship withone another. Tereore, the building and maintaining o relationships is

    another key component o generating a mutually benecial outcome. o

    unction eectively, these relationships must be based upon trust and reci-

    procity. rust is a vital component in any relationship. Building trust is a

    straightorward concept at the interpersonal level; trust results when each

    actors expectation that the other will perorm or act as expected is satis-

    ed over time. However, trust is not so easily achieved across nation statesand cultures, diverse entities with a myriad o conicting interests and

    divergent viewpoints. Pre-existing relationships, interpersonal relation-

    ships between the actors representatives, and recurrent exchanges between

    actors are mechanisms or creating and maintaining the trust required to

    cooperate in such cases.

    Through, With, or By at the Operational LevelHow are the principles o through, with, or by applied at the operational

    level? Could combatant commanders employ through, with, or by to

    achieve operational-level goals? Tis section will address this question, illus-

    trating the application o the methodology with three historical examples.

    When applied at the operational level, through, with, or by is an

    indirect method by which the combatant commander can achieve desired

    endstate conditions or operational objectives that directly contribute tocampaign goals. Tis indirect approach is not a panacea. Instead, it provides

    combatant commanders with an alternative method, diversiying the locus

    o possible employment options. Trough, with, or by can serve as the

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    38/106

    26

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    cornerstone method o a campaigns operational design, or it can support

    another method that more directly applies U.S. military power.20

    Te indirect nature o through, with, or by emphasizes causal rela-tionships (i.e., cause and eect), complementing the doctrinal idea that

    logical lines o operation (LOOs) link nodes and decisive points to achieve

    the desired endstate when positional reerence to the enemy has little rel-

    evance. 21 In its most basic orm, the methodology is nothing more than a

    group o actors (i.e., nodes) that recognize a common problem and share a

    desire to resolve the problem (i.e., links). Under this approach, harnessing

    surrogate desires and resultant actions is essential to achieving the desired

    endstate. In act, the ability to tie through, with, or by into a logical LOOwill be determined primarily by the surrogate actors respective capacity

    and will, as well as the strength and depth o underlying relationships with

    those actors.

    Trough, with, or by has application not only as a primary or sup-

    porting method o a logical LOO but also within the concept o operational

    phasing as described in Joint Publication 5-0, Joint Operation Planning and

    illustrated in Figure 1.22

    As depicted, the level o direct military eort varies

    Figure 1. Notional Operation Plan Phases vs. Level of Military Effort(Joint Publication 5-0)

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    39/106

    27

    Homiak: Expanding the American Way of War

    across operational phase, rising and alling in accordance with phase-depen-

    dent intermediate objectives and the associated logical LOO. Depending

    upon specic operational requirements (e.g., time horizons, acceptablerisk, and asset availability/applicability), working through, with, or by

    other actors can have applicability in multiple operational planning phases

    and LOOs. For example, a FID mission with a regional partner in Phase 0

    could contribute directly to deterrence goals in Phase I, raising a partners

    capacity and will to deend against the actions o a potentially hostile third

    party. Furthermore, surrogate assets, created via through, with, or by in

    Phases I and II to support Dominating Activities, could be employed in

    Phases IV and V to support both Stabilizing and Enabling Civil AuthorityActivities.

    Trough, with, or by can create signicant value or operational plan-

    ning when conducted during Phase 0 or Phase I operations. Local- and

    theater-shaping activities undertaken indirectly can produce eects that

    transcend Shaping Activity objectives, contributing directly to Deterrence

    and/or Dominating Activity goals. Additionally, employing through, with,

    or by approaches during Phase 0 could minimize the direct military eortrequired in subsequent operational phases, acting as a orce multiplier while

    addressing targeted problems.

    Historical Examples of Through, With, or By

    As previously stated, Americas employment o military orce is not tra-

    ditionally associated with an indirect approach. Te United Statesor a

    variety o cultural, historical, and economic reasonsofen chooses directconrontation and relies on technologically advanced conventional orces

    to wage short, sharp conicts to deeat opponents. However, in the past, the

    U.S. military has employed indirect approaches in support o more direct

    methods. In some instances, success has validated the use o the indirect

    approach. In other instances, the indirect approach was mistakenly applied

    and ailed to produce the desired outcome.

    During World War II, the Western Allies employed an indirect approachwhile working with itos Partisans in Yugoslavia. Although the Western

    Allies successully employed this approach in the Balkans in support o

    larger eorts to deeat Germany, indirect methods had the unintended con-

    sequence o rustrating their postwar position in Europe. Small OSS/SOE

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    40/106

    28

    JSOU Report 09-3, Irregular Warfare and Indirect Approaches

    teams parachuted into occupied Yugoslavia and worked with Partisan

    groups to achieve a dual purpose. Militarily, they tied down the maximum

    possible number o German units in the Balkans, hindering movements oGerman troops and assets to other ronts. Politically, these teams provided

    the Partisans and local population with tangible evidence o the Western

    Allies support or their cause, thereby building Yugoslav will.23

    Franklin Lindsay, one such OSS operative, parachuted into Slovenia in

    May o 1944 and operated in Yugoslavia through the end o the war. His

    specic mission was to cut German rail lines connecting Austria, Italy,

    and the Balkans. 24 o accomplish his task, Lindsay worked with a Partisan

    group in the Stajerska region, building their capacity or oensive actionthrough regular airdrops o Allied weapons and supplies.25 Te act that the

    Germans launched a multi-division, anti-Partisan sweep through Stajerska

    in late 1944 illustrates Lindsays success in attaining the military purpose

    o the missionto tie-up German units in the Balkans.26

    On the surace, the Western Allies indirect approach in Yugoslavia

    appears to have been a success. However, the capacity or action provided

    by the Allies substantial airdrops produced unintended consequences evenbeore the Germans deeat. Instead o directing all o his energy against the

    Germans, ito used his newly acquired military capacity to eliminate Draa

    Mihailovis Chetniksthe prime threat to a postwar Yugoslavia under

    communist rule.27 Likewise, ito sparked the rst Cold War clash in May

    1945, when he tried to use his Allied-equipped orces to expand the borders

    o pre-war Yugoslavia by occupying rieste and portions o Austria.28

    Tis example provides several lessons. First, capacity or action, once

    supplied, has application beyond the scope o the problem it was urnishedto solve. Furthermore, the Western Allies and ito, despite a shared rec-

    ognition o the necessity o deeating the Germans, had widely divergent

    motives or entering into a relationship with the other.29 Finally, the Western

    Allies would have done well to ully appreciate itos long-term goals and

    underlying motives prior to equipping the Partisans.

    Te second historical example illustrates a successul application o

    working both through and with indigenous orces to achieve operational

    goals. From 1971 until 1973, the U.S. Army Vietnam Individual raining

    Group (UIG) undertook one o the least known, but most eective FID

    missions conducted byU.S. Special Forces. 30 Te missions purpose was to

    build the newly installed Khmer governments military capability against

  • 8/2/2019 Irregular Warfare & Indirect Approaches - Contemporary Security Challenges

    41/106

    29

    Homiak: Expanding the American Way of War

    communist insurgency.31 Operating under its initial mandate to train

    the Forces Armee National Khmer(FANK), U.S. Special Forces trained,

    equipped, and operated alongside 78 Cambodian battalions at acilitiesin South Vietnam.32 In May 1972, UIGs mandate expanded to include

    retraining elements o the Army o the Republic o Vietnam (ARVN) aer its

    near collapse during the 1972 Easter Oensive. Employing only 150 Special

    Forces trainers, the UIG retrained 64 ground maneuver battalions40

    percent o the ARVNs ground orce.33 Although both South Vietnam and

    Cambodia were overrun by their enemies, Special Forces enabled the end

    to be signicantly delayed. 34

    Te UIG experiences oer multi