Tuesday, August 17, 2010

Terrorist/Insurgent Thinking and Joint Special Operational Planning Doctrine and Procedures

Here is my latest monograph:

Terrorist/Insurgent Thinking and Joint Special Operational Planning Doctrine and Procedures

Prof. Laure Paquette, Ph.D.
Lakehead University
ASSOCIATE FELLOW, JSOU

FOREWORD

In this insightful essay contrasting terrorist-insurgent thinking and current US Joint planning doctrine and practices, the author reminds the profession that war is between two or more belligerents and that as Clausewitz admonished us, the first and most important thing is to understand is the kind of war that you are fighting. From this, all other things must flow. In order to understand the kind of war, it is essential to not only understand your adversary’s purpose but to understand his thinking and how it differs from yours. Only through understanding his thinking can you grasp his likely objectives, the concepts and tactics he will use to obtain them, and effectively plan to counter his operations and defeat him.

This monograph examines the characteristics of terrorist-insurgent thinking and US Joint planning doctrine and practices and concludes that the existing US planning framework is inadequate for the terrorist-insurgent threat and challenges the reader to expand his own planning paradigm to more fully encompass the implications of terrorist-insurgent thinking in the design and planning of US operations. Why this mismatch occurs and how the terrorist-insurgent operates outside our cognitive frame of reference for fighting in theaters of war, theaters of operations, areas of operations are two important questions addressed. Equally important is the question of what are the implications of this for our own doctrine and practices? Focusing on two of the most significant characteristics of terrorist-insurgent thinking, the author answers these questions and identifies the obstacles that stand in the way of the necessary adjustments to our conventional paradigms. In the process she again validates Clausewitz by demonstrating that in war the enemy exerts as much influence on us as we do on him, and we must find a way to counter this influence in order to be successful.


1. INTRODUCTION

“I’m an advocate of learning to be an insurgent.”
Gen. Russell Howard
The United States has been deeply committed to a “war on terror” since the World Towers attack on 9/11. Yet, despite extraordinary efforts, commitment of astounding resources, and the loss of countless lives, the war goes on. Some argue that it is not really a war, but such an argument is spurious and more wishful thinking than factual. We are long past arguments over whether it is a war. The facts are clear to the reasonably- minded. If a group of people or actors—political opportunists, even if disguised in religious quotes—declares war on you, “war” exists whether you want to admit it or not. A conflict exists whatever the definition may be. If law enforcement cannot deal with the level of organized violence, it is war whether you call it that or not. If you commit one of the world’s largest and most proficient militaries to combat, it is war. It would be much more productive to debate what kind of war we are involved in and how we should fight it. Military power cannot alleviate the underlying social maladies that motivate many people to support terrorism and insurgency, but it can, in theory, create security conditions in which social remedies can be applied. Yet, even this appears to have eluded the US for too long. Despite the best efforts of a great military machine, terrorists and/or insurgents continue to retain a high level of strategic initiative—how is this possible? What is needed is a new idea—or more properly stated, what is needed is an old idea renewed. Most military professionals recognize Sun Tzu’s “If you know both yourself and your enemy, you can win a hundred battles without a single loss.” Few know what it implies for the war on terror. The existing US planning framework fails to account for the uniqueness of terrorist-insurgent thinking in the design and planning of US operations. Why this mismatch occurs and how the terrorist-insurgent operates within the seams of our cognitive frame of reference of fighting in theaters of war, theaters of operations, and areas of operations are half of a prolonged story of terrorist warfare. The second half of this story and its conclusion will be written by how well it is possible to understand the characteristics of terrorist/insurgent thinking and use that knowledge to change approaches to strategy, planning, and tactics.
The paper that follows has six parts. The first discusses the characteristics of terrorist or insurgent thinking. The second discusses in some detail the characteristics that are the most important to operational planning and procedures. The third part discusses the implications for planning doctrine. The fourth part discusses the implications for planning procedures. The exploration will apply primarily to limited contingency operations or crisis response, or multi purpose operations influenced by fluid and changing situations.
The fifth part discusses the implications for training. And the sixth and final part discusses the obstacles to the changes necessary.

2. CHARACTERISTICS OF TERRORIST- INSURGENT THINKING

As mentioned at the close of the introduction, this paper begins with a discussion of the characteristics of terrorist or insurgent thinking. The sections to follow will discuss in more detail the themes already announced: the characteristics that are the most important to operational planning and procedures; the implications for planning doctrine; the implications for planning procedures; the implications for training; and the obstacles to the changes necessary.
In the nearly ten years following 9/11, the research and literature on the terrorist-insurgent has grown exponentially. The 21st century terrorist-insurgent phenomenon has been studied from the perspectives of numerous disciplines leading to various categorizations, models, and conclusions. This wealth of information has informed US military planning doctrine and procedures in multiple ways, but any changes have been US centric and based on countering terrorist-insurgent actions, not founded in knowing how these adversaries think. Consequently, the US military response has been largely reactive and attempts have tended to be proactive slightly off target. In explaining US shortcomings some have suggested omnipresence or genius on the part of these global irreconcilables, or blamed chance. Few of the conjectures of why this occurs are convincing and many fail to even make this obvious observation. Nonetheless these studies, when synthesized, begin to give us a good appreciation for the characteristics of terrorist thinking and reveal that the terrorist-insurgent mindset—their way of thinking—naturally misaligns with US cultural assumptions and doctrinal preferences. The terrorist-insurgent’s success and longevity is more likely a case of the terrorist following his natural mental precepts with audacity; it exploits the cognitive dissonance in our planning doctrine and procedures and the reality created terrorists on the ground. In other words, it requires the US to align these with the demands of the war it is fighting—the one the terrorist-insurgent has brought to the door step. All of this starts with understanding the characteristics of his thinking.
The research fits into four broad categories: game theory; empirical analyses, like historical or policy case studies; the study of particular issue, like martyr contracts or women suicide bombers; and the application of frameworks which were developed for other uses, but are now being tried out on terrorism and counterterrorism. In this last category, therefore, one finds social network analysis, collective action analysis, and some counterinsurgency techniques. Each makes a significant contribution, but fails to realign completely American thinking.
Game theory
Game theory is a branch of applied mathematics that attempts to capture behavior in strategic situations, in which an individual's success in making choices depends on the choices of others. To follow it requires at least college level calculus. While initially developed to analyze competitions in which one individual does better at another's expense (zero sum games), it has expanded to include a wide range of situations, in particular war bargaining. However significant in the academic literature, this theory is of little interest for our purposes, since the number of users with enough (and fresh enough) mathematical background to transpose its contributions to their own problems is likely to be very small. Nor is it likely that SOF will have the time to learn enough calculus to use it in the field or before an operation.
Empirical Analyses
There is a range of studies in this category, and they have been very popular with academics in the US. In general, these studies are based on the analysis of experience and evidence. Usually, they test hypotheses and theories against observations in the real world. To become recognized, empirical studies must meet very specific criteria, which results in the exclusion of much that is considered true by practitioners.
Some studies lead to policy advice, like telling liberal democratic governments what to do and what not to do about internment without trial, coercive interrogative techniques, and the use of live ammunition during protests. In general, governments are advised to stay the course for the long term, but they are rarely advised on how to maintain public support for that policy, for example. Empirical studies relevant to terrorism or insurgency occur by definition after the fact. They also tend to allow little in the way of generalizing learning from one situation to the next, which limits their usefulness.
Some studies wonder about or conclude that US allies in the war on terror behave like what we call here weak-side strategists. That is to say, allies might rush headlong into action, ignoring the consequences of domestic opinion failing to support government moves, in a number of European liberal democracies one could name. Or the allies might ignore the unintended consequences of their own actions, such as the possibility of violent opposition to the government commitments, or the provocation of internal terrorist threats, such as may be a consideration in Saudi Arabia. These studies provide some support for the research presented here.
Other well-known themes in the scholarly literature are less supportive, principally the rational choice theorists. Rational choice theory provides no opportunity for the intuitive decision-making so crucial to the art of strategy, for example. Nor does rational-choice theory take into account non-rational beliefs of patriotism or non-rational acts of self-sacrifice, for example, observable among US troops. Nor does it take into account political or religious extremism, which are observable in many parts of the world.
Finally there are areas of active research that are not directly relevant to the question of understanding and countering terrorist or insurgents, for example the literature that researches why liberal democracies are resistant to coercion as a means of constraining or provoking action by the government.
Special Issue Studies
In this category of research, there are a large number of detailed discussions of very specific, very circumscribed questions regarding insurgency or terrorism, and there is usually no pattern or overarching theme among them. One such example is Alimi’s study of collective action. Another is the study of women as suicide bombers. One article looks at terrorism in a positive light now forgotten, with it being a bulwark against tyranny. It nonetheless makes an interesting distinction between terrorism and insurgency, the fundamental difference being that terrorism emanates from the underground, where insurgency, with activities like looting or protesting, happens publicly. Kilcullen applies approaches to counterinsurgency to the global war on terror. Also preceding the present work are articles that generalize from experiments with college students to military applications. Although there are significant differences in the choice, the amount of information used, the decision strategy employed and the effect of exogenous conditions on decision strategy and choice in international relations, those differences are quantitative rather than qualitative.
The most useful part of this collection of odds and ends, lies in the discussion of the role of uncertainty, and the various levels of uncertainty, in counterterrorism. Considered here is “the small, secretive nature of terrorist plots and the indeterminate nature of the target,” a circumstance to which a weak-side strategy would make a significant contribution.
Existing Frameworks
These studies include perspectives such as social network analysis or psychological theories, which were created to study phenomena other than terrorism or insurgency, but have been brought to bear on it. For example, the social action perspective is a precedent for the present paper, to the extent that it applies an existing approach to terrorism. The expansion of thinking called for above certain is in sympathy with Tilly and some of the military literature, who argue that an epistemological expansion is necessary. Moreover, it is no great leap for the social network analysis, which has already been used in studies of crime, criminal intelligence, and criminal networks, to applications in counterterrorism.
There are a number of such frameworks, grouped here by discipline for the sake of convenience. These disciplines include psychology, ethology, anthropology and other social sciences, cognitive theory, and the study of biological factors.
Psychology has considered the issues surrounding terrorism at considerable length. In this area of research, psychoanalytical theory is the most widely recognized theory that addresses the roots of all forms of violence. Freud viewed aggression more generally as an innate and instinctual human trait, which most should outgrow in the normal course of human development. Ethology, a different area of psychology, has been alternately defined as the scientific study of animal behavior, especially as it occurs in a natural environment and as the study of human ethos, and its formation. For ethologists, aggression arises from a very basic biological need - a “fighting instinct” that has had adaptive value as humans have evolved.
However, in non-psychological areas of research, such as anthropology and other social scientists, research has found significant differences both in the nature and level of aggression in different cultures. Here, experimental research has demonstrated that aggression can be environmentally manipulated; both findings that argue against a universal human instinct. Another theory is that of frustration aggression. The basic premise is that aggression is always produced by frustration, and that frustration always produces aggression. However, research has shown that frustration does not inevitably lead to aggression. Social learning holds that behavior (e.g., aggression) is learned not only through one’s direct experience, but also through observation of how such contingencies occur in one’s environment.
Cognitive theory holds that people interact with their environment based on how they perceive and interpret it. Perceptions of intent affect aggression. Moreover, there are internal and external factors that can affect one’s perceptions of provocation or intent. Biological factors affecting aggression are also an important element in a comprehensive biopsychosocial understanding of behavior. Biological studies are rarely conducted on terrorists. Researchers have also tried to apply statistical models to explain violence and to identify its predictors. This line of inquiry has yielded some positive findings on risk factors for violent behavior. Literally hundreds of studies in psychology, criminology, sociology, and other behavioral sciences have yielded significant risk factors for violence. Unfortunately, they are unlikely to be useful predictors. Although terrorism is a type of violence, risk factors tend to operate differently at different ages, in different groups, and for different – specific - types of violent behavior.
Having reviewed the literature in political science, we can now turn to the professional military literature.
Military Literature
The review of military literature is striking for the compatibility with the processes and ideas outlined in later sections of this paper. It also illustrates how important the formalization of these ideas actually is. In the military literature, there have been several new conceptual frameworks that try to help solve problems in operational art. Most share some of the objectives and techniques outlined below. They also consider the issues of complexity, unpredictability, and lack of information. An excellent example of this is Yarger’s review of strategic theory, including its premises. He seeks to improve the concept of strategy by proposing some characteristics of weak-side strategy. Yarger also identifies common traps into which strategists fall.
The military literature also includes a wide range of fictional and actual case studies, such as E.D. Swinton’s Defense of Duffer’s Drift. There are also proposals for applying operational design more systemically, but these explore specific questions rather than identifying the steps in a process. Dugan’s monograph on strategic intuition, for example, explores the non-rational but nonetheless significant contribution made to planning and carrying out strategy that is made by what he and Johnston call strategic intuition, what Clausewitz called coup d’oeil, what Klein called analogical thinking, and what is called here and in extensive previous research the core idea. “Patton was a striking example of strategic intuition by applying examples from history through coup d’oeil.” Moreover, without core idea, it is bound to fail. Finally, the US Army has proposed a seven-step military decision-making model.
Taylor and Horgan’s research examines the process of terrorist thinking. They identify some problems, like the bridging with assumption in the absence of sound empirical knowledge. Terrorists share some of the characteristics of ordinary people. There is usually a context which facilitates the transition to terrorism, and the act of terrorism brings the terrorist some benefit, if only in his own mind, and terrorism can operate at an individual and/or political level.

The profiling of terrorist leaders is one of the richer veins of military literature. Taking the research discussed above into account, it is possible to develop a profile of a terrorist leader which includes an impressive number of characteristics. They are:
► Often educated to university level, often in subjects that have terrorist applications (science, business);
► Often organized planners, with some military training/experience;
► Usually the brains behind operations or targeting and having the most detailed knowledge of the workings and intentions;
► Often appearing to be law-abiding, in order to remain under the radar;
► Often charismatic, being able to convince and manipulate people, and being able to conceptualize and articulate an idea into a mission;
► Truly convinced of the cause;
► Possibly involved in personal risk-taking but usually keeps a certain distance to avoid capture and prosecution and maintain plausible deniability;
► Always thinking about what the strong are about to do;
► Holistic;
► Playing a waiting game;
► Creative;
► Looking at the big picture;
► Constantly scanning his environment for possible threats and for possible opportunities;
► Specifically designing each action to suit his strategy;
► Constantly forecasting for all events and all other actors, and investing in the development of even unlikely scenarios;
► Going to assume s/he will lose any direct confrontation;
► Engaging their own passions or passionate feelings; and
► Thinking like a weak-side strategist all the time, not just when there is a problem.
While all of these characteristics are significant, it is not practical to try and take all of them into account during operational planning doctrine and procedure. For those purses, there are two characteristics which matter most. The next section discusses those two characteristics.


3. LEVELS OF WAR AND TACTICS: ON THE OTHER SIDE OF THE LOOKING GLASS
The previous section of this discussed the research literature on terrorism and insurgency in order to identify the characteristics of terrorist or insurgent thinking. The present section looks in more detail at the characteristics that are the most important to operational planning and procedures. The sections that follow this one will consider, in turn, the implications for planning doctrine, procedures, and training, as well as the obstacles to the changes necessary.
The main differences in the planning of operations by terrorists or insurgents, compared to the operational planning doctrine and procedures in the US military are the following. First, when insurgents or terrorists discuss the level of the operation, they use many more levels than the three used by the US forces, and each of those levels is, so to speak, thinner. The most important implication of this characteristic for planning is that terrorists or insurgents change levels of operation quickly and easily. The US forces usually confine themselves to one level when planning. Second, the range of tactics used is broader. In many ways it is a disadvantage that insurgents and terrorists do not have the more specialized or technologically sophisticated tactics available to the US forces. On the other hand, they change their tactics more quickly, and they use tactics which would not be allowed by the rules and laws of war. Rules and laws of war do not concern them. The range of tactics they will consider will therefore be broader.
There are a number of historical examples of these two characteristics in action. The Taliban behavior after its military defeat in Afghanistan, for example, illustrates the change in level of operations. After its government fell, the Taliban changed its methods, and changed them again after the arrival of the NATO troops. In Pakistan, the Jaish-e-Mohammed (JEM or Army of Mohammed) is an Islamic extremist group formed in early 2000. It collected funds through donation requests in magazines and pamphlets. This understandably drew the attention of the government, and forced withdrawal of funds from bank account in anticipation of asset seizures. (They invested them in legal businesses such as commodity trading, real estate, and production of consumer goods!) In Sri Lanka, the Tamil Tigers eventually developed their own newspaper, press and propaganda section, in addition to a political wing, a research and development wing, and an intelligence wing. Al Qaeda’s Kalid Shaikh Mohommad introduced the principle of losing and learning doctrine: if an al Qaeda operation fails or suffers losses, it is not considered a strategic loss if the group learns, improves, and vows not to repeat its mistake.
An example of the broader range of of tactics, most importantly tactics prohibited by the rules and laws of war, can also be found in the Taliban. The Taliban in Afghanistan were trading opium, at one point in 2005 moving their trade from Helmand to Nimroz when they realized that province was more weakly policed. The Taliban methods came to include assassinations, kidnappings, insurgency tactics, suicide bombings, and improvised explosive devices. Among the occurrences for each of these are:
► For assassinations—the death of Vice-President Haji Abdul Qadir in July 2002; attempts on President Hamid Karzai in September 2002, on a vice-presidential candidate in 2004, and on the former governor of Badakhshan in October 2007
► For kidnappings—of groups of foreigners in both July 2007 and October 2007
► For insurgency tactics, the recruitment and training on the Pakistan border and the repeated ambush of soldiers
► For suicide bombings—there were sixty-four between January 2005 and August 2006
► For improvised explosive devices—against U.S. and NATO troops, and against Afghan military and civilian vehicles, with the number steadily increasing
The Taliban also quickly developed a symbiotic relationship with the opium traders, in order to finance these and other operations.
The Taliban also exploited Afghanistan’s easily corruptible officials and the insecurity of the population. They banned opium while in power, but quickly turned to it to finance their operations.
There are also examples of broader tactics in other terrorist movements. ETA (Euzkadi Ta Askatasuna), the Basque separatist group founded in 1959, finances its activities through kidnappings, robberies, and extortion. Its political tactics, so to speak, are limited to bombings and assassinations of Spanish Government officials. Similarly, the Salafist Group for Call and Combat, is a splinter faction which gained popular support in Algeria through its pledge to avoid civilian attacks inside Algeria – as opposed to the rest of the group who was willing to sacrifice civilians. Later, however, they did attack civilians. Other observers have noted the breadth of tactics: “Today’s international terrorist groups function not as tightly structured hierarchies, but rather as shadowy networks that, when necessary, strike ad hoc tactical alliances, bridging religious and ideological schisms.”
So these characteristics are found in a number of hostile groups. The next section begins the exploration of the implications for operational planning doctrine.
As mentioned in the introduction, this will be done by analyzing the major doctrinal and planning documents. These are:
► JP1, Doctrine for the Armed Forces of the United States
► JP 3-0 Joint Operations
► JP 3-05, Doctrine of Joint Special Operations
► JP 5, Joint Operation Planning
► JP3-05.1 and .2, Joint Tactics, Techniques and Procedures for Joint Special Operations Task Force Operations
► JP 3-05.5 Joint Special Operations Targeting and Mission Planning Procedures.
It will be necessary to examine in another section the implications for operational planning procedures. Only then will it be possible to consider what obstacles exist to learning from terrorist/insurgent thinking.
4. IMPLICATIONS FOR PLANNING DOCTRINE

This paper has already identified characteristics of terrorist or insurgent thinking that are to be analyzed in more detail. The following section discussed in more detail the two characteristics that are the most important to operational planning and procedures. The present section discusses the implications for planning doctrine of these two characteristics, and does so by analyzing the major doctrinal and planning documents. These are:
► JP1, Doctrine for the Armed Forces of the United States
► JP 3-0 Joint Operations
► JP 3-05, Doctrine of Joint Special Operations
► JP 5, Joint Operation Planning

Each of these major documents will discussed in turn. The sections to follow this one will discuss the implications for planning procedures and for training, as well as well as the obstacles to the changes necessary.

JP 1, the Doctrine for the Armed Forces of the United States
JP 1, the Doctrine for the Armed Forces of the United States is, naturally, a document whose ideas are presented in broad strokes. Opportunities for analysis are similarly broad. The first great opportunity for taking into account terrorist or insurgent thinking arises from the emphasis on unity of action to be found in the above publication.
JP-1 recognizes the need for the maximum unity of action. Maximum unity of action, in turn, requires maximum inter-operability of the various components of the forces. This maximum inter-operability of the components of the armed forces requires unity of command. In practice, however, has unity of command also meant centralization of command? Has the improved technology of communication, sometimes reaching real-time for some components of the forces, meant not just better decision-making, but also more centralized command? And if centralization is a tendency, what does this mean for couninsurgency or counterterrorism planning? Can it become a disadvantage or even a danger if the terrorist or insurgent employs a diversity of tactics or changes level of operations? There is evidence of constant efforts to counter the tendency to centralize command at the expense of effectiveness, for example, and these efforts are valuable. Their value is enhanced by the dangers presented by terrorist or insurgent thinking.
JP 3-0 Joint Operations
In JP 3-0 Joint Operations there are more opportunities for special operations planning to integrate terrorist and/or insurgent thinking than in JP-1. In fact, JP 3-0 presents the special operator with four main opportunities to learn from terrorist or insurgent thinking. These arise from: the strategic estimates of the theatre of action; the consideration of irregular war; cognitive dimension of the information environment; and the consideration of both desired and undesired effects of operations. Each can be discussed in turn.
The first opportunity presented by JP 3-0 Joint Operations comes from the establishment of the strategic estimates of the theatre of action. In most situations, the theatre level of operations is the largest that terrorists or insurgents will use. JP 3-0 Joint Operations outlines the procedures for threat assessment, in the course of which the insurgent or terrorist capacity for changing levels and employing more diverse tactics can be integrated by command at all levels. To be specific, it is possible to integrate these two characteristics at the following points in the process:
► When the commander establishes his/her critical intelligence requirements
► When the protective function is being planned
► When operation art and design considers risk at the operational level
► When deciding to terminate an operation.
The second major opportunity for learning from terrorist or insurgent thinking comes with irregular war. Irregular war includes various types of enemies and activities, but it is the category of warfare that specifically addresses terrorism and insurgency. When the characteristics of weaker opponents are discussed, there is an opportunity to include a consideration of the changes in level in operations and diversity of tactics. Those characteristics can also inform any discussion of enemies who do not engage directly and who use stealth in hit and run engagements. Finally, irregular war requires the commander to be particularly aware and anticipate subtle shifts in political goals. Including the likelihood of changes in levels of operations and the diversity of tactics can help him/her anticipate the opponents.
In the case of irregular war, the two characteristics of terrorist or insurgent thinking also mean that little massing of effects is possible, as mentioned in the previous discussion of JP 1, Doctrine of the Armed Forces of the United States. Terrorists or insurgents avoid concentrating their assets or numbers, since an engagement then could result in too many losses for to survive. Combining this with frequent, pattern-less hit and run engagements, and add to it changes in level of operations and diversity of tactics means that for each of the following way to deal with terrorists or insurgents, changes in level of operations and more diverse tactics are even more important. Restraint, in particular, is important in any operation countering terrorism or insurgency.
Of those on offer, the best ways to deal with terrorists or insurgents are:
► Maneuverability
► Economy of force
► Simplicity, restraint, and concern for legitimacy.
Another opportunity for integrating the fact that insurgents and terrorists change level and use a broader range of tactics comes in the discussion of the cognitive dimension of the information environment. There are repeated references to the intuition and creativity of command in JP 3-0 Joint Operations. Intuition and creativity are always important characteristics of special operators. But as with so much of the previous discussion, they are going to be even more significant when dealing with an enemy that changes levels of operation and employs a diversity of tactics.
There are, of course, difficulties in using intuition and creativity in practical decisions. However, there are certain types of decisions which can integrate them more easily. We can illustrate this by taking the decision to end operations as an example: any commander or operator must always consider the right point at which to end counterinsurgency and counter-terrorist operations. Terrorist or insurgents, however, profit more from short operations and therefore seek to end them, and to leave the area of conflict, as quickly as possible. In practice, then, this means that there is even more pressure than usual for US forces to carry out engagements against an enemy that will disperse. The option of moving troops and equipment in and around the theatre is limited by time constraints. A larger, more specialized or better equipped force may be at a disadvantage in some situations. Commanders, planners and special operators would do well to consider what the conclusion of operation may have as an undesired effect on the terrorist or insurgent, and whether this signifies in fact better operating conditions for them.
Taking into account both desired and undesired effects of operations when planning is the fourth and last of the opportunities in JP 3-0 Joint Operations. JP 3-0 Joint Operations states that the enemy has a single center of gravity, whereas everything mentioned so far points to the fact that terrorists and/or insurgents are likely to have more than one center of gravity or a number of decisive points of interest. To make matters more difficult, terrorists or insurgents may shift easily among these smaller and more numerous centers of gravity. Taking this fact into account is a great opportunity to improve the effectiveness of joint operations planning and procedures.
Overall, then, diversity of tactics and changes in levels of operations can be identified as critical capabilities in counter-operations. They are essential in determining decisive points, as mentioned previously, which in turn will make the lines of operation more effective. Integrating the possibility of a greater range of tactics and rapid changes in levels of operations will improve planning and procedures at the following points:
► When considering the potential for leverage
► In the phasing model proposed by JP 3-0 Joint Operations, considering that terrorist or insurgent actions are more likely to be cyclical, rather than linear
► In establishing the measures of evaluation and measures of performance.
JP 3-05, DOCTRINE FOR JOINT SPECIAL OPERATIONS
In JP 3-05, Doctrine for Joint Special Operations, there are two opportunities for to integrate terrorist and/or insurgent thinking. First, joint special operation planning requires the identification of the nodes of a system and the critical factors and decisive points. The two differences between terrorist and/or insurgent thinking, i.e. change of levels and the diversity of tactics, have a role in identifying each of these. Second, the promotion of the indirect approach present in JP 3-05, Doctrine for Joint Special Operations, is a support for integrating terrorist and/or insurgent thinking, since insurgents and terrorists use indirect approaches consistently and universally. The indirect approach has an impact throughout the planning process.
JP 5, Joint Operation Planning
There are sections of doctrine in JP 5 Joint Operation Planning that actively assist forces in learning from terrorist/insurgent thinking. For example, given that “SO differ from conventional operations in degree of physical and political risk, operational techniques, mode of employment, independence from friendly support, and dependence on detailed operational intelligence and indigenous assets,” planners ought to consider how the diversity of tactics, and the change in operational levels affect their operations.
In addition, by definition, Special Operations will be more like insurgents than regular forces, i.e. they will consider or use a broader range of techniques, not only in themselves, but “inherently joint.” Although many special operations may be conducted as a single-Service operation, most are planned and executed as a joint operation. Special Operations routinely require joint support and coordination. These are two significant advantages.
Considering the major documents as a group in light of the differences in level and tactics of insurgents and terrorists, it also becomes clear that the huge bulk of the doctrine is about the armed forces, not about the enemy. This way of thinking is natural as far as procedures are concerned, and certainly common, among large and well-equipped regular forces. Armed forces personnel are naturally thinking about what their role and capacities are. But the challenges counterinsurgency and counterterrorism present also mean there is an opportunity to learn from the enemy, with immediate and obvious benefits. Terrorists and insurgents are obsessed with what the US forces are going to do. A shift in emphasis towards what they may do, as opposed to what US forces are capable of doing, may be beneficial. For maximum benefit, however, th capacity for change of level and more diverse tactics should be integrated by command at all levels of operation.

5. IMPLICATIONS FOR PLANNING PROCEDURES

This paper began by discussing the characteristics of terrorist or insurgent thinking. The following section discussed in more detail the two characteristics, change in level and diversity of tactics, that are the most important to operational planning and procedures. The section immediately preceding discussed the implications for planning doctrine. The present section, the longest of the paper, discusses the implications for planning procedures. It does so by analyzing the major planning documents. There are three of these:
► JP 5, Joint Operation Planning,
► JP3-05.1 and .2, Joint Tactics, Techniques and Procedures for Joint Special Operations Task Force Operations
► JP 3-05.5 Joint Special Operations Targeting and Mission Planning Procedures.
The remaining two sections of the paper will cover the implications for training, and then the obstacles to the changes necessary to make full use of this new information about terrorist and/or insurgent thinking.
JP 5-0 Joint Operation Planning
The process outlined in JP 5-0 Joint Operation Planning is commonly referred to as JOPP, Joint Operation Planning Process. Here, we will examine four of the characteristics of JOPP that give special operators a chance to learn from terrorist and/or insurgent thinking. It will then examine steps in the JOPP process in order to identify where these two characteristics can be integrated into the planning process. Then, it examines the specific capabilities of special versus regular forces, and discusses how this presents opportunities to learn from terrorist or insurgent thinking. Finally, it discusses the application of the principles of war.
JOPP has four characteristics which make it easier to integrate the thinking of terrorists or insurgents into the process. First, in JOPP, planners and commanders use an adaptive process. At any point in their ongoing adaptation, it is possible to include information like the two characteristics of terrorist and/or insurgent thinking. It also means that more diverse tactics of terrorists and/or insurgents can be countered at any point in the process. Second, JOPP works as much as possible with the levels above and below the commander. This means that JOPP is already changing levels, and should find it easier to accommodate that characteristic of terrorist and/or insurgent thinking. Third, as a process, JOPP is less formal, so that the increased flexibility can be used to integrate the effects of terrorists or insurgents changing levels or using more diverse tactics. There is a caveat, however: although there are assertions that “Joint Operation planning has the inherent flexibility to adjust to changing requirements for adaptive plans,” they are not presently likely to be flexible enough to match the nimbleness of insurgents or terrorists. Fourth and finally, JOPP is decentralized, so that it more closely resembles terrorist and/or insurgent thinking, but also so that the observations of novel tactics or changes of level can be more quickly taken into account.
The steps of the Joint Operation Planning Process show where it is possible to integrate the diversity of tactics and the change in level of operations characteristic of terrorists or insurgents. These points are:
► Mission analysis, more specifically in the development of assumptions, i.e. statements thought to be true in the absence of facts
► Analysis of the operational environment, more specifically in analyzing the higher command’s intent and mission, and undesired effects
► Development of mission termination criteria
► Development of mission success criteria
► Course of action analysis
► Determination of potential decisive points
► Risk assessments.
In addition, there are two opportunities to integrate the thinking of terrorist or insurgent thinking. These are even more important than those just cited. The first of these is war gaming, the physical and mental equivalent of gedankenexperimenten, or thought experiments. Integrating the characteristics of terrorist or insurgent thinking there means that there is training available to all participants, with all the benefits that training confers for actual operations. The second of these is the development of the centerpiece of the operational plan, the CONOPS. Again, if the central ideas of the operational plan include the two characteristics of terrorist or insurgent thinking, then they become integrated in the entirety of the operation.
Joint special operations have unique characteristics which offer the chance to profit from terrorist and/or insurgent thinking. Joint special operations occur when there are special forces drawn from more than one service. These are the types of operations which boggle the mind of the lay person – the possibility that in situations of high psychological and physical stress and situations of extreme danger and unpredictability, armed forces personnel of dramatically different services and organization cultures are expected to work together as seamlessly as possible, since lives are at stake.
Although it may seem obvious, it bears repeating that Special Operations warfare includes tempo, that is to say a “rapid execution of a mission allows SOF to mass combat power at the critical place and time, accomplish the mission, withdraw before the adversary can react, and then attack again.” This means both that it is vital for special operators to integrate the way of thinking of terrorists and/or insurgents quickly and easily, since things are evolving quickly, and also that these same characteristics contribute to an increase in tempo.
The two characteristics of terrorist or insurgent thinking exacerbate the challenge facing special forces in carrying out their mission. To be specific, the challenge will be greater in:
► Influencing the will of foreign leadership and/or populations to create conditions favorable to US strategic aims or objectives
► Action principally directed at high-value targets of strategic significance, that may be overt, clandestine, or covert
► Rehearsals of the mission
► Employment of sophisticated communication systems and means of insertion, support, and extraction
► Discriminating and precise use of force.
The expectation that SOF should be “task-organized quickly and deployed rapidly to provide tailored responses to many different situations” presents a significant advantage in coping with changes in levels of operation and diversity of tactics. The same can be said of a number of capabilities. These include:
► Surveying and assessing local situations and reporting these assessments rapidly
► Working closely with regional military and civilian authorities and populations
► Organizing people into working teams to help solve local problems.
Similarly, the special operator’s core activities present certain points where the integration of terrorist or insurgent thinking needs more urgency. Intelligence is likely to become dated even more quickly that is otherwise the case when SOF is engaged in direct action, special reconnaissance, and foreign internal defense operations. An argument can be made for other SOF activities as well. When it comes to types of operations, these are, under the heading of direct action:
► Raids
► Ambushes
► Direct assaults
► Standoff attacks
► Terminal attack control operations
► Terminal guidance operations
► Recovery operations
► Precision destruction operations
► Anti-surface operations.
Under the heading of special reconnaissance, there are:
► Raids
► Ambushes
► Environmental reconnaissance
► Armed reconnaissance
► Post-strike reconnaissance
► Target assessment
► Threat assessment.
Under the heading of foreign internal defense, there are:
► Unconventional warfare
► Counterterrorism
► Psychological operations
► Civil affairs operations
► Counter-proliferation.
When it comes to the principles of war, US Joint Doctrine has nudged the historic objective, offensive, mass, economy of force, maneuver, unity of command, security, surprise, and simplicity toward irregular warfare activity by adding “other principles” of restraint, perseverance, and legitimacy.
Some of these principles make it easier to integrate the two characteristics of terrorist or insurgent thinking that we have been discussing. For example, special operations are called on more frequently to use much smaller measures for the concentration of mass, something that is appropriate for countering the thinking of terrorists or insurgents. A commander may simply assume that there will be no concentration of mass. Another example is the enhanced maneuverability of special forces. You do not need to be a special operator to realize this is an advantage in coping with an enemy that changes levels of operation or uses a broader range of tactics. The same can be said of surprise and simplicity.
On the other hand, a greater diversity of tactics and changes in the level of operations make it more difficult to actualize other principles of war and strategic concepts. For example, preemption is much more difficult with someone who changes tactics and levels of operations. Similarly, dislocation (as explained in B. H. Liddell Hart’s Strategy) is possible, but not as significant as in other cases.
Finally, exploitation also takes on a new meaning, since terrorists and/or insurgents are not a conventional enemy: the psychological operations are very important, but their aim is to separate the non-combatants from supporting the ideological movement of the insurgents/terrorists. Similarly, initiative is going to be a very important component of operations, to respond to the change of operational techniques and change of level.
JP 3-05.1 Joint Special Operations Task Force Operations
In this discussion of the publication JP 3-05.1 Joint Special Operations Task Force Operations, we shall consider the planning principles of special operations and the differences between special and regular operations. In the second half of this section, we will consider the process of planning of criticality, availability, recuperability, vulnerability, effect, and recognisability, known by the acronym CARVER.
The planning principles of special operations as presented in JP 3-05.1 Joint Special Operations Task Force Operations neither preclude nor exclude integrating the two characteristics of terrorist or insurgent thinking being studied here, i.e. the change in levels of operations and the diversity of tactics. Implicit in these principles, however, is the fact that there are no second chances in this type of operations – they are by definition high-stakes, high-risk, and high-cost. This is a characteristic they share with terrorist or insurgent operations. They are also similar to terrorist or insurgent operations in that they can range in size, combat intensity and purpose. The real question, of course, is whether they can range in level within a single operation.
The fact that the planning of operations requires fused intelligence about both theatre and national assets is a good sign, a hint of greater flexibility in scope that is important in itself, but also the first detected in the review of doctrine and procedure executed so far. This flexibility is more about the way in which operations are conceived than a purely geographical flexibility of location. It has the potential to reduce the surprise that could be experienced by forces fighting insurgents or terrorists.
Special force operations differ from conventional operations in degree of physical or political risk, operational technique, use of special equipment, modes of employment, independence from friendly support, and dependence on detailed operation intelligence and indigenous assets. Special forces also perform two unique types of activities. First, they perform tasks that no other forces in the Department of Defense conduct. Second, they perform missions that are conducted by Department of Defense forces, but do so to a unique set of conditions and standards, normally using equipment and tactics, techniques, and procedures not utilized by conventional forces. Once again, this moves them closer to being able to understand and integrate the greater diversity of tactics and the changes in levels of operation than the regular forces with which they are working.
Diversity of tactics and the change in level of operations are of particular relevant to the following capabilities of special operations:
► Special reconnaissance (SR)
► Direct action (DA)
► Unconventional warfare (UW)
► Foreign internal defense (FID)
► Counterterrorism.
Special forces also have particular capabilities, of which the following offer an opportunity to learn from terrorist or insurgent thinking. Those are:
► Capacity to work closely with local authorities and populations
► Capacity to assess local situations.
Finally, there are some realities about special operations, which are so well known as to have become truisms, but that bear mention here since they provide an opportunity to learn about greater diversity of tactics and changes in levels of operations. As a variation of the SOF Truths, the author’s research suggests that:
► Quality is better than quantity
► Special forces cannot be mass-produced
► Special force intelligence is often more detailed than most military intelligence
► Special force intelligence is more perishable than most military intelligence
► Special forces intelligence is more broadly gauged than most military intelligence
► Special forces’ intelligence is more encompassing than most military intelligence.
This is particularly true in the case of missions to combat terrorism, to insert special forces, or to extract special forces.
There are other points at which it is important for planners of joint special operations to take into account the thinking of terrorists or insurgents. To be specific, these are in discussing the:
► Nature of the target
► Adversary and friendly situations
► Environmental characteristics of the operational area.
At the analysis, planning and execution phases of a joint special operation, if the diversity of tactics and the change in levels of operation are taken into account, then we may expect the following impact upon any assessment of the operational environment:
► The proportion of unplanned and/or unanticipated targets compared to planned/anticipated is likely to be much greater; because the tactics used by insurgents are more diverse than those used by SOF, and because the ease of changing the level of operations means that insurgents or terrorists may increase the potential for surprise.
► In the contingency planning and targeting process, centers of gravity and decision points will be diffuse, rather than concentrated; similarly, as stated above, because the tactics used by insurgents are more diverse than those used by SOF, so that their decision points will be less concentrated that would otherwise be the case; and because the ease of changing the level of operations means that insurgents or terrorists are less likely to concentrate their assets.
► It is not certain that centers of gravity would even exist, as discussed above, or if they do that they would be greater in number and smaller in size.
► Time-sensitivity will be both generalized and extreme, i.e. the period when the target’s accessibility is shorter than unusual and the targeting process is compressed.
► The intelligence requirements will be unique.
In contingency planning, the significant of change in level of operations and diversity of tactics is magnified for four reasons. First, the change in level of operations and the diversity of tactics can only increase uncertainty. Second, the change in level of operations and the diversity have a role in the feasibility assessment as well as the initial assessment. Third, they should figure in the target assessment as well as the prioritization of the information acquisition. Fourth and finally, they also have a role in the target information package.
The various consequences of changes in level of operation and a greater diversity of tactic combine to increase risk in joint special operations, however much special operators have an advantage over most of the conventional military force. For example, in the crisis action, the change in level of operations and the diversity of tactics reduce the speed with which planning and targeting can occur. The chances of missing the target increase, or it may cause the operation to miss altogether. The change in level of operations and the diversity of tactics have a role in the provision by special operations of input into the joint force commander’s orders. When considering other facts or under the development of assumptions, in particular status-of-forces and available time, the commander may consider whether they are influenced by the change in level of operations and the diversity of tactics, or in the course of action analysis or war gaming.
As a result, the analysis of the change in level of operations and the diversity of tactics needs to occur at every step of the intelligence gathering and analysis which underpins the planning of operations, and possibly emphasized at every step. They are more important for:
► Psychological operations, i.e. hostile sympathizers, hostile military forces for irregular warfare
► Foreign international defense, i.e. combating insurgents
► Counterterrorism.
The CARVER process
We can now consider the CARVER method of target analysis, described in Appendix F of JP 3-05.1 Joint Special Operations Task Force Operations. The steps of this method are: criticality, availability, recuperability, vulnerability, effect, and recognisability. The CARVER method focuses on the tactical level, which is where the change in level of operations and the diversity of tactics can be observed and dealt with the most effectively. The CARVER method also focuses on the critical point, i.e. the point at which the components of a target should be disabled, again where the change in level and the diversity of tactics matter. In CARVER, the analyst must tailor the criteria and rating scheme to suit the particular strategic, operational, or tactical situation, which means there is an opportunity to take into account the change in level of operations and the diversity of tactics.
In all, this occurs at three of the six stages of CARVER, that is to say:
► Assessment of effect
► Vulnerability
► Recognizability.
This is of greater significance where targets are human or associated with humans.
In order to decide whether a target should be attacked, the effects of such an attack need to be assessed. These effects may be military, political, economic, informational, or psychological, and collateral effects need to be taken into account. The change in level of operations and the diversity of tactics have a role in this particular assessment, since a change in levels can result in very different effects. The same is true of more diverse tactics being employed. Where humans are involved, the collateral effects are always significant, but when it comes to terrorism and/or insurgency, a small impact on human beings has, proportionately, a much greater importance. Terrorism, as we know, aims to kill a few but frighten many.
Change of level of operations and diversity of tactics can also affect the recognizability of targets. Targets must be identifiable under various weather, light and seasonal conditions, without being confused with other targets or target components. Similarly, there must be a distinction between critical damage points and stress points in the targets from similar components in the surroundings. Quick changes in level of operations and greater diversity of tactics will make this more difficult unless they are expected by the special operator.
With appropriate training or augmentation, operators can recognize appropriate computer programs, communications circuits, or similar targets of information operations and missions. It is also important to take into account the change in level of operations and the diversity of tactics in considering threats – again, more difficult unless the special operator is expecting them.
The change in level of operations and the broader range of tactics are also important at several other points:
► At the feasibility assessment
► at the development of assumptions for the initial assessment of the Threat/Target Situation
► at the intelligence regarding limiting factors.
The significance of terrorist or insurgent thinking in the development of assumptions has already been discussed in a previous section. In the case of CARVER, there are at least ‘limiting factors” like intelligence; where various uncertainties could at least be listed. Just as in an operations order, there is a place for assumptions, and therefore for uncertainty in the description of enemy forces – CARVER even uses the word ‘likely’ to describe these forces.
Uncertainty is always a part of the process, and a diversity of tactics and changes in levels of operations make a significant contribution to it. All this can be countered if the special operators are expecting these two characteristics. Having examined the support and opportunities to learning from terrorists and insurgents in the previous three sections, we can now turn to the obstacles to this learning, present in joint special operations planning doctrine and procedures.


6. OBSTACLES TO CHANGE

This paper began with a discussion of the characteristics of terrorist or insurgent thinking. The following section discussed in more detail the characteristics that are the most important to operational planning and procedures. Then the implications for planning doctrine and for planning procedures were discussed in turn. This final section will discuss the obstacles to the changes necessary to take full advantage of the opportunity to learn terrorist and/or insurgent thinking.
This investigation has identified a number of obstacles to learning form terrorist or insurgent thinking in operation planning doctrine and procedures. These are: priorities; static in planning, including the temptation of intellectual tidiness; the difficulty in measuring outcomes; and finally, habitus, established ways of thinking.
The first obstacle to learning from terrorist or insurgent thinking as it has been presented here is that of priorities. Although the doctrine outlined in JP 1, the Doctrine for the Armed Forces of the United States, applies to all the armed forces, in practice, special operators may have to assist the regular forces with whom they are cooperating in order to progress towards a more outside-the-box way of thinking, which are their bread and butter. This is an additional burden to special forces who already have to be at peak operational capacity which commanders would do well to consider carefully – is it possible for special operators to know other services so well that they can operate smoothly and seamlessly with them? In addition, special forces may already be struggling to integrate some of the consequences of terrorist or insurgent thinking, characteristics which may be antithetical to the values which animate the entire organization, within a force structure that is not as quick to change at its enemies. The only reply, of course, is that understanding these characteristics may save lives.
The second obstacle could be called static planning. Despite the frequent affirmations of the fluidity of the security environment, the fact is that the planning remains in practice static and not dynamic. The change in level of operations and the broader range of tactics have trouble being integrated because they present themselves always changing and are therefore not convenient in the planning phase. To the protestation that planners realize they are working in a dynamic environment, it is possible to reply that the changes in level of operations and the broader range of tactics represent the most rapid and least expected of all the changes they are used to seeing. There is little to be done about the speed with which terrorists and/or insurgents change their level of operations or their methods, but it is possible to train special operators to at least expect them. On the other hand, it is a well-known truism that the plan does not survive first contact with the enemy. It is possible that changes to plans in ongoing operations provide the necessary flexibility, but there will always be limits imposed by essential coordination of action of a sophisticated armed force dedicated to limiting casualties of all kinds.
JP 1, the Doctrine for the Armed Forces of the United States, reflects an important barrier to the flexibility of scope and range of tactics in the very nature of the armed force, large, specialized, with routine, regular decision-making; and with its governance by a liberal democracy with a free media. Liberal democracies, although acknowledged as being the best political system available, also brings with it a slow and unwieldy decision-making process, which results not in the optimal outcome, but with the outcome agreeable to the greatest number. While this political scientist is not proposing abandoning liberal democracy as a political system, or to argue that ‘Mussolini made the trains run on time,’ it is important to recognize some of its inherent limitations.
How then does a planner do his or her job? The greatest temptation in planning is undeniable the desire for intellectual tidiness, for being able to slot neatly means and ends. “Joint operational planning uses measurable desired effect to relate higher-level objectives and effects to component mission and tasks.” The biggest trap, however, is in thinking that everyone else in the theatre of operations thinks like the planners do. Legitimacy of government is a good example. The reading of JP 3-0 Joint Operations points to one of the mistakes commonly made with respect to legitimacy: it is tempting and easy to assume that the government of a foreign country usually enjoys legitimacy in the eyes of the population. In post-colonial or post-authoritarian states, or in states with ethnic dissent, that is not always the case. And there is always the possibility that the population is suspicious of its government on a particular issue, such as the handling of the economy, although overall the population trusts the government.
The third obstacle could be called the impossibility of measured outcomes. The problem here is that the desired effects are not necessarily measurable, especially not in a fast-moving situation. The commander, in his process of continuous assessment, can take special note of the possibility of the change in levels and range of tactics. The question, then, becomes how nimble that continuous assessment can be. In addition, the change in level of operations and the broader range of tactics have a place in operation art and operation design, especially since operational design is intrinsic to Joint Operation Planning and Procedures (JOPP). That also means that the two points of interest here, of broader tactics and greater level of action, are intrinsic to JOPP.
The fourth obstacle is habitus. Habitus is the system of durable, transferable dispositions produced by the conditioning associated with a particular class of conditions of existence. Military personnel of all levels are likely to have a strong habitus. Indeed, the entire system of military training is designed to instil the ability to function under conditions of stress unknown to the civilian – reflex action under the threat or actuality of death or grievous harm to oneself or people one has worked with on a ongoing basis. But habitus could, like the tacit dimension postulated by psychologists, be one of the forces that strategy can tap. Habitus can be founded in intuition, and intuition is important to underdog strategic thinking. But if habitus is neither conscious not explicit, it is not possible to use what is useful and set aside what is restrictive. The way out is through the use of thin-slicing, or the ability of the unconscious to find patterns in situations and behaviour based on very narrow slices of experience. Habitus is distinct from intuition, which is essential to the art of strategy, a positive capacity to structure personal knowledge in such manner that it is possible to master and apply developed knowledge but remains open to generating new knowledge.
Until this obstacle is resolved, there can be no question that the integration of the change in level of operation and the greater diversity of tactics poses a serious challenge to the usual thinking of military commanders. If they have managed to retain their creativity and nimbleness of mind to a greater extent than their peers, they are confronted with a system that is complex and not easy to shift. To incorporate the possibility of rapid change of level of operations and use of a broader range of tactics into planning and verification during execution is critical, but it is not enough. Operational art needs to apply and should apply to rank and trade levels other than those who develop strategies or plan campaigns and major operations. It could take the form of a small change to the day-to-day thinking which incorporates the change in level of operations and the broader range of tactics.
Could such a small change make a difference? One example is provided by the introduction of the idea of centers of gravity. “Center of gravity is the set of characteristics, capabilities and sources of power from which a system derives its moral or physical strength, freedom of action, and will to act.” Except for a terrorist or an insurgent, it will be diffuse and not concentrated, so you need to learn to identify the nodes differently. But all center of gravity nodes are by definition areas that are decisive.
The concept of depth in operations is not useful in planning insurgent or terrorist counter-operations, since their forces are diffuse rather than concentrated. Counter-operations lack leverage since there are few, if any, decisive points, and they can be difficult to identify. The doctrine of the US forces hints at difficulties in coping with the differences between a conventional enemy and a terrorist or insurgent enemy. For example, “in actual circumstances there may be no precise distinctions where a particulars state ends and another begins.” Be it a state of war, state of military operations other than war, the lack of discrete circumstances is a difficulty for a planning process which is discrete between war and military operations other than war.


7. IMPLICATIONS FOR TRAINING
This paper began with a discussion of the characteristics of terrorist or insurgent thinking. The following section discussed in more detail the characteristics that are the most important to operational planning and procedures. The previous sections discussed the implications for planning doctrine and procedures. Then this paper discussed obstacles to the change necessary. This section covers the implications for training.
As stated in the introduction, the aim of this paper is to investigate whether the doctrine governing joint special operations allows for two particular new ideas, and if so, where. The conclusion is very clear: while the support given to the introduction of these new ideas is limited, the obstacles are comparatively easily overcome, and both the doctrine and procedures of operations planning are rich in opportunities, although most of the opportunities are at the operational level.
Russ Howard has advocated graduate studies for junior officers in SOF, given the complex security environment. Prof. Gen. Howard’s advice is excellent, but it may not be enough. This graduate training should, among other things, include analogous reasoning to its training so that they may have a fighting chance of being able to cope with the change in level of operations and the diversity of tactics.
How do we transfer some of the characteristics of insurgent thinking to the Special Forces? All of the differences in the way terrorists and insurgents think are summed up by the core idea. The core idea forces the use of more than the rational way most of us are taught in school. It calls on experience, judgment, intuition and everything else that has been learned in the past. We can also start by encouraging analogous thinking. There has been an increase in the use of analogous thinking in recent years, among scientists with some surprising collaborators. “In one of the more unlikely collaborations of modern medicine, Britain’s largest children’s hospital has revamped its patient hand-off techniques by copying the choreographed pit stops of Italy’s Formula One Ferrari racing team. The hospital project has been in place for two years and has already helped reduce the number of mishaps.” Physicians in the US have also sought out unusual collaborators: “A growing number of health care providers are trying to learn form aviation accidents and, more specifically, from what the airlines have done to prevent them. In the last five years, several major hospitals have hired professional pilots to train their critical-care staff members on how to apply aviation safety principles to their work…it is well established that, like airplane crashes, the majority of adverse events in health care are the result of human error, particularly failures in communication, leadership and decision-making.” There is also structurally analogous thinking in other areas of science. For example, “In a trial for a company with a high speed robotic assembly line, it took the algorithm for the waggle dance of bees identifying nectar location (developed by Cardiff University’s Manufacturing Engineering Centre) just a few days to identify the most efficient way to run the machines, much faster than a more conventional program. But there have been structurally analogous thinking in the military sphere, going back to the Duke of Wellington’s ‘A mosquito attack, not a cannon attack,” Churchill’s “We shall attack the underbelly of Europe,” and Patton’s flashes of insight. The study of emergency responders using intuitive methods of decision-making, including military people, is also established.
It is possible to prepare operators by the use of thin-slicing, or the ability of the unconscious to find patterns in situations and behaviour based on very narrow slices of experience. Indeed, this author has developed extensive training methods in this area. As a first step, however, it would be enough for planners, commanders or operators to ask themselves, at each of the points identified in sections 4 and 5 two simple questions. First, what difference would it make if the enemy subdivided the levels of operation into several sub-levels, and then in the course of action suddenly expanded or contracted the level of their operations? Second, what difference would it make to the course of action if the enemy suddenly used different tactics than expected, tactics which our side would not use for humanitarian, legal, or ethical reasons?
It is obvious from considering the syllabus of major planning courses that it would be a small matter to add material on the characteristics of terrorist or insurgent thinking to the curriculum. The problem would be of time- and content- management: those courses are already very compressed. The alternative could simply be to distribute this paper widely, so that special operators may at least be alerted to the possibilities of being blind-sided by known and common ways of thinking of terrorists and/or insurgents.


8. CONCLUSION
The results of the present investigation support looking into the other characteristics of terrorist or insurgent thinking. These characteristics include the following:
► The terrorist or insurgent is always thinking about what the strong are about to do.
► The terrorist or insurgent is holistic.
► The terrorist or insurgent plays a waiting game.
► The terrorist or insurgent is creative
► The terrorist or insurgent sees the big picture.
► The terrorist or insurgent is constantly scanning his environment for possible threats and for possible opportunities.
► The terrorist or insurgent specifically designs each action to suit his strategy.
► The terrorist or insurgent is constantly forecasting for all events and all other actors, and invests in the development of even unlikely scenarios.
► The terrorist or insurgent assumes s/he will lose any direct confrontation.
► The terrorist or insurgent’s passions or passionate feelings are engaged.
► Thinking like a terrorist or insurgent is not just when there is a problem.

It is the hope of this author that asking such questions might actually prevent death, injury, or some other cost of war which might otherwise have occurred.

BIBLIOGRAPHY

Albert, David S. and Daniel S. Papp. The Information Age: An Anthology on Its Impact and Consequences. Washington, D.C. : The Center for Advanced Concepts and Technologies, 1997.
Altman, Israel Elad. Strategies of the Muslim Brotherhood Movement 1928-2007. New York: Hudson Institute, 2009.
Allen, Thomas B. Declassified : 50 Top-Secret Documents That Changed History. Washington: National Geographic, 2008. 305 pages.
Art, Robert J. and Louise Richardson, ed. Democracy and Counterterrorism/Lessons from the Past. Washington: United States Institute for Peace, 2007.
Averett, Christian M., Louis A. Cervantes, and Patrick M. O’Hara. An Analysis Of Special Operations Command – South’s Distributive Command And Control Concept. Monterey: Naval Postgraduate School, 2007.
Benjamin, Daniel and Steven Simon. The Next Attack/ The Failure of the War on Terror and a Strategy for Getting It Right. New York: Holt, 2005.
Benner, Steven M. Evolution Of Maritime Strategy…Is Sea Power 21 The Answer? Carlisle Barracks: US Army War College, 3 May 2004.
Bennett, Bruce W. “Responding To Asymmetric Threats ,” in Stuart Johnson (ed.), New Challenges, New Tools for Defense Decision Making. Santa Monica: Rand, 2003.
Berger, Samuel R., Scowcroft, Brent., Nash, William L., In The Wake Of War : Improving U.S. Post-Conflict Capabilities. New York : Council on Foreign Relations, 2005.
Biddles, Stephen D. American Grand Strategy After 9/11:An Assessment. Carlisle Barracks: Strategic Studies Institute, April 2005, 50 p.
Biddle, Stephen. Military Power : Explaining Victory And Defeat In Modern Battle. Princeton: Princeton University Press, 2004.
Bracey, Earnest N. The Comedy Of War : Understanding Military Policy And Politics For The Twenty-First Century. Lanham: University Press of America, 2006.
Brailey, Malcolm.The Transformation Of Special Operations Forces In Contemporary Conflict : Strategy, Missions, Organisation And Tactics. Duntroon: Land Warfare Studies Centre, 2005.
Briscoe, Charles H. All roads lead to Baghdad : Army Special Operation Forces in Iraq. Fort Bragg: USASOC History Office, 2006. 517 p.
Buley, Benjamin. The New American Way Of War : Military Culture And The Political Utility Of Force. New York : Routledge, 2008.
C4ISR Integrated Architecture Program (CIAP), United States Central Command, Command Intelligence Strategy Document (Fourth Edition, July 1996).
C4ISR Integrated Architecture Program (CIAP), United States Central Command, Command Intelligence Strategy Document (Fifth Edition, May 1997).
Cabanas, Kevin A. Organizing SOCOM for Cross Functional and Geographic Area Operations in the Global War on Terrorism. Newport: Naval War College, 2005.
Canonico. Peter. An Alternate Militarystrategy For The War On Terrorism. Monterey: Naval Postgraduate School, December 2004.
Casebeer, William D. Military Force And Culture Change: Systems, Narratives, And The Social Transmission Of Behavior In Counter-Terrorism Strategy. Monterey: Naval Postgraduate School, 2006.
Casebeer, William D. and James A. Russell. “Storytelling and Terrorism: Towards a Comprehensive 'Counter-Narrative Strategy,'” Strategic Insights IV:3 (March 2005), 1-16.
Centre for Army Lessons Learned, “Targeting for Victory: Winning the Civil Military Operations / Tactics, Techniques, and Procedures,” Targeting for Victory Newsletter 3-23, Sep 2003.
Cernicky, Andrew J. “Moral Power And A Hearts-And-Minds Strategy In Post-Conflict Operations,” in Williamson Murray, Strategic Challenges for Counterinsurgency And The Global War On Terrorism (Carlisle: Strategic Studies Institute, US War College, 2006.
Chambliss, John G. An Assessment Of The United States National Security Strategy For Combating Terrorism. Carlisle Barracks: US Army War College, 3 May 2004.
Chicky, Jon E. A Military Strategy For Central Asia. Carlisle Barracks: US Army war College, 3 May 2004.
Cimbala, Stephen J. Through a Glass Darkly : Looking at Conflict Prevention, Management & Termination. Westport: Greenwood, 2001.
Corum, James S. Fighting the War on Terror / A Counterinsurgency Strategy. St Paul: Zenith, 2007.
Couch, Dick. Chosen Soldier / The Making of a Special Forces Soldier. New York: Three Rivers, 2007.
Council on Foreign Relations. Nonlethal Weapons and Capabilities New York: Council on Foreign Relations, 2004.
Courtney, Hugh, Jane Kirkland and Patrick Viguerie. “Strategy Under Uncertainty,” in Strategy and Force Planning (Newport: Naval War College, 2000), 37-40.
Crocker, Chester. “The Place of Grand Strategy, Statecraft, and Power in Conflict Management.” In Chester A. Crocker, Fen Osler Hampson, and Pamela Aall, Leashing The Dogs Of War : Conflict Management In A Divided World . Washington: United States Institute of Peace Press, 2007.
Cronin, Audrey Kurth, and James M. Ludes. Attacking Terrorism : Elements Of A Grand Strategy. Washington,: Georgetown University Press, 2004.
Davis, Paul K. “Uncertainty-Sensitive Planning,” in Stuart Johnson (Ed.), New Challenges, New Tools for Defense Decisionmaking. Santa Monica: Rand, 2003.
Davis, Paul , Jonathan Kulick, Michael Egner. Implications of modern decision science for military decision-support systems. Santa Monica: Rand, 2005.
Davis, Jacquelyn K. CVX : A Smart Carrier For The New Era. Washington : Brassey's, 1998.
Davis, Lynn E. and Jeremy Shapiro. "Introduction," in Lynn E. Davis (Ed.), U.S. Army and the New National Security Strategy. Santa Monica: Rand, 2003.
Dennison, Thomas. Making Innovation Work/From Strategy to Practice. Conference Board Research Report R-1348-04-RR, 2004.
Drew, Dennis M. And Donald M. Snow. Making Twenty-First-Century Strategy/An Introduction to Modern National Security Processes and Problems. Maxwell Air Force Base: Air University Press, 2006.
Drinkwine, Brian M. The Serpent In Our Garden : Al-Qa'ida And The Long War./ Carlisle: U.S. Army War College, 2009.
Edwards, Sean J. A. Swarming and the Future of Warfare. Santa Monica: Rand, 2005.
Eland, Ivan. Putting "Defense" Back into the U. S. Defense Policy : Rethinking U. S. Security in the Post-Cold War World . Westport: Greenwood, 2001.
Ellis, James O. Terrorism: What’s Coming/The Mutating Threat. Washington: Memorial Institute for the Prevention of Terrorism, 2007.
Etzioni, Amitai. “A National Security Strategy for the Next Administration,” Military Review (Sep 2008) 99-105.
Evans, Michael. The Tyranny Of Dissonance : Australia's Strategic Culture And Way Of War, 1901-2005. Duntroon: Land Warfare Studies Centre, 2005.
Fish, Joanne M., Samuel J. McCraw and Christopher J. Reddish. Fighting In The Gray Zone: A Strategy To Close The Preemption Gap. Washington: Strategic Studies Institute, 2004, 39 p.
Fishel, John T. and Max G. Manwaring. Uncomfortable Wars Revisited. Norman : University of Oklahoma Press, 2006.
Frank, Aaron. B. Pre-Conflict Management Tools: Winning the Peace. Washington: Center for Technology and National Security Policy, National Defense University, February 2005, 37 pages.
Freedman, Lawrence. The Transformation Of Strategic Affairs. New York : Routledge for the International Institute for Strategic Studies, 2006.
Gardner, Hall. American Global Strategy And The "War On Terrorism" . Aldershot: Ashgate, 2005.
Giustozzi, Antonio. Koran, Klashnikov, and Laptop / The Neo-Taliban Insurgency in Afghanistan. New York: Columbia, 2008.
Gompert, David C., Irving Lachow, and Justin Perkins. Battle-Wise Gaining Advantage in Networked Warfare. Washington: Center for Technology and National Security Policy, National Defense University, January 2005.
Gompert, David C. “Heads We Win : The Cognitive Side of Counterinsurgency (COIN),” RAND Counterinsurgency Study, Paper 1. Santa Monica: Rand, 2007.
Gonnella, Joseph. Terrorism Prevention: How Does Special Operations Fit In? Fort Leavenworth: U.S. Army Command and General Staff College, 2005.
Gooch, John. "Clio and Mars: The Use and Abuse of History" in Perlmutter, Amos (ed.), Strategy and the Social Sciences : Issues in Defense Policy. London: Cass, 1981Gray, Colin S. War, Peace And International Relations : An Introduction To Strategic History. London: Routledge, 2007.
Haass, Richard N. Intervention : The Use of American Military Force in the Post-Cold War World. New York: Carnegie Endowment for International Peace, 1998.
Habeck, Mary. “Jihadist Strategies in the War on Terrorism,” Heritage Foundation: Heritage Lectures no. 855, November 2004, 5 pages.
Hanley, Brian. Planning for Conflict in the Twenty-First Century. Westport: Praeger, 2008.
Harrell, Margaret C., Shaila Nataraj Kirby, Jennifer S. Sloan, Clifford M. Graf II, Christopher J. McKelvey and Jerry M. Sollinger, Barriers to Minority Participation in Special Operations Forces (Santa Monica: Rand 1999), 139 p.
Hart, Gary. Fourth Power : A Grand Strategy for the United States in the Twenty-First Century. London: Oxford University Press, 2004.
Hastings, Michael D. The Integration Of Conventional Forces And Special Operations Forces. Fort Leavenworth: U.S. Army Command and General Staff College, 2005
Hattiangadi, Anita U. The Third Annual Navy Workforce Research and Analysis Conference: Supporting Military Transformation CRM D 0008431.A2/Final, Washington: CAN, June 2003, 38 pages.
Heng, Yee-Kuang. War As Risk Management : Strategy And Conflict In An Age Of Globalised Risks. New York : Routledge, 2006.
Hentz, James J. The Obligation Of Empire : United States' Grand Strategy For A New Century. Lexington: University Press of Kentucky, 2004.
Heymann, Philip B. and Juliette N. Kayyem. Protecting Liberty in anAge of Terror. Cambridge: MIT Press, 2005.
Hicks, Kathleen and Eric Ridge. Planning for Stability Operations/The Use of Capabilities-Based Approaches. Washington: CSIS Report, 2007.
Hoehn, Andy. N3w Division of Labor : Reconsidering American Strategy and Forces to Meet New Challenges. Santa Monica: Rand, 2007.
Hoge, James F. and Gideon Rose, eds. Understanding the War on Terror. Washington: Foreign Affairs, 2005.
Homeland Security Institute. National Cargo Security Strategy White Paper. http://www.homelandsecurity.org/bulletin/White_Paper_12-09-04_ver__1_8.pdf, 2004.
Howard, Russell D. Defeating Terrorism : Shaping The New Security Environment. Guilford: McGraw-Hill Companies, 2004.
James, Michael E. Special Operations: Achieving Unified Direction in the Global War on Terrorism. Fort Leavenworth: United States Army Command and General Staff College, 2006.
Jentleson, Bruce W. “Military Force against Terrorism: Questions of Legitimacy, Dilemmas of Efficacy.” In Daalder, Ivo H.(Editor). Beyond Preemption : Force and Legitimacy in a Changing World. Washington: Brookings Institution Press, 2007.
Joint Staff, Joint training manual for the Armed Forces of the Unites States CJCSM 3500.03A, Washington: Joint Chiefs of Staff, September 2002.
Keller, William W. and Gordon R. Mitchell. Hitting First : Preventive Force In U.S. Security Strategy. Pittsburgh: University of Pittsburgh Press, 2006.
Kendall, Anthony. “Le leader créatif.” Air and Space Power en français, Spring 2009 100-7.
Kinross, Stuart. Clausewitz And America : Strategic Thought And Practice From Vietnam To Iraq. London : Routledge, 2008.
Kilcullen,David. The Accidental Guerrilla / Fighting Small Wars in the Midst of a Big One. London: Oxford University Press, 2009.
Kiras, James D. Special Operations And Strategy : From World War II To The War On Terrorism. New York : Routledge, 2006.
Kirkwood, Lea T. The European Union Counter-Terrorism Strategy: Origins, Problems, And Prospects. Monterey: Naval Postgraduate School, 2006.
Klein, Gary. Intuition at Work: Why Developing Your Gut Instincts Will Make You Better at What You Do. New York: Random House, 2003.
Knott, Steven W. “Knowledge Must Become Capability”: Institutional Intellectualism As An Agent For Military Transformation,” in Williamson Murray, Ed. A Nation At War In An Era Of Strategic Change. Carlisle: Strategic Studies Institute, US War College, 2004.
Kreighbaum, Jay M. Force-Application Planning / A Systems-and-Effects-Based Approach. Maxwell Airforce Base: Air University Press, 2004.
Kunreuther, Howard, Robert Meyer and Erwann Michel-Kerjan. “ Strategies for Better Protection against Catastrophic Risks.” Risk Management and Decision Processes Center, The Wharton Working Paper # 2007-09-14, September 2007.
Lacey, Jim. The Canons of Jihad / Terrorists’ Strategy for Defeating America. Annapolis: Naval Institute Press, 2008.
Lewis, Harmon S. Breaking the Code for Operational Planners: A Comparative Analysis of National Security Strategies Since the End of the Cold War. Norfolk: Joint Advanced Warfighting, 2008.
Lewis, Leslie, James A Coggin, and C. Robert Roll. The United States Special Operations Command Resource Management Process/An Application of the Strategy-to-Tasks Framework. MR 445 A/SOCOM. Rand: Arroyo Center, National Defense Research Institute, 1994.
Liotta, P.H. “A Strategy of Chaos,” in Strategy and Force Planning (Newport: Naval War College, 2000), 598-611.
Liller, Otto K. Special Operations Forces and Foreign Internal Defense: An Effective Counterterrorism Method. Newport: Naval War College, 2005.
Lingel, Sherrill Lee. Methodology For Improving The Planning, Execution, And Assessment Of Intelligence, Surveillance, And Reconnaissance. Santa Monica: RAND, 2007.
Lind, Michael. American Way of Strategy. London: Oxford University Press, 2006.
Loveman, Brian. Strategy For Empire : U.S. Regional Security Policy In The Post-Cold War Era. by Lanham: SR Books, 2004.
Lum, Cynthia, Leslie W. Kennedy and Alison J. Sherley. The Effectiveness Of Counter-Terrorism Strategies/ A Campbell Systematic Review. Newark: Rutgers University, 2006.
Mahnken, Thomas G., and Thomas A. Keaney. War in Iraq : planning and execution. New York : Routledge, 2007.
Maine Emergency Management Agency. State Of Maine Statewide Homeland Security Strategy Goals and Objectives Matrix. http://www.maine.gov/tools/whatsnew/attach.php?id=23095&an=1 January 2006.
Malik, Irfan Ahmed. Islam, Terrorism, And The Strategy Of Enlightened Moderation. Fort Leavenworth: U.S. Army Command and General Staff College, 2005
Malloy, Martin L. The U.S. Coast Guard’s Ports, Waterways And Coastal Security Strategy Deployment Plan: An Operational Design For Maritime Homeland Security. Newport: Naval War College, 09 February 2004
Mandel, Robert. Security, Strategy, and The Quest For Bloodless War. Boulder: Lynne Rienner, 2004.
Marston, Daniel and Carter Malkasian. Counterinsurgency in Modern Warfare. London: Osprey, 2008.
McDonough, William. “Time for a New Strategy.” Parameters (Autumn 2008), 109-119.McFadyen, Thomas. An Effects-based Approach to Global Special Operations. Newport: Naval War College, 2006.
Mead, Water Russell. Power, Terror, Peace and War / America’s Grand Strategy in a World at Risk. New York: Knopf, 2005.
Meinhart, Richard, “Strategic Planning by the Chairmen, Joint Chiefs of Staff, 1990 to 2005,” Letort Papers April 2006, 29 pages.
Metz, Steven. Iraq & The Evolution Of American Strategy. Washington: Potomac Books, 2008.
Millar, Alistair and Eric Rosand. Allied Against Terrorism: What/s Needed to Stregthen Worldwide Commitment. Washington: Century Foundation, 2006.
Miller, Steven E., Sean M. Lynn-Jones, and Michael E. Brown. America's Strategic Choices. Boston: MIT Press, 2000.
Mintzberg, Henry, Bruce Alhstrand and Joseph Lampel, ed. Strategy Bites Back. New York: Prentice Hall, 2005.
Moghaddam, Fathali M. and Anthony J. Marsella. Understanding Terrorism / Psychosocial Roots, Consequences, and Interventions. Washington: American Psychological Association, 2004.
Morris, Michael F. “Al-Qa’ida As Insurgency: The Quest For Islamic Revolution,” in Williamson Murray, Strategic Challenges For Counterinsurgency And The Global War On Terrorism. Carlisle: Strategic Studies Institute, US War College, 2006.
Murdock, Clark A. Improving The Practice Of National Security Strategy : A New Approach For The Post-Cold War World. Washington: CSIS Press, 2004.
Murray, Williamson, Ed. “Introduction.” In A Nation At War In An Era Of Strategic Change. Carlisle: Strategic Studies Institute, US War College.
Nawaz, Raja Rab. Maritime Strategy in Pakistan. Monterey: Naval Postgraduate School, December 2004.
Newell, Thomas Jr. The Use Of Special Operations Forces In Combating Terrorist Financing. Monterey: Naval Postgraduate School, 2006.
Newman, Robert B. Applying The ‘Forward Strategy Of Freedom’ To Tunisia: A Case Study In The Global War On Terrorism. Carlisle Barracks: US War College, 3 May 2004.
Norwitz, Jeffrey H. ed. Armed Groups/Studies in Naitonal Security, Counterterrorism and Counterinsurgency. Newport: Naval War College, 2008.
Ochmanek, David A. Military Operations Against Terrorist Groups Abroad : Implications For The United States Air Force. Santa Monica: RAND, 2003.
O'Hanlon, Michael E. Defense Strategy for the Post-Saddam Era. New York: Brookings Institution Press, 2005.
O’Quinn, Charles R.V. An Invisible Scalpel: Low-Visibility Operations In The War On Terror. Fort Leavenworth: US Army Command and General Staff College, 2006.
Owens, Mackubin Thomas. “Thinking About Strategy,” in Strategy and Force Planning (Newport: Naval War College, 2000), 426-434.
Owens, John E., and John W. Dumbrell. America's "War On Terrorism" : New Dimensions In U.S. Government And National Security. Lanham: Lexington Books, 2008.
Partin, John W. and Rob Rhoden, Operation Assured Response: SOCEUR’s Neo in Liberia April 1996, United States Special Operations Command History and Research Office, September 1997, 50 pages
Peña, Charles V. Winning The Un-War : A New Strategy For The War On Terrorism. Washington: Potomac Books, 2006.
Pirnie, Bruce. Analysis of Special Operations Forces in Decision Aids / Recommendations. Rand: Santa Monica, 1994.
Pirnie, Bruce and Margaret C. Harrell. “Analysis of Special Operations Forces in Decision Aids: Current Shortfalls,” Rand Note 3536-SOCOM/JS, 1994.
Posner, Richard A. Countering Terrorism / Blurred Focus, Halting Steps. New York: Rowman Littlefield, 2007.
Redmond, Anthony D. ABC Of Conflict And Disaster. Oxford : BMJ Books, 2006.
Reed, Donald J. “Why Strategy Matters in the War on Terror,” Homeland Security Affairs II:3 (October 2006), 1-24.
Rekasius, Mindaugas. Unconventional Deterrence Strategy. Monterey: Naval Postgraduate School, 2005.
Reichberg, Gregory M., Henrik Syse, and Endre Begby. The Ethics Of War : Classic And Contemporary Readings. Oxford : Blackwell, 2006.
Renshon, Jonathan. Why Leaders Choose War : The Psychology Of Prevention. Westport: Praeger Security International, 2006.
Reveron, Derek S. and Judith Hicks. Inside Defense : Understanding The U.S. Military In The 21st Century. New York : Palgrave Macmillan, 2008.
Riedel, Bruce. The Search for Al Qaeda/ Its Leadership, Ideology, and Future Washington: Brookings, 2009.
Rogers, Larry B. On The U.S. National Security Strategy. Washington: Strategic Studies Institute, 2004, 20 p.
Rosenthal, Uriel and Ermwin R. Muller. The Evil of Terrorism/ Diagnosis and Countermeasures. Springfield: Thomas, 2007.
Rostker, Bernard. “Transformation and hhe Unfinished Business of Jointness: Lessons for the Army from the Persian Gulf, Kosovo, And Afghanistan,” in Lynn E. Davis (Ed.), U.S. Army and the New National Security Strategy. Santa Monica: Rand, 2003.
Rudd, David, Deborah Bayley, Ewa K. Petruczynik. Beyond The Three-Block War. Toronto : Canadian Institute of Strategic Studies, 2006.
Salmoni, Barak A. and Paula Holmes-Eber. Operational Culture for the Warfighter. Quantico: Marine Corps University Press, 2008.
Sauter, Mark A. and James J. Carafano. Homeland Security/ A complete Guide to Understanding, Preventing, and Surviving Terrorism. New York: McGraw-Hill, 2005.
Scout, M.E., J. M. Huckabey, J.R. Schindler. The Terror8st Perspectives Project/ Strategic and Operational Views of Al Qaida and Associated Movements. Annapolis: Naval Institute, 2008.
Scurlock, Robert E. Jr. “The Human Dimension of transformation,” in Williamson Murray, Ed. A Nation at War in an Era of Strategic Change. Carlisle: Strategic Studies Institute, US War College, 2004.Schliep, Randy. A Time To Kill: When Is Leadership Targeting An Effective Counterterrorism Strategy. Monterey: Naval Postgraduate School, 2007.
Shaffer, Donald L. Unraveling Al Qaeda’s Strategy. Norfolk: Joint Forces Staff College, Joint Advanced Warfighting School, 2005.
Sheehan, Iva S. When Terrorism and Counterterrorism Clash / The War on Terror and the Transformation of Terrorist Activity. Youngstown: Cambria, 2007.
Sheehan, Michael A. Crush the Cell / How to Defeat Terrorism Without Terrorizing Ourselves. New York: Crown, 2008.
Slater, Michael D. An Analysis Of Australia’s National Strategy In The War Against Terror. Carlisle Barracks: US Army War College, 3 May 2004.
Smith, Jerry D. The Effectiveness Of Israel’s Counterterrorism Strategy. Monterey: Naval Postgraduate School, 2005.
Sloan, Elinor C. Military Transformation And Modern Warfare : A Reference Handbook. Westport: Praeger, 2008.
Sorensen, Ian. Using The National Strategy For Combating Terrorism To Determine Objectives And End States For Operation Iraqi Freedom. Carlisle Barracks: US Army War College, 3 May 2004.
Spencer, Emily. " Grass Roots" : Perspectives Of Senior Non-Commissioned Officers On Operations. Kingston: Canadian Defence Academy Press, 2008.
Sullivan, Michael K. How To Win And Know It: An Effects-Based Approach To Irregular Warfare. Monterey: Naval Postgraduate School, 2007.
Thompson, Burt K. “Nation Building: A Bad Idea Whose Time Has Come?” in Williamson Murray (ed). A Nation at War In An Era Of Strategic Change. Carlisle: Strategic Studies Institute, US War College, 2004.).
Tucker, David. Confronting The Unconventional : Innovation And Transformation In Military Affairs. Carlisle: Strategic Studies Institute, U.S. Army War College, 2006.
Tucker, David and Christopher J. Lamb. “Restructuring Special Operations Forces for Emerging Threats,” Strategic Forum 219 (Jan 2006), 1-6.
UK Government. The United Kingdom’s Strategy for Countering International Terrorism. London: Houses of Parliament, 2009.
UK Government. Countering International Terrorism: The United Kingdom’s Strategy. London: Houses of Parliament, 2006.
US Government. The National Counterintelligence Strategy of the United States of America. Washington: Directorate of National Intelligence, 2006, 13 p.
US Government. National Strategy for Combating Terrorism. Washington: Office of the President of the United States, September 2006, 29 pages.
United States Government Accountability Office. Special Operations Forces Several Human Capital Challenges Must Be Addressed To Meet Expanded Role. Washington: Subcommittee on National Security, Emerging Threats and International Relations, Committee on Government Reform, House of Representatives, 2006.
United States Government Department of Defense. Strategy for Homeland Defense and Civil Support. Washington, 2005.
United States Government Federal Emergency Management Agency. Continuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide s.d.
United States Transportation Command, Joint Deployment System (JDS) Procedures Manual, 22 February 1988, 40 pages.
Vickers, Michael. Socom’s Missions And Roles. Washington: United States House Of Representatives, Committee On Armed Services Subcommittee On Terrorism, Unconventional Threats And Capabilities, 2006.
Wahlert, Thomas D. U.S. National Security Strategy - The Magnitude
Of Second And Third-Order Effects On Smaller Nations: The Cases Of Lebanon During The Cold War And Pakistan During The Global War On Terrorism. Carlisle Barracks: US Army War College, 3 May 2004.
Yarger, Harry R. Strategy And The National Security Professional : Strategic Thinking And Strategy Formulation In The 21st Century. Westport: Praeger, 2008.
Zimmerman, Doron and Andreas Wenger. How States Fight Terrorism / Policy Dynamics in the West. Boulder: Rienner, 2007.