June 21, 2020 0 Comments

through USCINCSOC An Operation Plan in Concept Format ( CONPLAN) is an operation plan in an abbreviated format that would. Conplan pdf converter. Word to pdf converter, convert excel, ppt to pdf adobe. Access from anywhere you can access the free pdf file converter anywhere. campaign strategy against terrorism is contained in Concept Plan (CONPLAN) Crafted at the United States Special Operations.

Author: Nazshura Kekazahn
Country: Rwanda
Language: English (Spanish)
Genre: Life
Published (Last): 28 June 2014
Pages: 446
PDF File Size: 16.67 Mb
ePub File Size: 8.11 Mb
ISBN: 824-2-56065-598-2
Downloads: 67858
Price: Free* [*Free Regsitration Required]
Uploader: Akinogrel

By Major John P. One of the legs of the Army special-operations-forces triad, Civil Affairs, continues to deploy persistent elements into austere environments throughout the xonplan and to operate in, around and near the operational ecosystem of violent extremist organizations, or VEOs.

The 95th Civil Affairs Brigade sends civil-military support elements, or CMSEs, to identify vulnerabilities that can lead to the propagation of extremist groups in the Sahara.

A company of linguistically and regionally trained Francophone specialists of the 91st Civil Affairs Battalion are currently deployed to Conplam Africa. These four-Soldier Civil Conplqn teams, or CATs, conlan culturally and linguistically attuned to the environment in which they operate.

They meet conpln key influential leaders and groups of people who are susceptible to VEOs and their ideology. CMSEs are a critical component of the indirect, through-and-with methodology that helps create networks and encourages the vulnerable populations to trust their own government, rather than the VEOs, to take care of conpla needs. The CMSEs engage the traditional seats of power in these key communities and groups.

They understand the human terrain and are able to physically map the people’s location, understand their migratory routes and get an intimate understanding of their needs and wants. CMSEs also understand what groups operate in the area: Using their understanding of the groups, they also have the ability to pinpoint gaps in the state’s ability to deliver services or security in an area. By understanding these shortfalls and by understanding the capabilities of groups like NGOs or IGOs, the CMSEs can coordinate services to bolster the capabilities of the state to counter the VEOs’ attempts to lure people away from the state.

A CMSE assesses partner-nation capacities to develop and sustain government and local institutions, including infrastructure development, that address the population’s basic humanitarian needs.

Soft conppan is the ability to get desired outcomes because others want what you want. It is the ability 77500 achieve donplan through attraction rather than coercion. It reflects the primacy of indirect approaches, both conolan deter active and tacit support for VEOs and to erode extremist support for VEO ideology.

IW favors indirect and asymmetric approaches, though it may employ the full range of military and other capabilities, in order to erode an adversary’s power, influence and will. It is inherently ocnplan protracted struggle that will test the resolve of our nation cconplan our strategic partners. The questions at hand are: The term “terrorist networks” is a quick way to describe VEOs that do not organize hierarchically.

The Future of Terror, Crime and Militancy. Under this concept, numerous dispersed small groups using the latest communications technologies could act conjointly across great distances.

Additionally, the network can compartmentalize the cells, themselves, insulating their functions, such as logistics, finance or communications, so that other cells will know nothing about them. One key aspect needed for success of the network is the social basis for cooperation among network members. When social ties are strong, and mutual trust and identity exists, a network’s effectiveness is greatly coplan.

That can be seen most clearly in ethnically based terror, crime and insurgent groups, in which clan ties bind together even the most dispersed organization. Kathleen Carley, a noted social scientist and the developer of dynamic network analysis, notes that terrorist networks are distinct from those in typical hierarchical organizations — they are cellular and distributed.

The majority of discussion seems to center on the operational level of terrorist disruption. This article describes a method of building trust between elements of cohplan CMSE and key communicators and influencers in or near key geographic areas. By influencing key individuals within communities and engaging vulnerable populations, we can induce the people to gravitate toward the influence of the state. The state, however, must make tangible and concrete reforms to address the vulnerable populations’ grievances.

The ability of the CMSEs cnplan move within the population allows them to use DoD’s lines of effort and operations to work by, through and with common-minded groups as directed by CONPLAN for the use of both a direct and indirect approach to fighting terrorist networks. The enduring results come from indirect approaches — those in which we enable partners to combat extremist organizations themselves by contributing to their capabilities through advising, training and — when authorized and funded — equipping.


That includes efforts to deter active and tacit support for VEOs in areas where the existing government is either unwilling or unable to remove terrorist sanctuaries.

The CMSEs’ modus operandi is to meet with key leaders and influencers within a specific geographic area, focusing on a group relevant to the interests of the U. CMSEs cultivate relationships and create their own light networks within each country. The CMSE establishes itself as a hub by developing additional nodes with like-minded groups such as NGOs, partner-nation military forces or civic leaders.

The networks created by the teams can be either enduring or short-lived, based on the operational requirements. CMO training of partner-nation forces is another component of network disruption.

CMSEs across the Sahel engage with elite, partner-nation special-operations troops. The CMSEs train the leaders of security forces to listen to grievances, treat people humanely and provide tangible benefits for those who cooperate with the partner-nation government. A method of validating grievances is to analyze the partner-nation’s ability to provide key services, such as medical care. One can quickly ascertain where groups predominantly stay. Agency for International Development, to move resources around within the city to provide care to vulnerable populations.

Operation Plans [OPLAN]

The CMSE may also expand into the area by extending the capability of the state through local medical engagements by bringing doctors from more populated areas to augment the existing healthcare in the area. Teams observe and analyze their operational environment from a variety of different perspectives: Through those relationships, teams will form ad-hoc networks.

Those networks may have humanitarian aid or assistance as a shared common factor. Geographic relationships are important, as well. If an individual or node has a relationship with a VEO logistics facilitator in country X but is currently operating in country Y, they still maintain a relationship. Finally, the CMSEs consider the temporal component.

If a nomadic group comes through an area only once every few months to sell its animals or every few weeks to draw water at specific oasis in the Sahara, the CMSE will be unable to engage that particular group.

Growing seasons and rain have a major impact on the movement of the CMSE and its ability to engage key groups. The relational, geographical and temporal perspectives are important in historical analysis and in developing a predictive or pattern-of-life element.

There is a secondary benefit to creating networks with the partner-nation government: Those networks may occur in the same geographic area that VEO networks use for the sustainment of their operations.

These lower-level networks, if one were to imagine them in a terrorist organization, would be the nexus between drug traffickers, weapons traffickers, corrupt officials, illicit-business operators, criminal groups and bandits. Some of those groups or individuals may not even be aware that they could be dealing with a VEO. These groups or individuals are the necessary connection between the dark, illicit terrorist network and the licit environment.

The CMSE, through continuous contact with the civil population and persistent presence in key areas, gains an understanding of the security environment in the local area.

It will learn if the state’s taxation is not transparent, which companies are legitimate and which corrupt, which tribes are in the area, when the growing and rainy seasons are, and whether there is friction between herders and irrigation farmers. They will also determine through contact with the local population and the local security services which groups are alienated from the local and national government.

The 95th CA Brigade’s CA teams conduct a diverse set of activities, promoting development and goodwill through the building of infrastructure, training in job skills and the provision of medical, dental and veterinary care in areas where existing government structures are unable or unwilling to provide those services.

As with security-force assistance, the focus of special-operations CA teams is on long-term capacity-building within local and national structures. Ayman al-Zawahiri announced a “blessed union” between the groups, declaring France an enemy and indicating that they would fight against French and American interests.

In Januarythe group announced that it had changed its name to reflect its alliance with al-Qaeda, from which it receives material and financial support. Brinton Milward and Jorg Raab offer a short description of a cocaine network. Even though decentralized, the traffickers began to be the target of much greater control efforts by the U. That encouraged them to substitute technology for structure and buy more sophisticated communications equipment, which allowed the separate parts of the network to coordinate their activities much better without being in close proximity to one another.

  DTH 8654 PDF

That allowed various groups to come together quickly, make a shipment happen and then disperse. The Internet, worldwide fund transfers, data transmissions, cheap encrypted cell phones and television can all be used to create a terrorist community without propinquity or proximity. In addition to physical space and technology, finances are clearly a resource that dark networks must have to continue to operate.

Linkages between the nodes in a network are facilitated by trust between the actors, based on reciprocity and the ability to reward cooperation by transferring resources to the complying party. In the attempt to pull vulnerable populations away from the central government, AQIM will provide medicines, food and money to key populations they are trying to influence.

A local Malian website, maliweb. Local people no longer see AQIM as evil because it has provided services that the state does not. Imagine a village where there is no infirmary and AQIM brings drugs: People would see AQIM militants as generous, peaceful and religious.

Hezbollah, like other terrorist organizations, is fully aware of the importance of the battle for hearts and minds; its objective is to influence the insights and perceptions of various target audiences in Lebanon and abroad. VEOs in West Africa also use smuggling networks and groups to provide necessary sustainment: In northern Mali, the Tuareg nation is made up of a variety of tribes and subtribes, not all of which are involved with VEOs; however, there are opportunists within that group of people who take advantage of the ungoverned space in northern Mali, southern Algeria, Niger, Chad and southern Libya.

Those people may be opportunistic, as the amount of money that has been funneled into VEO networks runs into the tens of millions of dollars.

Out of Africa

The AQIM terrorist group has sustained itself since primarily through revenues derived from the business of taking Westerners hostage. It also engages in drug trafficking and receives some donations. The Maghreb group’s kidnap-for-ransom business, especially in North Africa, generates many millions of dollars. CMSEs play an important role in interagency coordination in west Africa. The CMSE, in particular, operates in conjunction with key members of the country team, including the office for security cooperation, the defense attache, the deputy chief of mission, the regional security officer, USAID country directors, and the ambassador or chief of mission.

Depending on the footprint of U. The CMSEs create informal, ad-hoc relationships that appear and dissolve, based on the needs of the environment. It can be inordinately difficult to coordinate the operational objectives of so many disparate partners with a variety of different goals that are sometimes diametrically opposed. The CMSE must conduct rapid stakeholder analysis of the key personnel in its operational environment. For example, in one west African country, the country team was supportive of an initiative to spend more time in rural areas and establish a de facto soft-power American presence that would be “just like the Peace Corps.

The various viewpoints of key personnel toward a CMSE goal can still have common elements, and the CMSE must be able to analyze the main points of each party’s position and market the concept in which they are willing to invest. Finding the right balance between self-interests and domain interests is a delicate maneuver, however, as each organization seeks mechanisms that enable it to coordinate with others and yet not be coordinated by others.

NGOs and IOs will provide aid to peoples whose governments cannot provide that support. CMSEs map the capabilities and geographic locations of NGOs, understand their goals, and encourage appropriate organizations to go to areas that are of concern to the Department of Defense.

Nancy Roberts’ article in the March-April Public Administration Review, she states that increasing linkages between and among organizations have their advantages in enhancing collaboration toward a commonly defined problem. The CMSE conducts operations using a variety of mechanisms to legitimize the partner-nation government, build the capacity of military forces and determine civil vulnerabilities that can be exploited by VEOs.

CMSEs engage different levels of the partner-nation government, from national-level ministries to a mayor’s staff in a town of people.