MOD 3: Irregular Warfare
We will look at:
History, prevalence, locations, types, & characteristics of
The Problem
Look at the effects
The Problem
has had on areas, people, regions, societies & Inter. & U.S. interests
MOD 2: Plans & Operations
Government, Organization, Community Responses:
UN, NATO, Other Governments, White House, Dept. of State (DOS), U.S. Agency for International Development (USAID), Dept. of Homeland Security (DHS), Intelligence Community (IC), DOD
Irregular Threats & Intelligence
Rule-of-law, corruption, cutting edge technologies, devices, programs & developments
Gaps research, doctrine & institutional gaps as well as implementation and other gaps of knowledge
Afghanistan Oct. 2011
Iraq Baghdad Aug. 2007, 500-790 killed
Pakistan May 2011 Navy Base
MOD 1: Terrorism
Spillover with Irregular Threats
• Learn about the different types of
irregular threats
• Understand IW subtopics & IW
operating concept
• Be able to describe tactical,
operational & strategic precepts
• Explain why Info/Intel are so vital
• Sync Info/Intel efforts
• Discuss indirect & direct approaches
Teaching/Learning Outcome
MOD 6: Government & Governance
Pakistan Dec. 2007 Benazir Bhutto
© Copyright 2014 Richard J. Campbell
(1) Ownership: Richard J. Campbell owns the copyright in (a) this website; and (b) the material on this website (including, without limitation, the text, computer code, artwork, photographs, images, music, audio material, video material and audio-visual material on this website), unless otherwise labeled, referenced, or cited. (2) Credit: This document was created using an SEQ Legal template: http://www.seqlegal.com/ (3) Copyright license: The owner grants to you a worldwide, non-exclusive, royalty-free, revocable license to: (a) view this website and the material on this website on a computer, or mobile device via a web browser; (b) view this material via instructional presentation; (c) view printed pages from this website or presentation for your own personal and non-commercial use. The owner does not grant you any other rights in relation to this website or the material on this website. In other words, All Other Rights Are Reserved. For the avoidance of doubt, you must not adapt, edit, change, transform, publish, republish, distribute, redistribute, broadcast, rebroadcast, present, or show or play in public this website or the material on this website (in any form or media) without prior written permission from the owner. (4) Data mining: The automated and/or systematic, sporadic, or routine collection of data from this website is prohibited, at all times. (5) Permissions: You may request permission to use the copyright materials on this website by writing to: joerichardcampbell@yahoo.com (6) Enforcement of copyright: The owner takes the protection of our copyright very seriously. If he discovers that you have used his copyright materials in contravention of the license above, we may bring legal proceedings against you, seeking monetary damages and/or an injunction to stop you using those materials. You could also be ordered to pay legal costs. If you become aware of any use of our copyright materials that contravenes or may contravene the license above, please report this by email to: joerichardcampbell@yahoo.com (7) Infringing material: If you become aware of any material on our website that you believe infringes your or any other person's copyright, please report this by email to: joerichardcampbell@yahoo.com
Nigeria Jan 2012, Boko Haram attack 145 civilians, 32 police
U.S. Department of Defense, Joint Staff (2015). Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms (As Amended Through Mar. 2015). Washington D.C.
Campbell, R. J. & M. G. Murray Editor (2011). FM 3-24 / MCWP 3-33.5 Counterinsurgency Revision Preanalysis. Ft. Leavenworth KS, Joint Center for International Security Force Assistance, Community of Interest
Campbell, R. J. & C. C. Crane (2012). COIN In A Box. Ft. Leavenworth KS, Joint Center for International Security Force Assistance, Community of Interest
Campbell R. J. & C. C. Crane (2012). Polishing COINs. Ft. Leavenworth KS, Joint Center for International Security Force Assistance, Community Of Interest
IW Countering Irregular Threats Joint Operating Concept v.2
Irregular Warfare (IW) activities
To prevent, deter, disrupt, dismantle, and defeat irregular threats, the Joint Force must:
Understand in depth
Plan and execute in concert with partners
Asses and adapt in response to the dynamic and complex nature of the problem
Description
Advanced level, on-line, non-classified course about terrorism, insurgency, instability, unconventional warfare, corruption, transnational organized crime (TOC) & proliferation weapons of mass destruction (WMD)
Teachable, Prezi lectures, videos, reading & writing, reference library
Content
• Characteristics, definitions & past/present irregular threats
• Nexus between instability, corruption, organized crime & TOC
• Countermeasures for irregular threats; Intl., U.S.
• Best practices, lessons learned & accepted precepts/premises
Reading assignments for Intro:
1. U.S. Joint Doctrine Note 1-13, Security Force Assistance, 2013,
Cover through pg. III-15
2. US Government Accountability Office Report to Congress Security
Force Assistance (2012), Cover through pg.
3. Dept. of Defense Dir., Number 3000.07 Irregular Warfare, Dec. 2008
4. U.S. Government Accountability Office, Report to Congressional
Committees, Security Force Assistance, Additional Actions Needed to
Guide Geographic Combatant Commanders & Service Efforts, 2012
Video assignments for Intro:
GEN Mattis, IW, Hybrid Threats:
Admiral Stavridis Global Security:
Malayan Emergency Part 1, Part 2 & Part 3: Email instructor for links.
Importance of Info/Intel
Problem definition & requirements
Collection, analysis & dissemination
Psych, Socio & Cultural Considerations
MOD 4: Information & Intelligence
MOD 5: Safety & Security
Safety vs. Security:
Oil Spot, Tactical Ops,
Community Policing,
Training aspects,
Rules of Engagement,
Area of Responsibility
Paris 2015
Syria 2015
Africa 2015
MOD 7: Stability & Development
Syria 2015
MOD 8: Financial Management & Monitoring
Natural resources, illicit
activities, terrorist financing
& threat financing, world organizations, transparency, compliance,
Developed in response to the 2015 Combatting Terrorism Technical Support Office Broad
Agency Announcment.
Other content has been
added since.
Madrid Spain Mar. 2004
Clear, well defined, measurable criteria.
http://irregular-threats.usefedora.com/
Present Remotely
Send the link below via email or IM
Present to your audience
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Irregular Threats & Intelligence
Introduction
by
Tweet

