Part of a series on |
War Outline |
---|
Irregular warfare (IW) is defined in United States joint doctrine as "a violent struggle among state and non-state actors for legitimacy and influence over the relevant populations." [1] In practice, control of institutions and infrastructure is also important. Concepts associated with irregular warfare are older than the term itself. [2]
Irregular warfare favors indirect warfare and asymmetric warfare approaches, though it may employ the full range of military and other capabilities in order to erode the adversary's power, influence, and will. It is inherently a protracted struggle that will test the resolve of a state and its strategic partners. [3] [4] [5] [6] [7]
The term "irregular warfare" was settled upon in distinction from "traditional warfare" and "unconventional warfare", and to differentiate it as such; it is unrelated to the distinction between "regular" and "irregular forces". [8]
One of the earliest known uses of the term irregular warfare is in the 1986 English edition of "Modern Irregular Warfare in Defense Policy and as a Military Phenomenon" by former Nazi officer Friedrich August Freiherr von der Heydte. The original 1972 German edition of the book is titled "Der Moderne Kleinkrieg als Wehrpolitisches und Militarisches Phänomen". The German word "Kleinkrieg" is literally translated as "Small War." [9] The word "Irregular," used in the title of the English translation of the book, seems to be a reference to non "regular armed forces" as per the Third Geneva Convention.
Another early use of the term is in a 1996 Central Intelligence Agency (CIA) document by Jeffrey B. White. [10] Major military doctrine developments related to IW were done between 2004 and 2007 [11] as a result of the September 11 attacks on the United States. [12] [13] [ unreliable source? ] A key proponent of IW within US Department of Defense (DoD) is Michael G. Vickers, a former paramilitary officer in the CIA. [14] The CIA's Special Activities Center (SAC) is the premiere American paramilitary clandestine unit for creating and for combating irregular warfare units. [15] [16] [17] For example, SAC paramilitary officers created and led successful irregular units from the Hmong tribe during the war in Laos in the 1960s, [18] from the Northern Alliance against the Taliban during the war in Afghanistan in 2001, [19] and from the Kurdish Peshmerga against Ansar al-Islam and the forces of Saddam Hussein during the war in Iraq in 2003. [20] [21] [22]
Nearly all modern wars include at least some element of irregular warfare. Since the time of Napoleon, approximately 80% of conflict has been irregular in nature. However, the following conflicts may be considered to have exemplified by irregular warfare: [2] [10]
Activities and types of conflict included in IW are:
According to the DoD, there are five core activities of IW:
As a result of DoD Directive 3000.07, [5] United States armed forces are studying[ when? ] irregular warfare concepts using modeling and simulation. [27] [28] [29]
There have been several military wargames and military exercises associated with IW, including:
Individuals:
Guerrilla warfare is a form of unconventional warfare in which small groups of irregular military, such as rebels, partisans, paramilitary personnel or armed civilians including recruited children, use ambushes, sabotage, terrorism, raids, petty warfare or hit-and-run tactics in a rebellion, in a violent conflict, in a war or in a civil war to fight against regular military, police or rival insurgent forces.
Asymmetric warfare is a type of war between belligerents whose relative military power, strategy or tactics differ significantly. This type of warfare often, but not necessarily, involves insurgents or resistance movement militias who may have the status of unlawful combatants against a standing army.
Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from cyberwarfare that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.
Unconventional warfare (UW) is broadly defined as "military and quasi-military operations other than conventional warfare" and may use covert forces or actions such as subversion, diversion, sabotage, espionage, biowarfare, sanctions, propaganda or guerrilla warfare. This is typically done to avoid escalation into conventional warfare as well as international conventions.
An insurgency is a violent, armed rebellion by small, lightly armed bands who practice guerrilla warfare against a larger authority. The key descriptive feature of insurgency is its asymmetric nature: small irregular forces face a large, well-equipped, regular military force state adversary. Due to this asymmetry, insurgents avoid large-scale direct battles, opting instead to blend in with the civilian population where they gradually expand territorial control and military forces. Insurgency frequently hinges on control of and collaboration with local populations.
Irregular military is any non-standard military component that is distinct from a country's national armed forces. Being defined by exclusion, there is significant variance in what comes under the term. It can refer to the type of military organization, or to the type of tactics used. An irregular military organization is one which is not part of the regular army organization. Without standard military unit organization, various more general names are often used; such organizations may be called a troop, group, unit, column, band, or force. Irregulars are soldiers or warriors that are members of these organizations, or are members of special military units that employ irregular military tactics. This also applies to irregular infantry and irregular cavalry units.
Counterinsurgency is "the totality of actions aimed at defeating irregular forces". The Oxford English Dictionary defines counterinsurgency as any "military or political action taken against the activities of guerrillas or revolutionaries" and can be considered war by a state against a non-state adversary. Insurgency and counterinsurgency campaigns have been waged since ancient history. However, modern thinking on counterinsurgency was developed during decolonization.
The Directorate of Operations (DO), less formally called the Clandestine Service, is a component of the US Central Intelligence Agency. It was known as the Directorate of Plans from 1951 to 1973; as the Directorate of Operations from 1973 to 2005; and as the National Clandestine Service (NCS) from 2005 to 2015.
Seth G. Jones is an academic, political scientist, author, and former senior official in the U.S. Department of Defense. Jones is most renowned for his work on defense strategy, the defense industrial base, irregular warfare, and counterterrrorism. Much of his published work and media interviews are on defense strategy; Chinese, Russian, and Iranian conventional and irregular capabilities and actions; and terrorist and insurgent groups such as al-Qaeda and the Islamic State. He is currently a senior vice president at the Center for Strategic and International Studies.
Foreign internal defense (FID) is a term used by the military in several countries, including the United States, France and the United Kingdom, to describe an integrated or multi-country approach to combating actual or threatened insurgency in a foreign state. This foreign state is known as the Host Nation (HN) under the US doctrine. The term counter-insurgency is commonly used for FID.
National governments deal in both intelligence and military special operations functions that either should be completely secret, or simply cannot be linked to the sponsor. It is a continuing and unsolved question for governments whether clandestine intelligence collection and covert action should be under the same agency. The arguments for doing so include having centralized functions for monitoring covert action and clandestine HUMINT and making sure they do not conflict, as well as avoiding duplication in common services such as cover identity support, counterespionage, and secret communications. The arguments against doing so suggest that the management of the two activities takes a quite different mindset and skills, in part because clandestine collection almost always is on a slower timeline than covert action.
The Kansas Air National Guard (KS ANG) is the aerial militia of the State of Kansas, United States of America. It is, along with the Kansas Army National Guard, an element of the Kansas National Guard.
In US military doctrine, unconventional warfare is one of the core activities of irregular warfare. Unconventional warfare is essentially support provided by the military to a foreign insurgency or resistance. The legal definition of UW is:
Unconventional Warfare consists of activities conducted to enable a resistance movement or insurgency to coerce, disrupt or overthrow an occupying power or government by operating through or with an underground, auxiliary or guerrilla force in a denied area.
Hybrid warfare is a theory of military strategy, first proposed by Frank Hoffman, which employs political warfare and blends conventional warfare, irregular warfare, and cyberwarfare with other influencing methods, such as fake news, diplomacy, lawfare, regime change, and foreign electoral intervention. By combining kinetic operations with subversive efforts, the aggressor intends to avoid attribution or retribution. The concept of hybrid warfare has been criticized by a number of academics and practitioners due to its alleged vagueness, its disputed constitutive elements, and its alleged historical distortions.
Joint unconventional warfare is the inter-agency, or international implementation of an unconventional warfare strategy, comprising elements of asymmetric warfare, irregular warfare, urban warfare and various forms of psychological operations deployed by non-traditional means.
Informatized warfare of China is the implementation of information warfare (IW) within the People's Liberation Army (PLA) and other organizations affiliated or controlled by the Chinese Communist Party (CCP). Laid out in the Chinese Defence White Paper of 2008, informatized warfare includes the utilization of information-based weapons and forces, including battlefield management systems, precision-strike capabilities, and technology-assisted command and control (C4ISR). However, some media and analyst reports also uses the term to describe propaganda and influence operations efforts of the Chinese state.
The Fourth Department (4PLA) of the Chinese People's Liberation Army General Staff Department (GSD) is also known as the Electronic Countermeasures and Radar Department. It was charged with the Chinese People's Liberation Army's offensive electronic warfare (EW) and information warfare (IW) missions, to include offensive cyber operations. In 2016, its functions were transferred to the Network Systems Department of the PLA Strategic Support Force.
The United States Special Operations Command is the unified combatant command charged with overseeing the various special operations component commands of the Army, Marine Corps, Navy, and Air Force of the United States Armed Forces. The command is part of the Department of Defense and is the only unified combatant command created by an Act of Congress. USSOCOM is headquartered at MacDill Air Force Base in Tampa, Florida.
Michael Patrick Mulroy is the former United States Deputy Assistant Secretary of Defense (DASD) for the Middle East, serving under Secretary James N. Mattis and Secretary Mark T. Esper. He was responsible for representing the United States Department of Defense (DoD) for defense policy and for Middle East policy in the interagency. He is also a retired CIA Paramilitary Operations Officer and a United States Marine.
Security Force Assistance (SFA) a term originating in the United States Armed Forces for military adviser assistance with "training, equipping and advising allied or 'partner' militaries to enable them to defend themselves without 100,000 Americans on the ground to do it for them." SFA is used when improving the security of the host country aligns with the national interests of the donor country. It may be used alongside or instead of larger commitments of the donor country's military personnel and matériel. This means SFA can provide an alternative to large-scale operations if a war becomes controversial or politically difficult. Given the ending of the wars in Afghanistan and Iraq, with US-led multinational missions to train and equip the militaries of weak states for counterinsurgency and counterterrorism purposes, the US have increasingly shifted towards SFA programs that make host-nation security force more capable of conducting Large Scale Combat Operations (LSCO).