Friday, November 12, 2010

Three Pillars of Counterinsurgency

Three Pillars of Counterinsurgency
Dr David J. Kilcullen

We meet today in the shadow of continuing counterinsurgencies that have cost thousands of lives and a fortune in financial, moral and political capital. And we meet under the threat of similar insurgencies to come. Any smart future enemy will likely sidestep our unprecedented superiority in traditional, force-on-force, state-on-state warfare. And so insurgency, including terrorism, will be our enemies’ weapon of choice until we prove we can master it. Like Bill Murray in Groundhog Day, we are going to live this day over, and over, and over again — until we get it right.
This means we need a way to generate purposeful collaboration between a host of actors we do not control. No doctrinal handbook will ever be flexible enough for such a fluid environment (though, something tells me, we will develop one anyway). Rather, we need an easily grasped mental model that helps individuals and agencies cooperate, creates platforms for collaboration, and forms a basis for improvisation. In conventional war we might call this an “operational design”, or “commander’s intent”. I will call it a “model”.
There are two parts to this model. The first is a description of the “conflict ecosystem” that forms the environment for 21st century counterinsurgency operations. The second is a tentative framework for whole-of-government counterinsurgency in that environment.

The Conflict Environment
An insurgency is a struggle for control over a contested political space, between a state (or group of states or occupying powers), and one or more popularly based, non-state challengers. Insurgencies are popular uprisings that grow from, and are conducted through pre-existing social networks (village, tribe, family, neighborhood, political or religious party) and exist in a complex social, informational and physical environment. Think of this environment as a sort of “conflict ecosystem”.
It includes many independent but interlinked actors, each seeking to maximize their own survivability and advantage in a chaotic, combative environment. Pursuing the ecological metaphor, these actors are constantly evolving and adapting, some seeking a secure niche while others seek to become “top predator” or scavenge on the environment. Some actors existed in the environment before the conflict. They include government, ethnic, tribal, clan or community groups, social classes, urban and rural populations, and economic and political institutions. In normal times, these actors behave in a collaborative or competitive way: but now, due to the internal power struggle, they are combative and destructive. The relatively healthy competition and creative tension that sustains normal society has spun out of control, and the conflict threatens to destroy the society.
This new state of the environment also produces new actors. These include local armed organizations, and foreign armed groups drawn into the conflict from outside. Often, that includes intervening counterinsurgent forces such as ourselves. Foreign terrorists are also increasingly “swarming” from one conflict to another in pursuit of their global agenda. In addition, the conflict produces refugees, displaced persons and sometimes mass migration. It creates economic dislocation, leading to unemployment and crime, and creating armed groups such as bandits, narcotics traffickers, smugglers, couriers and black marketeers.
This might be illustrated graphically as in figure 1.
It is critically important to realize that we, the intervening counterinsurgent, are not outside this ecosystem, looking in at a Petrie dish of unsavory microbes. Rather, we are inside the system. The theater of operations is not a supine, inert medium on which we practice our operational art. Rather it is a dynamic, living system that changes in response to our actions and requires continuous balancing between competing requirements.

A framework for inter-agency counterinsurgency
Obviously enough, you cannot command what you do not control. Therefore, “unity of command” (between agencies or among government and non-government actors) means little in this environment. Instead, we need to create “unity of effort” at best, and collaboration or deconfliction at least. This depends less on a shared command and control hierarchy, and more on a shared diagnosis of the problem, platforms for collaboration, information sharing and deconfliction. Each player must understand the others’ strengths, weaknesses, capabilities and objectives, and inter-agency teams must be structured for versatility (the ability to perform a wide variety of tasks) and agility (the ability to transition rapidly and smoothly between tasks).
A possible framework for inter-agency counterinsurgency operations, as a means to creating such a shared diagnosis, is the “three pillars” model depicted at Figure 2.
This is a framework, not a template. It helps people see where their efforts fit into a campaign, rather than telling them what to do in a given situation. It provides a basis for measuring progress and is an aid to collaboration rather than an operational plan. And clearly, it applies not only to counterinsurgency but also to peace operations, Stabilization and Reconstruction, and complex humanitarian emergencies. The model is structured as a base (Information), three pillars (Security, Political and Economic) and a roof (Control). This approach builds on “classical” counterinsurgency theory, but also incorporates best practices that have emerged through experience in peacekeeping, development, fragile states and complex emergencies in the past several decades.
Within this “three pillars” model, information is the basis for all other activities. This is because perception is crucial in developing control and influence over population groups. Substantive security, political and economic measures are critical but to be effective they must rest upon, and integrate with a broader information strategy. Every action in counterinsurgency sends a message; the purpose of the information campaign is to consolidate and unify this message. It includes intelligence collection, analysis and distribution, information operations, media operations (including public diplomacy) and measures to counter insurgent motivation, sanctuary and ideology. It also includes efforts to understand the environment through census data, public opinion polling, collection of cultural and “human terrain” information in denied areas. And it involves understanding the effects of our operations on the population, adversaries and the environment. Clearly, not all actors will collaborate in these efforts; but until an information base is developed, the other pillars of counterinsurgency cannot be effective. Importantly, the information campaign has to be conducted at a global, regional and local level — because modern insurgents draw upon global networks of sympathy, support, funding and recruitment.
Resting on this base are three pillars of equal importance. Indeed, as Figure 2 illustrates, unless they are developed in parallel, the campaign becomes unbalanced: too much economic assistance with inadequate security, for example, simply creates an array of soft targets for the insurgents. Similarly, too much security assistance without political consensus or governance simply creates more capable armed groups. In developing each pillar, we measure progress by gauging effectiveness (capability and capacity) and legitimacy (the degree to which the population accepts that government actions are in its interest).
In achieving control, we typically seek to manage the tempo of activity, the level of violence, and the degree of stability in the environment. The intent is not to reduce violence to zero or to kill every insurgent, but rather to return the overall system to normality — noting that “normality” in one society may look different from normality in another. In each case, we seek not only to establish control, but also to consolidate that control and then transfer it to permanent, effective and legitimate institutions.

Operationalizing the “Three Pillars”
If this model represents a possible framework for inter-agency counterinsurgency, how might we apply it in practice?
Personnel policies to develop human capital also require effort, but might be less of a burden than we currently envisage. Rather than sweeping policy changes, we simply need relatively minor modifications such as the ability to identify and record civilian officials with appropriate skills for conflict environments, track them throughout their careers, provide financial and legal cover for deployments, give them the necessary individual and team training to operate in hostile areas, and create career structures (perhaps in the form of “additional skills identifiers”) that recognize time in conflict zones as equivalent, for career purposes, to time in standard postings.
Systems capabilities (electronic and otherwise) require significant work. These might include skills registers, personnel databases, and field capabilities such as communications, transportation and protection equipment. We could also benefit from electronic platforms to enable sharing of information between agencies, including non-government organizations. ReliefWeb is a good example of this, allowing multiple agencies to post and share information, identify opportunities to collaborate, and deconflict efforts. Security protocols allow information to be shared only with authorized participants, while public information can be widely disseminated. ReliefWeb’s Afghanistan page (http://www.reliefweb.int/rw/dbc.nsf/doc104?OpenForm&rc=3&cc=afg) covers many components of the “three pillars” model, in the context of a complex emergency. Building on this would be less difficult, and less expensive, than one might think.
Training and education (for civil, military, and non-government personnel) would also create shared understanding, and spread best practices throughout a “counterinsurgency community” — again helping us achieve collaboration across a wide variety of players whom we cannot control. Besides specific educational outcomes, these programs develop personal relationships and erode institutional paranoia. Specific training needs include the development of civilian teams capable of “early entry” into environments not yet secured by military or police forces, with the movement, communications and self-protection skills and equipment to operate in these areas. Other needs are a capability for “denied area ethnography” to collect human terrain and population data for effective planning, and education for military leaders in the significant body of expertise that aid, humanitarian assistance and development communities have built up over time.
Finally, doctrine might be useful. But it should now be clear that, without a common mental model for the environment and the pillars of a counterinsurgency effort, and without the personnel, organizations, systems, training and education elements of capability in place, merely producing a doctrinal handbook is likely to be as little use in 2006 as it was in 1962.


No comments:

Post a Comment