Lethal Business

The Marine Corps issues a best practices guide to conducting counterinsurgencies.

As thousands of Marines returned to Iraq this spring, many on their third combat tour there in as many years, a timely study of counterinsurgency operations was making its way up the Marine Corps chain of command. The study, optimistically titled "Compressing the Learning Curve," is a methodical examination of nine counter- insurgencies, some successful and others failures, conducted by a number of nations under widely disparate circumstances.

The effort, undertaken by the Center for Emerging Threats and Opportunities, the Corps' in-house think tank, takes a business-school approach to problem solving. By identifying the characteristics of successful operations, as well as those of failed campaigns, analysts developed a basic framework for fighting insurgencies like the one playing out in Iraq.

"All insurgencies are different, and each must be analyzed within its own cultural context. Failure to do so will almost certainly result in further failures in the future," cautions the center's executive director, Randy Gangle, in an introduction to the study. A retired Marine colonel, Gangle commanded the 5th Marine Regiment during the first Gulf War and later led a project that resulted in revisions to the Corps' urban warfare doctrine and training.

Nonetheless, Gangle says, successful counterinsurgency operations across the spectrum shared some traits: "We were looking for common threads, and from those threads, the best practices that were successfully used. Regardless of the nature of the political system, time per-iod, geography, some common elements were found."

Perhaps what's most striking about the study's findings is that the learning curve was significant in nearly every insurgency studied, including the French campaigns against the communist Vietminh of Vietnam and the Algerian rebellion to achieve independence; British counterinsurgency operations against the Mau Mau in Kenya and against Marxists in Oman; Peru's war against the Maoist Shining Path guerrillas; Colombia's ongoing efforts to eliminate the Revolutionary Armed Forces of Colombia, or FARC; Israel's ongoing attempts to thwart the al-Aqsa Intifada, the second Palestinian uprising begun in 2000; and the American anti-communist intervention in Vietnam, whose failures have clouded Americans' view of subsequent military operations elsewhere.

The best practices identified in the study will not surprise observers of the situation in Iraq-nor will the worst practices. Among the keys to success: solid intelligence grounded in the context of acute cultural awareness; military operations planned and coordinated with political and socioeconomic reforms; and well-trained indigenous security forces. Many of the worst practices were counterproductive because they alienated local populations. They included large-scale sweeps and massive detentions in crowded camps, abusive interrogation policies, insufficient political reforms and failure to integrate civilian and military programs.

A recurring and discouraging theme-and one the study explicitly hopes to counter-is nations' apparent inability to learn from mistakes. This is particularly clear with France's failures, repeated less than a generation later by the United States, to effectively thwart communist insurgencies in Vietnam. "Despite the lessons provided by the French in the 1950s, the U.S. mili- tary appeared oblivious to that period and relearned many of the same old lessons," the study says. "Over time, the American effort in Vietnam gradually took on the necessary strategic and operational efforts needed to effectively counter a strongly embedded insurgency. These efforts, however, came too late in the war, after U.S. political will at home had been expended."

Although the United States (itself born of the British failure to wage an effective counterinsurgency during the American Revolution) has a long history of engaging in counterinsurgency operations, such "irregular" warfare has long been a backwater of military intellectual currents. "For several decades, thanks in large part to lingering attitudes from the Vietnam War and the tragedy in Somalia, this area has been an intellectual and strategic orphan in U.S. professional military institutions," according to the study.

The authors warn that as its overwhelming military superiority pushes future competitors further toward unconventional warfare, the United States must develop a clearer understanding of such warfare: "Without a sound grasp of history relative to this mode of war, the U.S. could find its overwhelming military dominance completely irrelevant to its most pressing security interests."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.