Crafting Strategy For Irregular Warfare 2nded
Crafting Strategy For Irregular Warfare 2nded
Crafting Strategy For Irregular Warfare 2nded
Irregular Warfare
A Framework for Analysis and Action
Second Edition
David H. Ucko and Thomas A. Marks
Crafting Strategy for Irregular
Warfare
Crafting Strategy for Irregular
Warfare: A Framework for
Analysis and Action
David H. Ucko and Thomas A. Marks
Executive Summary.................................................................................3
Introduction..............................................................................................5
Irregular Threats.....................................................................................19
Irregular Challenges...............................................................................44
Conclusion..............................................................................................64
A Study Guide.........................................................................................66
Notes........................................................................................................81
Acknowledgments
The approach discussed in this monograph would not be what it is without
the intense interaction and engagement with our students at the College of Inter-
national Security Affairs (CISA). The singular success of the master of arts and
senior Service school program in irregular warfare pioneered by the college has
resulted from a symbiotic relationship—between academics and practitioners, be-
tween military and civilian voices, and among students from nations around the
world brought together in one classroom. The superb quality of the annual intake,
ranging from officers with their countries’ highest decorations for valor to those
who already held advanced degrees, provides the ideal group to meld theory and
practice. The uniquely international setting has also proved analytically invigorat-
ing and has been a source of invaluable insight regarding different experiences,
methods, and philosophies. We are thankful to CISA students past and present for
the opportunity to learn from them while we teach.
Similarly, little would have been possible without the excellence of the faculty
in the department we both have headed, War and Conflict Studies. In truth, this
work represents contributions of an entire team, the collaboration of which has
refined our thinking and evolved our instruction. Special thanks, then, to Kirklin
Bateman, Bonnie Calabria, John Creamer, Aaron Danis, Matt Dearing, Ted Lars-
en, Denise Marsh, John McNamara, David Oakley, Carlos Ospina-Ovalle, Michael
Sullivan, Magdalena Sunderhaus, Kyle Taylor, David Wigmore, and all those who
have helped shape the pedagogical products that we seek to present in writing.
1
Crafting Strategy for Irregular Warfare
Executive Summary
The 2018 U.S. National Defense Strategy made headlines by officially down-
grading terrorism as a national security priority in favor of “inter-state strategic
competition.” Many interpreted the statement as signifying a return to “conven-
tional combat,” yet a closer reading suggests that even state-based competition is
likely to be “irregular.” Much like insurgent adversaries, revisionist states blend
separate lines of effort to offset military weakness, weaponize narratives to ease
strategic progress, and exploit social and political contradictions to undermine
and divide target societies. This approach is appealing because it allows for gains
that, although incremental, are less likely to face backlash and are therefore more
sustainable. Indeed, it was precisely when Russia abandoned this playbook,
through its conventional invasion of Ukraine in February 2022, that it succeeded
in mobilizing significant local and global resistance, greatly complicating its mili-
tary and political effort. Thus, for several reasons, irregular warfare is likely to be
the strategy of choice for states seeking to contest international order.
The United States, and the West, struggle to understand and respond to ir-
regular warfare, whether by states or nonstate actors. Attempts to master the art
have generated much new jargon, ranging from “hybrid war” to “the gray zone,”
and most recently “integrated deterrence.” The terminology belies a struggle to
overcome entrenched presumptions about war—a confusion that generates cog-
nitive friction with implications for strategy. To inform a better approach, this
monograph presents an analytical framework to assess and respond to irregular
threats. The framework is based on the pedagogical approach of the College of
International Security Affairs (CISA) within the National Defense University
(NDU), the only U.S. irregular warfare college. It is designed to cut through the
analytical ambiguities of irregular warfare and map such strategies to design an ef-
fective counter. Though an analytical framework is no panacea for the malaise fac-
ing Western strategy, it is an indispensable starting point for all that must follow.
3
Crafting Strategy for Irregular Warfare
Introduction
The United States is engaged in a struggle to retain its power and legitimacy.
American leadership has waned since the end of the Cold War, and Russia and
China, detecting a void, are asserting themselves—not only as regional power-
houses but also globally and with the intent to challenge, even surpass, the United
States. Yet unlike the great wars of the 20th century, shifts in power are today more
discreet, incremental, and multifaceted in both method and effect. As demon-
strated amply by the stark Russian attack on Ukraine in February 2022, the un-
disguised use of force is likely to generate a swift backlash and plays to America’s
strengths. In contrast, proper exploitation of influence, narratives, and ambiguity
delays any reaction and makes violence, when used, strategically meaningful.
Irregular warfare has been Russia’s playbook since 1917, and one to which it
will likely return. China also has a long track record with irregular warfare, which
it is now using to subvert the rules-based international order created by the United
States in the aftermath of World War II.1 On a smaller scale, Iran and North Korea
have showcased their acumen with irregular warfare, which they use to empower
viable state and nonstate proxies, build regional power, and amass influence.2 On
aggregate, then, the challenge of irregular warfare is existential to U.S. leader-
ship—to Pax Americana—and to the values that have, at least ostensibly, under-
written this period of international affairs.
None of the above is news to the national security structures of the United
States. In focusing attention on interstate competition, the National Defense Strat-
egy also noted that the main rivals in this competition are blending traditional
security policy with “efforts short of armed conflict . . . expanding coercion to new
fronts, violating principles of sovereignty, exploiting ambiguity, and deliberately
blurring the lines between civil and military goals.”3 Yet despite keen diagnosis,
American policy and security institutions have, in this competition, been found
wanting. Before 9/11, President George W. Bush confidently asserted that “the best
way to keep the peace is to redefine war on our terms,”4 but in today’s irregular
campaigns the United States is finding that it is its adversaries who are setting the
pace.
5
Ucko and Marks
6
Crafting Strategy for Irregular Warfare
when used, supports this broader strategy, which must therefore be understood
and countered in its entirety, not only by striking targets.
The convergence between state- and nonstate-based strategy should not sur-
prise, in that the approaches of Russia, China, and even Iran and North Korea
are rooted within each country’s foundation through successful insurgency.9 It is
regrettable that the United States, formed through similar circumstances, has so
resolutely decided to forget the lessons of its past. Instead, the United States is
overly reliant on a militarized response to security threats and struggles to cali-
brate this line of effort within a broader strategy and overall convincing message.10
As the United States seeks to learn and react, the first—and, as Carl von
Clausewitz notes, “most far-reaching act of judgment”—is to establish the kind
of war it is embarking on, “neither mistaking it for, nor trying to turn it into,
something that is alien to its nature.”11 When it comes to irregular warfare, this
effort to understand has proved beyond the capacity and culture of the institu-
tion, confounding both analysis and response. Simply put, despite an emerging
lexicon (some might say jargon), security professionals lack a framework that can
untangle the character and logic of the threat, position it meaningfully within its
context, and determine its overall strategy and operational art. Without such anal-
ysis, the prospects for crafting an effective response are low.
The College of International Security Affairs (CISA), a senior Service college
within the National Defense University (NDU) in Washington, DC, has been con-
cerned with irregular warfare since its foundation in 2002.12 To fulfil our mandate
of producing strategists capable of countering irregular challenges, we have de-
vised, and based our curriculum on, an analytical framework of assessment and
action. This framework has evolved over the years, via repeated testing and use in
classroom settings and beyond, to evaluate irregular problems and arrive at a via-
ble response. Throughout, the purpose has been to capture the bewildering aspects
of irregular warfare, its ambiguity, unconventionality, and intangibility. Using the
caseload of relevant precedents and a synthesis of helpful academic perspectives,
the framework aims to identify the essential, to map the problem, and to build a
suitable foundation for the crafting of strategy.
7
Ucko and Marks
8
Crafting Strategy for Irregular Warfare
fare.” These weaknesses are significant and betray the pathologies of the system
charged with response. First, irregular warfare and its related terms are defined in
contradistinction to their antonym—in this case, regular warfare (or traditional
warfare as per U.S. military usage), which is upheld as more common. Regular
warfare refers to militarily decisive contests, wherein victory belongs to the better
armed and most operationally capable force. These confrontations are assumed to
be direct and unambiguous, rapid and climactic, and, while lethal, also conclusive.
It is likewise within the history of regular warfare that one finds the greatest U.S.
victories. Thus, despite heavy casualties in these campaigns, regular warfare is also
what the U.S. Government and military have focused on and come to expect, at
least implicitly. In contrast, and perhaps because of this prioritization, U.S. adver-
saries have time and again forced it into irregular confrontations, wherein the em-
phasis is on politics and legitimacy and wars that are difficult to gauge and to end.
All while facing irregular challenges at far greater regularity than conventional
combat operations, the U.S. military establishment persists with a vocabulary that
privileges comfort zones over cold realities. As a result, despite several high-level
directives to prioritize irregular warfare and its subsidiary missions, DOD tends
to treat them, ultimately, as adjuncts to its “core mission”—to “fight and win the
nation’s wars”—and these do not include what once were actually termed “military
operations other than war.”16 Even as the National Defense Strategy spoke loudly of
the need to institutionalize irregular warfare capabilities, this effort was included
only as an annex to the main text, so that while its wording emphasized the im-
portance of mastering this art, its placement suggested a rather different priori-
tization.17 The term irregular warfare was then largely absent from the follow-on
2022 National Defense Strategy, though the document’s overall characterization of
warfare rightly acknowledged its complex and ambiguous nature. Still, the ques-
tion is whether such wording will suffice, given the entrenched norms and budgets
of the institution.
The second difficulty with irregular warfare as a term is that by invoking the
word warfare, it presupposes a military confrontation. As seen, the definition
specifies that—notwithstanding any ambiguity in the art—irregular warfare is in-
herently “a violent struggle.” This qualification justifies the allusion to warfare, but
9
Ucko and Marks
it should be recalled that the violence in irregular warfare is often deliberately am-
biguous or even implicit—until suddenly it is not. Russian Chief of General Staff
General Valery Vasilyevich Gerasimov notes perceptively that in contemporary
conflict, “The open use of forces—often under the guise of peacekeeping and crisis
regulation—is resorted to only at a certain stage, primarily for the achievement of
final success in the conflict.”18 This philosophy is congruent with Sun Tzu’s apho-
rism that “supreme excellence consists of breaking the enemy’s resistance without
fighting” or to attack only when one is in a superior position.19 Often, therefore,
irregular warfare will not look like warfare at all.
This ambiguity makes it difficult to delineate where strategic competition ends
and irregular warfare begins. It is perhaps also for this reason that the Pentagon,
in the irregular warfare annex, elided the mention of violence as a definitional
marker of irregular warfare, a subtle but meaningful shift that looks likely to shape
future doctrine. Going further, it might be better to do away with the language of
warfare altogether, to obviate the typical U.S. militarization of security challenges
that are not primarily military in nature.20 Certainly, such a move might enable
the inclusion of civilian and international partners who see no role for themselves
within any type of “warfare.” On the other hand, demilitarizing irregular warfare
in this manner risks losing sight of its essential grounding in coercion, which can
range from low-level violence or even threats thereof to outright conventional
combat formations contributing to an irregular warfare strategy, as seen in Co-
lombia’s fight against FARC (Fuerzas Armadas Revolucionarias de Colombia, or
Revolutionary Armed Forces of Colombia), during the Vietnam War, or—argu-
ably—during the latest conventional phase of Russia’s war on Ukraine (given its
continued struggle over the legitimacy of that nation-state, the blending, along-
side conventional force, of many other, far more ambiguous and subversive lines
of attack, and the strategic clash therein between contending narratives and of
worldviews).21
Irregular warfare blends war and peace. It features an admixture of nonvio-
lence and violence. The definitional criterion, therefore, is not whether violence
is used at any given time or place, or even the type of violence, but the strategic
intent: to erode or build legitimacy and influence via a combination of hidden and
10
Crafting Strategy for Irregular Warfare
11
Ucko and Marks
12
Crafting Strategy for Irregular Warfare
The second facet of irregular warfare is its exploitation of social and political
contradictions to delegitimize the adversary and gain leverage. Targeting the pres-
sure points of society can help sap morale, create rifts, and motivate violent politi-
cal change. It is in this manner that terrorist groups become successful insurgents.
Much as the so-called Islamic State exploited Sunni-Shia rivalries in Iraq to rally a
popular base and pry society apart, so did Russia in Ukraine, using issues of iden-
tity, language, and religion. In Georgia and Moldova, Russia has exploited active
legacies concerning minority rights to establish a firm foothold, which can then
be used to generate power and influence. It should not be missed that the United
States continues to be targeted in this manner, as it was also during the Cold War.32
Similarly, China has proved adept at using the economic vulnerability of tar-
get societies to create a strategic foothold, much as it did in Sri Lanka and Cam-
bodia, where it effectively has acquired maritime bases. Across the world, the de-
pendence on Chinese economic support allows Chinese actors to set the terms of
engagement, resulting in a lack of transparency in trade negotiations, unchecked
Chinese involvement in illegal activities (ranging from illegal fishing to organized
crime to leveraging corruption), and the careful management of what can be said
and done in international fora.33 Also in the United States, the Chinese Commu-
nity Party is using the country’s reliance on Chinese funds, markets, and invest-
ment to create pockets of support, or of acquiescence, that delay and stymie a
united American societal response to growing Chinese political warfare on U.S.
soil. This exploitation of vulnerabilities is what makes fostering societal resilience
a key defense against irregular warfare.34 Irregular warfare is armed politics—it is
primarily about politics—and mobilization is key.
Third, because of its emphasis on mobilization, narratives are central to irreg-
ular warfare. They not only describe and explain reality but also achieve buy-in for
political projects or shroud the nature of actions taken. Writing in 2006, Lawrence
Freedman recognized the growing strategic salience of narratives, describing them
as “designed or nurtured with the intention of structuring the responses of others
to developing events.”35 Indeed, storylines can disguise unfavorable realities, align
the political project with its supposed stakeholders, and close off legitimate entry
points for intervention. In this light, scholars like Joseph Nye and John Arquilla
13
Ucko and Marks
state starkly that, in contemporary conflict, “Victory may sometimes depend not
on whose army wins, but on whose story wins.”36 Put differently, the point is to win
the narrative before one wins the war. Framing the contest as other than it is serves
as a central element of the approach.
Perhaps the prime nonstate example of this principle was the so-called Is-
lamic State, which, by the time it launched its offensive in 2014, had already won
a psychological battle through the mass production and precise targeting of social
media messaging. Spewing out, at times, 40,000 tweets per day, the group created
the virtual equivalent of a mass movement, hijacking the slogans of rival Sunni
insurgent groups and intimidating ordinary Iraqis, including its military, into
submission.37 Through the dissemination of propaganda, memes, and guidance, it
has managed to survive its loss of a physical counterstate and is focusing instead
on creating a deterritorialized surrogate and a transnational movement that can
sponsor and frame violent attack.38
State actors, too, use strategic narratives as a force multiplier for armed ac-
tion. Through framing, they create an alternative reality.39 If actions taken can be
presented as going “with the grain” of local want, any gains made become more
sustainable and difficult to undo. Thus, Chinese policy is now driven by the so-
called Tacitus trap, emphasizing the need for government to retain credibility with
the citizenry: “Neither good nor bad policies would please the governed if the gov-
ernment is unwelcome.”40 In 2003, China revised the “Political Work Guidelines
of the People’s Liberation Army” and advanced the concepts of “public opinion
warfare,” “psychological warfare,” and “legal warfare.”41 For similar reasons, in his
commentary on the nature of contemporary conflict, General Gerasimov spoke of
“the protest potential of the population” as a driving force in political campaigns—
if “people power” can be harnessed, by hook or by crook, the strategy becomes
more irresistible.42 To counter such action requires both credibility and resonance,
but these are also the main targets of adversarial information campaigns and are
difficult to regain once lost.
Legitimacy quickly emerges as a leitmotif in irregular warfare, but this is a
central definitional point often lost in analysis. It must be emphasized that irregu-
lar warfare does not primarily denote an asymmetry in military approaches (con-
14
Crafting Strategy for Irregular Warfare
ventional versus guerrilla) or in legal status (state versus nonstate), but rather a
struggle defined by its objective: “to undermine and erode an adversary’s power,
influence, and will to exercise political authority over a civilian population.”43 As
implied, the minimum requirement is not to build but rather to erode legitimacy,
a far easier task but one with potentially debilitating consequences. This reality
drives home that legitimacy is not quantitative. As with all relationships in irregu-
lar warfare, it is the correlation of tangible and intangible forces which drives the
outcome.
For all this, irregular warfare is not new. For most of our history, warfare has
been irregular. War is a violent form of organized collective contestation. It is a
bloody escalation of political and social strife, and its results, if they are to stick,
must be consolidated through the continued application of politics. Certainly, the
military intensity of warfare can increase or fall, but this concerns only the compo-
sition and capabilities of fielded forces; it does not displace the nature of warfare as
an intensely political contest. As such, it is really the notion of conventional wars
that is aberrational. At best, it is a flawed heuristic that ignores the purpose of war
by artificially separating it from its sociopolitical antecedents and outcomes. At
worst, it sets up expectations about the utility of force that seldom survive scrutiny,
resulting in one strategic blunder after the other. These points are not new but bear
repeating, in the hope of eroding a “conventional war mindset” deeply entrenched
in Western strategic thinking but severely lacking in utility.
15
Ucko and Marks
way, irregular warfare tests the standard U.S. military repertoire and highlights its
failure to expend effort on a broader, more flexible, and more relevant response.
The frustration is in part a function of strategic culture, which in the case
of the United States seems largely incompatible with the fundamental precepts
of irregular warfare. The military effort is but one part of a much more complex
political endeavor, the struggle is protracted, its gains ambiguous, and engage-
ment requires patience, a deep understanding of society and the world, and the
resilience to stomach setbacks and compromise.46 Indeed, returning to the three
facets of irregular warfare detailed above, it is as if this phenomenon was designed
to bedevil American strategic culture.
As irregular adversaries seek out societal vulnerabilities to exploit, they find
an increasingly divided America. The Russian hack of 2016 U.S. Presidential elec-
tion was effective in manipulating America’s many rifts, and others will have taken
note.47 Even in its response to a deadly pandemic, as with the COVID-19 crisis,
U.S. society gave proof of exceptionally deep fractures and polarization, compli-
cating a national, never mind societal, response and providing entry points for
adversaries to use.48 In case the domestic disunity be mistaken as an aberration
spurred by today’s unprecedented circumstances, analysts such as Charles Kup-
chan and Peter Trubowitz noted, as early as 2007, the growth—since the 1970s—of
growing polarization, both of U.S. politics and society, stemming from the “Red-
Blue divide, the income inequalities driven by globalization, and the ideological
homogenization of the parties”—all factors that they “expected to intensify” with
time.49
Compounding the issue of domestic fracture, the United States most com-
monly engages in irregular warfare abroad, and so the vulnerabilities being ex-
ploited are those not just of American society but also of partner governments.
Not surprisingly, the United States struggles with the admittedly delicate task of
prodding these governments toward necessary reforms it cannot itself execute. In
Iraq and Afghanistan, great expenditure and sacrifice amounted, in central mo-
ments, to stunningly limited influence over key issues with conflict-generating
potential: in Iraq, the treatment of the Sunni minority, and in Afghanistan, the
political and economic malpractice of the regime.
16
Crafting Strategy for Irregular Warfare
Similarly, we see minimal sway over those nations targeted by state use of
irregular warfare. Witness the Philippines’ continued confusion as to how to ap-
proach China (leading to its vacillation on whether to maintain the Philippine-
U.S. Visiting Forces Agreement), or the great difficulty locally to discredit fully
Russia’s disinformation within Georgia, Bulgaria, and other states in the region.
U.S. efforts, from 2014 to 2022, to help Ukraine counter corruption can be cited
as a relative success story, intended to close off entry points for Russian subver-
sion and propaganda. Even here, however, some assert insufficient progress was
made.50 Generally, the West’s leverage relies on sticks that seem only to alienate
and carrots that others provide more cheaply and with fewer conditions.
Furthermore, the focus on narratives within irregular warfare has befuddled
the U.S. Government, almost by design, as it is legally and morally restricted from
engaging in informational operations domestically or from controlling the me-
dia.51 Queasy about its role in the battle of ideas, the U.S. Government lacks the
instruments to explain its actions, promote its values, or challenge disinformation.
Frequent calls to resuscitate the U.S. Information Agency (USIA) make the point
but also misremember the agency as more than what it was. As Matt Armstrong
concludes, the “United States never properly armed itself, and especially not with
USIA, for the cold reality of the political warfare it was embroiled in.”52 It might
also be argued that, in an era where information is instantly everywhere, it is insuf-
ficient to have just one organization devoted to strategic communications.
Today, that organization is the Global Engagement Center (GEC) within the
Department of State. The center was created to combat disinformation and online
radicalization, initially by the Islamic State, but is now focusing predominantly on
state-based information campaigns. It has learned valuable lessons from America’s
initial forays into the information domain and plays a key role in overall U.S. Gov-
ernment efforts at communication. Regardless, as a sign of the State Department’s
overall limited capacity, this organization is underfunded and staffed mainly with
contractors and detailees from DOD.53 In 2021, the U.S. Congress agreed to autho-
rize an additional $150 million for the GEC, effectively doubling its funding, yet
the U.S. investment in information still lags behind its major state rivals. Not only
is the initiative insufficient in telling America’s version of events; the U.S. Govern-
17
Ucko and Marks
ment appears to lack a clear script or sense of narrative that could help it gain cred-
ibility and legitimacy outside of American borders and beyond its strongest allies.
Finally, whereas America’s adversaries successfully blend military with non-
military LOE, the U.S. response is driven by its lopsided budget, wherein DOD
claims nearly half the country’s discretionary spending.54 This resource allocation
reflects entrenched views on what constitutes strategic capability and predisposes
the government toward a militarized foreign policy. When relevant institutions
are starved of resources or not included in the crafting of a response, the United
States struggles to achieve the blended statecraft required for irregular warfare.55 It
has many terms for the type of action needed—a whole-of-government response, a
comprehensive approach, smart power, or integrated deterrence—but none of these
monikers has affected budget realities or cultural proclivities.
Left standing is the military with its significant resources. But is it relevant?
Though the U.S. military must retain its conventional deterrent, it finds itself sty-
mied when confrontations deliberately eschew that level of intensity. In recogni-
tion of this trend, in May 2018, the Joint Chiefs of Staff released a report on the
challenge of applying the “American military when adversarial behavior falls be-
low the threshold that would trigger a direct response.”56 Four years on, the work
has had a clear impact on concepts and doctrine, which both focus increasingly
on the so-called competition continuum, ranging from cooperation to competi-
tion and finally to armed conflict. Still, beyond some exciting anecdotal evidence,
changes in organization, capability, or—as important—culture have been more
difficult to discern. In contrast, China has historically included “political warfare”
as a branch of its armed forces—an orientation that follows Mao Zedong’s exhor-
tation that “the Chinese Red Army is an armed body for carrying out the political
tasks of the revolution. . . . Without these objectives, fighting loses its meaning.”57
A different approach to statecraft is needed, yet this calls for a new way of
thinking about, analyzing, and responding to irregular warfare. This is the chal-
lenge that we seek to meet at CISA—not only or primarily for the United States
but for all of partner nations targeted by subversion and attack. The analytical
tools and frameworks that we provide in our curriculum are designed specifically
to address the deliberate ambiguity of irregular warfare and to ensure we cap-
18
Crafting Strategy for Irregular Warfare
ture its essence and address its main components. Our analytical framework has
two parts, one of analysis and one of response. Much like the Military Decision-
Making Process, the analysis generates a strategic estimate of the situation, which is
then used to formulate a course of action (COA) to guide response. The remainder
of this monograph walks through these two parts of this framework and, thereby,
provides a guide for students and practitioners engaged with the most pressing
irregular challenges of the day.58 An appendix provides a synopsis of both parts of
the framework—the estimate and the course of action—and can be used as a study
guide or aide memoire to facilitate application.
In presenting a guide in this manner, a clarification on usage. This framework
has been designed as a series of prompts, or questions, presented in a sequence
found to enable optimal analysis and response to irregular warfare challenges, but
it is not a checklist. The framework enables interrogation of irregular warfare prob-
lem sets. It does not predetermine what content or arguments should be included
within its elements or in the final analysis. It forces attention to the broader aspects
of irregular warfare, but it is still the analyst who must weave together the relevant
data, make the case, and draw appropriate conclusions. As Hew Strachan warns,
“Strategy uses theoretical insights to question real events in a bid to shape them
according to the needs of policy, but as soon as strategy allows the expectations of
theory to lessen its grasp of what is really happening it has allowed theory to be
its master rather than its tool.”59 This is neither the function nor the intent of this
framework.
19
Ucko and Marks
All these components, fleshed out below, are distilled and integrated to fill the first
“box,” namely the problem statement.
20
Crafting Strategy for Irregular Warfare
21
Ucko and Marks
essence and particular logic of the problem at hand: the political issue underlying
the confrontation, the nature of the actor and strategy faced, and the main reasons
why they have proved so difficult to address. Key is to identify the direction of the
conflict based on current trends: who is benefiting, who is hurting, and why does
it matter?
When engaging with these questions, the problem statement must be as pro-
found as it is concise. In a rushed world of “bottom lines upfront” and “elevator
pitches,” there is inherent merit to analytical brevity. Yet going further, this crys-
tallization of analysis into a precise problem statement is also a strategic exercise
in that it forces careful reflection on what is truly important. As such, it hones the
mind to prioritize, to unlock the puzzle, and to justify convincingly the need for a
new approach. Since such analytical clarity presupposes a rich foundation to draw
from, the remainder of the strategic estimate must be executed and completed
before attempting this final synthesis.
22
Crafting Strategy for Irregular Warfare
three Baltic States. In these instances, cause and effect are closely tied, though
questions still obtain about who participates, how, and who does not, and why.
In other instances, however, and particularly where violence is involved,
grievances tend to present far more varied effects, forcing the analyst to query
more specifically the relationship between context and conduct.64 Not only is
there, then, a need to interrogate which root causes truly matter, but also what
their effect is, on whom, and why.
The line of thinking sets up a distinction between structure and agency that
can engender interminable debate as to the causative factors behind alienation and
violence. Consider Islamist radicalization among Muslims in the United King-
dom: is it the systemic problem of failed integration (a root cause) that fuels the
problem, or is it the individual psychology among the exceedingly few Muslims
who radicalize—a tiny proportion of the whole?65 Are white nationalist groups
in the United States a product of economic and social desperation, producing a
susceptibility to extremist ideology, or are their members simply racist deplorables
regardless of circumstance? The former explanation fails to account for the many
“dogs that do not bark” (that is, those subjected to similar structural factors but
who choose another path), whereas the latter raises the question of why, for some,
this noxious ideology resonated in the first place.
The framework presented here eschews an either/or resolution to this ques-
tion in favor of analytical integration. Such integration draws on the insights of
social movement theory and its three lenses of analysis to assess collective con-
tention: the macro level (the structure or context), the micro level (the agent or
individual), and the meso level (the group or collective actor as an intermediary
between the self and the system). Analysis must interrogate the ways in which
context (macro) drives certain individuals (micro) to embrace or join movements
(meso) as a mechanism for change. Where that movement is actively using vio-
lence to achieve its agenda, it must be asked why it has adopted this strategy and
how this choice has affected its continued ability to speak for a base. Answers
cannot be found through any one lens, but rather by identifying their unique in-
teraction in each case. This is how drivers may be determined and, ultimately,
addressed.
23
Ucko and Marks
By means of illustration, in the late 1960s and early 1970s, U.S. involvement in
the Vietnam War and its domestic racial tensions created significant macro-level
grievances, resulting in the mobilization of large numbers of micro-level individu-
als. Yet importantly, not all individuals were driven to action. As sociologist Doug
McAdam points out, one key intervening variable was simply the “biographic
availability” of the individual, or his or her opportunity to engage in political ac-
tivism at that point in life, given other commitments and obligations.66 Other fac-
tors obtained, diversifying further the relationship between macro and micro: the
grievances resonated with many, but not all, and only certain individuals among
those affected were willing and able to act.
Among those galvanized, many meso options presented themselves: legal ver-
sus illegal, direct versus indirect, violent versus nonviolent. In this instance, most
chose legal avenues of contestation—protest movements, demonstrations, and
other forms of dissent—though a minority joined violent groups such as the Black
Panthers and the Weather Underground. This pattern of participation needed to
be understood to formulate a measured and appropriate response for each form of
protest. In a worst-case scenario, a state will repress nonviolent members, perhaps
because they are far easier to reach and thereby inadvertently boost the move-
ment’s violent splinters.
If violence is the concern, analysts must query why it is being used. Two key
variables obtain. First, sociology suggests a central variable relates to the perceived
political opportunity structure. Where there exist no realistic opportunities for
reform through peaceful engagement in politics, violent solutions will typically
garner more support.67 This is particularly the case when the system responds to
demands for mediation with violence.
In the United States of the late 1960s, despite flaws in its democracy and an
occasionally violent response to protest, most citizens who felt compelled to act
had sufficient faith in the political opportunity structure to work through it rather
than seek its overthrow. Because of this overarching faith in the system, violent
groups such as the Weather Underground found it difficult to establish broad-
based support and to survive in the open, forcing them to hide away from the
very society they sought to change.68 The grievances voiced by this group were
24
Crafting Strategy for Irregular Warfare
broad based, but the perceived opportunities for peaceful redress were such that
the Weather Underground remained an unrepresentative violent fringe, acting on
its own rather than as a vanguard of a broader movement. Conversely, given the
racism of 1960s America, the Black Panthers enjoyed an entirely and far more
successful relationship with its social base, which faced a different opportunity
structure and therefore made different choices about how to protest. Such distinc-
tions are key and should be a major consideration in deciding how to respond to
different violent actors and the structural factors that drive their membership.69
Ideology emerges as the second, yet related, variable in explaining an actor’s
resort to violence. Even an open democratic system will be insufficient to an en-
tity driven by millenarian intent or revolutionary zeal. An actor such as Osama
bin Laden would never be interested in democratic grievance mediation, and it
is furthermore difficult to imagine what such a process would resemble. Where
violently overthrowing the system is the aim, no blockage or broadening of the
political opportunity structure will suffice and so the state must instead ensure
that the threat’s worldview does not come to resonate among would-be followers.
Therein lies the continued need for some form of political mobilization to retain
legitimacy for the state and ensure those who insist on violence remain ideologi-
cally isolated and politically alone.
These variables complicate the assessment of drivers. It is insufficient to
consider the mere incidence of violence as proof of its representativeness, even
where grievances are broad based. On the other hand, it is also hazardous to dis-
miss reflexively violent attacks or agendas as “violent extremism,” for they may
be powered by genuine societal and political cleavages that should in some way
be acknowledged and addressed. In short, each scenario must be assessed on its
own merits, considering its unique interaction between macro-level context, mi-
cro-level participation, and meso-level standing and behavior. In some instanc-
es, structural factors will produce a veritable conveyer belt of recruits; this is the
“people power” that has changed the fate of empires and that underpins Mao’s
conception of People’s War. In other contexts, participation is minimal, as with the
Weather Underground. In yet other cases, participation is coerced and a matter
of desperation, simply because the state is not providing options or protection.
25
Ucko and Marks
26
Crafting Strategy for Irregular Warfare
There’s only one word for me: Istiqlal, independence. It’s a deep,
fine-sounding word and rings in the ears of the poor fellahin more
loudly than poverty, social security or free medical assistance.
We Algerians, steeped as we are in Islam, are in greater need of
dreams and dignity than practical care. And you? What word
have you got to offer? If it’s better than mine, then you’ve won.70
27
Ucko and Marks
Storylines and narratives are equally important for nation-states. When Rus-
sia first launched its offensive in Ukraine, in 2014, military action was accompa-
nied by the “most amazing information warfare blitzkrieg we have ever seen in the
history of information warfare.”74 Ukraine and others have since been bombarded
by disinformation and propaganda: an online barrage of fake news and inflam-
matory content meant to undermine resolve, weaken partnerships, and facilitate
the Russian project. China, in its efforts to establish regional, even global power
also aggressively pursues an information strategy—one that differs in key respects
from the Russian approach. China focuses on limiting information to its own
population, of course, but also combines carrots and sticks to shape what is said
internationally and, therefore, what is seen and believed.75 One of the first Chinese
efforts of this type, a “Voice of the Straits” radio station targeting Taiwan, was
launched already in 1957, just years after Mao’s insurgent victory.76
When Voice of the Straits began online broadcasting in April 2000, it rapidly
furthered its reach. Indeed, while the war for hearts and minds is clearly not new,
in a world where information in virtually any medium can be captured and broad-
cast instantaneously and globally, it assumes a more central role and even greater
weight. In recent years, information technology has progressed massively, allow-
ing for more evocative material to be shared faster, farther, and by more sources
simultaneously than before.77 As technology advances to include artificial intelli-
gence–produced simulations, in both photo and video form, it will become easier
to manufacture outrage, to mobilize popular movements, and to inject uncertainty
as to what is really going on.
The importance of messaging is generally recognized; it can build and erode
legitimacy, constrain government options, and change fundamentally the balance
of strategic power. Still, few methodologies exist for the analysis of these activities,
and this deficiency hinders the construction of a response. How exactly to respond
is of course a question of strategy, requiring analysis of specifics, but an important
starting point is having a method of assessment that can generate options. As mes-
sages stem from understandings, how does evaluation of Roots as engaged in by
the challenger differ from the same analysis carried out by the analyst?
28
Crafting Strategy for Irregular Warfare
Social movement theory provides a helpful approach to this question via its
work on framing, defined broadly as the process of attributing meaning to events.78
The metaphor of a frame is apposite: like an artist with a painted picture, fram-
ing concentrates our minds on one aspect of reality, all while it excludes the rest,
communicating thereby an impression that has been carefully curated to engender
a particular effect.79 Framing also focuses our attention on our different ways of
viewing the world: it is not just a matter of smart messaging, but more meaning-
fully about interpretation, or our Weltanschauung. The importance of perspective,
and of intersubjectivity, is what brings forth concepts such as “strategic empathy”
and (channeling Sun Tzu) “knowing your enemy” (as well as yourself).80 The frame
of the opponent, in other words, will not be our own.
Social movement theory proposes three frames: the diagnostic, the prognos-
tic, and the motivational. Each plays a key role in building a worldview and in
changing perception and, ultimately, behavior. By analyzing adversarial narratives
across these three frames, we can see the world from their viewpoints, how they
link cause and effect, and how they justify the worst of transgressions. We can then
assess which component, or components, appear to resonate most, or “sell,” among
contested audiences.
Each frame requires elaboration. The diagnostic frame interprets the current
situation. It explains, from the other’s perspective, what is wrong and (most criti-
cally) who is to blame. In the lingo of sales pitches and marketing, the diagnostic
frame is the “hook,” providing an accessible and alluring explanation for it all. A
typical function of the diagnostic frame in fueling conflict is to distinguish an in-
group from an out-group, with the former being portrayed as persecuted due to
the boundless cruelty of the latter.
The diagnostic frame has a second function: to prime the audience for the
proposed solution. The prognostic frame holds the answer, the way out of the mis-
ery, through actions presented not merely as just and correct but as necessary and
urgent right now. The trick lies in linking the litany of grievances of the diagnostic
frame to the salvation promised in the prognostic one—to explain the dark past
and present the project to glory as the one and only.
29
Ucko and Marks
The new light seems to pour from all directions across the skull; the
whole universe falls into pattern like the stray pieces of a jigsaw
30
Crafting Strategy for Irregular Warfare
31
Ucko and Marks
Threat Strategy
Having elaborated the roots of the conflict and the narratives used to fuel sup-
port, it is time to consider what the threat does. More than a list of activities, what
is sought is an understanding of the strategy at play: what it seeks to achieve and
how it aims to get there. The traditional approach to understanding strategy within
Western war colleges (there simply is no civilian equivalent) is that of ends, ways,
and means, a formula most prominently articulated by Arthur Lykke. It posits that
“strategy equals ends (objectives toward which one strives) plus ways (courses of
action) plus means (instruments by which some end can be achieved).”91 It is a
helpful model, yet for irregular warfare it must be adapted to accommodate the
blending of violence with other, potentially more meaningful nonviolent efforts
32
Crafting Strategy for Irregular Warfare
and the unfolding of campaigns both tangibly and intangibly to affect matters of
legitimacy.
The ends-ways-means formula, then, forces consideration of three funda-
mental questions: What is the threat seeking to achieve? How is it reaching that
objective? What resources are used? The question of ends is deceptively difficult.
Declarative slogans may not be the same as unspoken objectives. Short-term goals
may relate indirectly, if at all, to longer term aspirations. The actor may be vague, or
wholly idealistic, about what it seeks to achieve, making it unclear how its actions
relate to an unattainable endstate and raising questions about its actual purpose.
Thus, the question “What do they want?” is of cardinal importance, not least for
the political implications that immediately surface. How do the stated objectives
seek to address the political essence of the problem? How do they relate to what
the actor can do and wants to achieve? As is the case throughout the framework,
the first and easy answer is seldom the most analytically useful.
Careful consideration of ends allows progression to a discussion of ways. As a
component of what Colin Gray termed the strategy bridge, this is perhaps the sec-
tion that has received the least attention. As Jeffrey Meiser argued, “The ways part
of the equation tends to be relegated to a supporting role as the undefined thing
linking ends and means.”92 Indeed, in this triptych, it is precisely within the ways
that the major changes and challenges are seen. It is here that irregular strategies
surprise and achieve their full effect.93
Ways are concerned first and foremost with the overall strategic approach.
At the broadest level, what is the method employed to reach identified ends? Is
it a full-blown insurgency, and if so, is it a People’s War that puts counterstate
mobilization at its heart, or a focoist approach that leads with violence and makes
political indoctrination a lesser concern?94 Perhaps the strategic approach is one
of nonviolence, or of political infiltration, or of criminal subversion. If facing a
state actor, is the strategic approach one of political warfare (what George Ken-
nan called “the logical application of Clausewitz’s doctrine in time of peace”95), of
hybrid warfare (akin to Russia’s violent assault on eastern Ukraine from 2014 to
2022), or something in between?96 The terms to describe strategic approach are
numerous, varied, and contested. Most important is to communicate the nature
33
Ucko and Marks
and logic of the strategy being used. Indeed, it is really the theory of success that
matters: how is this strategy meant to bring about success or achieve the political
outcomes that are being sought?97
Once the strategic approach has been identified and explained, it is time to
map the strategy to help design an appropriate response. The mapping of an in-
tangible and complex strategy adds order to the chaos but requires an acumen for
abstract thinking and a range of conceptual tools. Within Western military think-
ing, one such tool has been the line of operation, which defines the force in relation
to the enemy.98 Lines of operation represent the physical projection of force across
geographical space and are typically visualized using military unit symbols mov-
ing via arrows on a map. This heuristic has proved helpful because it allows for the
conceptual nesting of tactical and operational actions within their strategic con-
text, thereby clarifying their larger purpose on the battlefield. Nesting, in turn, aids
in the translation of strategic intent into tactical action and vice versa, ensuring a
common understanding and coherence across all levels of activity.
Though lines of operation are fundamental analytical tools for the design of
military campaigns, they fail to capture the intangible spaces traversed by irregular
warfare. It was for this reason that the U.S. Army, in 2001, fielded the term logical
line of operation and then, in 2011, line of effort to define expressions of power or
influence where “positional references to an enemy or adversary have little rel-
evance, such as in counterinsurgency or stability operations.”99 In other words,
whereas the military has traditionally traded mostly in its own currency—the use
of force—doctrine now created space for “operations involving many nonmilitary
factors” (political, psychological, informational, or economic) for which “lines of
effort are often essential to helping commanders visualize how military capabili-
ties can support the other instruments of national power.”100
With this doctrinal development, the U.S. military entered a “back to the fu-
ture” moment in which it unknowingly resurrected the insights of past practitio-
ners of irregular conflict as diverse as the patriots in the Revolutionary War and
the communist theorists of People’s War, such as Mao Zedong and the Vietnamese
figures Ho Chi Minh, Vo Nguyen Giap, and Truong Chinh. What unites these fig-
ures, and their respective approaches to violence, is the adaptation of traditional
34
Crafting Strategy for Irregular Warfare
When interrogated, these questions provide an accounting for the how of strategy,
the totality and integration of ways, or the bridge between means and ends. As
displayed in figure 2, answers to these questions can then be represented as LOEs,
each with its own strategic interim objective that defines its purpose and direction.
In this manner, one arrives at a blueprint of strategy.
For this blueprint to be useful, what fills each line of effort (the content
generated by answering the five questions above) must somehow be ordered. A
useful approach is to organize the tactical expressions of each LOE into concep-
tual campaigns, each a bundle of activity grouped together and labeled due to a
common nature or purpose.102 This grouping exercise reveals each line’s most
35
Ucko and Marks
Facilitate
Guerrilla Mobile War of
VIOLENCE Terrorism
warfare warfare position
imposition of
politics
Front Influenced
“Useful Broaden struggle/
ALLIES organiza- organiza-
idiots” united fronts
tions tions
International
INTER- organiza-
Visibility and
States Individuals
NATIONAL tions
support
prominent categories and, thus, also its priorities. For example, the nonviolent
LOE may comprise campaigns of “information warfare” and “protests,” much as
the violent LOE may include those of “terrorism” or “guerrilla warfare.” Identi-
fication of these campaigns, within their respective LOE, produces a bird’s eye
view of operational art as it plays itself out in violent politics.
By means of illustration, figure 2 provides a relevant sample, derived from
extensive and repeated application of the framework to real-world cases involv-
ing nonstate armed groups. Using instead the Russian intervention in Ukraine,
ca. 2017, as an example, figure 3 illustrates that the same five questions can yield
a mapping also of state-based irregular strategies. In both cases, the mapping has
revealed dimensions of the overall strategy that are often missed by an overrid-
ing concern with the violent, or the “kinetic,” aspects of the problem. Similarly,
mapping the strategy of a gang such as Comando Vermelho (figure 4), in Brazil,
36
Crafting Strategy for Irregular Warfare
Diplomacy
INTER- and obstruc-
Societal Cyber “Useful Weaken Western
NATIONAL interference attacks idiots” resolve
tion
reveals the range of its activities beyond mere drug-trafficking and the purpose of
this broader strategy.103
As part of the ordering exercise, this nesting of operational activity within
its proper strategic category, it follows that each campaign will itself contain sub-
campaigns, or opportunities to order further the expressions of the overall ap-
proach. For example, the campaign of terrorism, within the violent LOE, may be
further subdivided, plausibly across the categories of targets struck—for instance,
infrastructure, security forces, dignitaries, international actors, or simply groups
of people. This coding allows for more informed analysis as to how the state should
structure its own campaign of counterterrorism, perhaps within its security LOE.
Similarly, a campaign of information warfare may feature subcampaigns of hashtag
activism (for example, #КиевСбилБоинг, or #KyivShotDownBoeing), indoctrina-
tion, pamphleteering, or the distribution of “fake news” through licit networks.104
37
Ucko and Marks
38
Crafting Strategy for Irregular Warfare
The multifaceted nature of irregular strategies has strong implications for our
discussion of means, the third component of Lykke’s triptych. Rather than treat
means as a separate inquiry from ways, the identification of LOEs and campaigns
should compel an interrogation of what capacities and structures are deployed to
undertake the identified activities. To what degree have our adversaries developed
specialized tools to prosecute economic, social, and political campaigns? Beyond
guerrillas and fighters, we should account for the insurgent’s structures of gover-
nance; beyond fighter jets and tanks, we should understand the rival state’s means
of subversion and influence. These means, after all, behoove specialization on our
end too so that we may counter the whole spectrum of irregular strategies thrown
our way. In violent politics, victory belongs not to the strongest army or the best
argument but to the best practitioner of the art, and this calls for the right tools.
Based on this interrogation of ends-ways-means, the final task within this
“box” of the analytical framework is to identify the threat’s center of gravity (COG)
and critical vulnerabilities. The COG is an absurdly contentious term in strategic
studies. As Clausewitz described it, the center of gravity is the “focal point of force
and movement, upon which the larger whole depends.”106 Such a target may pres-
ent itself in a conventional confrontation between two fielded sides, yet within the
political and social realms of irregular warfare, hope for a decisive blow is often
misguided. This limitation does not invalidate the concept entirely, but—where
it applies—the COG will typically describe intangible forces: those that bind the
threat and allow its strategy to work. Is there, in other words, a source of cohesion
for the irregular actor, which, if removed, would result in its disappearance (or
existential weakening)?107
One must be careful in answering this question. For example, the common
identification of the “population” as the center of gravity in counterinsurgency
campaigns tends only to beg the question. Which population are we referring to,
and precisely what is so important about it? Its perceptions (and if so, of what),
its loyalty, or perhaps its very existence (which would motivate a highly illiberal,
yet far from unprecedented, approach to operations)? Analytical granularity is
needed, as determination of the center of gravity will fundamentally set the direc-
tion of our response. For this reason, it is also important to resist the temptation
39
Ucko and Marks
to identify any number of COGs, as this outcome in most cases denotes a failure
to prioritize. The test is not whether the target is important, but whether it is indis-
pensable to the threat—whether it would collapse without it.108
There is no preconceived answer as to what constitutes a COG in any given
case, regular or otherwise, or whether the concept even applies. However, given the
focus in irregular warfare on politics and the ability to control or co-opt contested
populations, the center of gravity often relates to perceptions of legitimacy. Be it
phrased in terms of common interests, united fronts, ideological appeal, support, or
credibility, the term legitimacy applies, as it speaks to the “beliefs and attitudes of
the affected actors regarding the normative status of a rule, government, politi-
cal system or governance regime.”109 With legitimacy, there is strong potential for
mobilization—of people, allies, support, and momentum. Without legitimacy, the
cost of doing business is dramatically increased, as are the efforts required to con-
solidate new political realities.
Legitimacy, in this context, is not a popularity contest. As Stathis Kalyvas ex-
plains in terms of “geographic loyalty,” military power can trump political and so-
cial preferences; those who control territory and populations—those who decide
who lives or dies—can usually muster the cooperation they need.110 Yet because
coerced forms of control are difficult to sustain over the longer term, our most
potent adversaries strive to combine coercion with strategies of co-option. On this
front, it has been a cardinal error of the Islamic State and its ilk to impose such a
brutal rule on its newly gained subjects. This error has enabled its state adversaries
to co-opt key populations, as these governments come to be seen, whatever their
flaws, as preferable to the Islamists. In this context, it is worrisome that the Islamic
State in the West Africa Province, in Nigeria, appears to be learning this lesson and
now targets mostly security forces rather than the population, thereby generating
new levels of legitimacy vis-à-vis the state.111
The struggle for legitimacy operates also at the international level, or among
states. Following the Kosovo intervention of 1999, Russia derived the troubling
lesson that international law could be broken with impunity so long as the trans-
gression is wrapped in a plausibly legitimizing narrative, in this case the “respon-
sibility to protect.”112 For this reason, in later engagements in Ukraine, Georgia,
40
Crafting Strategy for Irregular Warfare
41
Ucko and Marks
addressed, or otherwise affected. Much like the king on a chessboard, striking the
COG requires patient maneuvering and repeated efforts. Inroads must be devel-
oped gradually to finally gain access. The location of critical vulnerabilities can
therefore be invaluable, revealing chinks in the armor through which the beating
heart of the problem can be reached, even struck. To extend the chess metaphor,
the critical vulnerabilities of an opponent are exposed pieces that, when elimi-
nated, improve our strategic position to come at the king.
As we seek critical vulnerabilities, what are we looking for? The doctrinal
definition is surprisingly helpful. It defines critical vulnerabilities as components
“deficient or vulnerable to direct or indirect attack, creating a significant effect.”115
Specifically, this definition reveals the two criteria at hand: the component’s vul-
nerability and its strategic value. Many targets are important but not vulnerable,
while some are vulnerable but not important. The task lies in finding the overlap
to help guide our initial attack.
The strategic estimate can help in this effort. Looking at the roots of the prob-
lem (the drivers of mobilization), the frame and narrative (the threat’s worldview),
and the threat strategy (its operationalization of ends, ways, and means), we can
discern the weak points and poor connections in the overall approach. These may
be mismatches between frames and strategy (what is believed versus what is done),
between roots and strategy (what fuels legitimacy versus the threat’s mediation of
grievances), or between components of the threat strategy itself (misalignments of
objectives, approach, and resources). These, then, are the vulnerabilities that initial
efforts can strike to build a better strategic position for follow-on action.
Some actual examples of critical vulnerabilities come to mind. The Islamic
State claims to represent Islam but kills more Muslims than members of any other
religions. As Russia extends its meddling, greater global awareness of its methods
is adding a reputational cost to what is already a growing financial commitment.
Its war of aggression in Ukraine provides an invaluable vulnerability that could
be used to help change facts on the ground elsewhere—in Moldova, the Cauca-
sus, and beyond. China seeks regional, maybe global hegemony yet must contain
its own domestic contradictions and overcome its own hypersensitivity to social
and political criticism. Growing recognition of China’s manner of operating in
42
Crafting Strategy for Irregular Warfare
the countries where it invests is also driving a backlash against its Belt and Road
Initiative that could be used to win support and gain allies. Through exploitation
of critical vulnerabilities such as these, one can over time address issues relating to
the center of gravity—almost always a question of legitimacy.
43
Ucko and Marks
making progress in countering the threat. Does it, through its response, address
the symptoms of the problem or the problem itself (answering this question does
presuppose an accurate and incisive problem statement)? Is the response affect-
ing any center of gravity that has been identified, plausibly via deft exploitation of
critical vulnerabilities? And if progress is not forthcoming, can we explain why?
Is it the wrong approach or the right approach applied on too small a scale, or
something else entirely?
A fundamental and necessary question in explaining a failing strategy is
whether it stems from a dearth of capability or of will. Is it that the state lacks
what it needs for a more enlightened response, or is it that it does not view such a
response as politically necessary? Clearly, the two possibilities are far from mutu-
ally exclusive, but before proposing something entirely more ambitious, by way
of response, the analyst must anticipate the prioritization and limitations at hand.
Neither a lack of competence nor of interest is immutable but addressing shortfalls
in either will likely require specific measures, so that proposed strategies do not
fall on deaf ears. In other words, the strategy will have to address its own audience
as well as the threat it seeks to address, hence the question: What are the political
reasons why the state is pursuing a strategy that is not working and can these be
altered?
The critique of the present government response must be engaged dispas-
sionately and thoroughly because it acts as the pivot from the estimate part of
the framework to the proposed course of action. The approach to analysis draws
inspiration from the almost certainly apocryphal Albert Einstein quip that, faced
with a problem to be solved in an hour, he would spend 55 minutes defining the
problem and the remaining five solving it. In short, the estimate, and in particular
the critique of the present response, both inspire and justify the solution that must
now be proposed.
44
Crafting Strategy for Irregular Warfare
expectation that it will itself generate the content is misguided and sure to produce
failure. Still, even with this modest function, the framework provides guidance
and a skeleton to build content around, ensuring that the key components of strat-
egy-making are addressed and appropriately broached.
The COA framework builds on the U.S. military’s relatively well-developed
decisionmaking process, which, codified in doctrine, sets the Armed Forces apart
from other institutions in terms of planning capacity. The framework presented
here is adapted from this process in two ways. First, it elevates the focus from
mostly operational and tactical matters to consider the strategic level, or where
matters of national policy are set and then implemented through the state’s main
instruments of power. Second, it incorporates more than just military concerns,
reflecting the contingent nature of violence within irregular contests.117 The result
is a comprehensive plan that encompasses several instruments of power and their
interaction across time and space to meet policy objectives.
A point of order on the value of plans is immediately necessary. As Dwight
Eisenhower famously noted, “Plans are worthless, but planning is everything.”118
Another strategist commonly cited in this context is Field Marshal Helmuth von
Moltke, chief of staff of the Prussian general staff, who noted that “only a layman
could suppose that the development of a campaign represents the strict application
of a prior concept that has been worked out in every detail and followed through
to the very end.”119 The reason, he states, is that “no operation plan will ever extend
with any sort of certainty behind the first encounter with the hostile main force.”120
The caution sounded by these “practitioners of practitioners” is important
and should be retained. However, it does not condemn to futility planning con-
structs such as the one presented here. Planning is still everything, and planning
cannot be conducted without some professional understanding of what this pro-
cess entails. It is true that whatever plan is arrived at will most likely require modi-
fication at implementation to reflect shifting circumstances and the inevitable fog
of war, yet this limitation only underlines the need for familiarity and expertise
with a planning process that allows for quick adaptation and change. As the late Sir
Michael Howard put it, “When everybody starts wrong, the advantage goes to the
side which can most quickly adjust itself to the new and unfamiliar environment
45
Ucko and Marks
and learn from our mistakes.”121 With this in mind, what are the main steps and the
main components when crafting a strategy?
Much like that for the estimate, the course of action framework comprises five
boxes to help guide and sequence analysis (see figure 5). The first box, concept of
response, lays out the broad outlines of the proposed strategy, demonstrating the
break with the present government response with which the estimate framework
concluded. The second concerns the legal authority underpinning or required for
the response. The third box clarifies any assumptions that were necessary to allow
planning into an uncertain future. The fourth demonstrates the detailed imple-
mentation of the strategy within an ends-ways-means construct, also accounting
for phasing and metrics (how do we know that we are succeeding). The fifth box
considers the risks inherent to the strategy and their possible mitigation. The re-
mainder of this section unpacks each box in turn, emphasizing the key require-
ments and considerations.
CONCEPT OF LEGAL
RESPONSE AUTHORITY ASSUMPTIONS IMPLEMENTATION
Assessment of What authorities What assumptions Strategy (E-W-M)
estimate: What is bind you and what were necessary to RISK
to be done and do you need? continue with ASSESSMENT &
Phasing
why? planning? MITIGATION
How to get at
Metrics
threat COG via
CVs?
2. STRATEGIC RESPONSE
46
Crafting Strategy for Irregular Warfare
Concept of Response
Much like the problem statement of the estimate, the concept of response
provides a brief synopsis, in this case of the overall recommended course of ac-
tion. This distilling function means that, once again, the section is placed first and
yet reflects the entirety of the product. The concept of response is where the big
ideas are communicated: the nature of the recommended response to the problem
analyzed in the estimate and, in broad terms, its implications for ends-ways-means
and overall phasing.
An important component in communicating and justifying the new strategy
is its theory of success, or why the recommended approach will generate a desired
outcome.122 The estimate can help make this case, for example, by demonstrating
why the proposed response addresses more effectively (than the present govern-
ment response) the roots, the frames and narrative, and/or the threat strategy. Jus-
tification for this theory of success can also relate to any strategic center of gravity
identified in the estimate or the critical vulnerabilities whose proper exploitation
may yield promising returns. Even if a COG analysis is not deemed appropriate,
what remains essential is to communicate how and why the proposed change to
the present government response will alter the environment and attain the desired
position.123 Why is the proposed strategy not only better but also the best way
forward given the context as is?
Importantly, in making this case, the strategy’s quality should be assessed not
on the loftiness of what it promises to achieve, but on its ability to attain set goals.
Therein lies a delicate and deeply political balancing act between the best and the
possible, between idealism and despondence. A guiding principle is to situate the
response within the state’s national interest as communicated in its official docu-
ments, as implicit in its policies or as determined (and argued) by the analyst.
However vexing, the problem assessed in the estimate must be approached in rela-
tion to other competing national priorities. The ensuring constraints and tradeoffs
are what make a recommended strategy at all strategic.
Second, questions of feasibility should be carefully considered. It is easy to
come up with broad ideas that sound good, yet if they offer no roadmap of imple-
mentation or way of gradual realization, they are a list of aspirations rather than
47
Ucko and Marks
Legal Authority
Another key consideration in developing the course of action is the legal au-
thority for the recommended strategy. Acting within the rule of law is critical be-
cause of the legitimacy it bestows for both international and domestic audiences.
The need for legal clarity is all the more important given the tendency of irregular
actors to blur legal lines, employ ambiguity as a weapon, and engage in lawfare,
that is, “the use of law as a weapon of war.”125 It may be tempting to mirror image
such disrespect for the rule of law, but such actions will often come at the ex-
pense of legitimacy and deprive both actor and strategy of the moral high ground.
Instead, establishing and communicating a clear legal case can be a force multi-
plier in the competition for legitimacy, even when (or especially when) engaging
against a threat that deliberately rejects this same set of constraints.
The search for legal authority begins with an interrogation of any red flags
raised by the proposed strategy or its subsidiary recommendations. These may
relate to activity in the sovereign territory of another state, tensions between state
and municipal authorities, treaty obligations, or concerns relating to civil liberties
and human rights or to the collection of intelligence. By way of example, in the
U.S. context, responses must contend with the civil liberties enshrined in the Con-
stitution, the constraints of the Posse Comitatus Act, or with the Smith-Mundt
48
Crafting Strategy for Irregular Warfare
Act, which long prohibited the domestic airing of U.S. Government–funded and
–generated broadcasting but was recently significantly watered down.
The case of Smith-Mundt raises a salient point: states are not simply subject to
their own laws but can amend them, too. In this case, in 2013, Congress repealed
the domestic-dissemination provision of the bill, given the pragmatic difficulty
of isolating foreign from domestic audiences and the perceived strategic need to
counter anti-American sentiments at home.126 Frank Kitson, counterinsurgency
practitioner and theorist, gets the point across: “Everything done by a government
and its agents in combating insurgency must be legal. But this does not mean
that the government must work within the same set of laws during an insurgency
which existed beforehand.”127
For the strategist, the implication is clear: where every attempt should be
made to fit the recommended course of action within the legal authorities at hand,
certain situations call for temporary, or even permanent, changes to legislation to
better equip states to handle new challenges. The USA PATRIOT Act, passed in
the wake of the 9/11 attacks, is a good example, though debates continue as to the
need for it both then and now.128 The question, therefore, is not just whether the
existing authorities are in place but also whether the state’s legislative body must
enact specific laws for the optimal strategy to proceed.
This consideration requires care. Writing one’s own laws is like printing one’s
own money—another government prerogative—in that both can rapidly backfire.
Legal authority matters because it bestows legitimacy, yet legality and legitimacy
do not always overlap. The worst excesses of the so-called war on terror—en-
hanced interrogation techniques, rendition, detention without trial, and extraju-
dicial killings—were all cleared by lawyers. Each was arguable in a court of law.129
However, the arguability did not protect the government responsible from the
court of public opinion, undermining the very legitimacy that was being sought.
It may well be true, as Robert Barnidge suggests, that if the issue “can ‘fit’ and be
‘argued within’ the formal constraints of law, there will be no violation of law,” but
if the aim is to garner legitimacy, a second, more demanding threshold must also
be met.130 To lawyers and those of a legalistic bent, the warning in Hamlet is apt:
49
Ucko and Marks
“There are more things in heaven and Earth, Horatio, / Than are dreamt of in your
philosophy.”
A recurring legal dilemma in irregular warfare concerns the status of one’s
adversaries, particularly as related to the use of force. Faced with nonstate armed
groups or shadowy state proxies, governments often struggle to determine whether
to treat their adversary as combatants or as criminals. The former status is deemed
inappropriately ennobling and turns society into a war zone, with all that that
entails, whereas the latter denies the state its mightiest weapons against an enemy
that, if well-armed, may present an existential threat. Awkward compromises such
as “unlawful combatants”—the legal construct of the George W. Bush administra-
tion—seldom fare well yet point to the need for flexible authorities against hybrid
challenges.
Colombia’s struggles against the FARC again provide a helpful precedent. As
part of the Democratic Security Policy, Bogotá found a nimble way of scaling its
legal authorities up or down depending on the operation and its context. Con-
stantin von der Groeben explains how the state was able to toggle between in-
ternational humanitarian law (or the Law of Armed Conflict) and human rights
law, and thereby combine the best of both worlds. Through judicial review of the
threat, the state would distinguish between “operations during hostile scenarios”
and “operations to maintain security.” During the latter, peacetime law enforcement
would prevail, making the use of force a last resort. Throughout the former, the
state could respond forcefully to a well-armed and dangerous adversary (yet even
then, the rules of engagement would privilege demobilization and capture and be
mindful of collateral damage).131
State-based irregular strategies present their own legal quandaries, particular-
ly when they involve constituted armed forces deliberately flouting the rule of law.
Several governments (Israel, but also Canada and the United States) have desig-
nated Iran’s Quds Force as a terrorist organization given its involvement in uncon-
ventional warfare (or sponsorship of terrorism). The designation not only brings
in legal authorities but also raises analytical and practical difficulties given that
terrorism is typically a nonstate endeavor and not a status bestowed upon govern-
ment forces, however horrendous their conduct. For similar reasons, it is difficult
50
Crafting Strategy for Irregular Warfare
to see how the U.S. designation of Iran’s Islamic Revolutionary Guard Corps as a
terrorist entity will produce the legal and moral quarantine anticipated by such a
determination (not to mention Lithuania’s groundbreaking designation of Russia’s
war in Ukraine as terrorism).132
Ukraine has itself faced legal difficulties in responding to Russian aggression
since 2014. For many years, the legal authority for response was complicated by
the undisclosed but universally known presence of Russian troops out of uniform,
or the Little Green Men, among the separatists in Donbas. In this instance, the de-
cision—legal as well as political—was whether to treat the Donbas as a counterter-
rorism operation, under the authority of the Security Service, or (as it eventually
came to be) as operations against Russian aggression, with authority transferred
to the joint operational headquarters of the armed forces under the strategic guid-
ance of the general staff.133 The eventual shift brought about greater immediacy in
response, as well as flexibility, but required clear explication of the new powers and
of the state’s continued commitment to legal authority and accountability vis-à-vis
its own citizens. In other words, although changing the rules, the state ensured
that its usage of the law remained legitimate, a balancing act not atypical for those
proposing fresh approaches to new challenges.
Even nonviolent state strategies can present legal complications for response.
Chinese political warfare is designed to subvert and manipulate all while avoid-
ing punitive reaction. In the face of Chinese disinformation, economic coercion,
and other nonviolent yet harmful activities, both Australia and the United States
have found themselves without legal recourse to respond appropriately, even
within their own national borders. Seeking to do better, Australia passed a flurry
of legislation. It is now compulsory for entities to register any political activities
undertaken on behalf of a foreign principal. Covert and deceptive activities of for-
eign actors are now criminal if and when they intend to interfere with Australia’s
institutions of democracy.134 For similar reasons, the U.S. Congress has passed,
or is passing, legislation intended to defeat economic coercion, criminalize the
activities of the Chinese United Front Work Department, and counter intellectual
property violators.135 These types of efforts echo the Foreign Agents Registration
Act, passed in the 1930s and still in use (yet with little to no impact in online com-
51
Ucko and Marks
munications). In seeking to equip the state to defend itself legally against unan-
ticipated threats such as these, the key lies in not over-legislating and harming the
very society that one seeks to protect.
In terms of balancing acts, the final requirement here is to acknowledge the
overlapping coexistence of several legal regimes, not only at the international and
national level but also relating to cultural, social, and religious factors. These dif-
ferent regimes do not always agree, forcing difficult questions of how to proceed.
Much depends on the relevant audience, or whose perceptions of legitimacy are
most crucially related to the solution. Still, in a globally compressed mediatized
environment, there is often a need for some level of congruence across all levels,
requiring tough decisions as to how to mesh disparate legal codes and how to
speak to several publics all at once.
Assumptions
The crafting of strategy is inevitably an exercise in forecasting, as the analyst
is asked to predict, with sufficient certainty, the effects of actions taken on current
conditions. Because the future is unknown, because we cannot predict the type of
environment in which recommended actions unfold, “planning” can sometimes
feel like a fool’s errand. Yet it is necessary. Assumptions can be used to bridge
the inevitable gaps in knowledge, allowing us to proceed with planning yet be
cognizant and clear about the specific futures wherein our plans make sense. The
process of identifying our assumptions, and communicating them to those who
implement our plans, is therefore of utmost importance—but it is also an effort
that is deceptively challenging.136
There are two main challenges in making assumptions to help planning. First,
assumptions provide the analyst with the dangerous power of deciding how the
future will unfold, at least on paper. This liberty can be exploited, even unwittingly,
to predict scenarios simply because they enable the proposed strategy. It is there-
fore critical that assumptions do not wish away inconvenient realities or guarantee
the outcomes anticipated by the plan. It is still up to the plan to create the condi-
tions necessary for success. Assumptions, in contrast, relate to uncertainties that
are beyond the scope of the plan but that would have a bearing on its execution.
52
Crafting Strategy for Irregular Warfare
Even then, assumptions should not be used to predict desirable conditions that do
not already obtain or to eliminate problematic circumstances unless evidence sug-
gests they are likely to disappear.
The second danger lies in the sheer number of assumptions that go into plan-
ning. Assumptions are implicit in everything we do and plan to do, and any at-
tempt to account for them all will quickly amass an unhelpful number of possibili-
ties. Every act is based on presumed continuity or change within the environment,
about likely responses to the act, its utility in meeting the desired outcome, the
ability of the actor to complete the act, the perception of others witnessing it—and
each of these is built on further assumptions ad nauseam. It is, to borrow a phrase,
turtles all the way down. Any assumption is itself based on further assumptions,
which in turn require additional assumptions. This endless regression is unhelpful
to strategists, yet assumptions do have a necessary utility as part of the planning
process.
Three conditions are helpful in defining a useful remit for assumptions in
strategic planning. First, assumptions must be valid. In other words, an assump-
tion, to be useful, must fix a variable in a way that fits with the available evidence.
Even in the face of some fluctuation, it would be valid for a government to assume
that oil prices will remain stable, thereby enabling the revenue necessary to finance
the response. Although laden with some risk, this assumption is based on present
trends. For a government to assume that oil prices will sharply increase, thereby
allowing a vastly different type of response, is clearly more suspect, barring rec-
ognized factors that may reasonably produce such a development. The example is
almost farcical, yet, for most cases, determining the validity of planning assump-
tion requires serious debate and analysis of context.
The second condition concerns importance. A RAND study of assumptions-
based planning provides a helpful definition: “An assumption is important if its
negation would lead to significant changes in the current operations or plans of an
organization.”137 This criterion restricts assumptions to those crucial uncertainties
relating to the strategy—those that delineate helpfully the limits of its applicability.
Returning to the issue of oil, the valid assumption of stable prices only becomes
53
Ucko and Marks
important if the strategy relies on this revenue; it is an eventuality that the strategy
has no bearing over, but which would affect it should it fail to obtain.
The third criterion is necessity, which helps to avoid the problem of endless
regression. In effect, assumptions should only be made if they are needed, if they
paper over an acknowledged gap in knowledge. To extend the above example, if
the valid assumption of relatively stable oil prices is important to the plan, it only
becomes necessary if a fluctuation in the oil price is possible, perhaps as deter-
mined by past precedent. There would be no need to state assumptions, even those
concerning important matters, if there is no real likelihood of them ever being
proved wrong (assuming continued planetary gravitational pull is both valid and
important, but hardly necessary). Necessity therefore exists in tension with valid-
ity, as an entirely valid assumption is not needed and all necessary assumption,
however urgent, must nonetheless be grounded in sufficient evidence to allow for
productive planning. The analyst finds the sweet spot between these two, neither
wasting energies on truisms nor predicting a desired future that will never come
to pass.
Finally, in interrogating which assumptions are built into the plan, a distinc-
tion must be made between explicit assumptions, those stated outright to allow
planning to proceed, and implicit assumptions, those subconsciously integrated
into planning without express intent or acknowledgment.138 Donald Rumsfeld
may have termed these “known unknowns” and “unknown unknowns,” respec-
tively.139 The former are typically handed to or decided on by the planning team
as a basis of continued analysis. The latter are those assumptions that sneak in
without anyone necessarily noticing; they are typically more difficult to spot but
can prove devastating when they are suddenly proved wrong. Interrogating the
strategy, critiquing it, and challenging its conception of the future—what in the
trade might be termed red teaming—is therefore an essential process.140
Given the abundant ambiguity and many pitfalls involved, the need for as-
sumptions may be regrettable, but as a step in the strategic process it is also un-
avoidable; it is inherent to the projection of human behaviors into an unknown
future. Some gaps in certainty can and should be narrowed or eliminated through
a more rigorous estimate of the situation. Beyond that point, the goal is gener-
54
Crafting Strategy for Irregular Warfare
ally to end up with as few assumptions as possible but as many as needed. Given
the flux and the high likelihood of surprise, these assumptions—both explicit and
implicit—must then be demonstrated clearly in such a way as to set out the strat-
egy’s conditions for implementation—or the parameters that, if breached, would
require a revised course of action.
Implementation
If the concept of response is the summary of the strategy, and the legal au-
thorities and assumptions explain the environment in which it unfolds, the imple-
mentation box provides the detailed breakdown of its components. These com-
ponents include the objectives to be reached, the strategic approach to be used,
the operational art and campaign architecture employed, the means required, the
main phases of the plan, and the metrics necessary to determine progress and ap-
propriate transition points. Enveloping and informing all these components is the
theory of success, or the big idea as to why the proposed strategy will work.
Using the Estimate to Design the Response. The estimate of the situation is
the obvious starting point for determining the nature and content of the state’s
response. A main purpose in mapping the threat strategy, for example, is to inform
the priorities and content of the counterstrategy. If an adversary is engaging in a
campaign of terrorism, a campaign of counterterrorism is required—this much is
clear. Yet by identifying the specific subcampaigns of this conceptual campaign of
terrorism, the state is provided with more precise priorities for its own counter-
terrorism effort, be it population security, protecting critical infrastructure, safe-
guarding dignitaries or cultural icons, and so on. By the same token, the response
should use the other LOEs and campaigns of the threat strategy to design its own
response, thereby negating the intended effects of these actions. If economic co-
ercion and disinformation are being pushed as meaningful campaigns within a
nonviolent line of effort, how may the state respond to these challenges via its own
operational art and with its own means?
Put this way, it all seems painfully obvious, yet too often governments miss
critical components of their adversary’s strategy, typically because of a near-exclu-
sive focus on its use of violence and the related insistence on using the military to
55
Ucko and Marks
find a solution. In contrast, the holistic mapping of the threat strategy encourages
a more multifaceted response and the concomitant identification of the means
necessary for its execution. At the same time, it is insufficient merely to mirror
image the opponent’s approach, or to let its strategic decisions dictate the terms of
engagement. Instead, the response must at some point impose its own logic and
purpose to achieve the necessary change. This is the theory of success that should
guide its unfolding.
An important aspect in this endeavor may lie in addressing the roots of the
problem. This is arguably the most complex and politically sensitive component
of the response, as the grievances causing mobilization to violence are typically
deeply embedded within the structure of the state and society. Thus, alleviating
these factors will at the very least require great time and effort and will likely also
be destabilizing in that each reform generates new winners and losers. Moreover,
there is the broader question as to whether achieving meaningful change is even
possible or commensurate to the strategic advantage gained against a specific op-
ponent.
As an example, transforming Afghanistan into a stable democracy, as in-
tended with Operation Enduring Freedom, might very well have denied al Qaeda
sanctuary there, but the ambition and demands of this undertaking seemed out
of proportion to this gain, particularly when the network could quite viably find a
new sanctuary in another failing state. Similarly, while there is every reason for a
country such as Georgia to address the ethnic tensions that facilitate Russia’s inter-
ference and annexation of its territory, it is less clear how this might be done, on
what timeline, and with what impact on the threat facing the country. Even if the
issue could be optimally addressed (no mean feat), would Russia’s strategy then
collapse, or would it find new lines of attack?
None of these difficulties should sideline the importance of countering roots
as a strategic priority, when and where necessary, but they do force some humility
and creativity in what is at all possible, and to what effect. One principle may be
to focus less on resolving the social and political contradictions being exploited
and to work instead toward greater resilience.141 Though serious grievances will
likely remain, resilience implies an ability to address them via peaceful means,
56
Crafting Strategy for Irregular Warfare
through the political opportunity structure, and not to be seduced into subversion
and violence. This may require, on the one hand, removing blockages within said
political opportunity structure (opening the system to peaceful contestation) and,
on the other, inoculating populations against those extremist ideologies that seek
violent overthrow of the system regardless of its democratic merits (countering the
frame and narrative among the most relevant audiences). Even with this lower bar
of ambition, however, achieving progress on these fronts is likely to remain chal-
lenging yet also, in many cases, highly important.
In terms of the frames and narratives, it is remarkable just how desperately de-
mocracies struggle with the war of ideas, even when facing millenarian groups us-
ing terrorism and corrupt autocrats and other dictators. One might have thought
the virtues and values of democracy, of human rights, and of civil liberties would
in and of themselves be sufficient in dismantling rival ideologies and worldviews
(and, indeed, this appears to have been the assumption underpinning the West’s
approach largely since its victory in the Cold War). As it turns out, competing for
credibility is a challenge, not least because of the difficulty of convincing those
already alienated. Psychological studies confirm that directly contesting people’s
“core worldviews” often evokes “a defensive emotional reaction” and can therefore
“counterproductively lead people to fortify their belief systems.” How can we reach
those who explicitly reject the outside world?142
The estimate’s analysis of framing can provide some guidance. It may be, for
example, that seams emerge between the three different frames—the diagnostic,
prognostic, and motivational—that can be exploited. Writing in the 1930s, French
journalist Emmanuel Berl grasped a major limit in communism’s prognostic and
motivational frames at that time: “The intellectual,” he wrote, “leans toward com-
munism because he smells the scent of death hanging over the bourgeoisie and
because capitalist tyranny exasperates him. . . . But Communism then requires of
him that he subscribe to a program and methods that seem to him respectively
stupid and ineffective.”143 Similar limitations can be seen today in Russia’s lack of
vision or of proposed solutions for all the problems for which it blames the West or
in the repeated failures of violent radical Islamism to deliver something concrete
once its denunciations and attacks are done.144
57
Ucko and Marks
58
Crafting Strategy for Irregular Warfare
whole. The structure and hierarchy not only order operational matters within their
proper category but also help, via LOEs, to communicate their common strategic
direction and intent.
In assembling a strategy in this manner, an immediate requirement is proper
integration of the proposed course of action, not just between ends, ways, and
means (hence the image of a “strategy bridge”), or even in terms of nesting, as cov-
ered above, but also as concerns phasing and metrics. The strategy should, across
all these concepts, be one unified product. Respective components must be in-
formed by one another and the strategy’s overall logic. Figure 6 provides a graphi-
cal representation of how the different components fit together.
Phasing allows for a combination of short-term priorities with longer term
visions and is key to the laying out of the strategy. By staggering the response
across time, ambitious endstates can be approached incrementally, via preliminary
phases that may, for pragmatic reasons, take on different priorities or approaches.
Separate phases will, for example, be appropriate and capable in addressing dif-
ferent elements of the estimate: roots, frame and narrative, and threat strategy.
The sequence will relate to how the plan unfolds across time and space (and to
the requirements of the case). The response may have phases that are sequential
or concurrent or a combination thereof. The phases may be defined by key ac-
tivities, key conditions to be met, or key time periods or milestones. Answers to
these questions are impossible to predict in general terms and relate instead to the
requirements of the case. What is most important is that the phasing construct
convincingly charts a viable path from present conditions to the desired endstate,
acknowledging the likely effects of each step along the way and the reactions of
other actors.
Phasing brings in the question of metrics, which are used to derive appropri-
ate transition points between phases and criteria for overall success. The question
of metrics is bedeviling, as evidenced by the infamously misleading “body count”
measure used in Vietnam. When a U.S. colonel insisted, after the war, that his
country had never lost a single battle, his Vietnamese counterpart quipped, “That
may be so, but it is also irrelevant.”146 On the political plane, the Americans had
lost—technology and firepower notwithstanding.
59
Ucko and Marks
Interim Objectives
LOE Campaign Campaign Campaign Campaign
Means Means Means Means
The conundrum then and now is that irregular warfare is concerned with in-
tangible and immeasurable factors, which clash with the objectivity and precision
striven for in official accounts of effectiveness.147 The challenge is compounded by
what many practitioners believe is a fetishization of metrics, leading to the count-
ing of whatever can be counted. During his time in southern Iraq from 2003 to
2004, Sir Hilary Synnott noted something of a “fixation” with such quantitative
metrics as the number of schools built, roads paved, or pipelines fixed, writing,
“These were figures which our governments liked to publicise,” but adding, “they
conveyed nothing of the reality.”148
A helpful starting point is agreement on terminology. The military tends to
distinguish between measures of performance and measures of effectiveness, though
the two can be put more simply as inputs and outcomes. Measures of performance
are used to assess whether what was planned is being done: if more patrols are
60
Crafting Strategy for Irregular Warfare
intended to bring about security, measures of performance gauge whether the pa-
trols were carried out in accordance with the strategy. No doubt an important part
of institutional self-assessment, it often proves too tempting to use these types of
indicators—relatively measurable and often within our grasp—to evaluate their
effectiveness. The result is the so-called self-licking ice cream cone, to use another
type of political jargon.149
Measures of effectiveness concern the degree to which our input is generating
its desired effect. Here, it is helpful to distinguish between output and outcome.
To return to Sir Hilary’s observation, the number of projects completed is an out-
put that is intended to bring about an outcome, typically a political effect. David
Kilcullen made this distinction in his work on counterinsurgency. Referring to
roadbuilding in Kunar Province, Afghanistan, he noted that “what has made this
program successful is not the road per se. . . . [It is that] people have used the
process of the road’s construction, especially the close engagement with district and
tribal leaders this entails, as a framework around which to organize a full-spec-
trum strategy.”150 The greater the level of abstraction, however, the more difficult
the task of desired effect.151
Indeed, while it is important to differentiate among inputs, outputs, and out-
comes, it does not significantly simplify the task of choosing the right measures
for a particular case. A major review of recent campaigns describes the task as
“quite hard if not impossible,” due to disagreement over what matters, what por-
tends strategic progress, and the search for broadly applicable measures that can
compare effectiveness across time and space. The most relevant metrics are typi-
cally those that measure intangible factors (legitimacy, resilience, trust, credibility,
and attitudes), yet finding a somewhat objective way of measuring these can be
difficult, not least in a climate leery of anecdotal data and always on the lookout
for a “return on investment.” Unsurprisingly, many resort to the “illusion of sci-
ence”: color-coded graphs, sometimes stoplights, arrows pointing up or down (or
sideways), or numerical values ascribed without any published standards or ex-
planation.152
The litany of obstacles described here may frustrate those looking for clear
answers, yet the search for generic solutions is likely to fail, as each case requires
61
Ucko and Marks
its own assessment. In the end, for all its business management jargon and undis-
puted status as an important part of strategy-making, the question of metrics is
more art than science. To cite sociologist Stanislav Andreski:
Regrettably, these are not typically the ideals promoted by bureaucracies or those
shaping progress reports to the powers that be.
On this note, a concluding word on the implementation box is warranted.
Despite the complexity of the strategy and the difficulty of communicating it ac-
curately, the biggest and most important condition remains the profound idea of
what will generate success. No amount of terminology or mechanical cramming
will substitute for it. The need to retain a clear focus on what matters is precisely
the reason for nesting, so that the details provided relate clearly to the bigger pic-
ture. Everything must flow from this central idea, lest style suffocate substance.
62
Crafting Strategy for Irregular Warfare
frameworks,” the process is too often “ill-defined and misleading.”154 Even within
the field of financial services, which arguably does more risk analysis than any
other sector, the practice has been called into question given the failure to account
for contingencies that caused massive loss or even the collapse of entire firms.155
To some degree, it is perhaps unrealistic to expect human beings to predict
the future, to expect the unexpected, and to rise above the cognitive vagaries that
bound our collective reason. Hard work and focus certainly help, but as with met-
rics, precisely because the task is seen as so important the methods of analysis
often become overly convoluted. In the search to appease masters who will accept,
at best, only minimal risk, planners get into the habit of dressing up courses of
action to meet this expectation rather than engaging in a sincere and untainted
discussion of what may go awry. Underlying such political pressures, there is also
disagreement on how best to understand risk, how to define it, and therefore also
how the concept should be used.
At the possibility of oversimplification, risk can helpfully be understood as that
which can go wrong due to the change in strategy. This field of risk can be further
divided into two categories. The first group of risks concerns the plan’s likely points
of failure, due to a lack of either capacity or capability, or the absence of other re-
quirements. The second concerns the risks that flow specifically from the strategy’s
successful execution. This type of risk speaks to the strategy’s implications for other
national interests and the unintended consequences of getting it right.
If risks are identified, what are the consequences for strategy? Clearly, it would
be foolhardy to propose a strategy that even planners identify as laden with risk.
Indeed, in some cases, risk identification may force the analyst back to previous
components in the framework to ensure that the product is revised and avoids the
uncovered hazard. The process of crafting a course of action is never linear. Each
component speaks to the others until the final product is one integrated whole.
No matter how much tinkering, however, every course of action will imply
some risk, and, at some undefinable point, it becomes necessary to communicate
these as part of the final product. Doctrine calls these residual risks—those that
remain when the unnecessary or unacceptable risks have been eliminated.156 Risk
itself cannot be eliminated; even staying the course, or not acting at all, denotes
63
Ucko and Marks
some risk. The test is therefore whether those of the proposed strategy are less
significant, particularly in relation to the positional advantage being gained. As
Michael Mazarr notes, “The goal would not be to prevent bad outcomes. Instead
the purpose . . . would be to ensure that leaders make strategic judgments with eyes
wide open to possible consequences.”157
When the residual risks have been identified, the next logical step is to devise
possible steps that may somehow mitigate their expected harm. Plans for mitiga-
tion could be full-fledged branch plans with their own logic, sequencing, and pri-
oritization, or they could be far simpler, pointing to possible measures that might
reduce the likelihood of risks materializing or of their consequences when they
do. In this context, it is important to understand that if risks of failure do material-
ize, it means that a vulnerable part of the strategy has indeed broken, and so fresh
thinking will be required to find new ways forward to absorb the damage being
done. Given the need for new solutions, risk-mitigating measures would typically
not be found in the strategy as is. Indeed, they may not even be desired. Instead,
they often involve a “Plan B,” or an emergency measure that will only become
necessary and be used should the original plan misfire or, even, succeed yet harm
other interests.
Conclusion
It is never easy to propose a framework for analyzing and responding more
effectively to today’s most vexing strategic problems. For starters, many observers
insist that if the framework is not entirely original, it has nothing new to con-
tribute. Second, and conversely, there is concept fatigue and the unwillingness to
consider any new (or old) terminology as anything other than distracting jargon.
Third, the use of frameworks is thought to encourage template thinking and to
narrow the intellectual margins of the analyst. Fourth, it is suggested that policy
errors committed by states are unrelated to the conceptual tools at their dispos-
al, which are anyway advanced, and that further refinement on this front merely
chases the shadow of bigger problems. Fifth (but far from finally), everything that
is proposed is believed to be “already obvious” and therefore not worth reprinting
or exploring.
64
Crafting Strategy for Irregular Warfare
65
Ucko and Marks
timate framework and the associated terminology to interrogate your case; know
(and demonstrate in your argumentation) why what you include is relevant and
necessary to the point being made.
◆ The framework lexicon is used in conjunction with the terminology of op-
erational design and art as derived from joint doctrine.
Problem
In two to three paragraphs, distill the nature of the problem, providing both a
synthesis of the Estimate and an introduction. Reflect on the following questions,
but save details for later:
◆ What is the political nature of the problem that the state is facing?
◆ What is the name and nature of the threat? Is it a terrorist group, insurgency,
66
Crafting Strategy for Irregular Warfare
Note: The problem statement is the distillation of the analysis encompassed by the
entire Estimate. As such, it cannot be finalized before the other boxes of the Esti-
mate framework have been completed.
Roots
Roots is concerned with the factors that produce the threat—or how struc-
tural factors are undermining the state and allowing the threat to thrive. The griev-
ances or “drivers” may be actual or perceived (that is, objective or subjective, tan-
gible or intangible). The issue is their resonance in society and the legitimacy of
those championing violent ways of achieving change.
The Roots section will differ according to the nature of the conflict:
sored by outside states), analysis should interrogate how macro factors (context,
structure) lead certain individuals in society (micro) to embrace collective at-
tempts at change via organizations (meso). Each facet must be interrogated, not
linearly but in an integrated manner, as part of your overall analysis. Specifically:
❏ Macro: What are the contextual factors that enable the threat, allowing it
to amass support or strength? Typical examples of such drivers include entrenched
inequity, poor governance, corruption, geographical isolation, lack of opportunity,
abusive state behavior, or unresolved historical legacies, but the list is far from
exhaustive.
❏ Micro: assuming these drivers are relevant, why do they compel some but
not others to support violent or subversive strategies of change? Can we determine
67
Ucko and Marks
68
Crafting Strategy for Irregular Warfare
◆ For each, explain the narrative used, be it to explain the world, advocate for
◆ Ends: What are the goals of the threat and how do these relate to the con-
flict’s political essence?
❏ Critical interrogation of stated objectives may be necessary, particularly
when circumstances have made the realization of the declared endstate a distant
prospect. What, in the interim, can be said to constitute the threat’s objective?
◆ Ways
69
Ucko and Marks
Interim
LOE 1 Campaign 1 Campaign 2 Campaign 3
Objectives
Line of Effort 2:
Interim
LOE 2 Campaign 1 Campaign 2 Campaign 3
Objectives
70
Crafting Strategy for Irregular Warfare
Facilitate
Guerrilla Mobile War of
VIOLENCE Terrorism
warfare warfare position
imposition of
politics
Front Influenced
“Useful Broaden struggle/
ALLIES organiza- organiza-
idiots” united fronts
tions tions
International
INTER- organiza-
Visibility and
States Individuals
NATIONAL tions
support
❏ Means are not a separate concern from the “how” of strategy. As the
strategy is mapped, include to the degree possible consideration of how the threat
71
Ucko and Marks
is engaging in this strategy. What resources and specialized means are being de-
ployed?
❏ A separate discussion of means may also be appropriate to indicate hold-
ings, structures, bases, ministries, command and control structures, and so forth.
Diagrams and maps can be important here.
ity (COG)? The COG is the focal point of power and coherence, without which the
threat strategy could not function or be irrelevant. In irregular warfare, the COG
often relates to perceptions of legitimacy of either the government or the threat,
which in turn relates to the desire and interest of key actors in either supporting or
opposing a political movement.
◆ To identify ways of addressing the COG, determine the threat’s critical vul-
nerabilities (CVs). A CV is a component of the threat strategy that is deficient
or vulnerable to direct or indirect attack, creating a significant effect. It may re-
late to mismatches between Frames and Strategy (what is believed versus what
is done), to gaps between Roots and Threat Strategy (what drives participation
versus threat’s mediation of grievances), or to tensions within any component of
the Estimate.
Present Response
Note: This is a discussion and critique of the current state response to the
threat you are analyzing.
◆ State perception: How does the state frame the threat and/or the problem?
How does it assess the threat COG? How does it view its own progress in address-
ing this threat? How does it describe its own reason for fighting the threat?
72
Crafting Strategy for Irregular Warfare
◆ State response: How is the state responding to the threat strategy? Is it cor-
rectly addressing legitimacy? What is the strategic approach and theory of success?
◆ Critique: Is the state’s perception accurate—of its progress, the conflict, or
the threat? Is the state making progress in defeating or countering the threat? Does
the state’s response address the symptoms of the problem or the problem itself
(the underlying causes)? Is it appropriately addressing the Roots of the Conflict,
the Frame and Narratives, and/or the Threat Strategy? As applicable, is the state
affecting the COG via deft exploitation of the CVs?
◆ Offer a thorough critique of the state response that identifies and explains its
◆ Merely listing state programs. It is the interaction of the two contenders that
is at issue. How is the struggle of capability and strategic approaches stacking up?
Has a struggle for legitimacy resulted or has violence (in the form of raw power)
changed the dynamic you are examining?
◆ Confusing the government response in past years for the present phase that
currently matters. What the present phase is will depend on the specifics of the
case but is always distinguished by meaningful continuity with the dynamics of the
conflict as they express themselves today.
73
Ucko and Marks
Guidance
Your strategic response builds on your strategic estimate, producing an Ir-
regular Warfare Plan. Both come together in one document, as it is impossible to
do the Response without the Estimate.
Figure B1. The Estimate and COA Frameworks and Their Relation
1. STRATEGIC ESTIMATE
CONCEPT OF LEGAL
RESPONSE AUTHORITY ASSUMPTIONS IMPLEMENTATION
Assessment of What authorities What assumptions Strategy (E-W-M)
estimate: What is bind you and what were necessary to RISK
to be done and do you need? continue with ASSESSMENT &
Phasing
why? planning? MITIGATION
How to get at
Metrics
threat COG via
CVs?
2. STRATEGIC RESPONSE
Concept of Response
Summarize your recommended response to the problem analyzed in your Es-
timate. Illustrate how and why your plan differs from the present government re-
sponse analyzed in the Estimate. The point is to be succinct. Capture your strategy
in two to four paragraphs.
One way of crafting your response is by revisiting and seeking to address the
strategic center of gravity, often via the threat’s critical vulnerabilities. To the degree
that the COG speaks to questions of legitimacy (often the case in irregular warfare),
your response must be designed to address issues with the political opportunity
74
Crafting Strategy for Irregular Warfare
structure and/or the nonmediation of grievances, real or imagined, that sustain the
threat. Your response should also be driven by a theory of success and/or the posi-
tion that you want to attain and how. These theories must be grounded in evidence
concerning the case, drawn from your Estimate.
In describing the type of response you are proposing, demonstrate:
Legal
While you may have the ways and means to accomplish a variety of responses,
your plan must adhere to proper legal authorities. Ensuring that you have a legal
basis requires interrogation of your planned action and consideration of legal am-
biguities and challenges (these could arise from questions of sovereignty, use of
force, constitutional constraints, or treaty law).
75
Ucko and Marks
lacking, can you implement temporary or new measures? You may find a need
for your state’s legislative body to enact specific laws to address the threat.
◆ Be aware that legal considerations can be formal—the rule of law—or in-
formal, relating to cultural, social, and religious factors that will constrain your
response.
Do not use this section to list all laws that relate to your conflict or case. Re-
strict the analysis to the specific red flags that might prompt legal review and need
clarification as to the existing authorities. Where authorities and legal backing are
lacking, elaborate on the necessary changes in legislation.
Assumptions
What assumptions did you have to make to allow for planning into the future?
State and explain these assumptions.
Assumptions are used to make necessary predictions and to fill in gaps in
required information or facts that are needed to continue planning. Your assump-
tions may relate to areas of continuity or change and delineate an environment in
which your proposed course of action is relevant.
Bear in mind:
own response. As such, planning assumptions are different from anticipated out-
comes. Do not assume that desired conditions will apply if they do not already do
so; do not assume problematic circumstances will change unless evidence suggests
this is likely. Do not let the assumptions do the hard work for you.
76
Crafting Strategy for Irregular Warfare
What are the implications of your assumptions being proved wrong? Is there
sufficient flexibility in your strategic response or must it be rewritten?
Implementation
This is the actual setting forth of the detailed elements of the plan to address
the problem. As appropriate to your case, you must detail how your proposed re-
sponse counters: the roots of the problem, the threat frame(s) and narrative(s),
and the threat strategy.
Begin with a synopsis of how you operationalize the Concept of Response dis-
cussed earlier.
This introduction to your strategy will allow you to get into further detail. In
presenting the strategy, do not think of its constituent elements as separate but
rather integrate them as part of one product, leading from the present to your de-
sired objective and encompassing the necessary LOEs, metrics, phases, and means
(see figure B2).
The LOEs will likely differ across the different phases of the plan so that each
one builds on progress made until strategic and sustainable objectives can be
reached. Different phases will be appropriate in addressing different elements of
the Estimate—Roots, Frame and Narrative, and Threat Strategy. This will relate to
how the plan unfolds across time and space (and to the requirements of your case).
Your response may have phases that are sequential or concurrent or a combination
of these. How will you decide to transition from one phase to the next? Are your
phases based on time or are there specific conditions determined through metrics
(see next section) that determine when to transition from one phase to the next?
77
Ucko and Marks
Interim Objectives
LOE Campaign Campaign Campaign Campaign
Means Means Means Means
What are the metrics by which you will assess the success of your plan and/or
the shift between its critical phases (what are the conditions that allow you to tran-
sition)? Metrics can be both tangible (concrete) and intangible (abstract, such as
perceptions, emotions, trust). Consider how best to capture the data necessary for
these metrics (for example, how do you intend to capture “influence”)? Attempt
to capture the outcomes desired by the plan rather than the inputs or their direct
output—emphasize the political effects and elaborate ways of measuring them.
In resourcing your plan, you must provide the details of what government de-
partments, agencies, or ministries are tasked to accomplish your LOEs and their
associated campaigns. If the required means are not in place, they must be de-
veloped (and this must be acknowledged in your phasing structure). Note that
instruments of national power (for example, diplomatic, information, military,
economic, finance, intelligence, and law enforcement) are not Ways but rather
(and merely) an indication of Means—for instance, military instrument of power
78
Crafting Strategy for Irregular Warfare
means little if you do not specify just who and what is to execute a task and what
that task will be.
In explaining your implementation, provide visual aids as necessary to illus-
trate how the response will unfold. These should include maps or charts denoting
geographic and human terrain—population density, demographic data, religious
affiliations, political alliances, natural resources, criminal activity, or whatever
variable is most relevant to your case.
Ensure that your response, as presented, appears feasible (it is a response that
the state could execute); reasonable (it is rational and logical); acceptable (within
the bounds of relevant law and to the court of public opinion—both domestically
and internationally); and sustainable (the results achieved will be consolidated
rather than reversed). These conditions are not a list of conditions to be checked
off one by one, but crucial considerations to guide you throughout your planning
and design.
❏ Where do you see the greatest risk for a mismatch or disconnection be-
tween your ends, ways, and means?
❏ Similarly, where do you see the greatest risk for an invalid assumption?
❏ What is the risk of executing the strategy to your other national interests?
❏ What might be the unintended consequences of your plan, even if it suc-
ceeds?
79
Ucko and Marks
For each risk identified, consider first whether changes to your response would
resolve this vulnerability. Edit the response as necessary to arrive at unavoidable,
acceptable residual risks. For these, develop plans for mitigation. If these risks are
realized, what alternative measures could be taken to reduce the magnitude of the
damage incurred? Can ends, ways, or means be rethought?
80
Crafting Strategy for Irregular Warfare
Notes
1
Thomas A. Marks and David H. Ucko, “Gray Zone in Red: China Revisits the Past,”
Small Wars & Insurgencies 32, no. 2 (February 17, 2021), 181–204, available at <https://
doi.org/10.1080/09592318.2021.1870422>.
2
Ashley Lane, “Iran’s Islamist Proxies in the Middle East,” The Islamists (Washington,
DC: Wilson Center, December 17, 2020), available at <https://www.wilsoncenter.org/
article/irans-islamist-proxies>; Michael Knights, “Soleimani Is Dead: The Road Ahead for
Iranian-Backed Militias in Iraq,” CTC Sentinel, January 2020.
3
Summary of the 2018 National Defense Strategy of the United States of America:
Sharpening the American Military’s Competitive Edge (Washington, DC: Department of
Defense, 2018), 2, available at <https://dod.defense.gov/Portals/1/Documents/pubs/2018-
National-Defense-Strategy-Summary.pdf>.
4
George W. Bush, “Remarks to the Troops at Norfolk Naval Air Station in Norfolk,
Virginia,” The American Presidency Project, February 13, 2001, available at <www.
presidency.ucsb.edu/ws/?pid=45992>.
5
Summary of the Irregular Warfare Annex to the National Defense Strategy
(Washington, DC: Department of Defense, 2020), 1.
6
Douglas S. Blaufarb, The Counterinsurgency Era: U.S. Doctrine and
Performance—1950 to Present (New York: The Free Press, 1977); Richard Duncan
Downie, Learning from Conflict: The U.S. Military in Vietnam, El Salvador, and the Drug
War (Westport, CT: Praeger, 1998); David H. Ucko, The New Counterinsurgency Era:
Transforming the U.S. Military for Modern Wars (Washington, DC: Georgetown University
Press, 2009).
7
Draws on David H. Ucko and Thomas A. Marks, “Violence in Context: Mapping the
Strategies and Operational Art of Irregular Warfare,” Contemporary Security Policy 39, no.
2 (April 2018), 206–233, available at <https://doi.org/10.1080/13523260.2018.1432922>.
8
The 2018 National Defense Strategy stated categorically that “Inter-state strategic
competition, not terrorism, is now the primary concern.” Summary of the 2018 National
Defense Strategy of the United States of America, 1.
9
Overlooked universally in Western discussion is the reality that key facets of the
approach under discussion have been codified doctrine for roughly a century in both
Russia (originally, the Soviet Union) and China, as well as the loser in the Chinese civil
war, Taiwan. For discussion and assessment of the China and Taiwan cases, as influenced
by the Soviet example and direct involvement, see Thomas A. Marks, Counterrevolution
in China: Wang Sheng and the Kuomintang (London: Frank Cass, 1996). For North Korea,
see Benjamin R. Young, Guns, Guerillas [sic], and the Great Leader: North Korea and the
Third World, Cold War International History Project (Stanford: Stanford University Press,
2021).
81
Ucko and Marks
10
For the useful backstory to this phenomenon, see Richard Middleton, The War of
American Independence, 1775–1783, 1st ed. (New York: Pearson, 2012).
11
Carl von Clausewitz, On War, ed. and trans. Michael Howard and Peter Paret
(Princeton: Princeton University Press, 1989), 75.
12
The framework was originally created by Thomas A. Marks and draws on his
life work and scholarship on an aggregation of the People’s War approach, used by the
American Patriots and the Asian theorists, notably Mao Zedong, and others.
13
Joint Operating Concept, Irregular Warfare: Countering Irregular Threats
(Washington, DC: Department of Defense, May 17, 2010), 9, available at <https://
www.jcs.mil/Portals/36/Documents/Doctrine/concepts/joc_iw_v2.pdf?v
er=2017-12-28-162021-510>.
14
As cited in Michael Ignatieff, Virtual War: Kosovo and Beyond (New York: Picador,
2001), 211.
15
Ibid.
16
Operations other than war included “strikes, raids, peace enforcement,
counterterrorism, enforcement of sanctions, support to insurgency and
counterinsurgency, and evacuation of noncombatants.” See Joint Publication (JP) 3-07,
Joint Doctrine for Military Operations Other Than War (Washington, DC: The Joint Staff,
1995), vii. Emphasis added.
17
David H. Ucko, “Nobody Puts IW in an Annex: It’s Time to Embrace Irregular
Warfare as a Strategic Priority,” Modern War Institute, October 14, 2020, available at
<https://mwi.usma.edu/nobody-puts-iw-in-an-annex-its-time-to-embrace-irregular-
warfare-as-a-strategic-priority/>.
18
Valery Gerasimov, “The Value of Science in Prediction,” Military-Industrial Kurier,
no. 8 (476), March 27, 2013, available at <http://vpk-news.ru/sites/default/files/pdf/
VPK_08_476.pdf>. Emphasis added.
19
Sun Tzu, The Art of War (Minneapolis: Filiquarian Publishing, 2006), 13.
20
Rosa Brooks, How Everything Became War and the Military Became Everything:
Tales from the Pentagon (New York: Simon and Schuster, 2016).
21
See, for example, Kyrylo Sakhniuk, “Russian Information Warfare Against
Ukraine,” The Journal of Counterterrorism and Homeland Security International 27, no. 3
(Summer 2022), 38–45. For discussion of Russian simultaneous focus on the nonviolent
side of the equation, see Nikolay Y. Naydenov, “Russia’s Gray Zone Threat to Bulgaria,”
The Journal of Counterterrorism and Homeland Security International 27, no. 3 (Summer
2022), 46–55.
22
Alexus G. Grynkewich, “Welfare as Warfare: How Violent Non-State Groups Use
Social Services to Attack the State,” Studies in Conflict & Terrorism 31, no. 4 (April 4,
2008), 350–370; Shawn Teresa Flanigan, “Charity as Resistance: Connections Between
Charity, Contentious Politics, and Terror,” Studies in Conflict & Terrorism 29, no. 7
82
Crafting Strategy for Irregular Warfare
(October 2006), 641–655. On the use of political fronts by insurgent groups, see David
H Ucko, The Insurgent’s Dilemma: A Struggle to Prevail (Oxford: Oxford University
Press, 2022), chap. 4; Benedetta Berti, Armed Political Organizations: From Conflict to
Integration (Baltimore: The Johns Hopkins University Press, 2013); Leonard Weinberg,
Ami Pedahzur, and Arie Perlinger, Political Parties and Terrorist Groups, 2nd ed., Routledge
Studies in Extremism and Democracy, ed. Roger Eatwell (London: Routledge, 2009).
23
Useful in this context are two articles, adapted from work conducted at the
College of International Security Affairs, by two U.S. students, using the framework
presented here. See Jesse S. Curtis, “Springing the ‘Tacitus Trap’: Countering Chinese
State-Sponsored Disinformation,” Small Wars & Insurgencies 32, no. 2 (February 17,
2021), 229–265, available at <https://doi.org/10.1080/09592318.2021.1870429>; Cary
Mittelmark, “Playing Chess with the Dragon: Chinese-U.S. Competition in the Era of
Irregular Warfare,” Small Wars & Insurgencies 32, no. 2 (February 17, 2021), 205–228,
available at <https://doi.org/10.1080/09592318.2021.1870423>.
24
Thomas A. Marks, Maoist People’s War in Post-Vietnam Asia (Bangkok: White
Lotus, 2007), 41–45.
25
Thomas A. Marks, “Counterinsurgency in the Age of Globalism,” Journal of Conflict
Studies 27, no. 1 (2007), 24–25.
26
Summary of the 2018 National Defense Strategy of the United States of America, 5.
27
As Iran’s foreign minister, Javad Zarif, put it during an interview shortly after the
killing of Qasem Soleimani, “‘Beautiful military equipment’ don’t [sic] rule the world.
People rule the world. People. The United States must wake up to the reality that the people
of this region are enraged, that the people of this region want the United States out, and
the United States cannot stay in this region with the people of the region not wanting it
anymore.” CNN, January 7, 2020, available at <www.cnn.com/videos/world/2020/01/07/
iran-soleimani-javad-zarif-donald-trump-pleitgen-intv-intl-ldn-vpx.cnn>.
28
See, for example, Young, Guns, Guerillas [sic], and the Great Leader.
29
As Niels Woudstra explains, China has occupied vital islands in the South China
Sea not by launching “large-scale offensives against its neighbours” but by “patiently
broadening its influence in the area, often by using civilian or paramilitary means.”
See Niels Woudstra, “Winning Without Killing in the South China Sea,” in NL Arms
Netherlands Annual Review of Military Studies 2017: Winning Without Killing; The Strategic
and Operational Utility of Non-Kinetic Capabilities in Crises, ed. Paul A.L. Ducheine and
Frans P.B. Osinga (Amsterdam: Asser Press/Springer, 2017), 280.
30
See, for example, Bill Hayton, The South China Sea: The Struggle for Power in Asia
(New Haven: Yale University Press, 2014); Humphrey Hawksley, Asian Waters (New York:
Abrams Books, 2020).
83
Ucko and Marks
31
See, respectively, Gerasimov, “The Value of Science in Prediction”; Liang Qiao, Al
Santoli, and Xiangsui Wang, Unrestricted Warfare: China’s Master Plan to Destroy America
(Panama City, Panama: Pan American Publishing, 2002).
32
Evidence that has emerged concerning Russian attempts to shape U.S. elections
results has been overwhelming. See, for example, Kathleen Hall Jamieson, Cyberwar: How
Russian Hackers and Trolls Helped Elect a President (New York: Oxford University Press,
2018). For useful contextualization, see Robert S. Hinck, Skye C. Cooley, and Randolph
Kluver, Global Media and Strategic Narratives of Contested Democracy: Chinese, Russian,
and Arabic Media Narratives of the U.S. Presidential Election (London: Routledge, 2020).
33
Alessandro Ford, “Chinese Fishing Fleet Leaves Ecuador, Chile, Peru Scrambling
to Respond,” InSight Crime, November 5, 2020, available at <https://insightcrime.org/
news/analysis/china-fishing-fleet-response/>; “Gangsterism with Chinese Characteristics,”
Indo-Pacific Defense Forum, February 4, 2022, available at <https://ipdefenseforum.
com/2022/02/gangsterism-with-chinese-characteristics/>; Kathy Gilsinan, “China’s
Bargain on Global Influence Is Paying Off,” The Atlantic, May 6, 2020, available at <https://
www.theatlantic.com/politics/archive/2020/05/china-global-influence-who-united-
states/611227/>.
34
See, for example, Stephen J. Flanagan et al., Deterring Russian Aggression in
the Baltic States Through Resilience and Resistance, Research Report (Santa Monica,
CA: RAND, 2019), available at <https://apps.dtic.mil/sti/pdfs/AD1086498.pdf>; Uwe
Hartmann, “The Evolution of the Hybrid Threat, and Resilience as a Countermeasure,”
NATO Research Paper No. 139 (September 2017), 1–8.
35
Lawrence Freedman, The Transformation of Strategic Affairs, Adelphi Paper 379
(Abingdon, NY: Routledge, 2006), 22.
36
Joseph S. Nye, Jr., “The Information Revolution and Power,” Current History 113,
no. 759 (January 2014), 20. Citing John Arquilla.
37
Aymenn Jawad al-Tamini, “Review of ‘ISIS: The State of Terror,’” Syria Comment,
March 27, 2015, available at <www.joshualandis.com/blog/review-of-isis-the-state-of-
terror/>.
38
Jessica Stern and J.M. Berger, ISIS: The State of Terror (New York: Ecco Press/
HarperCollins, 2016), 150. See also Laura Huey, “This Is Not Your Mother’s Terrorism:
Social Media, Online Radicalization and the Practice of Political Jamming,” Journal of
Terrorism Research 6, no. 2 (May 25, 2015), 2, available at <https://doi.org/10.15664/
jtr.1159>; Jerome P. Bjelopera, American Jihadist Terrorism: Combating a Complex Threat,
R41416 (Washington, DC: Congressional Research Service, January 23, 2013), 20.
39
It must be kept in mind that what is being posited is not merely an effort at
deception but the advancing of correct interpretation of objective realities—as seen by the
challenger—in a subjective manner that advances the cause. Vladimir Lenin, among many
possibilities, made clear that strategic fidelity allowed any degree of tactical compromise.
84
Crafting Strategy for Irregular Warfare
Use of the latter did not mean belief in the former was duplicitous. Useful discussion in
Sonia Ryang, Language and Truth in North Korea (Honolulu: University of Hawaii Press,
2021).
40
Alan Greeley Misenheimer, Thucydides’ Other “Traps”: The United States, China,
and the Prospect of “Inevitable” War (Washington, DC: NDU Press, 2019), 53–54. We are
indebted to Jesse Curtis for alerting us to this concept.
41
Peter Mattis, “China’s ‘Three Warfares’ in Perspective,” War on the Rocks, January
30, 2018, available at <https://warontherocks.com/2018/01/chinas-three-warfares-
perspective/>; Marks, Counterrevolution in China.
42
Gerasimov, “The Value of Science in Prediction.”
43
Irregular Warfare, 9.
44
Clausewitz, On War, 69.
45
Christopher Coker, Rebooting Clausewitz: “On War” in the Twenty-First Century
(Oxford: Oxford University Press, 2017), 146.
46
F.G. Hoffman, Decisive Force: The New American Way of War (Westport, CT:
Praeger, 1996); Russell Weigley, The American Way of War: A History of United States
Military Strategy and Policy (Bloomington: Indiana University Press, 1977).
47
Philip N. Howard, Bharath Ganesh, and Dimitra Liotsiou, The IRA, Social Media,
and Political Polarization in the United States, 2012–2018 (Oxford: Computational
Propaganda Research Project, December 2018). See also Mie Kim Young, “Uncover:
Strategies and Tactics of Russian Interference in U.S. Elections,” Project DATA (Digital
Ad Tracking & Analysis), University of Wisconsin, Madison, September 4, 2018,
available at <https://journalism.wisc.edu/wp-content/blogs.dir/41/files/2018/09/Uncover.
Kim_.v.5.0905181.pdf>.
48
John Raidt, “Coronavirus Has Exposed the United States’ Own Political Virus,”
Atlantic Council, April 29, 2020, available at <https://www.atlanticcouncil.org/content-
series/beyond-covid-19/coronavirus-has-exposed-the-united-states-own-political-
virus/>. For exploitation thereof, see Michael R. Gordon and Dustin Volz, “Russian
Disinformation Campaign Aims to Undermine Confidence in Pfizer, Other Covid-19
Vaccines, U.S. Officials Say,” Wall Street Journal, March 7, 2021, available at <https://www.
wsj.com/articles/russian-disinformation-campaign-aims-to-undermine-confidence-in-
pfizer-other-covid-19-vaccines-u-s-officials-say-11615129200>.
49
Charles A. Kupchan and Peter L. Trubowitz, “Dead Center: The Demise of Liberal
Internationalism in the United States,” International Security 32, no. 2 (2007), 40.
50
Adrian Karatnycky and Alexander J. Motyl, “Ukraine’s Promising Path to
Reform,” Foreign Affairs, July 16, 2018, available at <www.foreignaffairs.com/articles/
ukraine/2018-07-16/ukraines-promising-path-reform>; Isabel Weininger, “Die Ukraine—
Transparent, aber Korrupt?” Auslandsinformationen, no. 4 (2019), 13. In Transparency
International’s Corruption Perception Index of 2019, Ukraine still ranks as the second-
85
Ucko and Marks
most corrupt nation in Europe (after Russia). See Corruption Perceptions Index 2019
(Berlin: Transparency International, 2020), available at <https://images.transparencycdn.
org/images/2019_CPI_Report_EN.pdf>.
51
Until 2013, the media produced by the U.S. Government’s Broadcasting Board of
Governors (BBG), such as Voice of America, Radio Free Europe/Radio Liberty, and the
Middle East Broadcasting Networks, could not be disseminated domestically for fear
of subjecting U.S. citizens to government propaganda. Though that has changed, and
the BBG is now the U.S. Agency for Global Media, these outlets are clearly insufficient
for strategic communications (even communications built on facts as opposed to spin).
During this time, the United States has allowed outlets owned by foreign governments to
broadcast freely and without label.
52
As Matthew Armstrong has noted, even at the high point of U.S. strategic
communications, the organization faced a range of problems, from “a lack of training, to
bureaucratic lethargy, to a failure to align and coordinate overt and covert activities.” See
Matthew Armstrong, “The Politics of Information Warfare in the United States,” in Hybrid
Conflicts and Information Warfare: New Labels, Old Politics, ed. Ofer Fridman, Vitaly
Kabernik, and James C. Pearce (London: Lynne Rienner, 2019), 108.
53
Observations based on interviews with members of the Global Engagement
Center. See also Matthew Armstrong, “The Past, Present, and Future of the War for
Public Opinion,” War on the Rocks, January 19, 2017, available at <https://warontherocks.
com/2017/01/the-past-present-and-future-of-the-war-for-public-opinion/>.
54
Fareed Zakaria, “Defense Spending Is America’s Cancerous Bipartisan Consensus,”
Washington Post, July 18, 2019, available at <https://www.washingtonpost.com/opinions/
defense-spending-is-americas-cancerous-bipartisan-consensus/2019/07/18/783a9e1a-
a978-11e9-9214-246e594de5d5_story.html>.
55
Robert M. Gates, “The Overmilitarization of American Foreign Policy,” Foreign
Affairs, July/August 2020, available at <www.foreignaffairs.com/articles/united-
states/2020-06-02/robert-gates-overmilitarization-american-foreign-policy>.
56
See Phillip Lohaus, “A New Blueprint for Competing Below the Threshold: The
Joint Concept for Integrated Campaigning,” War on the Rocks, May 23, 2018, available
at <https://warontherocks.com/2018/05/a-new-blueprint-for-competing-below-the-
threshold-the-joint-concept-for-integrated-campaigning/>; Joint Concept for Integrated
Campaigning (Washington, DC: The Joint Staff, March 16, 2018), available at <http://www.
jcs.mil/Portals/36/Documents/Doctrine/concepts/joint_concept_integrated_campaign.pd
f?ver=2018-03-28-102833-257>.
57
As cited in John Costello and Peter Mattis, “Electronic Warfare and the Renaissance
of Chinese Informational Operations,” in China’s Evolving Military Strategy, ed. Joe
McReynolds (Washington, DC: The Jamestown Foundation, 2017), 191.
86
Crafting Strategy for Irregular Warfare
58
Detailed foundational treatments in Thomas A. Marks, “‘Counterterrorism’ 2018:
Where We Stand Analytically,” The Journal of Counterterrorism and Homeland Security
International 24, no. 1 (Winter 2018), 26–36; Thomas A. Marks, “Combating ‘Terrorism’:
A Strategic Warfighting Perspective,” in Essays in Honour of K.P.S. Gill, ed. Ajai Sahni
(New Delhi: Kautilya, 2019), 99–128. See also Ucko and Marks, “Violence in Context.”
59
Hew Strachan, “Strategy and the Limitation of War,” Survival 50, no. 1 (March
2008), 51, available at <https://doi.org/10.1080/00396330801899470>.
60
Clausewitz, On War, 75.
61
“Pour Foch, stratège par excellence, ‘la stratégie est un système d’expédients; le
savoir transporté dans la vie réelle.’ Son premier pas appelle une réponse à la fameuse
interrogation: ‘De quoi s’agit-il ?’” [For Foch, the ultimate strategist, ‘strategy is a system of
expedients; knowledge applied to real life.’ Its first step requires a response to the famous
question: ‘what is it all about?’]. See Général de Lattre, “Foch,” Revue Des Deux Mondes
(1829–1971), no. 4 (1949), 588.
62
Heather Marquette and Caryn Peiffer, “Corruption and Transnational Organised
Crime,” in The Routledge Handbook of Transnational Organized Crime, ed. Felia Allum and
Stan Gilmour, 2nd ed. (London: Routledge, 2022), 473.
63
See Matt Andrews, Lant Pritchett, and Michael Woolcock, “Escaping Capability
Traps through Problem-Driven Iterative Adaptation (PDIA),” CGD Working Paper
(Washington, DC: Center for Global Development, 2012), 237.
64
Susan L. Woodward, “Do the Root Causes of Civil War Matter? On Using
Knowledge to Improve Peacebuilding Interventions,” Journal of Intervention
and Statebuilding 1, no. 2 (June 2007), 143–170, available at <https://doi.
org/10.1080/17502970701302789>. The vexing question of why some individuals
participate and others do not is the central issue in Christopher R. Browning’s
groundbreaking study of individual involvement in the mass killing of Jews. See
Christopher R. Browning, Ordinary Men: Reserve Police Battalion 101 and the Final
Solution in Poland, rev. ed. (New York: Harper Perennial, 2017).
65
See, for example, Lorne L. Dawson and Amarnath Amarasingam, “Talking to
Foreign Fighters: Insights Into the Motivations for Hijrah to Syria and Iraq,” Studies in
Conflict and Terrorism 40, no. 3 (March 4, 2017), 191–210, available at <https://doi.org/10.
1080/1057610X.2016.1274216>.
66
Doug McAdam, “Recruitment to High-Risk Activism: The Case of Freedom
Summer,” American Journal of Sociology 92, no. 1 (1986), 64–90.
67
Benchmark work is Peter K. Eisinger, “The Conditions of Protest Behavior in
American Cities,” The American Political Science Review 67, no. 1 (March 1973), 11–28.
See also Donatella Della Porta, Social Movements, Political Violence, and the State: A
Comparative Analysis of Italy and Germany (Cambridge: Cambridge University Press,
2006). The concept can become overspecified, and we do not delve here into the extensive
87
Ucko and Marks
derivative work that followed the foundational treatment, which held in straightforward
fashion that a structure of opportunity will politically either hinder or facilitate the
realization of individual aspirations. For assessment of the growth and controversy
involving this simple reality, see Karl-Dieter Opp, Theories of Political Protest and Social
Movements: A Multidisciplinary Introduction, Critique, and Synthesis (London: Routledge,
2009), esp. chapter 6.
68
Over time, this leads to what Della Porta refers to as a “state of clandestinity.” See
Donatella Della Porta, Clandestine Political Violence (New York: Cambridge University
Press, 2013). See also Wieviorka’s work on “inversion.” Michel Wieviorka, The Making of
Terrorism (Chicago: University of Chicago Press, 2004), 61–77.
69
On Weather Underground, see Arthur M. Eckstein, Bad Moon Rising: How the
Weather Underground Beat the FBI and Lost the Revolution (New Haven: Yale University
Press, 2016). On Black Panthers, see Joshua Bloom and Waldo E. Martin, Black Against
Empire: The History and Politics of the Black Panther Party (Oakland: University of
California Press, 2016); Doug McAdam, Political Process and the Development of Black
Insurgency, 1930–1970, 2nd ed. (Chicago: University of Chicago Press, 1982).
70
Jean Lartéguy, The Centurions, trans. Alexander Wallace Fielding (New York:
Penguin, 2015), 474.
71
V.I. Lenin, Selected Works [of] V.I. Lenin (New York: International Publishers,
1968), 40.
72
Nguyên Giáp Võ, People’s War, People’s Army: The Viet Công Insurrection Manual for
Underdeveloped Countries (New York: Praeger, 1967), 78.
73
See Akil N. Awan, “The Virtual Jihad: An Increasingly Legitimate Form of Warfare,”
The Virtual Jihad 3, no. 5 (May 2010), 10–13.
74
Peter Pomerantsev, “How Vladimir Putin Is Revolutionizing Information Warfare,”
The Atlantic, September 9, 2014, available at <www.theatlantic.com/international/
archive/2014/09/russia-putin-revolutionizing-information-warfare/379880/>.
75
Heidi Holz and Anthony Miller, China’s Playbook for Shaping the Global Media
Environment (Arlington, VA: CNA, February 2020), available at <https://www.cna.org/
CNA_files/PDF/IRM-2020-U-024710-Final.pdf>.
76
See J. Michael Cole, “Chinese Disinformation in Taiwan,” Taiwan Sentinel,
December 30, 2019, available at <https://sentinel.tw/chinese-disinformation-in-taiwan/>.
77
For a debate on the evolution of this phenomenon, see Thomas Rid and Marc
Hecker, War 2.0: Irregular Warfare in the Information Age (Westport, CT: Praeger, 2009).
78
Donatella Della Porta and Mario Diani, Social Movements: An Introduction, 2nd ed.
(Malden, MA: Wiley-Blackwell, 2006), 74–88.
79
For the seminal treatment on which nearly all subsequent work draws, wittingly
or not, see Erving Goffman, Frame Analysis: An Essay on the Organization of Experience
(Cambridge: Harvard University Press, 1974).
88
Crafting Strategy for Irregular Warfare
80
Within a broad academic literature devoted to empathy, it can be helpfully defined
as “imagining or simulating another’s experience and perspective, to better understand
them. Empathy, in this sense, is rational and cognitive . . . a tool for understanding the way
another person thinks, feels, or perceives. It enables us to comprehend another’s mindset,
driving emotions or outlook, without requiring us to share the other’s thoughts, feelings,
and perceptions, or, indeed, approve of them.” See Matt Waldman, Strategic Empathy
(Washington, DC: New America Foundation, 2012), 2.
81
Tony Judt, Past Imperfect: French Intellectuals, 1944–1956 (New York: NYU Press,
2011), 48.
82
For an analysis of how these methods cut across highly disparate cases, see Charles
Lindholm and Jose Pedro Zúquete, The Struggle for the World: Liberation Movements for
the 21st Century (Stanford: Stanford University Press, 2010).
83
Judt, Past Imperfect, 317.
84
The quotation continues, “Nothing henceforth can disturb the convert’s inner peace
and serenity—except the occasional fear of losing faith again, losing thereby what alone
makes life worth living, and falling back into the outer darkness where there is wailing and
gnashing of teeth.” Arthur Koestler, as cited in Luther P. Gerlach and Virginia H. Hine,
People, Power, Change Movements of Social Transformation (Indianapolis: Bobbs-Merrill,
1970), 141.
85
As cited in G.M. Gilbert, Nuremberg Diary (New York: Farrar, Straus and Giroux,
1947), 278.
86
This was the advice Senator Arthur Vandenberg (R-MI) offered for how President
Harry S. Truman might gain domestic support for American assistance to Turkey and
Greece. See E.J. Dionne, Jr., “Inevitably, the Politics of Terror,” Washington Post, May
25, 2003, available at <https://www.washingtonpost.com/archive/opinions/2003/05/25/
inevitably-the-politics-of-terror/c4fdf19a-8d88-4109-9c2f-06602221928f/>.
87
As cited in Gilbert, Nuremberg Diary, 278.
88
See David H. Ucko, “‘The People Are Revolting’: An Anatomy of Authoritarian
Counterinsurgency,” Journal of Strategic Studies 39, no. 1 (January 2, 2016), 40–41.
89
Both Soviet (now Russian) and Chinese doctrine go to extensive lengths to delimit
target sets within populations. For the former, a recent addition to the literature is Mark
Galeotti, Russian Political War: Moving Beyond the Hybrid (London: Routledge, 2019). For
the latter, see Marks, Counterrevolution in China.
90
Sergìj Mikolajovič Plohìj, The Gates of Europe: A History of Ukraine (New York:
Basic Books, 2017), 351.
91
Arthur F. Lykke, Jr., “Defining Military Strategy,” Military Review 69, no. 5 (May
1989), 3.
92
Jeffrey W. Meiser, “Ends + Ways + Means = (Bad) Strategy,” Parameters 46, no. 4
(2016), 83.
89
Ucko and Marks
93
This section draws on Ucko and Marks, “Violence in Context.”
94
Paul B. Rich, “People’s War Antithesis: Che Guevara and the Mythology of
Focismo,” Small Wars & Insurgencies 28, no. 3 (May 4, 2017), 451–487, available at
<https://doi.org/10.1080/09592318.2017.1307616>; Walter Laqueur, Guerrilla Warfare: A
Historical and Critical Study (London: Transaction Publishers, 1998), 330–331.
95
George F. Kennan, “The Inauguration of Organized Political Warfare [Redacted
Version],” April 30, 1948, 1, History and Public Policy Program Digital Archive, obtained
and contributed by A. Ross Johnson. Cited in his book Radio Free Europe and Radio
Liberty: [The CIA Years and Beyond (Woodrow Wilson Center Press with Stanford
University Press, 2010)], Ch1n4. NARA release courtesy of Douglas Selvage. Redacted
final draft of a memorandum dated May 4, 1948, and published with additional redactions
as document 269, “FRUS, Emergence of the Intelligence Establishment,” available at
<https://digitalarchive.wilsoncenter.org/document/114320>.
96
A crucial distinction between these terms of provided in Frank G. Hoffman,
“Examining Complex Forms of Conflict: Gray Zone and Hybrid Challenges,” PRISM 7,
no. 4 (2018), available at <http://cco.ndu.edu/News/Article/1680696/examining-complex-
forms-of-conflict-gray-zone-and-hybrid-challenges/>.
97
Frank G. Hoffman, “The Missing Element in Crafting National Strategy: A Theory
of Success,” Joint Force Quarterly 97 (2nd Quarter 2020).
98
JP 5-0, Joint Planning (Washington, DC: The Joint Staff, 2017), IV-28, available at
<http://www.dtic.mil/doctrine/new_pubs/jp5_0_20171606.pdf>.
99
Field Manual 3-0, Operations (Washington DC: Headquarters Department of the
Army, 2001).
100
JP 5-0, IV-29.
101
Ucko and Marks, “Violence in Context.” For the academic precedents of these
five questions, see Marks, “Counterinsurgency in the Age of Globalism”; Marks, Maoist
People’s War in Post-Vietnam Asia.
102
Frequently represented as decision points in conventional treatment, what are
here conceptualized as campaigns are more accurately represented, using the vernacular
of political economy, as struggles, the preeminent early theorist of which was Max Weber,
father of sociology, but also in the economic world, Karl Marx, hence the influence on
Soviet and Chinese communist (and later Vietnamese) theorists.
103
Claudio Ramos da Cruz and David H. Ucko, “Beyond the Unidades de Polícia
Pacificadora : Countering Comando Vermelho’s Criminal Insurgency,” Small Wars &
Insurgencies 29, no. 1 (January 2, 2018), 38–67; Enrique Desmond Arias and Corinne
Davis Rodrigues, “The Myth of Personal Security: Criminal Gangs, Dispute Resolution,
and Identity in Rio de Janeiro’s Favelas,” Latin American Politics & Society 48, no. 4 (2006),
53–81; James Freeman, “Raising the Flag over Rio de Janeiro’s Favelas: Citizenship and
Social Control in the Olympic City,” Journal of Latin American Geography 13, no. 1 (2014),
90
Crafting Strategy for Irregular Warfare
7–38; “Slum Lords—Comando Vermelho’s Hold on Brazil’s Favelas,” IHS Jane’s, August 31,
2011.
104
For an assessment of Russian hashtag activism in Ukraine, see Oleksandr
Nadelnyuk, “How Russian ‘Troll Factory’ Tried to Effect on Ukraine’s Agenda: Analysis of
755 000 Tweets,” VoxUkraine, n.d., available at <https://voxukraine.org/longreads/twitter-
database/index-en.html>.
105
For a fuller discussion of this trend, see Ucko, The Insurgent’s Dilemma.
106
As cited in Antulio J. Echevarria II, Clausewitz and Contemporary War (New York:
Oxford University Press, 2007), 182.
107
Ibid., 182. Also, possibly the most detailed treatment of the concept as concerns
irregular conflict, see Carlos Ospina, La Estrategia En Colombia: Variaciones Del Centro de
Gravedad (Washington, DC: William J. Perry Center for Hemispheric Studies, April 2014).
108
This quest for analytical parsimony echoes Clausewitz’s own take on the center
of gravity. He exhorts strategists to “trace the full weight of the enemy’s power to as
few centers of gravity as possible and, when feasible, to one; and . . . to act with utmost
concentration.” Of course, Clausewitz also speaks of striking the center of gravity as few
times and as swiftly as possible, which does not necessarily apply to the protracted nature
of irregular warfare. See Echevarria, Clausewitz and Contemporary War, 170–199.
109
Cord Schmelzle, Evaluating Governance: Effectiveness and Legitimacy in Areas of
Limited Statehood (Rochester, NY: Social Science Research Network, January 16, 2012), 7,
available at <https://papers.ssrn.com/abstract=1986017>.
110
Stathis N. Kalyvas, The Logic of Violence in Civil War (New York: Cambridge
University Press, 2006), 111–145.
111
Idayat Hassan, “The Danger of a Better-Behaved Boko Haram,” The New
Humanitarian, August 21, 2018, available at <http://www.thenewhumanitarian.org/
opinion/2018/08/21/opinion-nigeria-militancy-peace-boko-haram>. See also Edward
Stoddard, “Revolutionary Warfare? Assessing the Character of Competing Factions within
the Boko Haram Insurgency,” African Security 12, no. 3–4 (October 2, 2019), 300–329,
available at <https://doi.org/10.1080/19392206.2019.1668632>.
112
Gareth Evans, “Russia and the ‘Responsibility to Protect,’” Los Angeles Times,
August 31, 2008, available at <www.latimes.com/la-oe-evans31-2008aug31-story.html>.
113
Corneliu Bjola and Krysianna Papadakis, “Digital Propaganda, Counterpublics
and the Disruption of the Public Sphere: The Finnish Approach to Building Digital
Resilience,” Cambridge Review of International Affairs 33, no. 5 (September 2, 2020),
638–666, available at <https://doi.org/10.1080/09557571.2019.1704221>; “Study:
Estonians Have Higher Trust in Government than Latvians, Lithuanians,” ERR, December
29, 2020, available at <https://news.err.ee/1221847/study-estonians-have-higher-trust-
in-government-than-latvians-lithuanians>; Kalev Stoicescu, “The Evolution of Russian
91
Ucko and Marks
92
Crafting Strategy for Irregular Warfare
126
For discussion, see Weston R. Sager, “Apple Pie Propaganda: The Smith-Mundt Act
Before and After the Repeal of the Domestic Dissemination Ban Notes and Comments,”
Northwestern University Law Review 109, no. 2 (2014–2015), 511–546; Allen W. Palmer
and Edward L. Carter, “The Smith-Mundt Act’s Ban on Domestic Propaganda: An
Analysis of the Cold War Statute Limiting Access to Public Diplomacy,” Communication
Law and Policy 11, no. 1 (January 2006), 1–34, available at <https://doi.org/10.1207/
s15326926clp1101_1>.
127
Frank Kitson, Bunch of Five (London: Faber and Faber, Ltd., 1977), 289.
128
For one critical view, see Michael German, “Squaring the Error,” symposium
address at Law vs. War: Competing Approaches to Fighting Terrorism, U.S. Army War
College, Carlisle Barracks, PA, 2005.
129
Not least because the 2001 U.S. Authorization for the Use of Military Force
states that “the President is authorized to use all necessary and appropriate force against
those nations, organizations, or persons he determines planned, authorized, committed,
or aided the terrorist attacks that occurred on September 11, 2001, or harbored such
organizations and persons, in order to prevent any future acts of international terrorism.”
See U.S. Congress, “Authorization for the Use of Military Force,” S.J. Res. 23 § (2001).
130
Robert P. Barnidge, Jr., “The Principle of Proportionality Under International
Humanitarian Law and Operation Cast Lead,” in New Battlefields, Old Laws: Critical
Debates on Asymmetric Warfare, ed. William C. Banks (New York: Columbia University
Press, 2011), 181. It should be acknowledged that just as legality can be necessary but
insufficient for legitimacy, legitimacy can also be achieved without clear legality. An
example is the case of the 1999 North Atlantic Treaty Organization (NATO) intervention
in Kosovo, which proceeded without a United Nations Security Council resolution or
other legal basis but was perceived by most, but not all, as justified and, overall, just. See
Nicholas J. Wheeler, “Reflections on the Legality and Legitimacy of NATO’s Intervention
in Kosovo,” The International Journal of Human Rights 4, no. 3–4 (September 2000),
144–163, available at <https://doi.org/10.1080/13642980008406897>.
131
C. von der Groeben, “The Conflict in Colombia and the Relationship Between
Humanitarian Law and Human Rights Law in Practice: Analysis of the New Operational
Law of the Colombian Armed Forces,” Journal of Conflict and Security Law 16, no. 1
(March 1, 2011), 141–164, available at <https://doi.org/10.1093/jcsl/krr004>. As von der
Groeben further explains, the status of an operation would be determined on a case-by-
case basis by a Grupo Asesor and an Asesor Juridico Operacional, based on the military
balance and the organizational capacity of the adversary (based on intelligence). The
norms would be set up to inform several types of actions at once rather than one by one,
and ex post investigations helped ensure dedication to the principle at hand.
132
Caroline Vakil, “Lithuanian Parliament Calls Russia ‘a State Supporting and
Carrying out Terrorism,’” The Hill, May 10, 2022, available at <https://thehill.com/policy/
93
Ucko and Marks
international/3483345-lithuanian-parliament-calls-russia-a-state-supporting-and-
carrying-out-terrorism/>.
133
See Vera Zimmerman, “What Does Ukraine’s New Military Approach Toward the
Donbas Mean?” Atlantic Council, May 15, 2018, available at <https://www.atlanticcouncil.
org/blogs/ukrainealert/what-does-ukraine-s-new-military-approach-toward-the-donbas-
mean/>; “Special Procedure for Announcing the Start of the Operation of the Joint Forces
in the Donetsk and Luhansk Regions,” Ministry of Defence of Ukraine, April 28, 2018,
available at <http://www.mil.gov.ua/news/2018/04/28/osoblivij-poryadok-shho-bude-
diyati-z-ogoloshennyam-pochatku-provedennya-operaczii-obednanih-sil-na-teritorii-
doneczkoi-ta-luganskoi-oblastej/>.
134
“FITS Resources,” Australian Government, Attorney-General’s Department,
accessed June 14, 2022, available at <https://www.ag.gov.au/integrity/foreign-influence-
transparency-scheme/fits-resources>; “National Security Legislation Amendment
(Espionage and Foreign Interference) Act 2018,” Pub. L. No. 67 (2018), available at
<https://www.legislation.gov.au/Details/C2018C00506>.
135
See the various legislative efforts related to the Strategic Competition Act, the
Countering China Propaganda Act, and the Countering China Economic Coercion Act.
136
The U.S. invasions and counterinsurgency operation in Iraq and Afghanistan
were both based on fatally flawed assumptions. See T.X. Hammes, William S. McCallister,
and John M. Collins, “Afghanistan: Connecting Assumptions and Strategy,” U.S. Naval
Institute Proceedings 135, no. 11 (November 2009), 16–20; John M. Collins, “You Can’t
Assume Nothin’,” U.S. Naval Institute Proceedings, May 2003, available at <https://www.
usni.org/magazines/proceedings/2003/may/you-cant-assume-nothin>.
137
James A. Dewar et al., Assumption-Based Planning: A Planning Tool for Very
Uncertain Times (Santa Monica, CA: RAND, 1993), 9, available at <https://www.rand.org/
pubs/monograph_reports/MR114.html>. Emphasis in original.
138
For this distinction, see Dewar et al., Assumption-Based Planning, 6–7.
139
David A. Graham, “Rumsfeld’s Knowns and Unknowns: The Intellectual History
of a Quip,” The Atlantic, March 27, 2014, available at <www.theatlantic.com/politics/
archive/2014/03/rumsfelds-knowns-and-unknowns-the-intellectual-history-of-a-
quip/359719/>.
140
For a key resource for this step, see U.S. Army Training and Doctrine Command,
The Red Team Handbook: The Army’s Guide to Making Better Decisions, Version 9.0 (Fort
Leavenworth, KS: University of Foreign Military and Cultural Studies, 2008).
141
The same can be stated about counterinsurgency and its focus on addressing
root causes. As Marks and Bell argue, “Counterinsurgency, contrary to much misguided
talk now, is not intended as the solution to the political breakdown which produced the
challenge to the old-order by the insurgents’ intended new-order. Neither is it merely
the restoration of the status quo. Rather, counterinsurgency is armed reform that meets
94
Crafting Strategy for Irregular Warfare
armed challenge to restore a political process that is given a second chance to reshape
the political opportunity structure so that violence is neither necessary nor embraced by
opposition to see grievances mediated. It restores the sickly body, in other words; it does
not provide it with immunity.” Thomas A. Marks and Michael S. Bell, “The U.S. Army
in the Iraq War: Volume 1 (Invasion, Insurgency, Civil War 2003–2006),” Small Wars &
Insurgencies 30, no. 3 (April 16, 2019), 704, available at <https://doi.org/10.1080/09592318
.2019.1601873>.
142
J. McDougall et al., NESET II: Teaching Media Literacy in Europe; Evidence
of Effective School Practices in Primary and Secondary Education (Luxembourg:
Publications Office of the European Union, 2018), 49, available at <https://data.europa.
eu/doi/10.2766/613204>. The is an age-old dilemma: Hannah Arendt captured well the
firm grip of totalitarian propaganda, describing it as “foolproof against arguments based
on a reality which the movements promised to change, against a counterpropaganda
disqualified by the mere fact that it belongs to or defends a world which the shiftless
masses cannot and will not accept.” See Hannah Arendt, The Origins of Totalitarianism
(New York: Harcourt Publishers, 1973), 363.
143
As cited in Judt, Past Imperfect, 22.
144
In the case of the so-called Islamic State (IS), interviews with former members
suggest major sources of disillusionment included mistreatment of civilians, women, and
IS members, along with the lack of food. The violence was “often defined as hypocrisy
on the part of ISIS leadership.” See Anne Speckhard and Molly Ellenberg, “ISIS in Their
Own Words: Recruitment History, Motivations for Joining, Travel, Experiences in ISIS,
and Disillusionment over Time—Analysis of 220 In-Depth Interviews of ISIS Returnees,
Defectors and Prisoners,” Journal of Strategic Security 13, no. 1 (April 2020), 109–110,
available at <https://doi.org/10.5038/1944-0472.13.1.1791>.
145
Iffat Idris, Political Will and Combatting Serious Organised Crime, Serious
Organised Crime & Anti-Corruption Evidence (SOC ACE) Evidence Review Paper 1
(Birmingham, UK: University of Birmingham, May 2022); Carmen Malena, “Building
Will for Participatory Governance: An Introduction,” in From Political Won’t to Political
Will: Building Support for Participatory Governance, ed. Carmen Malena (Sterling, VA:
Kumarian Press, 2009), 3–30. See also Heather Marquette, Moving “from Political Won’t
to Political Will” for More Feasible Interventions to Tackle Serious Organised Crime and
Corruption, SOC ACE Briefing Note 1 (Birmingham, UK: University of Birmingham, May
2022).
146
Harry G. Summers, American Strategy in Vietnam: A Critical Analysis (Mineola,
NY: Dover Publications, 2012), 1, available at <http://public.eblib.com/choice/
publicfullrecord.aspx?p=1890088>.
95
Ucko and Marks
147
For an excellent discussion of these difficulties, see Ben Connable, Embracing the
Fog of War: Assessment and Metrics in Counterinsurgency (Santa Monica, CA: RAND,
2012), 79–92.
148
Hilary Synnott, Bad Days in Basra: My Turbulent Time as Britain’s Man in Southern
Iraq (London: I.B. Tauris, 2008), 211.
149
See, for example, the generally negative impact of benevolent aid projects in
Afghanistan: Paul Fishstein and Andrew Wilder, Winning Hearts and Minds? Examining
the Relationship Between Aid and Security in Afghanistan (Medford, MA: Feinstein
International Center, January 2012), 41–53, available at <http://fic.tufts.edu/assets/
WinningHearts-Final.pdf>.
150
David Kilcullen, The Accidental Guerrilla: Fighting Small Wars in the Midst of a Big
One (New York: Oxford University Press, 2011), 71. Emphasis in original.
151
See the critique of Kilcullen’s metrics in Connable, Embracing the Fog of War,
81–89.
152
Lynette M.B. Arnhart and Marvin L. King, “Are We There Yet? Implementing Best
Practices in Assessments,” Military Review, June 2018, 20–29.
153
Stanislav Andreski, Social Sciences as Sorcery (Harmondsworth, UK: Penguin,
1973), 110.
154
Michael J. Mazarr, “Rethinking Risk in Defense,” War on the Rocks, April 13, 2015,
available at <https://warontherocks.com/2015/04/rethinking-risk-in-defense/>.
155
Douglas W. Hubbard, The Failure of Risk Management: Why It’s Broken and How to
Fix It (Hoboken, NJ: Wiley, 2009).
156
Army Techniques Publication 5-19, Risk Management (Washington, DC:
Headquarters Department of the Army, September 8, 2014), 1–10.
157
Mazarr, “Rethinking Risk in Defense.”
96
Crafting Strategy for Irregular Warfare
97
Ucko and Marks
98
Crafting Strategy for
Irregular Warfare
A Framework for Analysis and Action
Second Edition
David H. Ucko and Thomas A. Marks