{"title":"Success in the Shadows, Operation Enduring Freedom-Philippines and the Global War on Terror, 2002-2015","authors":"Martijn Kitzen","doi":"10.1080/23296151.2020.1735047","DOIUrl":"https://doi.org/10.1080/23296151.2020.1735047","url":null,"abstract":"","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subordinating Intelligence: The DoD/CIA Post-Cold War Relationship","authors":"John A. Gentry","doi":"10.1080/23296151.2020.1735046","DOIUrl":"https://doi.org/10.1080/23296151.2020.1735046","url":null,"abstract":"What is the most effective relationship between the Central Intelligence Agency and the Department of Defense? Army LTC David Oakley, an assistant professor at National Defense University’s College...","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131321118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dare to Know: The Problem of Overcoming Information Asymmetry for Special Operations Forces in Military Assistance Operations","authors":"Troels Burchall Henningsen","doi":"10.1080/23296151.2019.1671097","DOIUrl":"https://doi.org/10.1080/23296151.2019.1671097","url":null,"abstract":"Research on military assistance shows that its effects depend on overcoming the information advantage of the receiving state. This paper examines when donor states are willing to overcome the information asymmetry, given the risk involved for special operations forces. The paper builds on a study of Danish military assistance in Cameroon. The findings show that preventive military assistance by special operations forces is not driven by vital national interests, which reduces the risk-taking of the donor state and its efficiency. However, being part of international networks of special operations forces and participating in multinational efforts is important for small states.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126488975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broken Windows: Special Operations and Clausewitz—Theory, Politics, and State Military Violence in the Limited Wars of the Twenty-first Century","authors":"G. Lauer","doi":"10.1080/23296151.2019.1674047","DOIUrl":"https://doi.org/10.1080/23296151.2019.1674047","url":null,"abstract":"American societal enmity following the terror attacks of September 11, 2001, drove the narrative of the Global War on Terror and its legal justification in the Authorization to Use Military Force. The commitment of regular and special operations military forces into the wars in Afghanistan and Iraq reflected this enmity that Carl von Clausewitz noted was the wellspring of war. As American enmity and these wars wind down after eighteen years, anxiety replaces enmity. Special operations become ever more the force of choice by policymakers in pursuit of objectives within the narrative to reduce societal anxiety over terror attack at home. Outside a theater of the active form of war that conforms to the model of the phenomenon of war in politics that Clausewitz defined, can Special Operations be a military task at all—or solely an actor in a world of broken windows—answering only to itself and to a political directive in response to society’s anxiety toward personal safety, crime in the form of terror, and a legal opinion.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"44 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statecraft by Stealth: Secret Intelligence and British Rule in Palestine","authors":"David P. Oakley","doi":"10.1080/23296151.2019.1667144","DOIUrl":"https://doi.org/10.1080/23296151.2019.1667144","url":null,"abstract":"","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Use of Special Operations Forces to Counter Terrorist Networks in the Megacity and Urban Environment","authors":"Jason Neuringer","doi":"10.1080/23296151.2019.1662677","DOIUrl":"https://doi.org/10.1080/23296151.2019.1662677","url":null,"abstract":"The Special Operations Community, the nation’s premier counterterrorism tool has long prided itself on being adaptable and able to meet new challenges. However, a growing theory that terror networks are moving to an urban and megacity environment means that the Special Operations Community will need to continue adapting to meet the changing dynamic of the terrorist network. While countering terror networks or urban operations are not a unique or new concept, the complexities and dynamics of the urban and megacity environment means that Special Operations Forces will need to adapt to match that of the terror network’s urban capabilities.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131053464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bytes, With, and Through: Establishment of Cyber Engagement Teams to Enable Collective Security","authors":"W. R. Smith","doi":"10.1080/23296151.2019.1658056","DOIUrl":"https://doi.org/10.1080/23296151.2019.1658056","url":null,"abstract":"Multiple documents from the White House, Congress, and from within the Department of Defense describe the imperative to work with allies and partners toward long-term advancement of the U.S. and partners’ interests. These same documents also often stress the importance of the cyberspace as a warfighting domain and a U.S. and international interest. However, there is no clear strategy or methodology today that explicitly links the building of partner capacity within the cyber domain. This paper serves as a primer for discussion on how to bridge cyber operations and partner capacity by proposing a concept of Cyber Engagement Teams (CETs). CETs would seeks to expand on current Foreign Internal Defense (FID), Security Force Assistance (SFA) or other cooperation and engagement apparatuses. Taking advantage of similar successes and lessons learned over the many decades by those units engaging in FID, SFA, and other security cooperation mechanisms, the U.S. has an opportunity establish a cadre of functional cyber experts to complement the traditional and existing engagement models. These forward deployed CETs would work with and train U.S. allies in areas of network operations, cyber security, and even offensive cyber operations while at the same time providing a viable mechanism to hold the adversary’s target networks and systems at risk. By working with indigenous forces, CETs would situate U.S. and friendly forces and capabilities in a better position to counter Anti-Access Area Denial (A2AD) threats, to hold adversary command and control (C2) networks at risk by working “by, with, and through” friendly nations, and would develop lasting relationships. CETs are a logical tool to contend with cyber adversaries through friendly engagement, collective security, and partnering.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132865245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Haunted by Chaos: China’s Grand Strategy from Mao Zedong to Xi Jinping","authors":"Kevin G. Rousseau","doi":"10.1080/23296151.2019.1585699","DOIUrl":"https://doi.org/10.1080/23296151.2019.1585699","url":null,"abstract":"","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special Operations Forces’ Role in Political Warfare","authors":"Steve Lewis","doi":"10.1080/23296151.2019.1674045","DOIUrl":"https://doi.org/10.1080/23296151.2019.1674045","url":null,"abstract":"Great-power competition is once again the primary threat to the security of the United States. This is reminiscent of the political warfare between the US and the Soviet Union during the Cold War, in which both sides sought to use political warfare to counter the other’s influence and expand their own. US embassies around the world were on the front lines of this irregular warfare struggle. Today’s modern operational environment is far more complex, with sub-state and non-governmental groups being just as influential as government organizations. US country teams with the responsibility to understand the political warfare challenges against the US lack the capacity to engage all the relevant groups. Special Operations Forces (SOF), as political warfare experts, must act as an extension of the US country teams. SOF teams using the diplomatic, information, military, and economic (DIME) model can extend a US country team’s influence far beyond the host nation’s capital. The twentieth century has many examples of small teams, with local understanding and strong local partnerships designing and implementing tactical political warfare activities which had a strategic effect. This article will examine some of these examples to demonstrate the role that modern US SOF teams can play to support US country teams.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"6 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"12 More Books Every Green Beret Should Read: An Annotated Bibliography","authors":"Jason Heeg, Harrison B. Gilliam, W. J. Dickinson","doi":"10.1080/23296151.2019.1667136","DOIUrl":"https://doi.org/10.1080/23296151.2019.1667136","url":null,"abstract":"In 2018, three Special Forces personnel published an annotated biography called “12 Books Every Green Beret Should Read”. The authors’ purpose was to provide new members of Special Forces a concise reading list that would expand their knowledge of unconventional warfare. This version focuses on the development of mid-career officers, warrant officers, and noncommissioned officers with multiple years of operational experience. Like the original work, the idea of this recent version is that mid-career green berets would read one book per month over a year-long period to better prepare themselves for planning and executing challenging UW operations.","PeriodicalId":276818,"journal":{"name":"Special Operations Journal","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117010821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}