01 2019
01 2019
01 2019
32 | A Mission of Attrition
DEPARTMENTS
16
FROM THE COMMANDANT______ 04
DOCTRINE UPDATE___________ 05
BOOK REVIEW_______________ 39
10 25
32
SUBSCRIBE
OFFICIAL DISTRIBUTION TO UNITS: Active Duty INDIVIDUALS: Personal
and Reserve special operations units can subscribe subscriptions of Special
to Special Warfare at no cost. Just email the following Warfare may be purchased
information to [email protected] through the Government
Printing office online at:
>> Unit name / section
>> Unit address
https://bookstore.gpo.gov/
products/
>> Unit phone number sku/708-078-00000-0
>> Quantity required
SUBMISSIONS
ARTICLE SUBMISSIONS: Special Warfare welcomes submissions of scholarly,
SPECIAL
independent research from members of the armed forces, security policy-makers and -
shapers, defense analysts, academic specialists and civilians from the U.S. and abroad.
Manuscripts should be 2,500 to 3,000 words in length. Include a cover letter.
Submit a complete biography with author contact information (i.e., complete mailing
address, telephone, fax, e-mail address).
WARFARE
Manuscripts should be submitted in plain text, double-spaced and in a digital file.
End notes should accompany works in lieu of embedded footnotes. Please consult The COMMANDING GENERAL & COMMANDANT
Chicago Manual of Style, 15th Edition, for endnote style.
M A J O R G E N E R A L K U R T L . S O N N TA G
Articles that require security clearance should be cleared by the author’s chain of
command prior to submission. A memo of the security clearance should be forwarded
EDITOR
with article. If the article talks about a specific theater special operations command, the
article will be forwarded to the TSOC for clearance. JANICE BURTON
PHOTO AND GRAPHIC SUBMISSIONS: Special Warfare welcomes photo ART DIRECTOR
submissions featuring Civil Affairs, Psychological Operations and/or Special Forces JENNIFER G. ANGELO
Soldiers. Ensure that all photographs are reviewed and released by the unit public
affairs officer prior to submission. PUBLIC AFFAIRS OFFICER
Special Warfare accepts only high-resolution (300 dpi or greater) digital photos; be
sure to include a caption and photographer’s credit. Do not send photos within M A J O R L O N I R . AY E R S
PowerPoint slides or Word documents.
Photos, graphics, tables and charts that accompany articles should be submitted in
separate files from the manuscript (no embedded graphics).
SUBMISSION REVIEW AND PUBLICATION: All submissions will be reviewed in a
timely manner. Due to the volume of submissions we receive, we cannot reply to every
submission. However, we do review and appreciate every submission. If your content
meets the goals and requirements, we will be in touch. There is only one editor on staff
and while in edit or layout phase of the upcoming magazine, new submissions will not
be reviewed until complete.
Please note that submitted content is not guaranteed to be published in Special
Warfare. There are several factors that determine what content is ultimately published
including time and space availability, the approved editorial outline and theme, as well
as relevance to the Special Warfare target audience and mission.
U.S. ARMY JOHN F. KENNEDY
Special Warfare reserves the right to edit all contributions. Special Warfare will
SPECIAL WARFARE CENTER AND SCHOOL
attempt to afford authors an opportunity to review the final edited version; requests for
The Special Operations Center of Excellence
changes must be received by the given deadline.
No payment or honorarium is authorized for publication of articles or photographs. MISSION The U.S. Army John F. Kennedy
Material appearing in Special Warfare is considered to be in the public domain and is Special Warfare Center and School, The Special
not protected by copyright unless it is accompanied by the author’s copyright notice. Operations Center of Excellence, assesses,
Published works may be reprinted, except where copyrighted, provided credit is given selects, trains and educates disciplined Civil
to Special Warfare and the authors. Affairs, Psychological Operations and Special
Forces warriors and leaders, and develops
FOR ADDITIONAL INFORMATION SUBMIT ARTICLES FOR doctrine and capabilities to support the full
CONTACT THE SPECIAL WARFARE CONSIDERATION TO: range of military operations — providing our
STAFF AT: E-mail: [email protected] nation with a highly educated, innovative and
adaptive force.
Commercial: (910) 432-5703 or via regular mail:
USAJFKSWCS; Attn: AOJK-PAO; VISION Forging experts in special warfare
DSN: 239-5703 Editor, Special Warfare to adapt and succeed in a complex,
E-mail: [email protected] 3004 Ardennes St, Stop A multi-dimensional world through
Fort Bragg, NC 28310 innovative training and education.
Special Warfare is an authorized, official not supersede any information presented Published works may be reprinted, except By Order of the Secretary of the Army:
quarterly publication of the United States in other official Army publications. where copyrighted, provided credit is
MARK A. MILLEY
Army John F. Kennedy Special Warfare given to Special Warfare and the authors.
Articles, photos, artwork and letters are General, United States Army
Center and School, Fort Bragg, N.C. Its Chief of Staff
invited and should be addressed to Editor, Official distribution is limited to active and
mission is to promote the professional
Special Warfare, USAJFKSWCS, 3004 Ar- reserve special operations units. Individu-
development of special operations forces
dennes St., Stop A, Fort Bragg, NC 28310. als desiring private subscriptions should
by providing a forum for the examination
Telephone: DSN 239-5703, commercial forward their requests to: Superintendent
of established doctrine and new ideas. KATHLEEN S. MILLER
(910) 432-5703, fax 432-6950 or send e- of Documents, U.S. Government Printing
Views expressed herein are those of the mail to [email protected]. Office, Washington, D.C. 20402. Special War- Administrative Assistant
to the Secretary of the Army
authors and do not necessarily reflect of- Special Warfare reserves the right to edit fare is also available on the Internet (https://
1909551
ficial Army position. This publication does all material. www.soc.mil/SWCS/SWmag/swmag.htm).
“In this war, which
was total in every
past fall. In this issue, we are looking at not only the history of the PSYOP
Operations," Major General Robert McClure. Not only did McClure build the
PSYOP Regiment, he also promoted the use of Civil Affairs and Special Forces,
and civilian leaders at that time. Even though he faced fierce resistance to the
regiments is strong and the historic ties that bind us together can be traced
KURT L. SONNTAG
MAJOR GENERAL, USA
COMMANDING GENERAL
FIGURE 01 Hierarchy of
Psychological Effects
Model. Depicts the steps of
the hierarchy of the
psychological effects model
Continuum of Psychological Effects Toward Desired Behavior Achievement applied to series toward an
objective.
FIGURE 02 Hierarchy of
FIGURE 02: HIERARCHY OF PSYCHOLOGICAL EFFECTS MODEL (MULTIPLE SERIES) Psychological Effects
Model - Multiple Series.
COMMANDER’S OBJECTIVES Depicts multiple series and
objectives that are collectively
PO(A) PO(U) PO(S) PO(P) PO(I) PO(B) a PSYOP program.
Awareness Understanding Sentiment Preference Intention Behavior
Multiple Series and Objectives
LEGEND
MISO Objective
Desired Behavior
(DB)
Target Audience
(TA)
Series
Threshold
Psychological
Objective (PO)
Supporting
Psychological
Continuum of Psychological Effects Toward Desired Behavior Achievement Objective (SPO)
Latitude of Acceptance
Behavior Change
Target Range
action(s) likely had the greater influence based on the ence. To overcome barriers of innumerable variables the
assessed degree of susceptibility of the target audience. PSYOP soldier requires doctrine that provides methods
The likely degrees of attribution when report- and practices to ensure the greatest level of accuracy and
ing measures of effectiveness can be evaluated by efficiency, distill the most salient factors, and determine
subtracting the degree of susceptibility of external TA’s most capable of achieving desired behaviors toward
influences from the degree of susceptibility of PSYOP PSYOP objective accomplishment.
influence efforts. MOE (A): Measures of Effectiveness The PSYOP Core Task TM Series does more than
(Attribution) Ie: PSYOP Influence Effort repackage previously developed doctrine. This series
• Ex: External Influences expands the base of applied behavioral and commu-
• DS: Degree of Susceptibility nicative science, provides more granular detail and
MOE(A)= Ie(DS) – Ex(DS) needed clarity, and addresses topics of development
and delivery related to the new media age of computer
The DS formulation gives a more objective means
mediated communications.
of assessing the change in relationship to both PSYOP
The PSYOP Commandant’s Office actively solicits
and external influences. Measures of PSYOP effective-
ness have been historically discussed as an all or none input from the community of interest as we continue
proposition. If assessments could not solely attribute be- to refine, expand and increase the relevance of the
havior change to PSYOP efforts then the change was not total body of materials available to our PSYOP Force.
attributed to PSYOP. Once change in the TA is assessed, Comments and questions can be addressed to the
and DS calculations are complete, it can be attributed to author at [email protected] SW
PSYOP efforts to varying degrees even if external influ-
ences had a greater effect. ABOUT THE AUTHOR
Mr. Patrick McKinney, U.S. Army MSG (Ret), holds a Master
CONCLUSION of Arts Degree in Strategic Communications and is cur-
PSYOP efforts require approaches as current and dy- rently serving as a Doctrine Developer/Analyst for the
namic as the information environment in which they are PSYOP Commandant’s Office. He served as a Senior PSYOP
employed. PSYOP Soldiers operate in an environment NCO and Planner with operational deployments in Kosovo
that is never static and as complex as the human experi- and the Middle East.
NOTES 01. PSYOP Commandant's Office. (2015). Consolidated report of proximate causes of assessment shortfalls. Fort Bragg, NC: USAJFKSWCS. 02. Fishbein, M., & Azjen, I.
(1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall, Inc. 03. Palmgreen, P. (1984). Uses and gratifications: A theoretical perspective.
In R. N. Bostrom (Ed.), Communication Yearbook (8 ed., pp. 20-55). Beverly Hills, CA: Sage. 04. Azjen, I. (2000). Theory of Reasoned Action. In Encyclopedia of Psychology (Vol. VIII).
Washington, DC; New York, NY: American Psychological Association. Retrieved April 29, 2015, from PsychBOOKS, EBSCOhost. 05. Hailikari, T., Katajavuori, N., & Lindblom-Ylanne, S.
(2008, October 15). The relevance of prior knowledge in learning and instructional design. American jouranl of pharmaceutical education, 72(5), 113. 06. Berger, C. R. (1997). Planning
strategic interaction: Attaining goals through communicative action. London: Routledge. 07. Busemeyer, J., & Jones, L. (1983). Analysis of multiplicative combination rules when
the causal variables are measured with error. Psychological Bulletin, 549-859. 08. Ibid, 01. 09. Ibid, 02. 10. Petty, R., & Cacioppo, J. (1986). Attitudes and persuasion: Central and
peripheral routes to attitude change. New York: Springer-Verlag. 11. Petty, R., & Cacioppo, J. (1986). The elaboration likelihood model of persuasion. Advances in Experimental Social
Psychology, 19, 123-205. 12. Wilson, B., & Cole, P. (1992).
Where is the monument to honor the man who "We operate 12 high powered radio stations — 6 of them are
provided the vision and the impetus for establishing U.S. stronger than WLW in Cincinnati. My Psychological Warfare
Army special warfare? Most special operations soldiers staff — radio, leaflet, signals, front line, occupation, domestic
are unfamiliar with his name. Robert Alexis McClure is propaganda personnel, exceed 700. In censorship — troop, mail,
the forgotten father of Army special warfare. and cables, civilian mail, radio, press, cables, telephone for all of
McClure was born March 4, 1897, in Mattoon, Illinois, North & West Africa, Sicily, etc., over 400 personnel & supervis-
After graduating from Kentucky Military Institute in 1915, ing 700 French. Public relations — press and correspondents —
he served with the Philippine Constabulary as a second 150 correspondents — 250 personnel — a total “command” of
lieutenant. On Aug. 9, 1917, he earned a Regular Army 1500 in an organization never contemplated in the Army."
commission and was promoted to first lieutenant. From By the end of the North African and Sicilian cam-
then, until the eve of World War II, he served in a variety paigns, McClure believed that psychological warfare had
of Infantry and service-school assignments in China and in become, for him, the “big job,” and he felt good about its
the United States. During the interwar years, McClure, like contribution: “Our propaganda did a lot to break the en-
other career officers, found promotion excruciatingly slow: emy — as their emissaries admit — now we have to turn
he served in the rank of captain for 17 years. it on the Germans,” he wrote to Marjory. But the “big job”
By 1941, however, McClure was a lieutenant colonel with was to become even bigger.
orders to London, where he was to serve as the assistant In early 1944, General Eisenhower authorized the
military attaché. In swift succession, he earned promotions establishment of the Psychological Warfare Division of the
to colonel and brigadier general, and he became the military Supreme Headquarters, Allied Expeditionary Force, or PWD/
attaché to the American Embassy in London. As an addi- SHAEF, to support the European campaign against Nazi Ger-
tional duty, he served as military attaché to nine European many. McClure, as its director, controlled and coordinated
governments in exile. In September 1942, General Dwight psychological warfare in continental Europe. For years after-
D. Eisenhower appointed McClure to his Allied Forces head- ward, he emphasized that PWD was built upon the trial-and-
quarters as Chief of Intelligence for the European theater of error experience of his ordeal in starting up and running INC
operations. During the next three months, McClure’s career in North Africa — in particular, the Psychological Warfare
took a new direction — one that would immerse McClure in Branch. In North Africa and in Europe, McClure’s definition
a new and different field for most of the rest of his life. of psychological warfare was quite concise, yet inclusive,
In December 1942, from “somewhere in Africa,” by today’s standards: “The dissemination of propaganda
McClure wrote to his wife, Marjory: “My new job — for designed to undermine the enemy’s will to resist, demoralize
which I was called by Ike — very hurriedly — is a con- his forces and sustain the morale of our supporters.”
tinual headache — I have what I call the INC Section — I In Europe, PWD made radio broadcasts from OWI
am just creating it.” In preparation for the North African transmitters and over the British Broadcasting Corporation;
landings, Eisenhower had put McClure in charge of the conducted loudspeaker broadcasts on the front lines; and
Information and Censorship Section, or INC, of the Allied conducted large-scale leaflet operations using specially des-
Forces headquarters. It was McClure’s job to consolidate ignated aircraft squadrons. PWD even provided leaflets to
several functions for which most Army officers had little be dispersed by the then-novel method of specially designed
preparation: public relations, censorship and psychologi- artillery shells. McClure had four deputies, each represent-
cal warfare. As McClure colorfully stated, the job also ing a civilian agency that contributed personnel to PWD:
carried with it a “slop over into Civil Affairs.” OWI, OSS, PWE and the British Ministry of Information. By
The INC was, indeed, an ungainly organization that the end of the war in Europe, PWD controlled the activities
included military and civilian personnel from the U.S. of more than 2,300 military and civilian personnel from
Office of War Information; the U.S. Office of Strategic two countries. As he had in the North African and Italian
Services; the British Political Warfare Executive; and the campaigns, McClure demonstrated his ability to manage
U.S. Army. McClure vividly outlined the scope of his new personnel of quite different backgrounds and tempera-
responsibilities in a September 1943 letter to Marjory: ments. It was one of his most successful leadership traits.
But even after V-E day, McClure’s job was far from fin-
PSYOP ISSUE
In June 1947, McClure sent a memo to his old boss from World War II —
now Army Chief of Staff Dwight Eisenhower — urging, “Psychological
warfare must become a part of every future war plan.”
12 Special warfare | HTTPS://WWW.SOC.MIL/SWCS/SWMAG/SWMAG.HTM
01
Robert A. McClure as a cadet at
the Kentucky Military Institute in
December 1912.
02
General Dwight D. Eisenhower
presents the Distinguished Service
Medal to Brig. Gen. McClure in
1944. The award recognized
McClure's accomplishments as
chief of psychological warfare,
Supreme Headquarters, Allied
Expeditionary Force.
hower a list of former PWD/SHAEF staff members that he started out with a staff of only five men, that number
recommended for forming a psychological-warfare reserve. eventually grew to more than 100.
McClure continued his correspondence, consultations OCPW’s mission was “to formulate and develop
and exhortations with the War Department, but it was not psychological warfare and special operations plans for
until the North Korean invasion of South Korea in June the Army in consonance with established policy and to
1950 that his efforts bore fruit. Shortly after that shock- recommend policies for and supervise the execution of
ing event, Maj. Gen. Charles Bolte, the Army Staff G3, Department of the Army programs in these fields.” Mc-
requested that McClure report to Washington for a few Clure organized his office into three divisions: Psychologi-
days to help him determine, with respect to psychological cal Warfare, Requirements and Special Operations. The
warfare, “the further organizational steps necessary to latter was particularly significant, because it formulated
meet the operational requirements of the Korean situa- plans for the creation of the Army’s first formal uncon-
tion or of a general war.” The latter contingency was key: ventional-warfare capability: Special Forces.
Even during the Far East crisis, the Army believed that Realizing that his firsthand experience was basically in
the greater threat lay in a potential invasion of Western psychological warfare and Civil Affairs, McClure told his
Europe by the Soviet Union, and it wanted to create an staff early on that he was “fighting for officers with back-
unconventional-warfare capability primarily for the con- ground and experience in special operations.” He brought
duct of guerrilla warfare in Europe in the event of a Soviet into the Special Operations Division several officers who
invasion. Bolte added, “I know of no one better qualified had World War II or Korean War experience either in guer-
to assist us in that respect.” For McClure, “a few days,” rilla warfare or in long-range-penetration units.
became the formative years of Army special warfare. Two officers who played particularly key roles in
On the basis of McClure’s recommendations, the developing the plans for the creation of Special Forces
Army first established a psychological-warfare division in were Col. Aaron Bank and Lt. Col. Russell Volckmann.
the G3, with McClure as its first chief, and then made it Bank had fought with the French Maquis as a member of
a special staff office reporting directly to the Army chief OSS. Volckmann had organized and conducted guerrilla-
of staff. Because of his association with the OSS dur- warfare operations in the Philippines during World War
ing World War II, McClure appreciated the potential of II; during the Korean War, he had planned and directed
unconventional warfare, and he lobbied for, and received, behind-the-lines operations in North Korea.
staff proponency for UW as well. On Jan. 15, 1951, the Volckmann later remembered that McClure had ap-
Army formally recognized the Office of the Chief of proached him in Walter Reed Hospital (where Volckmann
Psychological Warfare, or OCPW — the first organization had been evacuated from Korea) with a request to help
of its type in Army history. Although McClure’s new office organize the Special Operations Division. It was only
—BLACK KNIGHTS—
ingly more specialized by the day.
Rather than rehashing the woes of the
past, I would like to concentrate on some
general modifications our community
from PSYOP was no more than two Tactical PSYOP Teams. The problem
PSYOP ISSUE
with this was that maneuver and PSYOP each has a completely different
focus. Maneuver focuses on geography, while PSYOP focuses efforts against
population concerns and demographics. This left six personnel (only two
above the rank of E5) responsible for manipulating the behavior of 2.3 mil-
lion people, basically door-to-door under often intense fire. Effects were
difficult to achieve.
Recently, delayed force-design upgrade plans sought to answer this glaring
shortfall in coverage by increasing the level of support from a detachment to a
company of PSYOP for a Brigade Combat Team. Although notionally a step in
the right direction, effectively quadrupling the support level from before, it too
02
WHAT SHOULD
access to markets and information
outside of their immediate spheres. The
Internet café was a ubiquitous symbol
of connectivity in the United States,
Canada and Europe by the mid-1990s,
PSYOP
and central African nations before the
end of the decade.
Serious discussion of the changing
information environment must also
include the role of the democratiza-
tion of technology. Consumer access to
DO NEXT?
technology, in terms of both availabil-
ity and price-fueled significant changes
in the digital landscape, affording the
'everyman' an ability to be an influential
communicator. Manufacturers, com-
peting to connect the world, introduced
computers with annually declining
prices and expanding capabilities.
BY ERINN McQUAGGE, SHAWN CHENOWETH
Email supported fundamentally new
AND RUSS CHADICK pathways to share multimedia content.
Complementary tech developments in
digital cameras and scanners appeared
With the first 100 years of psychological operations officially in the history on shelves, and prices continued to de-
books, it is a suitable time to ask, “What do we do next?” Revolutionary events cline while increasing content genera-
within the past 20 years and their follow-on effects have fundamentally tion capabilities in the digital space.02
Average people could take digital
altered the information environment, giving an asymmetric advantage to photos or scan their traditionally de-
small networks (e.g. extremist organizations), and competitor states (e.g. veloped photographs. Before the end of
Russia). The pace of these alterations is blindingly fast, and larger democratic the 20th Century, people could create
their own magazine 03 or web page on a
hierarchies struggle to contest the information space while balancing home computer; at the beginning of the
legitimacy, transparency, responsiveness and volume. 21st Century, the same person could
edit movies, create computer graphic
are significant because they enabled effects, and distribute them on DVDs
REVOLUTIONARY CHANGES IN THE state and non-state actors to challenge or CDs. Not only could people com-
U.S. influence. municate across the world, they could
INFORMATION ENVIRONMENT The Internet Revolution of the also create and distribute more content
Five revolutionary changes over late 1990s connected average citi- than ever.
the past 20 years have fundamentally zens across the globe in real time — a After 9/11, Islamic terrorism
altered the information environment. phenomenon in communication.01 The expanded into the cyber realm, creat-
Understanding these changes is neces- advent of email and chat rooms are ing the third revolutionary event. The
sary to provide a prescriptive conclu- memorable products of these early expansion allowed al-Qaeda to move
sion (i.e. what should PSYOP do next?) days, connecting geographically dispa- bin Laden’s influence further and faster
because PSYOP functions within this rate peoples in an unprecedented way. through the Internet and the increase
medium. For this article, a revolution- As the capabilities expanded, global in technological consumer peripherals.
ary change is defined as an event that trade migrated to the digital space, The 2003 invasion of Iraq advanced the
upends the status quo or introduces an bringing finances into the picture. The usage of another step with insurgent
unprecedented method of information combination ushered in an ability to groups filming their attacks on digital
exchange. These revolutionary changes interact on a global scale and a com- cameras and exploiting the imagery to
51%
are replacing the close-knit terrorist
cells of the pre-9/11 era.
The rise of social media (YouTube, of the world’s poplution
Facebook, Twitter, etc.) is the fourth has an internet connection
revolutionary event. Unlike email
that moves from point to point, social 01 as of December 2018 #ITUdata
56%
decision-making through frequent use into influence
of disinformation. Russia fuels debate operations, or
amongst western populations that Maskirovka, after a
inhibits risk-adverse western leaders of Russian’s polled
hiatus following
from taking decisive actions. Russia’s said they fully
the collapse of
concerted efforts to manipulate cyber-
space and enthusiastic usage of troll
or mostly believe
Russian news. 05 communisum.
The Washington
farms to shape social media platforms Post
have produced outsized results.
WHAT SHOULD PSYOP DO NEXT?
PSYOP ISSUE
01
is a distinct need for more specialized Match competitors on the ideology who was less trained, but
skills due to technological advance- the Internet. inside the West. 15
ments and demands on the regiment The Internet is a terrain greater Conversely, competitor nation
as a whole. Internet access and social than air and land for PSYOP, yet states utilize synchronous efforts in
media are expanding in Africa and PSYOP has not ventured into it with the digital environment to frame in-
other regions that were previously persistence. Competitor states, such formation for global audiences. Com-
as Russia, along with non-state actors petitors desire a sort of ‘tactical par-
disconnected. The result is an infor-
(e.g. ISIS, al-Qaeda), are en route to ity’ in cyberspace, to counterbalance
mation landscape unlike any other
dominating cyber terrain. the overwhelming lethal superiority
media that PSYOP employs. While of the U.S. Frustratingly, this arena
Al Qaeda was an analog organiza-
the potential and capabilities are is comparatively uncontested by U.S.
tion before 9/11. Osama bin Laden’s
substantial, the technical knowledge 1996 and 1998 11 fatwas, where he PSYOP forces, with regard to counter-
required to navigate the Internet 09 declared and justified war against ing malign state actors' storylines and
and social media requires a special- the U.S., were originally published in narrative. Whether due to inexperi-
ized set of skills. Adding MTOE 10 a small London newspaper. 12 CNN's ence, apathy or misplaced concern
slots at the detachment level for a Peter Arnett was the first Western over the sensitivity of IO in the dip-
cyber operations specialist (MOS journalist to interview bin Laden lomatic space, in general, U.S. PSYOP
17C) meets that requirement with an and introduce the English-speaking forces have not implemented effective
existing pool of soldiers. world to him in 1997.13 When the U.S. strategies for countering competitor
Second is greater fusion of opera- military eliminated his safe haven in states messaging in cyberspace.
Afghanistan, the simultaneous loss To match competitors online,
tions and intelligence at the detach-
of physical space, and rise of cyber- PSYOP will need to have a long-term
ment level. Historically, detachments
space, provided a venue to continue presence. Although conventional
rely on Intelligence soldiers at the
their jihad. Al-Qaeda did not conduct means (e.g. TV, radio, leaflets) remain
battalion or company level, but effective, the Internet and social me-
cyber terrorism, but information
they often lack familiarity with the dia now dominate how many people
operations where bin Laden’s mes-
unique requirements of PSYOP and receive and pass information. Allow-
sages could be disseminated to mil-
the specific needs of the detachment. ing any competitor to propagate their
lions in chat rooms (the precursor to
Consequently, intelligence assets modern social media) that connected agenda and recruit to their cause
are often unused for operations. ideas across physical space. 14 The without opposition is foolhardy.
Assigning Intelligence soldiers to recruit who had to be found, vetted Master the Relief in Place.
detachments alleviates this problem. and transported to training camps in The majority of PSYOP missions are
Like Cyber, this is a field best left to Afghanistan was dying. In his place long-term efforts with a sizable invest-
already existing practitioners. was a loosely connected adherent to ment in time to produce results. The
transition to the incoming unit is the ity in understanding that they will to strategic-level discussions within
PSYOP ISSUE
most critical event of a deployment. not “win the war” during their de- the military. As more PSYOP soldiers
During this period, the gains of the ployment, but rather make progress become the source of discourse, the
outgoing unit (normally six months) toward long-term goals; and respect overall regiment increases its control
can either be passed to the incoming for the programs and progress made over the PSYOP narrative.
unit or lost in transition.16 A success- by the outgoing unit. Done right, the
ful transition bolsters continuity and incoming unit assumes control of
makes use of gains from the outgoing established plans and programs. Any CONCLUSION
unit’s deployment at no cost to the gains from the outgoing unit trans- Psychological Operations has
incoming. In contrast, an unsuccessful fers to the incoming unit, who then progressed a long way since its
transition wastes the gains from the continues progress before their own beginnings. As we continue to move
outgoing unit and leaves the incoming transition out of theater. forward, it is always prudent to ask,
with little understanding of their situ- Read and Write. “What should we do next?” Continual
ation and disposition. As a result, the PSYOP should reinvigorate profes- improvement, with debate involved, is
incoming unit may waste time figuring sional reading to increase comprehen- crucial to progress. Not everyone will
out and recreating the gains. sion, critical thinking and writing agree with the prescriptive conclu-
From observing transitions be- skills. The Army in general lost a lot of sions, but the larger debate of what
tween PSYOP units, two factors influ- analytical prowess due to the past 17 to improve, how and why should be
enced the success: the total time of the years of constant combat and increas- brought to the forefront. SW
transition and the attitude of the in- ing reliance on PowerPoint.17 Training
coming unit. The time of the transition for deployment, combat operations and ABOUT THE AUTHORS
should consist of regular communica- redeployment occupied a lot of previ- Erinn McQuagge is a former U.S. Army
tion between units, while the incoming ously free time.18 Combined with in- infantry and psychological operations
unit is preparing for deployment. Regu- creasing hardware capabilities to create officer stationed at Fort Bragg, NC. He
lar communication ensures that the in- and distribute PowerPoint briefs, the served in Kosovo, Iraq and Afghani-
coming unit understands the situation bullet point replaced the paragraph. stan throughout his career. Currently,
before it deploys. Once the unit deploys Distilling complex ideas into single he works as a site lead for Northrop
and begins the RIP, it can focus its time sentences makes an efficient brief, but Grumman at 3rd Psychological Opera-
on minute details required for success, on that is missing pertinent details. tions Battalion.
versus understanding a complex situ- Writing is the desired result of
ation. At a minimum, RIPs should be professional reading; regular contribu- Shawn Chenoweth is a current U.S.
two weeks, allowing the incoming unit tions to professional journals reflect Army Reserve PSYOP Company Com-
to observe and lead with a counterpart the regiment’s intellectual health. mander and a Strategic Communica-
from the outgoing. Better techniques Writing requires research, organi- tions consultant as a civilian. He has
for RIP include redeploying key lead- zation of thought and analysis of served in and out of uniform in the
ers to assist the incoming unit with evidence to produce. All of these are CENTCOM, AFRICOM and EUCOM
pre-mission training and having some vital skills that benefit PSYOP soldiers AORs on multiple deployments sup-
key leaders remain with the incoming regardless of rank or time-in-service. porting Conventional, Special Opera-
unit for one to two months in theater. Additionally, the regular rotation of tion, and Special Mission Units.
As overlap increases between units, so troops in and out of jobs limits conti- Russ Chadick is a former U.S. Army
does continuity, making a long-term nuity. Writing and publishing experi- Reserve Psychological Operations
effort achievable. ences, within the limits of security officer. He currently works as a Stra-
The second factor, the attitude of classifications, ensures one’s experi- tegic Communications consultant
the incoming unit, is abstract by com- ence can become another’s knowledge. servicing U.S. Combatant Commands.
parison to transition time. The best Finally, publishing in professional Previously he worked in the U.S.
attitude for incoming units is humil- journals makes PSYOP a contributor Energy sector.
NOTES 01. Micha Kaufman, "The Internet Revolution Is the New Industrial Revolution," Forbes Magazine, 5 Oct 2012. 02. Moore's Law, "Moore's Law or How Overall Processing
Power for Computers with Double Every Two Years," Moore's Law, http://www.mooreslaw.org. 03. “Desktop publishing” was the term where a consumer could create multi-page
documents. 04. Brian D. Bailey and Patrick J. Parker, Soviet Strategic Deception, 1st edition ed. (U.S. and Canada: Lexington Book, 1987). 05. Ladislav Bittman, The Kgb and Soviet
Disinformation: An Insider's View (Washington: Pergamon-Brassey's International Defense Publishers, 1985). 06. The Economist, "Russian Disinformation Distorts American and
European Democracy," The Economist, 22 Feb 2018. 07. PSYOP NCOs have more deployment opportunities at the detachment level, especially when arriving as a junior NCO, compared
to officers. Captains move into staff positions about 12-18 months in detachments. 08. SGM Rob Weel (8th MISG S-3 SGM) came up with the idea of an overlapping deployment model
in 2012 during the shift from nine to six month deployments, which were expected to create continuity problems in MISTs. 09. Including surface, deep, and dark web platforms. 10.
Modified Table of Organization and Equipment. 11. Usama bin Laden, 1998 Fatwa (Al Quds Al Arabi: World Islamic Front for Jihad Against Jews and Crusaders, 1998), Islamic Fatwa. 12.
"Declaration of War against the Americans Occupying the Land of the Two Holy Places," Al Quds Al Arabi (1996). 13. Interview by Peter Arnett, 1997, Video. 14. P.W. Singer and Allan
Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know 1st ed. (Oxford University Press, 2014), Non-fiction. 15. Ibid. 16. David Kilcullen, Counterinsurgency (New York:
Oxford University Press, 2010). 17. Elisabeth Bumiller, "We Have Met the Enemy and He Is Powerpoint," New York Times, 26 April 2010 2010. 18. Other issues such as skyrocketing
divorce rates, domestic issues, mental health issues, and more also contributed to the decline in professional reading and writing during this period.
THE NEXT CENTURY OF PSYOP organize state and society. And they placed the ideas
Psychological Operations and the of liberty and liberal democracy in all of its various
types in direct conflict with the totalitarian ideas
21st Century Operating Environment. 01
of fascism on the extreme right and communism on
the extreme left. Just as different forms of liberal
BY ADAM L. SILVERMAN, PhD democracy would develop, so to would different
variations of fascism and communism. These clashes
of ideas, of how states, societies, and even the global
As Psychological Operations enters its second century, the global system,
system should best be structured, would lead to
international relations, foreign affairs, the global operating environment
both World War II, a long Cold War, the Korean and
and the U.S. standing in the world are vastly different than they were in
Vietnam Wars, and a number of conflicts fought by
1918. In the post 9/11 era, the U.S. remains the sole superpower in a global
the proxies of the two post World War II superpow-
system that is in many ways a legacy of the Cold War world. Its two clos-
ers. That Psychological Operations as a military
est great power challengers are an aspirant to that status in China, and the
occupational specialty would grow up and mature in
claimant to the Soviet Union’s legacy in Russia. Neither China nor Russia
currently have the capabilities to militarily challenge the U.S. for hegemony. this war of ideas is not surprising. As fighting bad
And there are a number of non-state actor threats that, while they certainly ideas with better ones is part of the core mission of
present a nuisance to the U.S., its allies and its partners, do not actually Psychological Operations.
present an existential threat. ISIS or al-Qaeda do not now, and never had,
02
the capabilities to bring down the U.S.
Given that so many of the dangers and threats that we face in the
There is, however, one constant between 1918 and today. As World War 21st Century Operating Environment are asymmetric, irregular
I was ending, or perhaps, more accurately transforming into a series of low and unconventional attempts to leverage terrorism and offensive
intensity conflicts that would simmer until reigniting into World War II,02 cyber operations to convey information for effect, the 21st Century
the great power competition was changing. Specifically it was adding a major should be the new Psychological Operations’ century.
new complication: a clash of ideas. These ideas were about how to better U.S. ARMY PHOTO BY STAFF SGT. CHAD MENEGAY
02
This new form of great power competition for the Specifically, so that there would be restrictions on
PSYOP ISSUE
21st Century is primarily unconventional, but not taking in refugees from ISIS’s war in the Levant and
necessarily how we define unconventional warfare. to crackdown on immigration from Muslim majority
It leverages other forms of national power to achieve countries. The goal was to collapse one’s citizenry or
its strategic objectives. It is also primarily non-lethal. resident legal immigrant or refugee status into the
Or it is non-lethal in how we usually and doctrinally binary of Muslim versus non-Muslim. ISIS targeted St.
define lethal action. For instance, it was reported Michael in the attempt to demonstrate to the Mus-
that Russia’s cyber operators hacked into, and inter- lims it seeks to influence that even a welcoming place
fered with, the operations of Saudi petroleum facili- like St. Michael was not Dar al Islam — the House of
ties in March 2018.12 Russia didn’t put steel on steel, Peace, but actually Dar al Harb — the House of War.
but they achieved a physically lethal result — taking And, as a result, they had to either flee to the caliphate
down Saudi petroleum operations — by leveraging or fight. The targeting of St. Michael was also in-
expertise in the cyber domain. The Russian cyber at- tended to convey to their non-Muslim fellow citizens
tack on Saudi Arabia leveraged expertise in the Cyber that their Muslim neighbors cannot be trusted; that
Domain, just as it leveraged that same expertise in any one of them could be an ISIS sleeper agent. ISIS
pursuit of its psychological operations against the pursues this strategy for its terrorist operations in the
U.S., the EU and NATO. These operations are esti- U.S., EU and NATO member states because it doesn’t
mated to have cost Russia approximately 1 percent of have the ability to achieve its objectives directly. So
its military budget.13 it uses terrorism as a tactic in a psychological opera-
The 21st Century Operating Environment is tions strategy that uses the information conveyed by
not simply one of great power competition. We still the terrorist attacks in St. Michael, Florence, London,
face ongoing threats from non-state actors. These New York, etc., for effect against the French, the Brit-
threats are, as they have been since before 9/11, ish, Americans and other EU and NATO partners and
both asymmetric and irregular. As an example, the allies so they will provide ISIS with outcomes that it
ISIS attack on the Paris suburb of St. Michael in has no ability to achieve on its own.16
late 2015 used the irregular, low-intensity warfare
tactic of terrorism in pursuit of what is actually
a psychological operations strategy. 14 St. Michael
is known for being the suburb for immigrants in
PSYCHOLOGICAL OPERATIONS AND THE
Paris. In the 1920s and 1930s it welcomed and 21ST CENTURY OPERATING ENVIRONMENT
integrated Italian, Spanish, and Portuguese immi- Given that so many of the dangers and threats that
grants into the political, social, and economic life of we and our allies and partners face in the 21st Century
the community. It did the same thing for Algerian Operating Environment are asymmetric, irregular and
immigrants in the 1950s and 1960s. More recently unconventional attempts to leverage terrorism and
it has done it for immigrants from the Middle East, offensive cyber operations to convey information for
Central and Southeast Asia — all predominantly effect, the 21st Century should be the new Psychologi-
Muslim. St. Michael was not picked by ISIS because cal Operations century. Whether it is aspiring or fad-
it was a particularly soft target, or a softer target ing great powers, like China and Russia, or non-state
than others in/around Paris in 2015, it was picked actors like ISIS, al-Qaeda, Boko Haram, etc., using the
in an attempt to achieve specific psychological op- non-military elements of national power, weaponizing
erations effects as a result of the attack. 15 the Cyber Domain or utilizing terrorism and other
ISIS’s stated strategic goals include forcing Mus- forms of low-intensity warfare to convey information
lims to make a choice between ISIS’s understanding of for effect, part of the solution to these challenges is
Islam, which requires all Muslims to either relocate to more Psychological Operations.
the caliphate or fight against non-Muslims and apos- Psychological Operations professionals will need
tates where they reside outside the caliphate, and to to be proficient in offense, defense and maintenance
force non-Muslim majorities to turn on their Muslim operations to provide the U.S. with a robust resource
minorities. The intention of the attack was to turn the against these state and non-state threats in the 21st
other residents of St. Michael, as well as the French, Century Operating Environment. The Psychological
other Europeans and Americans against Muslims. Operations community must continue to engage in
And this strange new war we find ourselves in will not be won,
because it cannot be won, simply through hacking, planting
viruses and malware, and tightening down cyber security
protocols to make American and allied systems more secure and
resilient. It can only be won by utilizing Psychological Operations.
28 Special warfare | HTTPS://WWW.SOC.MIL/SWCS/SWMAG/SWMAG.HTM
proactive Psychological Operations, but these cannot real change. This is not to diminish the importance
simply be transplanting the existing and historical of both offensive cyber operations that do damage to
capabilities and trying to apply them to these newer Putin and his inner circle of oligarchs, intelligence and
threats. For instance, it was reported in October foreign affairs leadership, and organized crime lead-
2018 that U.S. Cyber Command was going on the of- ers — often the same people fit into more than one of
fensive against the Russian cyber operators — mili- those categories — and defensive cyber operations to
tary, civilian and contract — who have been target- harden targets thereby reducing the ability of Putin to
ing the U.S. and our EU and NATO allies.17 The report- achieve his goals. These are all exceedingly important.
ing indicated that our cyber operators have been However, the reality is that these cyber operations
sending direct messages to the Russians we seek to cannot and will not resolve the problem. What will is
check, letting them know that we know who they Letting Psychological Operators do what they do best
are. While this is an important action to take, just as will have the biggest impact. In this case, leveraging
other more offensive and defensive cyber operations the Cyber Domain to deliver information for effect to
are and will continue to be, it is simply insufficient to change the attitudes of Russians themselves so that
successfully deal with the problem. Russia’s weapon- the corrupt, kleptocratic, organized crime state they
ization of the Cyber Domain to attack the U.S. and are living in, as well as Putin’s leadership of it, become
our EU and NATO allies is not the key center of gravi- intolerable to them. This is what Putin fears. It is why
ty in this new type of 21st Century warfare. And this he has destroyed a free press. It is why he has invested
strange new war we find ourselves in will not be won, so much in his attempts to demonize the promotion of
because it cannot be won, simply through hacking, civic society and good government development with-
planting viruses and malware, and tightening down in the former Soviet states that Putin claims as his
cyber security protocols to make American and allied sphere of influence and near abroad, often centered
systems more secure and resilient. It can only be won around non-government organizations leveraged by
by utilizing Psychological Operations. U.S. Agency for International Development. 01
The key centers of gravity in this new form of war To hearken back to some of the doctrinal Soldiers participate in the
are not Russia’s computers or the Internet or social language that General Odierno liked to use when third annual AvengerCon,
media. These are the theaters of operations. Rather he was the Chief of Staff, part of Psychological a hacker-style training
the key centers of gravity are Russia’s leadership — Operations role will need to be using information event, at Fort Meade,
Maryland. Psychological
specifically Vladimir Putin; the leaders of Russia’s for effect to shape the 21st Century Operating
operators must lever-
co-mingled intelligence, organized crime and wealthy Environment to prevent conflict whenever possible,
age the Cyber Domain
oligarchs that both support his actions who are under and when that fails to leverage that shaping to win as a means to deliver
his control; and the Russian citizenry. If we want when it is necessary to fight in the and, Sea and/or information for effect to
Russia to stop what it is doing, then eroding support Air domains. While we normally, especially within change the attitudes and
for the kleptocratic organized crime state that Putin the conventional force, talk about and understand perceptions of targeted
is running under the label of managed democracy is setting the theater in terms of the physical and geo- populations. DoD PHOTO
both a necessary and a sufficient condition to seeing graphic theater; where camps, bases, and outposts, BY STEVEN STOVER
01
01
phase lines and main supply routes will be placed for ISIS to both utilize terrorist attacks as part of
and situated, we need to broaden that understand- a Psychological Operations strategy to get the U.S.,
ing for the 21st Century Operating Environment. the EU, and NATO to change their own policies,
Psychological Operations continues to have a major but also to utilize information for effect to prevent
role to play in understanding the social behav- ISIS from radicalizing parts of the Muslim minor-
ioral nuances of both potential, actual and virtual ity communities in the U.S. and our EU and NATO
theaters of operation. It must also continue to used partners into weapons.
to leverage the traditional Information Domain, as The Psychological Operations community also
01 well as the informational components of the cyber has an important defensive role to play. The nebu-
Brig. Gen. Khalil Essam domain, to actively set the socio-cultural and social lous nature of this 21st Century theater of opera-
Mohamed Elsayed, com- behavioral aspects of that theater. tion requires senior leaders in the U.S. military and
mander, Egyptian Human
This is especially important given the type of the Interagency to engage with the Psychological
Development and Be-
conflict that has emerged over the past several Operations community to develop a 21st Century
havioral Sciences Center,
listens intently as a 4th years. So much of it is not taking place on regular form of counter-Psychological Operations. As
Psychological Operations battlefields or even by adversaries utilizing what important as it is for the U.S. military to be expe-
Group Soldier explains is traditionally considered weaponry. The key ditionary, to be out in the world engaging with our
the capabilities of the battlefield of the 21st Century operating environ- allies and partners and peer competitors, it is as im-
group’s graphics section ment is the Cyber Domain and one of the two major portant to respect the Posse Comitatus Act and lim-
during a visit to Fort weapon systems is Psychological Operations. If we it U.S. military operations within the U.S. to times
Bragg, North Carolina. want Russia to stop trying to rip American, British, of genuine emergency, much of the conflict so far
Information exchange, French, German, Austrians, Greeks, Spanish and in the 21st Century Operating Environment cannot
in order to coordinate many other of our allies and partners civil societies be neatly divided into continental versus outside
training programs and apart, then they cannot just be deterred through the continental U.S. New rules of engagement and
synchronize efforts with
offensive and defensive cyber operations. These accommodations for how, when, and where Psycho-
NATO allies and other
informational threats have to be countered through logical Operations, as a weapons system to counter
partners is an important
factor that will help offensive Psychological Operations delivered these 21st Century threats, must be developed. The
shape the battlefield of through the various information systems of the members of the Psychological Operations commu-
the 21st Century operat- Cyber Domain. There is a need for offensive Psy- nity are the American subject-matter experts on
ing environment. chological Operations to deliver information that using information for affect in order to influence
U.S. ARMY PHOTO BY STAFF effects actual change to Chinese and North Korean the emotions, motives, objective reasoning, and
SGT. KISSTA DIGREGORIO behavior. This also applies to countering the ability ultimately the behavior of foreign governments,
NOTES 01. This essay is adapted from the keynote address delivered at the Psychological Operations Regiment’s 100th anniversary regimental dinner, November 3, 2018. 02.
Robert Gerwarth, The Vanquished: Why the First World War Failed to End (Farrar, Straus, and Giroux, 2017). 03. Karen Darwisha, Putin’s Kleptocracy: Who Owns Russia? (Simon and
Schuster, 2015). 04. James A. Schnell, “Attributing Strategic and Global Reach Within a Cross-Cultural Understanding of the Chinese ‘Belt and Road Initiative,’” Fudan Journal of the Hu-
manities and Social Sciences, 17 FEB 2018. 05. Adam L. Silverman, The Need to Revisit U.S. Policy in the Middle East: The Islamic State’s Doctrine and its Use of Terrorism as Psychologi-
cal Operations, Helios Global Analytical Report prepared for MG A. Ray Royalty, Headquarters Department of the Army, G34/Force Protection, December 2015. 06. The National Security
Strategy of the United States, The White House, December 2017. 07. Bernard Fall, “The Theory and Practice of Insurgency and Counterinsurgency,” Naval War College Review, Winter
1968, reprinted in Military Review, September-October 2015, https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/MilitaryReview_20151031_art009.pdf.
08. Schnell, February 17, 2018. 09. “World’s Largest Economies,” CNN Money, January 18, 2018, https://money.cnn.com/news/economy/world_economies_gdp/index.html. 10. Ivana
Kottasova, “Russian Military Spending Drops for the First Time in 10 Years,” CNN Money, May 2, 2018, https://money.cnn.com/2018/05/02/news/russia-defense-spending-plunge/index.
html. 11. David Mujamdar, “Russia’s Only Aircraft Carrier Will Get New MiG-29s,” The National Interest, August 18, 2018, https://nationalinterest.org/blog/buzz/russia%E2%80%99s-on-
ly-aircraft-carrier-will-get-new-mig-29s-28097. 12. David Sanger, “Hack of Saudi Petrochemical Plant Was Coordinated From Russian Institute,” The New York Times, October 23, 2018,
https://www.nytimes.com/2018/10/23/us/politics/russian-hackers-saudi-chemical-plant.html. 13. Luis Gomez, “Exactly How Much Russians Spent on Twitter, Facebook Ads During
Election,” The San Diego Union Tribune, September 28, 2017, http://www.sandiegouniontribune.com/opinion/the-conversation/sd-how-much-money-russians-spent-twitter-facebook-
ads-20170928-htmlstory.html. 14. Gregg Miller and Soaud Mekhennet, “Inside the World of the Islamic State’s Propaganda Machine,” The Alaska Dispatch News, November 20, 2015,
http://www.adn.com/article/20151120/inside-surreal-world-islamic-state-s-propaganda-machine. 15. Melissa K. Byrnes, “Solidarity and ‘Je Suis Paris,’” Lawyers, Guns, and Money,
November 15, 2015, http://www.lawyersgunsmoneyblog.com/2015/11/solidarity-and-je-suis-paris. 16. Silverman, December 2015. 17. Julia Barnes, “U.S. Begins First Cyberoperation
Against Russia Aimed at Protecting Elections,” The New York Times, October 23, 2018, https://www.nytimes.com/2018/10/23/us/politics/russian-hacking-usa-cyber-command.html.
18. Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms. 19. Hannah Arendt, The Origins of Totalitarianism, (Harcourt, Brace, Jovanovich, 1973).
A MISSION
president, and western Ugandan, Yoweri Museveni
and his National Resistance Army, composed pri-
marily of westerners and southerners, seized power
in 1986 he upended the status quo. The economy of
underdeveloped northern Uganda depended heavily
01
A U.S. Army Psychological Operations Soldier drops leaflets over
the Lord's Resistance Army's area of operations. The leaflets
announced amnesty would be granted to any rebel who would
lay down arms. U.S. ARMY PHOTO
02
The Lord's Resistance Army's primary areas of operation from
2002-2014 in central Africa.
02
Amnesty Act and carried them to rallies in northern Uganda. He also ac-
companied NRA military convoys into the bush to personally disseminate
the leaflets. He took other initiatives as well:
"I had a small office of information and it would also assist the army. I
encouraged them to approach the rebels in a spirit of forgiveness. I opened a
small place with some of my colleagues close to the barracks [NRA 4th Division]
to take in the defectors. We would train those boys on what amnesty was all
about. There were no NGOs in those days so we did this our own way. I would
go to the market and say, ‘how many of you have met your children in the bush?
I want to see you, one by one.’ So, I would give them this small piece of paper
called ‘Amnesty’ and told them ‘this is something very important and do not
share it with anyone you do not trust.’ They would give these leaflets to the
youth in the bush. I started talking to wives of those UPDF fighters and started
drilling them on what to say to their husbands to tactfully sensitize them. They
reported back to me and then I reported back to the government." 19
One former senior LRA commander describes the effects of amnesty
this way:
"What the Ugandan Government did was very effective. It almost coincides
with what was said in the Bible ‘feed your enemy.’ Those that left the bush and
those that remained, their minds were changed to support the government.
Those that left, they forgot the LRA with all their hearts." 20
In 1996, Lacambel approached UPDF spokesman Colonel Bantariza
and asked him for access to the government radio station. Bantariza gave
Lacambel one hour of airtime per day. Lacambel used a cassette player
to transmit pre-recorded messages designed for the LRA rebels and their
family members. “That hour was like gold. We were limited by the Min-
01
istry of Information to the time they gave us. They [local people] used to
call it Radio Lacambel. Then we asked for two hours.” The program began and the difficulties of life in displaced persons camps.
airing interviews with former rebels, as well as family members of the ab- However, after 2009, they advocated for U.S. military
ducted. Lacambel named it “Amnesty” around the time that the Amnesty intervention as the only realistic means of stopping
Statute was passed to promote awareness. He noticed that LRA defections Kony and the LRA.26 These advocacy campaigns includ-
increased in response to the program. Lacambel also interviewed UPDF ed the viral “Kony 2012” social media campaign, and
officers so that they could tell their story to the local population and the ultimately resulted in Operation Observant Compass.
rebels, confronting Kony’s propaganda directly. “So the truth came out,” The objectives of the operation were simple:
one source said.21 The UPDF also began leaving small radios in places for 1. Increase the protection of civilians.
the LRA to find so that they could tune into the programming. 2. Apprehend, or remove from the battlefield,
Lacambel’s radio program, later called Dwog Paco (‘come home’), began Joseph Kony and his senior commanders.
broadcasting messages to individual LRA fighters by name. These mes- 3. Promote the defection, disarmament, demo-
sages made use of family members or former rebel comrades to increase bilization, and reintegration of remaining
credibility and arouse a sense of nostalgia. One former LRA commander LRA fighters.
responded to these messages directly, stating: 4. Increase humanitarian access and provide
"These [messages] shook the foundation of the LRA and these commanders continued relief to affected communities.27
started to wonder if they should come out. The minds of many people, even the
The advantage of these objectives was that they
troops, started to change. We started hearing of many escapes. Those that came
could be validated; they were clearly measurable
before me were calling my name. I called and did the same thing when I came out
and attainable through quantifiable means, not as
[in 2004] and called Sam Kolo22 and told him, he was a brigadier at the time, and
qualitative abstractions. Their progress was tracked
he came out. That is the thing, the friend calls you and you believe him."23
throughout the life of the mission, especially on
By the middle of 2004, more than 5,000 former LRA fighters had de-
promoting defections and removing senior leaders
fected and applied for amnesty.24 The Ugandans’ three-pronged approach
from the battlefield, and demonstrable results en-
to the insurgency was yielding results: political appeals and reconstruc-
couraged continued support from AFRICOM, even
tion for northern Uganda, amnesty for rebels willing to surrender, and
though the ultimate objective of removing Kony
“military pressure” to pursue the rebels and deny them safe haven.25
from the battlefield was never realized.
SOCAFRICA established a joint special operations
task force (later called SOCFWD-CA) in Entebbe,
U.S. INTERVENTION Uganda to command and control the operation that
International awareness of the situation in northern Uganda built slowly stretched from Uganda, through the eastern Demo-
in the 1990s and early 2000s and increased greatly after the advent of advo- cratic Republic of Congo, into the Central African
cacy campaigns launched by NGOs such as Resolve Uganda (later called the Republic, and across South Sudan. SFODAs served as
Resolve), the Enough Project, and Invisible Children in 2007. These groups ini- advisors to African Union Regional Task Force part-
tially focused on the suffering of northern Ugandans as a result of the conflict ners at locations throughout the area, approximately
02
A community bulletin board promotes acceptance of defectors in Nabanga, South Sudan. U.S. ARMY PHOTO
02
the size of California. The Regional PSYOP Teams became the mission’s primary measure of success. The role of PSYOP (also
deployed to the mission designed products, advised called MISO) in the operation grew more involved as time went on. As suc-
partner forces, liaised with IGOs and NGOs, planned cesses mounted, the Ugandan and U.S. field commanders grew more confi-
operations and augmented the ODAs. dent in employing PSYOP against the LRA in innovative ways. This led them,
U.S. forces routinely had problems understand- the U.S. Embassy - Kampala, and even the partner NGOs to develop a steady
ing the environment in central Africa in contrast to stream of activities based on an understanding of the indigenous popula-
more familiar, recent operational settings such as tions. These activities can be synthesized into five general lines of effort:
Iraq or Afghanistan. The densely-forested terrain, 1. Broad messaging to LRA fighters to promote defection.
biological threats, distances between resupply points, 2. Broad messaging to surrounding civilian populations to promote
obscure languages and cultures and lack of a common the peaceful acceptance of LRA defectors.
information infrastructure (such as cellular phone 3. Tailored messaging to promote internal divisions within the LRA.
towers) challenged the tried-and-true model of find, 4. Targeted messaging to promote the defection or surrender of spe-
fix, and finish. The LRA did not routinely use conven- cific members of the LRA.
tional communications systems such as cell phones
5. The development of improved dissemination channels and methods
or satellite phones. When they did, they used them
appropriate for the target audiences and the operational environment.
sparingly and observed strict discipline to avoid detec-
tion of their radio signals; their communications were The first line of effort was already being conducted through several
conducted in short bursts of coded language within media, but required reinforcement. The UPDF had conducted operations to
promote defection as early as 1988 to reduce the strength of Kony’s forces
prescribed windows defined by cryptic SOPs. The
and weaken the morale of those fighters who remained. These efforts were
rainforest also provided two or three canopies of cover
largely supported by regional FM radio stations which still broadcasted
that made aerial surveillance difficult. Inhabitants of
testimonials by former abductees and fighters, as well as appeals by fam-
the region were sparse and those who lived there often
ily members of those who were still assumed to be fighting for the LRA.
spoke languages unknown to the SOF linguists. To
In 2012, the same original radio stations, Mega FM and UBC, were still
reach these villages after LRA attacks took as long as
involved in broadcasting defection messages, but the broadcasts were made
nine hours based on the distances and aircraft avail-
over shortwave frequencies so that they could be received by LRA members
able. Finding the LRA was difficult. Fixing them was
hundreds of miles from Uganda. To refine these efforts, the RPT worked
unlikely. Finishing them appeared nigh impossible.
with the most recent defectors to develop radio messages and interviews
with their voices used as proof of life to detractors still within the LRA.
The team developed print products from these same defectors using their
THE INDIGENOUS APPROACH names and recent photographs on small, laminated leaflets and disseminat-
Once killing or capturing Joseph Kony proved ed them by air over known LRA trails. Whenever a new defector reported
a more difficult task than initially expected, OOC’s to the AU-RTF or UN, the team repeated this process to demonstrate that
objective of promoting defections of LRA combatants the defector had reached safety and that the opportunity remained for oth-
ers to follow. The teams even went so far as to disseminate pictures of the Several of the partner NGOs were involved in
PSYOP ISSUE
defectors feasting or enjoying simple treats they could not get in the bush, sensitization efforts, to try to help the communi-
such as traditional foods and soda. The LRA by this time was such a small ties to understand the value of receiving defectors.
organization that any Ugandan LRA member was well-known to the others, This was especially true of Invisible Children, which
and news of a successful defection spread rapidly.28 sought to convey that by receiving defectors, villages
This effort wasn’t only conducted by the U.S. military, but also by the would encourage further defections, which would
UN Stabilization Mission in the Democratic Republic of Congo, and Invisible weaken the LRA and reduce its ability to fight and
Children. Both organizations conducted independent leaflet drops from their sustain itself through pillaging. The coalition of mili-
own aircraft and made efforts to synchronize their targeting and messages tary forces and NGOs called the villages that joined
with USSOF. The RPT and Invisible Children, in particular, shared photo- this initiative “safe reporting sites” or SRS, and they
graphs of defectors and concepts for messages, to include the leaflets them- were usually co-located with AU-RTF contingents
selves, with Invisible Children often providing assistance with graphic design or the COFCs. The RPT advertised the location of
and translation. Throughout the course of OOC, the U.S. disseminated more these SRS through leaflets, radio and loudspeaker
than one million leaflets.29 One U.S. veteran of the operation described this messages broadcast from helicopters. The AU-RTF
as a “massive littering campaign,” but qualified that statement further: provided security details to prevent the SRS from be-
"The goal wasn’t just to litter, it was to send a signal to the LRA. Where the ing attacked in reprisals. Invisible Children provided
leaflets dropped, and we started using crossing points, watering holes, tradi- a network of high-frequency radio transmitters to
tional rat lines, etcetera, either the foraging [LRA] group commanders had to the SRS villages and neighboring settlements to both
avoid the area or risk their troops learning of the [defection] program… and if provide early warning of attacks and to alert the
they avoided the traditional places, their soldiers knew something [was differ- community when LRA defectors arrived.
ent] just by that avoidance. [LRA] commanders had to decide whether to inform Once defectors arrived at the SRS, the local
Kony and company [that] there were flyers [leaflets] in the area and risk him volunteers (civilian villagers) would contact AU-RTF
having them killed for exposure to those things. [LRA] commanders had to de- and U.S. Special Operations security forces, who
cide what to tell their people, and even when they didn’t tell their people [about would debrief them. NGOs would provide medi-
the leaflets], info leaked… and [LRA] commanders had to decide for themselves cal aid and counseling, as well as help to locate the
com/2017/06/28/800-million-later-joseph-kony-is-still-a-threat/ 02.
and access. In the parts of central Africa where the LRA operated, Michael M. Phillips, “U.S. to Rebels: Listen to Mom – Commandos Wage
there is very little in the way of civilian technological infrastructure Psychological Battle to Draw Last of Joseph Kony’s Troops out of African
and most villages in the area did not even have cellular phone service. Bush,” Wall Street Journal, March 11, 2017; Patrick Tucker, “How US
The RPT identified which media the LRA were most susceptible to, Special Operators Helped Take Down Joseph Kony’s Army with Tailored
and found through interviews with former LRA members that radio Messages, Defense One, October 17, 2017: https://www.defenseone.com/
remained a highly effective medium. However, Kony feared his rank- technology/2017/10/how-4-green-berets-took-down-joseph-konys-
army-tailored-messages/141851/ ; USAFRICOM posture statements
and-file troops hearing radio messages, and only allowed his officers
2014-2017. 03. Much of this research was conducted as part of the
to listen to radio programs.39 Despite LRA leaders’ overall wariness author’s master’s thesis at Naval Postgraduate School with Major
of messages from the Ugandan government, they would still listen to Benon Hatangimana of the Uganda People’s Defense Force. It includes
the radio for information about the outside world and for the occa- interviews with veterans of the conflict from both sides, interviews with
sional bit of music once they had camped for the night or before they other witnesses and experts on the LRA, and the author’s own experi-
began moving early in the morning. Many of them still listened to ence as a participant in the campaign. The identity of the majority of
Lacambel’s program, Dwog Paco, despite Kony’s prohibitions.40 these interviewees, with few exceptions, remains confidential by mutual
agreement. 04. Fredrick Odoi-Tanga, “Politics, Ethnicity, and Conflict in
With this in mind, the RPT sought to improve broadcast radio
Post-Independence Acholiland, Uganda 1962–2006,” Ph.D. Dissertation
network coverage to reach LRA-occupied areas and increase access to (Pretoria: University of Pretoria, 2010), 11. 05. Caroline Lamwaka, The
shortwave frequencies that could penetrate the entire continent of Raging Storm :A Reporter’s Inside Account of the Northern Uganda War
Africa. Thanks to the assistance of U.S. Embassy - Kampala, Voice of 1986-2005, Kampala, Uganda: Fountain Publishers, 2016: 50-51. 06.
America granted access to the programming editors for its Africa divi- Ruddy Doom and Koen Vlassenroot, “Kony’s Message: A New Koine? The
sion. The RPT then began providing VOA with scripts that conveyed Lord’s Resistance Army in Northern Uganda.” African Affairs 98 (1999):
messages meant for Kony, the LRA and surrounding populations in the 9, 13. 07. Doom and Vlassenroot, 15. 08. Author Interview with John
Baptist “Lacambel” Oryema, Gulu, Uganda, July 13, 2017. 09. Doom and
DRC, CAR, and South Sudan. VOA broadcasted these messages over its
Vlassenroot, 23. 10. Lamwaka, 104. 11. Author Interview with a former
four shortwave frequencies in English, French, Arabic and Swahili. LRA commander, Gulu, Uganda, July 11, 2017. 12. Author Interview with
The SOCFWD also built new FM radio stations in the Central Afri- an UPDF Officer, Gulu, Uganda, July 10, 2017. 13. Author interview with a
can Republic to extend the range of clear, FM radio signals that could former LRA commander, Gulu, Uganda, July 11, 2017. 14. Phuong Pham,
reach the LRA. These stations were established in remote villages and Patrick Vinck, and Eric Stover, “The Lord’s Resistance Army and Forced
all of the materials were flown in by air for assembly. Local operators Conscription in Northern Uganda,” Human Rights Quarterly 30 (2008):
in these villages were identified and trained by NGO partners on how 404. 15. Author Interview with the Uganda Amnesty Commission, Gulu,
Uganda, July 12, 2017. 16. Ibid. 17. Sverker Finstrom. Living with Bad
to run a solar-powered radio station, including developing content in
Surroundings. Durham: Duke University Press, 2008: 225. 18. Author
the recording studio and how to manage and implement the defec- Interview with an UPDF Officer, Gulu, Uganda, July 10, 2017. 19. Author
tion messaging effectively on the stations’ computerized scheduling Interview with Lacambel. Lacambel also served as a mediator in the talks
systems. Existing FM radio stations in CAR, previously established between the UPDA and the NRA according to Lamwaka, 146. 20. Author
by NGOs, were repaired or enhanced. The UN managed two radio sta- interview with a former LRA commander, Gulu, Uganda, July 11, 2017. 21.
tions in the DRC, supported by the NGO the Voice Project. The Voice Author Interview with an UPDF Officer, Pader, Uganda, July 11, 2017. 22.
Project provided FM stations with programming content and training Sam Kolo was formerly the LRA’s spokesman. 23. Author interview with
a former LRA commander, Gulu, Uganda, July 11, 2017. 24. Janine Clark,
for the stations’ operators.41 The RPT coordinated directly with these “The ICC, Uganda, and the LRA: Re-Framing the Debate,” African Studies,
NGOs, and with MONUSCO, in the effort to synchronize program- 2010: 145. 25. Author Interviews with an UPDF Officer, Gulu, Uganda, July
ming and share supporting programming content across the AO. 10, 2017. 26. Jonathan Fisher, “Framing Kony: Uganda’s War, Obama’s
Advisers, and the Nature of ‘Influence’ in Western Foreign Policy Making,”
Third World Quarterly, 2014: 692–3. 27. White House Office of the Press
Secretary, “Fact Sheet: Mitigating and Eliminating the Threat to Civilians
CONCLUSION Posed by the Lord’s Resistance Army, April 23, 2012. 28. David Ocitti,
The effectiveness of U.S. PSYOP efforts in OOC were due to interview with group of former LRA combatants, Gulu, Uganda, transcript
deliberate, and dedicated efforts to understand the operational provided by correspondence, October 11, 2017. 29. Author Interview
environment and apply influence through an indigenous approach. with AFRICOM Staff, Stuttgart, Germany, October 19, 2017. 30. Author
The techniques employed by the RPTs were not necessarily new to the Interview with USSOF Operator, Monterey, CA, September 12, 2017. 31.
conflict, but many had been forgotten by the operational UPDF of the David Ocitti, Interview with Group of Former LRA, Gulu, Uganda, Provided
by Correspondence, October 11, 2017. 32. Initial defections provided
day or were out of their reach. By reincorporating and amplifying the
what psychologists call “social proof” that encouraged later defections.
kinds of appeals that the Ugandans had effectively employed in the 33. For more information see Scott Ross, “Encouraging Rebel Demobiliza-
previous 20 years of the conflict, U.S. Army Special Operations Forces, tion by Radio in Uganda and the DR Congo: the Case of ’Come Home’
assisted by local partners and a dedicated group of civilian volunteers, Messaging,” African Studies Review, 2016:38. 34. Author Interview
improved the overall effectiveness of the combined counter-LRA ef- with a Former LRA Commander, Gulu, Uganda, July 11, 2017. 35. See
fort and effectively neutralized Kony’s forces. SW Voice of America, “Aiding Those Who Defect from the LRA,” September
3, 2013: https://editorials.voa.gov/a/aiding-those-who-defect-from-
the-lra/1742782.html. 36. A signaler in the LRA is the equivalent of a
ABOUT THE AUTHOR radio-telephone operator (RTO) communications specialist in the U.S.
Maj. Jonathan Easter deployed in support of Operation Observant Army. 37. Author Interview with USSOF Operator, Fort Bragg, NC, June 14,
Compass in 2013. In 2017, he traveled to Uganda to conduct research for 2017. 38. David Ocitti, Interview with former LRA members, transcript
his master's thesis on the lessons learned from the combined Ugandan/ provided by personal correspondence, October 11, 2017. 39. Ledio
U.S. campaign against the LRA, published later that year by Naval Cakaj, When the Walking Defeats You: One Man’s Journey as Joseph
Kony’s Bodyguard, London: Zed Books, 2016: 355. 40. Ibid. 41. Author
Postgraduate School. MAJ Easter is currently the commander of A/7th
interview with Staff of the Voice Project, September 15, 2017.
POB (A), 4th POG (A), 1st SFC (A) at Fort Bragg, North Carolina.
This publication is approved for public release; distribution is unlimited • Headquarters, Department of the Army • PB 80-19-2
U.S. ARMY PHOTO BY SGT. 1ST CLASS JACOB BRAMAN | PIN: 107222-000