77
 J  S  O  U R  e  p  o r  t  1  0 - 1 H  u n  t   e r - K i  l  l   e r T  e  a m  s  : A  t   t   a  c k i  n  g  E n  e m  y  S  a f   e H  a v  e n  s  C  e l   e  s k i  Hunter-Killer Teams: Attacking Enemy Safe Havens  Joseph D. Celeski  JSOU Report 10-1  January 2010

Hunter-Killer Teams- Attacking Enemy Safe Havens

Embed Size (px)

Citation preview

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 1/76

 J  S  O U R  e p or  t  1  0 -1 

H un t   er -K i  l  l   er T  e am s  : A  t   t   a c k i  n g E n e

m y  S  af   eH av  en s 

 C  el   e s k i  

Hunter-Killer Teams:

Attacking Enemy Safe Havens

 Joseph D. Celeski

 JSOU Report 10-1 January 2010

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 2/76

Report Documentation PageForm Approved 

OMB No. 0704-0188

Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and

maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,

including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington

VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing t o comply with a collection of information if it

does not display a currently valid OMB control number. 

1. REPORT DATE 

JAN 2010 2. REPORT TYPE

 

3. DATES COVERED 

00-00-2010 to 00-00-2010

4. TITLE AND SUBTITLE 

Hunter-Killer Teams: Attacking Enemy Safe Havens 

5a. CONTRACT NUMBER 

5b. GRANT NUMBER 

5c. PROGRAM ELEMENT NUMBER 

6. AUTHOR(S)  5d. PROJECT NUMBER 

5e. TASK NUMBER 

5f. WORK UNIT NUMBER 

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 

Joint Special Operations University,357 Tully Street,Alison

building,Hurlburt Field,Fl,32544 

8. PERFORMING ORGANIZATION

REPORT NUMBER 

9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES)  10. SPONSOR/MONITOR’S ACRONYM(S) 

11. SPONSOR/MONITOR’S REPORT

NUMBER(S) 

12. DISTRIBUTION/AVAILABILITY STATEMENT 

Approved for public release; distribution unlimited 

13. SUPPLEMENTARY NOTES 

14. ABSTRACT 

15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF:  17. LIMITATION OF

ABSTRACT 

Same as

Report (SAR) 

18. NUMBER

OF PAGES 

82 

19a. NAME OF

RESPONSIBLE PERSON a. REPORT 

unclassified 

b. ABSTRACT 

unclassified 

c. THIS PAGE 

unclassified 

Standard Form 298 (Rev. 8-98) 

Prescribed by ANSI Std Z39-18

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 3/76

Joint Special Operations Universityand the Strategic Studies Department

Te Joint Special Operations University (JSOU) provides its publications

to contribute toward expanding the body o knowledge about joint special

operations. JSOU publications advance the insights and recommendations

o national security proessionals and the Special Operations Forces (SOF)

students and leaders or consideration by the SOF community and deense

leadership.

JSOU is the educational component o the United States Special Opera-

tions Command (USSOCOM), MacDill Air Force Base, Florida. Te JSOU

mission is to educate SOF executive, senior, and intermediate leaders and

selected other national and international security decision makers, both

military and civilian, through teaching, outreach, and research in the

science and art o joint special operations. JSOU provides education to the

men and women o SOF and to those who enable the SOF mission in a joint

and interagency environment.

JSOU conducts research through its Strategic Studies Department where

eort centers upon the USSOCOM and United States SOF missions:

USSOCOM mission.

USSOCOM provides ully capable and enabledSOF to deend the nation’s interests in an environment characterized by 

irregular warare.

USSOF mission. USSOF conducts special operations to prepare the oper-

ational environment, prevent crisis, a nd respond with speed, aggression,

and lethality to achieve tactical through strategic eect.

Te Strategic Studies Department also provides teaching and curriculum

support to Proessional Military Education institutions—the sta colleges

and war colleges. It advances SOF strategic inuence by its interaction in

academic, interagency, and United States military communities.

Te JSOU portal is https://jsoupublic.socom.mil.

 Joint Special Operations University 

Brian A. Maher, Ed.D., SES, President  Kenneth H. Poole, YC-3, Strategic Studies Department Director  

William W. Mendel, Colonel, U.S. Army, Ret.; Jerey W. Nelson, Colonel, U.S. Army, Ret.;and William S. Wildrick, Captain, U.S. Navy, Ret. —Resident Senior Fellows

Editorial Advisory Board

Alvaro de Souza PinheiroMajor General, Brazilian Army, Ret. JSOU Associate Fellow

James F. Powers, Jr.Colonel, U.S. Army, Ret.Director o Homeland Security,

Commonwealth o Pennsylvania and  JSOU Associate Fellow

Richard H. Shultz, Jr.Ph.D., Political Science Director, International SecurityStudies Program, Te Fletcher School, usUniversity and JSOU Senior Fellow

Stephen SloanPh.D., Comparative PoliticsUniversity o Central Floridaand JSOU Senior Fellow

Robert G. Spulak, Jr.Ph.D., Physics/Nuclear EngineeringSandia National Laboratoriesand JSOU Associate Fellow

Joseph S. StringhamBrigadier General, U.S. Army, Ret. Alutiiq, LLC and JSOU Associate Fellow

Graham H. urbiville, Jr.Ph.D., History, Courage Services, Inc.and JSOU Associate Fellow

Jessica Glicken urnley Ph.D., Cultural Anthropology/Southeast Asian StudiesGalisteo Consulting Groupand JSOU Senior Fellow

Rich YargerPh.D., History, Ministerial Reorm Advisor;U.S. Army Peacekeeping and StabilityOperations Institute and JSOU AssociateFellow

John B. AlexanderPh.D., Education, Te Apollinaire Groupand JSOU Senior Fellow

Roby C. Barrett, Ph.D., MiddleEastern & South Asian History Public Policy Center   Middle East Instituteand JSOU Senior Fellow

Joseph D. CeleskiColonel, U.S. Army, Ret. JSOU Senior Fellow

Chuck CunninghamLieutenant General, U.S. Air Force, Ret.Proessor o Strategy, Joint Advanced Warghting School and JSOU Senior Fellow

Gilbert E. DoanMajor, U.S. Army, Ret., JSOU Institutional Integration Division Chie 

Brian H. GreenshieldsColonel, U.S. Air Force, Ret.Senior Lecturer, DoD Analysis, Naval Postgraduate School 

Tomas H. HenriksenPh.D., History, Hoover InstitutionStanord University and JSOU Senior Fellow

Russell D. HowardBrigadier General, U.S. Army, Ret.  Adjunct Faculty, Deense Critical Language/ Culture Program, Manseld Center, Universityo Montana and JSOU Senior Fellow

John D. JogerstColonel, U.S. Air Force, Ret.18th USAF Special Operations School Commandant 

James KirasPh.D., History, School o Advanced Air and Space Studies, Air University and JSOU  Associate Fellow

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 4/76

On the cover

ypical American rontiersmen garb worn by independent compa-

nies o Rangers when conducting hunter-killer operations.

Te gure shown here, on display at the Kings Mountain National

Military Park museum in South Carolina, has a homespun cotton

shirt, a large-brimmed hat to keep the rain and sun o, ringed

overcoat and leggings. Rangers also wore Indian-style leggings andwore and carried spare moccasins. Rangers were equipped with

knives, hatchets or tomahawks, and either intlock-red muskets

or ries using lead ball and black powder. Powder was kept dry 

in a powder horn. A haversack was used to carry ood and orage

items.

All photographs are by Joseph D. Celeski.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 5/76

 JSOU Report 10-1

he JSOU Press

Hurlburt Field, Florida200

Hunter-Killer Teams: Attacking Enemy 

Safe Havens

 Joseph D. Celeski

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 6/76

Comments about this publication are invited and should be orwarded to Director,

Strategic Studies Department, Joint Special Operations University, 357 ully Street,

Alison Building, Hurlburt Field, Florida 32544. Copies o this publication may be

obtained by calling JSOU at 850-884-1569; FAX 850-884-3917.

*******

Te JSOU Strategic Studies Department is currently accepting written works relevant

to special operations or potential publication. For more inormation please contact

Mr. Jim Anderson, JSOU Director o Research, at 850-884-1569, DSN 579-1569,

 [email protected]. Tank you or your interest in the JSOU Press.

*******

Tis work was cleared or public release; distribution is unlimited.

 

ISBN ---

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 7/76

Te views expressed in this publication are entirely those o the author

and do not necessarily reect the views, policy or position o the United

States Government, Department o Deense, United States Special

Operations Command, or the Joint Special Operations University.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 8/76

Recent Publications of the JSOU Press

Intelligence in Denied Areas, December , Russell D. Howard

Is Leaving the Middle East a Viable Option, January ,Tomas H. Henriksen

Retaining a Precarious Value as Special Operations Go Mainstream,February , Jessica Glicken urnley 

Disrupting Threat Finances, April , Wesley J.L. Anderson

USSOCOM Research Topics 2009

India’s Northeast: The Frontier in Ferment, September , Prakash Singh

What Really Happened in Northern Ireland’s Counterinsurgency,October , Tomas H. Henriksen

Guerrilla Counterintelligence: Insurgent Approaches to Neutralizing

Adversary Intelligence Operations, January , Graham H. urbiville, Jr.

Policing and Law Enforcement in COIN — the Thick Blue Line,February , Joseph D. Celeski

Contemporary Security Challenges: Irregular Warfare and Indirect

Approaches, February , Richard D. Newton, ravis L. Homiak,

Kelly H. Smith, Isaac J. Peltier, and D. Jonathan WhiteSpecial Operations Forces Interagency Counterterrorism Reference

Manual, March

The Arabian Gulf and Security Policy: The Past as Present, the

Present as Future, April , Roby C. Barrett

Africa: Irregular Warfare on the Dark Continent, May ,John B. Alexander

USSOCOM Research Topics 2010Report of Proceedings, 4th Annual Sovereign Challenge Conference

(16-19 March 2009)

Information Warfare: Assuring Digital Intelligence Collection,July , William G. Perry 

Educating Special Forces Junior Leaders for a Complex Security Environ-

ment, July , Russell D. Howard

Manhunting: Counter-Network Operations for Irregular Warfare,September , George A. Craword

Irregular Warfare: Brazil’s Fight Against Criminal Urban Guerrillas,September , Alvaro de Souza Pinheiro

Pakistan’s Security Paradox: Countering and Fomenting Insurgencies,December , Haider A.H. Mullick 

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 9/76

vii

Contents

Foreword ................................................................................ix

About the Author ....................................................................xi

1. Introduction ........................................................................ 1

2. Background, Denition and Doctrine ................................... 7

3. Safe Havens .......................................................................19

4. The American Historical Experiencein Hunter-Killer Operations .................................................25

5. Principles of Hunter-Killer Team Employmentduring Counter Safe Haven Operations ...............................51

6. Conclusion ........................................................................57

Appendix. Recommended Readings ....................................... 63

Endnotes ................................................................................67

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 10/76

ix

Foreword

The concept o hunter-killer operations deep within enemy territory 

evokes a sense o excitement and adventure, especially or those

o us amiliar with the exploits o Robert Rogers’ Rangers o the

18th century or the operations o Special Forces and Rangers in Aghani-

stan today. In this monograph, Colonel Joseph D. Celeski (U.S. Army, Ret.),

argues that hunter-killer teams be routinely established as part o our

standing Special Operations Forces (SOF). He states that guidelines or their

employment should be included in counterinsurgency (COIN) doctrine, andCeleski urther advises that the use o such orces should be a routine part o 

the overall COIN eort. Te idea is to aggressively pursue the enemy within

his own sanctuaries, disrupt his operations and sustainment, and neutralize

or destroy the adversary beore he can threaten a riendly host government

or project extremist operations onto the world stage.

Celeski’s operational concept or hunter-killer operations bolsters the

command vision o U.S. Special Operations Command, which seeks todevelop a orce capable o “distributed operations, within an environment

characterized by irregular warare and asymmetric challenges.” 1 Te hunter-

killer organization, with its strike units and teams, would be reinorced with

indigenous orces, much as we saw during the Vietnam War and the early 

phases o the Aghanistan war. Tis kind o orce could contribute toward

achieving the U.S. SOF mission to act with “… speed, aggression, and lethal-

ity to achieve tactical through strategic eect.” 2 

oday U.S. national security is threatened by violent extremist groupsoperating rom sanctuaries in hard to reach areas o Aghanistan, Pakistan,

Yemen, Somalia, and similar areas in the Pacic Rim and Latin America. It

seems probable that there will be a marked increase in our need to disrupt

and destroy enemy orces in multiple sanctuaries around the globe as we

proceed to march through the 21st century. Celeski’s paper provides a vision

o the uture SOF wherein hunter-killer teams could have a signicant role

to play in nding, disrupting, and destroying the enemy.

Kenneth H. Poole

Director, JSOU Strategic Studies Department

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 11/76

xi

About the Author

M r. Joe Celeski is a senior

ellow with the JSOU 

Strategic Studies Depart-

ment. His current research ocuses

on irregular warare/unconventional

warare (IW/UW) with a specialty on

counterinsurgency (COIN), terrorism,

political warare, urban warare, jointSOF warighting, and senior leader

competencies. Retired rom active duty 

with the U.S. Army as a Special Forces

colonel, he served in a variety o United

States Special Operations Command

(USSOCOM) and sta positions or over

20 years o his 30-year Army career. Prior to retirement, he commanded the3rd Special Forces Group (Airborne) at Fort Bragg, North Carolina (May 

2002 to June 2004) and commanded coalition and joint SOF or two tours

in Aghanistan in support o Operation Enduring Freedom. He was a ully 

qualied joint specialty ocer. Additionally, he is a Middle East area expert,

trained in the Arabic language, and has served throughout the Middle East

and the Horn o Arica regions. In his capacity as the chie o sta and deputy 

commander or the U.S. Special Forces Command at Fort Bragg, Colonel

Celeski was the project ocer or orce modernization initiatives, develop-ment o the command’s Program Operating Memorandum input, and the

UW transormation initiatives. He was awarded the St. Philip Neri Bronze

Award rom the Special Forces community in 2002 or his career work.

Mr. Celeski is a graduate o the Deense Language Institute (Modern

Standard Arabic), the U.S. Army Command and Sta College, the U.S. Air

Force Command and Sta College, the Marine Amphibious Warare Course,

the Army Force Management School, and the U.S. Army War College. He

has a B.S. in Political Science rom Columbus College in Georgia, a Master

o Public Administration (MPA) rom Shippensburg University in Penn-

sylvania, and a Master o National Security Issues rom the U.S. Army War

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 12/76

xii

College in Carlisle, Pennsylvania. He will begin work toward his Ph.D. in

History rom the University o Georgia in the spring o 2010.

Mr. Celeski has published works on the Somalia conict and on the useo Special Forces in Joint Urban Operations in UW in the U.S. Army John

F. Kennedy Special Warare Center and School journal, Special Warare. He

has submitted his rst draf o “Special Forces History in Somalia Conict,

1992-1995” or inclusion into Army SOF in Somalia 1992-1995, a scal year

2010 proposed publication sponsored by the U.S. Army Special Operations

Command historian. In addition, Mr. Celeski has been a keynote speaker

at a variety o orums, including the Assistant Secretary o Deense or

Special Operations and Low Intensity Conict (ASD SO/LIC) sympo-sium, the Association o United States Army (AUSA), Royal Canadian

War College, the Naval War College, and the Joint Forces Sta College on

matters o leadership, urban operations, and UW. He has also lectured in

a variety o international orums to include the Polish National Deense

University regional SOF symposium, the Special Operations Command

Korea (SOCKOR) United Nations SOF symposium in Seoul, and in a variety 

o JSOU-sponsored joint mobile education teams (JMEs) or combatingterrorism conducted in Chile, Jordan, and Croatia. His prior JSOU Press

publications are Operationalizing COIN in the 21st Century (September 2005)

and Policing and Law Enorcement in COIN —the Tick Blue Line (February 

2009).

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 13/76

1

Hunter-Killer Teams:

Attacking Enemy Safe Havens

Introduction1.

Regular forces, indeed the most elite of highly professional regular

forces, Special Operations Forces (SOF), can wage war in an irregu-

lar, unconventional way. In fact, the history of warfare shows quite

clearly that if regulars are to prosper in campaigns against irregu-

lars, they are obliged to adopt at least some of the characteristics,

including the modus operandi, of the irregular enemy.3

— Colin S. Gray, Another Bloody Century: Future Warfare

During September 2008, public reporting in American and Paki-

stani press told o U.S. commandos purported conduct o large-

scale raids into the Pakistani border tribal region—presumably 

authorized by the President o the United States—with unrestricted rules

o engagement not requiring U.S. regional command approval or acquies-

cence o the Pakistani government. Te intent o the raids, as reported, wasto penetrate into the previously inaccessible sae haven enjoyed by aliban

militants and Al Qaeda terrorists to destroy and disrupt their training bases

and to kill or capture their key leaders. U.S. military leaders and Aghan

President Karzai praised the action—that is, the solution to a long-standing

sae haven problem and to weak eorts heretoore on behal o the Pakistani

security orces. Unortunately, raids o this nature are o short duration and

not designed or persistent presence. Although they can be highly disruptive

to the enemy, they also can contribute to the adoption o a whack-a-moletactic to deny sae havens. Eventually, the enemy will adjust to this tactic

and make it harder or uture raids to achieve success. Te best counter sae

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 14/76

2

 JSOU Report 10-1

haven line o operation involves a series o measures to achieve relentless

pressure; the line o eort has presence and persistence as attributes.

Te most challenging strategic and operational dilemma currently acingthe U.S. military in both Operations Enduring Freedom and in the Horn

o Arica region stems rom the enemy’s ease o withdrawal to inaccessible

areas, where he can operate rom established sae havens and create opera-

tional bases to reorm, ret, recruit, and relaunch attacks against coalition

orces. Adoption o counter sae haven measures should include the employ-

ment o hunter-killer teams as one o the options to challenge insurgent

perception o saety and invulnerability aorded by the inaccessibility sanc-

tuary oers them. When guerrillas or insurgents are challenged in theirown space, they are orced into a tempo o the riendly orces’ making and

ofen must abandon their base areas in order to survive. In addition, the

ear o U.S. hunter-killer teams persistently operating in and amongst one’s

perceived sae space provides its own psychological eect against one’s will

to continue the ght.

In any counterinsurgency (COIN) security line o operation, counterguer-

rilla activities are required as an oensive maneuver to throw o insurgentattempts to occupy space and create alternate governance. Among the rst

steps in any government response to an insurgency is holding and clear-

ing insurgent activities in the most vulnerable spots; this activity generally 

requires the government to spread their resources in static holding posi-

tions, thus negating their reedom o maneuver to take on the insurgents

head-to-head. Simultaneously, it is at precisely the same time the govern-

ment is attempting to expand its security orces—military, paramilitary, and

police—to overmatch the insurgents and achieve a avorable ratio o orcesto reach a tipping point o security or its population. Conversely, insurgent

movements use this window o opportunity to tie down government orces,

thereby allowing time to build up their own armed action orces or build

orces or a move to the nal, conventional oensive that would overwhelm

the government response. Tus at the operational and strategic levels it

becomes a race between the contestants—where the side that can prevent the

growth o a measurable combat response on the part o their enemy, while

maintaining legitimacy and the will to ght, may ultimately win.

Te government response is ofen multidimensional—or example, hold-

ing and securing vulnerable portions o the country, maintaining legitimacy,

and solving grievances while simultaneously taking the oensive to the

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 15/76

3

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

guerrillas. In taking the ght to the enemy, COIN practitioners adopt coun-

terguerrilla operations (a security line o operation). Tis means taking the

ght to the guerrillas, wherever they may be ound, by raising the contactrate between government orces and the insurgents. Against the insurgent

political arm, counterorganization measures are conducted to eliminate

enemy leadership and political organization. Tis includes manhunting

techniques. At the tactical level, aggressive patrolling operations to search

out guerrillas still orm one o the best means or conventional orces.

Combined with raids, the enemy is kept o balance and denied the oppor-

tunity to choose the time and place o his engagements, spoiling his oppor-

tunities to protract or prolong the ght. Counterguerrilla patrols, however,may not reach into inaccessible areas where insurgents seek to build their

bases and establish sae havens. Although conventional maneuver orces

(normally at company and battalion level) can conduct operations deep into

enemy-occupied territory, these oen have a sweeping eect and conclude

aer a short duration.

Insurgents enjoy the most reedom o maneuver in their sae havens

(bases), along their lines o communication, and in strategic rear areas, rela-tively unhindered by the day-to-day activities o counterguerrilla operations.

It is within that shroud o security the guerrillas take the opportunity to

recruit, train, ret, and grow their orces, including developing the structure

or the establishment o a main orce army. Unhindered by government

security orces intererence, complacency about security and deense on

the part o the insurgent will begin

to set in, providing the opportunity 

or specialized COIN orces to oper-ate. An outstanding reerence on

this aspect o irregular warare is the

2007 publication edited by Michael

Innes, Denial o Sanctuary: Understanding errorist Sae Haven. One proven

method o disrupting insurgents or terrorists enjoying sae haven has been

the employment o hunter-killer teams.

Te purpose o this monograph is to examine the characteristics and

attributes o sae havens, explore options or counter sae haven measures,

and then ocus the analysis on the historical and contemporary U.S. mili-

tary employment o one o those measures—hunter-killer team opera-

tions. Te monograph explores previous doctrinal attempts to describe the

One proven method of disrupting 

insurgents or terrorists enjoying safe haven has been the employ-

ment of hunter-killer teams.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 16/76

4

 JSOU Report 10-1

employment o U.S. military units conducting counter sae haven measures

to derive a proposed denition or COIN hunter-killer operations. It also

examines the American historical use o predominantly specialized, lightinantry employed as counterguerrillas with the mission to penetrate and

operate deep into enemy sae havens.

Te overarching lessons gleaned rom the American military employ-

ment o hunter-killer operations will orm the basis or principles required

or doctrinal employment o hunter-killer operations in COIN and other

irregular warare scenarios. Te research o the monograph concludes with

a proposed recommendation on the specic orming and use o hunter-killer

organizations as a viable measure or counter sae haven activities in any conict with irregular warare adversaries or doctrinal inclusion in uture

revisions o COIN or irregular warare literature. Additionally, the mono-

graph provides recommendations or the establishment o ormal hunter-

killer organizations, at least within the USSOCOM component capability,

under the operational art o unconventional warare (UW).

I seen as viable, the hunter-killer concept deserves inclusion into uture

revisions o irregular warare doctrine. Currently, doctrine is lacking on thespecic proscription o counter sae haven measures that can be conducted

by specialized orces in hunter-killer congurations (procedures on the

attack and harassment against adversary morale, their sustainment system

[war-making capabilities], and their source o strength and support—a

witting populace). Tese activities are important to the COIN orce because

they can contribute to the exhaustion and erosion o insurgent orces while

they are in their sae havens.

Te research thesis is to answer the question: Is the employment o hunter-killer operations, as a counter sae haven measure in COIN, a sound

doctrinal concept or the U.S. military? Te research did not explore oreign

concepts unless they were useul to the development o U.S. doctrine, nor

the concept o hunter-killer operations used by conventional orces against

conventional orce adversaries, although they may be unorthodox (such as

operations to detect German U-boats in World War II). Tis monograph

also does not include the common usage o technological hunter-killer oper-

ations—the so-called sensor-to-shooter concept (such as observer aircraf

hunting or enemy tanks, then directing the eorts o the killer)—in order

to ocus uniquely on COIN counter sae haven requirements.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 17/76

5

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Logic abounds in the annals o warare on the military dictum to take

the ght to the enemy. Irregular warare is no dierent. Its deensive compo-

nent—the use o irregulars as auxiliary—is used to augment the maneuvero conventional orce or provide economy-o-orce options. Its oensive

component resembles a variety o tools in a toolkit or irregular warare

employment: counterguerrilla operations, counterorganization operations,

counter sae haven operations, pseudo-operations, manhunting, and the

most eared by irregular warare adversaries, the employment o hunter-

killer teams.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 18/76

7

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Background, Defnition and Doctrine2.

In the guerrilla areas, the governing authorities should commencewhat we shall call a territorial offence. As in the cases of territorial

defence and consolidation, territorial offence will require assign-

ment of small military detachments to a large number of specic

zones. Although these detachments should establish local opera-

tional bases, they should not be garrisoned in posts. Rather, they

should continuously ‘nomad’, using ‘whirlwind’ (tourbillon) type

tactics—as the French describe them.4

  — John J. McCuen, The Art of Counter-Revolutionary War 

To be considered as military doctrine a warghting concept should

be accepted by military proessionals as an agreed upon means o 

practical and common usage o employing military resources. Te

concept should generally solve a dilemma posed by the nature o war—

or example, oense to deeat a deense, amphibious operations to gainlodgment in enemy territory, and interdiction to deny the enemy lines o 

communication. Finally, the intended action should be grounded in some

theoretical aspect o war that has stood the test o time (a belie).

An objective o this monograph is to explore why hunter-killer operations

against enemy sae havens have had little doctrinal capture, particularly as

the Department o Deense (DoD) shifs its military art in recognition o 

the Irregular Warare Joint Operating Concept. As a ramework or this

discussion and afer conducting the research, the ollowing denition isproposed:

Hunter-killer operations are prolonged operations conducted in

irregular warare by a unique and specically organized orce, in

conjunction with an indigenous orce, against irregular warare

adversaries by operating behind the lines or in hostile, sae haven, or

semipermissive environments, employing unorthodox tactics, or the

sole purpose o achieving attrition and punitive actions predominantly against the personnel, leadership, and resources o the enemy.

Tis denition has as its base a UW solution to an unconventional prob-

lem. Te unconventional problem is the lack o access into insurgent sae

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 19/76

8

 JSOU Report 10-1

havens due to political actors, military limitations, and/or geography (and

could also include seasonal weather).

Insurgency theorists (most notably Robert aber, War o the Flea) discussthe requirement on the part o the insurgent to juxtaposition one’s time,

space, and will—elements o strategic art—against the competing actions

o the government. For space, insurgents draw strength rom having bases

and sae areas to operate rom, essential to the building and development

o an action arm, a political process (alternate governance), and the ability 

to hide rom security orces, thus contributing to the protraction o the

conict (and to ensure survival).

Protraction o conict has its roots in war o exhaustion and war o erosion theories, made amous by the writings o Mao. ime can be on the

side o the irregular warare adversary i used with other strategic initiatives.

Te body o conict theory is also clear that war is a clash o wills; at the

military level, using orce successully against the enemy’s orce becomes

one o the paths to achieve strategic objectives.

In most COIN theory, no one course o action chosen rom elemental

truths about the conduct o this type o irregular warare will guaranteesuccess; rather, the COIN leader becomes a virtuoso o applying contextually 

agreed upon COIN measures, hopeully with the right mix and balance, to

achieve the political ends o the struggle. In the aggregate, these measures

historically (and doctrinally) include not only political and psychosocial

activities but also some orm o the oen mentioned clear, hold, build and

 nd, x, destroy. o clear and hold in COIN requires a static orce (the

deensive). o nd and x, then destroy requires an active orce, basically 

consisting o oensive components, which include counterguerrilla orcesand other specialized orces whose purpose is to help improve the contact

rate and raise the attrition level o the insurgent to buy time or other popu-

lace security and political solutions to work.

Insurgents ofen enjoy the ability to operate at “the time and place o 

their choosing”; when they do, COIN orces now know where they are and

their capabilities. In these cases, casualty rates tend to avor the conven-

tional, government orces. Te larger challenge, i counterinsurgents are to

deeat or neutralize the action arm and to destroy the insurgent’s base o 

support (bases and sae havens), is to take oensive actions to thwart insur-

gent moves to operate between the seams o a country’s vital inrastructure

and its population centers, while enjoying the ability to retreat to saety.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 20/76

9

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Properly conducted, the military line o operation in a COIN eort

becomes the blend o antimeasures, countermeasures, and oensive

measures. Tere is a range o measures available to the counterinsurgent;however, most o these measures remain at the tactic, technique, and proce-

dural level o handbooks rather than incorporated into our doctrinal knowl-

edge o irregular warare. able 1 shows a range o operations consistently 

agreed upon and utilized during irregular warare—a belie o how COIN 

orces approach attacking insurgent time, space, and will while simultane-

ously providing orce-on-orce options to attrit the enemy.

Table 1. Irregular Adversary Essential Strengths

Strength Friendly Forces Counter  

Time (protractedness) Counterguerrilla operationsCOIN/FID/IDAD/UW *CounterterrorismOperation tempo

Space (e.g., sanctuary, bases) Countersanctuary (raid, interdiction)Community policingComputer network attack

Border interdictionHunter-killer operations

Will (ideology, endurance) CountermotivationCounterinfluence operationsCounterrecruitmentPSYOPsPropagandaCombat attrition

Legitimacy (alternate governance) Political warfareUnconventional operations

Counterorganization (manhunting)Countermobilization

Criminal business enterprise (support) Policing and law enforcementCounternarcoticsCounterfinancing

* FID Foreign Internal Defense

IDAD Internal Defense and Development

Insurgency theory posits the strategic balance o time, space, and will

arrayed against government strengths as a means to achieve a political

 victory, all based on theories o war to exhaust or erode populace support

or the government. In the modern context, legitimate and criminal busi-

ness enterprise (or external support mechanisms that may replace lack o 

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 21/76

10

 JSOU Report 10-1

external state sponsorship) are also critical to the viability o any insurgency.

Friendly military options are a mix o anti, counter and oensive measures

to spoil these ve strengths. Tese can be used to keep the enemy o balancewhile the political and civil measures o an eective IDAD plan take time

to work.

Tis discussion rests on the oensive components o COIN and to some

extent broader applications in other irregular warare scenarios. Hunter-

killer operations are one o the options used by COIN orces to go on the

oensive against insurgents, particularly as a counter sae haven measure.

Because there are a variety o options that can be conused with pure hunter-

killer concepts, a brie discussion o their characteristics will distinguishthem rom the COIN hunter-killer term—a useul point or doctrinal distinc-

tion. Each option discussed below embodies a particular eect; hunter-killer

operations dier in that most o these eects can be combined to achieve a

synergy aimed toward one objective—cumulative activities over time that

contribute to the erosion or exhaustion o the insurgent:

Raida. is a tactical action conducted behind enemy lines (or in enemy-

controlled areas) by conventional inantry or elite or “shock” inantry with a specic purpose in mind. (Tese elite units are ofen considered

commandos.) Te raid may have tactical, operational, or strategic

 value. Raids generally do not achieve coup-de-main status. Raids are

intended to be short duration missions whereby the raiding orce

immediately withdraws aer the operation back to its own riendly 

lines; the survival o the raiding orce is ofen predicated on this

extraction beore enemy orces respond. Raiders can hold groundmomentarily, but ofen require a linking-up action by larger conven-

tional orces i the ground, or objective, is to be secured or riendly 

orces. Larger, deep-penetration raids by conventional orces can also

be conducted as punitive operations.

Interdictionb. targets enemy lines o communication and support struc-

ture in order to deny war-making capability. Interdiction operations

include various targeting methodologies, combined with detailed

intelligence and conrming reconnaissance, to increase measures o success. Interdiction can be perormed with direct action, airpower,

or with stando capabilities. Sabotage o war materials is one o the

unconventional measures to conduct interdiction.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 22/76

11

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Manhunting c. is the specic targeting o leadership and key personnel

within an enemy organization. It is a counterorganization technique.

In military parlance, manhunting is characterized by all the activitiesto conduct high value target (HV) operations against individuals to

decapitate an organization. Manhunting techniques ofen resemble law

enorcement measures used to bring a criminal to justice. Manhunt-

ing is human-intelligence (HUMIN) intensive.

Counterorganizationd. is the means used to deeat the insurgent politi-

cal arm and its organizations. In insurgency, the enemy may attempt

to establish alternate governance with their political arm, rst as a

competing option to the populace’s loyalty, then as a mechanismto assume the trappings o state and secure power once victory is

achieved. In these cases, political and ront organizations are created

to counteract the legitimate symbols o state, at all levels. Te insurgent

political arm is also a necessary means to mobilize the populace. Insur-

gent politics may ultimately require the ability to handle diplomacy 

at the international level. Counterorganization measures consist o 

actions to identiy, penetrate, and neutralize insurgent political orga-nizations. Subversion, apprehension, or neutralization o members o 

the enemy’s political arm, combined with a counterideology campaign,

are just some o the activities taken by a government threatened by 

shadow governments. Many o the successul counterorganization

campaigns adopted the combination o military, intelligence, and

policing in joint task-orce organizations to achieve unied action

on this ront. Counterorganization should not be conused with

countermobilization (denying the orm o alternate governance) andcounterguerrilla actions (securing the populace and isolating them

rom the insurgents).

Pseudo-operationse. are most ofen paramilitary police operations

conducted to gain intelligence on the enemy. Pseudo-organizations

adopt the appearance o the guerrilla in order to gain access to the

enemy’s operational area. While combat may occur, this is not the

intended purpose o the operation. Te best pseudo-operations are

those that incorporate turned insurgents.

Te useulness o hunter-killer operations is they could achieve many o 

these results within the objective o denying the enemy space and destroying

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 23/76

12

 JSOU Report 10-1

his will through erosion and exhaustion. Hunter-killer operational utility 

derives rom employing an eective economy-o-orce option, achieving

persistence by operating in the same space and conditions o the enemy,while achieving a military and psychological impact out o proportion to

its size (operational or strategic perormance is achieved).

U.S. irregular warare doctrine has never quite pinned down this concept

in detail. COIN doctrine and emerging irregular warare doctrine quite

adequately address the need to deny insurgents access to sae havens and

support (tacit/unwitting; internal/external) but lack in specics or prin-

ciples and application o the measures needed. Notwithstanding, good

counterinsurgents have always devised a means or attacking the enemy insae havens. Either these were on the spot, intuitive, individual decisions

or derived rom lessons passed rom earlier practitioners without adoption

into doctrinal literature, even though some doctrinal writings through-

out history have at least come close to describing the role o hunter-killer

teams.

Te earliest attempt to capture hunter-killer concepts evolved rom

Benjamin Church’s personal memoir o his ranging activities with specially ormed militia into hostile territory during King Philip’s War (1675 to 1676).

Tese written experiences were incorporated into techniques used by Robert

Rogers, who in the French and Indian War developed his now-amous rules

or the conduct o deep reconnaissance raids.

Much o what early counterinsurgents understood about oensive opera-

tions against irregulars in inaccessible territory may have been derived rom

reading Colonel C. E. Callwell’s monumental work Small Wars: Teir Prin-

ciples and Practices, which he published in nal, revised orm in 1899. Call-well described a “doctrinal” approach o ying columns (superior maneuver

and mobility to the irregular) and specied the purpose o raids in irregular

warare (“… kill them or to wound them, or at least to hunt them rom their

homes and then to destroy or carry o their belongings” 5), combined with

the need to match the enemy and adapt. However, U.S. irregular warare

experts largely relied on the personal experiences and accounts o previous

practitioners through the venue o lessons learned passed on generationally.

U.S. Army operations against the Southwest Indians, the exas Rangers

experiences against the Plains Indians, and the COIN experience rom the

Philippine War lost doctrinal capture and appeal in the shadow and subse-

quent deployment or World War I.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 24/76

13

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

It took the cumulative experience o the U.S. Marine Corps, over many 

years, to codiy military activities conducted deep in enemy territory in its

Small Wars Manual , published in 1940. Much o Callwell’s work appears tohave made its way into the Small Wars Manual , which also set the standard

or utilizing task-organized conventional orces to conduct these specialized

operations, such as deep raids. (Specially organized hunter-killer orces to

conduct this task were still ar in the uture.)

Te Small Wars Manual developed a variation on Callwell’s theme; there

would be a variety o means to challenge guerrillas on their tur: ying

columns, mobile columns, and roving patrols (all still comprised o conven-

tional orces). Te mobile column diered rom a ying column only in itsrange and reliance on a base o supply. O interest was the roving patrol

concept, the clearest capturing o doctrinal employment o hunter-killer

teams:

A roving patrol (at 5-21 in the manual) is a sel-sustaining detachmenta.

o more or less independent nature. It usually operates within an

assigned zone and as a rule has much reedom o action. As distin-

guished rom other patrols, it is capable o operating away rom itsbase or an indenite period o time. Missions generally assigned

include a relentless pursuit o guerilla groups continuing until their

disorganization is practically complete.

Tis method is particularly applicable when large bands are known tob.

exist and the locality o their depredations is approximately known.

Such patrols are oen employed in conjunction with other methods

o operations.O course, World War II diminished the ascination with small wars. By 

World War II, the American militia and independent volunteer system was

gone (which eliminated the U.S. pool o outdoorsmen adept at ranging ) to

be replaced by National Guard and Reserve structures tailored or conven-

tional war (because armies were required to ght armies). World War II also

shifed the emphasis o elite and specialized military unit employment rom

ranging to one o reconnaissance, shock inantry, and raiding (e.g., Rang-

ers, U.S. Marine Corps Raiders, and 1st Special Service Force). Finally, the

American military was not conronted with an irregular warare enemy in

World War II, so it came out o the experience with an overall penchant or

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 25/76

14

 JSOU Report 10-1

conventional warare, even though much had been learned by the Oce o 

Strategic Services (OSS) conducting guerrilla warare activities.

Prior to the Vietnam War, it was the doctrine o other nations thatexpounded on oensive activities to challenge insurgent space. While not

American doctrinal solutions, these examples did provide some ramework 

or urther U.S. military doctrinal approaches to COIN techniques. Roger

rinquier’s treatise, Modern Warare: A French View o Counterinsurgency,

Sir Robert Tompson’s work, Deeating Communist Insurgency, and David

Galula’s Counterinsurgency Warare: Teory and Practice contain examples

or oensive actions within insurgent territory to attack bases and attrit the

enemy (e.g., intervention units, some orm o pursuit commandos, pseudo-organizations, and Ranger-type organizations).

One o the rst uniquely American-derived doctrinal approaches to

antiguerrilla activities afer World War II involving hunter-killer opera-

tions was oered by Lt Col Edward G. Lansdale during the early 1950s,

when he served as an UW liaison ocer to Ramon Magsaysay, the Philip-

pine Secretary o National Deense. Lansdale assisted in COIN eorts to

deeat the communist-inspired Hukbalahap insurgency. From observationsand ront-line experience, Lansdale consolidated his thoughts on eective,

antiguerrilla operations. While the document, “Operations Against Guer-

rilla Forces” (undated), was supported by the Military Assistance Advisory 

Group (MAAG) chie o the U.S. embassy in Manila, its restricted nature

prevented widespread sharing among military proessional and doctrinal

institutions. Tus its tenets or oensive COIN, by orming specialized anti-

guerrilla units, did not become mainstream. Lansdale called or the creation

o special antiguerrilla units to penetrate and destroy insurgent personneland inrastructure, arguing or small-unit, broadly scoped missions and

specically warned o the need to maintain and support special antiguer-

rilla units to increase their viability or extended operations (the caveat was

against retasking conventional inantry or this purpose).6

COIN doctrine developed by the U.S. during and afer the Vietnam War

still did not address oensive actions into enemy sanctuaries as anything

other than pursuit, reconnaissance, interdiction, or raids (e.g., the actions

o Special Operations Group and the U.S. Special Forces B52 organization).

However, it was still apparent to counterinsurgents that denial o sae havens

(the term sanctuary was used in most military literature o that day) was

a key component o COIN success. Te Department o the Army released

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 26/76

15

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Field Manual (FM) 3-07.22 Counterinsurgency Operations on 1 October 2004.

Perhaps a limiting political actor in modern COIN may have unintention-

ally aected doctrinal approaches, then and now: the diplomatic repercus-sions o violating the sovereignty o another country.

Te one clear approach or taking the ght to enemy-dominated territory 

emanated rom UW approaches developed by the U.S. Army Special Forces.

Still not explicitly stating a unique role or hunter-killer operations, FM 31-21,

Guerrilla Warare and Special Forces Operations (Headquarters, Depart-

ment o the Army, September 1961) came close in its page 130 discussion

o attrition measures and interdiction operations conducted by irregular,

indigenous orces:

Section III. Interdiction. 117. General

UWa. orces use interdiction as the primary means o accomplish-

ing operational objectives. Interdiction is designed to prevent or

hinder, by any means, enemy use o an area or route. Interdiction

is the cumulative eect o numerous smaller oensive operations

such as raids, ambushes, mining, and sniping. Enemy areas or

routes that oer the most vulnerable and lucrative targets or

interdiction are industrial acilities, military installations, and

lines o communication.

Te results o planned interdiction programs are.b.

Eective intererence with the movement o personnel, supplies,•

equipment, and raw material

Destruction o storage and production acilities•

Destruction o military installations; or positive results, attacks•

are directed against the primary and alternate critical elements

o each target system.

Protable secondary results can be obtained rom interdictionc.

operations i they are conducted over a wide area; when the UW 

orce employs units in rapid attacks in dierent and widely spaced

places, it

Makes it dicult or the enemy to accurately locate guerrilla•

bases by analyzing guerrilla operationsCauses the enemy to overestimate the strength and support o •

the guerrilla orce

May tend to demoralize him and lessen his will to ght.•

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 27/76

16

 JSOU Report 10-1

Although UW doctrine was specically developed to employ Special

Forces in consort with an indigenous resistance movement, the U.S. Special

Forces during the Vietnam War adapted this doctrine or use in security orce assistance operations and created Mobile Guerrilla Forces (auxiliary)

to take the ght to the Viet Cong in their base areas. Between this approach,

borrowing o oreign doctrine, and the earlier thoughts o the U.S. Marine

Corps on roving patrols, the elements or development o hunter-killer

operations in irregular warare doctrine could have been ramed.

COIN’s resurgence in doctrinal appeal came to the oreront with

the involvement o U.S. orces afer 9/11 in the two insurgencies in Iraq

and Aghanistan. (We can also add Operation Enduring Freedom in thePhilippines.)

Te U.S. collective doctrinal approach to COIN is now embodied in

FM 3-24, Counterinsurgency. Chapter 1 clearly describes not only the benets

that sanctuary (now reerred to as sae haven) provides insurgents but also

the doctrinal prescription: “Eective COIN operations work to eliminate

sanctuaries.”7 Further in the chapter (section I-98), the ollowing is oered:

“imely, resolute counterinsurgent actions to exploit poor enemy base loca-tions and eliminate or disrupt good ones can signicantly weaken an insur-

gency.” Te eld manual is also quite clear that the preerred method to

achieve this disruption is through the oensive actions o land orces and

an eective targeting system. However, there exists little discussion on the

role o employing hunter-killer teams or indigenous hunter-killer teams as

part o these disruptive options. Even less are any works on the analysis and

appreciation o the ramework and characteristics o sae havens.

o achieve the level o doctrinal acceptance or hunter-killer operations,the concept must be recognized as an American way o war; it certainly has

its historical antecedents. Tere must be a set o uniying principles or its

employment, and key to doctrine, an agreed upon denition o its nature;

this monograph supports that requirement. A thorough understanding o 

the characteristics and attributes o sae havens and their impact on riendly 

orces is necessary to develop counter sae haven measures; see chapter 3.

o rene this thesis, a review o the American historical approaches in the

employment o hunter-killer operations is warranted, primarily to ascertain

their advantages and disadvantages, utility and to dene the boundaries or

the development o operating principles. Tis work examines the American

historical approaches on the use o hunter-killer methodologies during its

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 28/76

17

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

wars by the analysis conducted in chapter 4; consolidating these examples

into derived principles is covered in chapter 5.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 29/76

19

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Safe Havens4.

…. it’s very clear to us that Al Qaeda has been able over the past18 months or so to establish a safe haven along the Afghanistan-

Pakistan border areas that they have not enjoyed before, that they

are bringing operatives into that region for training, operatives

that wouldn’t attract your attention if they were going through the

Customs line at Dulles with you when you’re coming back from

overseas.

— LTG Michael Hayden, CIA director, 30 March 2008

The ability o terrorists and other irregular warare adversaries to

conduct operations rom a sanctuary—hereafer reerred to in more

common usage as sae haven—increases the potential success o the

insurgent or terrorist in their struggles against government orces. Deny-

ing sae haven, thereore, is an essential part o any counterstrategy. For

instance, the use o Pakistan’s tribal areas as a sae haven by the alibanand Al Qaeda present allied orces with a large strategic dilemma i not

addressed (the protraction o the war and the weakening o the government

will to prosecute the campaign). Te most imposing uture security threat

may not be rogue or strong states, but rather the emergence o weak and

ailing states that can ultimately be used as sae havens by our enemies—

such as we are now seeing in the Horn o Arica region, Somalia and Yemen.

Worse, the linking together o multiple sae havens creates a network o 

imposing challenges to security orces charged with protection o nationalsovereignty.

Current methodologies or the creation o campaign plans have now

recognized the need or a commander’s appreciation to rame the problem

prior to any sta entering the military decision-making process to develop

the architecture o the campaign plan. Tis chapter provides a way o looking

at the problem o enemy sae havens when conducting initial assessments.

The Role of Safe Havens

Tis aspect o the generational challenge—persistent conict against violent

extremism—posed by transnational threats operating rom sae havens was

clearly identied in the ndings o Te 9/11 Commission Report :

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 30/76

20

 JSOU Report 10-1

A complex international terrorist operation aimed at launching a

catastrophic attack cannot be mounted by just anyone in any place.

Such operations appear to require the ollowing:ime, space, and ability to perorm competent planning and sta a.

work 

A command structure able to make necessary decisions andb.

possessing the authority and contacts to assemble needed people,

money, and materials

Opportunity and space to recruit, train, and select operativesc.

with the needed skills and dedication, providing the time and

structure required to socialize them into the terrorist cause, judge

their trustworthiness, and hone their skills

A logistics network able to securely manage the travel o opera-d.

tives, move money, and transport resources (like explosives) where

they need to go

Access, in the case o certain weapons, to the special materialse.

needed or a nuclear, chemical, radiological, or biological attack 

Reliable communications between coordinators and operatives.Opportunity to test the workability o the plan.g. 8

Afer Te 9/11 Commission Report , the U.S. Department o State (DoS)

conducted a rened study o the desired attributes that may or may not

make a place a sae haven in order to ormulate a working denition o sae

havens. Tat denition would be useul or the conduct o diplomacy when

considering threats to national sovereignty. Te DoS denition additionally 

highlighted places where the enemy could operate in relative security andperorm the unctions noted above. Regardless o the denitional sources

on the sae haven phenomenon, the ollowing denition oered by the

Interagency Intelligence Community on errorism (IIC) serves best or

the purpose o this monograph (and expanding the denition to include

insurgents):

A sae haven is ‘… an area where terrorists are able to gather in rela-

tive security and in sucient numbers to engage in activities that

constitute a threat to U.S. national security. Such activities include

attack preparations, training, undraising, and recruitment ofen

conducted in unsecured or undergoverned geographic areas.’9 

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 31/76

21

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Features of Safe Havens

What are the desired eatures making a location attractive as a sae haven

or a potential uture sae haven? One o the key, critical vulnerabilities o 

insurgent and terrorist organizations is the need or secrecy and security in

order to operate. Counter sae haven operations are ofen aimed at exposing

or dislodging irregular warare adversaries in these two areas—secrecy and

security—to create a third vulnerability—movement. Another important

 vulnerability is the enemy’s need or the support o the populace, making

isolating the populace rom the enemy an ofen-considered COIN and

combating terrorism tool. Tus, preerred eatures o the sae haven mustinclude the ability to hide in plain sight (even better i the position is near

the area o operations), to be located where it is physically nonaccessible by 

government security orces, and with the ability or the enemy to operate

in a secure manner—ree rom police, intelligence operatives, and legal

systems.

A supporting populace is also highly desirable in order to provide venues

or recruitment as well as needed logistical and nancial support. However,

the enemy can still operate in a sae haven without popular support; a popu-lation can be terrorized and intimidated into acquiescing to the demands o 

the enemy or at least not turning the enemy over to government orces.

Another desired eature is the ability to get into and out o the sae

haven to conduct operations, requiring nonrestrictive transit routes and

transportation assets. Tis eature is urther enhanced by establishing the

sae haven near porous borders and along illicit rat lines already in use or

smuggling and other criminal activities where the participants are adept atevading law enorcement and customs agents. A nal highly desired eature

would be having connectivity to cyber systems.

Framing the Environment

Prior to consideration o any counter sae haven operation, the sae haven

area should be thoroughly analyzed with regard to its composition. Is it an

ungoverned or undergoverned area? Is it truly a sae haven that provides

sanctuary, or is it merely a base o operations? Is the area an ethnic, sepa-ratist region or is it part o the country-wide insurgency? Or like the FARC 

operations in Columbia, is it an area or a criminal business enterprise?

Clear understanding o the environmental makeup o the sae haven and

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 32/76

22

 JSOU Report 10-1

the motivations o its actors will assist in the shaping o the counter sae

haven plan.

Sae havens can also be categorized by unction and by geography. Func-tional sae havens include reugee camps, prisons, diasporas, academia,

and ideology (a supportive, cultural anity to support the terrorists or

insurgents). Geographical types (physical spaces) o sae havens include

urban, rural, and virtual.

During their analysis, counterterrorists and counterinsurgent planners

identiy issues that may place restrictions and limitations on their ability to

conduct counter sae haven operations. Imposing physical terrain and issues

o sovereignty can limit operations to only the ringes o the sae havenarea. Security orces may be nonindigenous to the area and even urther

hampered by rules o engagement. Te skills and capabilities o the security 

orces require review to ascertain the correct ways and means to achieve the

ends. As an example, brute orce and repression can be used to clear a sae

haven i the security orces do not have nesse; the second and third order

eect, however, may result in huge reugee populations and a devastated

area now requiring an expensive rebuild. Clearing a sae haven could endup as a protracted operation—the government must have the will and time

needed to outlast the enemy and see the operation to its conclusion.10

Counter Safe Haven Approaches

Te ollowing approaches to denying or countering adversaries operating

in sae havens were derived rom historical examples o irregular warare

conicts since the end o World War II. One may wish or the case where

the indigenous population within the sae haven rises up against the terror-ists or insurgents, but this rarely happens. Te raming o the sae haven

environment during assessment and analysis will ofen dictate the approach

considered. Te ollowing are common approaches that can be used as a line

o eort within campaign plans (individually, or in the aggregate):

Isolate, manage, and contain the sae haven (includes bordera.

interdiction)

A policing, law enorcement, and intelligence approachb.Brute orce intervention (invasion, interdiction, sweeping)c.

International diplomacy to put pressure on the supporting country d.

Unconventional warare.e.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 33/76

23

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Te best approach, historically, is one in which the host nation with the

problem solves it without external assistance.

Counter Safe Haven Techniques for Security Forces

Te ollowing measures should be considered or development o a counter

sae haven plan. Te plan will be multidisciplinary, with the combination

o several o the measures applied in consort with one another:

Enhance border control, customs, and immigration services.a.

Prepare human terrain databases and social-cultural mapping, apply b.

additional population control measures (e.g., control o resources,biometrics, and identication cards), and co-opt the local populace

and solve grievances to isolate population rom the enemy.

Conduct counterorganization, counterrecruitment, and countermo-c.

tivation operations in the sae haven.

Simultaneously attack any criminal business enterprises.d.

Develop and employ specially trained orces (e.g., border interdiction,e.

hunter-killer teams, and pseudo-operations teams).

Employ an interdiction and targeting plan throughout the sae.haven.

Consider adoption o additional laws and legal measures to enhanceg.

security orce and law enorcement operations.

Engage in regional initiatives or combating terrorism and law enorce-h.

ment enhancements.

Own and control the narrative and inormation operations in the saei.

haven; counter cyber threats and capabilities o the enemy.Border barriers and ences in conjunction with interdiction measures j.

(kinetic).

During the Algerian War, the French recognized the insurgent use o 

sanctuary across the borders in unisia and Morocco. Te French applied

 various techniques to isolate the National Liberation Army (ALN) inside the

sae havens through the building o an eective barrier system: the Morice 

Line along the unisian border and the Pedron Line along the Moroccan

border. Te barriers—barrages—consisted o wire ences augmented with

lights and mineelds and were eventually very eective in stopping enemy 

inltration with a kill rate o over 85 percent. Over 40,000 troops were

assigned to static posts along these barriers supplemented with mobile

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 34/76

24

 JSOU Report 10-1

columns to react to penetrations. In consort with the border barrages,

French naval orces implemented a campaign o coastal surveillance and

high seas interdiction to close down arms smuggling. Tese measurestaken collectively orced the ALN to continue only with guerrilla opera-

tions while thwarting attempts to conduct more aggressive, mobile warare

operations.

Summary

Countering an adversary sae haven is a multidimensional problem, oen

with no single solution. Correctly raming the problem o sae haven (its

characteristics and environment) helps to identiy the approaches and tech-niques required to eectively achieve its elimination or at best, denial to

enemy orces. Some o the key vulnerabilities o terrorists and insurgents

who operate within sae havens are organizational security, physical secu-

rity, and ofen the need or a supporting populace. Government legitimacy,

eective security orces, and countermobilization o the population to sepa-

rate them rom the threat are among the most eective tools in eliminating

or denying sae haven creation.A wide variety o military, policing, and law enorcement measures are

available to the counterterrorist and counterinsurgent to achieve the desired

eects on adversary sae havens. One o those measures discussed here is

the employment o hunter-killer teams within the sae haven. Historically,

the U.S. military has employed some orm o this technique based on the

demands o the irregular warare environment and yet ailed to adequately 

codiy this approach in doctrine. Chapter 4 reviews American military 

employment o hunter-killer type ormations throughout U.S. history toderive the advantages and disadvantages o their use, to capture key lessons

learned about their operations, and to synthesize the best practices observed

and employed to capture hunter-killer team employment principles (chapter

5). An understanding o these principles will support the ormulation o 

uture COIN and counterterrorism doctrinal input on this subject, particu-

larly in the wider area o counter sae haven operations.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 35/76

25

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

The American Historical Experience in4.

Hunter-Killer OperationsScouts without a peer, superb in woodcraft, the Indians fought

the total warfare of the barbarian hordes of the past and of the

‘civilized’ nations of the futures. Such was the military legacy of 

the Indians to the garrison of Fort Stanwix, as to their forefathers

before them and to the soldiers who would come after them, an

invaluable bequest for all our later wars through Korea. The art of 

using cover, of inltration, of ambush, and sudden surprise attack,of mobility…. Ranger companies before and during the Revolution

practiced Indian tactics to the hilt, as would their counterparts on

into the twentieth century. In no small measure the Indian Wars

made the American Army the effective ghting force it became.11

  — Fairfax Downey, Indian Wars of the U.S. Army 1776–1865

Doctrine can be inormed by historical experience. In most scenar-ios where the American military was aced with an irregular

warare adversary, some orm o ranging or hunter-killer units

were employed as a response to take the ght deep into enemy territory. A

review o those experiences in various irregular wars ought by America can

establish the acceptance and utility o employing hunter-killer operations

as part o any American way o irregular warare.

Te U.S. military hunter-killer team employment and counter sae havenexperiences can be divided or study between the preindustrial period o 

colonial and early American era to post-World War II and beyond. Some

reasons or the break and the dierences between the two periods ollow:

Rules o engagement became more restrictive and humane to limita.

harm against noncombatants (unorthodox and brutal tactics in irregu-

lar warare begin to become scorned by more proessional military 

leaders).

Irregular warare engagements by theb. U.S. dwindled.

Te militia and volunteer system or the American military wasc.

replaced by the Reserve and National Guard systems, drying up

the pool o independent volunteers with the necessary independent

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 36/76

26

 JSOU Report 10-1

attributes to range and conduct hunter-killer activities as ad hoc

ormations.

O most consequence, World War II changed the role o irregular rang-

ing  skills o elite light-inantry units to creation o special raider and

commando-style units patterned upon European doctrine (even though

the U.S. Army still retained Ranger-type ormations). Unortunately, the

ranging skill o the light inantryman (independent units adopting enemy 

tactics and operating or extended periods in nonpermissive areas) becomes

lost in the conventional nature o the war as they soon become shock inan-

try, raiders, and long-range reconnaissance units.

Colonial and Early American Period of Hunter-Killer Operations

Te American military experience with hunter-killer operations in enemy 

sae havens began in a world in which we nd ourselves today. It was during

a clash o civilizations throughout the 1600s and 1700s where expanding,

oreign imperialism crashed into indigenous populations and culture; indig-

enous cultures were manipulated by contending states to provide irregular

warriors or the ght. It was a conict between liberally governed soci-eties, ruled under a sense o recognized legitimacy, against substate and

tribal warriors. Competing ideologies o rened culture versus savagery 

and barbarism ormed the backdrop o warare amongst combatants and

noncombatants alike. Whole populations lived in terror o massacre, behead-

ings, torture, wretched imprisonment i captured, and the destruction o 

homelands and economies.

Tese conditions created a unique way o early-American war on therontier and ostered the employment o ranging tactics as hunter-killer

operations against irregulars in their sae havens. Te operational style o 

ranging initially consisted o patrolling between rontier orts (to detect

enemy activities) as well as scouting and raiding i warranted. Tus the

name or these early hunter-killer type militia units: Rangers. Te ollow-

ing examples illustrate various roles and missions o the early Rangers and

the pros and cons o their employment as hunter-killer units. Te most

comprehensive work on this way o war and a complement to any library on irregular warare is John Grenier’s book, Te First Way o War: Ameri-

can War Making on the Frontier . Hunter-killer methods became the most

eective mode o early American irregular warare military art. Tose tasks

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 37/76

27

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

required long-range penetration into enemy territory and a laundry list

o destructive measures to accomplish once there, all contributing to the

attritional nature o wars o exhaustion against irregular warriors.

Attacking and destroying Indian noncombatant populations

remained the American, particularly rontiersmen, preerred way 

o waging war rom the early sixteenth through early nineteenth

centuries, even aer the ormation o the regular American Army 

and its attempts to move toward the eighteenth century European

norm o limited war.12

King Philip’s War, 1675 to 1676. Te expanding land desires o the early settlers in southern New England (Massachusetts Bay Colony, Swansea,

Plymouth Colony, Rhode Island, Connecticut), combined with growing

disdain on the part o colonists or the incompatibility with European

culture and values o the various indigenous Indian tribes populating the

region, led to the rst outbreak o ormal military operations. It reached

campaign scale during King Philip’s War, ought between 1675 and 1676,

against the backdrop o Europe’s 30 Years War.King Philip (with the Wampanoag Indian name o Metacom) led the

eastern American Indian tribes o the Wampanoag, Narragansett, Nipmuc,

and others in an attack against the colonists in June 1675, in the southern

border region o the Plymouth Colony. Beore the war ended, thousands o 

towns, settlements, and homes o American settlers were destroyed, over

800 lives lost amongst the settlers and approximately 3,000 losses amongst

the Native American populace (resulting in the decimation o the eastern-

American Indian tribes).13 Early colonial military deense consisted o a basic sel-reliance on an

armed populace and the establishment o a mutually supporting colonial

militia system, all backed up with a series o ortied houses and blockhouses

stretching across the rontier. I attacked, the citizenry would rally into the

ortied positions and allow the militia to patrol and roam between them

in an attempt to clear away the Indians. American militias were trained in

accordance with European military tactics involving lines o inantrymen

delivering volley re. Te Indians used guerrilla-like tactics, rst raiding,

then disappearing into orests and swamps as reuge and sanctuary.

As in all insurgency-like conicts, the enemy’s elusiveness plagued

eorts to bring on decisive military battle. In recognition o the need to

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 38/76

28

 JSOU Report 10-1

take the ght to the Indian warriors, Governor Winslow (Plymouth Colony)

appointed Benjamin Church as the commander o the rst ull-time, inde-

pendent company o Ranger militia. Comprised o both expert rontiers-men and Indian volunteers (initially about 60 Englishmen and 140 Indian

irregulars), Benjamin Church employed his unit as the rst ocially sanc-

tioned American ranging unit with a clear mandate or a hunter-killer type

o operation:

… a orce specially designed to search out the remnants o the enemy 

wherever they may lurk and beat them at their own tricks o orest

warare.14

Captain Church was well known—a amous Indian ghter—and had a

 vast knowledge o the rontier territory. His unorthodox leadership style,

with a air or the dramatic, made him a perect leader or an autonomous

hunter-killer unit. Benjamin Church employed ranging tactics to conduct

a variety o oensive strikes against enemy sae havens. Benjamin Church

took the ranging concept to the next level, employing his Rangers deep

into enemy territory or long periods (over weeks o time) with the expressmission o destroying the hostiles and their sae haven support system. Te

Rangers ought by copying the style o Indian orest ghting and swamp-

ghting tactics.

Church’s unit almost single-handedly turned around the war eort with

a string o successes against the hostiles. His unit accounted or the death o 

King Philip; the capture o Philip’s supporter, Annawon; and a devastating

winter raid (conducted as a combined operation with other colonial militia

units on 19 December 1675) against a ortied camp o Narragansett nearpresent-day South Kingston, Rhode Island. Dubbed the Great Swamp Fight,

this action eliminated any urther serious involvement o the Narragansett

Indians during the remainder o the war.

Benjamin Church used mixed militia and indigenous orces to his advan-

tage along with the rontiersmen knowledge o the outdoors, adoption o 

Indian skulking tactics, and well-armed units to overmatch his adversaries.

He adapted to the enemy by learning the intricacies o swamp warare in

order to expand his operations into that sae haven. His disadvantages were

limited mobility (same as his adversary—oot) and lack o means to sustain

his orces during bad weather.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 39/76

29

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Church derived early principles rom his warare exploits utilizing

hunter-killer methodologies. His written experiences in hunter-killer types

o operations were passed on and incorporated into the style o ranging

and hunter-killer operations made amous by Robert Rogers during the

French and Indian War. Although Rogers’ exploits orm the lore o modern

Ranger history, Benjamin Church should rightly have the title o the athero the rst American military operations employing Rangers as unorthodox

military.

French and Indian War, Rogers’ Rangers. Major Robert Rogers began his

ranging career as a 14-year-old Indian ghter and went on to become the

most amous, although certainly not the rst, Ranger o the American ron-

tier. Rogers perected the art o oensive ranging with his hunter-killer units

by conducting deep penetration raids and reconnaissance missions or theBritish orces stationed along the upper state waterways o New York during

the French and Indian Wars. Rogers capitalized on integrating indigenous

orces into his units. Tey served as scouts, knowing the land well. He raised

Figure 1. Rhode Island State historical marker near the location of the Great Swamp Fight where Colonel Church and his Rangers par-

ticipated in a decisive winter raid against the sanctuary of the Nar-ragansett Indians (near present-day South Kingston, Rhode Island)

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 40/76

30

 JSOU Report 10-1

 volunteers who were physically hardy and superb outdoorsmen, and adopted

unorthodox ghting techniques similar to the hostile Indians. With these

units he led missions into enemy territory—harassing French and Indianlines, gathering intelligence, and capturing prisoners.

His most notable hunter-killer type operation was the raid against the

Abneki village on 4 October 1759, located at St. François in the St. Lawrence

River valley. raveling over 150 miles with 142 Rangers and indigenous

Indian irregulars, the village was ruthlessly attacked. Many o the Abnecki

warriors and noncombatants were killed or scattered, and then the whole

 village was burned.15 

Rogers would go on to command a Ranger contingent during the Revo-lutionary War, unortunately on the side o the British. He is most remem-

bered or his Rules or Ranging , promulgated as a result o his experiences.

Rogers’ expedition typied the rst derived and applied principles o hunter-

killer and ranging operations to ensure success. His men were handpicked,

including the Mohican scouts. Te rangers wore sturdy, rontier clothing

to protect them rom the elements and to blend in with indigenous popula-

tions ound in his operating area. Te Rangers were armed well enough tomatch or overmatch their adversaries. Weapons skill and care o weapons

were enorced constantly.

Te Rangers traveled ast and light (carrying extra moccasins or long-

range patrols) and ofen used canoes or boats to increase their mobility.

During winter, skates were used to rapidly transit rozen lakes and rivers,

and snowshoes were used to negotiate the eects o snow on the trails.

Combined with a cultural and geographical knowledge o their area o oper-

ations and the ability to live o the land and travel long distances behindenemy lines, the Rangers became the most eective, specialized orce in

the northeast.

Conversely, the ailing attribute o Rogers’ operational style was that he

was not constrained by rules o engagement when conducting his opera-

tions against combatants and noncombatants alike; i prisoners impeded

his movement, they were usually killed. Noncombatants were killed along

with warriors. Tis tactic was scorned by the conventional British Army 

regulars, and Rogers was later rebuked or this operation. Te British had

made great propaganda against the French when they employed these tactics

with their Indian irregulars; the high moral ground was lost and the French

continued to allow their indigenous allies to commit atrocities.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 41/76

31

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Operational Maneuver, Strategic Efect: Te Battle o Kings Mountain

1780. Tere are very ew examples o early American military operations

involving hunter-killer teams in achieving a strategic eect based on theoperational maneuver o its irregular orces; most hunter-killer operations

are tactical engagements. Tis eect might only be accomplished i the

hunter-killer operations are employed as the main element o a war-o-

exhaustion strategy; by the prolonged operations o hunter-killer teams to

wear down enemy insurgents; or the insurgent orce is so decimated that

 victory is achieved.

Te Battle o Kings Mountain in 1780 pitted the irregular orces o the

back-country colonists—the Overmountain Men rom ennessee and militiarom the western districts in North Carolina—against the proxy, provincial

irregular orces o Loyalists commanded by Major Patrick Ferguson.16

Afer stalemate in the North against Washington’s orces during the

Revolutionary War, British strategy shied to reliance on a perceived loyal

ory population in the southern states to deeat the Americans. Te English

war cabinet, in consort with its generals, believed it would be possible to

subdue the rebels in North Carolina, South Carolina, and Georgia usingirregulars provided rom the Loyalists. Afer the attack on Savannah, British

orces overran Georgia, and then captured Charleston on 12 May 1780. From

this position o strength, British orces spread military detachments to the

countryside to consolidate their gains. In response, the American General

Gates reacted in August o that year—maneuvering with the Continental

orces at Camden, South Carolina—and was heavily deeated. With the

absence o an American Army to thwart British gains, American patriots

turned to partisan and guerrilla warare operations to continually harassthe British.

Ferguson commanded a large, irregular orce o about 1,100 Loyalists

(which included Rangers). He was ordered by the British command into

western South Carolina (to the ort named “96,” a star, earthen-work orti-

cation guarding a trade route), prepositioned to continue operations against

American Partisans in North Carolina. He soon moved his orces north,

scattering the Partisans in his wake, with the intention o linking up with

British orces in Charlotte. Ferguson believed the back country area would

provide him with a loyal populace, provisions, and terrain to support his

maneuver—sae haven characteristics.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 42/76

32

 JSOU Report 10-1

In response, militia commanders Colonels Isaac Shelby and John Sevier

mustered the largest hunter-killer operation in early American history at

Sycamore Shoals (near modern Elizabethton, ennessee) on 22 September1780. With the addition o 200 Virginians under Colonels William and

Arthur Campbell, the orce o militia and irregulars let loose rom the Shelv-

ing Rock rendezvous point as a  ying column to search out and destroy 

Ferguson. Te column split at Catawba in order to gather more Partisans

and grew to approximately 1,400 men (later dubbed in olklore as the “Ghost

Legion”).

Ferguson soon had word rom local spies o this irregular orce hunting

or him and stopped at Kings Mountain to gather more reinorcements.Kings Mountain was a poor choice or a deensive position being isolated

and with very little water. Unbeknownst to Ferguson, none o his messages

calling or reinorcements were getting past the hostile population.

Te American hunter-killer orce slowed to the pace o its oot soldiers.

In rustration at the pace o movement, the orce was reorganized into a

mounted column, leaving the oot soldiers at Cowpens, and pushed ahead

to Kings Mountain with about 900 horsemen on 6 October. Local oriescaptured along the way provided intelligence, and much o the population

provided provisions or the orce as it pushed orward (to include the draw-

ing o maps).

Ferguson was soon surrounded. Te Americans, using Indian tactics,

were repulsed rom the top o the mountain several times. Soon, Loyalist

muskets could not compete with the accuracy and killing rate o American

ries; they were deeated aer Ferguson was killed. American losses were

about 30; the Loyalist orce o approximately 1,100 was decimated (about150 killed, commensurate number wounded, and over 800 taken prisoner).

Te American victory ensured the British would never operate in orce

again across the southern back country. Te victory also dampened the

enthusiasm or Loyalist support or England or the remainder o the war—a

strategic victory.17 

Te attributes o the hunter-killer operation lending to the success o 

American irregulars came rom their superior repower (rie technology 

 vs. musket), superior mobility on horseback, knowledge o the terrain and

populace, the innate ability o the American irregular to live o the land, the

hardiness o the physical condition o the irregulars, and the reckless, brave,

charismatic and audacious leadership provided by the militia colonels, most

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 43/76

33

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

with warghting experience. Te rules o engagement were unrestrictive, but

American irregulars spared the wounded, treated them as best they could,

and moved the hundreds o prisoners to places o captivity. (Te rules o 

engagement allowed or the abuse and capture o noncombatants given the

American sentiments against the Loyalist actions o the population andabuses on the British side.) Detractors were the ad hoc, inexperienced level

o the various irregular militia units, who had never conducted coordinated

operations with one another (although this did not limit their eective-

ness when nally orming or battle). Although slowed by the speed o oot

inantry, the hunter-killer orce adapted the ying column to horseback and

prevailed in reaching Ferguson’s orce beore he could maneuver away.

Te ranging tradition spread to other states, and a variety o Ranger mili-

tia units continued to conduct hunter-killer operations or the remainder o 

the 18th century. Afer the creation o a standing U.S. Army, most operations

into the irregular’s sae havens and homelands consisted o conventional

military eorts o long-range penetration under the design o a punitive

Figure 2. Ferguson’s men defended from the top of the terrain, and the

American irregulars and volunteer militia surrounded the heights andfought uphill to defeat the British Loyalists

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 44/76

34

 JSOU Report 10-1

expedition or as limited long-range patrols (e.g., Indian Wars in the West,

exas Rangers, and Philippine COIN campaign). During the Civil War, a

 variety o colorul units were ormed to track down the elusive Conederateirregulars o Mosby and Quantrill, but these suered in eectiveness rom

being ormed ad hoc out o conventional cavalry units, who were not much

better in the tactics, arms, and skills o their counterparts.

Te tradition o conventional punitive columns culminated in General

Pershing’s expedition to Mexico in the early 20th century. Although specic,

small-unit hunter-killer operations (e.g., Ranger units) were no longer the

norm, the small-wars era continued afer World War I and did at least

continue to provide hunter-killer-like skills and experiences to the U.S. military as a COIN technique. Tis would improve American hunter-killer

operations in the uture: the use o indigenous orces, increased mobility 

platorms to travel urther in rougher terrain, modern and over-matching

weaponry, and technology enhancements (the advent o the airplane and

the radio).

World War II and Beyond

World War II irregular warare experiences did not expand the American

way o war in the realm o COIN techniques, primarily because the U.S. did

not ace an Axis insurgent or guerrilla threat. (Te U.S. conducted guer-

rilla and partisan warare against conventional Axis orces.) It was in this

adversary realm o irregular warare—actually participating as sponsors and

enablers or guerrilla warare (e.g., Yugoslavia and the Philippines) —where

much o American doctrinal approaches to UW were ormed. Either by 

necessity as stay behind orces, or through British tutelage under the SpecialOperations Executive, Americans perormed capably as insurgents and

guerrillas in their own right. Other SOF were created or the purpose o 

raiding or or use as elite inantry, inuenced by the European military 

design o commandos. Unortunately, the ranging and hunter-killer ethos

o the American inantry would be transormed when Army Rangers were

employed as shock inantry, tactical raiders, and battleeld reconnaissance

assets.

World War II. Several specialized inantry ormations were created during

World War II. For the Army, it was the combined U.S.-Canadian 1st Special

Service Forces and the U.S. Army Rangers, neither o which were used to

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 45/76

35

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

their ull potential to conduct hunter-killer operations. In the Pacic, the

U.S. Marine Corps sponsored the ormation o the amous raider regiments,

which became renowned or their exploits while conducting raids on Japa-nese-held islands.

Te 1st Special Services Force conducted a series o operations rom

Alaska to Italy and nally southern France, but it was used primarily as a

conventional, light-inantry maneuver regiment. Te Rangers were misuti-

lized as vanguard, shock-inantry in Italy where they were all but destroyed.

Te long-tradition o ranging behind enemy lines could not be accomplished

in the large, conventional and linear battles ought throughout the war in

Europe.wo contributions to the art o hunter-killer operations against irregular

adversaries did occur, however, as a result o the war:

Te rst was in technological leaps, which would enable uture hunter-a.

killer operations.

Te second was in German antipartisan operational experience, whereb.

hunter-killer teams were used both against the Soviet partisans and

against the Partisans in the Balkans.

In technology, long-range naval and aviation assets now provided plat-

orms or insertion o hunter-killer teams deep into enemy territory, as

well as their extraction. Supplies allowing hunter-killer teams to remain

behind the lines could now be parachute delivered or delivered over the

shore by stealthy submarines and small water craf. Te o-road, all-terrain

capabilities o motorized vehicles also enabled hunter-killer teams to navi-

gate in previously inaccessible areas. Ecient and smaller machine guns,mortars, and antitank weapons ensured uture hunter-killer teams could

take on irregulars with staying power, precluding the need or extraction or

rescue by larger orces. But it was the long-range radio that by ar enabled

specialized orces to remain much longer in enemy territory. No longer

were mobile or ying columns limited to what they could carry; with the

radio, a reach-back capability existed to call or more orces, weapons, or

logistics as the situation demanded. With the radio also came access to

higher intelligence on the activities o adversaries as well as a capability to

achieve eective and coordinated operations with larger conventional orces

conducting antiguerrilla operations.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 46/76

36

 JSOU Report 10-1

Te second contribution or uture hunter-killer operations was a result

o extensive study by the U.S. Army o German antiguerrilla techniques to

learn and synthesize military requirements or counterguerrilla doctrine:

Inspired by the German Army’s World War II jagdkommando anti-

partisan doctrine, the U.S. Army’s 1951 FM 31-20, Operations Against 

Guerrilla Forces, prescribed the organization, training, and unctions

or a prototypical indigenous counterguerrilla unit o platoon size.

Intended to operate independently or prolonged periods, specialized

antiguerrilla units were to be armed with light automatic weapons

and radios or night operations such as raids and ambushes. Tismanual also recommended that antiguerrilla units should consider

masquerading as guerrillas to deceive irregular adversaries.18 

Earlier German experiences with antipartisan measures were based on

the requirement to protect rear area assets rom partisan sabotage attacks

and were primarily designed as limited tactical operations o small-unit

patrolling as a deensive measure. As partisan activities grew rom small

attacks by disaggregate bands to heavier, well-organized attacks by compa-nies and battalions, new measures were needed. Te German high command

issued a directive or all units to build hunter-killer teams, jagdkommandos,

with enough repower and endurance to move into guerrilla areas and

destroy them. Partisans operating against the German orces, like all smart

guerrillas, avoided set piece battles and were extremely adept at eluding

German orces’ attempts to surround them; their intimate knowledge o 

the battleeld allowed them to escape into rough terrain or melt into the

population, time aer time.As in earlier French and British colonial experience against irregulars,

German orces adopted the use o mobile columns to penetrate into guerrilla-

held territory. Mobile, heavily armed, and operating at the company size,

German jagdkommandos consisted o specially trained orces, drawn rom

existing manpower o elite units who eschewed the need or a long logistics

tail (they lived o the land) and oen dressed and equipped themselves to

look like the very guerrillas they were attempting to destroy. Te jagdkom-

mandos also used indigenous personnel as scouts and guides and included

in their ranks soldiers who could speak local languages and dialects.

Te primary role or the jagdkommando was to seek out and destroy 

guerrilla bases. Tese units by 1943 became very eective at oensive

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 47/76

37

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

antiguerrilla operations, particularly in the Balkans. Te German army 

even created an antipartisan badge, the highest award in gold, which became

competitively sought afer by members o these organizations. In his book,Hold the Balkans, Robert M. Kennedy briey described their role:

A highly eective oensive weapon was ound in the Jagdkommando 

(ranger detachment), designed to seek out and destroy guerrilla

bands. Personnel o the detachments were usually young and combat-

wise veterans o German campaigns on other ronts. Physically hardy 

and trained to live in the open or extended periods o time, they 

depended little on supply columns and could pursue the guerrillas,ofen burdened down with wounded, amilies, and impedimenta, into

the most inaccessible areas. When the situation required, the rangers

would put on civilian clothing, disguising themselves as Chetniks

or Partisans, to work their way closer to their wary enemy. In the

event they came upon major guerrilla orces, the ranger detachments,

seldom more than a company in strength, would keep them under

observation and inorm battalion or higher headquarters. While

awaiting reinorcements, they would attempt to gather additional

inormation on the guerrilla strength and dispositions. As success-

ul as they were in many small-scale operations, however, the ranger

detachments were not numerous enough to aect decisively the

outcome o the antiguerrilla campaign.19 

Advantageous lessons learned were in the need or mobility to outma-

neuver the partisans, how to overmatch their repower, how to eectively 

blend with the insurgents through altered appearances, and using localsor intelligence. Airpower increased the longevity o the orce by provid-

ing resupply, close air support, and MEDEVAC. Decentralized command

and missions o broad scope were the norm. Te  jagdkommando concept

distracter was common to totalitarian militaries: loose rules o engagement

resulted in brutality and repression o noncombatants as well as severe treat-

ment or captured insurgents. Tese activities nullied local population

support or the Germans.

Post-World War II Era. Afer World War II the American military had

limited experiences in COIN or promulgating doctrinal approaches to

counterguerrilla and counter sae haven methodologies, specically hunter-

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 48/76

38

 JSOU Report 10-1

killer employment. For operational art on the subject, they were mostly 

reliant on the experiences o other nations. Te post-World War II irregular

warare era was characterized by revolutionary, anticolonialist nationalmovements, and communist people’s war. U.S. knowledge o COIN tech-

niques under these types o war was gleaned rom British and French COIN 

operational art—now changed in character with the advent o a new tech-

nology: increased mobility via helicopters.

In the Korean War, Americans once again aced no threat rom Chinese

or North Korean guerrillas to a sucient extent; thus, they had little impetus

to urther rene and develop U.S. COIN techniques, preerring to conduct

specialized operations much like their World War II experiences—employ-ing unconventional orces as guerrillas and espionage operatives against

the enemy. While they could have developed skills relevant to hunter-killer

operations, Rangers were once again used predominantly as light inantry,

mostly as tactical reconnaissance units, capable o small raids, and deep

battleeld scouting units (intelligence gathering) under the Army Corps

structure.

Te U.S. involvement to assist Greece against their internal communistinsurgency immediately aer World War II could have urthered evolve-

ment o U.S. COIN doctrine, but in the mainstream was security assistance,

within the parameters o a host-nation IDAD plan. No major COIN orces

were deployed during this advisory eort. Te American military would

not conduct hunter-killer type operations until its involvement in the Viet-

nam War.

Vietnam War. Te American way o war in COIN was heavily inuencedby its involvement in the Vietnam War, challenging the doctrinal approach

to ghting irregular warare adversaries at a scale not seen in American

military history. Every possible approach to ghting irregulars and a main-

stream, revolutionary people’s army was attempted during the conict. Te

Vietnam War was also the impetus or transcending the nature o how the

American military viewed special operations. Te SOF heritage is a long

historical one o ad hoc experiences gained throughout the nation’s wars,

but today’s SOF owes much o its operating style and mission sets to WorldWar II and the Vietnam War, dening the strategic utility o SOF, and to

the relevance o its tactical operations in achieving operational goals and

objectives.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 49/76

39

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

In World War II, the U.S. military came away with some limited expe-

rience in UW, commando-style raiding techniques, and guerrilla warare.

In Vietnam, specialized warare grew to include unique COIN skills orFID, prisoner o war rescue, long-range and strategic reconnaissance, direct

action with specialized assets, and oreign advisory and assistance skills.

Without a doubt the most transcendent act was the creation o Green Berets

(the Army Special Forces) in the early 1950s, later supported by President

Kennedy as a means to answer irregular adversaries with America’s own

 version o guerrillas.

In Vietnam, hunter-killer techniques were adopted by both the conven-

tional Army and within the Army Special Forces. Although having a longtradition o historical use o Rangers to conduct ranging operations deep

into enemy territory in the early colonial era, the Rangers once again were

used in the role o long-range reconnaissance assets to support conventional

unit tactical intelligence-gathering operations (similar to their role in World

War II). Other specialized units, like the Special Operations Group (SOG)

ormations, again ound roles in conducting strategic reconnaissance opera-

tions deep into enemy territory as their primary mission. Tis is not to say that Ranger operations and SOG operations did not achieve eects desired

in creating mayhem in enemy-held territory while contributing to counter-

organization successes. It is rather to highlight that they were specically 

ormed as intelligence-gathering and reconnaissance assets, not hunter-

killer units or long-duration operations in enemy sae havens.

O the attempts to employ hunter-killer teams, two are noted here:

one was the U.S. Army retailoring its conventional inantry, and the other

was Special Forces specically mission-purposed. Te conventional orcesattempt to employ hunter-killer teams in the Vietnam War COIN environ-

ment illustrates a lesson not learned in the Army’s earlier attempts to employ 

hunter-killer teams during the Civil War: the ailure rate when adapting

conventional ormations to this requirement was high.

In November 1965, the then Major David Hackworth was instrumental

in creating an organization, guerrilla-like in nature, to ght the Viet Cong. It

was a derived, personal philosophy based on his wartime experience. Within

the 101st Division, the new iger Force hunter-killer concept was adopted

to create platoon-sized units rom hand-picked soldiers across the divi-

sion. One became a hunter killer, based on attributes gleaned in command

interviews: months o combat experience, psychological propensity to have

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 50/76

40

 JSOU Report 10-1

hunter-killer instincts, and o course, audacity. Once picked, the soldier

 joined the elite iger Force and was issued a set o tiger-striped atigues to

distinguish him rom normal inantry units.Te iger Force units conducted small-unit actions and were designed to

operate in the eld or weeks and take the ght into the jungle to hunt and

kill Viet Cong, based on the member’s ability to conduct eective jungle

warare. During population resource and control operations, the iger

mission was to look or Viet Cong and ood caches, then destroy them. Te

iger Force hunter-killer concept was used throughout 1967 in operations

near Dak o, Duc Pho, and Chu Lai, in the Central Highlands campaign.

Most o the iger Force became reconnaissance platoons at the brigadelevel and never achieved the goal o conducting deep, long-duration opera-

tions against the enemy. Nor were they aorded the assets or independent

authorities required to be eective hunter killers.

Over a period o time the units were looked on with distrust. Senior

ocers elt their operations caused too many riendly casualties (they were

almost wiped out in June 1966 while pursuing North Vietnamese Army 

main-orce regiments), and the unit was soon accused o committing atroci-ties during their operations. Te unit was disbanded aer claiming almost

300 enemy kills, some o a suspect nature.

Although adopting enemy tactics, selecting hand-picked personnel, and

providing aggressive and audacious leadership, the concept ailed rom

lack o discipline, hierarchal command and control mechanisms, and little

autonomy to conduct eective operations. Te unit was ad hoc in orm-

ing and was an attempt to convert conventional inantry into specialized

irregulars.Te use o an organized hunter-killer ormation came with the orma-

tion o the Mobile Guerrilla Force trained and led by U.S. Army Special

Forces or the purpose o complementing indigenous Vietnamese tribal

mobile strike orce units (MIKE Force). Responding to the need or quick 

reaction orces or the various U.S. Special Forces base camps involved in

the Civilian Irregular Deense Group (CIDG) program, Green Berets soon

became adept at conducting counterguerrilla operations with indigenous

orces who were not placed under the control o the South Vietnamese

Army—in essence, their own autonomous maneuver orce. Unortunately,

this autonomy also created isolation and distrust rom conventional units

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 51/76

41

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

when it came time to seek their reinorcement during battle. (o resolve

the issue, the Green Berets created the mobile strike ormations to quickly 

back up beleaguered CIDG outposts.) aking the concept one step urther,the Green Berets realized sitting in base camps awaiting enemy attack was

not a creative use o indigenous orces. o become more oensive in nature,

the Green Berets created company-sized Mobile Guerrilla Forces to take the

ght to the enemy in his sanctuaries and sae havens. Tus the rst, and

maybe the only, proessional hunter-killer unit in Vietnam was created.

Te Mobile Guerrilla Force concept was developed in late 1966 by Colo-

nel Francis J. Kelly. He envisioned his concept as orming COIN hunter-

killer teams using clandestine counterguerrilla techniques to inltrateinto guerrilla areas o operation or the purpose o engaging enemy orces,

destroying their logistics, interdicting their lines o communication, and

creating a psychological climate o ear within the enemy’s mind as to his

saety while operating within his base areas. Tis action would also orce

the enemy to deend his bases and logistical centers, allowing the hunter

killers to control the pace and tempo o the operation. Tese company-sized

units were intended to conduct 30-to-60-day operations and were led by aU.S. Special Forces team.20 

Te creation o the Mobile Guerrilla Force in October 1966 provided an

active measure to seek out and destroy Viet Cong and North Vietnamese

Army (NVA) regulars enjoying sae haven and sanctuary in the III Corps

actical Zone. Named War Zone D, (and the Forbidden Zone by the enemy)

this territory was used by Viet Cong and NVA orces to establish base camps

and logistics areas within South Vietnam at the terminus o the Ho Chi

Minh trail; since this area was almost devoid o riendly orce control, theenemy could preposition and prepare or urther attacks into South Viet-

nam. Without sucient American and South Vietnamese orces to counter

this buildup, the concept to employ U.S. Army Special Forces and their

indigenous assets rom static base camps (along with light counterguerrilla

security patrolling) into a guerrilla orce easily won avor with General

Westmoreland.

Initially, Cambodian CIDG soldiers o Khmer Serei ethnicity were

recruited to orm the company under the command o Captain James “Bo”

Gritz. In his rst meeting on the concept, Colonel Kelly described what he

desired:

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 52/76

42

 JSOU Report 10-1

… a company-sized orce capable o conducting guerrilla operations

in War Zone D or periods ranging rom 30 to 60 days. Tis light

inantry company would have to operate without artillery support orchance o reinorcement. Te unit’s sole support would consist o a

single orward air control aircraf, tactical air strikes, and parachute

drops o ood, supplies, and ammunition every 4 days.21

Te Mobile Guerrilla Force consisted o about 160 to 170 men, orga-

nized into a headquarters platoon, reconnaissance platoon, and three or

our maneuver platoons, depending on the tactical operation. Te orce was

equipped with the standard U.S. equipment or weaponry and radios. Aferinitial training at the Ho Ngoc ao Special Forces camp (home o project

SIGMA—Special Forces and indigenous long-range Corps reconnaissance

teams), the ready company deployed to the Special Forces camp at Duc

Phong to begin missions in War Zone D.

Te Mobile Guerrilla Force conducted numerous operations in War

Zone D against the Viet Cong 9th Division and other NVA main orce regi-

ments. Tese missions were labeled “Blackjack” (Colonel Kelly’s nickname)

ollowed by a two-number designation denoting the Corps, then the mission

Figure 3. A Vietnam War era AC-47 gunship on display at the historicalAir Park, Hurlburt Field, Florida. These aircraft, along with other modelsof gunships, provided the long-range interdiction and close air sup-port res for teams operating without artillery support at long distanceswithin enemy safe havens and base areas.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 53/76

43

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

sequence (e.g., Blackjack 31 and Blackjack 32). Teir missions ocused on

the destruction o the enemy orces, his base camps, and enemy logistics

throughout the zone while also providing updated intelligence to the 1stInantry Division and other riendly conventional orces.

Te employment o the Mobile Guerrilla Force lasted until late 1967 when

the unit’s manpower was rolled into the larger mobile strike orce units

and the reconnaissance projects SIGMA and OMEGA. Te Mobile Guer-

rilla Force project represented one o the American military’s best attempts

to employ hunter-killer teams in a COIN environment. It also served as a

model or the contemporary evolution o COIN hunter-killer teams. Te

doctrine rom these hunter-killer operations, combined with increasinglevels o modern transport and technology to enhance these operations,

would orm the basis o uture success by SOF hunter-killer teams when

Operation Enduring Freedom changed rom a guerrilla warare scenario

into a COIN eort.

Te guarantee o the Mobile Guerrilla Force success in hunter-killer oper-

ations was in adhering to the ollowing principles o their employment:

Use o indigenous anda. SOF small units as a purpose-built organizationKnowledge o the terrainb.

Te role unconventional and audacious leadership plays in the usec.

o the hunter-killer team

Increased mobility with the use o helicoptersd.

Wide latitude to conduct independent operationse.

Modern resupply methods and a logistic system to support the unit.

Overmatch in repower (with the inclusion o close air support assets) tog. compensate or the unit’s lack o heavy weapons

A supportive quick reaction orce to reinorce beleaguered units.h.

Conversely, this COIN hunter-killer concept suered the historical ate o 

diferent units—not enough o them, not everywhere, and not long enough—

to have made an appreciable dierence at the operational level o war.

Post-Vietnam War, the 1980s and 1990s. Although the post-Vietnam War

period was rie with insurgencies around the world, the American military distanced itsel rom any uture entanglements in COIN environments,

losing much o the operational art and COIN acumen amassed rom the

Vietnam War. As the conventional military repaired and rebuilt itsel to

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 54/76

44

 JSOU Report 10-1

once again handle the major war spectrum, much o the necessary skills

needed to ght in irregular warare devolved to the special operations

community.Soon a more imposing threat entered the world scene: terrorism. o

remain viable, special operations began a narrow ocus o mission sets to

conduct counterterrorism operations. However, with ew deployments into

this irregular warare playing eld as a result o political constraint and

public reluctance, Special Forces returned to FID and security assistance

activities. Tis shi reinorced a notion amongst Green Berets that i you

cannot ght wars, get involved in teaching other people how to ght wars

in order to sustain your skills.While a ew brush wars occurred during this period (e.g., Grenada and

Panama) along with the major conventional war Operation Desert Shield/

Desert Storm, America was not challenged with an irregular warare adver-

sary requiring the employment o U.S. orces to conduct COIN mission

sets. At best, U.S. Army Special Forces trainers were able to maintain COIN 

hunter-killer knowledge when used as advisors in Venezuela, specically 

in the training o cazadores (hunter-killer) battalions and training hunter-killer battalions in the El Salvadoran Army.

One other initiative during this period, although not originally conceived

as a hunter-killer concept, was more than prescient in ensuring America

would have purpose-built hunter-killer teams when the need eventually 

arose. In 1984, Colonel James Guest—commander o the 5th Special Forces

Group (Airborne)—hereinaer reerred to as “the Group”—transerred an

experimental Special Forces company known as B-500 to Fort Bliss, exas

to develop the tactics, equipment, and operating principles or a desert,long-range, and mobile Special Forces capability.

B-500, Purpose-Built Hunter-Killer Team. B-500 was established in the

early 1980s by Colonel Guest to address the needs and requirements o the

Group or conducting desert warare in accordance with their war plans in

the United States Central Command (USCENCOM) region. Te overall

program or execution was named the Desert Mobility System, comprised

o weapons, soldier equipment, and mobility platorms (to include highaltitude parachutes) needed by the Special Forces soldiers or conducting

long-range, long-duration missions in a desert environment. In essence,

B-500 was a test-bed unit or the Group.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 55/76

45

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Te mobility platorm requirement was based on uture combat scenar-

ios, which required the Group to conduct a variety o missions involving

extreme inltration/exltration ranges. Te desire or a vehicular inltration

method was based on the shortage o airlif and special operations aviation

assets at the time, which could eectively hamper the employment o the

Group assets in a major war. Tus the parameter or 500 miles in and 500

miles out without resupply (and be able to operate up to 10 days) becamethe standard or a vehicular-mounted Green Beret team (the Special Forces

Operational Detachment–Alpha, the “ODA”).

By January 1985, B-500 moved rom Fort Huachuca to Biggs Army Air

Field in El Paso, exas with the ollowing tasks:

Build a mounted capability or an entire B-team with the 1,000-milea.

range without resupply, as the goal; serve as a test bed or experimental

 vehicles, which could be utilized in long-range desert operationsDevelop tactics, techniques, and procedures and manuals or theb.

conduct o mounted operations to serve as the basis or eventual

adoption as doctrine in the Special Forces

Figure 4. B-500 on a long-range mounted patrol in the desert near FortBliss, Texas

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 56/76

46

 JSOU Report 10-1

est a variety o weapons, communication gear, personal clothingc.

and tentage, parachutes, and so on or their useulness to conduct

operations in a desert environment under extended duration.

Te unit discarded the previous mobility platorms o one-quarter ton

 jeeps or modied M880 trucks and added homemade trailers to carry the

logistics and motorcycles required to conduct long-range desert operations.

Later the unit adopted the Army HMMWV variant as the preerred mobility 

platorm and conducted a series o 1,000-mile missions to gain experience.

Tese early trips provided an abundance o lessons learned or mounted

movement, and the unit wrote its rst mounted handbook to pass on oruse to other members o the Group. Along with the vehicle tests, the unit

also experimented or the rst time with satellite communications and navi-

gation (SACOM and SANAV) systems. Te Mk-19 and the .50-caliber

machine gun were also used in testing.

As a result o the positive eedback rom team members, the HMMWV 

was chosen as the vehicle o choice or mounted teams. Initially each team

was equipped with two M1025s (clamshell with ring mount and winch) and

two M998s (cargo version). During the testing period a great partnershipand association with the border patrol developed, and the border patrol

transerred some trucks and about 15 dirt bikes (350cc) to the unit (these

were contraband seized rom drug raids and considered ederal property).

When the entire Group was relocated to Fort Campbell, Kentucky the

B-500 unit reverted back to A Company, 1/5th and returned home to the

Group. Much o what B-500 accomplished would contribute to Special

Forces hunter-killer capability aer 9/11 as a orce in being .Operation Enduring Freedom. In the summer o 2002, the reemergence o 

the aliban as insurgents dictated a COIN response rom allied and coalition

orces. However, the expected war with Iraq meant continuing operations

in Aghanistan would be as an economy o orce, which ceded vast portions

o Aghan rural areas to the insurgents. Aghan security orces were scarce.

Counterguerrilla techniques used by the coalition were limited to close

proximity security patrolling; occupation o key, orward-operating bases

to maintain a presence; and battalion sweep operations conducted by the

 various allied and U.S. conventional inantry orces. Te predominance o 

SOF assets, both U.S. and coalition, ocused on counterorganization missions

to hunt down remaining Al Qaeda and senior aliban leadership while

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 57/76

47

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

simultaneously utilizing indigenous security orces to protect key pockets

o the population and interdict enemy eorts.

While hunter-killer concepts cannot work in isolation rom the myriado counterguerrilla techniques used by COIN orces, this situation provided

the exact environment or the employment o U.S. Special Forces mounted

teams to conduct hunter-killer missions as part o the eort to erode and

exhaust the aliban during 2002 and aer.

U.S. and coalition SOF, particularly those units with sel-contained

mobility and repower, were used on a variety o missions to roam in semi-

permissive and nonpermissive areas o Aghanistan. Te purpose was to

harass the enemy or nd, x and destroy the enemy either with organicrepower and close air support or in conjunction with larger conventional

reaction orces.

Based on intelligence, local inormation, and terrain analysis, Special

Forces mounted teams were employed across vast areas o “gridded” terrain

to ascertain enemy activities and strength within each grid. I successul,

enemy caches were destroyed, enemy sae houses cleared, and sanctuary 

areas (sae havens) were put at risk or aliban occupation. Most clashes withaliban orces were successul in eliminating or capturing enemy ghters.

Hunter-killer teams remained highly mobile with organically tailored

 vehicles. All patrols were designed or long-range operations in suspected

enemy territory, and although scarce resources in helicopters or these

unique operations could have limited the duration o hunter-killer team

deployment, a system o bundle and cargo drops or resupply guaranteed

increased time o the teams in the eld. Mission durations ranged rom a

couple o weeks to a 6-week operation by a coalition SOF contingent. Closeair support (CAS), either with xed-wing or rotary-wing assets, provided

long-range, heavy repower because artillery was not prevalent in the rst

years o the COIN period. Maneuvering with all terrain, heavy bed vehi-

cles aorded increased weapons platorms (.50-caliber, light machine gun,

A-4s, and MK-19 grenade launchers) to give the hunter-killer team’s re-

power overmatch against the aliban.

Just as in the Vietnam Mobile Guerrilla Force concept, hunter-killer

teams were optimized with indigenous, irregular orces in company 

strength. Teir vast knowledge o tribal aairs, local language, combined

with their intimate knowledge o the terrain, contributed to the overall

success o many o these patrols.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 58/76

48

 JSOU Report 10-1

An operation in one o the central provinces during the summer o 

2003 illustrated the eectiveness o the hunter-killer concept. During their

earlier war with the Soviets, the Aghan mujahideen made much use o themountain ranges near Kandahar as an inner sae haven and stronghold

to train, recruit, resupply, and ret. Tis area is comprised o harsh, high

desert mountains with very narrow valleys and small, isolated villages. A

 variety o indicators by the late summer o 2003 showed that the aliban

were regrouping in this area by the hundreds, presumably to aect the

upcoming all elections scheduled throughout Aghanistan.

Te Combined Joint Special Operations ask Force - Aghanistan directed

coalition and U.S. hunter-killer teams to conduct a probe into the area inorder to ascertain the extent o the aliban’s activity. Afer one contact

between a coalition SOF patrol and suspected guerrilla orce occurred,

a robust U.S. Special Forces hunter-killer unit was deployed along with

approximately 150 irregular orces provided by the governor o Kandahar,

Figure 5. Hunter-killer teams in Afghanistan employed the SOF groundmobility vehicle (modied HMMWV) to conduct long-duration and long-range counter safe haven and interdiction operations against Taliban forces

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 59/76

49

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

in anticipation o combat operations. As they drove deeper and deeper into

the mountain sanctuary, many o the villagers warned them o a large pres-

ence o enemy. Contact soon occurred by enemy ambush, which surprisingly was proessionally executed by the aliban and included the use o mortars

and snipers.

Tree days o ghting ensued; the hunter-killer unit was reinorced by 

a Quick Reaction Force rom the Kandahar-based Special Forces battalion,

while conventional orces readied or insertion to create a classic hammer-

and-anvil maneuver. As the ght progressed, hundreds o aliban were

either killed or captured as air support assets were added to the battle.

Sensing deeat, the remaining aliban elements attempted to exltrate thearea, but most were destroyed in continued engagements by AC-130 aircraf.

Estimates o enemy strength hovered around 500 insurgents. Te enemy 

was deeated, the sanctuary denied, and the all elections were successully 

conducted without the intererence o the aliban. It serves as one o the

21st century’s most successul hunter-killer operations on the part o U.S. 

orces to date.

Tis overall achievement was due to operating within the principles o hunter-killer operations, employing special purpose units, and leveraging

both technological enablers and the use o local, irregular orces in a COIN 

environment. Te hunter-killer unit was a standing organization, specially 

trained or the task. Te ground commander enjoyed broad scope in the

mission to conduct autonomous operations. As the battle grew, repower

overmatch was achieved. Resupply was immediate via rotary-wing assets

or xed-wing bundle drops.

Summary

While U.S. orces also ought irregulars and insurgents in Iraq, that insur-

gency is predominantly urban in nature and requires manhunting and

counterorganization skills to counter the enemy. Few situations during the

war in Iraq have aorded American orces the need to conduct hunter-killer

operations into enemy sae havens on the scale as they have in Aghanistan

(although the isolation, containment, and reduction o enemy orces in the

Fallujah urban sae haven provide valuable lessons).

Whether in the horse-and-musket period or in the period o contempo-

rary irregular wars, hunter-killer operations are one o the options to present

the enemy a series o dilemmas during counterguerrilla operations. As is

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 60/76

50

 JSOU Report 10-1

evident in the historical experiences, Americans have eectively employed

some orm o hunter-killer operations when aced with irregular warare

adversaries. From this body o knowledge we can derive uniying themesand principles or doctrinal adoption.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 61/76

51

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Principles of Hunter-Killer Team Employment5.during Counter Safe Haven OperationsWhenever you are ordered out to the enemy forts or frontiers for

discoveries, if your number be small, march in a single le, keep-

ing at such a distance from each other as to prevent one shot from

killing two men, sending one man or more forward and the like

on each side at the distance of 20 yards from the main body, if the

ground you march over will admit of it, to give the signal to the

ofcer of the approach of an enemy, and of their number....22

— Robert Rogers’ Rules or Plan of Discipline

In principle, hunter-killer operations aord sound tactics to create havoc

against irregular warare adversaries by operating in their space or

sabotaging and destroying their war-making assets and killing their

action arms—the guerrilla orces and auxiliary orces—in order to create

a loss o enemy combatants, lowering o morale, and sowing o dissensionand weariness. Counter sae haven hunter-killer operations are conducted

by small unit, specialized organizations who adopt the enemy’s style and

tactics in order to operate as eective counter-guerrillas. In that respect, U.S. 

hunter-killer teams allow the COIN orces to deny the enemy the chance to

continue protracting the conict.

Hunter-killer operations are one o the active measures in COIN to attack 

enemy organizations as part o the war o exhaustion and contribute to the

attrition o enemy combat power. A byproduct o hunter-killer operations isrst-hand inormation and intelligence-gathering capability while operating

in enemy territory.

Hunter-killer operations can vary in length, area o operations, and by 

type unit conducting hunter-killer activities against irregulars, but its main

operating principle is its purpose and aim: attrition o the irregular warare

enemy. Tis requires a second operating principle to be considered or any 

COIN-derived hunter-killer operation: they are conducted by penetrating

insurgent sae haven space, whether the space is denied or semipermissive

territory.

Hunter-killer operations have been conducted in combination with puni-

tive expeditions, but i employed in this manner, can quickly degrade into

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 62/76

52

 JSOU Report 10-1

using the hunter-killer orce or security o anks or or the conduct o 

reconnaissance missions or the larger conventional orce. General Persh-

ing’s expedition into Mexico against Pancho Villa’s irregulars illustratesthis approach.

Hunter-killer orces should never be ormed as a result o converting

conventional inantry orces, as the historical examples rom the Civil War

and the Vietnam War illustrated. Hunter-killer orces are not line inantry 

nor shock or raiding inantry. Rather they are uniquely tailored special  

inantry. Specialized inantry ormed as hunter-killer units generally cannot

achieve decisive blows, tactically or operationally, when employed or short

duration raiding purposes. Tey are also not pseudo-organizations, norcounterorganization units, although eects achieved in these two types o 

operations can be a byproduct o hunter-killer employment. More impor-

tant, however, hunter-killer operations should contribute to the attainment

o strategic and operational objectives.

Additional principles o employment derived rom the historical analysis

o the use o hunter-killer operations by the American military are helpul

to review or ormulating doctrine and include:Environmenta. . Hunter-killer teams are best employed during irregular

warare environments where the adversary conronting the U.S. and

its allies consists o insurgent orces o sucient size to eld a guerrilla

action arm, a supporting auxiliary, and a perceived sae haven or sanc-

tuary believed to be ree o riendly orces. Te ground commander

has made the conscious decision to conduct territorial oense type

operations or achieving desired counter sae haven eects.Command and controlb. . Hunter-killer operations require independent

maneuver in enemy territory; measures to deconict ratricide issues

are paramount when they are ongoing riendly operations. Graphic

control measures, such as unconventional warare operational areas

(UWOAs), and Blue Force tracker technology will assist in limiting

ratricide. Consideration should be given to the creation o  ree-re 

zones or orbidden zones in order to increase the exibility o the

hunter-killer orce. Unique passage-o-lines techniques are requiredi the hunter-killer orce resembles enemy insurgents. ailored rules

o engagement should be considered to give the hunter-killer orce

the widest latitude to take on enemy orces. Command and control

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 63/76

53

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

is attened and decentralized to the commander o the hunter-killer

orce. As an operating concept, hunter-killer orces should be under

the operational control o a special operations headquarters reportingdirectly to the joint orce commander.

Composition of the hunter-killer forcec. . Hunter-killer orces should

not be ormed ad hoc; standing, specialized orces with the inherent

characteristics or conducting hunter-killer operations are requisite or

success in the irregular warare environment. Hunter-killer organiza-

tions will be one o nontraditional organization and task organized

based on the context o the insurgency and irregular warare environ-

ment. Care should be taken to ensure the higher command supportsand sponsors its nontraditional employment. Hunter-killer units

should not be organized as commando or raiding orces. In orming

hunter-killer units, a small ootprint is desired. Individuals chosen

to man hunter-killer units should be specially  selected, sel-reliant,

and capable o adaptation to the environment and to the enemy’s

tactics and style. Tey must be independent in thinking, masters

o the ambush, and have a psychological make-up or operationsthat can be ruthless and lethal. Cultural and language skills or the

operational area are highly desired. Tey must have a natural ability 

to work with indigenous orces as part o the organizational structure.

Hunter-killer organizations will be amoeba-like with sel-organizing

traits to maintain their adaptability. Due to the high endurance opera-

tions, the orce must be in superior physical shape and be skilled in

living o the land.

Irregulars and indigenous orcesd. . Hunter-killer operations canachieve increased perormance when they incorporate indigenous

orces into their organization (as in General Crook’s use o Indian

scouts during his southwestern U.S. campaign against hostile Indians).

Tis may be through the use o turned enemy combatants (ormer

adversaries who now work or riendly orces to nd insurgents),

inormants, local scouts, or larger auxiliary orces. O most utility 

would be the training and equipping o oreign and indigenous hunter-

killer units to enhance partner capability; these orces could even be

employed as partner or proxy paramilitaries when U.S. involvement

is not desired or must be discrete (covert and clandestine).

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 64/76

54

 JSOU Report 10-1

Leadershipe. . Leadership above the hunter-killer organization’s level

o command must be highly supportive to ensure the survivability 

o an unorthodox and unconventional organization within the U.S. military structure. Specialized units enjoying a limited amount o 

control, wide latitude or independent operations, and a high reedom

o maneuver very oen risk the ire o traditional, ormal militaries;

they are ofen perceived as outliers with lack o discipline. Within the

hunter-killer organization, the leadership must be chosen or their

 vast knowledge o unconventional operations (understanding o the

employment o unorthodox operations), audacity, and the ability to

be independent and decisive. Leaders must be proven as capable o conducting innovative and nonconventional tactics. Successul lead-

ers o hunter-killer operations have tended to be highly charismatic

and aggressive.

Specialized training . . Hunter-killer units require specialized training

in enemy tactics and weaponry, long-range endurance operations,

inltration and exltration techniques, and combat techniques most

useul to the irregular warare ght. Advanced training in subversionand sabotage techniques, along with how to conduct psychological

action measures, will be required. Because hunter-killer operations

will be extended operations, sucient cross training o combat skills

is required in order to maximize the skill sets o each person, consid-

ering that personnel replacement opportunities may be limited. All

training should be done to the realistic conditions the hunter-killer

unit may expect to encounter.

Mobility g. . Te hunter-killer orce requires equal or superior maneu- verability and mobility to the enemy in order to succeed. Te orce

will require speed to outmaneuver the enemy in his territory and i 

required, speed to escape any counter attempts to destroy the hunter-

killer orce. Te highly preerred method is to mount the orce in

all-terrain vehicles that allow or increased range, can carry sucient

supplies or long duration, and provide platorms or additional re-

power. Aviation mobility is a key hunter-killer enabler; consideration

should be given to a direct support relationship between aviation units

and the hunter-killer unit or matters such as transport, resupply,

medical evacuation, and liaison.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 65/76

55

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Firepowerh. . Along with organic repower, with necessary overmatch

to any known insurgent capability in order to achieve local superiority,

the hunter-killer unit will require the integration o  reinorcing resi the eects o combat with the enemy begin to severely endanger or

attrit the hunter-killer orce. Long-range artillery (although this may 

have some limitations at deeper ranges), CAS, or res rom persis-

tent, armed unmanned aerial vehicle/system (UAV/UAS) platorms

are programmed as part o the hunter-killer operation. Larger quick 

reaction orces, notably with a raiding capability, orm part o the

backup or can reinorce escalation o orce as needed during planned

hunter-killer operations.Technology enablementi. . Hunter-killer units should be provided the

latest in technology to improve their combat perormance, endurance,

and orce protection. Hunter-killer doctrine or employment should

change as technology changes to maintain the ecacy o the nd-

x-destroy combat template. Tis will require an equipping process

to take advantage o rapidly emerging technologies. Additionally,

hunter-killer orces should be equipped with the latest sensor/coun-tersensor capability to expand their operational reach or to allow

them to conduct economy-o-orce operations.

Intelligence j. . Hunter-killer operations will require an unusually high

amount o intelligence on the enemy and the geography o the oper-

ating area. Dedicated platorms and intelligence support, combined

with the intelligence-gathering capacity o the hunter-killer opera-

tion, can help to achieve intelligence dominance within insurgent

sae havens.Sustainmentk. . Hunter-killer operations must be capable o tailored

long-range, long-duration missions, ofen outside the scope o riendly 

lines o communication. Limitations on combat service support must

be actored into the planning. In earlier periods o irregular warare,

this involved knowledge o living o the land and having the ability 

to be sel-sustaining (oraging or capturing enemy supplies). While

these eorts are still viable, technology-enabled hunter-killer teams

equipped with mobility platorms will require a logistics system to

support uniquely American gear i the orce is not totally equipped

to look like the enemy. Air support is the most important resupply 

capability or hunter-killer operations, whether it comes rom manned

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 66/76

56

 JSOU Report 10-1

or unmanned aerial resupply vehicles. Te hunter-killer organiza-

tion will also require innovative unding to conduct operations in

enemy territory (e.g., enemy script, gold, and barter materials) aswell as reliable unding mechanisms to support their organization.

A dedicated maintenance capability or the myriad o small arms,

 vehicles, and radios can provide a reach-back capability once the unit

is employed. Te hunter-killer organization needs an organic rapid

equipping capability or o-the-shel items and procurement o the

latest logistics assets to enhance the ght.

Tese principles capture uniying concepts to provide a ramework orthe doctrinal employment o hunter-killer operations. As irregular warare

operations continue around the world, the experiences and growing knowl-

edge o hunter-killer activities will add to COIN and irregular warare litera-

ture. For instance, how do we conduct hunter-killer operations on a hybrid

war battleeld? How should we conduct hunter-killer operations in an urban

environment?

Te American way o war in irregular warare includes hunter-killer

operations to varying eect—they are the asymmetric version o searchand destroy behind enemy lines or in their sae havens. It should be a clear

concept embodied in U.S. COIN manuals. However, to date there is little

doctrinal capture o hunter-killer units in COIN doctrine and a correspond-

ing absence o guidelines on how to employ them.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 67/76

57

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Conclusion6.

But now the need for the other kind of right stuff—the hunter’seye and ear—was making itself indispensable…. This was a war

in which everyone realized that enemy headquarters might at any

moment be visited, and not by noisy frontal formations making

themselves heard 10 miles away but by silently delivered, soot-face

marauders or by hunter-killer teams ying out of the sun or step -

ping from suburban hedgerows. Just as the wholesale slaughter of 

civilians reasserted itself in war, professional courtesy was breaking

down into a practice of targeting individuals—by ‘band of chosenand picked young men … sworn to stick together’—that might as

well have come out of Utopia, or at least the Dark Ages.23 

— Derek Leebaert, To Dare and To Conquer 

 A

ll eective COIN and counterterrorism security operations are

an orchestration o oensive and deensive measures to thwartthe insurgent action arm’s or the terrorist organization’s ability to

choose the time and the place o violence against the state. Oensive actions

allow riendly orces to control the operations tempo o the ght, throwing

the insurgent orce o balance and preventing the protraction o the conict.

Oensive actions allow counterinsurgents and counterterrorists the ability 

to get inside the enemy’s decision cycle. Oensive actions necessitate plans

that consider denying irregular warare adversaries their base areas, support

systems, and sae havens and erode or exhaust their will and manpower.Tese are enemy strengths, but they also have associated vulnerabilities.

While a variety o deensive counterguerrilla options aord COIN orces

time to neutralize, isolate, contain, or even manage areas ceded to the insur-

gents, the most eective measure is to take the oense to the enemy using

some application o the nd-x-destroy model. Hunter-killer operations are

oensive in nature and one o the means to nd, x, and destroy.

Hunter-killer operations, combined with other counter sae haven

measures, are the most eared by insurgents. Hunter-killer operations invade

insurgent space and destroy the myth o inaccessibility and security. Fight-

ing the enemy on his own tur disrupts his attempts to recover and ret, and

i handled eectively, can isolate supporting populations rom the irregular

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 68/76

58

 JSOU Report 10-1

warare adversary. Conducting operations at a riendly time and place o 

choosing creates a psychological eect o ear within the insurgents, who

never know i they are sae. Hunter-killer operations also erode and exhaustthe enemy through attrition, raising the contact rate between riendly orces

and the enemy.

Irregular warare history is consistently illustrative o the employment o 

some type o hunter-killer unit to interdict, harass, and track down insur-

gents in their territory. Since the colonial militia era in America, hunter-

killer operations have been included in personal writings, recommended

rules or tactical operations, or in U.S. doctrine, although the exact term

escapes capture. Te early military legacy on this subject was ormed inthe ranging experiences o independent Ranger companies. Te small-wars

period introduced mobile columns, ying columns, punitive expeditionary 

columns, and long-duration roving patrols. Aer World War II, as Ameri-

can experience in contemporary insurgency grew, these counterguerrilla

activities became raids, special operations, unconventional operations, and

interdiction tasks. Finally, in Operation Enduring Freedom, U.S. and coali-

tion SOF once again employed ormal hunter-killer operations to nd-x-destroy aliban insurgents. Tese operations were a morphing o ranging

and deep penetration raid techniques.

Employing hunter-killer operations is a doctrinally sound COIN tech-

nique proved by historical experience and also ound in some orm over the

years within our irregular warare doctrine, although not in any compre-

hensive manner. Te set o uniying principles or hunter-killer operations

derived in this paper may serve as a useul ramework to develop uture

doctrinal approaches on the employment o hunter-killer teams as a viablecounter sae haven measure.

In 2008 the Joint Chies o Sta sponsored a utures war game with a

hybrid war scenario pitting the U.S. and its allies against technologically 

enhanced irregulars. One o the options the participants chose to disrupt

enemy space was a orm o U.S. hunter-killer teams. It is time to include the

employment o hunter-killer operations into American irregular warare

doctrine and clearly in the next revision o the COIN eld manual.

What would a hunter-killer unit look like? O course it must be designed

within the context and requirements o the irregular warare scenario, but

the Figure 6 organizational chart is proposed merely as a point o departure

or urther discussion and development, based on the past experiences o 

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 69/76

59

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

U.S. hunter-killer operations. Inherent in this organization is the organic

mobility platorms o the strike teams to inltrate, operate or long duration,

and exltrate rom the operational area. Strike teams include a reconnais-sance and heavy weapons element. Indigenous orces are attached to the

strike teams to provide linguists, scouts, or ghters, based on the nature

o the hunter-killer operation. When required, conventional units can be

placed under the operational or tactical control o the hunter-killer unit

commander to acilitate task orce and joint operations.

Results o this study suggest that the SOF community should:

Continue to capture tactics, techniques, and procedures o ongoinga.

U.S. hunter-killer operations or updates to doctrine and continue

to expand our understanding o the eatures and attributes o sae

havens. We can broaden our knowledge on this subject through a

larger, comprehensive study o oreign hunter-killer practices in enemy sae havens to identiy best practices the U.S. military could put into

use. Te analysis derived rom these measures should orm the basis

Figure 6. Provisional Hunter-Killer Organization

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 70/76

60

 JSOU Report 10-1

o additions to the next doctrinal revision o COIN and irregular

warare publications.

Explore the easibility or the establishment o ormal hunter-killerb.organizations within the U.S. military. Currently, the U.S. Special Forces

perorm this role as a result o specialized training and its organic

long-range mobility teams. Historically, eective hunter-killer units

ail when they are organized in an ad-hoc manner or task-organized 

on the spot. Tey also are ineective when they are merely converted

conventional units. Hunter-killer units require specialized training,

equipment, autonomy, unconventional leadership, and reedom o 

action supported by the senior maneuver commander. One measurecould be to enhance the ranging concept in our Ranger ormations;

another measure might include the development o hunter-killer

teams within the U.S. Marine Corps’ Special Operations Command

units. A third measure could include the designation o selected light

inantry units to perorm hunter-killer operations. Te success o 

any o these additional measures relies on adherence to the derived

principles in the previous chapter.Ascertain the impact o new technology enablers in aviation andc.

unmanned aerial vehicle systems, remote logistics, repower, commu-

nications, and sensor and surveillance systems that would enhance

the capabilities o hunter-killer units and extend their endurance,

persistence, and presence.

As part o the shifing strategy to enable partners’ capability andd.

capacity, doctrine and procedures should be developed or provisions

in Security Force Assistance to create, build, equip, and employ oreignand indigenous hunter-killer units.

Explore the dynamics o employing hunter-killer operations in consorte.

with human inuence operations in order to implement psychological

action activities and to achieve desired behavioral eects on indig-

enous populations, enemy leadership, and external or tacit supporters

o any insurgency.

Hunter-killer operations are an oensive component o irregular warare.Employing hunter-killer units in a doctrinally sound manner, with adher-

ence to relevant operational principles, allows irregular warare orces

a means to strike the deep, strategic rear o insurgent bases. Hardcore

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 71/76

61

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

insurgents, ideologically driven, do not go away because they have been

separated rom the populace. Successul insurgent strategy allows or them

to revert to a reconsolidation phase in an area sae or their operation. COIN oensive orces—the hunter-killer teams—will still be needed to range deep

into the enemy’s domain to disrupt and destroy him.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 72/76

63

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Appendix. Recommended Readings

Alderman, Pat. Te Overmountain Men. Johnson City, N: Te Overmountain Press,.

Birtle, Andrew J. U.S. Army Counterinsurgency and Contingency Operations Doctrine860–4. Washington, D.C.: Center o Military History, U.S. Army, .

Brumwell, Stephen. White Devil: A rue Story o War, Savagery, and Vengeance in Colo-nial America. Cambridge, MA: DeCapo Press, .

Cassidy, Robert M. Counterinsurgency and the Global War on error: Military Cultureand Irregular Warare. Westport, C: Praeger Security International, .

Cline, Lawrence E. “Pseudo Operations and Counterinsurgency: Lessons rom OtherCountries.” Strategic Studies Institute Monograph. Carlisle, PA: U.S. Army WarCollege, June .

Cuneo, John R. Robert Rogers o the Rangers. New York: Oxord University Press, .

Downey, Fairax. Indian Wars o the U.S. Army 776–65. Garden City, NY: Doubleday & Co., Inc., .

Drake, James D. King Philip’s War: Civil War in New England 675–676 . Amherst, MA:Te University o Massachusetts Press, .

Dunkerly, Robert M. Kings Mountain Walking our Guide. Pittsburgh, PA: DorrancePublishing Co., Inc., .

Dunkerly, Robert M. Te Battle o Kings Mountain: Eyewitness Accounts. Charleston, SC:Charleston History Press, .

Dykeman, Wilma. With Fire and Sword: Te Battle o Kings Mountain 780. Wash-ington, D.C.: National Park Service, U.S. Department o the Interior, undatedpamphlet.

Eckert, Allan W. Tat Dark and Bloody River . New York: Bantam Books, .

Erickson, Don and John L. Rotundo. Charlie Rangers. New York: Ballantine Books,

.

Grenier, John. Te First Way o War: American War Making on the Frontier, 607-84  New York: Cambridge University Press, .

Hackworth, David H. (COL, U.S. Army, Ret.). About Face: Te Odyssey o an AmericanWarrior . New York: Simon and Schuster, .

Hatley, Allen G. Early exas Indian Wars 822–835. Honolulu, HI: alei Publisher’s,Inc., .

Hewitt, Peter. Kenya Cowboy: A Police Ofcer’s Account o the Mau Mau Emergency.

London: Avon Books, .Innes, Michael A. (ed.). Denial o Sanctuary: Understanding errorist Sae Havens. West-

port, C: Praeger Security International, .

Joes, Anthony James. Urban Guerrilla Warare. Lexington, KY: Te University Press o Kentucky, .

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 73/76

64

 JSOU Report 10-1

Knowles, Tomas W. Tey Rode or the Lone Star: Te Saga o the exas Rangers. Dallas,X: aylor Publishing Co., .

Leach, Douglas E. Flintlock and omahawk: New England in King Philip’s War . New York:W. W. Norton & Company, .

Leebaert, Derek. o Dare & o Conquer: Special Operations and the Destiny o Nations, rom Achilles to Al Qaeda . New York: Little, Brown and Company, .

Linn, Brian McAllister. Te Philippine War 8–02. Lawrence, KS: University Presso Kansas, .

Linn, Brian McAllister. Te U.S. Army and Counterinsurgency in the Philippine War 8–02. Chapel Hill, NC: University o North Carolina Press, .

Marston, Daniel. Te French-Indian War 754-760. Oxord, England: Osprey Publish-

ing Ltd, .

Moyar, Mark. Phoenix and the Birds o Prey: Te CIA’s Secret Campaign to Destroy theViet Cong . Annapolis, MD: Naval Institute Press, .

O’Neill, Bard. Insurgency & errorism: Inside Modern Revolutionary Warare. Washing-ton D.C.: Brassey’s, Inc., .

Plaster, John L. SOG: A Photo History o the Secret Wars. Boulder, CO: Paladin Press,

.

Plaster, John L. SOG: Te Secret Wars o America’s Commandos in Vietnam . New York:

Simon & Schuster, .Robinson III, Charles M. Te Men Who Wear the Star: Te Story o the exas Rangers .

New York: Random House, .

Ross, John F. War on the Run: Te Epic Story o Robert Rogers and the Conquest o  America’s First Frontier . New York: Bantam Books, .

Sallah, Michael and Mitch Weiss. iger Force. New York: Little, Brown and Company,.

Scoggins, Michael C. Te Day It Rained Militia. Charleston, SC: Te History Press,.

Silby, David J. A War o Frontier and Empire: the Philippine-American War, 8-02 ,New York: Hill and Wang, .

Stanton, Shelby L. Rangers at War: Combat Recon in Vietnam. New York: Orion Books,.

abor, Robert. War o the Flea: Te Classic Study o Guerrilla Warare. Washington D.C.:Brassey’s, Inc., .

Tompson, Leroy. Ragged War: Te Story o Unconventional and Counter-RevolutionaryWarare. London: Arms and Armour Press, .

Tompson, Robert. Deeating Communist Insurgency. St. Petersburg, FL: Hailer Publish-ing, .

Valeriano, Napoleon D. and Charles . R. Bohannan. Counter-Guerrilla Operations: TePhilippine Experience. Westport, C: Praeger Security International, .

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 74/76

65

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Webb, Walter Prescott. Te Story o the exas Rangers. New York: Grosset & DunlapPublishers, .

Webb, Walter Prescott. Te exas Rangers: A Century o Frontier Deense. HoughtonMifin Co., Cambridge, MA: Te Riverside Press, .

Wilson, David K. Te Southern Strategy: Britain’s Conquest o South Carolina and Geor- gia, 775-780. Columbia, SC: University o South Carolina Press, .

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 75/76

67

Celeski: Hunter-Killer Teams—Attacking Enemy Safe Havens

Endnotes

. Eric . Olson, Admiral, U.S. Navy. U.S. Special Operations Command Strategy200 (ampa: U.S. Special Operations Command, November ), p. .

. Ibid., p. .

. Colin S. Gray, Another Bloody Century: Future Warare (London, U.K.: PhoenixPress, ), p. .

. John J. McCuen, Te Art o Counter-Revolutionary War (St. Petersburg, FL: HailerPublishing, ), p. .

. C. E. Calwell (Colonel), Small Wars: Teir Principle & Practice, Bison Books

Edition (Lincoln, NE: University o Nebraska Press, ), p. .. A copy o Lt Col Landsdale’s paper can be ound in the Research Library at the

Air University, Maxwell Air Force Base, Alabama.

. FM -, Counterinsurgency Field Manual , Department o the Army and MarineCorps Headquarters, Washington, D.C., December , section I-.

. Te 9/ Commission Report: Final Report o the National Commission on errorist  Attacks upon the United States , section . (New York: W.W. Norton & Company,), pp. -.

. Tis denition was orwarded during an irregular warare challenges sympo-sium held in the Washington D.C. area during the spring o to members

o a working group and constitutes a consensus on the characteristics o a saehaven. Original slide handout is in author’s Counter Sae Haven and Hunter-Killer Operations research les.

. For another approach to analyzing sae havens, reer to “Ungoverned Areasand Treats rom Sae Havens , Final Report o the Ungoverned Areas Project,”prepared or the Oce o the Under Secretary o Deense or Policy by Robert D.Lamb, Oce o the Deputy Assistant Secretary o Deense or Policy Planning,available rom www.cissm.umd.edu/papers/les/ugash_report_nal; accessed November .

. Fairax Downey, Indian Wars o the U.S. Army 776-865 (Garden City, NY:Doubleday & Co., Inc., ), p. .

. John Grenier, Te First Way o War: American War Making on the Frontier (NewYork: Cambridge University Press, ), p. .

. Eric B. Schultz and Michael J. ougias, King Philip’s War: Te History and Legacyo America’s Forgotten Confict (Woodstock, V: Te Countrymen Press, ),pp. -.

. Douglas Edward Leach, Flintlock and omahawk: New England in King Philip’sWar (New York: Te Norton Library, W. W. Norton & Company, ), p. .

. John Grenier, Te First Way o War: American War Making on the Frontier (NewYork: Cambridge University Press, ), pp. -.

8/3/2019 Hunter-Killer Teams- Attacking Enemy Safe Havens

http://slidepdf.com/reader/full/hunter-killer-teams-attacking-enemy-safe-havens 76/76

 JSOU Report 10-1

. Major Ferguson’s brevet rank o lieutenant colonel was en route rom Englandwhen he died; thereore, he is ofen cited by historians and on some history markers with his title as Colonel Ferguson.

. Pat Alderman, Te Overmountain Men (Johnson City, N: Te Overmountain

Press, ), pp. -.

. Robert M. Cassidy (LC, U.S. Army), “Indigenous Forces and Sanctuary Denial:Enduring Counterinsurgency Imperatives,” Small Wars Journal , p. , available

at http://smallwarsjournal.com/blog///indigenous-orces-and-sanctuar/;accessed October .

. Robert M. Kennedy, Hold the Balkans! German Antiguerrilla Operations in theBalkans, 4-44 (Shippensburg, PA: White Main Books, ), p. .

. Gordon L. Rottman,  Mobile Strike Forces in Vietnam 66-70 (Oxord, U.K.:Osprey Publishing [Battle Orders ], ). p. .

. James C. Donahue, Blackjack 33: With Special Forces in the Viet Cong ForbiddenZone (New York: Ballantine Books, ), p. xiii.

. Henry Bouquet (Esq.), Warare on the Colonial Frontier: Te Journals o Major Robert Rogers (Bargersville, IN: Dresslar Publishing, ), p. . Reprinted roman original edition.

. Derek Leebaert, o Dare & o Conquer: Special Operations and the Destiny o Nations, rom Achilles to Al Qaeda (New York: Little, Brown and Company, ),

pp. -.