SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Politics for Pros- moderated

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: unclewest who wrote (216186)8/20/2007 4:37:25 AM
From: unclewest   of 793938
 
I remind that the only terrorist orgs that have ever been put completely out of business had every member killed or incarcerated. If that is our intent, our generals need to get on with it for we have 150 million more to kill.

I should add -

But, killing one insurgent always creates more in societies where familial and tribal relations and extreme variants of nationalism are stronger than any single ideology.

Such is the similar nature of starfish. If you cut off a leg it grows back. When chopped into small pieces some species of starfish can replicate themselves and form numerous completely new starfish. They have no central nervous system and no significant head that we could chop of to kill the entire organism. Instead a starfish has clusters (akin to AQ cells) of similar tissue loosely knit together with a few nerve strands. AQ is a starfish.

Realistically speaking, in a COIN environment, our definition of security is unimportant. We must understand what security means for local communities. That comprehension should determine the manner in which both hard and soft power are deployed.

On page 51 Petreaus lists eight, "Unsuccessful Counterinsurgency Operational Techniques."

I list them here so you can evaluate how successful we are at avoiding unsuccessful practices. Petraeus talked the talk. Is he walking the walk?

1. Overemphasize killing and capturing the enemy rather than securing and engaging the population.
2. Conduct large scale operations as the norm.
3. Concentrate military forces in large bases for protection.
4.Focus Special Forces primarily on raiding.
5. Place low priority on assigning quality advisors to host-nation forces.
6. Build and train host nation security forces in the US Military's image.
7. Ignore peacetime government processes, including legal procedures.
8. Allow open borders, airspace and coastlines.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext