Professional Documents
Culture Documents
TELIC Insights' Work Recommended A Review of COIN DOC: Coin and Other Irregular Activities'
TELIC Insights' Work Recommended A Review of COIN DOC: Coin and Other Irregular Activities'
TELIC Insights' Work Recommended A Review of COIN DOC: Coin and Other Irregular Activities'
• DOC
Operation TELIC Lessons Volume 2
'Failure to recognise the evolving operational
environment and a paucity of Cross-Government and
Joint doctrine meant that the Coalition only adopted a
COIN-informed campaign plan in Aug 04.'
‘Lesson. Joint doctrine should be developed,
integrating UK Army COIN doctrine, into a Joint
publication to: reflect the capabilities of all Services in
a NEC environment; highlight the advantages of an
effects-based approach to COIN and counter-
terrorism.’
COIN REVIEW
Insurgency?
Terrorist attack?
Criminal activity?
Public Disorder?
Reality is complex
COUNTERING IRREGULAR ACTIVITY
• Takes recent experience, policy, historical
analysis and academic thinking.
• Considers the context, the Contemporary
Operating Environment: global, regional and
local threats from irregular actors. How such
activities can be categorised. Importance of
protecting the people.
• Military roles: home, overseas including
intervention. Both leading and supporting.
• Response to Insurgency, Terrorism, Disorder
and Criminality. Considering how they relate to
each other.
• Articulate as high level guidance.
Towards a Decidedly Irregular Future
Global Inequality and Imbalance - a global insurgency?
‘Global Justice Movement’
Grievance and Inequality
Populism and anti-capitalism
The culture of dissent
Weak states and uncertain safeguards
Criminalised States
Narco-states
Nihilists and anarchists
Boredom/ennui
Post-modern Irregular Features
Localised and Globalised
Porous Borders/Ungoverned space
Diasporae
Exploitation of weaknesses and anomalies in the International system
Abandonment of moral and legal constraints
Reach, Resources and access to military capabilities
Proxy activity
‘White Companies’
Network-enabled
Use of media and Cyberspace
Groups ‘morph’ through Disorder, Insurgency, Criminality and Terrorism