Preview

information paper

Powerful Essays
Open Document
Open Document
700 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
information paper
INFORMATION PAPER ILE Phase II Class 119 20 January 2014

SUBJECT: Advise and Assist Brigades/Modular Brigades Augmented for Security Force Assistance

1. Purpose: To provide an overview and information on the Advise and Assist Brigades/Modular Brigades Augmented for Security Force Assistance.

2. Facts:

a. Advise and Assist Brigades/Modular Brigades Augmented for Security Force Assistance (AABs/MBs-SFA) refer to brigades selected to conduct security force assistance. They are also called BCT-stability (BCT-S) or SFA brigades (SFABs). This is not a new formation, but a variant of the standard BCT augmented with additional forces, personnel or capabilities such as engineers, military police, and civil affairs experts to enable it to focus on SFA. The concept of AABs/MBs-SFA reflects a shift in how the army approaches SFA.

b. Army doctrine defines SFA as the unified action taken to generate, employ, and sustain local, host-nation, or regional security forces in support of a legitimate authority. 1 The training and assistance of foreign military forces used to be the mission of Army Special Operations Forces (SOF). The wars in Iraq and Afghanistan highlighted the need for large-scale training and assistance to Iraqi and Afghan conventional forces beyond the capacity of SOF. Therefore, the modular BCT has been modified to take on the task.

c. The 4th BCT of the 1st armored division formed the first AAB and deployed to Iraq in the spring of 2009 to provide proof of principle for the advisory brigade concept. Seven AABs were in Iraq during Operation New Dawn (OND) when the mission was changed from combat to SFA, and helped to enhance the quality and capacity of host nation security forces. There are currently 47,000 US troops in Afghanistan focusing mainly on training, advising and mentoring Afghan National Security Forces, preparing and setting the stage for the exit of coalition forces in 2014. Most recently,

You May Also Find These Documents Helpful

  • Good Essays

    Maj Woodard Case Summary

    • 311 Words
    • 2 Pages

    MAJ Woodard served as the Support Operations Officer (SPO) for the Area Support Group-Kuwait. She provided responsive logistics and sustainment for over 50,000 US and coalition forces in the ARCENT area of responsibility (AOR). Additionally, she was selected over two majors, as the interim Director of Logistics (DOL) and responsible for the training, health and welfare of 50 Soldiers, NCO's, Officers and DA Civilians, executing one of CENTCOM largest Kuwait-Base Operations Security Support Service (K-BOSSS) contract valued at $2.7b.…

    • 311 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    MFH OPORD

    • 2221 Words
    • 11 Pages

    a. Enemy Forces. N/A. b. Friendly Forces - United States Army Reserve Command (USARC) Staff, Major Subordinate Commands (MSCs), and Direct Reporting Commands (DRCs). c. Replacement OPORD.…

    • 2221 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Operation Anaconda: Joint Functions Operation Anaconda kicked off on March 2nd, 2002 and was at the time the largest operation in Afghanistan (Naylor, 2005). In the simplest of terms, Operation Anaconda was a success due to the number of casualties sustained by the enemy, however, in almost every other way the operation failed to accomplish its most basic objectives. According to Joint Publication 3-0, Joint Functions are broken down into six categories Command and Control, Intelligence, Fires, Movement and Maneuver, Protection, and Sustainment (U.S. Joint Chiefs of Staff, 2011). It is within these functions that the failures of the operation occurred, specifically within their role in the Joint Operation Planning Process (JOPP).…

    • 1347 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Tm 9-1240-413

    • 3184 Words
    • 13 Pages

    The Brigade Support Battalion (BSB) will perform field level maintenance or exchange tasks on damaged or failed M68…

    • 3184 Words
    • 13 Pages
    Satisfactory Essays
  • Powerful Essays

    Following World War II events, success, and failures show military and civilian leadership the importance of creating and sustaining a permanent Special operations Force within DoD and the Army. This paper will concentrate on the changes in the Special Forces and Psychological Operations Regiments. It will show what events and decisions that were made by congress that changed and the evolved the regiments since World War II. The operational environment…

    • 1614 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    sfas prep

    • 9643 Words
    • 51 Pages

    USAREC Pamphlet 601-25 Headquarters United States Army Recruiting Command Fort Knox, Kentucky 40121-2726 USAREC Pamphlet 601-25 14 November 2006 Personnel Procurement In-Service Special Forces Recruiting Program (Officer and Enlisted) Chapter 1. Introduction ..........................................................................................................................1-1 Chapter 2. SFAS Course and SFQC .....................................................................................................2-1 Chapter 3.…

    • 9643 Words
    • 51 Pages
    Powerful Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    A lessons learned report illustrating this fact states that HUMINT Soldiers were assigned guard shifts rather than supporting the Battalion in HUMINT Collection Team (HCT) operations (Torres 3). These types of scenarios breed low motivation and morale. Lack of training can result in Soldiers conducting Military Source Operations (MSO) in non-permissive environments exposing their operations, themselves, and sources to unnecessary risks and decreases the quality of HUMINT collection (Ray/Martinez 5). A final issue National Guard Soldiers face is their lack of skill in interrogations and detainee operations. Immature or inexperienced interrogators’ nonverbal communication telegraphs their lack of confidence and undermines their interrogation approaches (Ashley…

    • 710 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Special Operations Forces (SOF) and interagency activities go hand-to-hand in today’s operational environment. Understanding SOF authorities allow operators to articulate their operations with interagency partners. A military leader once described to me that understanding authorities meant you understood the "rules of the game.” The article, “Demystifying the Title 10-Title 50 Debate,” highlights the confusion over the “rules of the game.”…

    • 467 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The United States launched Operation Enduring Freedom (OEF) in Afghanistan on October 7, 2001 and Operation Iraqi Freedom (OIF) on March 20, 2003 in Iraq in order to combat terrorism and seek weapons of mass destruction (Hampson, 2010). Since then, “over two million troops have been deployed overseas” in support of these two wars (Tuerk, Yoder, Grubaugh, Myrick, Hamner & Acierno, 2011, p.397).…

    • 1437 Words
    • 6 Pages
    Better Essays
  • Good Essays

    A Paper

    • 1140 Words
    • 5 Pages

    The precipitated calcium carbonate is then filtered, dried, and weighed. The moles of calcium carbonate, CaCO3, are equal to the moles of Group 1 metal carbonate, M2CO3, added to the original solution. Dividing the mass of the unknown carbonate by the moles of calcium carbonate yields the formula weight, and thus the identity, of the Group 1 metal carbonate.…

    • 1140 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Rifleman Dodd

    • 701 Words
    • 3 Pages

    The author captures the history of America’s force in readiness and explains why their reputation is well-deserved. The part of the book was least effective was the amount of political and bureaucratic information and how overwhelming it felt. Though it did make up a large part of this book, it was still good information considering that is how we view ourselves and how our sister services view us.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    No longer associated with Reconstruction, it is a useful way to prevent the U.S. armed forces from directing their efforts against U.S. dissident groups. In October of 2008, the ACLU filed a request under the Freedom of Information Act with the Departments of Defense, Justice, and Homeland Security, demanding an explanation for the Army 's decision to station an active-duty military unit inside the United States. The program, entitled the Chemical, Biological, Radiological/Nuclear, and Explosive (CBRNE) Consequence Management Response Force, or CCMRF, were stationed for one year at Fort Stewart, Ga., with the expectation that another active-duty brigade will then take over, and that the deployment will be permanent. The first unit to be deployed will be the 3rd Infantry Division 's 1st BCT, or "First Raiders", which spent 35 of the last 60 months in Iraq. The unit 's explicit mission will be to provide support for civilian law-enforcement branches like local police and rescue personnel: it may be called upon in situations involving civil unrest, crowd control, or catastrophes like chemical, biological, or nuclear attack, and it will be trained in skills like search and rescue and crowd control. This is a direct violation of Posse Comitatus. The deployment of an active unit within the U.S. is also troubling given recent evidence of the Department of Defense 's involvement…

    • 1517 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Police Interview Paper

    • 503 Words
    • 3 Pages

    The Special Weapons and Tactics S.W.A.T are specialized police officers. These officers are highly trained in certain categories to with stand the duty of hostage rescue missions. Sometimes S.W.A.T officers come across heavily armed criminals that have barricaded their selves from police. Among other things this unit rarely does arrest warrants and drug raids on particularly dangerous…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    internet paper

    • 324 Words
    • 2 Pages

    It is nice to hear back from you and I would be glad to answer each one of your questions to the best of my ability. There are a lot of things that can be done on the internet. The internet is a wonderful thing to have access to. Having access to the internet can open up a new light to a whole different world. The internet connects people all over the world. The internet gives a person access to lots and lots of information that can be very valuable to them. It is very important in a lot of cases to know rather or not the information that you have accessed is reliable or not. Not know rather or not the information is reliable can cause some major problems. The way that I determine rather or not the information that I access is reliable is by looking for the author’s information so I can know who to give credit to for the information. I consider information credible when it contains a citation. I like to use information that is peer-reviewed because that to means that it is credible because it has been reviewed by other people and deemed to be credible. Knowing if information is credible is important but it is also important to know what to look for the signs that information may not be credible. I prefer to not use information if an author is not known unless I can prove it too credible in other ways. I do not like to use information that can be edited by other people because the information may be their opinion instead of a true fact. I do not like to use information that is out-dated because things in the world is changing at a rapid…

    • 324 Words
    • 2 Pages
    Satisfactory Essays