1-1. | Successful and unsuccessful counterinsurgency operational practices | 51 |
2-1. | Example interagency coordination checklist | 76 |
3-1. | Factors to consider when addressing grievances | 100 |
3-2. | Insurgency characteristics and order of battle factors | 101 |
3-3. | Critical information regarding popular support | 106 |
3-4. | Insurgent support activities and capabilities | 107 |
3-5. | Media forms insurgents use | 107 |
3-6. | Potential indicators of insurgent approaches | 114 |
3-7. | Examples of insurgent tactics | 115 |
3-8. | Potential sources of human intelligence | 122 |
3-9. | Comprehensive insurgency analysis tasks | 130 |
3-10. | Possible intelligence community assets in a division area of operations | 133 |
5-1. | Considerations for developing the information operations LLO | 162 |
5-2. | Considerations for developing the combat operations/civil security | 166 |
5-3. | Considerations for developing the host-nation security forces LLO | 168 |
5-4. | Considerations for developing the essential services LLO | 169 |
5-5. | Considerations for developing the governance LLO | 172 |
5-6. | Considerations for the economic development LLO | 173 |
5-7. | Example progress indicators | 192 |
5-8. | Examples of lethal and nonlethal targets | 193 |
6-1. | Staff functions required when training host-nation security forces | 207 |
6-2. | Characteristics of effective host-nation security forces | 208 |
6-3. | Security force pay considerations | 216 |
6-4. | Methods of training host-nation security forces | 221 |
-ix-