Irregular Warfare/Evolving Threats (IW/ET)
Develop adaptive and agile ways and means to support irregular warfare in the current and evolving strategic environments. Support joint, interagency, and international partners who conduct irregular warfare through indirect and asymmetric approaches with solutions to erode an adversary’s power, influence, and will. Identify material and non-material solutions via operational analysis, concept development, field experimentation, and spiral delivery of capabilities to defeat the motivations, sanctuaries, and enterprises of targeted state and non-state actors.
The Irregular Warfare Support Program (IWSP) builds capacity and capability for Irregular Warfare from a defense-interagency-international perspective. It develops cross-domain blended capabilities necessary to enable sustained counterterrorism and counterinsurgency operations. It develops adaptive and agile ways and means to support irregular warfare in current and evolving strategic environments. This program leverages ongoing research efforts of U.S. Special Operations Command (USSOCOM), the military departments, Department of Defense agencies, and other federal agencies to analyze, design, prototype, and demonstrate enduring technical and operational capabilities. IWSP projects blend several disciplines including tactics, operations, doctrine, policy, information, training, and technology.
Conduct research, operational analyses, capability design, and implementation support to enable forces to understand dispositions and intentions as well as characteristics and conditions of the threat and operational environment that bear on national, coalition, interagency, and military decision making.
Building Partner Capacity
Conduct research, operational analysis, capability design, and implementation support in order to enable the Department of Defense to assist, train, advise, and influence foreign partners, foreign competitors, adversary leaders, military like forces, and relevant populations by developing and presenting information and conducting shaping activities to affect their perceptions, will, behavior, and/or capabilities. This includes research and development that supports the conduct of communication, shaping missions, and activities, but does not include kinetic operations or maneuver of forces for the purpose of influence.
Indirect Communications Support
Conduct research, operational analysis, capability design, and implementation support within the scope of traditional military information operations to enhance and improve client organization efforts to erode adversaries’ power, influence, and will through proactive and responsive informational, psychological, and other irregular operations. IWS seeks to increase the efficacy of military information operations while decreasing the likelihood of direct action environments.
Conduct research, operational analysis, capability design, and spiral experimentation support to increased U.S. and appropriate partners’ understanding of hostile forces, current and evolving tactical and operational environments, and opportunities for successful irregular warfare operations.
Mission Rehearsal and Exercise
Conduct research, operational analysis, capability design, and implementation support to increase U.S. and coalition partners proficiency in, and capacity to wage, irregular warfare on target states and non-state actors. IWS seeks to further the art and science of irregular warfare operations and their understanding in the appropriate agencies, forces, and bodies of government.
Conduct research, operational analysis, capability design, and implementation support to synchronize interagency, allied and coalition irregular warfare efforts. IWS refines current capabilities, assists with the definition of gaps, and develops capabilities necessary for friendly forces to prevent and prevail in future conflicts.
Pursuit and Denial
Conduct research, operational analysis, capability design, and implementation support to enable client organizations to better apply indirect and asymmetric force to identify, disrupt, deny, exploit, manipulate, and destroy hostile organizations and their supporting enterprises.