<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JOBS</journal-id>
      <journal-title-group>
        <journal-title>Journal on Baltic Security</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2382-9230</issn>
      <issn pub-type="ppub">2382-9222</issn>
      <publisher>
        <publisher-name>BDC</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JOBS-8-1-JOBS-2022-0005</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Finding Order in Chaos: Conceptualizing Resistance Command and Control Approaches</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Petit</surname>
            <given-names>Brian S.</given-names>
          </name>
          <email xlink:href="mailto:brian@garfieldsyndicate.com">brian@garfieldsyndicate.com</email>
          <xref ref-type="aff" rid="j_JOBS_aff_000"/>
          <xref ref-type="corresp" rid="cor1">∗</xref>
        </contrib>
        <aff id="j_JOBS_aff_000">Colonel Brian S. Petit, US Army, Retired</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume>8</volume>
      <issue>1</issue>
      <fpage>131</fpage>
      <lpage>149</lpage>
      <pub-date pub-type="epub">
        <day>04</day>
        <month>08</month>
        <year>2022</year>
      </pub-date>
      <history>
        <date date-type="received">
          <day>26</day>
          <month>03</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>09</day>
          <month>04</month>
          <year>2022</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Open Access. ©</copyright-statement>
        <copyright-year>2022</copyright-year>
        <copyright-holder>Brian S. Petit</copyright-holder>
        <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under the Creative Commons Attribution 4.0 International License.</license-p>
        </license>
      </permissions>
      <abstract>
        <p>Small nations, facing expansionist-minded and intrusive neighbors such as Russia or China, are revising their total defense strategies and plans. Within these total defense plans, nations are pre-planning citizen-based resistance schemes that rely on non-professionalized, civilian population segments to take an active role in resisting an occupying foreign power. Ukraine, invaded by Russia in February 2022, is one such nation enacting a whole-of-society resistance scheme under a brutal, high-intensity assault. How then, does a nation-state conceptualize, craft, and execute command and control for distributed resistance operations? This article first analyzes the substance and challenges of resistance and command and control. Next, a framework is presented on how to conceptualize an appropriate command and control scheme. Finally, practical examples are given of how resistance command methods proved effective or ineffective, and why. This article is designed to assist in the conceptualization, development, and implementation of national resistance command and control schemes.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>resistance operating concept</kwd>
        <kwd>command and control</kwd>
        <kwd>total defence</kwd>
        <kwd>resistance</kwd>
      </kwd-group>
    </article-meta>
  </front>

<body>


  <title>Introduction</title>
  <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_000"></xref>

  <p>The Russian invasion of Ukraine on February 24, 2022 was audacious in its direct approach: 
  line up tanks and infantry on the border, fabricate a flimsy reason for an invasion, 
  and attack a peaceful nation in broad daylight. Equally stunning was the speed with which Ukraine mobilized 
  its citizenry to join the Ukrainian security forces to fight the invaders. The young and the old, 
  the weak and the strong, the brave and the terrified: to the barricades they went. <italic>Aux armes, citoyens! 
  Formez vos bataillons!</italic> Beyond the emotions of the moment, Ukraine’s citizen-resistance plan had sufficient 
  legal structure, organizing principles, and materiel support to respond to the crisis. 
  Outcomes notwithstanding, Ukraine’s first act was successful. In a protracted conflict, can this whole-of-society 
  resistance withstand the pressure of a well- armed and vicious foe? This is the question that small nations with similar 
  total defense plans must ask themselves.</p>
  
  <p><italic>Total defense</italic> strategies and plans for threatened nations are a fast-developing discipline 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_019">(RAND Australia, 2021)</xref>.
    With the 2022 Russian invasion of Ukraine, there is a renewed urgency for nations to reconsider 
    how they will deter adversaries and defend themselves. The strategic logic is that once a nation’s 
    conventional defenses are defeated, a pre-planned citizen resistance will mobilize and asymmetrically contest the invaders 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_007">(Fiala, 2019, p. 17)</xref>. 
    This concept underpins the total defense plans of Estonia, Latvia, Lithuania, Poland, Georgia, 
    Singapore, and many more. The strategies and plans, however well-conceived, require attention to the difficult 
    implementing details: laws, logistics, rehearsals, interoperability, and command and control.
  </p>
  
  <p>One of the least addressed areas of <italic>total defense</italic> preparation is resistance command and control. 
    Practicing command and control is difficult because it is not a systemic task such as 
    firing an artillery barrage or facilitating a staff meeting. Command and control combines many disciplines. 
    Command and control, known as ‘C2’ is a mash-up of theory, philosophy, systems, risk, technology, and intuition. 
    Resistance-force command and control, both historical and modern, is a loosely defined discipline. 
    Resistance command-system approaches are as varied as the faces of resistance fighters themselves; 
    few methods are universally applicable.
  </p>
  
  <p>In my role as instructor for the US Special Operations Command (USSOCOM) Joint Special Operations University (JSOU), 
    I teach a national resistance course to US special operations forces and to US allies and partners. 
    One common challenge I see is how to devise and execute smart command and control arrangements 
    because of the great complexities involved. There is simply no one-size-fits-all solution. 
    his article provides a framework by which a state-sponsored resistance command and control scheme can 
    be conceptualized before it is built and employed. 
  </p>
  
  <p>First, I will define key concepts: resistance, and command and control. 
    Second, I will review the challenges of resistance command and control. Third, I will examine how to conceptualize 
    an appropriate command and control scheme. Finally, I provide practical examples of how and why resistance 
    command methods proved effective or ineffective.
  </p>
  
  <title>Command and Control Defined</title>
  <p>Command and control is shorthand for a designated leader that provides binding direction, 
    obligatory support, and operational control of subordinate units. Command is legal and lawful; 
    a formal relationship. It is normally seen in militaries. Control is the systems, processes, 
    and mechanisms (technology) used to regulate units and arrange tactical activities. 
    Control is implemented by rules of engagement, communicated directives, professionalized norms, 
    operational graphics, delineated responsibilities, and synchronizing orders 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_011">(Joint Publication 3-0, 2017, III-2)</xref>. 
  </p>
  
  <p>Most militaries use some form of <italic>commander’s intent</italic>. This is a broad description of ‘success’ and 
    how the enemy and the friendly forces should look like at the conclusion of a battle or engagement. 
    Intent facilitates initiative and creativity when battle plans go awry. A statement of intent might proclaim 
    ‘no enemy soldiers will cross the Red River,’ or ‘fight hard but give up ground before you are overrun’. 
    Intent protects against failure and confusion. Intent recognizes that no contact with an enemy goes as 
    planned and that individual judgement must be applied 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_023">(Army Doctrine Publication 6-0, 2019, p. 1-9)</xref>.
  </p>
  
  <title>Resistance Defined</title>
  <p>The term ‘resistance’ refers to the portion of a population that fights because they refuse to accept 
    the rule of an unwanted or illegitimate occupying power. 
  </p>
  
  <p>The <italic>Resistance Operating Concept </italic> 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_007">(Fiala, 2019)</xref>, jointly published in 2019 by 
    Special Operations Command Europe and the Swedish Defence University, 
    offers a more prescriptive definition centered on national resistance. Resistance is ‘a nation’s organized, 
    whole-of-society effort, encompassing the full range of activities from nonviolent to violent, 
    led by a legally established government to reestablish independence and autonomy within 
    its sovereign territory that has been wholly or partially occupied by a foreign power’ 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_007">(p. 21)</xref>.  
  </p>

  <p>In this article, we will categorize resistance as individuals and groups – 
    official and unofficial – that have the common goal of resisting an invading foreign power or 
    illegitimate ruling entity. We will assume that this resistance operates under some ruptured public order and 
    that resistance actors and activities occur under the threat of surveillance, arrest, or death.
  </p>
  
  <p>Societal-wide resistance holds great promise but comes with difficult organizational challenges. 
    Anything so conceived as ‘whole-of-society’ that performs a full range of activities 
    does not lend itself to a tidy command and control line-and-block chart. 
    Thus, how does a nation account for the distributed nature of resistance movements
     while retaining some measure of quality control?
  </p>

  <title>Resistance Command and Control Challenges</title>
  <p>There are three common command and control challenges present no matter the scope and scale of the citizen-resistance plan.</p>

  <p>The first is enemy pressure. Resistances are typically weaker forces 
    that are outnumbered and technologically disadvantaged. Adversaries such as Russia and China, 
    in contested spaces, can and will target resistance command and control nodes. 
    Even a resistance force with a well-built, well-rehearsed, and thoroughly understood military-style 
    command and control structure becomes vulnerable to detection and attack from a sophisticated enemy. 
    Two examples offer clear lessons in the vulnerability of command structures when facing capable opponents.
  </p>
    
  <p>In Ukraine in 2014 and again in 2022, Russian Federation regular forces showed speed 
    and accuracy in direction-finding and lethally attacking Ukrainian units using 
    technical communications: radios, radar, and electronic signatures 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_013">(Kofman, et. al, 2021)</xref>. 
    One non-technical counter to this was to cease electronic signatures altogether. 
    In order to do so, field units were then crippled in their efforts to communicate, coordinate, and maneuver. 
    A second example was the September 2020 war in Nagorno-Karabakh. A modernized Azeri force fielded new sensors that, 
    when integrated with legacy systems, produced effective, lethal targeting of Armenian formations 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_021">(Spencer and Ghoorhoo, 2021)</xref>. 
    Armenian command and control was often rendered ineffective, contributing to its battlefield defeat.
  </p>

  <p>Such precision and technologically enabled counter-network measures can disrupt a resistance’s ability to direct, 
    coordinate, and synchronize tactical actions. For this reason, the classically arranged and technology-reliant 
    ‘military command’ methods, with a readily detected and recognizable signature, may not be advisable.  
  </p>
  
  <p>The second challenge is that resistance forces are not, strictly speaking, commanded or controlled. 
    As a special forces officer trainee in the mid-1990s, this was taught to us both in doctrine and in field exercises. 
    <italic>Resistance forces are to be influenced, not commanded</italic> 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_023">(USASOC, 2016)</xref>. Great Britain’s storied World War I 
    resistance fighter, T.E. Lawrence, warned that ‘under the very odd conditions of Arabia, 
    your practical work will not be, perhaps, as good as you think it is’ 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_015">(Lawrence, 1917)</xref>. 
    Lawrence’s advice assists when applying doctrinal military command and control schemes to resistance actors. 
    Command and control approaches must recognize that resistance actors – 
    irregulars, volunteers, auxiliary forces, foreign fighters, 
    and accidental guerillas – may not fall under proper legal and lawful command authority. 
    Nor are these forces necessarily responsive to ‘control’ mechanisms that predictably direct, 
    support, or otherwise compel tactical units.
  </p>
  
  <p>The third challenge accepts that resistance is comprised of citizens, part-timers, 
    and otherwise non-professional security actors who possess poor security habits, 
    have questionable inter-operability skills, and, by design, are often compartmented or 
    otherwise isolated from classic supporting mechanisms. For certain, this can be mitigated 
    by systems, methods, training, and rehearsals. However, I recommend that the default planning 
    assumption presumes that modest skills and poor security practices are the norm; this is the safe 
    bet at least until training and rehearsals show some demonstrated competence and mutual understanding.
  </p>
  
  <title>Commanding and Controlling: To what End?</title>
  <p>To craft an appropriate C2 method, one must begin with the <italic>why</italic>. Design-thinking is useful here. 
    Start by asking why you are needed to command and control and what <italic>value</italic> you provide to higher, 
    lateral, and lower elements. Ask what <italic>risk</italic> is introduced with your actions balanced 
    against the <italic>rewards</italic> provided 
    for the resistance elements.
  </p>

  <p>As a former commander of distributed operations – across nations, time zones, with regulars and irregulars, 
    operating in jungles, urban settings, deserts, and marine environments – my 
    organizations became progressively better at asking these questions of our own unit. 
    The answers might surprise you. When we adapted to our environment and our threats, 
    our organizational structure and operational systems often strayed far from well-known military, 
    doctrinal practices. This was healthy. Adaptations, in general, are a healthy sign of a thinking, 
    responsive organization. Excessive adaptations, however, can add up to a messy mix of <italic>ad hoc fixes</italic>, 
    non-standard methods, and a mélange of people and platforms 
    that were designed for something entirely different. 
    This was not healthy; it was rife with risks, mishaps, and costly lessons learned. 
    Applying appropriate command and control constructs <italic>prior to</italic> crisis is one way to stay on the healthy 
    side of adaptation and avoid the pitfalls and risks of late-in-the-game adjustments.
  </p>
  
  <p>Command and control typically involves seven functions: 
    <italic>plan, direct, coordinate, synchronize, monitor, support, and assess</italic> 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_014">(JP 3-0, III-3)</xref>. 
    In an ideal world, form follows function. This means that your command organization 
    tailors itself around the performance of these tasks. In a resistance situation, one may be under constant attack 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_022">(Stringer, 2021)</xref>. 
    Enemy pressure and survival requirements may dictate the form that your resistance must take; 
    from there, you adapt to provide your necessary command functions.
  </p>
  
  <p>From a non-doctrinal standpoint, appropriate resistance command and control borrows from managerial 
    mechanisms that lie outside of standard military manuals. We can learn from police, business, criminal syndicates, 
    smugglers, logisticians, financiers, cultural influencers, and distribution services. 
    Bounded by an appropriate ethical framework, the leveraging tactics used by these organizations are often better 
    suited for controlling irregulars, volunteers, and ostensibly neutral parties. 
    While this may sound obvious or intuitive, most uniformed service doctrine does not address this topic. 
    To fill in that gap, we will visualize ‘to what end’ command and control serves and how these methods can 
    be conceptualized and crafted thereafter.
  </p>
  
  <title>Conceptualizing Command and Control</title>
  
  <p>The triangle model in Figure 1.1 helps us conceptualize resistance command and control approaches. 
    The triangle helps us match the organization type with an appropriate control method. 
    Inside the triangle are the four types of organizations that form a whole-of-society resistance. 
    Outside of the triangle are the four methods of C2 that best match those organizations. 
    A one-to-one congruence is not the goal of such a model, which instead offers a way in which to self-assess and, 
    as a first step, avoid gross mismatches.
  </p>
  
  <graphic orientation="landscape" position="float" xlink:href="Figure1.png"/>
  <p><italic>Figure 1.1. Aligning C2 to Group Types. (Source: Author’s own).</italic></p>
  
  <p>There are four basic C2 approaches to consider. The top level is <bold>Classic C2</bold>. 
    Trusted, disciplined security forces typically use this control approach. 
    This is hierarchical and authoritative; it is responsive to top-down directives. 
    This is the level where legal, lawful, authoritative command conforms most closely to its doctrinal form. 
    The advantage in Classic C2 is that one organizing agency can control and synchronize many parts into one whole. 
    If a group aims to control and synchronize air, ground, cyber, and human elements, then Classic C2, in whole or in part, 
    must be present. This form of C2 is informed by experience and judgement, but also uses a systems 
    approach when coordinating functions such as intelligence, logistics, and maneuver.  
  </p>
  
  <p>The second level, <bold>Influence C2</bold>, ranges from organizations that simply need guidance and clarity 
    to act to those who have unidentified contributions to make but need a direction, permission, and resources. 
    This type of C2 accounts for the nascent resistance energy that simply needs to be directionally oriented, 
    but not necessarily fully synchronized or controlled. This group might include lone-wolf hackers, combat-skilled veterans, 
    and self-focused groups who have interests aligned with the resistance. In Ukraine in 2022, 
    this category included angry citizens who simply felt compelled to stand their ground and fight for their 
    neighborhood and country 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_014">(Kossov, 2022)</xref>.  
  </p>

  <p>At level three, <bold>Leverage C2</bold> addresses groups with no obligation to resist, 
    but given the right incentives, can and will do so. Level three is the ‘trust but verify’ type resistors; 
    this is often where fence sitters can be found. Some of the Ukrainian militia units that fought 
    Russian separatists and Russian regulars in East Ukraine in 2014 fit into this category. 
    These militias, some privately funded, were not fully accountable to the Ukrainian government, 
    but when provided the right incentives and support, they performed valuable combat roles that served the state well. 
  </p>
  
  <p>The bottom level, <bold>Contain C2</bold> addresses groups from capable-but-dubious 
    intent to those whose actions might discredit the resistance movements. 
    This is where we find enthusiasts, looters, foreign fighters, ideologues, profiteers, criminals, 
    or groups that simply operate on a transactional basis (i.e., I help you, you help me). 
    These groups often attract thrill seekers or those more interested in the chaos and violence than political outcomes. 
    These types are a risk to the legitimacy and credibility of the resistance, 
    but they can also provide asymmetric threats to occupying forces. Ukraine’s Azov Battalion, 
    formed in March 2014 following Russia’s annexation of Crimea, is one such example. 
    The Azov Battalion was a privately funded militia. The unit gained notoriety for its neo-Nazi ideology and became 
    equally famous for its successful combat operations against Russian separatist groups. 
    The Ukrainian government both distanced itself from Azov and tacitly supported their much-needed combat power 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_018">(Mironova, and Sergatskova, 2017)</xref>. 
    This balancing act explains the ‘contain’ in Contain C2. 
  </p>

  <p>These C2 levels can and should be blended. Law enforcement and internal security services operate daily in this blended range. 
    Whereas military forces thrive in the Classic C2 spectrum, law enforcement – and the 
    criminals who they seek to catch – often possess better tools, skills, and methods allowing them to work within 
    these four C2 approaches. 
  </p>

  <p>Illustrating a full spectrum command and control scheme, based on these principles, 
    is beyond the scope of this article. Rather, I will offer two examples where we can observe 
    the logic of this triangle model in play, in whole or in parts. These vignettes help us visualize the environment,
     the organization, and the command scheme and how they worked, or did not.
  </p>

  <title>Vignette #1. Provisional Irish Republican Army (PIRA)</title>
  <p>In 1969, a new faction of the Irish Republican Army (IRA) formed, called the ‘Provisional Irish Republican Army’ or PIRA. 
    This splinter group aimed to bring new ideas, energy, and actions to the relatively dormant Irish independence movement. 
    The PIRA conducted a thirty-year campaign (1969 – 1998) to expel the British from Northern Ireland and to 
    unite all counties and peoples of Ireland under the single government of the Republic of Ireland. 
    They achieved neither goal, though their campaign did achieve concessions and revisions 
    that addressed many of the key grievances that drove the PIRA to violence 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_017">(McKittrick and McVea, 2012, p. 290)</xref>. 
    The lessons of the PIRA are instructive because they provide us with an example of thirty years 
    of resistance command and control observations. We can balance these lessons with well-documented observations 
    from the counter-resistance, the United Kingdom military and constabulary forces. 
  </p>
  
  <p>The PIRA campaign reveals an evolution of strategies, organizational structures, and command arrangements 
    during its protracted campaign 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_006">(Dingley, 2012, p. 105)</xref>. 
    This was a resistance under pressure; most of the command adaptations occurred because of the persistent 
    and skilled pressure of their opponent. Three observations instruct nations interested in developing 
    resistance command structures that are nested inside larger, total defense strategies and schemes. 
  </p>
  
  <p>The first lesson is that the PIRA command and control scheme that appeared to be hierarchical and classic military-style, 
    did not actually function as its ‘line-and-block’ chart would suggest 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_008">(Field, 2017, p. 11-23)</xref>. 
    The organizational scheme did not, and could not, actuate a classic top-to-bottom command and control system. 
    The desire for a clear hierarchical scheme was valid and well-intended. The 1920s IRA formed a military organization that would, 
    in time, become the legitimate armed security force of the independent Irish state. Thus, 
    the IRA adopted a classic brigade, battalion, company system of organizing and fighting. 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_023">(ARIS, 2013, p. 49)</xref>. 
    However, the IRA was declared an illegal army, and their military activities were considered crimes. 
    When the PIRA split from the IRA in 1969, they adopted new tactics, but they maintained, in general terms, 
    the IRA’s hierarchical command structure 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_023">(ARIS, 50</xref>, and <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_006">Dingley, 2012, p. 158)</xref>. 
    This early PIRA organizational structure (1969-1976) better befitted a fielded army than a clandestine urban-warfare unit. 
    Their military-style organizational structure made their units easier to detect, infiltrate, and dismantle 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_006">(Dingley, 2012, p. 163</xref>, and <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_017">(McKittrick and McVea, p. 151)</xref>. 
    This mismatch of organizational structure and operational environment took nearly eight years to rectify. 
    It was not until 1977 that the PIRA adopted a more cellular, 
    underground structure befitting the urban nature of the conflict 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_006">(Dingley, p. 157)</xref>.  
  </p>
  
  <p>The second lesson is that hierarchies deliver more sustained violence, over time, than distributed networks 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_009">(Heger, et. al, 2008)</xref>. 
    The arc of PIRA field actions conforms to this research finding. The peak of PIRA-inflicted violence was 1972; 
    the fourth year of a thirty-year campaign. In short, the more the PIRA became distributed, 
    the less they were able to sustain violence against the perceived occupying forces. 
    In the modern era, we see the power and reach of distributed, flat networks that lack a central headquarters. 
    This is the central argument of <italic>The Spider and the Starfish</italic> 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_003">(Brafman and Beckstrom, 2006)</xref>. 
    There is great value and utility in decentralized organizations. Yet, when it comes to operationalizing 
    field activities that require the synchronization of materials, skills, operators, safe havens, and reconnaissance, 
    having a hierarchy bolsters its advantages. After UK forces disrupted or dismantled PIRA command and control nodes, 
    PIRA operations became more localized, more random, and less frequent. 
  </p>
  
  <p>The third lesson is that distributed command and control is a breeding ground for poor or misguided tactical actions. 
    Whether distributed C2 is desired by design or required due to external pressures, 
    it risks lower echelons conducting violent actions that work counter to the strategy. 
    One former PIRA operative, Eamon Collins, recounted in his 1997 memoir:
  </p>
  
  <p>I was seriously alarmed by my cousin Mickey’s degeneration. He seemed to have lost any sense of the wider perspective, 
    and was just obsessively absorbed by the details of the next killing. He hadn’t the slightest interest in a 
    long-term strategy for victory. He was hardly alone in this regard – and that was the problem: 
    no one seemed to be coming up with any clear analyses of where the movement was going and what the next step should be … 
    revolutionary violence now detached from any political strategy 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_005">(Collins, 1997, p. 177)</xref>. 
  </p>

  <p>Here, the PIRA experienced a common effect of becoming too decentralized. There are a great number of 
    decentralized resistances or fighting groups whose leadership became too detached from certain operational 
    cells and lost any true command or quality control influence. This list includes the Chechens (1990s-2000s), 
    Al Qaeda (2000s), and Boko Haram (2010s). This trend also includes professionalized, accountable security forces: 
    police, military, special operations, and internal security services.
  </p>
  
  <p>When overlaying the PIRA command and control onto the triangle chart, we can see that the 
    PIRA did move more fluidly between these types of C2 methods. This is to be expected when a resistance is 
    structured around existing social networks that cut across society, geography, industry, and demographics. 
    The members of homegrown resistances might lack an appreciation for following orders (Classic C2)
     but instead may possess hard skills in negotiating, leveraging, or coercion. 
     Instructive here is to ascertain the essence and tendencies of certain resistance groups (criminals to clergy) 
     and to map a method of C2 that best accounts for their optimal use. The method also must anticipate and account 
     for their negative tendencies. In command parlance, this might be called the trust-but-verify approach.  
  </p>
  
  <p>The PIRA example offers us both good and bad lessons. The PIRA were efficient in that they maintained a 
    hierarchical system with some form of centralized control over their distributed networks. 
    The PIRA did maintain constant pressure on the British government and security forces even when under tremendous stress, 
    alternating between politics and violence. The PIRA C2 design, from strategic guidance to tactical actions, 
    started to break down under over time as the United Kingdom dismantled networks and cells 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_016">(McGovern, 2019</xref>; 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_002">Bennett, 2009)</xref>. 
    The lesson is that resistance cells, teams, and individuals who lack adequate control and supervision, 
    can be isolated and destroyed or can drift into a war of their own making, detached from the larger strategic purpose. 
    The outcome of this – violence detached from strategy– works counter to the legitimacy of the resistance.   
  </p>
  
  <p>For any nation seeking to employ national resistance as part of its total defense strategy, 
    the PIRA lessons provide a useful example of how hierarchies might be pressured under occupation. 
    The triangle chart aims to show methods that match well with the type of resistance groups seeking to
     operate under the watchful eye of an occupier.
  </p>

  <title>Vignette #2. Mismatch: Adapting for Counterinsurgency</title>
  <p>As a special forces company commander in Iraq in 2003-2004, 
    my unit witnessed the emerging Iraqi insurgency develop before our eyes. Insurgent actions were widely distributed, 
    and their operating networks largely evaded our detection methods. 
    Their initial targets were local actors and power brokers; this indicated a competitive push to assert their authority 
    in power flows that were invisible to our eyes. Some emerging cells were amateurish or sloppy; 
    we could map and target these with relative success. Increasingly, however, insurgent actions such as roadside bombs, 
    targeted killings, and extortion were cost-imposing enough to isolate us from still-neutral populations. 
    We did not know it at the moment, but we were losing. 
  </p>

  <p>The sophistication of the insurgent cells increased in proportion to the amount of the time that they observed 
    our coalition forces operating techniques. To combat these network flows and nodes,
     we needed the logic and tools at the bottom of the triangle: money, permissions, actionable trigger-points, 
     cultural queues, easy-to-field equipment, the means to attract local influencers. 
     Instead, we were armed with classic C2 methods and tools and with operating practices that conformed 
     to force-on-force warfare. We were also under skilled in understanding cultural, religious, and environmental peculiarities. 
     In line with our tradition as US Army Special Forces, we offset this by partnering with local actors, 
     both official and unofficial. Like all coalition units at that time, we adapted. We innovated or 
     put together the tools that worked best in the <italic>influence, leverage, and contain</italic> methods. 
     Did we learn, adapt, and apply fast enough? The evidence suggests that we did not, at least not on a scale that mattered 
     <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_020">(Rayburn and Sobchak 2019)</xref>.  
  </p>

  <p>Typically, in these ambiguous environments, ground units in contact with the enemy understand and adapt first, 
    followed by their higher headquarters. We conformed to this model exactly. I was commanding six, 
    twelve-man special forces operational detachments – alphas, or ‘A-Teams’. In this ecosystem, the A-teams, 
    the lowest unit of action, adapted quickly. Tactical approaches were not dictated from the top down; 
    they were coming from the bottom up. The A-teams were in a battle of wits, tactics, and counter-tactics, 
    with lethal consequences. These adaptations came so fast that neither my company headquarters, 
    nor my battalion headquarters could deliver the right tools fast enough. Even when we, the higher headquarters, 
    understood and agreed with our A-teams, we could not adapt ourselves quickly enough to deliver the required tools to 
    <italic>leverage, influence, and contain</italic> in this specific environment.  
  </p>
  
  <p>In this situation, two phenomena occurred. First, the ground units (A-teams in this example) 
    simply muddled through and used the tools that were provided and available to them. 
    Second, the ground units improvised using innovation, ingenuity, and at times, illegal means. 
    As an example, this might mean using money allocated for food to purchase tactical equipment for local fighters. 
    One might witness tactical innovations such as providing weapons and training to the team interpreters, 
    all local nationals. These might seem standard tactics now, but in 2004, these were sticky issues that took precious time 
    and energy to resolve. To meet the demand of the mission and the environment – and not be scrutinized or punished – 
    my company headquarters often did not report these activities. This was risky because such behavior begins to build 
    corridors of mistrust between higher and lower command levels. Such mistrust can bleed into a command’s confidence 
    in their field operators, even when those operators are performing exceptionally well in volatile environments.  
  </p>

  <p>As a ground commander, I had no mental framework to help me understand this mismatch of our capabilities, 
    systems, and tools, and the environment in which we operated. In retrospect, I could have benefitted from 
    something akin to the above C2 triangle model to understand and explain this tension. 
    Had I been better able to frame this tension, I believe that we – as a top-to-bottom C2 system – 
    would have innovated faster and adapted more rapidly. On reflection, I had very good commanders. They were adaptive, 
    they were not risk averse, and they were open to new approaches. However, they, like me, 
    were constantly reconciling the requirements of the environment against our preconceived mental models for C2. 
    My higher commanders were being asked to underwrite a high volume of unconventional ideas, 
    not all of which they could observe, understand, or process. When this occurs, decision-making systems 
    get sluggish and unresponsive, giving the advantage to the resistance. 
  </p>
  
  <p>This vignette illustrates how we had a mismatch of C2 methods to environmental demands. 
    If resistances can operate in this seam, they can gain and maintain first-mover advantage. 
    We can see reflections of this vignette in the Ukraine-Russia war. The early evidence suggests that the Russian 
    invasion plan executed in late February 2022 did not make proper planning assumptions about the behaviors of 
    Ukrainian regular or citizen-resistance forces 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_001">(Barnes, et. al, 2022)</xref>.
    Thus, Russian tactics, 
    in the first weeks and months of the war, largely failed to achieve their tactical objectives: 
    to decisively seize Kharkiv, Kyiv, and certain Black Sea cities and ports 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_010">(Institute for the Study of War, 2022)</xref>. 
    Time, mass, and a brutal campaign of annihilation may well reverse this trend. For the moment, 
    credit is due to the Ukrainian defense and resistance forces that have presented such dilemmas 
    to the Russian field generals. Russian decision-making has become difficult, and the slow tempo of the invasion 
    is evidence of this effect 
    <xref ref-type="bibr" rid="j_jobs-2022-0005_ref_004">(Cooper, Schmitt, 2022)</xref>.  
  </p>

  <title>Resistance Command and Control Methods in Support of Total Defense</title>
  <p>When a state calls upon all its able citizenry to defend the nation, how it organizes and controls or 
    influences this resistance energy is critical. Within a whole-of-society resistance, 
    there will be capable groups who are revolutionaries, extremists, anarchists, or profiteers. 
    These can be useful if understood, contained, and controlled. Conversely, there will be resistance energy 
    that is righteous and selfless; these resistors simply need a proper organizational structure to operate within. 
    Both the dark and the light side of national resistance can be productive if pre-planned command and control systems 
    and mechanisms account for these realities.
  </p>

  <p>In preconceiving and prebuilding a national resistance scheme, command and control approaches need to account 
    for all levels of this triangle. By categorizing the complexities of C2 into the triangle framework, 
    a resistor can better visualize himself or herself inside their resistance organization, within their environment, 
    and against their enemy. 
  </p>

  <p>If, as we witnessed in Ukraine, a nation’s population does rise up against an invading force, 
    a state that seeks to maintain its governing primacy must be ready to operate across this C2 spectrum. 
    It must do so with speed and clarity. A state must be ready to use a variety of sticks and carrots to exert control and 
    influence on a mass scale. Doing so will help ensure that resistors follow a coherent strategy and maintain governing legitimacy. 
    Performing this efficiently involves the use of incentives that sustain the productive resistance groups and 
    coercive measures that redirect the counterproductive resistance actors. 
  </p>

  <p>Ukraine was dealt a mighty blow by a massive invading force. As of this writing, their initial state-sponsored 
    and citizen-initiated resistance mechanisms have proven to be effective. The Ukrainians stymied a swift Russian victory, 
    and the conflict is trending toward a long, grinding war of attrition. Ukraine has maintained an 
    admirable national unity, both spiritually and organizationally. In the coming long war, 
    there lurks potential problems for Ukraine: rule of law breakdown, rogue insurgent groups, extrajudicial killings, 
    and the decaying effects of exhaustion. All these risks are manageable and are worth taking to expel the invaders 
    and restore sovereignty. 
  </p>
  
  <p>Sound command and control schemes cannot deter all threats to the resistance, 
    but sound C2 can assure that resistances remain survivable, viable, and oriented to repelling foreign invaders. 
    If these objectives are met, success probabilities for favorable post-war outcomes increase. 
  </p>
  
  <p>The Russian invasion in Ukraine gives immediacy to this topic. 
    For nations crafting or slow-building national resistance schemes, the time is now to conceptualize, 
    craft, and rehearse resistance command and control.
  </p>


</body>
<back>
  <ref-list id="j_jobs-2022-0005">
    <title><lable></lable>Bibliography</title>



<ref id="j_jobs-2022-0005_ref_001">
  <mixed-citation publication-type="journal">
    <bold><surname>Barnes</surname>, <given-names>Julian</given-names>; 
      <surname>Jakes</surname>, <given-names>Lara</given-names>; <surname>Ismay</surname>, <given-names>John</given-names>.
     (<year>2022</year>)</bold>
     ‘<article-title>U.S. intelligence suggests that Putin’s advisors misinformed him on Ukraine</article-title>’, 
     <italic><source>The New York Times</source></italic>. 
      , [Online] <day>30</day> <month>March</month> <year>2022</year>. 
      Available at: 
      <ext-link xlink:href="https://www.nytimes.com/2022/03/30/world/europe/putin-advisers-ukraine.html">https://www.nytimes.com/2022/03/30/world/europe/putin-advisers-ukraine.html</ext-link>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_002">
  <mixed-citation publication-type="journal">
    <bold><surname>Bennett</surname>, <given-names>Huw</given-names>. 
      (<year>2009</year>)</bold> 
      ‘<article-title>The Reluctant Pupil? Britain’s army and learning in counter-insurgency</article-title>’, 
      <italic><source>Royal United Services Institute (RUSI)</source></italic>
       , [Online] <day>11</day> <month>October</month> <year>2009</year>. 
      Available at: 
      <ext-link xlink:href="https://rusi.org/explore-our-research/publications/commentary/reluctant-pupil-britains-army-and-learning-counter-insurgency">https://rusi.org/explore-our-research/publications/commentary/reluctant-pupil-britains-army-and-learning-counter-insurgency</ext-link>.  
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_003">
  <mixed-citation publication-type="book">
<bold><surname>Brafman</surname>, <given-names>Ori</given-names> and <surname>Beckstrom</surname>, <given-names>Rod</given-names>. 
(<year>2006</year>)</bold> 
<italic><source>The Spider and the Starfish: The Unstoppable Power of Leaderless Organizations</source></italic>. 
<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Penguin Group</publisher-name>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_004">
  <mixed-citation publication-type="journal">
<bold><surname>Cooper</surname>, <given-names>Helene</given-names> and <surname>Schmitt</surname>, <given-names>Eric</given-names>. 
  (<year>2022</year>)</bold>
 ‘<article-title>Russia’s War Lacks a Battlefield Commander, U.S. Officials Say</article-title>’, 
 <italic><source>New York Times</source></italic>. 
 [Online] <day>31</day> <month>March</month> <year>2022</year>. 
 Available at: 
 <ext-link xlink:href="https://www.nytimes.com/2022/03/31/us/politics/russia-military-ukraine.html">https://www.nytimes.com/2022/03/31/us/politics/russia-military-ukraine.html</ext-link>. 
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_005">
  <mixed-citation publication-type="book">
<bold><surname>Collins</surname>, <given-names>Eamon</given-names> with <surname>McGovern</surname>, <given-names>Mick</given-names>. 
  (<year>1997</year>)</bold> 
  <italic><source>Killing Rage</source></italic>. 
  <publisher-loc>London, UK</publisher-loc>: <publisher-name>Granta Books</publisher-name>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_006">
  <mixed-citation publication-type="book">
<bold><surname>Dingley</surname>, <given-names>James</given-names>. 
  (<year>2012</year>)</bold> 
  <italic><source>The IRA: The Irish Republican Army,/</source></italic> 
  <publisher-loc>Santa Barbara, CA</publisher-loc>: <publisher-name>Praeger</publisher-name>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_007">
  <mixed-citation publication-type="book">
<bold><surname>Fiala</surname>, <given-names>Otto C.</given-names> 
  (<year>2019</year>)</bold> 
  <italic><source>The Resistance Operating Concept</source></italic>. 
  <publisher-name>Special Operations Command Europe (SOCEUR)</publisher-name> and <publisher-name>the Swedish Defence University</publisher-name>. 
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_008">
  <mixed-citation publication-type="journal">
<bold><surname>Field</surname>, <given-names>Anthony</given-names>. 
  (<year>2017</year>)</bold> 
  ‘<article-title>The Hollow Hierarchy: Problems of Command and Control in the Provisional IRA</article-title>’, 
  <italic><source>Journal of Terrorism Research</source></italic>
    , JTR, 
    Volume <volume>8</volume>, Issue <issue>3</issue> – <month>October</month> <year>2017</year>. 
    <publisher-name>The Centre for the Study of Terrorism and Political Violence</publisher-name>. 
    <publisher-loc>Saint Andrews, Scotland, UK</publisher-loc>. 
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_009">
  <mixed-citation publication-type="journal">
<bold><surname>Heger</surname>, <given-names>Lindsay</given-names>; <surname>Young</surname>, 
  <given-names>Danielle</given-names>; <surname>Wong</surname>, <given-names>Wendy</given-names>. 
  (<year>2008</year>)</bold> 
  ‘<article-title>Organizing for Resistance: How Group Structure Impacts the Character of Violence</article-title>’, 
  <italic><source>49th Annual Conference of the International Studies Association, San Francisco, CA</source></italic>. 
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_010">
  <mixed-citation publication-type="book">
<bold><given-names>Institute for the Study of War, The Russia Team</given-names>. 
(<year>2022</year>)</bold> 
<italic><source>Ukraine Conflict Update 19. [25 March]</source></italic>, 
<publisher-loc>Washington D.C.</publisher-loc> 
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_011">
  <mixed-citation publication-type="book">
<bold><given-names>Joint Chiefs of Staff, United States military</given-names>. 
(<year>2017</year>)</bold> 
‘<article-title>Incorporating Change 1, 22 OCT 2018</article-title>’, 
<italic><source>Joint Publication 3-0 Joint Operations</source></italic>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_012">
  <mixed-citation publication-type="book">
<bold><surname>Kitson</surname>, <given-names>Frank</given-names>. 
  (<year>1971</year>)</bold> 
  <italic><source>Low Intensity Operations: Subversion, Insurgency, Peace-keeping</source></italic>. 
  <publisher-loc>London, UK</publisher-loc>: <publisher-name>Faber</publisher-name>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_013">
  <mixed-citation publication-type="book">
<bold><surname>Kofman</surname>, <given-names>Michael</given-names> et. al. 
(<year>2021</year>)</bold> 
<italic><source>Russian Military Strategy: Core Tenets and Operational Concepts</source></italic>.  
<publisher-loc>Washington D.C.</publisher-loc>: <publisher-name>CNA</publisher-name>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_014">
  <mixed-citation publication-type="journal">
<bold><surname>Kossov</surname>, <given-names>Igor</given-names>. 
(<year>2022</year>)</bold>
 ‘<article-title>Ukraine’s New Military Branch: Citizens Protecting Their Neighborhood</article-title>’, 
 <italic><source>Politico</source></italic>. 
 [Online] <day>13</day> <month>February</month> <year>2022</year>. 
 Available at: 
 <ext-link xlink:href="https://www.politico.eu/article/ukraine-russia-military-citizen-reservist-defense/">https://www.politico.eu/article/ukraine-russia-military-citizen-reservist-defense/</ext-link>. 
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_015">
  <mixed-citation publication-type="journal">
<bold><surname>Lawrence</surname>, <given-names>Thomas Edward</given-names>. 
  (<year>1917</year>)</bold>
   ‘<article-title>27 Articles</article-title>,’ 
   <italic><source>The Arab Bulletin</source></italic>. <day>20</day> <month>August</month> <year>1917</year>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_016">
  <mixed-citation publication-type="book">
<bold><surname>McGovern</surname>, <given-names>Mark</given-names>. 
  (<year>2019</year>)</bold>
   <italic><source>Counterinsurgency and Collusion in Northern Ireland</source></italic>.
    <publisher-loc>London, UK</publisher-loc>: <publisher-name>Pluto Press</publisher-name>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_017">
  <mixed-citation publication-type="book">
<bold><surname>McKittrick</surname>, <given-names>David</given-names> and <surname>McVea</surname>, <given-names>David</given-names>. 
  (<year>2012</year>)</bold>
   <italic><source>Making Sense of the Troubles: A History of the Northern Ireland Conflict [Revised edition]</source></italic>. 
    <publisher-loc>London, UK</publisher-loc>: <publisher-name>Penguin</publisher-name>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_018">
  <mixed-citation publication-type="book">
<bold><surname>Mironova</surname>, <given-names>Vera</given-names> 
  and <surname>Sergatskova</surname>, <given-names>Ekaterina</given-names>. 
(<year>2017</year>)</bold>
 ‘<article-title>How Ukraine Reined in its Militias: The Lessons for Other States</article-title>’, 
 <italic><source>Foreign Affairs</source></italic>. 
 [Online] <day>1</day> <month>August</month> <year>2017</year>. 
 Available at: 
 <ext-link xlink:href="https://www.foreignaffairs.com/articles/ukraine/2017-08-01/how-ukraine-reined-its-militias">https://www.foreignaffairs.com/articles/ukraine/2017-08-01/how-ukraine-reined-its-militias</ext-link>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_019">
  <mixed-citation publication-type="book">
<bold><surname>Nicholson</surname>, <given-names>Joanne</given-names>, et. al. 
  (<year>2021</year>)</bold> 
<italic><source>Defense Mobilisation Planning Comparative Study: An Examination of Overseas Planning</source></italic>. 
<publisher-loc>Santa Monica, CA</publisher-loc>: <publisher-name>RAND Australia</publisher-name>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_020">
  <mixed-citation publication-type="book">
<bold><surname>Rayburn</surname>, <given-names>Joel D.</given-names> and <surname>Sobchak</surname>, <given-names>Frank K</given-names>. 
  (<year>2019</year>)</bold> 
  <italic><source>The U.S. Army in the Iraq War – Volume 1: Invasion – Insurgency – Civil War, 2003-2006</source></italic>. 
<publisher-loc>Carlisle Barracks, PA</publisher-loc>: <publisher-name>United States Army War College Press</publisher-name>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_021">
  <mixed-citation publication-type="book">
<bold><surname>Spencer</surname>, <given-names>John</given-names> and <surname>Ghoorhoo</surname>, <given-names>Harshana</given-names>. 
  (<year>2021</year>)</bold> 
  ‘<article-title>The Battle of Shusha City and the Missed Lessons of the 2020 Nagorno-Karabakh War</article-title>,’ 
  <publisher-loc>West Point, NY</publisher-loc>: <publisher-name>Modern War Institute (MWI)</publisher-name>. 
  <publisher-name>United States Military Academy</publisher-name>, 
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_022">
  <mixed-citation publication-type="book">
<bold><surname>Stringer</surname>, <given-names>Kevin D.</given-names> 
(<year>2021</year>)</bold> 
‘<article-title>Survival in the Russian Occupied Zone: Command and Organization in Resistance Underground Operations</article-title>’, 
<italic><source>Military Review</source></italic>, 
<month>July – August</month> <year>2021</year>, p. <fpage>125</fpage>-<lpage>132</lpage>. 
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_023">
  <mixed-citation publication-type="book">
<bold><given-names>United States Army</given-names>. 
(<year>2016</year>)</bold>
 <italic><source>Unconventional Warfare Pocket Guide</source></italic>. 
  United States Army Special Operations Command (USASOC). <publisher-loc>Fort Bragg, NC</publisher-loc>.  
  </mixed-citation>
</ref>

<ref id="j_jobs-2022-0005_ref_024">
  <mixed-citation publication-type="book">
<bold><given-names>United States Army</given-names>. 
(<year>2019</year>) </bold>
<italic><source>U.S. Army Doctrine Publication 6-0, Mission Command: Command and Control of Army Forces</source></italic>. 
  <publisher-loc>Washington, D.C.</publisher-loc>
  </mixed-citation>
</ref>
      

</ref-list>
</back>
</article>