Protection of Civilians Military Reference Guide, Second Edition Second Edition | 页面 35
Protection of Civilians Military Reference Guide
to achieve its critical capability. Plans should exploit the vulnerabilities of adversaries and
negative actors while mitigating the vulnerabilities of the military force and other actors. Usually,
final success can only be achieved by focusing on a combination of vulnerable critical
requirements so that the cumulative effect ultimately produces decisive results.
M ILITARY F ORCES
a. This category of actors normally includes only those organizations that are responsive to the
same chain of command (for example, superior, subordinate, and adjacent units from the same
national military) or coalition members. Other organizations, such as civilian, police, supportive
host-state security forces, and NGOs are considered as “positive actors” and are discussed later in
this task.
b. The center of gravity for military forces and some partners could be higher level political
will, legitimacy, command and control, the coalition, or specific forces such as mobile units or air
forces.
c. For military forces, critical capabilities may include: maintaining freedom of operation;
defeating or neutralizing threats; establishing the necessary conditions for PoC by supporting
stability, governance, development, and reconciliation; maintaining the support of the population;
and integrating with host state and other partners.
d. Critical requirements for military forces may include legitimacy; unity of effort; leadership;
logistics; command and control; mobility (including aviation); and intelligence, surveillance, and
reconnaissance capability.
e. For the military force, critical vulnerabilities may include friction with partners regarding
policies or burden-sharing; mistakes and transgressions that occur (such as civilian casualties or
criminal acts including sexual exploitation and abuse); host-state resentment of foreign troops; loss
of host-state consent; fragile domestic or international support for the mission; second-and-third
order effects such as an expansion of the conflict; extended and insecure lines of communication;
remote and vulnerable small forces (such as patrols and outposts); insufficient force to provide
widespread security; and the inability to meet the expectations of other actors. Some units may be
poorly-resourced, ill-trained, undisciplined, or nonresponsive to military superiors from other
nations. National caveats on force employment could limit the potential effectiveness of the force.
These critical vulnerabilities could reduce the military’s effectiveness, jeopardize the force’s
security, or undermine host-state consent at the tactical, operational, or strategic levels.
22