Other Security Forces Too:
Traditional Combatant Commander Activities Between U.S. Special Operations Forces and Foreign Non-Military Forces
Volume 227 Issue 4 2019
I. Introduction
On the night of September 11 and morning of 12 September 2012, more than sixty terrorists conducted three different armed attacks against two U.S. facilities in Benghazi, Libya. 1 Over the course of eight hours, the attacking forces overwhelmed the facilities’ on-ground security teams with small arms and mortar fire, killing four Americans, including the U.S. Ambassador to Libya. 2
During the attacks, the U.S. Department of Defense repositioned aerial assets, 3 teams of Marines, 4 and two teams of special operations forces: the European Command (EUCOM) Commander’s In-Extremis Force (CIF), which was on a training mission in Croatia when the attacks began, and a separate Special Operations Forces (SOF) team based in the United States. 5 To the detriment of the besieged U.S. personnel, only unmanned, unarmed aerial surveillance assets arrived on-scene by the time the survivors and deceased were en route from Benghazi. 6 Given more time, both U.S. SOF teams would have deployed to the crisis scene. 7 As it was, they made it no farther than a staging base in Sigonella, Italy before the evacuation was complete. 8
Of the two teams, the regionally-aligned CIF is generally more responsive and offers emergency action capabilities for missions such as hostage rescue and noncombatant evacuation, including the capability to immediately assault targets as required. 9 Typically arriving on-scene later, the SOF team based in the United States complements the CIF with more robust capabilities. 10 As a consolidated crisis response force, both teams must coordinate and be prepared to operate in combination with on-scene security forces to eliminate a threat. 11 In Benghazi, had the SOF teams arrived in Libya, this would have meant coordination and operations with overwhelmed security teams comprising of personnel from the U.S. Department of State Bureau of Diplomatic Security, the U.S. Central Intelligence Agency, the Libyan National Police, a local militia, and a local security contractor. 12
Interagency and international coordination are difficult tasks under the best of circumstances, and become near superhuman in the midst of defending against a multi-pronged attack. At that point, any pre-existing familiarity between an inbound U.S. SOF teams and the on-scene security forces is critical to quickly and effectively eliminating the threat. Unfortunately, the legal framework for building familiarity with foreign security forces rests on an uncertain foundation and U.S. SOF teams entering crises like the Benghazi attacks, may find themselves fighting alongside strangers.
A. Purpose
Through the cloud of political controversy 13 surrounding the Benghazi attacks at least one clear question emerged: What can the United States and its agencies do better next time? The multiple investigations into the Benghazi attacks probed this question from multiple avenues of approach 14 and this article does not rehash or critique the investigations or their findings. Instead, this article focuses on a relatively narrow avenue not previously considered: clarifying and refining the legal and policy frameworks affecting U.S. SOF’s ability to enhance interoperability with security forces of friendly foreign countries before a crisis occurs or before a planned operation. With an understanding of legally permissible pre-operational activities with foreign forces, legal advisors can provide the type of accurate and nuanced advice that enables U.S. forces to build key relationships with foreign forces, enhancing readiness through information sharing, combined planning and preparation, and combined safety and familiarization activities.
For this narrow issue, it is important to detail where the law ends and policy begins. As touched on throughout this article, 15 existing restraints on pre-operational activities that hinder U.S. SOF’s ability to build relationships with foreign non-military forces, such as the Libyan National police and local militia that responded to the Benghazi attacks, are largely policy based, but often take on the color of law because the policy is long-standing and not widely understood.
To be clear, terrorist attacks like the ones in Benghazi are not the only reason pre-operational activities between U.S. SOF and other security forces of friendly foreign countries are important. The example of the Benghazi attacks is salient, but U.S. SOF’s congressionally mandated responsibilities extend beyond counterterrorism and include other activities, such as civil affairs and foreign internal defense, 16 that necessarily entail working side-by-side with other security forces of friendly foreign countries. 17 This article argues that, when applied to U.S. SOF, the legal framework governing pre-operational activities with foreign forces does permit engagements with other security forces of friendly foreign countries, even in the absence of express statutory authority, and that the policy framework should follow suit in order to enhance U.S. SOF readiness for future combined exercises and operations.
B. Defining “Other Security Forces”
Consistent with Chapter 16, Title 10 United States Code, which details the statutory authorities available to the Department of Defense (DoD) for security cooperation with foreign forces, this article distinguishes between “military forces of friendly foreign countries” and “other security forces of friendly foreign countries.” 18 Although used throughout Chapter 16, neither term is formally defined. Instead, Chapter 16 defines the related term “national security forces,” which, for most purposes, encompasses only government forces at the national level, and not subnational or non-governmental forces. 19 This leaves open the question of whether the defined term subsumes “military forces” and “other security forces” or whether the latter terms, as used in Chapter 16, are also intended to include subnational and non-governmental forces. This article uses “military forces” to refer to national-level military forces and “other security forces” to refer to non-military national, subnational, and non-governmental forces. This is consistent with the DoD’s definition of “security forces,” which distinguishes between “military forces” and a wide range of other forces, including governmental forces (at all levels of government) and non-governmental forces. 20
C. Roadmap
Part II of this article lays the fiscal law groundwork for the U.S. SOF focused discussion to follow, first reminding readers of the three pillars of fiscal law analysis—purpose, time, and amount—focusing on the three-pronged necessary expense rule underpinning any analysis of whether appropriated funds are being used for a valid purpose. From there, Part II progresses to a discussion of The Honorable Bill Alexander; the GAO opinion emphasizing the DoD’s circumscribed role in security sector assistance activities and articulating the DoD’s authority to undertake pre-operational combined-forces activities for “safety and familiarization . . . in order to ensure ‘interoperability.”’ 21 Part II then introduces the concept of Traditional Combatant Commander Activities (TCA) as an expanded set of pre-operational combined-forces activities based on a Combatant Commander’s inherent authority to promote regional security in their areas of responsibility and otherwise carry out their statutory duties. Part II concludes by highlighting existing policy that constrains TCA to military-to-military activities. Part III illustrates how this constraint has a particular impact on special operations activities, increasing the probability that U.S. SOF will be called upon to conduct combined operations with unfamiliar other security force partners in response to emerging events. Part IV argues that the military-to-military constraint is policy based and advocates for removing the constraint so that U.S. SOF may efficiently interact with the foreign security forces they will foreseeably be called to fight alongside. Part IV also seeks to align TCA, including activities with other security forces, with the Department of Defense’s security cooperation authorities in Chapter 16, Title 10 United States Code. Finally, Part IV proposes codification of TCA to cement U.S. SOF’s legal authority to engage with other security forces and to round out Chapter 16, 10 United States Code, so that it explicitly provides for the full spectrum of DoD security cooperation activities.
II. A Fiscal Law Question
The question of whether U.S. SOF may, without express statutory authority, engage in pre-operational activities with other security forces of friendly foreign countries is ultimately a fiscal law one, centered on whether such activities are within the purpose of the Operations and Maintenance (O&M) and military personnel appropriations. The applicable fiscal law principles are well-established and expounded upon in great detail elsewhere. 22 Accordingly, this Part restates the applicable principles only to the extent necessary to lay the foundation for the discussion that follows.
A. Exercising the Congressional Power of the Purse
The fundamental rule of U.S. fiscal law is that “[n]o Money shall be drawn from the Treasury, but in Consequence of Appropriations made by Law.” 23 This “power of the purse” is vested with the U.S. Congress and is regarded as “the most important single curb in the Constitution on Presidential power,” 24 requiring an affirmative act by Congress to authorize an expenditure, not merely the absence of a Congressional prohibition. 25 Congress exercises the power of the purse through statutory framework governing the collection and use of public funds 26 and through annual appropriations and authorizations establishing funding levels and the purposes to which public funds may be put. 27
The statutory framework incorporates the key fiscal law principle that appropriated funds are only available for obligation or expenditure for authorized purposes, within authorized timeframes, and up to authorized amounts. In other words, all obligations and expenditures must be proper as to purpose, time, and amount. 28 The requirement to use funds only for authorized purposes is codified at 31 U.S.C. § 1301 (the “purpose statute”), which states that “[a]ppropriations shall be applied only to the objects for which the appropriations were made except as otherwise provided by law.” 29 The time 30 and amount 31 requirements are similarly codified.
B. Conducting a Purpose Analysis—The Necessary Expense Rule
Although violations of any of the purpose, time, and amount requirements can trigger reporting requirements 32 and possible administrative 33 and criminal penalties, 34 the central question of whether O&M funds may be used for U.S. SOF to engage in TCA with other security forces of friendly foreign countries is focused on the purpose requirement. Conducting a purpose analysis begins with the purpose statute. The purpose statute’s prohibition is clear and unambiguous, 35 such that the difficulty in applying the statute comes from the near impossibility of spelling out all “objects for which the appropriations were made.” 36 Accordingly, when applying the purpose statute, one must turn to the necessary expense rule, 37 which entails a three-step analysis for determining whether an obligation or expenditure is indeed “necessary or proper or incident to the proper execution of the object” the appropriation from which it is drawn. 38
C. Safety and Familiarization Activities
In 1984, the Comptroller General applied the necessary expense rule when examining (among other issues) the use of O&M funds to interact with Honduran military forces under the justification that the U.S. was not providing “formal training,” but was merely providing “familiarization and safety orientation at no additional cost to the U.S.” 39 The facts of the case and the resulting opinion have been discussed ad nauseum, 40 but are worth reiterating to clearly identify what constraints were and were not laid out in the opinion.
The decision centered on “Ahuas Tara II,” a six-month combined exercise with Honduran military forces, which began in 1983 and ended on 8 February 1984. 41 The exercise entailed the participation of 12,000 U.S troops; the United States funded construction of four–3,000-8,000 foot airstrips, 300 wooden huts to serve as various life support and administrative facilities, and a school; the deployment of two radar systems; medical assistance to 50,000 Honduran civilians; veterinary assistance to 40,000 animals; and artillery, infantry, and medical training to hundreds of Honduran military personnel. 42 Obviously large in scale, Ahuas Tara II prompted the eponymous Honorable Bill Alexander, U.S. House of Representatives, to request that the Comptroller General provide a formal legal opinion on the exercise’s fiscal propriety. 43
Concluding that the DoD had indeed misspent its O&M funds, the Comptroller General’s response addressed in detail the variety of fiscal law concerns raised by Ahuas Tara II, including the use of O&M funds for military construction projects, the authority (or lack thereof) to conduct O&M funded civic and humanitarian assistance, and the use of O&M funds to conduct “familiarization and safety orientation” with Honduran military forces. 44 Examining U.S interactions with Honduran military forces, the Comptroller General highlighted their relatively limited pre-exercise capabilities and the substantial training they required before they could adequately participate in Ahuas Tara II. 45 The Comptroller General acknowledged that “some degree of familiarization and safety instruction is necessary before combined-forces activities are undertaken, in order to ensure ‘interoperability’ of the two forces.” 46 But:
[W]here familiarization and safety instruction prior to combined exercises rise to a level of formal training comparable to that normally provided by security assistance projects, it is our view that those activities fall within the scope of security assistance, for which comprehensive legislative programs (and specific appropriation categories) have been established by the Congress. 47
In other words, training of the Honduran military forces was otherwise provided for under specific security assistance appropriations and, even if it cleared the first two steps, the use of O&M for that purpose failed the third step of the necessary expense rule, violating the purpose statute and, if not correctable, the Anti-Deficiency Act. 48
Still, the decision explicitly acknowledged the necessity of some level of O&M funded safety and familiarization interaction before combined-force activities. In doing so, it alluded to at least two factors for determining whether safety and familiarization activities with other security forces of friendly foreign countries are within the purpose of the relevant O&M appropriation.
One factor is cost. If proposed safety and familiarization orientation before combined-forces activities are at no additional cost to the United States, then that is an initial indication that the activities may appropriately be funded with O&M. 49 But for safety and familiarization activities to have anything other than the barest viability, some additional costs must be acceptable. Presumably, this would include at least a modicum of pay and allowances, travel expenses, and supply expenses for U.S. forces necessary for minimal safety and familiarization activities.
Depth of training is the other factor. Safety and familiarization activities may include some transfer of information and skills, even if the “transfer is principally in one direction” because one of the participating forces is more developed than other participating forces. 50 At some point, however, a transfer of information and skills is security sector assistance that is otherwise provided for and cannot be funded with O&M. 51 Providing a partner force with a new combat capability is an example of the type of activity that crosses that threshold. 52
Crucially, the opinion is also notable for what it did not do: constrain authority to conduct O&M funded safety and familiarization activities to military forces of friendly foreign countries. The issues raised were in the context of activities conducted with Honduran military forces. Accordingly, the Comptroller General did not address whether the allowance for O&M funded safety and familiarization activities could also apply to other security forces. This point can be lost when applying the holdings of the Honorable Bill Alexander (HBA) Opinion, such that subsequent policy decisions, discussed in the Part II.D, infra, are sometimes presumed to have legal force.
D. Traditional Combatant Commander Activities
After the HBA Opinion, TCA emerged as an expanded set of permissible pre-operational O&M and military personnel funded activities with the security forces of friendly foreign countries. Originally enunciated in a statutory authorization for which appropriations were never provided, 53 TCA have a somewhat confused history 54 and are now described primarily in a series of orders from the Joint Chiefs of Staff (TCA Orders) 55 and in guidance published by the implementing geographic combatant commands. 56
Under the Joint Chiefs of Staff guidance, TCA include at least: military liaison teams; traveling contact teams; state partnership programs; regional conferences and seminars; information exchanges; 57 unit exchanges; staff assistance/assessment visits; training program review and assessments; ship rider programs; joint/combined exercise observers; limited humanitarian and civic assistance (HCA); 58 bilateral staff talks; and medical and dental support planning. 59 At least one combatant command has expanded on this non-exhaustive list to include familiarization events. 60
This set of “traditional” activities is based in large part on the combatant commanders’ authority to conduct activities necessary to carry out their statutory responsibilities. For instance, 10 U.S.C. § 164 states that combatant commanders are “directly responsible to the Secretary for the preparedness of the command to carry out missions assigned to the command.” 61 The TCA Orders further identify the “long-standing requirement to interact with the militaries of nations within their area of responsibility/area of interest in order to promote regional security and other national security goals” as one of those missions assigned to the combatant commanders. 62 In carrying out that mission, the combatant commanders have statutory authority to direct, organize, train, and employ subordinate commands and forces, 63 while the TCA Orders direct O&M and military personnel funding for that purpose, subject to the requirements of the necessary expense rule. 64 Expanding slightly beyond the TCA Orders, the combatant commands have themselves referred back to their responsibilities and duties under 10 U.S.C. § 164 to identify additional TCA that may be funded by O&M. 65
Aside from the requirements of the necessary expense rule, a key restraint on the implementation of TCA is that the TCA Orders are primarily focused on interactions with the military forces of friendly foreign countries, with no clear allowance for interactions with the other security forces of friendly foreign countries. 66 The TCA Orders do not enunciate a legal requirement for this military-to-military restriction and the executing combatant commands have applied the restriction in different ways. Some have maintained a strict adherence, 67 while at least one combatant command does make a limited exception for “civilians with direct nexus or support to militaries or security forces” (emphasis added). 68 In addition, although not addressing the issue head-on, the Secretary of Defense has separately implied that not all TCA need be military-to-military. 69 Nevertheless, until the TCA Orders are explicitly updated to allow for TCA between U.S. SOF and other security forces of friendly foreign countries, the commanders that decide when, where, and with whom to conduct TCA are at risk and their legal advisors are appropriately conservative when advising on the scope of TCA.
Ultimately, though, TCA between U.S. SOF and other security forces of friendly foreign countries bear a logical relationship to the O&M and military personnel appropriations, are not prohibited, are not otherwise provided for, and thus do not violate the purpose statute (i.e., it would not in fact be an Anti-Deficiency Act violation to use those appropriations for such TCA). 70 Accordingly, the primary risks are procedural and administrative, rather than legal in nature. The procedural risk stems from the tight timeline for reporting suspected Anti-Deficiency Act violations. A “flash report” must be submitted through command channels to the Office of the Assistant Secretary for Financial Management for the applicable military department within two weeks of discovery. 71 For any individual unaware that the restriction on TCA with other security forces is based on obscure, decades-old policy, rather than any clear legal requirement, submitting the flash report is the safe bet. The flash report, though, triggers an extensive investigatory process that can include both a preliminary review 72 and a formal investigation, 73 exposing the unit that conducted the TCA with other security forces to months of scrutiny. 74 Then, even if the preliminary review or formal investigation concludes that there was no Anti-Deficiency Act violation, the approving commander may still be subject to administrative action for contravening the TCA Orders.
As discussed in Part III of this article, the cautiousness that the procedural and administrative risks breed has practical implications for U.S. SOF readiness. Accordingly, Parts III and IV of this article make the argument that, when executed by U.S. SOF, TCA can and should include interactions with other security forces of friendly foreign countries. 75
III. With Operational Impacts
Even if the baseline issue is one of fiscal law and policy, its resolution has clear operational impacts for U.S. SOF. The commander of United States Special Operations Command (USSOCOM) must train, equip, and employ U.S. SOF to execute ten statutorily specified activities: (1) direct action; (2) strategic reconnaissance; (3) unconventional warfare; (4) foreign internal defense; (5) civil affairs; (6) military information support operations; (7) counterterrorism; (8) humanitarian assistance; (9) theater search and rescue; and (10) such other activities as may be specified by the President or the Secretary of Defense. 76 By their nature and by military doctrine, many of these special operations activities are necessarily or routinely conducted in combination with foreign other security forces. As a result, restricting TCA to military-to-military interactions has a particular impact on U.S. SOF readiness to execute its statutory missions.
Although any of the specified SOF activities may be conducted in combination with other security forces of friendly foreign countries, the following sections focus on the four U.S. SOF activities most frequently conducted in combination with other security forces: unconventional warfare, foreign internal defense, civil affairs, and counterterrorism. Each section begins by highlighting the doctrine applicable to a particular activity, focusing on the aspects of each activity that would typically be conducted with other security forces. Each section then provides an illustrative example of the importance of pre-operational activities between U.S. SOF and other security forces of friendly foreign countries. The discussion and examples ultimately demonstrate that, in the absence of a legal prohibition 77 or other statutory funding scheme, 78 U.S. SOF TCA with other security forces is critical for U.S. SOF readiness. Thus, it is “necessary or proper or incident to the proper execution” 79 of the O&M appropriations (or the military personnel appropriations, for certain expenses) and may be funded from those appropriations. 80
A. Unconventional Warfare
Unconventional warfare (UW), when conducted by the United States, consists of support to indigenous insurgencies or resistance movements to “coerce, disrupt or overthrow a government or occupying power.” 81 The best known examples of United States’ UW operations are the multinational “Jedburgh” teams deployed during World War II in support of the French Resistance against occupying German forces. 82 The Jedburgh teams worked alongside the resistance forces, providing training and equipment, maintaining communications between the French Resistance and Allied high command, and liaising between the various factions of the resistance. 83 After World War II, the United States conducted UW operations during the Cold War in locations around the world, including Eastern Europe, Southeast Asia, and Latin America, and in the early days of post-9/11 operations in Afghanistan and Iraq. 84
Under modern doctrine, effective UW begins well before a crisis, through “long-term preparation, thorough assessments, and relationships with key players.” 85 In its UW Pocket Guide, USSOCOM details the importance of Phase 0: Steady State and Phase I: Preparation activities, including activities “to assure or solidify relationships with friends and allies” and “Gain Access to and Identify Resistance Assets.” 86 Importantly, Phase 0 and Phase I activities do not necessarily take place under the authority of an approved UW campaign plan or operation. 87 Instead, the planning, preparation, and relationship building in Phase 0 “can include the full menu of theater cooperation engagement activities,” 88 presumably including TCA. Similarly, Phase I relationship building and resistance force analysis takes place before actual contact with resistance forces, which is reserved for Phase II: Initial Contact. 89
Instead of through direct engagement with resistance forces, early phase preparation, assessments, and relationship building can take place through engagements with the foreign national-level agencies and security forces that have responsibility for developing and overseeing resistance forces. In many cases, the responsible agency will be the foreign Ministry of Defense. This is true, for example, in the Baltic countries. The Estonian Defence League, 90 Lithuanian National Defence Volunteer Forces (KASP), 91 and Latvian National Guard (Zemessardze) 92 are volunteer paramilitary forces that will act as resistance forces during foreign invasions and that are formally incorporated into national defense plans and the structure of the national armed forces. 93 As a result, the responsible United States geographic combatant commander is fully empowered under existing U.S. law and policy to conduct relationship-building TCA with the Baltic military forces that can share information about and provide access to the paramilitary resistance forces that U.S. SOF may be called upon to support during future UW operations.
If, however, a volunteer force is organized under a foreign ministry other than the Ministry of Defense, such that other security forces have development and oversight responsibility, TCA policy would constrain the ability of the geographic combatant commander’s U.S. SOF assets to prepare for UW. This is true even if the volunteer force is nearly identical to the Baltic paramilitaries in all other respects. A good example is the Ukrainian Donbas Battalion, a group formed in 2014 to resist separatists in the eastern region of Ukraine, including in territory controlled by the separatists. 94 Initially constituted as a private militia, the Donbas Battalion was quickly incorporated into the Ukrainian National Guard. 95 In Ukraine, unlike in the Baltic countries, the Ministry of Internal Affairs, not the Ministry of Defense, oversees the National Guard. 96 As a result of this quirk in the organization of Ukraine’s national security apparatus, interactions between U.S. SOF and the other security forces that have direct ties to the Donbas Battalion could not be conducted as O&M funded TCA. In other words, there would be a critical constraint on U.S. SOF’s ability to conduct the UW Phase 0 and Phase I planning, preparation, and relationship building that can lead to a successful UW campaign; a constraint primarily based on Ukraine’s unique organization of its security forces and not on the nature or mission of the Donbas Battalion itself.
B. Foreign Internal Defense
In many ways the inverse of UW, foreign internal defense (FID) is the activity through which a government such as the United States or an international organization participates in a host nation government’s efforts to counter and insulate its populace from internal threats such as violent extremism, insurgency, and other forms of subversion. 97 Foreign Internal Defense often requires a whole of U.S. government approach (i.e., a coordinated effort between executive agencies), with the DoD supporting other agencies’ FID activities with routine security cooperation by both SOF and conventional forces, conducted in accordance with a geographic combatant commander’s theater campaign plan. 98
Even though FID is a whole of government activity, U.S. SOF play a unique role and are “forces of choice for FID, due to their extensive language capability, cultural training, advising skills, and regional expertise.” 99 In some circumstances, such as in remote areas with a limited U.S. conventional force presence, U.S. SOF may in fact be the sole military FID effort, training host nation forces and conducting information operations with a goal of precluding the need for greater U.S. military participation. 100 Importantly, U.S. SOF’s role in a FID operation is not limited to interactions with military forces and may include engagements with other security forces of friendly foreign forces. 101
In 2003, after the invasion of Iraq by U.S. SOF and conventional forces and the collapse of the incumbent Iraqi government, U.S. SOF FID activities played an important role in rebuilding the Iraqi Security Forces. 102 In doing so, they engaged with military forces, developing Iraqi SOF. They also engaged with other security forces, working directly with the Iraqi Ministry of Interior Emergency Response Unit. 103 As a direct result of U.S. SOF efforts, the military forces and other security forces developed into “fully capable urban-trained CT force[s]” providing the reformed Government of Iraq a critical capability that was the key to success during the liberation of Mosul from ISIS fourteen years later, in 2017. 104
Although U.S. SOF development of Iraqi CT forces included training, equipping, and construction that went beyond TCA and required express statutory authority, 105 the example makes clear the importance of U.S. SOF interactions with other security forces of friendly foreign countries. Under slightly different circumstances, such as where the United States is seeking to stabilize a host nation government rather than to install a new government, pre-operational efforts to identify and build relationships with the full range of potential partner forces would, as intended by the TCA Orders “promote regional security and other national security goals.” 106 This could include readiness to conduct FID if and when directed. Or, by demonstrating U.S. resolve and enhancing host nation situational awareness and capabilities, pre-operational efforts with appropriate partners could even preempt the foreign internal instability that gives rise to FID missions in the first place. But if potential partners include other security forces like the Iraqi Ministry of Interior Emergency Response Unit, the responsible geographic combatant commander and executing U.S. SOF unit cannot rely on the TCA Orders and must instead turn to a statutory authority, accept procedural and administrative risk, 107 or forego engagements with the unit all together.
C. Civil Affairs
Civil affairs operations, and the broader category of civil-military operations (CMO), 108 enable military commanders to fulfill their responsibility to coordinate and integrate with the host nation civil component during the conduct of military operations. 109 By definition, civil affairs operations require interactions with foreign non-military forces and organizations. 110
Importantly, civil affairs are not conducted only in the context of combat operations. They are conducted “where [U.S.] military forces are present” 111 and have an ongoing mission to “[c]oordinate military activities with other U.S. Government departments and agencies, civilian agencies of other governments, host-nation military or paramilitary elements, and nongovernmental organizations.” 112 Indeed, civil affairs can take place outside any military operation, whether combat or non-combat; military commanders are also responsible for integrating them into “programs[] and activities.” 113 In fulfilling their responsibility to coordinate with civil organizations during military operations, programs, and activities, it is almost axiomatic that civil affairs forces should seek interactions that, if conducted with military forces of friendly foreign forces, would be considered TCA and funded as a necessary expense of O&M.
For example, consider a civil affairs team planning for possible U.S. military operations in an allied foreign country. One risk they identify is that an electronic warfare attack or cyber attack could disable the foreign ally’s emergency alert and reporting system. Such an attack would severely restrict the U.S.’s and the ally’s ability to communicate with and receive critical information from the civilian population, with potentially devastating effects if the degradation were a precursor to kinetic attacks. 114
To mitigate that risk and in accordance with the strategic goals of the responsible geographic combatant command, the civil affairs team seeks to interact with the allied foreign country to enhance the team’s understanding of the ally’s emergency alert and reporting system, identify alternate means of communication with the civilian population, and share information regarding possible defenses against the anticipated electronic warfare attack or cyber attack. The team identifies several means of doing so, including sending a two-person liaison team to the national headquarters of the agency responsible for the emergency alert and response.
During their discussion with their command’s legal advisor, the civil affairs team is encouraged that the activity seems to fall within the scope of TCA and sense that they are well on their way to executing a low-cost, high-impact event that will truly enhance regional security. But the civil affairs team is stymied as the discussion progresses when the legal advisor asks the fateful question: “does the emergency alert and reporting system fall under the ally’s Ministry of Defense?” The answer, unfortunately, is no. The system is the responsibility of the national police, falling under the Ministry of the Interior. The legal advisor dutifully advises the civil affairs team that, since the event is not a military-to-military interaction, it cannot, by policy, be conducted as O&M funded TCA. Instead, the civil affairs team must seek an applicable security sector assistance authority, 115 which requires significantly longer lead-time for planning and approval, or incorporate the event into an existing operation, program, or activity, if one with the necessary scope even exists.
D. Counterterrorism
United States Special Operations Forces counterterrorism (CT) teams, such as the CIF that responded to the Benghazi attacks, must be ready to immediately execute Chairman of the Joint Chiefs of Staff or geographic combatant command crisis response plans in complex operational environments. 116 This requires significant coordination and support from the U.S. agencies, as well as from “[partner nations] for basing and/or forces and [host nation] government and security forces.” 117 Joint doctrine acknowledges the valuable deterrence and readiness effects of U.S. CT forces routinely interacting with other security forces of friendly foreign countries pre-crisis.
Pre-crisis, pre-conflict CT shaping activities are deliberately broken into two categories: (1) security cooperation and (2) military engagement. 118 Security cooperation is focused on building partner capacity and capabilities 119 and typically requires express statutory authority, regardless of whether the security cooperation activity is being conducted with a military or non-military force. 120 Military engagement, on the other hand, is a “routine” activity “to build trust and confidence, share information, coordinate mutual activities, maintain influence, build defense relationships, and develop allied and friendly military capabilities for self-defense and multinational operations.” 121 Critically, as part of overall military engagement efforts, joint doctrine calls for CT forces to engage with military and with other security forces. 122
The particular importance of routine pre-crisis engagements with other security forces is exemplified in the Benghazi scenario. Recall that the U.S. SOF CT teams responding to the attacks would have, if they had arrived in Libya before U.S. personnel were en route from Benghazi, conducted operations alongside a loosely integrated mix of U.S. interagency, foreign, and private security forces, none of which were military forces. 123 Any pre-crisis U.S. SOF military engagement with those security forces undoubtedly would have improved mid-crisis interoperability through increased familiarization with partner force communications systems and tactics, techniques, and procedures.
Similar attacks on U.S. Embassies and their personnel could realistically unfold in any number of friendly foreign countries, including those to which U.S. SOF has more immediate access. Aside from the generalized threat of terrorists striking any place at any time, 124 potential geographic flashpoints and potential foreign non-military CT force partners can be identified before a crisis occurs. With appropriate leeway to conduct TCA, U.S. SOF could build interoperability with those local CT forces before a crisis occurs.
Bosnia and Herzegovina (BiH) is one of those potential flashpoints with a ready non-military CT force. It is a “cooperative counterterrorism partner” that faces extremist threats within its borders. 125 At times, groups opposed to U.S. policies have staged protests in Sarajevo, prompting U.S. Embassy Sarajevo to warn U.S. citizens that “[e]ven demonstrations intended to be peaceful can turn confrontational and escalate into violence.” 126 If such a demonstration were to escalate into (or serve as cover for) an attack on the U.S. Embassy or U.S. personnel, U.S. SOF would likely be called upon to respond, as they were in Libya.
When responding, U.S. SOF would likely be working alongside the BiH Ministry of Security’s State Investigation and Protection Agency (SIPA), the lead BiH law enforcement unit for counterterrorism. 127 But even though the responsible U.S. SOF unit could identify a terrorist threat to U.S. persons and a cooperative CT partner in BiH with whom it would be valuable to build a relationship in order to counter that threat, pre-crises TCA with the SIPA would not be feasible because the SIPA is an other security force. fo
IV. Aligning TCA with Other Security Sector Assistance Authorities
In Part II, this article made the initial case that the foundational fiscal law principles for pre-operational activities with foreign security forces do not prohibit O&M funded activities with other security forces, highlighting that the only express impediment to such activities with other security forces is the military-to-military focus of the TCA Orders. 128 Part III of this article demonstrated the necessity of enabling U.S. SOF to conduct TCA with other security forces of friendly foreign countries. This part returns to the legal analysis, examining more specific possible legal objections to pre-operational activities between U.S. SOF and other security forces of friendly foreign countries, concluding that there is legal leeway for U.S. SOF to conduct O&M and military personnel funded TCA with other security forces; room to maneuver that could be a boon if the TCA Orders’ policy restrictions are relaxed.
Reticence to apply safety and familiarization or TCA authority to interactions between U.S. military forces and other security forces stems from two places: (1) the Department of State’s (DoS) traditional primacy in the realm of security sector assistance, especially with respect to engagements with other security forces of friendly foreign countries; and (2) the potential overlap between safety and familiarization activities or TCA and the security sector assistance programs through which Congress has authorized the funding, training, and equipping of the security forces of friendly foreign countries for a wide range of purposes.
This part examines the DoS’s traditional primacy in security sector assistance to demonstrate that the DoS’s role is not absolute and does not supersede the DoD’s authority to conduct TCA that are necessary for U.S. SOF to fulfill its statutory responsibilities. This part also provides an overview of the express statutory authorities for security cooperation. In doing so, this part shows in the language of the necessary expense rule, those authorities do not “otherwise provide for” TCA with other security forces of friendly foreign countries, such that those activities may be legally funded with O&M. Finally, this part argues for a revived statutory TCA authority in order to cement U.S. SOF’s ability to conduct TCA with other security forces of friendly foreign forces and to complete the authoritative legal framework for security cooperation found in Chapter 16, 10 United States Code.
A. “Security Sector Assistance” as an Umbrella Term
The foundational and initial task of defining “security sector assistance” and the related terms “security assistance” and “security cooperation” is not simple, with different branches and agencies of the U.S. government defining and applying the terms differently. This can make it difficult to coherently discuss the respective responsibilities of the various executive agencies or identify where TCA ends and statutory authorities begin.
As a starting point, presidential policy, defined “security sector assistance” as any U.S. Government “policy, program, [or] activity” used to:
- Engage with foreign partners and help shape their policies and actions in the security sector;
- Help foreign partners build and sustain the capacity and effectiveness of legitimate institutions to provide security, safety, and justice for their people; [or],
- Enable foreign partners to contribute to efforts that address common security challenges. 129
Under this definition, “security sector assistance” includes the relevant policies, programs, or activities of any executive agency. Complicating matters, though, Congress has considered a proposed definition for “security sector assistance” that, in contrast to the presidential policy definition, 130 encompasses DoS programs, but not DoD or other executive agency programs. 131 In addition, Congress has defined “security cooperation” as DoD specific, 132 but it has not defined “security assistance.”
The DoD adheres to the presidential policy definition and further defines “security cooperation” as all its relationship building and foreign partner development activities, including “security assistance,” which the DoD defines as a subset of security cooperation that is funded and authorized by the DoS and administered by the Defense Security Cooperation Agency. 133 The DoS, on the other hand, uses the term “security assistance” in a manner that contradicts the DoD’s definition, employing it to describe any DoS or DoD assistance to foreign military or other security forces. 134
To synthesize these definitions, and consistent with presidential policy, this article uses the term “security sector assistance” to mean: (1) DoS approved, funded, and administered “security assistance;” (2) DoD approved, funded, and administered “security cooperation;” and (3) hybrid security assistance/cooperation, approved and funded by the DoS, but administered by the DoD. 135
B. Department of State Primacy in Security Sector Assistance
At the outset of security sector assistance programs in the 1940s and 1950s, 136 the Secretary of State was given responsibility for program direction and oversight based on a “principle of civilian leadership, influence, and oversight.” 137 At first, it was the President, through Executive Orders, who placed this responsibility in the hands of the Secretary of State. 138 Then, with the Foreign Assistance Act of 1961, the Congress solidified the Secretary of State’s oversight responsibility, stating that “[u]nder the direction of the President, the Secretary of State shall be responsible for the continuous supervision and general direction of economic assistance, military assistance, and military education and training programs,” 139 with the Secretary of Defense having much more circumscribed responsibilities focused solely on military assistance. 140
Although the precise division of responsibilities between the DoS and DoD gradually shifted and became more complex, the DoS retained its overarching responsibility for supervision and direction of security sector assistance programs until the 1980s. 141 Starting in 1981, the Congress began to expand the DoD’s role by ad hoc “authorizing DOD to directly train, equip, and otherwise assist foreign military and other security forces through new provisions in annual National Defense Authorization Acts (NDAA).” 142 This eventually resulted in a “complex and confusing ‘patchwork’” of authorities scattered across Title 10 and NDAAs, 143 recently cleaned up in the Congress’s overhaul of DoD security cooperation authorities in the National Defense Authorization Act for Fiscal Year 2017 (FY17 NDAA). The FY17 NDAA, along with providing new authorities, amended and consolidated existing DoD authorities into a newly enacted Chapter 16, Title 10 United States Code. 144
Today, the DoS clearly retains security sector assistance primacy, but its authority is not absolute. The DoD does have independent authority under Chapter 16, including the authority to engage with other security forces of friendly foreign countries under some circumstances. The basis for this enhancement of DoD authorities is detailed in the Senate Armed Services Committee (SASC) conference report accompanying the FY17 NDAA.
In the conference report, the SASC initially emphasized that “[t]he Department of State is the lead agency responsible for the policy, supervision, and general management of the United States’ [security sector assistance] programs and activities.” 145 But in almost the same breath, the SASC also recognized that “the Department of Defense . . . plays a critical role,” 146 and justified its recommendation for the consolidation of DoD security cooperation authorities in Chapter 16 by noting that “over the last 15 years, the Department’s engagement with national security forces of friendly foreign countries has expanded substantially in response to changing strategic requirements.” 147 The consolidation, although “not intended to create a Department of Defense mission that competes with security assistance overseen by the State Department, . . . [is intended to] enable the Department [of Defense] to meet its own defense-specific objectives in support of broader defense strategy and plans.” 148
This interplay between DoS and Department of Defense, with the balance of authority in the DoS’s hands, carries through to the procedural aspects of the Chapter 16 security cooperation authorities. For many of the security cooperation authorities, the Secretary of Defense is the designated approval authority, but reliant on the Secretary of State for consultation, concurrence, coordination, joint development and planning, or implementation. 149
At least two patterns emerge when examining the Secretary of State’s precise role in security cooperation under Chapter 16. First, the more closely a security cooperation authority resembles traditional security sector assistance, with the primary benefit accruing to the foreign partner, the more in-depth the Secretary of State’s involvement. 150 Similarly, Secretary of State involvement can be triggered if the partner security force is another security force of a friendly foreign country. 151 But both those coins have flip sides. First, when there is a clear benefit to U.S. forces from training with the military forces of a friendly foreign country, the DoD has unilateral approval authority, not subject to Secretary of State input. 152 Furthermore, when conducted by U.S. SOF the DoD’s unilateral approval authority extends to training with other security forces of friendly foreign countries. 153
Between U.S. SOF and other security forces of friendly foreign countries is on the flip side of both those coins, where the DoD has the widest latitude. It meets “defense-specific objectives” 154 and does not normally include conventional U.S. forces. In addition, TCA are generally less intensive, executed with fewer resources and for shorter durations than security cooperation activities executed under statutory authority. 155 As a result, without a clear legal prohibition and for so long as the DoD, by Congressional design, retains some unilateral security cooperation authority, the DoS’s general security sector assistance primacy should not preclude necessary TCA between U.S. SOF and other security forces of friendly foreign countries.
C. Traditional Combatant Commander Activities as a Stepping Stone to Combined-Forces Activities or to More Intensive Security Cooperation
Congress consolidated the DoD’s security cooperation authorities under Chapter 16, Title 10 United States Code, into four overarching categories: (1) military-to-military engagements; 156 (2) training with foreign forces; 157 (3) support for operations and capacity building; 158 and (4) educational and training activities. 159 Within those four categories, there are eighteen specified security cooperation programs and activities. This article does not individually address the scope of each specified program or activity, but it does make the case that the codified security cooperation authorities do not otherwise provide for TCA with other security forces of friendly foreign countries and that O&M funded TCA with other security forces are a legally permissible stepping stone to the more vigorous statutory authorities.
The best way to make that case is by analogizing between TCA with military forces of friendly foreign countries and the same activities with other security forces of friendly foreign countries. As made clear in the HBA Opinion, safety and familiarization activities with foreign military forces end where express statutory authority for formal training begins. 160 Similarly, and consistent with the thrust of the HBA Opinion, O&M funds provided for TCA with foreign military forces are “not intended to replace or duplicate any other specifically authorized or appropriated funds sources” 161 and are intended to “promote regional security and other U.S. national security goals” 162 up to the point where express statutory authority begins. 163 Thus, O&M funded TCA with the military forces of friendly foreign countries are a means of building familiarity and relationships with potential partner forces that can be a critical first step toward conducting combined exercises or training and equipping under statutory authorities for security cooperation, with an ultimate eye toward readiness for potential combined operations. The table at Appendix A highlights this point, showing how TCA underlie the statutory security cooperation authorities that permit more intensive activities with foreign military forces. 164
With the arguable exception of certain authorities for educational and training activities, 165 each of the statutory authorities for security cooperation also permits activities with other security forces. 166 Like TCA with foreign military forces, TCA between U.S. SOF and other security forces of friendly foreign countries are a critical first step in building the necessary relationships and familiarity to conduct successful combined-forces activities or make effective use of the statutory security cooperation authorities. But, as discussed in Part III, supra, and highlighted in Appendix A, the TCA Orders’ military-to-military policy often removes that first step, creating a gap that would not exist if the anticipated partner force were a military force. This gap persists notwithstanding the fact that, in its 2017 revamping of the DoD’s security cooperation authorities, the Congress repeatedly recognized the Department’s role, and U.S. SOF’s role in particular, in conducting a wide range of security cooperation activities with the other security forces of friendly foreign countries.
To close this gap, Part IV.D, infra, proposes policy updates and codification to cement U.S. SOF authority to conduct TCA with other security forces, but those need not be the first steps. The necessary expense rule that forms the basis for O&M funded TCA with the military forces of friendly foreign countries is an adaptive rule; one that reflects “changes in societal expectations regarding what constitutes a necessary expense.” 167 Application of the rule already permits O&M funded TCA between U.S. SOF and foreign military forces. Applying the rule when the proposed partner force is another security force invokes no additional strict legal prohibitions or restrictions. To the extent there ever was a bona fide rationale for restricting U.S. SOF ability to conduct O&M funded TCA with other security forces, that rationale should be adapted to account for the DoD’s generally enhanced authority to engage with other security forces and for U.S. SOF’s statutory responsibility to prepare for combined operations with other security forces of friendly foreign countries.
D. Circumscribing and Codifying TCA Authority
The persistent gap in U.S. SOF’s ability to conduct TCA with other security forces is largely a result of the tortured history of those activities. 168 It is also based, however, in the lack of comprehensive, up-to-date guidance, reflecting contemporary realities. The legal and policy touchstones, the HBA Opinion 169 and the TCA Orders 170 were published in 1984 and 1995–1996, respectively, and are limited in their relevance to the question of whether U.S. SOF may legally engage with other security forces of friendly foreign countries through TCA.
Though highly persuasive and widely followed, the HBA Opinion is not strictly authoritative 171 and its reach is limited by the facts presented in the case. It does not address other activities, outside safety, and familiarization, that are within a commander’s traditional authority, nor does it address U.S. military interactions, SOF or otherwise, with other security forces of friendly foreign countries. For their part, the TCA Orders, although binding on the combatant commands, are policy documents that do not fully account for the fact that U.S. SOF must, by statute, be ready to conduct special operations activities that require working alongside other security forces of friendly foreign countries.
As suggested by other commentators, updated DoD policy guidance would go a long way toward resolving wide-ranging uncertainty regarding the scope of TCA. 172 It would also help curtail the extra-legal restraints on U.S. SOF interactions with other security forces of friendly foreign countries that hinder U.S. SOF’s ability to prepare to execute its statutorily assigned activities. If done at the DoD level in accordance with the DoD Issuances Program 173 a policy update would benefit from a comprehensive internal review and approval process 174 and wide dissemination, especially if published on the public portal for DoD issuances. 175
In addition to a policy update, this article proposes that the Congress enact a statutory authority for O&M funded TCA under Chapter 16, Title 10 United States Code, in order to achieve several important ends. First, it would place TCA on the strongest possible fiscal law footing. As an express statutory authority, there would be little doubt that the DoD could expend its O&M funds to conduct low-level, but critical, security cooperation activities with appropriate foreign partners in order to prepare for combined-forces activities or build toward more extensive security cooperation under other statutory authorities. In other words, there would be no need to resort to an extensive analysis and the application of the necessary expense rule to confirm the DoD’s authority to engage in such activities. Second, it would clarify Congress’s full intent concerning the DoD’s authority to engage in TCA. 176 In an express statutory authority, the Congress could resolve questions of the DoS’s appropriate involvement with TCA, TCA’s relationship to the other security cooperation authorities of Chapter 16, the scope of permissible TCA, and, critically for the purposes of this article, U.S. SOF’s authority to engage in TCA with the other security forces of friendly foreign countries in order to ensure the effective conduct of the special operations activities specified by the Congress in 10 U.S.C. § 167. Finally, an express authority could improve Congressional oversight of DoD activities, mitigating concerns that the DoD may encroach on the DoS’s primacy in security sector assistance or that the combatant commands will turn to TCA, which are relatively easy to execute, when other security cooperation authorities that require higher level coordination and approval are more applicable.
Although an express statutory authority for TCA could take any number of forms, this article proposes several key provisions to ensure the continued effectiveness of TCA as an easily executable security cooperation authority, 177 to implement the apparent intent of the Congress for security cooperation generally, and to ensure appropriate levels of Congressional oversight and DoS involvement. The remainder of this Part argues that an express statutory authority for TCA should: (1) authorize U.S. SOF to engage in TCA with other security forces of friendly foreign countries and (2), with respect to the DoS’s involvement, default to the general statutory requirement that the respective chief of mission be kept fully informed of executive agency operations and activities of a foreign country. 178 The remainder of this Part also suggests that, as reasonable restraints on TCA, an express statutory authority could: (1) limit TCA activities to engagements with the national-level military and other security forces of friendly foreign countries and (2) authorize the use of appropriated funds only for the expenses of U.S. forces. Then, using the language of the repealed 10 U.S.C. § 168 179 and the TCA Orders 180 as a foundation, Appendix B provides language that could be adopted to codify TCA, including U.S. SOF’s authority to engage with the other security forces of friendly foreign countries.
1. Engagement with National Security Forces Only
Congress is clearly concerned with the types of foreign security forces (i.e., the foreign force’s mission set and level of government) U.S. military forces engage with. In its conference report accompanying the FY17 NDAA, the SASC justified, in part, the creation of Chapter 16, Title 10 United States Code, by noting the DoD’s increased engagements with the “national security forces of friendly foreign countries.” 181 Then, in the legislative act, the Congress carefully defined “national security forces” 182 to include only those forces with missions that generally align with the U.S. DoD’s national security role 183 and to exclude almost all sub-national security forces. 184 It then limited the most robust security cooperation authority, the authority to build partner capacity under 10 U.S.C. § 333 to training and equipping those defined “national security forces.” 185 That limitation appears to be a means of limiting the risk of Department of Defense encroachment upon the DoSs’ security sector assistance primacy. 186
For the same reason, limiting TCA to engagement with “national security forces” as defined in 10 U.S.C. § 301(6), would be appropriate. Although not all security cooperation authorities are limited to engagements with “national security forces,” 187 especially for those authorities with a direct benefit to U.S. forces, 188 a tradeoff for TCA’s ease of execution is a heightened risk of encroachment on DoS primacy. A “national security forces” limitation for TCA would provide some assurance that the approving combatant command is not exceeding its international affairs expertise and, for example, interacting with a local security force unit that may have limited national or international recognition or that may raise U.S. legal concerns, especially if the local security force unit may have committed human rights violations. 189 Tying a statutory TCA authority to the definition of “national security forces” would also provide some assurance that the selected foreign security force units have operational responsibilities that correlate to the DoD’s mission. 190
2. Only U.S. SOF May Engage with Other Security Forces
Permitting only U.S. SOF to conduct TCA with other security forces of friendly foreign countries would be another reasonable restraint on a statutory TCA authority; one that is consistent with other security cooperation authorities and appropriately limits the possibility of encroachment on DoS primacy in security sector assistance. Chapter 16, 10 United State Code addresses security cooperation activities with other security forces in two ways. For example, 10 U.S.C. § 311 authorizes the exchange of defense personnel 191 between the United States and friendly foreign countries, but requires Secretary of State concurrence if the exchange is with a non-military ministry or organization. 192 On the other hand, 10 U.S.C. § 321 authorizes training with friendly foreign countries without requiring Secretary of State input, but permits only U.S. SOF to train with the other security forces of friendly foreign countries. 193 For TCA, the latter restraint would be more appropriate because U.S. SOF have the primary need to interact with other security forces and it would maintain ease of execution for events that may arise on short notice and should not be time or resource intensive.
3. Expenses of United States Forces Only
A statutory TCA authority should permit the expenditure of appropriated funds only for the expenses of United States forces. As a general matter, the O&M appropriations available for most TCA are for the “operation and maintenance of the [military departments or activities and agencies of the Department of Defense],” 194 such that the use of such funds for the benefit of foreign forces are not necessary expenses of the O&M appropriations. Instead, the use of O&M funds to pay expenses for the benefit of foreign forces requires a separate express statutory authority. 195 In many cases, a requirement to pay the expenses of participating foreign forces is an indication that an event has progressed beyond TCA 196 and should be executed, in whole or in part, under another security cooperation authority. 197 In addition, limiting authorized expenditures to only those necessary for U.S. forces is another means of ensuring that TCA can be executed efficiently, but do not become a substitute for other security cooperation activities for which higher approval levels or greater DoS involvement is warranted.
4. Keeping the Department of State Informed
As currently implemented, combatant commanders must obtain the concurrence of the appropriate United States Embassy before conducting TCA, 198 but are not required, as they would be for most security cooperation authorities under Chapter 16, Title 10 United States Code, to involve the Secretary of State. 199 In a codified TCA authority, the Congress could insert a requirement for concurrence for the relevant United States Embassy, but doing so would deviate from Congressional practice for the other Chapter 16 authorities which, when DoS involvement is warranted, place responsibility at the Secretary level and not at the subordinate Embassy level. 200 On the other hand, consistent with its practice for the other Chapter 16 authorities, Congress could require Secretary of State involvement (concurrence or otherwise) and leave it to the Secretary to delegate that authority. 201 Either of those alternatives, though, would defeat the necessary efficiency of TCA, creating legal hurdles where none currently exist and impairing the purpose of TCA as a stepping stone. Instead, a statutory TCA authority should remain silent on DoS involvement, defaulting to the general statutory requirement that the executing combatant command keep the responsible chief of mission “fully and currently informed” of all TCA in a given country. 202 This would preserve a role for the DoS in the TCA process while maintaining the vital efficiency of TCA.
V. Conclusion
The United States’ strategic approach to national defense, outlined in the Summary of the 2018 National Defense Strategy, is built on three pillars. 203 One of those three is “Strengthen[ing] Alliances and Attract[ing] New Partners,” 204 recognizing that “[o]ur allies and partners provide complementary capabilities and forces along with unique perspectives, regional relationships, and information that improve our understanding of the environment and expand our options.” 205 Maintaining this pillar requires “[e]xpanding regional consultative mechanisms and collaborative planning” 206 and “[d]eepen[ing] interoperability.” 207
Traditional Combatant Commander Activities are tools almost tailor-made for furthering these strategically important initiatives. “Expanding consultative mechanisms and collaborative planning” at the national level becomes “bilateral staff talks” and “regional conferences and seminars” at the combatant command level, while “[d]eepen[ing] interoperability” becomes “information exchanges,” “unit exchanges,” and “safety and familiarization events.” 208 When conducted with foreign military forces, TCA do not require statutory authority and are efficient and cost-effective, answering the National Defense Strategy’s call to extend the United States’ network of alliances and partnerships in order to deter and decisively act against shared challenges. 209
But when it comes to executing the National Defense Strategy through TCA with the other security forces that are natural partners for U.S. SOF, the DoD is self-defeating. Internal TCA policy that focuses on military-to-military interactions fails to account for the fact that by statute and doctrine, U.S. special operations are frequently conducted by, with, and through foreign non-military forces. For future operations like the Benghazi attacks or like the scenarios described in Part III, supra, this increases this risk that U.S. SOF will not know the forces they are operating alongside or how they fight and communicate.
This self-inflicted hamstringing is unwarranted. Properly scoped TCA between U.S. SOF and other security forces of friendly foreign forces are necessary, not prohibited, and not provided for in any statutory security sector assistance authority. Thus, with minor revisions to the TCA Orders that are the source of the military-to-military restriction, TCA between U.S. SOF and other security forces could immediately be conducted as necessary expenses of the O&M and military personnel appropriations. To the extent that departmental oversight and standardization of TCA remains a concern, a new, formal DoD TCA policy could address those issues, as formal policy does for so many other DoD activities. Then, if the Congress chooses to conclusively lay the issue to rest, a statutory authority could be comfortably integrated into the recently reformed statutory frame work for security cooperation.
Appendix A. A Comparison of Authorities to Engage with Military Forces of Friendly Foreign Countries and Other Security Forces of Friendly Foreign Countries
This appendix highlights the disparate treatment of TCA with military forces of friendly foreign countries and TCA with other security forces of friendly foreign countries. This policy-based disparate treatment persists despite the fact that in the FY17 NDAA Congress provided authority for U.S. forces to interact with both military forces and other security forces for all statutory security cooperation activities. The block for TCA with other security forces of friendly foreign countries is yellow instead of red only because at least one combatant command makes a limited allowance for TCA with “civilians with direct nexus or support to militaries or security forces” (emphasis added). United States Southern Command , TCA Smart Book 8 (14 Oct 2016).
Appendix B. Proposed Statutory Authority for TCA Traditional Combatant Commander Activities
(a) Program Authority.—The commander of any unified or specified combatant command may approve traditional combatant commander activities with the national security forces of friendly foreign countries that are designed to promote regional security and other national security goals.
(b) Authorized Activities.—Activities that may be approved under subsection (a) include the following:
(1) The activities of traveling contact teams.
(2) The activities of military liaison teams.
(3) Safety and familiarization activities.
(4) Seminars and conferences held primarily in a theater of operations.
(5) Distribution of publications primarily in a theater of operations.
(6) Other engagement activities within the traditional authority of a combatant commander.
(c) Limitations.—Activities conducted pursuant to subsection (a) are subject to the following limitations:
(1) Activities conducted by the general purpose forces of the United States must be primarily with the national military forces of a friendly foreign country.
(2) Payment of expenses is limited to expenses necessary for the participation of the U.S. armed forces and no expenses may be paid for the incremental or other costs of other countries.
(d) Regulations.—The Secretary of Defense shall prescribe regulations for the administration of this section. The regulations shall establish accounting procedures to ensure that the expenditures pursuant to this section are appropriate.