Developing Iraq's Security Sector

Developing Iraq's Security Sector: The Coalition Provisional Authority's Experience

Andrew Rathmell
Olga Oliker
Terrence K. Kelly
David Brannan
Keith Crane
Copyright Date: 2005
Edition: 1
Published by: RAND Corporation
Pages: 122
  • Cite this Item
  • Book Info
    Developing Iraq's Security Sector
    Book Description:

    From May 2003 to June 28, 2004 (when it handed over authority to the Iraqi Interim Government), the Coalition Provisional Authority (CPA) worked to field Iraqi security forces and to develop security sector institutions. This book-all of whose authors were advisors to the CPA-breaks out the various elements of Iraq's security sector, including the defense, interior, and justice sectors, and assesses the CPA's successes and failures.

    eISBN: 978-0-8330-4090-9
    Subjects: Political Science

Table of Contents

  1. Front Matter
    (pp. i-ii)
  2. Preface
    (pp. iii-iv)
  3. Table of Contents
    (pp. v-vi)
  4. Figures and Tables
    (pp. vii-viii)
  5. Summary
    (pp. ix-xx)
  6. Acknowledgments
    (pp. xxi-xxii)
  7. Abbreviations
    (pp. xxiii-xxiv)
  8. CHAPTER ONE Introduction
    (pp. 1-8)

    Soon after the coalition occupation of Iraq began in April 2003, it became evident that prewar assumptions about the post-Saddam security situation had been unduly optimistic. The environment was not benign—in fact, it was rapidly deteriorating. Iraqi security forces had largely disintegrated, and those that remained were incapable of handling widespread criminality and political violence. The coalition confronted three security imperatives. The first task was to restore order and neutralize insurgents and terrorists. The second task was to rebuild Iraqi security forces (ISF), which could eventually take responsibility for Iraq’s security. And the third task was to reconstruct and...

  9. CHAPTER TWO Prewar Planning for the Iraqi Security Sector
    (pp. 9-12)

    When the U.S. government began planning for the postwar reconstruction of Iraq, the primary focus was on ensuring that humanitarian requirements were met.¹ The interagency planning structure that took shape starting in late summer and early fall 2002 included an Iraq Relief and Reconstruction Working Group.² This was chaired by National Security Council (NSC) staffers and incorporated representatives from a broad range of agencies. It focused primarily on issues of food and water supply, refugee flows, responses to the use of weapons of mass destruction, and other humanitarian issues. There were some efforts within both the U.S. Department of Defense...

  10. CHAPTER THREE Reforming Iraq’s Security Sector
    (pp. 13-72)

    This chapter examines how the Coalition Provisional Authority and other elements of the coalition undertook the reconstruction and reform of Iraq’s security sector. It begins by outlining the context, detailing how the environment largely negated the assumptions on which planning had been based, and describing how policy was made and how the policy and strategy evolved. Next, it outlines developments in each of the component parts of the security sector. The areas covered are the national security institutions, the defense sector, the interior ministry, the justice sector, the intelligence services, and disarmament, demobilization, and reintegration.

    The situation on the ground...

  11. CHAPTER FOUR Evaluating Security Sector Reform in Iraq
    (pp. 73-92)

    In this chapter, we provide an evaluation of the coalition’s security sector reform efforts during the tenure of the CPA. We start by summarizing developments in the security situation in Iraq and then assess the state of the various elements of the security sector at the time of transition of authority. We then identify six underlying problems with the coalition’s approaches; these provide broader lessons from the CPA experience. We conclude with some recommendations for future priorities in the Iraq SSR program.

    Most of the CPA and CJTF-7’s measures of developments in the Iraqi security sector related to security inputs...

  12. Bibliography
    (pp. 93-97)