US Military Reveals Massive Plan To Attack, Retake Mosul From Islamic State

Iraqi security forces deploy to regain control of the villages surrounding the town of Beiji, 155 miles north of Baghdad, Iraq, on Dec. 8, 2014.

Hadi Mizban/AP

AA Font size + Print

Iraqi security forces deploy to regain control of the villages surrounding the town of Beiji, 155 miles north of Baghdad, Iraq, on Dec. 8, 2014.

As if sending a warning to Islamic State fighters, the U.S. military reveals details of a massive attack plan to retake Mosul, Iraq.

U.S. forces are amassing and training 20,000 to 25,000 Iraqi and Kurdish forces in preparation for a spring attack to retake Mosul, Iraq from an estimated 1,000 to 2,000 fighters of the Islamic State, or ISIS.

In an extraordinary briefing for reporters, an official from U.S. Central Command, or CENTCOM, which oversees the military coalition fight against ISIS in Iraq, detailed the size and composition of a force that the U.S. hopes will be ready for the offensive within as early as five weeks.

The coalition attack force would consist of five Iraqi brigades that the official said must first go through a U.S. training course, in addition to three Peshmerga brigades that would attack Mosul “from the north,” a newly formed “Mosul fighting force” of mostly Mosul police officers, and special operations forces of Iraq’s Counter Terrorism Service – all of whom are under the advise and assist leadership of U.S. forces in Iraq.

Gen. Lloyd Austin, CENTCOM commander, and Joint Chiefs Chairman Gen. Martin Dempsey are still eyeballing April or May for the offensive, the official said, but that timetable could slide if enough Iraqi brigades have not completed the training, or for other factors.

The U.S. official would not say how much territory ISIS fighters now control because, he said, there are varied estimates even among the intelligence community. “I would be hard pressed,” said the official. But since operations against ISIS began last summer, Iraqi Security Forces have retaken between 700 and 800 square kilometers.

Militarily, ISIL is in decline,” said the official, who claimed the coalition had taken three-quarters of one military division’s worth of equipment and resources “off the battlefield.” But the official offered no clearer picture of the estimated sizes and state of ISIS fighters today.

On the north flank of the greater ISIS war, the U.S. military official notably also cited the pressure on ISIS coming from President Bashar al-Assad’s forces as a factor in the group’s decline.

In the north, Syrian rebels are closer to receiving U.S.-led training. A training site in Turkey for Syrian rebels is “ready to go,” the official said, but is awaiting a final agreement with the U.S. to be signed. A training site in Saudi Arabia is 60 to 90 days away from being ready to open. Training at a third site in Qatar is still nine months away.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.