MILITARY POLICE
INTELLIGENCE CAPABILITY
KESHAV
MAZUMDAR ATO CMAS
MILITARY POLICE
INTELLIGENCE CAPABILITY
A military police Commander leads soldiers so as to
protect the army installations and soldier’s lives.
The military police function in addition to:
·
Reconnaissance
and Surveillance operations (R&S)
·
Area
security operations(AS)
·
Law
and order operations(LO)
·
Internment/Resettlement
operations(IR)
·
Criminal
Investigations
·
Maneuver
and Mobility Support
·
Response
force
·
Liaison
·
EPW
handling
·
Base
Defense
also has an intelligence component , the criminal
intelligence dimension wherein the military police identify local criminals in neighborhood
of the military base/installation,terrorists,subversive elements, drug mafia ,
army personnel who are liable to be subverted, civilian contractor’s who can
cause security concerns and other elements, apprehend them , conduct limited
preliminary interrogation and if intelligence is obtained that can affect
commanders mission or is of use to higher, adjacent headquarters, is fed to the
Intelligence officer of the Command/supported unit for further action. The
military police intelligence function heightens the situation awareness of not
only the MP Commander but also the Commanders of the adjacent units/supported
unit if any and the Command.
So far in our Indian military environment the
military police was never involved with HUMINT operations. But this is the
exact area which should be brought into focus during MP operations, an area
which if properly leveraged can be a force e enabler.
Routine MP operations like patrolling, convoy movement,
community interactions and those operations which are associated with standard
military tactical operations either during rear-area security or forward
operations—all these give ample opportunity to the MP personnel to collect intelligence,
evidence or any data—raw data that is, not yet collated, analyzed but of
sufficient significance so as to be given merit and deemed fit to be forwarded
for interpretation,analysed,transformed into an intelligence product. The MP
can function as an auxiliary intelligence unit and considering its protective
and reconnaissance/surveillance attributes, the addition of the intelligence
function to existing MP functions will in no way burden the soldier or the unit
nor interfere with its operations and as for training , a minimal training is
sufficient—the MP soldier already posses an inquisitive intelligent mental
frame with an acumen for intelligence. The MP unit can definitely act as an enabler
for the intelligence units and provide support in form of information accessed
during MP operations or during joint operations with the tactical units.
Prior to any combat operation or mission , whether
tactical or operational, although nowadays intelligence is generally tactical
driven , an intelligence preparation of the battlefield is conducted by the
Commander in charge of the operation. The area of operations is examined
carefully by taking into consideration nearly every factor including physical terrain,atmospherics,and
enemy characteristics in Toto thus getting a clear picture of the threat and
environment through systematic study. It is designed to support staff estimates
and military decision making. In any combat operation we have certain critical
points known as decision points DPs in time/space. These DPs are the nerve
points in the combat chain/network if we can imagine all combat sequences and
subsequences as a network. These nerve points/nodes can be
‘’killed’’/’’choked’’/’’destroyed’’ and to do that we must ascertain them in advance.
That is identify them and if not identify then at least anticipate them. To
this end we must have a clear picture of the battle space ,physical terrain and
the enemy characteristics and the
effects this battle space will have on the actions of both the enemy and
our own, the likely course of actions of the enemy and the resultant actions of
ours and the likely follow-up courses of action of the enemy—this way we are in
near-total control of the situation , we can determine the DPs and focus our
combat power/tactics on those points and strengthen our own combat power. So
that’s it. The intelligence preparation of the battlefield—the most important
prerogative of the commander and staff before planning and it is here that the
other commanders or in other words commanders of adjacent units and at all
levels should also come forward and participate in the planning and the MP unit
commander is no exception. Intelligence feeds/information inputs from the MP
functions (R&S,AS,IR,LO) are directly fed to the intelligence officer in
the staff who with the assistance of the intelligence unit officer conducts
processing and tables the intelligence as primary input to the commanders
planning desk. The MP units collect police,criminal,combat information as well
as advise on possible threat scenarios and anticipated COAs while assisting the
Staff intelligence officer during the preparation of the intelligence estimate.
The MP should conduct the intelligence preparation of the battlefield with the
objective to conduct intelligence led police operations. MP INTELLIGENCE INPUTS
ARE VITAL FOR FORCE PROTECTION MEASURES.
The HUMINT dimension in an otherwise strictly
policing oriented MP battalion(with which we are familiar but not the HUMINT
aspect) is often overlooked due to the very doctrinal concepts and TTPs of
MP.These outline MP functions, limiting them to strictly security control such
as access control, manning checkpoints, conducting investigations and other
policing duties, maintaining security of installations,bases,camps and in times
of war accompanying MI teams for facilitating segregation , movement and
detention of HUMINT/CI sources , EPWS,refugees, and the like.
But
there is a HUMINT base that the MP can tap into to acquire intelligence information.
It is not being purported that the MP solely acts as an intelligence unit. What
I mean to say here is with minimum formal training in tactical questioning and
interrogation (although the former sometimes or on many occasions yields the
information the MP personnel are looking for) the MP can collect, gather or collate raw data (information not yet analyzed) from
the reports, actions and activities of soldiers in an area of operation.
Routine operations including convoy travel, interaction with the local
populace, as well as standard military operations provide a wealth of raw data
which can be collated and analyzed.
The MP
Intelligence function supports,
enhances, and contributes to the commander's protection program, situational
awareness, and battlefield visualization by portraying relevant threat
information that may affect his operational and tactical environments. This
threat information—whether it is police, criminal, or combat information—is
gathered while conducting MP functions. all information collected while
conducting MMS, AS, I/R, and L&O functions continues to be reported through
the proper channels so that it can be analyzed by the Intelligence Officer .The
MP maintains constant liaison and communication with higher intelligence staff
, civil police , adjacent units , in
case of COIN PSYOPS platoons/units , and all security forces elements in the
Area of operations for whom the information
is of value.
The Battalion Commander and the PM look after the MP
intelligence activities. Accordingly they allocate available staff resources in
their command in the most appropriate manner to monitor the MP activities.
IPB PROCESS
AND PIO FUNCTION
·
The Commander
and Staff conduct an intelligence preparation of the battlefield (area of
operations in case of COIN) to assess the enemy’s capabilities, order of battle,
strength etc , environmental factors and physical terrain affecting operations
of both the enemy and our forces while gauging the overall situation by
exploring all the possible courses of action of the enemy. In case of COIN an
additional element comes into the picture , the local populace. In short IPB
increases the situational awareness of the Commander and assists in identifying
intelligence gaps. Thus the Commander can selectively apply his combat power
while retaining the decision advantage. The battle or any tactical operation
has decision points in the combat cycle , these decision points of the enemy
need to be targeted.IPB is a very very essential pre-planning component and is
the foundation on which rests the success of any mission.MP units should also
contribute to IPB in their own way. During Area Security , Internment and
Resettlement , Patrolling and Reconnaissance , Critical Assets Protection , EPW
and Detention operations and TCP/Check post-Roadblock manning and screening
operations they often come into contact with witting persons , walk-ins ,
apprehended suspects , local populace , escapees , criminal elements and other
elements like terrorists , infiltrators , insurgents at check posts etc who can
be sources of information of intelligence value , whether it is extracted in
normal course of conversation , or by interrogation.When such information is
received , the MP personnel forward it to the PM , Higher HQ, adjacent MP units
, adjacent combat units , civil affairs dep’t , the local police and other
agencies for further action. In addition all apprehended, detained individuals
are escorted to rear areas or interrogation centers for further exploitation. The
MP thus serve a very important role in secondary intelligence collection so
that the primary collectors like HUMINT and CI agents can focus on more
important issues like the prioritized intelligence requirements of the
Commander.
The IPB process consists of the following four steps:
·
Define
the battlefield environment. Here
the intelligence staff officer and team identify the , the leadership, strength , capabilities ,
disposition , table of organization and equipment and all other factors
highlighting the enemy’s order of battle. In addition the area of operations
perimeter is determined and areas of interest too are taken into reckoning(as
in COIN an insurgency movement , on being strongly suppressed by the COIN
forces , may shift to an adjacent area or it could be that the insurgency in
the AO influences the population of the areas of interest too which could later
become launching areas for operations in the current AO by the insurgents).Also
the various courses of action that can most probably be resorted to by the
enemy are considered. Intelligence gaps/requirements are identified and
prioritized in accordance with the mission.
·
Describe
the battlefield effects. Here
the physical terrain , the weather and all environ mental factors are studied
closely as to how they can affect both the enemy’s capabilities and that of our
forces. Although final course of actions are developed later but still an
assessment is made how these environmental and terrain factors can affect all
possible course of actions. But here specific course of actions are not
considered ..In this phase of IPB a general study of enemy and our forces
capabilities/ops are conducted in the
backdrop of terrain , weather , local infrastructures , and geography.
·
Evaluate
the threat. Here in this critical phase the intelligence staff
attempts to determine how the enemy will employ his forces in combat , what
possible tactics he may resort to under similar conditions. Here doctrine is
very important , more important are updates to it , historical , and any
current operations against the enemy wherein lies the recorded information
about what tactics and techniques he had resorted to , what were the outcomes ,
how they were neutralized , our success and failures etc.The intelligence staff
studiers all past and present records about the enemy and also creates threat
models corresponding to different hypothetical scenarios. In case of an enemy
which is less known and records are few , intelligence about him is gathered
from e very source possible , including open sources. It should be born e in
mind that open sources like the web , news , media , enemy opinions and
policies which are made public , enemy weapons purchases which can be accessed
from media etc account for more than 90% of the intelligence we have about the enemy.
This is a fact but often overlooked and only military intelligence assets employed.
Whatever , for a lesser known enemy more aggressive intelligence activity is
required in earlier two phases so that this phase may be tended to satisfactorily
and threat models constructed.
·
Determine
the threat's COA. Finally here
, with all information in hand from earlier IOPB phases , potential enemy
objectives and COAs open to him are determined and modeled.
It should not
only be the Command intelligence staff’s prerogative to conduct an intelligence
preparation of the battlefield. Each and every Army Commander and his including
the MP should undertake this responsibility during the planning phase , the
latter utilizing IPB as a tool for executing police intelligence functions. During the IPB process, the Command intelligence staff uses all available databases, intelligence
sources/products, and related MI disciplines to analyze the threat and the
environment. The MP supports this process
by providing the police, criminal, and combat information collected during
execution of Area Security , Maneuver
and Mobility , Law and Order, Internment and Resettlement , Base Defense ,
Reconnaissance and Patrolling Critical Assets Security , EPW handling , Liaison
with civil police band Criminal investigation operations.
PASSIVE MODE
PIO
The MP team received the information while conducting
a TCP and submitted it through the appropriate chain of command, which resulted
in an action taken. This example stresses the importance of submitting
information up the chain of command regardless of whether it may be police,
criminal, or combat information.
When the Brigade Int officer in conjunction with the
Col(GS)Int officer identifies gaps in intelligence that is any missing
information about the threat/threat situation which should be known by the
Commander, they study its relative importance compared to other intelligence
requirements and may label it as priority requirement. Thereafter they evaluate
the collection assets as to availability , capability and performance history
and thereafter the Staff officer (Ops) go on to task the selected assets with
the collection activities. At this stage if the officer feels the MP has a role
in the collection then he will task the PM through appropriate channels. As such he must provide the PM with a clear picture of
the requirements and the ground situation.
The
MP performs certain functions such as Law and Order , Area Security , Maneuver
and mobility support , Route R&S , Reconnaissance , Area Damage Control ,
Base Defense , Critical Site and Asset Security , EPW/CI handling , Criminal
investigations etc.Out of these operations Area Security , Law and Order ,
Reconnaissance and Maneuver and Mobility Support operations enable the MP
personnel to gather data/information which may be of intelligence value. This
is so because during the conduct of these operations they come in frequent contact
with other organizations in the area of operations , police authorities , local
populace , NGOs,and paramilitary forces/security forces who may volunteer
information which they have obtained during their own course of operations , or
during criminal investigations or as the case of local civilians may be , what
they have observed and heard in their local communities. If the MP receive,
observe, or encounter information (police, criminal, or combat) while
performing these functions, they will immediately submit a report to relay
information up the chain of command.
Now
the PM after receipt of the mission from the Ops officer analyses it and
decides which MP function out of the four can yield the required information
arising out of the information gap (prioritized intelligence requirement) and
accordingly tasks the MP personnel carrying out that function. The personnel
will be instructed to collect information in this regard and once they do get
any information they should immediately notify higher HQ , adjacent units in
appropriate report format which will include the size , activity , location ,
unit , time and equipment and also spot reports containing brief spot
assessments.
The
MP personnel may encounter two types of information: criminal and combat
information.
- They should without delay inform the adjacent
units (or the units operating in the area) about the criminal activity and
warn about possible force protection breaches.
- Pass on the information to the local police and
intelligence agencies
- Update its own criminal intelligence folder as
well as the folder with the intelligence officer in the Brigade and
Col(GS)Int .
- Extrapolate and utilizing more collection determines
future criminal trends and other related/potential criminal activity.
- Determine if further MP support is required for
the affected area so that the criminal activity may not hamper our ops and
breach force protection measures.
If combat information is
obtained, the MP—
·
Pass on the
information up the chain of command to the BGS(Int) office
·
Pass on the
information to the PM
·
The intelligence
collection activity being conducted by the MP personnel are directed by the
intelligence requirements. Now as further combat intelligence surface they may
need to adjust their intelligence collection plan , integrate the new
information in the process and if necessary take appropriate action.
·
They should
immediately inform the units in the AO of the combat intelligence information.
This is very important.
MP
INFORMATION FILES REPOSITORY :
All
information procured by MP personnel must be systematically recorded in files
called activity files. These files should be protected by access protocols.
They should not be available for general inspection/review but only personnel
authorized by the Garrison commander can access the files.
They
generally contain information of policing and investigation nature. We can
divide them into further three categories:
·
AREA FILES
·
ACTIVITY FILES
·
INDIVIDUAL FILES.
Area Files : Included are any information of policing interest on
any geographical area falling within the installation/base perimeter or
adjacent areas up to a certain definable distance. This distance should be
based on the assumption that any threat activity can hamper base operations and
security of personnel, equipment and information. Housing areas, supply and
storage areas, recreational/training areas and off post hotels,clubs,bars or
any area which is prone to civil disturbances or which can act as staging
areas/sanctuary for criminal elements/terrorists. During the conduct of
intelligence operations the MP personnel can interact with the local community off
post and elicit information or use tactical questioning during
patrolling/reconnaissance operations.
Activity Files : Activity files contain any or all information that
is of interest to the MP. Bear in mind that activity files are not limited in
content by geographical area constraints or jurisdictions. There can be threats
to military personel,installations,information systems, logistical routes and operations.
These threats cannot be overlooked and military security takes priority over everything.
If individuals not belonging to the defense sector are tagged then their
profile is recorded in these activity files. Instances such as damage/sabotage
or theft of military equipment/property/weapons/ammunition/records ,espionage
or disclosure of classified information by unauthorized personnel
,demonstrations being conducted on/adjacent to the military base with a violent
undertone/implications or any other attribute/size/character which predicts disturbance likely to affect
the conduct of military operations/activities adversely –all of these are
recorded in the Activity files. Threat profiling that is to say all
direct/indirect threats to military personnel or civilian defense personnel is
recorded in these files. One should be specific while ascertaining these
threats if and how they adversely impact the official duties/functions of the
threatened personnel as this may indicate the intent of the adversary from a
perspective of the latter’s higher echelons, say a case of counterintelligence.,
Another area of interest is the security of key military projects/facilities
and classified defense contracts and any threat/s to these by identified persons or by demonstrations need
to be recorded in Activity files. Any act which violates law and order on the
installation premises and all subversion cases should be accounted for in these
files. Finally cases where there is a question about the
loyalty/discipline/morale of any military/non-military DOD personnel should be logged in these Activity files.MP
Activity files ,if maintained meticulously can be a great asset for
counterintelligence personnel.
Individual
Files- Any individual identified as being of special significance to law
enforcement, either because of activities, leadership, contacts, or even as a
symbol of some nature, must have a dossier duly maintained and updated. This
dossier is nothing more than a complete biography to include information on
habits, income, friends, weaknesses, and personal history. The individual’s
police record, disciplinary record, and details of other contacts with law
enforcement agencies are included.