TACTICAL QUESTIONING

Framed to ask local civilians on detention , suspected insurgent informers/agents and insurgents. Questions can be phrased in simple language and ground soldiers like Cobra troops need no extensive special training.This is not interrogation but tactical questioning-to gain information of possible intelligence value on the spot.

 

Collecting Information

Soldiers patrol the same area day after day. Sometimes they go in for deep area patrolling and reconnaissance. All this is done with the intent to collect combat information.In any operational environment soldiers should always be primed , alert to collect information.Of particular mention here is te word ‘’change’’.While patrolling the soldiers may discern a ‘’change’’ in normalcy of the surroundings. While studying the surroundings , like the people,terrain,infrastructure the soldier should recognize any changes in the environment.Often than not these changes are important indicators cof enemy activity or intent.The soldier may not be able to find out the reason behind the change , still it’s very important he report it to the intelligence personnel. Soldiers should train themselves to become constantly aware of conditions such as

 

• Armed Elements: Location of factional forces, minefields, and potential threats.

• Homes and Buildings: What is the condition of the roofs, doors, windows, lights, power lines, water, sanitation, roads, bridges, crops, and livestock?

• Infrastructure: The presence of functioning stores, service stations, etc.

• People: Numbers, sex, age, residence or displaced persons, refugees, and evacuees status, visible health, clothing, daily activities, and leaders.

• Contrast: Has anything changed?

 

If everyone is involved in the collection of combat information, then everyone must be aware of the information requirements. All soldiers who have contact with the local population, routinely travel within the area, or frequently attend meetings with local organizations must know the information requirements and their responsibility to observe and report

 

While handling detainees and EPWs keep the following in mind:

 

1. Segragate the detainees and EPWs based on nationality , sex , profession , ethnicity (civilians) and rank , insignia , and regiment (may be belonging to enemy intelligence unit , thus game for special interrogation )

 

2. While searching the person of the detainee or EPW search thotoughly.Keep separate the records of documents , seized equipments and weapons(capture tags).Describe all documents,equipments and weapons as completely as possible.This is not DOCEX or Captured equipment exploitation in its entirety—that will later be done by trained HUMINT personnel and with help of technical assistants.What is being done here is tactical exploitation , just like tactical questioning—on the spot intelligence extraction.

 

3. Intelligence is perishable and combat intelligence is highly perishable , action is required as soon as possible and for that the intelligence must reach the targeting platform without any delay.But there are procedures.The prisoners and detainees who are felt will yield more information on further questioning must be moved as soon as possible to the rear where interrogators are waiting.Bear in mind that with time the detainee/EPW emboldens , the initial panic which he had on point of capture wears away , he gets time to think and also harbors escapist thoughts—escape from captivity.We are here talking about the duties of secondary collectors , the line troops who must move them fast to rear after ascertaining that they do have information of value.There are mobile interrogation teams to handle cases right on the spot at forward areas and copmposed of a mix of HUMINT/CI but that is tactical HUMINT and will be dealt within my book on Counterintelligence.

 

4. Kep a tab on the detaines , EPWs and all others so that they do not communicate with each other.

 

5. Remember the personal safety and protection of all detained for questioning can be a cause for concern under certain circumstances and hence they must be safeguarded.For example someone from the line troops may vent his personal anger on the enemy by attempting rough handle the detainees or prisoners.Sexual harassment is also an issue.Whatever be the case , they must be treated humanely.

 

Key Considerations for Talking

• You must be aware of the existence, nature and type of threat in your area and the vulnerabilities of the protection measures taken by your commander which are liable to be tapped. Overall you should know the force protection measures taken by your unit.

• Be careful about the local culture, traditions, customs.

 

• Your body language should project a friendlier flavor, not an intimidating one. Point weapons away from the accosted person.

 

• Talk to people in normal surroundings.Dont lead them to an isolated area, an alley or any place which will make them suspicious. Always be polite. Remove sunglasses.

• If you are speaking to a woman know local courtesies.

 

 

Questions

Questions should be so structured so as to be simple, straightforward, should open and maintain the conversation, should start with an interrogative, and should prompt a narrative answer. Interrogatives are what, why, when, who and where. Questions should not be closes provoking only an ‘’yes’’ or ‘’no’’ as answer but should be ‘’open’’.Avoid asking questions that are confusing. Characteristics of open questions:

• Act as an invitation to talk.

• Prompts the person to answer comfortably and feel encouraged to continue with the conversation.

• Not too specific but broad in nature.

• Encourage discussion.

• Creates a situation favorable for the soldier to be the listener(and observer) for a major part of the conversation.

• Does not cause the person to feel intimidated or threatened.

• Invokes curiosity of others and allows them to get involved in the discussion spiritedly.

• Gives the person the opportunity to tell his opinions, his judgment, what he feels is important, what he feels should be done.

• Should invoke a conversation, not a question-answer scenario.

Be subtle, don’t just jot away on paper the answers –that is not conversation and always be friendly, cooperative, observing him carefully but not arousing any suspicion, studying his body language and be courteous and reserved.

 

 

 

 

Questioning to Fill Out the Capture Tag

You are manning a check post or roadblock..Before being deployed to do so your unit commander has briefed you about the intelligence requirements as per current mission. The Battalion prioritized intelligence requirements lead to the generation of intelligence requirements for each company and subunits. These intelligence requirements as spelled out to you will guide you in framing the questions to be asked of individuals at the check post/roadblock. Once you, the soldier, have screened and detained a person categorized either as a detainee or EPW you must now obtain all possible details from him so that on subsequent questioning/interrogation of the person by the HUMINT or CI agent, the latter is well prepared initially with the information you have supplied. You must fill out a capture tag which will facilitate further questioning/interrogation. The capture tag must include:

What is your job? What is your speciality? Are you a combatant? If so what is your rank, number and unit? Who are in your chain of command? Whom do you report—that is who your immediate superior is? What is the mission of your unit? Are you a civilian? Then why are you here? Who is your immediate boss and what is the name of your company? At the time, place and point of capture, detention what was your immediate mission—that is to say why were you there and what were you doing or what were your plans? Were you supposed to conduct any mission/job when you were captured/detained? What are your future plans and what is the future mission of your unit/company? You might note he is carrying documents, maps, identification papers; photographs.Here is where you might find things out of the ordinary. The map might be of another place or even this place: Why are you carrying this map? The photo/s might be of someone else: Who is this person and why are you carrying his photograph? The ID papers may belong to other persons and hence you ask him why is he carrying other peoples identification papers and why. And where are these persons as they are in a disturbed area and that too without identification papers. All these exploitable documents can now be handed over to the MI section together with the detainee/EPW.

 

Remember your questions should be guided by your unit’s intelligence requirements and as briefed to you but on no count should the person being questioned get a whiff of these requirements or your mission. Everything should be done in an atmosphere of normal conversation.

Example Questions

Questions must be framed in such a manner so as not to elicit vague or misleading answers. They should be direct, pointed but at the same time broad so that the person being questioned does not misinterpret it or has any room for maneuver. For example the following questions were designed for soldiers manning check posts/roadblocks. Modify them to accommodate EPWs/detainees, local population as per your mission, situation and unit requirements.

 

• What is your name (Match this with any identification document found on his person) Cross-check with CI White list, Black list and Grey List)

• Where do you live and full address, where were you going and why, how did you arrive here. From here to your final destination point—what will be the route and why? In what way is it safer or convenient for you? Who will facilitate your journey? That reminds me, who facilitated your journey till here, financially or otherwise? (All these must be specifically answered or obtained)

• What is your present occupation, your specialty-if any and your qualifications (see if he has any technical expertise)?

• What was the type of physical terrain you travelled to get here? During your travel what all obstacles you faced and how did you manage to overcome/circumvent them. While travelling did you observe anything out of ordinary in your surroundings? Or any unusual activity?

• What currency are you carrying and how much? What is the money intended for (if found to be a big sum)?

• Can you name anyone whom you know personally who is averse to Indian security measures/ops here in this area? On being answered immediately follow with ‘’who else’’.Do you know or are you aware of the nature and type of any anti-Indian security operation/any other activity here or anywhere else and dates or time of such activities? Can you tell me the reason for our forces to be here? Do you support our activities?

DO NOT’s

• Ask questions which might reveal your intent or which might make him aware of your units mission, intelligence requirements.

• Jot down answers before him.

• Don’t resorts to quid-pro-quo.They are not permanent sources to be given goods/money in exchange for information and neither are you an intelligence specialist. The same goes for EPWs and detainees.

• Do not resort to coercion. You may be reported to social media. Or the police. Remember we are all governed by Geneva Conventions.

• If you are handling EPWs and detainees escort them to the interrogation center as soon as possible. You are only supposed to ask basic questions to civilians in conversational mode. Yes if situation is fluid, like in battle and yu accost suspicious civilians you may resort to interrogation based tactical questioning, but only to ascertain if they are of interest to HUMINT/CI personnel and carefully examine any captured documents. In such cases escort them quickly to detention centers from where the MP will take them to interrogation centers. • Pay money for information.

• Do not be so cooperative so as to tell them their rights that can be handled later. First the information from them.

 

Reporting

 

For tactical operations, there are four levels of reporting which assists the Unit intelligence section to factor in all useful tactical information gained during the small units activities in the overall planning of the mission (and also update ISR planning):

Reporting immediately any information the soldier considers of critical tactical value.The soldier may resort to his commonsense/experience or any predetermined criteria to arrive at his judgment.•

• Normal reporting

• Information during normal debriefing sessions by the intelligence officer.

• Follow-up reporting, after debriefing by the intelligence officer is over.

 

Document Handling

When there are documents on the person of the detainee efforts should be immediately made to:

· Classify them

· Seize , Impound or return them

· Determine if they contain information which can be exploited further by trained intelligence personnel (DOCEX).

Remember that any document, even though it may seem irrelevant on first sight , may on close inspection reveal information of interest , might satisfy intelligence requirements and with other seized documents give a bigger picture of enemy intent.

 

Classification:

Documents can be Personal such as letters, diaries, photographs, flyers posted in cities and towns, etc ,Identity such as identity cards , passport, drivers license , ration cards or Official such as documentation government/military information , for example military books , field manuals, military reports,files,maps etc.

CED (Captured enemy document) is a piece of recorded informnation seized from the captured person belonging to the enemy forces or any civilian in collusion with the latter.We can also name our own military documents CED that were in the possession of the enemy.DOCEX of such documents can rev eal what they know about us , or if anyone was involved on our side in transferring these documents to the enemy then we are alerted to the fact and going by the nature of the document or its origin we can put our CI agents to track him down.CEDs can be found on the person of EPWs/detainees , abandoned military areas , on the bosies of killed enemy personnel , old enemy command posts , destroyed enemy forward tactical headquarters.

A CED is defined as any piece of recorded information obtained from the threat. CEDs can also be US or allied documents that were once in the hands of the enemy. CEDs can be found almost anywhere; some locations include abandoned training sites, old enemy command posts, deceased persons, cafes, town squares, or in the possession of EPWs/detainees.Written or typed material, drawings, audio, and/or video recordings, computer disks,etc can constitute the content of a CED.

Once you have critically studied the CED you have to decide on three actions:

· Return them to the owner as they are very personal items and do not contain any military or governmental information

 

· Impound the CED with the intent to return them later as these documents being of personal nature contain information pertaining to the military but which after examination is found not to have any bearing on current situation or having any affiliation with the enemy. Still they will be sent for DOCEX and if the initial assumptions are true , they will be returned.

 

· Confiscate the CED as it contains military or governmental information (all official documents)

 

Every confiscated or impounded CED must be tagged and logged before being transferred for DOCEX.

The capture tag should contain the

 

1. Unit details who captured the CED

2. Location of capture : Grid coordinates

3. Time and date of Capture

4. Identity of the person from whom it was captured including brief description (Rank , unit etc)

5. Prevailing circumstances under which the capture was made

6. Description of the CED

 

APPENDIX

TACTICAL HUMINT

HUMINT is collected information which we term positive intelligence after processing.HUMINT collectors access human sources and multimedia to gain information about enemy intent,composition,disposition,capabilities,table of order and equipment, command control nodes, centers of gravity,leadership,personnel—this is also called Order of Battle when conducted prior to a combat situation. The Commander specifies his intelligence requirements explicitly and going by these requirements , prioritized , human sources,informants,and other human elements possessing information compatible with the said requirements are utilized by application of specific techniques like tactical questioning,debriefing,document exploitation, eliciting and interrogation and reconnaissance and surveillance. The HUMINT collectors are not intelligence operatives with general intelligence education and training but specialists. 

Counterintelligence is also a collection oriented discipline like HUMINT but not an intelligence discipline in the strictest sense. It is concerned with enemy intent while HUMINT is concerned with collection part only so as to satisfy Commanders intelligence requirements in order to answer certain information gaps.CI attempts to prevent sabotage,assassination,terrorism,subversive and enemy intelligence activities , deny the enemy access to installations and sensitive information , acts as a protective shield for the Commander by supporting OPSEC and force protection and acts in an advisory capacity recommending countermeasures to enemy intelligence activities.CI is a protection component in the Commanders repository of defensive tactics and techniques and CI also protects the intelligence cycle. Several definitions exclude personnel, physical, document or communications security programs from CI purview , but on close inspection it will be seen that CI invariably is resorted to while implementing force protection and denial/deception measures (information warfare) thus bringing in play the security aspects of personnel , physical,documents.CI support tio physical security , infrastructure, technology protection, military security,HUMINT –all these some way or the other involve those elements that are kept out of general definitions.

Definitions can be very confusing, may render doctrine imperfect and lead to redundancy. For example the Army ten ds to maintain a general perspective on threat—statements like our forces are prepared to deter /attack/defend against a wide spectrum of threats, ranging from criminal activity in our jurisdiction which may abet our main enemy, terrorism , subversion to small wars, wars and battles. Now this generalized concept is fine in that we can have several security programs, each tending to one specific threat type in the entire spectrum. But the disadvantage in this approach is we cannot focus on the main threat, say terrorism, and as security concepts like force protection, deception operations, physical security, military security,etc all have certain elements in common we land up with redundant programs designed to handle these security concerns. For example antiterrorism and force protection both have in common physical security as a passive defensive subcomponent where the installation critical points are protected after vulnerability assessments and red teaming. The same subcomponent is the major component in a physical security program. Thus there occurs good redundancy if we do not have a focused view of the threat and counter threat measures become diffused over the broad spectrum.

 

The same goes with the definition of intelligence and CI. Or rather I should say the general p[perspectives held by most Commanders and even intelligence officers.

 

The main idea is to remove uncertainty and gain a decision advantage. This should be the prime objective of the Commander.HUMINT and CI are both shaping operations but with a critical difference.HUMINT shapes the Commanders view of the battle space by providing him accurate intelligence about enemy order of battle. Plus other information requirements when ops are in progress.CI on the other hand penetrates the enemy commanders decision cycle and shapes his views ‘’like the way’’ our Commander desires by denying the enemy commander access to our operations, plans and information systems , and using offensive methods like penetration , infiltration and also denial/deception operations. Both shaping operations have one thing in common as goal. To act as force enabler. To heighten the Commanders situational understanding. In other words to gain that ‘’decisive ‘’ advantage. .To get a ‘’positional’’ advantage. HUMINT shapes the "Blue" forces' understanding of the "Red" forces while CI affects the Red forces' knowledge of Blue forces.


HUMINT shapes the understanding of the ‘’Blue forces’’ with respect to the ‘’Red forces’’ while CI does the reverse. True both use several techniques which are in common like interrogation and other low level source operations but going by what has been discussed CI is not HUMINT and not in the least a subset of HUMINT. Being a subset would mean CI operations would be counter-HUMINT only. But CI looks beyond that, by conducting offensive operations, denial and deception operations , exploiting enemy intelligence activities ,neutralizing them through collection of evidence and subsequent prosecution for national security crimes, and supporting tactical and theater operations by feeding inputs to the decision cycles. Thus we see CI goes far beyond Counter-HUMINT operations.

Interrelationship

CI also provides positive intelligence about the enemy as a byproduct of its operations.CI and HUMINT operations overlap in that very similar techniques are often used. In fact in tactical operations a mix of HUMINT and CI operators plus a linguist carry out tactical HUMINT operations where the roles of both are more overlapping and confusion arises when either may operate like the other. We should not always justify HUMINT source operations..this leads to the mistaken impression that CI only lends support to HUMINT and has no other function and that HUNMINT and CI are the same thing.NO.Whereas HUMINT focuses on the enemy’s organization,composition,capabilities and decision making without any focus on the intent of collection , only collecting all require information laid down in the commanders prioritized intelligence requirements order , and reporting it through proper channels (and here full stop) CI will go much further , exploiting , neutralizing the enemy intelligence activities or doing both…CI is concerned with enemy ‘’INTENT’’.HUMINT focuses on the enemy’s decision making cycle to gain information for the Commander whereas CI attempts to ‘’INFLUENCE’’ that decision cycle and shape it the way we want it in order to achieve winning objectives. Thus the HUMINT operative tasking end after detecting and identifying enemy intelligence activities while the CI agents tasks begin afresh.

From all this discussion we can derive two things:

 

1. HUMINT and CI are different.CI is not a subset of HUMINT.

 

2.As HUMINT and CI have many similar lines of operation , if both can be combined to satisfy tactical requirements ,(during theater or national-level requirements they can revert to individual role-this capability must be retained) , we will have an intelligence operator who will be more versatile,adaptable.and can confirm easily to all army requirements at the tactical level. Tactical intelligence formations can execute this tactical HUMINT asset (the operator) to satisfy commanders requirements. Merging the capabilities of HUMINT and CI results in a task organization of skills for the Commander—definitely an improvement over either HUMINT or CI enabled operations. Tactical HUMINT operations are most suitable for developing and maintaining an excellent informant/source base that provides timely, specific and accurate information. Tactical HUMINT operations combine both HUMINT and CI techniques and together with linguist assistance , are more capable of developing and maintaining contacts than only HUMINT or CI ops.For example , the Tactical HUMINT team comes across few individuals of interest near the forward area , the HUMINT operators conduct tactical questioning to extract information of intelligence value and then pass them over to their CI colleagues for further interrogation if they discern any information of interest to the CI operators. This can be switched to and fro and the application of the combined faculties of both results in more refined, relevant and timely/accurate information. If the individuals are of the witting type or have voluntarily offered to deliver information or are community members sympathetic to the forces, then they can be inducted into the source repository by establishing rapport/giving incentives etc and then later their assistance taken for more information. Tactical HUMINT teams can act as mobile interrogation teams at forward areas, quickly disposing off sources after tactical questioning and interrogations, thereafter detailing escort for those who may render more information or who, it appears are suppressing tactical information, sending them to detention centers and collocated interrogation areas near forward areas or in the rear. The standard procedure of detaining and escorting to rear interrogation areas is hereby bypassed as in this procedure , the time taken to assess , detain , segregate , and transport to rear areas can negate the availability of timely intelligence—intelligence is highly perishable ,. Especially combat intelligence, where time is of essence.

Hence as the repository of sources grows, the quality and content of available information is enhanced and for the commander tactical intelligence, most of the time, is at his fingertips. Compare this to the situation where earlier, HUMINT or CI operations had to be complemented by intelligence from theater or national agencies, and it so happens they cannot provide real time, ground intelligence always for combatant commanders.

The soldiers will be given language training, Basic CI training, operational debriefing training so that as and when required they can shift from tactical to operational briefing to CI functions. The focus of training should be cultivating the capability to conduct contact and informant operations, recognize information of CI value, and execute tactical questioning of civilians, and screen EPWs and detainees with the assistance of an interpreter.

 

Tactical HUMINT team functions:

1. Tactical tasks with Language training

2. HUMINT Ops=Strategic Debriefing

3. CI

Here it should be stressed that intelligence nowadays is tactical—the focus should be at tactical level as soldiers fight wars nowadays more than battles. Small-wars in fact. Hence the dire need for actionable intelligence/tactical intelligence. Here the players are combatant commanders who must move swiftly in their maneuver and strike decisively. Higher echelons are there for planning, average intelligence support, but it is for the ground based Tactical HUMINT teams to do most of the work. And they do it—as their composition is quite what the modern day warfare demands.

 

CI/HUMINT

 

Counterintelligence functional services are provided to promote the Commanders situational understanding.

 

· Define and analyse mission

· Execute CI Surveys

· Prepasre a brief on CI Awareness

· Execute CI Vulnerability Assessment

· Execute CI Threat assessment

· Execute CI Inspections

· Execute CI Reviews

· Execute CI Evaluations

 

Conduct CI support to HUMINT activities

 

Identify, exploit and counteract foreign intelligence activities across the full spectrum of HUMINT activities. CI activities include, but are not limited to, identifying friendly and hostile capabilities and vulnerabilities; providing CI review of HUMINT activities; conducting CIdamage assessments; providing support to Counter Espionage (CE) investigations; conducting and/or assisting in asset validation by physical and technical means.

Perform CI/HUMINT operational planning.

 

1. Supervise the preparation of CI products, as required.

2. Obtain necessary approvals.

3. Supervise CI support to HUMINT operation.

4. Supervise asset validation procedures.

5. Conduct post-mission analysis.

6. Disseminate required reports/products.

 

CI/HUMINT Collection management

 

The CI/HUMINT officer/JCO will match the requirements with the collection assets in hand , checks availability , usage by other adjacent units , deployable possibilities etc and then determines the best collection plan.

 

· Receive prioritized intelligence requirements from higher headquarters or collection manager , conduct analysis

· Create the collection plan

· Study all CI/HUMINTcollection assets available and match them with the requirements

· Decide on the course of action to fulfill collection objectives

 

Docex

 

The CI/HUMINT officer/Jco must be acquainted with the exploitation setup and the units exploitation SOP so that he may, after receiving, accounting and sending the captured materials he may be able to follow-up for results and give future feed inputs to the exploitation cell/agency.

· Understand exploitation agency infrastructure

· Identify exploitable materials

· Categorize them as Biometric Examination or Forensic Examination.

· Take possession of exploitable materials

· Account for and categorize exploitable materials

· Prepare catalogues

· Dispatch the materials to exploitation agencys custody

· Followup with the agencies for results

·  

Identify orders of battle in given Area of operations

 

Identify Ground military attack and defense capability, Air-defense and attack capability, naval capability and all associated military weaponry systems and equipment, such as ground combat systems, antiaircraft systems, naval vessels, etc.Study the enemy infrastructure and locate/identify the keys areas.

 

Intelligence support to Targeting.

This includes identifying enemy targets , both high value and high payoff , nominating in order of priority , recommending kinetic or non kinetic attacks, and thus assist the Commander to destroy, neutralize or exploit the target in a manner which is in line with the units mission and in keeping with the Commander and his staffs requirements.

The Unit intelligence supervisor who controls the target intelligence collection and associated ops/recommendations to the Commander must be as thorough as possible, evaluating all factors and intelligence inputs carefully, studying imagery data and compiling and organizing target information efficiently so that while nominating to the Commander and making recommendations there is absolutely no ambiguity. Target descriptions including composition, location, importance, imagery, graphics, construction—all of these are spelled out correctly and particularly for HVTs/HPTs their location, significance, all associations determined and influence with respect to the leaderships decision cycle/battle space situation.

Identify:

· Targeting Categories

· HVTs/HPTs

· Areas of Target value

· Build a list of targets

· Locational factors of each target

· Associations of each target(COIN)

· Social circles of each target (COIN)

· Assess target significance/value

· Determine whether to employ kinetic or non kinetic attack

· Contribute to attack guidance

· Assess effect of removal of targets on battle space

· Create and maintain target folders

· Decide on target intelligence requirements

· Create target nomination list

· Combat assessment

· Update target folder based on combat assessments.

· Contribute to IO

· decide on restrike options

·  

Evaluate the Threat

Determine threat intent, capabilities, vulnerabilities, possible courses of action and the most dangerous course of action.

It is of prime importance to study enemy activity and indicators to assess his capability to attack, defend, withdraw, reinforce. Focus on the intelligence gaps and this focus can determine the direction of collection of intelligence. Enemy activity patterns should be studied.

Factors influencing the intelligence product are the time available for collection, assets available, unit size, the intelligence requirements, AO features and the mission. The enemy, terrain, weather, local populace are taken into consideration. Identify:

· Enemy Intent

· Enemy Capability

· HVT

· HPT

· C.G.

· Critical areas: Capabilities,Requirements

 

 

 _______________________________________________________________

 

 FP

 

COUNTERINSURGENCY BASES

COIN forces must have a base from which to operate and also project. Bases are secure areas

from which the COIN objective is to isolate the insurgents from the support facilities and protect

the local populace/communities. The base must be carefully selected, reinforced and rendered

fully defendable. Command relationships should be clearly defined. Bases can be of 3 types:

Forward operating bases, Combat outposts, and Patrol bases. The nature of the mission and size

of the unit (Company etc) determines the size and location of the base.

FORWARD OPERATING BASES

Sometimes the nature of operations, the terrain, the size of the AO as well as the size of the units

necessitate a separate forward placed operating base for the Battalion which itself commands

controls, communicates and supports deployed units. It provides intelligence support, sustainment,

replenishment and personnel support as well as functions also as staging area. Each area of

operation may have one forward base. A forward operating base acts as a secure location for the

planners and command staff so as to plan operations, provides security to the local populace and

acts as a deterrent for the insurgents nearby by hampering their mobility and subjecting them to an

increased threat. We can have both Brigade FOBs and Battalion Fobs. In the case of Bde FOBs

they act as rear areas for Bn Companies which are forwardly deployed. FOBs should maintain

either secured road/water or air sustainment capability.

COMBAT OUTPOSTS

Observation posts are reinforced with fire power and combat teams and hence take the shape of a

combat outpost. They are positioned at strategic points inside insurgent-dominated areas , are

company or platoon sized, possess the ability to conduct combat operations on a limited scale and

are in contact with base headquarters as well as horizontally with other combat outposts , in effect

networking both horizontally and vertically so as to:

Cut of insurgent logistical lines

Provide security to the local populace in the immediate neighborhood of the COP

Maintain direct contact with the local populace and hence keep an eye on the activities / strangers

These are not possible from remote bases operating from outside insurgent dominated areas. The

negative factors in this type of arrangement are increased risk to the soldiers and limited area of

operations , nevertheless proper networking among the combat outposts helps greatly in keeping

a grip on the insurgency and the kill ratio as well as protecting the populace. It is very important to

plan the position of the outpost, the emplacement, complete with secure logistical lines,

communication systems and reinforcement capability. Each COP is assigned a sector of the AO.

Outposts may be employed—

• To secure key lines of communication or infrastructure.

• To secure and co-opt the local populace.

• To gather intelligence.

• To assist the government in restoring essential services.

• To force insurgents to operate elsewhere.

Priorities of Work

Certain factors need to be considered while establishing combat outposts.

The selected area must be free of noncombatants , civilians and the like.

To hinder the enemy’s movement , obstacles to his entry to streets , underground

passages,marked areas in rough/jungle terrain should be emplaced.

Carefully choose positions to set up weapons to cover likely avenues of approach.

Clearing fields of fire

Cover and camnouflage.

Obstacles/barriers may be integrated with weapons so as to be auto-triggered.

There should be easy access between positions and the routes must not hinder

speed.

PATROL BASES

Patrol bases are secured areas which serve as long period halting points for patrols. They may be

permanent or temporary.

1. Sometimes it is important for patrols to remain hidden or halt all operations as

information is received that they are liable to be detected.

2. Again detailed study of an area requires long periods of reconnaissance so they

need a place to hide,and then later launch recce ops.

3. After long periods of recce operations,the troops get exhausted and hence retire to a

patrol base for food,sleep or rest,weapons/equipment maintenance

4. After detailed reconnaissance the patrol commander needs to sit down with his

senior NCOs and devise future course of action.

5. In cases when the patrol is in enemy area after infiltrating the area,in small groups ,

they set up temporary patrol bases where they can later meet and regroup and make

further plans.

6. Finally a patrol base is a good launching pad for consecutive or concurrent

operations such as

7. raids,reconnaissance,surveillance and ambush.

 

Purposes

In counterinsurgency operations, collocating patrol bases in population centers enables

combined forces—

• To deny the insurgent access to the local population.

• To influence and assist the local government.

• To provide security.

 

Methods of Establishment

The same priorities of work described for combat outposts apply also to patrol bases:

• Move in with the indigenous population. The advantages are that Soldiers

will have more direct contact with the local administration, the locals will identify the

forces with the government.

The disadvantages insurgent sympathizers from among the masses may inform insurgents about

patrol movements with relative ease, attacks on the base will have collateral damage effects, and

houses cannot be really hardened against attacks..

• Build a new patrol base. Although more isolated from the population, new patrol bases are

usually on chosen ground and, therefore, easier to defend. Additionally, they are far more

resource and personnel intensive during construction. It is generally advisable to set aside

detailed planning time before sending a combined force to occupy the terrain.

 

PLANNING CONSIDERATIONS FOR A BASE DEFENSE

TERRAIN

Key terrain factors to consider include the following:

The terrains may add to defense by virtue of its natural characteristics.Hence

conduct a thorough study of the terrain.To enhance its natural defensive characteristics

more utilize artificial obstacles/barriers.

The patrol bases must have all access routes to it , by road or waterways , under

control.The same applies for all lines of supply and communication and civilian access.

The best technique for base defense is the perimeter defense.

RSTA AND ISR OPERATIONS

Intelligence drives operations and vice versa. In effect the enemy situation drives operations. For

the enemy situation to drive operations we must have perfect intelligence about the enemy. To this

end Reconnaissance , Surveillance and Target Acquisition should work hand in hand with ISR SO

AS TO ACHIEVE PERFECT SYNCHRONIZATION in the deployment and operation of sensors,

assets and processing, exploitation and dissemination of intelligence.RSTA/ISR should focus on

the priority intelligence requirements.Recconnaisance and Surveillance confirm or deny threat

actrivities,plans,courses of action which were gauged by the Commander and his staff during

planning , war gaming and sessions with the collection manager and counterintelligence

specialists.By focusing RSTA/ISR on the commanders needs, his critical and priority intelligence

requirements we can deploy and use RSTA/ISR sensors and assets in the most optimum fashion ,

totally integrated and synchronized resulting in timely and accurate information, combat

information and intelligence to be disseminated to the targeting platforms.

Every operation is initiated as per plan and this planning has certain decision points.RSTA/ISR

should take these critical decision points in perspective , primary perspective and focus all

collection platforms and assets on these points and see to it that al information linked to these

decision points are gathered , nothing left out and disseminated in time to the commander. Again

for this synchronization is essential. Targeting requires proper detection of the target and

evaluation of its importance. Further there should be sufficient reason to nominate the target to the

attack platforms. To this end synchronized RSTA/ISR operations collect all possible information

about the target and pass it on for evaluation and thereafter if the target satisfies the criteria for

nomination the intelligence on the target is passed on to the targeting platform. After an attack on

the target, kinetic/nonkinetic attack or exploitation operations, RSTA/ISR is required to assess the

effectiveness of the attack.

DETECT

HPTs need to be detected and located accurately in order to engage them and here is where all

assets available to the Commander must be used to maximum efficiency.HPTs are critical nodes in

the insurgent network.Engaging and destroying them successfully can render the mission of the

insurgent group unsuccessful.

The priority intelligence requirements associated with the HPT should be carefully defined and

resources allocated accordingly to get intelligence on the target. As time goes on and collection

assets bring in information in line with the priority intelligence requirements the situation

development for the commanders needs is more accurate and continuously updated. Detect the

HPT involves tracking him as movement is a factor. Detecting involves assets like HUMINT

source,

an anonymous tip, UAS, a combat patrol, SIGINT, DOMEX, rotary wing aircraft, military working

dog teams. The best means of detecting a target during an insurgency is HUMINT, such, the

detect activity requires a detailed understanding of social networks insurgent networks, insurgent

actions, and the community’s attitude toward the counterinsurgent forces. For a target that must be

engaged by nonlethal means, the detect function may require patrols to conduct reconnaissance

of a leader’s home to determine if they are there, an assessment of a potential project, or

attendance at a greeting to meet with a leader.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Keshav Mazumdar DipCriminology,CPO,CRC,ASC,CMAS,ATO  is engaged in intelligence/security activities and research and  engaged at present in anti-terrorism research involving social network analysis, and exposure to intelligence-led policing, terrorist profiling, TACHUMINT,terrorist threat assessments and counterintelligence related security fields. He has his Antiterrorism Officer (ATO) credential from S2 Institute of Safety & Intelligence, USA.He is at present the Sr Vice President ATAB,USA,  Advisor  (RIEAS) , Greece and also of European Intelligence Academy (EIA).He has been nominated to the Board of Geo Strategic Forecasting Corporation , USA.He holds a Diploma in Criminology from Stonebridge Associated College UK and in Criminal Profiling(INDIA).He is certified as a Master Antiterrorism Specialist by ATAB , Anti Sabotage Certified (ASC) by the  College of Forensics Examiners International (ACFEI-USA),Certified Protection Officer by IFPO-USA and is a Certified Crisis Response Coordinator (CRC).In July 2012 he has been inducted as Fellow of New West minister College , British Columbia,Canada.He is a member in good standing of several professional Security organizations/Associations including the International Association of Counterterrorism and Security Professionals , Association of Certified Fraud Examiners, International Association of Bomb Technicians & Investigators, IAHN & the International Counterterrorism Officers Association. He is a registered member of the Int Association for the Study of Organized Crime.   His has completed several NATO/Partnership for Peace courses, UNITAR Courses, and is specialized in threat and vulnerability analysis/assessment. He is a certified Human Resource Professional thus enabling him to effectively manage peoples and assignments. He has authored books on Intelligence, COIN, Warning Intelligence, Terrorist Interrogation and Antiterrorism. His expertise in unarmed combat is noteworthy--he is a regd. kungfu practitioner.

 

Along with Admiral Peter Kikareas (NATO, presently retired) he is the administrator of two on line courses in Intelligence and Counterintelligence. This is an ATAB Endeavour to impart quality intelligence training to both Intelligence officers’ as well as responders , a part of the course so designed so as to acquaint the latter with Terrorist indicators , pre-attack terrorist surveillance(dry runs),terrorist profiling and CARVER. The counterintelligence course also covers the TACHUMINT concept. The very important concept of I&W is dealt with thoroughly.

 

 

MEMBER OF:

International Assn of Counterterrorism & Security Professionals IACSP
INTERNATIONAL COUNTERTERRORISM OFFICERS ASSN ICTOA
International Assn of Hostage Negotiators IAHN
International Assn of Bomb Technicians
Antiterrorism Accreditation Board ATAB
Association of Certified Fraud Examiners ACFE
International Foundation of Protection Officers IFPO

 

 

 

 

HONORS/AWARDS/CREDENTIALS:

Anti terrorism Officer Credential ATO
Certified Master Anti-terrorism Specialist CMAS
Anti sabotage Certified ASC
Certified Protection Officer CPO
Crisis Response Coordinator CRC
Certified Human Resources Professional CHRP
Fellow of New Westminster College, British Coulmbia, Canada

 

He comes from a very respectable Indian family , his late father being a soldier and gentleman of highest integrity, war decorated Captain D.N.Mazumdar.He has strictly adhered to his fathers principles. His mother and two sisters, both Professors have nurtured in him a high sense of respect for every living being, big or small, human or of the animal world. His belief in THE SUPREME is predicated by his feelings for mankind, for those in distress and poverty. But he is stoic enough to imbibe the true qualities of an antiterrorist, not flinching when meting out punishment to criminals/terrorists.

 

Performance Review Excerpts

‘’He is more than qualified to conduct training of security forces in a vast number of Intelligence, Crisis and Terrorism Recognition and Response, intelligence led policing and counterintelligence in anti-terrorism & COIN operations.

Keshav has retired Admirals and Generals chairing training committees under him in ATAB who have expressed their appreciation for his abundance of knowledge and his motivation to the furtherance of setting the world standards in terrorism response’’. (Keith Flannigan , Certification Chairman , Anti Terrorism Accreditation Board , USA +1-703-310-7482))

Seconded by : Admital Peter Kikareas (NATO)..Retd.

 

‘’I highly recommend him to be nominated as Fellow of New WestMinster College,Canada.His excellent knowledge of current intelligence/counterintelligence practices in combating terrorism/insurgency renders him ideal for imparting training to security forces.His latest book on counterintelligence and ES2 is rich in ‘’the need of the hour’’ actionable intelligence and counterintelligence TTP.’’

Prof John M Nomikos Dir RIEAS European Intelligence Academy Athens +302109911214