COUNTERINTELLIGENCE
AND FORCE PROTECTION
PART-1
RECOMMENDATIONS FOR J&K UNITS IN LIGHT OF
THE RECENT URI TERRORIST ATTACK
Keshav Mazumdar
Antiterrorism Officer
As- Deg Military Sc,Dip Criminolgy
(Level A),HRC,CAS,CPO,ASC,CMAS,FNWMC
______________________________________________________________________________
Intelligence has two objectives:
First, it provides accurate, timely, and
relevant knowledge about the enemy (or potential enemy) and the surrounding
environment.
The second intelligence objective is that it
assists in protecting friendly forces through counterintelligence.
Counterintelligence includes both active and passive measures intended to deny
the enemy valuable information about the friendly situation. Counterintelligence
also includes activities related to countering hostile espionage, subversion,
and terrorism. Counterintelligence directly supports force protection
operations by helping the commander deny intelligence to the enemy and plan
appropriate security measures.
Stated differently it acts as an early warning
system by attempting to provide accurate and timely information about the
adversary’s intention, and the surrounding environment. It also provides a
counterintelligence tool to deny the adversary valuable information and also to
combat terrorism, subversion and espionage. Thus intelligence is protective,
exploitative and positive in that it supplies us with positive intelligence
about the adversary and protects our own infrastructure. Intelligence thus
renders our actions either offensive or defensive.
“Intelligence supports the commander’s force
protection needs by estimating an enemy’s intelligence, terrorism, espionage,
sabotage, and subversion capabilities as well as recommending countermeasures
against those capabilities’’
Today’s war scenario is of the 4th Generation
type. Asymmetry has factored in most battle or tactical operations to a great
deal. In fact most of the conflicts around the Globe are asymmetrical in nature
, with the players in the combat environment being terrorists, insurgents with
very limited firepower , elusive and most of the time operating while mobile ,
very less identifiable with no conventional forces insignia , very limited
personnel strength , distributed and sporadic operational tactics, undefined
infrastructure logistical capabilities on one hand and a national power or
allies with a formidable military, attack and defense platforms and a central
military organization with subordinate headquarters and units spread at unique
identifiable geographic locations. Hence not to be subdued by this disparity
between themselves and govt. forces the asymmetric adversary
resorts to sudden, sporadic, hit and run type
attacks on the forces bases , installations , camps , ordnance depots,
communication systems, personnel and information systems with the sole
objective to degrade the forces combat capability and kinetic termination of
its key leaders at top echelons or middle and ground level tactical units. A
kill is a kill. A kinetic hit is a kinetic hit. Whether it’s a bazooka attack destroying
an armored personnel carriers drive system immobilizing it or whether it’s a
timed explosion resulting in the destruction of a combat helicopter in the
hangar , the end result is the same….we have lost combat capability. In this
fashion attacks on our installations,camps,bases,personnel and information
systems/communications are designed to degrade our capabilities, exhaust our
ordnance on nonexistent targets or dummy targets / proxy targets (deceptive
measures of the adversary) –this realm of Threat to our forces itself while in
transit or before deployment or in personnel stations and bases and the Govt.
forces actions to thwart these threats with intelligence feeds predicating the
plans/COAs design is called Force Protection.
CI
supports Command Force Protection efforts
by:
∙Identifying the potential threat forces and
multidisciplinary threat intelligence
∙Identifying threat capabilities and intent
together with the most likely course of action and the most dangerous course of
action (keeping all the possible COAs parallel for review)
∙Using deception to mislead the enemy about
our capabilities, vulnerabilities and intentions.
CI & SECURITY REQUIREMENTS:
∙Protecting classified information
∙Protecting critical resources
∙Protecting weapons and weaponry systems
∙Safeguarding visitors to the installation
∙Protecting dignitaries
∙Protecting Senior government officials or
military senior stafdf visiting the installation or areas outside the
installation but falling within military jurisdiction
∙Sustain mission objectives
∙Protect information systems
Within the installation thee may be specific
person/s,resources,assets,activity,operation or information that if targeted by
the enemy can adversely affect the installation operations , mission objectives
or any risk dimension—in other words it has ‘’Target value’’ to the adversary.
During security planning such entities should be identified (in most cases
using red-teaming or counterintelligence support to vulnerability assessment)
and secured against enemy actions. Include with this the need to ascertain what
adverse effects the local threat can have over the installation as a whole and
what missions or contingency plans can be designed to support the installation,
and what results is the minimum security requirements in the light of the
threat perceived due to the existence of local threat forces.
Local threat assessment usually provides a
threat picture specific to a single installation or grouping of installations
based on the threat factors mentioned above. This means that each installation
may have specific security requirements tailored to its individual assessment.
Resource economy-probably the most important
factor in inefficient Force protection
Due to erroneous planning, or improperly
defining intelligence requirements or even due to enemy deceptive/denial
measures it could very well be that the Commander deploys his resources, combat
power and other combat-related assets in the wrong place and time thus
exhausting/wasting them and hence resource economy is of prime consideration
during any mission and to this end the value of intelligence cannot be
overstated. These false responses can be limited and brought down to a minimum
by specific, timely and accurate intelligence. Intelligence helps the commander
to prioritize his security options. The commander can direct his efforts
towards the most important requirements, such as handling the most serious
security risks first, mitigate the threat/s which is of lesser severity and accept
the inevitable danger and be prepared for risks which are of least severity.
Thus the countermeasures will be more appropriately directed against the enemy
without any wastage of resources, manpower or lessening in combat
effectiveness. All this proper threat driven intelligence and
counterintelligence operations, the term ‘’threat-driven’’ assuming greater
significance as it then goads the commander to know the unknown aggressively.
It should be emphasized that other security agencies should be consulted and
information shared with them, both horizontally and vertically to get a
complete picture of the threat.
CI/HUMINT Support to Force
Protection: Whether conducting liaison, a Threat/ Vulnerability Assessment
(TVA), or a HUMINT collection operation, the focal point for most CI/HUMINT
operations is providing support to Force Protection. There are three critical
pieces to this support mission on which we focus:
a. Know the
Threat: The development of a MDCI Estimate is critical prior to any
deployment. Once contingency areas are identified, the HUMINT Single Source
Cell within the Control HQ begins developing and maintaining these
products. As the Battalion operational plan develops, HUMINT operation
management teams aid HUMINT Single Source in gathering information on the AO.
The turf is broken down and CI/HUMINT teams work to become subject matter
experts on the customs, culture, government, and geography of their given
areas. Once in the contingency area, conducting liaison is always the first
step. Without the initial preparation to gain knowledge of the area, the team
would be incapable of "hitting the ground running" and making the
initial liaison contacts required to quickly assess the threat to the force. We
look to identify and maintain contact with local police, intelligence, and
security agencies; Private Volunteer Organizations (PVO) and Non-Governmental
Organizations (NGO); and allied counterparts. Through this liaison the
development of CI Force Protection Source Operations (CFSO) occurs. CFSO
operations provide Indications and Warnings (I&W) of potential threats to
our Forces.
b. Know your
Vulnerabilities: Once the threat has been established, the CI/HUMINT teams
move their focus toward conducting Threat/Vulnerability Assessments (TVA) on
critical army assets and potential enemy targets. The identification of
friendly critical assets is derived from determining what the Army Commander
considers as his centers of gravity and those assets that compose and support
it. Some traditional critical assets include C3 nodes,
logistics sites, aviation and ADA assets, and counterfire radars. The TVA
analyzes all the aspects of physical security, personnel security, information
security, and communications security. The TVA measures the current threat
capabilities against emplaced security measures and operating procedures to
identify vulnerabilities. Again, without the previous research in identifying
the threat and in conducting liaison, the team would be incapable of making a
valid identification of vulnerabilities.
c. Provide Countermeasures: Providing valid countermeasures is often a difficult task to strike the right balance of security with the given assets and environment. Too restrictive of security measures rapidly degrades operational sustainment and builds distrust in the people we are trying to protect as we continue to throw barriers between us and them. Too lax of security measures provides the enemy with his target of opportunity and forces the Army to pay for a costly mistake in the loss of lives, material, and status in the world's eye. Providing predictive intelligence coupled with valid countermeasures is the apex of CI/HUMINT support to force protection. One tool that we can use with good success in providing predictive intelligence is the 24-hour time-event chart. The 24-hour time-event chart graphically depicts incident reporting on a 24-hour clock chart. Over the span of a couple days, the chart displays the enemy's operational patterns. From this pattern, the analyst can determine enemy sleep cycles, movement, and attack times, aiding the analyst in predicting enemy activities over the next 24 hours. Countermeasures can then be applied to avoid enemy contact on unfavorable grounds and increase defense measures during most likely times of enemy attacks.
CI Does Not Equal HUMINT
CI and HUMINT , although sharing most of the
time similar collection techniques , are not the same thing in the sense that
CI is not a subset of HUMINT.HUMINT is an intelligence discipline whereas CI is
a multidiscipline function supporting HUMINT.We should not confuse the
information collection methods and operational intention. This incorrect
doctrinal terminology error will lead to a weakening of both/
HUMINT is solely concerned with collection , not
the purpose
of collection of the information or the requirements which predicate this collection. Yes the
HUMINT collector is aware that the purpose of his collection efforts are geared to
collecting information from designated human sources using specific collection
techniques. In this sense he is conducting a ‘’pure’’ collection effort, not
concerned with what this information will be used for and what necessitated the
collection in the first place.HUMINT collection includes “operations conducted using HUMINT
collection techniques regardless of the ultimate use of that
information.” HUMINT activities
include a great variety of operations, analysis, and liaison duties.
CI on the other hand uses human sources too as
source of information but goes few steps further in that CI is aware of the
intent of collection and aggressively uses specific techniques to either
neutralize or exploit the enemy intelligence activities using the gathered
information. Most of the techniques in his repository are similar to that of
the HUMINT agent; It is this use of HUMINT skills, particularly investigation and
source operations that has created the confusion. CI is a multidiscipline
function with the purpose to detect,identify,deter,exploit.neutralize the
enemy’s collection efforts—itseeks to counter enemy intelligence geared towards
terrorist,subversive,espionage,sabotage or insurgent attacks on our forces and
installations and lend support to HUMINT in its activities, protect the
intelligence cycle and ensure force protection—a very important factor.
Thus we find CI to be composed of several attributes,aggressive,never relenting
and protecting the other intelligence disciplines activities(for example ,
determining whether a source is a source who wants to wittingly give
information or is an enemy plant).HUMINT contributes to
an all-source visualization of the battlefield , increases the
situational awareness of the commander.HUMINT is intelligence derived from
persons,documents,a pure intelligence activity whereas CI is somewhat like the
hand in darkness..exploring,detecting,getting a hold. Moving ahead with all
help that is available in an unknown enemy specific darkness , the enemy
lurking in the shadows , whose actions once discerned by the hand will lead to
the latter’s firm clasp on his neck.
Hence we must not tend
to associate CI solely with HUMINT collection nor define HUMINT in terms of
CI.Commanders should understand this.It should not be the prerogative of only
intelligence personnel.Commanders,staff officers of operations etc functions
should understand this intelligence issue clearly so as to synchronize ops well
with intelligence.ISR effort should not be degraded by weaknesses in both
HUMINT and CI as a result of this confusion.CI and HUMINT are highly
complimentary. Very true but of opposing mindsets.
Conclusion
HUMINT collection and CI are and will continue
to become increasingly important as we enter the 21st century. Both efforts are
vital to mission success across the entire spectrum of operations. The
understanding of the doctrinal distinction between HUMINT collection and CI is
fundamental. This distinction drives the doctrinal description of both efforts
and our understanding of how they are mutually supportive and intertwined in
stability operations and support operations.
Whatever be the divisions in function or overall
structure, HUMINT and CI are indispensable to thwart enemy intelligence activities,
to conduct force protection in a optimum manner, to keep our forcescombat-ready to deliver precision strikes and to always keep
the decision advantage in our favor with the element of surprise by the enemy
being put at the minimum. Both disciplines are time intensive and inter-human interactions over prolonged periods have turned the tradecraft
into a very specialized skill involving human perception, behavior, psychology
and other traits. Unlike other disciplines like SIGINT,IMINT,MASINT,GEOINT
HUMINT and CI have in common human sources , the human element and hence is
susceptible to error , deception by the enemy , fraught with risks and
psychological stress including human vices predicated by money and other
factors which are usually the byproduct of information-transactions (quid-pro-quo).But it is exactly these
problems which prompts intelligence professionals to come up with newer tactics
so as to minimize these negative factors and the resulting exploration and
research in the field of HUMINT and CI leads to refined methodologies , TTPs
which have been found to be effective in many cases.
Improving Army CI Doctrine
The first step in improving the Army’s ability
to collect force protection intelligence is building appropriate doctrine that clarifies the role of Army
Intelligence and CI personnel. Make its information operations doctrine more complete by
publishing comprehensive CI doctrine. This doctrine should explain the primary
CI missions of collections, investigations, operations, and analysis and
production.
Doctrine guides the
employment of military forces, and shapes how military professionals “think
about the use of the military instrument of national power”. Army doctrine
details a basic understanding of the tactics , techniques and procedures to be
employed to support combat requirements. Air Force doctrine provides commanders
and their staffs a basic understanding of how various Air Force organizations
can be used to meet or support combat requirements.
INDIA historically lacked comprehensive CI
doctrine.This lack of doctrine has resulted in confusion, and hampered the
ability of Force commanders to use CI to improve force protection efforts.
Force protection efforts must be threat
driven.Vulnerabilities should be identified , the corresponding threats
identified and then protective measures are put in place.To this end MI and CI
play a very important role.This should be the basis for the creation of a
comprehensive CI doctrine. .
“CI is the systematic acquisition of information
concerning espionage, sabotage, insurgency, and related foreign activities
conducted for or on behalf of foreign nations, entities, organizations, or
persons and that are directed against or threaten our military interests.” To
this end a variety of HUMINT sources , like walk ins , casual sources ,
defectors , official sources , liaison contacts , recruited sources are
employed by CI elements. CI collections and investigations lead to a repository
of information on threats.Thereafter by cueing other intelligence disciplines
and using all source analysis a complete picture of the threat is obtained.Thus
we reach our main objective— the precise warning of hostile attack and we also
identify the probable targets of the attack and the time of attack.In a
nutshell CI usage of HUMINT is the first line of defence.
Army force protection requires a separate force
protection doctrine. Not only intelligence personnel will benefit from the
doctrine directly but also tactical commanders who must have a basic knowledge
about force protection so as to understand what requirements ought to be
defined and handed over to the intelligence and counterintelligence personnel
to adequately protect the force.
The commanders battlefield operating system at
his disposal are fire support and maneuver and here is where intelligence and
counterintelligence act as force multipliers –the Intelligence and CI BOS must be successfully integrated in the
Commanders BOS so that his PIRs are successfully answered giving him ideally a
perfect situational awareness about the battlespace so as to conduct operations
successfully. The commander focuses on the intelligence system by clearly
designating his priority intelligence requirements (PIR), targeting
requirements and priorities. Intelligence is a continuous process which keeps
IEW operations tied to the commander's critical decisions and concept of
operations. CI collection, analysis, and dissemination, like other
intelligence, have to meet the commander's time requirements to be of any use
other than historical.
They can then better
understand the limitations and capabilities of the CI support elements. Force
protection doctrine requires intelligence and counterintelligence personnel to
obtain and analyze information on:
∙Enemy units
∙Terrorist groups
∙Insurgent groups
∙Enemy special forces
∙Criminal enterprises
∙Cybercriminals
∙Radical elements
∙That part of the local
populace which supports the enemys ideals
∙Environmental/chemical/health/radiological/biological
hazards
∙Weaponry systems of the
enemy units,terrorists,insurgents and crimninal enterprises
Force protection doctrine should compel the
creation of Service capabilities to collect, receive, evaluate, analyze, and
disseminate all information on terrorist
activities,strength,capabilities,organization,intent,past history, current
activities in the area in question or areas of interest and indicators of
imminent attack.
We can categorize the threats based on intent.
This can be incorporated in the force protection doctrine. Hence we can
allocate HUMINT resources in an appropriate manner without any duplication or
wastage. Type 1 can be criminal activity geared towards army bases ,Type 2 can
be penetrative reconnaissance and sabotage operations, terrorist and insurgent
attacks , and Type 3 can be major land , amphibious , air and missile attacks.
TYPE1, 2 and 3 threats can be adequately
determined by the employment of counterintelligence assets which use HUMINT
sources to collect force e protection information and conduct investigations ,
security surveys ,threat and vulnerability assessments. Casual sources,
official sources, liaison contacts and recruited sources comprise the source
database of the CI repository. All source intelligence is also used for all the
threats, particularly TYPE4.These include HUMINT, SIGINT.MASINT, IMINT, ELINT
AND OSINT.Fusion of all information from multidisciplinary intelligence
platforms with data from national level intelligence agencies result in far
better situational understanding of the Commander. ISR synchronization is a
must if we have to have a robust advance warning system to avoid the element of
surprise.
We can make certain
observations after studying force protection failures from around the globe:
ØHUMINT was not given priority in force protection efforts ,
neither the HUMINT support was precise, effective and tailored to the
Commanders needs. Instead standard operating procedures detailing standard and
routine defensive methods and access control were implemented.HUMINTs
capability in predicting on how , where and when a terrorist attack might take
place was ignored.HUMINT can predict the specific target ,time and nature of
attacks.
ØLack of organic intelligence capability at tactical level.. “They
did not have a dedicated, organic, and focused [force protection]
intelligence analytical capability.”Plus there is a weakness in both collection
and analysis of force e protection intelligence. If intelligence capability can be pushed down to
company/platoon level with the soldiers being augmented with 2-3 HUMINT and 1-2 CI operatives (or the soldiers themselves being
trained in the basics like tactical questioning and interrogation) then instead
of sending request for information to higher headquarters the tactical
capability to investigate , gather information and analyze it would have been
achieved. The ‘’always top-down’’’ intelligence flow could have been avoided and a
four way flow implemented with interaction between the tactical units and
higher headquarters, adjacent company headquarters and intelligence
elements.Hence there is a desperate need for military units operating in high-threat environments
to possess organic intelligence collection, analysis, and investigative
capabilities.
ØMilitary intelligence lacked the necessary impetus to devote time,
effort and resources for long-term and mid-term terrorist threat
intelligence collection and analysis – such as trends, intentions and
capabilities of terrorists. National intelligence agencies were larger in
operational and administrative size and were given priority rather than the MI
in collecting intelligence but national level agencies cater to a wide range of
requests for information apart from terrorist threat to forces whereas MI can
exclusively set up collection taskings for force protection intelligence given
adequate weight age , administrative and financial aid and clearance by the
Government. This was absent.
ØThe installation in question fell prey to terrorist attacks
because the intelligence arrangement at Command level in higher headquarters or
at the installation headquarters itself was focused on outward attacks like
tactical missions, or defensive postures dictated by air
threat and totally
ignored the need for HUMINT/CI based intelligence collection for ground defense
of the installation, personnel, information and communication facilities.
To execute a CI operation successfully liaison
is needed with other civil agencies and with the intelligence agencies of the 3
services.To effectively build up a liaison time is required,it cannot be
achieved overnight.In case of COIN operations liaison is much needed with the
local administrations intelligence branch and with the police as they are the
ones who know the local area,population,criminal elements and insurgency
profile in terms of attack history, police records of personalities and elements
who have been apprehended and surrendered..the latter can be put to use by the
counterinsurgents as pseudo-insurgents to penetrate the adversary’s setup. Liaison
relationships are an investment in the future, and the return on this
investment is directly proportional to the time and effort expended on
developing and maintaining the relationship.
We can transfer say 2-3% personnel from the MI to the CI unit as CI units are generally
understaffed compared to the standard HUMINT units , and the liaison units.
Even transferring 3% personnel can significantly raise the strength of all the
units overall. Thus with this transfer the Commands HUMINT assets get a boost
and now coupled with CI augmentation the HUMINT teams can handle all three
types of threats , Basic , Levels 1&2.
Simply transferring will not suffice, proper
training in counterintelligence need to be given. But this wont be a problem as
the MI soldier already has basic intelligence training and acumen. Yes they
need to be granted clearance to access compartmentalized intelligence
information and hence prior to transfer the soldiers need to undergo a
counterintelligence investigation process as to their suitability.
The CI effort focuses on the overall hostile
intelligence collection, sabotage, terrorist, and subversive threat. The CI
effort is also sufficiently flexible to adapt to the geographical environment,
attitudes of the indigenous population, mission of the supported command, and
changing emphasis by hostile intelligence, sabotage, terrorist, and subversive
organizations.
What Are We Protecting?
In protecting an installation and its
information systems, operations and general security from enemy
multidisciplinary intelligence threat we must identify the vulnerable and
critical areas to be given more weightage during security review. Not all
assets and activities warrant the same level of protection. To this end a
careful and thorough vulnerability analysis needs to be conducted resorting to
red teaming methodology.
It should be noted at
this juncture that it is always the attempts of the enemy intelligence service
to subvert our knowledgeable personnel. In a military production unit , say
ordnance factory , the senior engineers and quality control scientists have access
to sensitive designs and information related to weaponry systems. Similarly
classified and top secret documents/information are in the hands of cleared
senior personnel. These people are often the target of aggressive enemy
counterintelligence agents.
The five basic categories include the following:
1.People
2.Military personnel
3.Activities/Operations
4.Intelligence
collection/analysis
5.Sensitive movement of
operations/personnel
6.Conduct of sensitive
training
7.Communications/networking
8.RDT&E and sensitive
technology
9.Production of
sensitive technology
10.Protection of
nuclear/chemical/biological materials
11.Protection of
weapons, explosives, and equipment
12.Information
13.Classified
14.Sensitive
Compartmented Information
15.Top Secret
16.Secret
17.Confidential
18.Unclassified
19.System designs
20.System
capabilities/vulnerabilities
21.Sensitive methods
22.Facilities
23.Headquarters
24.Field
offices/administrative buildings
25.Training facilities
26.Storage facilities
27.Production facilities
28.R&D laboratories
29.Power plants
30.Parking facilities
31.Aircraft hangars
32.Residences
33.Equipment/Materials
34.Transportation
equipment/vehicles
35.Maintenance equipment
36.Operational equipment
37.Communications
equipment
38.Security equipment
39.Weapons
40.Automated information
systems equipment
Now that the CI agent is knowledgeable about
these assets and activities that need protection, he can execute a
vulnerability and criticality analysis and recommend suitable protective
measures as well as countermeasures to the Commander. He can recommend which
critical units need protection first and what resources to allocate and how and
where to implement general security and countermeasures.
UNIT PROTECTION:
We will define unit not be size or specific function
but by any military group capable of offensive, defensive or stability
operations.
Unit protection is the process through which
combatant and noncombatant personnel, physical assets and information are
protected from adversarial threats including adversarial multidisciplinary
intelligence threats.Multi layered, active/passive, lethal/non-lethal offensive and defensive measures are adopted for this purpose.
Protection is composed of a variety of active
and passive measures
(for example, weapons, pre-emption, and warning) in the air, land, sea, and space
domains. The goal of unit protection is preventing attacks on the three unit
resources , manpower, physical assets and information so that the capability of
the unit to maintain its fighting potential without any degradation by the
enemy is constantly maintained.
The Army must:
ØDetect the threat
ØAsses the threat capability to degrade the units combat
capabilities
ØDecide on protective measures , whether offensive or defensive
ØAct to implement these protective measures
ØRecover in very less time from any damage inflicted by the
adversary so that
technical countermeasures and tactical
procedures may be employed so as to bring back the unit to full operational
status in the least time possible.
In order for unit protection to be 100% effective we need to
ensure that the following are taken into prioritized consideration by the unit
commander:
vPersistent surveillance
vActionable intelligence
vPrecise target recognition
vInterrogation
vCommanders situational awareness
vAccurate identification of unit security related intelligence gaps
The above factors are contained in the Detect-Assess-Decide system.”(DAD).
In addition unit Command and Control must be
properly defined as C2 aids the Commander to take proper decisions in the light
of what needs to be done exactly to protect the unit and ensure that this is
carried out efficiently.
Protection: Protection is a function which
should be given a holistic treatment. Protection should not separately focus on
weapons deployment , pre-emption and warning. All three must be integrated. No
one is a separate entity. Protection must be proactive. In fact unit protection
should never always be passive but must also include active
measures.Intellighence , counterintelligence and an admixture of military and
cross government capabilities should be employed to the full. Installation/camp
protection should look beyond the perimeters. Just employing passive
measures(check posts, access control, perimeter security , guard functions ,
lighting) and OPSEC isn’t sufficient. Surveillance teams , counterintelligence
operatives should foray outside into adjoining areas , even areas of interest
located far from the unit , and the communities in these areas so as to gain
information/intelligence and counter enemy reconnaissance/HUMINT/subversive
/sabotage/terrorist activities. Counterintelligence should be
employed to screen
contract workers and suppliers. A counterintelligence review should be
conducted periodically on unit personnel. Red teaming should be taken up by the
commander and his staff to ascertain unit vulnerabilities and critical areas.
Add to Detect , Assess and Decide the functions
Act and Recover and we have the foundation for a complete protection system on
which to base our decisions regarding collection of intelligence , fortifying
and strengthening/hardening our bases, decide on the optimum courses of actions
, employ forces optimally to act on these decisions and in case of an attack
which could not be prevented , recover in the shortest possible time without
the base collapsing totally during/after the attack using redundancy
measures/backups and thorough protection of critical assets. We should also
remember protection has yet another dimension. The enemy might know the
protective measures we have employed using intelligence and might attempt to block
/prevent/deter our post-attack or pre-emptiveactions , hence protection must take these into account
also.
Protection means ‘’time-critical tactical operations’’
..not just tactical operations. Protection should be a 360 degrees
hemispherical capability , meaning protection from land , air and sea based
attacks.
For protection intelligence is critical as
everything needs to be known about the enemy , environment and self. The last
factor is determined by counterintelligence reviews , technical experts and red
teaming.All intelligence platforms and ops must be thoroughly integrated to
handle attacks fro m land , air, information , electronic,CBRNE,and
intelligence domains of the enemy. This integrated approach heightens the
commander’s situational awareness considerably , thus acting as a force e
anddecision-superiority enabler thus leading to
optimum effective course of action/s by the Commander with a decisive finish.
Thus it is clear from the above that protection
must be proactive , intelligence-led and an integrated approach.
Objectives of unit protection are:
Install a warning system
Intelligence preparation of all areas adjoining
the base ,camp , the route along which the troops movement takes place –in fact it must be made mandatory for units intelligence section to
keep an updated file on the intelligence preparation of the entire area
surrounding the base/troop movement route whether or not there is a perception
of threat.IPB should include , among other things
∙Protection must be
proactive , lethal and nonlethal both.
∙Intelligence is the
primary tool in protection
∙Increase active/passive
protection measures
∙Rapid seizure of
initiatives
∙Rapid transition to decisive
operations
∙Rapid decision making
capacity as tactical operations in unit protection are ‘’time-
critical’’.Damage to our forces in combat on the battlefdield or in case of an
assymetrical combat , in hilly/urban/jungle terrain but away from base is
different than that of an attack on an unsuspecting troop movement or
installation/base itself where an attack means catching us off guard ,
unprepared and things move so fast due to the element of surprise our forces do
not have enough time to recover , regroup and counterattack in time to thwart
the enemy.The enemy may have critical assets in mind when they attack the
installation/camp/base.Thus tactical operations are ‘’time-critical’’.Hence to successfully thwart an attack ,should
our defences fail …we must be prepared to execute time critical axctions
without falling prey to the shock due to the surprise element.This is more so
say in the case of an attack on an unsuspecting convoy or troop column.
∙Reducing vulnerability
to minimum
∙Identifying critical
assets , protecting them priority of all unit protection systems
∙Understanding that most
operations will be in a non-linear unconventional operational environment and
hence all intelligence , counterintelligence , surveillance , reconnaissance ,
target determination and nomination, combat oiperations,passive and active
protection measures , red teaming , and recovery options should be seen from
this perspective.
∙Should understand that a
complete 360 degree hemispherical protection system must be installed which
must be a thoroughly integrated intelligence and operations function keeping
the factors DAD in perspective and the factors which come next , viz..Act ,
Finish and Recover
The following types of threats should be
expected in any future conflict-
∙Attacks –air based/heliborne—on logistical systems.
∙Critical assets will be
targeted with precision munitions.
∙Staging areas , critical
choke points may be targeted using missiles with medium-range to ballistic capabilities.
∙Random attacks so as to be
unpredictable , IED attacks , terrorist and insurgent attacks and Special
Forces attacks may be conducted with twin objectives or any of
them..Viz..Effect destruction/undermine our fighting capability and to force
the commander to waste resources , ammunition, and unnecessarily divert forces
to protect facilities and personnel which in fact are not threatened.
We must remember we are
now facing a fourth generation enemy , who will attempt to put in use every
means including confusion and deception to overcome the asymmetry/mismatch by
increasing uncertainty and making us more susceptible to the element of
surprise. The enemy will resort to continuous , random, and non-decisive engagements. The enemy will randomly and continuously threaten and
interdict lines of cooperation’s and communications. They will use camouflage
and deception to to reduce weapon engagement rangers and degrade our forces
advantages in ‘’stand-off’’engagements.
There are two objectives herein—first to confuse us so much that we cannot execute the
targeting process correctly , target determnination.identification.nomination
becomes very difficult against an elusive enemy employing random attack methods
, and secondly frequent loss of contact with this elusive enemy has more
negative consequences than that which would have occurred with a conventional
more predictable echeloned enemy.
HUMINT and CI are two disciplines which help in
detecting enemy capabilities, intent and countering enemy intelligence
collection activities. In a typical Army Intelligence structure, the
intelligence assets are located at Div and Bde levels , with the Bde having a
HQ company and Intelligence Bn , each Bn catering to a specific
collection/counterint discipline. For example there can be a Ops Bn , a
reconnaissance Bn , a tactical exploitation Bn,a forward collection Bn ,or a
strategic SIGINT Bn.There is also a Div MI Bn and a theater intelligence Bde.
Military intelligence brigades coordinate,
manage, and direct intelligence and surveillance; they conduct collection
management, all-source intelligence analysis, production; and they
disseminate information in support of national, joint, interagency, multi-national, regional combatant command, and Army service component
requirements.
Unit protection must
integrate the protective attributes of different Army Corps. The capabilities
in brief of the Corps are as follows:
∙The Air Defense
artillery provides protection by acting as a warning system , intercepting
threats directed from air in the form of missiles and aerial attacks
(heliborne..etc) and also provide locational grid information for otrher
supporting forces to target.
∙Military Police provides
security by executing proactive intelligence led policing.
∙Engineer Corps protect
our force by contributing to its mobility and countermobility thus heightening
its survivability.provides the capabilities of survivability, mobility, and
countermobility to the force.
∙Military intelligence
provides security to our force by adequate synchronized utilization/deployment
of ISR assets and counterintelligence capability
∙Signals protects our
command and control nodes directing/controlling communiucation,computers,and
intelligence operations. Siugnals intelligence directly supports HUMINT
operations to validate information,increase the situational understanding oif
the Commander.
∙Field Artillery provides
security to the force by contributing to the direct/indirect
firepower,predicting impact points.
∙Ordnance Corp
contributes to recovery by deploying its ordnance disposal systems.
Unit Protection Functions
It’s very true that conventional military
threats exist and are given priority in intelligence activities but the
existence and threat capabilities of asymmetric , nonconventional threats
cannot be undermined. Add to these new emerging threats of this category. At
the tactical level it is very important to address this type of threat by
determining its identity, leadership, capabilities, tracking its location and
gauging its intent. We need to detect the enemy entire range of hostile
activity including intelligence collection and counterintelligence activities,
use this information to assess its capabilities and intent to arrive at the
common operation picture COP which brings to light the
relationship between the
terrain,enemy,mission,troops,time and the civil environment thus enabling the
commander to enter the enemy’s decision cycle, gauge its intent more
accurately, deliver warning to force s in the area and develop suitable courses
of action. After the asses step is over the commander moves on to the decide
function wherein an action is decided upon or any existing action is altered or
monitiored.Therafter the act function takes over where the course of action
decided upon is implemented by tasking the tactical fighting unit to deliver
kinetic.nonkinetic attack on nominated targets or passive protection
measures..all with the intent to protect the force. Protecting the force should
not entirely be passive in nature, the soldiers need to go out and attack
nominated targets so as to deter attacks or fail plans to attack our
installations.
ACTIVE MEASURES FOR UNIT PROTECTION:
Active measures will provide at stand-off distances, the capabilities to-
∙We designate a stand-off area outside the installation/protected area and take active
measures to deny unidentified vehicular or personnel movement in that area
∙Just like we have a C2
system with respect to any mission, similarly we need to have a C2 mission with
respect to active or passive defensive measures and these need to be integrated
with the C2 itself. Such active/passive measures can be remotely
controlled lethal/non-lethal measures.
∙As for passive measure
steps should be taken to deny unidentified/suspect personnel/vehicles movement
inside a restricted area/protected area .Areas within buildings,facilities,structures,airfields,ammunition
depot,etc can be effectively protected by employing unmanned remotely
controlled nonlethal systems at standoff distances. Measures should be taken
with priority to deter personnel and vehicles from entering a protected
military installation again using remotely activated lethal/nonlethal systems.
Physical barriers, both active and passive can be employed for this purpose.
∙There can be instances
of enemy fire directed at critical assets of the installation and hence we need
to include modular protection packages, automatic or soldier response teams
built up specifically for this purpose. The protection system should be
integrated again with the C2 system. It is very important to point out here
that all the passive/active measures success depends on a great deal on
intelligence/counterintelligence/liaison apart from the remotely/manned
protection system deployment. For example we need intelligence to apprehend any
infiltrations in our camp in the form of security or non security civilian
contractors. Or we can
effectively liaise with
the civil police/intelligence agencies to build up a mapping of probable anti-installation criminal forces operating in the area who could attempt to launch
sporadic fires or explosive attacks, such attacks being in keeping with the
criminal group’s affiliation with the enemy. Counterintelligence can help in
visualizing our vulnerable areas within the installation and then proceed to
identify the critical nodes which if damaged can stop the installation
operations altogether. This vulnerability assessment coupled with the threat
assessment and supported by sound OPSEC practices can give adequate unit
protection.
From the force protection perspective CI and
HUMINT functions:
Recommending countermeasures after assessment of
threat capabilities, operations, expected courses of actions, most likely COA
and most dangerous COA.
∙Threat intent
∙Identify Threat
leadership. Key commanders. Key lieutenants and area commanders
∙Identify threat C2 nodes
∙Identify threat logistic
routes
∙Identify threat social
reach, network, and contacts
∙Identify threat
affiliates in other criminal networks, enterprises
∙Identify threat
sympathizers in own area of control
∙Identify
political/administrative figures that support threat ideology
∙Threat attack /defense
operations location parameters.
∙Gauge potential
attack/defense methods of threat.
∙Recommend C2 setup to
thwart threat attack.
∙Estimate with reasonable
accuracy the expected time of attack.
∙Possible locations of
Threat listening post/observation posts
∙Determine possible
escape routes of threat forces after an attack or defense scenario
∙Possible enemy IED
techniques, infiltration routes, emplacement
∙Gauge IED detonation
methods/means
∙Gauge IED timings
∙Possible routes for
IED ex-filtration
∙Staging areas
∙Safe houses
∙Weapons and ammunitions
storage locations
∙Production facilities
for IED and other ammunitions/explosives.
∙Find out what
supplementary operations threat may resort to
∙Recommending countermeasures
to threat IED
∙Recommending
countermeasures to threat ISR/EW
∙Determining threat
indirect fire parameters, key indirect fire
WARNING
Warning. Once actionable intelligence is obtained
warning or predictions is disseminated in a timely,unambiguous,specific and
accurate manner.Warning is an acknowledgement of the existence ofd a threat and
subsequent disseminatin.
Warning is of two types:
(a)Defensive warn
(b)Enemy warn
In defensive warn after receiving actionable
intelligence about the adversary’s possible attack the installations security
is beefed up by incorporating protective measures. The warning may be
digital/aural/physical or virtual.
In enemy warn the enemy is communicated the fact
through non-lethal measures such as interrogation or challenging an
enemy unit/capability that in case of persistent or continued enemy action our
course of action/s can take on an increasingly lethal nature with the intent to
prevent the enemy from taking further hostile actions and also inflict heavy
damages. Thus enemy warn is a method to deter the enemy from carrying out its
intent if it hasn’t done so yet or to stop the enemy in its tracks..
It is very important that warning should be
unambiguous, accurate and timely/specific,. In addition to this it should be
actionable. Warning can be graduated , meaning the level of warning may assume
increasing proportions in keeping with the feedback about the enemy which may
indicate that it has ceased its operations/.activities temporarily but is
conducting discreet operations/increased intelligence activity masked in the
cloak of acceptance of our warning and cessation of open hostilities.
WARNING SYSTEM:
The warning system must have the following
features:
∙It should allow for
redundancies in our act capability systems.
∙It should allow for
passive proactive means so as to protect our installations, its critical
assets, command and control nodes, thus overall reducing the vulnerability of
the installation/.protected area.
∙It should provide a
system of integrating fires to handle threats and precluding enemy attack on
our installation , its C2 and critical assets.
∙Provide warning of
threat intelligence activities.
∙Provide warning of
existing threat C2 nodes
∙Provide warning of
threat capabilities, disposition, strength, order of battle
∙Provide warning of
threat logistic routes.
∙Provide warning of
threat sympathizers.,
∙Provide warning of
threats possible attack COAs
∙Provide warning of the
defense capability of the threat
∙Provide warning of
threats peculiar /preferred TTPs/modus operandi
∙Provide warning of
threats history
∙Provide warning of
threat movements
∙Provide warning of
threat leadership
∙Provide warning of
threat detachments, cells dispersed in and out of the area of operations.
∙Provide warning of
Threat attack /defense operations location parameters.
∙Provide warning of
potential attack/defense methods of threat.
∙Provide warning of the
expected time of attack.
∙Provide warning of
possible locations of Threat listening post/observation posts
∙Provide warning of
possible escape routes of threat forces after an attack or defense scenario
∙Provide warning of
possible enemy IED techniques, infiltration routes, emplacement
∙Provide warning of IED
detonation methods/means
∙Provide warning of IED
timings
∙Provide warning of
possible routes for IED ex-filtration
∙Provide warning of
Staging areas
∙Provide warning of Safe
houses
∙Provide warning of
weapons and ammunitions storage locations
∙Provide warning g of the
Production facilities for IED and other ammunitions/explosives.
∙Provide warning of
supplementary operations threat may resort to
∙Provide warning of
threat indirect fire parameters, key indirect fire
Future Modular Force
leaders must be trained to
aggressively manage information and instill trust in the output of decision
support tools that automated systems provide. Other major implications include
adoption of a lifetime of education paradigm and the creation of knowledge
centers configured to support professional leader education. Leader development
questions include, but are not limited to-
(1)How do we develop
leaders ready to deal with the complexity of the contemporary operating
environment, threats, and interagency implications?
(2)How can we develop
more adaptive leaders, versatile in UP operations?
(3)How do we provide
collaborative, distributed training problem solving and decision aids that
empower battle command to support commanders, as well as staffs to advising
commanders during planning, preparation, rehearsal, and execution of UP
exercises and operations?
(4)How are leaders
enabled to know the terrain and weather and appreciate their tactical
implications for tactical concealment, employment of weapons, mobility, and
seeking positions of advantage?
(5)How are leaders
empowered to understand the operational environment as well as, or better than,
the threat in order to execute UP detect, assess, and decide functions?
(6)How will units enable
leaders to know the enemy, friendly unit locations, and their capabilities?
(7)How will units adapt
to emerging UP situations more quickly than an adversary?
UP is not force
protection, although the application of protection capabilities will positively
affect force protection. By integrating the protection capabilities outlined in
this CCP, a commander, and consequently, the force will be offered superior
protection abilities.
END OF REPORT
1.01 PM.
1.02 3-10-2016