Keshav Mazumdar ATO CMAS

Kinetic Targeting is a process by which physical action is taken to kill/capture insurgents or for that matter any enemy in the area of operations in order to negate their activities/operations in the AO.For example HUMINT reports bring in information about an insurgent facilitator of IEDs supply.Kinteic Targeting , that is killing this element severely affects the IED supply thus limiting the usage of IEDs by the insurgents.Here it is very important to choose carefully the targets.They should be critical nodes in the network , destruction of which will hamper the overall operations of the network , not just cut off one single line of operation.Thus targeting C2 nodes , critical lines of communication and logistics , important couriers and informers of the enemy , prime facilitators from among the local populace , HUMINT agents from among the local populace and anything or anyone close to the or collocated with the perceived centrer of gravity of the network will in effect disrupt enemy operations as well as planning severely.For example we have identified and located a high profile insurgent and a drone attack results in his elimination.Thus we have successfully removed a node in the network.Now if we study the second and third order effects of this attack , that is the resultant action on his colleagues or men under his command and the effect on the local population(our HUMINT and CI people keeping a tab on enemy movements, enemy suspects and activities of local suspected sympathizers , facilitators) we get further leads for further targeting actions.It couls be , for instance , that after removing this critical node there is a flurry of activity in the local community among a select group of people , or maybe demoinstrations are held thus pinpointing the actual sympathizers(these can now be included in non-kinetic operations) or the activity of insurgents themselves which become observable and thus amenable for intelligence action.


Conventional war sees both adversarys attempting to utilize the entire spectrum of combined arms warfare to:

·        Annihilate the others forces

·        Cause severe attrition to erode the overall enemy strength and projecting capability so as to penetrate our defences or mount a piercing attack or in intelligence terms , be deprived of projecting interim intelligence enabled combat troops. same time attritting the adversary’s strength and their ability to project force.   


Coming to asymmetric warfare like guerillas , insurgents and terrorists  here attrition is not a solution as most of them , going by Maos principle , are intent on conserving their forces—that is strength , capabilities as they are far outnumbered in and they cannot afford to take in more casualties by foraying enmasse into enemy territory like conventional forces or for that matter projecting their force is not an option for them.They carefully choose their targets and the location where they will deliver the attack.All this done by small line squads while the majority of the insurgents stay safe at the bases.

Here is where we can arrive at a very important inference.If the insurgent must conserve his forces which means as his primary objective is to cause harm to the security forces without exposing himself unnecessarily , attacking from deep cover , or ambush , he needs pewrfect information about the nature , identity and location of his target/s.To this end intelligence capability ios critical.If he employs his own intelligence assets , which are very very limited , his own men who can keep an eye on troops movements from afar or from a top vantage point—and that is quite risky some times  , the insurgent leadership then turn to their main resource base , the local populace.The limited HUMINT agents of the insurgent group now recruit sympathizers and others who support their ideology , or those who bear a grudge against the local administration , police and the security forces themselves and now these very innocuous looking people of the local community in the AO become the eyes and ears of the enemy.As per Mao’s principle , we can infer the insurgents should conserve this HUMINT capability in order to conserve their forces.This further leads to the fact that they will also protect their informers and sources and like a professional intelligence organization will surely conduct secret meetings to indoctrinate them on security principles , how to handle their captors if caught by the security forces and other psychological instructions.

Whatever be the case the local populace is and should be the main target of the Army intelligence apparatus—detect , identify and locate the HUMINT elements. History , Malaya , Philippines , Iraq , etc ..has proved time and again that a successful insurgency emerges only with the support of the local population.

Hence comes into the picture –non-kinetic targeting.Now it is clear that the insurgents will do everything possible to keep the population on their side.If not the entire local populace , well all those who sympathize or believe in its ideology or others.As for those elements of the population who are some way or the other disinterested in the insurgency movement or even averse to it , these people are kept in leash by the insurgent leadership.Intimidation , fear , torture and even killing—these tactics are resorted to.But generally the elements of the population who are so labeled as averse to the insurgents ideology prefer to keep quiet.These people must be identified by our intelligence personnel.As they are part and parcel of the community they can offer valuable intelligence on the elements of the population who work for the enemy.They are the best ones suitable for surveillance , static observation of the neighbourhood , getting good access and placement to suspects (after transmittal of the idea that they are pro-insurgency) , reporting on strangers in the village , attending propaganda meetings and hate-seminars , and knowing the entire terrain very well so as to advise the security forces during intelligence preparation of the Area of Operations.


That said , the Army should and must wage a full scale parallel war with the insurgents in controlling and influencing the minds of the population in their favour.This love/hate triangle is in fact the most important mission objective.You control the population , you know the local informers and logistical supporters of the enemy.Also the safe houses , staging areas and all clandestine meetings in the area.Going a step further , detaining such individuals and interrogating them , or more the better keeping them under tight surveillance using those friendly elements of the population you can now detect and identify their enemy HUMINT contacts.Further surveillance or arrest and detention followed by interrogation can lead to weapon caches , staging areas , other enemy personnel concentration points , transit camps , bases—in short you get nearer and nearewr to the insurgent center of gravity.


This parallel war is in effect information operations.Information operations  , such as periodic or random announcements by the loudspeaker  and other media enabled platoon , PSYOPS platoon , coupled with community development programmes such as road repairs , distribution of food and sweets to children at regular intervals in primary schools , helpinmg in the digging of wells , improving sanitary conditions , supplying ‘kambals’ in winter , supply of free educational books and materials , informing the community of social service programmes and financial schemes for the poor taken up by the elected Government , highlightinmg the insurgents atocrities elsewhere , impressing upon them the insurgents concept that he has to influence the population in order to survive , and many other steps/activities which can easily be undertaken by the Army as resources for such activities are not expensive , easily available and can also be supplemented by the local administration.The main point which should be driven home is the population must feel more secure and happy with the presence of the Army and other security forces and should understand that the only objective of the movement is violence and target is the Government , and that they are least bothered about the local community , but consider it therir safe haven where they can hide during the day , where they can get food , shelter and where they can brainwash and recruit people to serve their ends.




One of the oft-overlooked consequences of just about anything are what we call second- and third-order effects. Once we have targeted someone or something we must know how this has influenced the local population , the insurgent network and even other criminal enterprises in the AO. Second and third order effects which might emerge are:

·        We might lose local cooperation.

·        We might gain local cooperation.

·        More enemies may result if the kinetic attack results in vengeance. Going a step further , the removal of the insurgent/s may effect certain civilians (apparent by antagonistic actions , disappearance from their residence apparently to join the insurgents).Which means we can now zero in on them as suspects.


 Another difference exists between conventional battles and COIN ops.In conventional battles we detect , identify , get the precise location and then nominate as a target , be it a high value target or a high payoff target.Now Counterintelligence activities ofcourse happen during conventional warfare but not as offensively as in a limited war against insurgents in a limited AO.What I mean to say is it can be one or several of our agents have infiltrated the network or trhat we have penetrated trhe network by turning one or few insurgents to work for us.Now in the same AO it could well be that a company platoon is engaged in ops against the enemy in the Eastern part of the AO.Now if this  platoon is not aware of the agents (infiltratrors) in the enemy who might be selected for targeting by our platoon intelligence section , then this is a grave error.Or say we could be using a rouge insurgent unit (turned) who are up against the insurgents and they could equally well do the same thing—target our agents.Hence the number one priority is deconfliction. The targeting cell generates intelligence requirements which the HUMINT collection cell satisfies by its collection operations.Now the two cases cited above or even in a case where our soldiers are fighting behind enemy lines (in the case of COIN we can roughly define that as deep into their territory , say the insurgents dominated Assam jungles) , the platoon may not be able to access the HUMINT cell for information or the current targeting list and then it will autonomously choose and finish off the target—who can very well be one of our own agents. So how do our units avoid targeting our own agents  that have been infiltrated within adversarial organizations? WE NEED TO HAVE A CENTRAL AUTHORITY , AN INTELLIGENCE UNIT , WHOSE SOLE RESPONSIBILITY WILL BE TO DECONFLICT TARGETING CELL AND HUMINT CELL ASSETS.This is very important as in most insurgencies , we have to resort to infiltration.We must remember an agent placed in the network is worth 50 machine guns.We cannot afford to lose him due to lack of deconfliction.We then suffer a counterintelligence defeat in the hands of our very own units.

There is a great difference between intelligence driven targeting and targeting based on surveillance and reconnaissance.Intelligence is crucial.If it is not present integrally in the targeting process , you can not remove the targets efficiently.The success rate will be incredibly low.Intelligence drives the fight.It is required to detect , identify , locate the target precisely , gauge beforehand what can be the second and third order effects , aid in creating target folders as per category , aid in target reduction – in short it is CRUCIALLY IMPORTANT.And Mind you , counterintelligence should go hand in hand as it protects this very same intelligence cycle , vetting the sources , determining if they are genuine , or planted.It helps in knowing and locating important targets of the enemy.It is crucial in in telligence planning.It generates positive intelligence.It is not exactly an intelligence discipline but it is more than that—it is an intelligence and force enabler.In COIN  it is indispensable.Its offensive techniques like penetration or infiltration can literraly destroy the center of gravity of the enemy.

In any COIN mission , or operation , just launching an attack (kinetic that is) on the enemy using military commonsense or standard combat tactics and techniques/procedures will not be sufficient.Yes here also you are targeting , but this targeting is the usual destruction/removal of adversial elements in the course of combat as per standard doctrine.You ned to have ‘’targeting ability’’ , not just manage a team of trigger pullers.And the management of these ‘’trigger pullers’’ , the Company or Bn must have the ‘’intelligence element’’ as its brain.Then only you have the required  targeting ability so critical for success in COIN.Be it kinetic or personality targeting or non-kinetic or psychological targeting.






The parallel war –that is the control of the local population by both the insurgents and the Army is essentially Information Warfare.That includes propaganda and PSYOPS.I must drive home the most important point in COIN—THE LOCAL COMMUNITY /POPULATION IS  THE BEST ASSET OF THE INSURGENTS AND OUR GREATEST THREAT IN TERMS OF COUNTERINTELLIGENCE.This is the ‘human terrain’ distinct from the physical terrain (or developed infrastructure terrain , that is the security forces configure existing buildings etc so as to provide force protection  and also building attack resistant/delaying structures ) which is usually scanned /surveilled and reconnoitered for intelligence preparation of the battlefield.Ignoring this human terrain , not developing it and utilizing it to our advantage places all gains from intelligence preparation of the battlefield considering the physical terrain , the enemy , the weather and environment to a minimum.We must consider non-kinetic targeting with the same importance like kinetic targeting.We need to maniupulate the minds of the population.They  are the ones who can provide us hard much needed information.If we lose their support , the insurgents get their support.

Take a case in point.An army platoon is engaged in a combat action with a group of insurgents and things go wrong.The platoon was initially firmly emplaced in a built up area , protected and hardened against enemy fires.But a prolonged combat resulted in rapid depletion of ammunition and now the soldiers must flee as reinforcements will take long to reach the area.Fine—they did just that.The Company Commander had always recognized the need to influence the human terrain and today this platoon got saved just because of their Commanders foresight.How? On escaping they took refuge among the local population who gave them shelter , hiding them from the enemy , and also intelligence about enemy movements ( they are nbow on the lookout for the platoon) both to the soldiers and team leader and also to the headquarters  by dispatching a couple of villagers.So they are now the teams cover , intelligence collectors and also supply points.Thats the benefit of information operations in COIN. If you can win the battle for CONTROL , then you’ll make the battle of attrition much more difficult FOR THE ENEMY.Period.   



Intelligence Support to Targeting

COIN Specific Intelligence Preparation of the Battle space (IPB) – the systematic,

continuous process of analyzing the threat and environment in a specific area with the

NETWORK in perspective.

The commander uses IPB to understand the battle space and the options it presents to friendly

and threat forces.

By applying the IPB process, the commander gains the information necessary to selectively

apply and maximize his combat power at critical points in time and space on the battle space.

Irregular Warfare IPB

The principal difference between IPB for a conventional warfare environment and that of

irregular warfare is the focus on people and the accompanying high demand for detailed

information (e.g. – census data and demographic analysis) required to support the commander’s

decision-making process.

Force protection in a COIN environment is dependent on several factors. These factors can be

studied and detailed by compiling all data, demographic, human terrain, enemy, environment and

census. The intelligence preparation of the COIN battlefield is very different than that of

conventional battlefield. Here we are concerned with specific physical data so as to be aware of

ambush points, egress and ingress routes,corridors,avenues of approach for the enemy, areas or

profiles which can serve as cover for our troops if the enemy launches a surprise attack, areas

which can provide a good cover for the enemy and which can serve as good concentration zones

for their personnel etc.Hence intelligence preparation of the battlefield is of prime importance to

avoid mishaps like Dantewada and the Kashmir cases. In case of jungle warfare this is more

important and severe constraints are imposed due to very thick foliage, canopy, water areas,

darkness etc.HUMINT is something which might be the only intelligence discipline which can

work, other assets being degraded in performance/capability due to the jungle environment.CI

support is to HUMINT of prime importance, particularly in inhabited areas belonging to the local

community as the insurgents HUMINT source is the same local population. This will be detailed

later as to how to employ CI techniques in a COIN environment.

While preparing the intelligence assessment of the battlefield in a COIN environment we need to

consider the geospatial aspects in its entirety. To achieve this we must put on paper a mapping of

all explosive hazards attributes and movement patterns of the people and insurgents. Detailed

tracking information should be mapped out on map and imagery templates. This tracking g

information can be the event and movement patterns of the community people and insurgents

prior to, during and after an explosive hazard detonation and the emplacement of explosive

hazards, types, composition, method of emplacement etc.Thereafter pattern analysis coupled

with terrain analysis can be executed on these information.

To enable mapping consider the following:

1. All EH detonations, arrest of people with EH devices over time need to be tracked and

displayed graphically on a map template.

2. The technology used ,whether the EH was buried or thrown at the security forces ,

whether it is of blast fragmentation type or shaped etc need to be documented. This will

yield the operational characteristics of the enemy. Again every EH needs to be

tracked...keeping a time frame in perspective.

3. Every IED explosion or seizure translates to information about the bomb maker –his

signature. Examine the IED to ascertain the nature of ingredients, technology used,

tactics etc.Again map out this signature profile for every IED.

4. Map the IED events density over the area. Locations, dates and frequency need to be used

as reference points.

5. Considering only the type of EH used if mapping is done then we can get a good idea of

sources of particular types of IED or any other interpretation.

6. Keep in mind that one should track all EH events with respect to adjoining structural,

organizational, religious entities. For example there can be a local village near frequent

IED explosions that is hostile to our security forces. Or say a religious unit is nearby

which is pro-insurgent. These entities can be processed for more intelligence.

7. Map out those areas of the physical terrain that can act as good ingress and egress

points/routes/corridors to potential sites for EH emplacement.

8. Recorded information about the flow of enemy personnel, weapons, etc need to be

considered in its entirety.

9. From all these EH events based mapping identify/locate areas which may be used for

deployment of Ordnance/EOD /Engineers personnel and equipment preferably under

cover to assist in rapid response to IED blasts or attempts for emplacement.

10. Map out all the routes usually taken by the security forces , especially in friendly areas

and study the corresponding terrain in detail so as to ascertain any area/s /points worthy

of IED emplacement /vulnerable to IED and post IED attacks..Identify those movement

patterns of the security forces which are very frequent and hence liable for IED’ing.

11. Identify those areas where emplacement of an IED can potentially cause harm to security

forces but not to the local community shelters. Of particular note are those communities

who are pro-insurgency.

12. Of all the possible emplacement areas on the map identify those areas that can serve both

as emplacement and also offer terrain advantages for immediate secondary gunfire attack

by hidden enemy personnel.

13. Map out those areas of the physical terrain which can multiply the IED explosion severity

by virtue of natural structures and profiles.

14. Locate and map all areas that can offer good concealment for ammunition and weaponry

caches and IEDs.

15. Map HUMINT.For example an insurgent operative was arrested in a certain area away

from his place of residence, another defined area.

16. (6) From all the EH points on the map identify those that are of low damage capacity than

those that inflict mass casualties. The former takes less time for emplacement and

difficult to prevent compared to the latter. Color code these two type—thus a geospatial

of such ‘’White-noise’’EH devices and ‘’Mass-casualty; EH devices help the

Commander to get a better understanding, his situational awareness is heightened.

COIN targeting necessitates overwhelming intelligence from ‘’bottom-up’ for successful

kinetic/non-kinetic operations. Hence ground level units need to be trained and tasked with

intelligence collection. It is near impossible to dedicate the very few specialized intelligence

assets to all the operating forces in the area of operations. Here are the key challenges of bottomup


1. Determining what is important information. Leaders need to determine PIRs for each


2. Determining where to start – in terms of information or geography. Based upon key

terrain (human and/or geographic).

Conventional operations and COIN/Antiterrorist operations (This can be termed operations

against networked criminal enterprises) are different in that the intelligence preparation of the

battle space takes into consideration not only threat elements but also the human terrain—that is

the local population. Unlike kinetic attack priority in conventional operations (kill/capture) in

COIN operations non-kinetic attack modes are often the desired outcome – non-kinetic attacks

taking into account civilian community heads, population psychological operations, insurgent

targets social network, targeting his social contacts to judge his resultant movements and

tracking him to finally locate his cell members or leadership, exploitation of targets other

community traits—in effect besides personality targeting we are also concerned with the fact

(non-kinetic fires) that units must project the second and third order of effects after they mount

any operation. Operations on a population, with which the targeted individual interacts, may

have second and third order effects on that targeted individual (e.g. – he may increase

communications or flee the area—in the former case SIGINT intercepts can yield a lot of

information about his immediate network , if his communications are verbal and physical

meetups surveillance will be the preferred tool whereas in the latter case if he flees the area he

can be tracked to know his sanctuary—he is bound to contact his team members , move in their

hideouts.).All in all kinetic attack fires can yield much more intelligence than just by acquiring

battle order intelligence. Only resorting to kinetic fires of kill/capture can never solve an

insurgency problem., As the soldiers on the ground are those who are frequently in direct contact

with community members (and hence those of them who are affiliates/sympathizers/facilitators

of the insurgents) they have the best opportunity to gain intelligence information by conducting

tactical questioning (patrols, checkpoints, choke points) or by casual elicitation methods in

normal scenarios.

Later it will be shown that setting up a company level intelligence cell and enabling tactical

teams with intelligence assets gives a major thrust in intelligence collection and also

counterintelligence activities.

There needs to be a change in focus of effort between command levels.

1. Stress should be given to the fact that tactical company and platoon level units conduct

operations with a high degree of success and hence higher levels of command must push

intelligence staff and information down to lowest points of collection (initial points) , that

is the company/battalion levels.

2. At the same time low density high demand ISR assets need to be stretched and spread

across the area of operations to gain a better situational understanding.

With these two initiatives the Command Headquarters will not lose control over its intelligence

assets and will neither lose the privilege of gaining situational understanding exclusively. On the

contrary it will be able to gain more accurate intelligence inputs. Till so far the intelligence needs

of individual ground units or any feedback from them was generally ignored what with the

Battalion intelligence officer forwarding the intelligence summary report to higher headquarters

with the overall intelligence picture of the area of operations falling under the Battalions



It is near impossible to allocate specialized intelligence assets to every operating force in the

Area of Ops, as such assets are few in number and the fact that majority of the information

required for targeting flows ‘’bottom-up’ (that is the lowest level troops) necessitates the creation

of intelligence collection units at troop level either organic to the tactical combat ground unit or

as a modular unit capable of plugging into any company or unit as per requirements. This fact

should be taken seriously into Staff consideration for targeting, particularly in asymmetric type

warfare where the network must be targeted and where delivery of fire-power is dependent on

very specific intelligence.

Building the Intelligence Picture

a. Insurgency has its HUMINT base among the ‘’people’’, hence it becomes very important

to know the human terrain, that is physical description, name, location, relationships,

biometrics, job, etc. All these information are more rapidly accessible by the lower levels units

like the company and platoons/sections. Lieutenants and NCOs can utilize their leadership

appropriately in this regard by detailing their men to extract information about the human terrain.

The lowest level that is the sepoys/soldiers can be trained to use tactical questioning to get this

information. The CLIC is ideally suited for this purpose as a unit. We must incorporate female

soldiers took to handle the feminine component of the local population—they are averse to be

questioned by male soldiers, and the traditional conservative approach of rural/semi urban

families prevents access to womenfolk by male soldiers. We must remember we are operating in

an irregular environment, not in a conventional warfare setup; hence we require very specific

information. After collection by the lower level echelons the information is evaluated and

transformed into intelligence products and then exploited via the targeting process.

What exactly is targeting? Targeting is just not kill/capture—the kinetic component of warfare.

We have both kinetic and non-kinetic fires, selected as the case may be. Particularly in an

asymmetric environment like COIN operations, we are more concerned with the population. We

need to create conditions among the population which will act as enablers for the COIN

operation. Hence targeting is not just concerned with degrading the enemy’s capabilities. In the

past we have had our special forces go out on missions with a specific objective in mind, as

against our conventional warfare setup where targeting is distributed, not personality based and

aimed at the enemy’s command and control nodes, logistics and weaponry systems. But here in

case of COIN target engagement is like those of our special forces in the past where conventional

forces act like special forces with ‘’personalities’’ in the objective window. The targets are

‘’individuals’’ and ‘’populations’’, where we are concerned with ‘’second-order’’ and ‘’thirdorder’’

effects on the ‘’population’’ of our actions against the targeted’’ individual’’.(For

example we can conduct certain operations among the community population which will either

make the targeted individual flee the area or prompt him to contact his connections amongst the

population or he may resort to communicating with his men outside the community periphery—

in all these cases we can have a surveillance and signals \intercept setup on him and track these

movements/communication intercepts).Hence commanders must understand this very important

concept—We must not limit COIN operations only to kinetic targeting, we must consider the

second and third order effects of our delivering effects on an individual; we must take a holistic

view—a system comprising our forces and activities, the insurgent/s and the population. Even if

we successfully identify and track a individual and have the capability to kill/capture him at any

time according to our wish ,sometimes it’s better not to and let him loose and keeping him under

surveillance , we further carry out non-kinetic targeting operations (psychological for example

on the community leaders who we have reason to believe sympathize with the insurgents) on the

community population to ascertain the second and third order effects to know more about the

targeted individual and his network.

Kinetic and non-kinetic Personality targeting: Intensive intelligence activity is required in a

COIN environment to single out ‘’personalities’ either for kinetic or non-kinetic targeting.

Personality targeting is not always killing or capturing the insurgent. It can be the manipulation

of the target, exploiting him, reaching out to him (also community leaders and individuals of

influence, power) through meetings, negotiations—in short exerting influence on him so as to

determine members of the larger network, plans, foreign influence and anything of

counterintelligence interest. Compare this with warrant based targeting where the prosecution of

the insurgent by the Law instills a confidence in the population and lends a semblance of

credibility to the operation in that ‘’look these guys are following the Law instead of killing

them’’.The idea of kill is never the solution, an insurgency can never be put to an end by killing

alone. The forces need to positively influence the population and also carry out psychological

ops and exploit the enemy to its advantage by resorting to non-kinetic personality targeting. True

we also have to resort to kinetic targeting, either to remove the target completely from the

insurgent network thus putting an end to his influence on the network or to remove him

temporarily so as to reach certain counterintelligence objectives, say leading to apprehension

among the members, forcing them to make contacts or any other action that can, if placed under

surveillance, lead to important information about the enemy. Whether it is kinetic personality

targeting or non-kinetic, we need to determine the best course of engagement after collecting

sufficient intelligence on the targets influence in the insurgent group and how much that

influence can be removed by which method of engagement and our influence imposed both on

the target and the group.

Targeting the entire network and targeting the individual have each a difficulty rating. In the case

of the former the task is of much greater magnitude than that of the latter where the

counterintelligence operative is facing the least opposition force—the single individual.

Collecting information on the network as a whole is difficult but targeting an individual after

accessing him in whatever way possible results in much detailed information after execution of a

series of influence-based personality attacks.

It is much easier to categorize targets, as then particular targeting effort can be applied to each

category leading to manageable chunks of information—a quantum approach to intelligence

collection. Targets can be classified by function in the group, to what degree that function

influences group decisions and activities and how much is the accessibility of the individual.

Another category from the local population perspective can be those insurgent individuals who

are in close liaison with community members. Categorizing and grouping such individuals is a

must so that operations can be conducted on each separately without any confliction.

It is very important to consciously use targeting techniques rather than as a consequence for

which the Commander was not prepared for. This can have an adverse reaction on the

population. Hence it’s very very important to execute continuous intelligence collection and

management with clearly defined intelligence priorities. It should be understood that often

choosing to target an entity may jeopardize the targeting objective on another. COIN targeting

operations are never linear like in conventional warfare.

Right from the Command headquarters down to platoon/section level as well as adjacent

companies/Bn – all of these need to be part and parcel of the target management process. It can

so happen a target in one Area of operations being tended to by a Bn also influences the

insurgent operations in another Area of operations. Or there could be an area far from the

geographical boundary of the disturbed area but under the Command where insurgency is at its

nascent stage (or insurgents have flee’d from this disturbed area and are preparing to secure that

area for their operations and projecting the latter into the disturbed area with that area as base)

and the insurgent HVT and HPT directly or indirectly affect the insurgents decision making

processes in that new area.

To create such a targeting management system we must identify all players from a holistic point

of view , not only the enemy but its sympathizers in the local population , its direct supporters ,

the material flow circuit in terms of money , weapons , fooding and the sources of availability of

these , and all hostile and benign aspects of the enemy. Thus we are not preparing to attack only

the enemy but the ENTIRE NETWORK.

The Command headquarters should lay down SOP for identifying and nomenclature of Targets

so that uniformity is maintained at every level, vertical and horizontal throughout the Command.

This will also facilitate the systematic management of the Target folders database. It could be

that the standard method of nomenclature may not apply to all targets as some may overlap in

terms of capability, position, multiple lines of operation or categories. Certain disciplines such as

SIGINT and IMINT will use their own methods of nomenclature and categorizing, different from

HUMINT methods. Here it should be seen that although we cannot change their methods of

nomenclature, the manner they feed into the ‘’targeting process’’ should translate to the standard

laid down by the Command headquarters. Still the standard should attempt to introduce

uniformity as far as practicable across all echelons of Command.

With the company level intelligence cells, the Bn intelligence platoons providing intelligence up

the chain and the ‘’top-down’’ standard mentioned above will foster cross-leveling and

coordination of targeting information provided by those units/cells.


Kill/Capture: The most common category. The equation that a kill is a kill is not valid in

COIN. Killing one insurgent can create 3 out of feelings of vengeance. It’s very important to

have a holistic view of the entire COIN campaign including the local population and target

centers of influence (for and against the campaign) with appropriate techniques, finally isolating

the enemy from its support base and then going in for the kill.

Detaining for prosecution: Strategic communications, key leader engagement, and civil affairs

fall in this category. Here we need even more intelligence so as to obtain a conviction in the

Court of law apart from identifying and apprehending the convict. Getting him convicted rather

than killing him won’t raise the issue of vengeance that much and the local population too will

appreciate this element of legality in the operations as everyone is opposed to killing. Sometimes

with the process of engaging targets and external influences, it might be justified to convert a

target with the kill/capture tag to that of warrant based targeting.

Influence Targeting: Key community leaders, those elements of the population who are proinsurgency

and lend direct/indirect t support, enemy couriers/prisoners who may be “turned” by

CI agents to get inside information, those who are anti-insurgency and those that facilitate the

enemy’s TTPs but project a clean image.























NOTE: Other details on how to create an organic intelligence unit at boot-level , establishing

target folders , merging HUMINT and CI capabilities to assume a tactical HUMINT capability ,

source operations , force protection (VERY IMPORTANT TO AVERT DANTEWADA

AND KASHMIR CAMP FIASCOS) , unit protection , personnel-physical-information security

, Counterintelligence tactics , techniques and procedures , HUMINT tactics , techniques and

procedures , intelligence requirements and collection management , intelligence cum force

projection capability(interim-combat team with organic ISR assets) , company support

intelligence team creation , ES2 concept (every soldier is a sensor) , military police intelligence

operations , HUMINT/CI doctrinal deficiencies and recommendations, need for professional

military intelligence education and recommendations and other topics are detailed in 4 available

books by the same author.