TARGETING IN COIN
Keshav
Mazumdar ATO CMAS
Kinetic Targeting is a process by which physical action is taken to kill/capture insurgents or for that matter any enemy in the area of operations in order to negate their activities/operations in the AO.For example HUMINT reports bring in information about an insurgent facilitator of IEDs supply.Kinteic Targeting , that is killing this element severely affects the IED supply thus limiting the usage of IEDs by the insurgents.Here it is very important to choose carefully the targets.They should be critical nodes in the network , destruction of which will hamper the overall operations of the network , not just cut off one single line of operation.Thus targeting C2 nodes , critical lines of communication and logistics , important couriers and informers of the enemy , prime facilitators from among the local populace , HUMINT agents from among the local populace and anything or anyone close to the or collocated with the perceived centrer of gravity of the network will in effect disrupt enemy operations as well as planning severely.For example we have identified and located a high profile insurgent and a drone attack results in his elimination.Thus we have successfully removed a node in the network.Now if we study the second and third order effects of this attack , that is the resultant action on his colleagues or men under his command and the effect on the local population(our HUMINT and CI people keeping a tab on enemy movements, enemy suspects and activities of local suspected sympathizers , facilitators) we get further leads for further targeting actions.It couls be , for instance , that after removing this critical node there is a flurry of activity in the local community among a select group of people , or maybe demoinstrations are held thus pinpointing the actual sympathizers(these can now be included in non-kinetic operations) or the activity of insurgents themselves which become observable and thus amenable for intelligence action.
Conventional war sees both adversarys attempting to utilize the entire spectrum of combined arms warfare to:
· Annihilate the others forces
· Cause severe attrition to erode the overall enemy strength and projecting capability so as to penetrate our defences or mount a piercing attack or in intelligence terms , be deprived of projecting interim intelligence enabled combat troops. same time attritting the adversary’s strength and their ability to project force.
Coming to asymmetric warfare like guerillas , insurgents and terrorists here attrition is not a solution as most of them , going by Maos principle , are intent on conserving their forces—that is strength , capabilities as they are far outnumbered in and they cannot afford to take in more casualties by foraying enmasse into enemy territory like conventional forces or for that matter projecting their force is not an option for them.They carefully choose their targets and the location where they will deliver the attack.All this done by small line squads while the majority of the insurgents stay safe at the bases.
Here is where we can arrive at a very important inference.If the insurgent must conserve his forces which means as his primary objective is to cause harm to the security forces without exposing himself unnecessarily , attacking from deep cover , or ambush , he needs pewrfect information about the nature , identity and location of his target/s.To this end intelligence capability ios critical.If he employs his own intelligence assets , which are very very limited , his own men who can keep an eye on troops movements from afar or from a top vantage point—and that is quite risky some times , the insurgent leadership then turn to their main resource base , the local populace.The limited HUMINT agents of the insurgent group now recruit sympathizers and others who support their ideology , or those who bear a grudge against the local administration , police and the security forces themselves and now these very innocuous looking people of the local community in the AO become the eyes and ears of the enemy.As per Mao’s principle , we can infer the insurgents should conserve this HUMINT capability in order to conserve their forces.This further leads to the fact that they will also protect their informers and sources and like a professional intelligence organization will surely conduct secret meetings to indoctrinate them on security principles , how to handle their captors if caught by the security forces and other psychological instructions.
Whatever be the case the local populace is and should be the main target of the Army intelligence apparatus—detect , identify and locate the HUMINT elements. History , Malaya , Philippines , Iraq , etc ..has proved time and again that a successful insurgency emerges only with the support of the local population.
Hence comes into the picture –non-kinetic targeting.Now it is clear that the insurgents will do everything possible to keep the population on their side.If not the entire local populace , well all those who sympathize or believe in its ideology or others.As for those elements of the population who are some way or the other disinterested in the insurgency movement or even averse to it , these people are kept in leash by the insurgent leadership.Intimidation , fear , torture and even killing—these tactics are resorted to.But generally the elements of the population who are so labeled as averse to the insurgents ideology prefer to keep quiet.These people must be identified by our intelligence personnel.As they are part and parcel of the community they can offer valuable intelligence on the elements of the population who work for the enemy.They are the best ones suitable for surveillance , static observation of the neighbourhood , getting good access and placement to suspects (after transmittal of the idea that they are pro-insurgency) , reporting on strangers in the village , attending propaganda meetings and hate-seminars , and knowing the entire terrain very well so as to advise the security forces during intelligence preparation of the Area of Operations.
That said , the Army should and must wage a full scale parallel war with the insurgents in controlling and influencing the minds of the population in their favour.This love/hate triangle is in fact the most important mission objective.You control the population , you know the local informers and logistical supporters of the enemy.Also the safe houses , staging areas and all clandestine meetings in the area.Going a step further , detaining such individuals and interrogating them , or more the better keeping them under tight surveillance using those friendly elements of the population you can now detect and identify their enemy HUMINT contacts.Further surveillance or arrest and detention followed by interrogation can lead to weapon caches , staging areas , other enemy personnel concentration points , transit camps , bases—in short you get nearer and nearewr to the insurgent center of gravity.
This parallel war is in effect information operations.Information operations , such as periodic or random announcements by the loudspeaker and other media enabled platoon , PSYOPS platoon , coupled with community development programmes such as road repairs , distribution of food and sweets to children at regular intervals in primary schools , helpinmg in the digging of wells , improving sanitary conditions , supplying ‘kambals’ in winter , supply of free educational books and materials , informing the community of social service programmes and financial schemes for the poor taken up by the elected Government , highlightinmg the insurgents atocrities elsewhere , impressing upon them the insurgents concept that he has to influence the population in order to survive , and many other steps/activities which can easily be undertaken by the Army as resources for such activities are not expensive , easily available and can also be supplemented by the local administration.The main point which should be driven home is the population must feel more secure and happy with the presence of the Army and other security forces and should understand that the only objective of the movement is violence and target is the Government , and that they are least bothered about the local community , but consider it therir safe haven where they can hide during the day , where they can get food , shelter and where they can brainwash and recruit people to serve their ends.
1. MISSION PRIMARY OBJECTIVE: THE POPULATION SHOULD CEASE THEIR SUPPORT FOR THE INSURGENTS TOTALLY.
2. MISSION SECONDARY OBJECTIVE: FULL SCALE NON KINETIC OPERATIONS TO SUPPORT PRIMARY OBJECTIVE.
One of the oft-overlooked consequences of just about anything are what we call second- and third-order effects. Once we have targeted someone or something we must know how this has influenced the local population , the insurgent network and even other criminal enterprises in the AO. Second and third order effects which might emerge are:
· We might lose local cooperation.
· We might gain local cooperation.
· More enemies may result if the kinetic attack results in vengeance. Going a step further , the removal of the insurgent/s may effect certain civilians (apparent by antagonistic actions , disappearance from their residence apparently to join the insurgents).Which means we can now zero in on them as suspects.
Another difference exists between conventional battles and COIN ops.In conventional battles we detect , identify , get the precise location and then nominate as a target , be it a high value target or a high payoff target.Now Counterintelligence activities ofcourse happen during conventional warfare but not as offensively as in a limited war against insurgents in a limited AO.What I mean to say is it can be one or several of our agents have infiltrated the network or trhat we have penetrated trhe network by turning one or few insurgents to work for us.Now in the same AO it could well be that a company platoon is engaged in ops against the enemy in the Eastern part of the AO.Now if this platoon is not aware of the agents (infiltratrors) in the enemy who might be selected for targeting by our platoon intelligence section , then this is a grave error.Or say we could be using a rouge insurgent unit (turned) who are up against the insurgents and they could equally well do the same thing—target our agents.Hence the number one priority is deconfliction. The targeting cell generates intelligence requirements which the HUMINT collection cell satisfies by its collection operations.Now the two cases cited above or even in a case where our soldiers are fighting behind enemy lines (in the case of COIN we can roughly define that as deep into their territory , say the insurgents dominated Assam jungles) , the platoon may not be able to access the HUMINT cell for information or the current targeting list and then it will autonomously choose and finish off the target—who can very well be one of our own agents. So how do our units avoid targeting our own agents that have been infiltrated within adversarial organizations? WE NEED TO HAVE A CENTRAL AUTHORITY , AN INTELLIGENCE UNIT , WHOSE SOLE RESPONSIBILITY WILL BE TO DECONFLICT TARGETING CELL AND HUMINT CELL ASSETS.This is very important as in most insurgencies , we have to resort to infiltration.We must remember an agent placed in the network is worth 50 machine guns.We cannot afford to lose him due to lack of deconfliction.We then suffer a counterintelligence defeat in the hands of our very own units.
There is a great difference between intelligence driven targeting and targeting based on surveillance and reconnaissance.Intelligence is crucial.If it is not present integrally in the targeting process , you can not remove the targets efficiently.The success rate will be incredibly low.Intelligence drives the fight.It is required to detect , identify , locate the target precisely , gauge beforehand what can be the second and third order effects , aid in creating target folders as per category , aid in target reduction – in short it is CRUCIALLY IMPORTANT.And Mind you , counterintelligence should go hand in hand as it protects this very same intelligence cycle , vetting the sources , determining if they are genuine , or planted.It helps in knowing and locating important targets of the enemy.It is crucial in in telligence planning.It generates positive intelligence.It is not exactly an intelligence discipline but it is more than that—it is an intelligence and force enabler.In COIN it is indispensable.Its offensive techniques like penetration or infiltration can literraly destroy the center of gravity of the enemy.
In any COIN mission , or operation , just launching an attack (kinetic that is) on the enemy using military commonsense or standard combat tactics and techniques/procedures will not be sufficient.Yes here also you are targeting , but this targeting is the usual destruction/removal of adversial elements in the course of combat as per standard doctrine.You ned to have ‘’targeting ability’’ , not just manage a team of trigger pullers.And the management of these ‘’trigger pullers’’ , the Company or Bn must have the ‘’intelligence element’’ as its brain.Then only you have the required targeting ability so critical for success in COIN.Be it kinetic or personality targeting or non-kinetic or psychological targeting.
The parallel war –that is the control of the local population by both the insurgents and the Army is essentially Information Warfare.That includes propaganda and PSYOPS.I must drive home the most important point in COIN—THE LOCAL COMMUNITY /POPULATION IS THE BEST ASSET OF THE INSURGENTS AND OUR GREATEST THREAT IN TERMS OF COUNTERINTELLIGENCE.This is the ‘human terrain’ distinct from the physical terrain (or developed infrastructure terrain , that is the security forces configure existing buildings etc so as to provide force protection and also building attack resistant/delaying structures ) which is usually scanned /surveilled and reconnoitered for intelligence preparation of the battlefield.Ignoring this human terrain , not developing it and utilizing it to our advantage places all gains from intelligence preparation of the battlefield considering the physical terrain , the enemy , the weather and environment to a minimum.We must consider non-kinetic targeting with the same importance like kinetic targeting.We need to maniupulate the minds of the population.They are the ones who can provide us hard much needed information.If we lose their support , the insurgents get their support.
Take a case in point.An army platoon is engaged in a combat action with a group of insurgents and things go wrong.The platoon was initially firmly emplaced in a built up area , protected and hardened against enemy fires.But a prolonged combat resulted in rapid depletion of ammunition and now the soldiers must flee as reinforcements will take long to reach the area.Fine—they did just that.The Company Commander had always recognized the need to influence the human terrain and today this platoon got saved just because of their Commanders foresight.How? On escaping they took refuge among the local population who gave them shelter , hiding them from the enemy , and also intelligence about enemy movements ( they are nbow on the lookout for the platoon) both to the soldiers and team leader and also to the headquarters by dispatching a couple of villagers.So they are now the teams cover , intelligence collectors and also supply points.Thats the benefit of information operations in COIN. If you can win the battle for CONTROL , then you’ll make the battle of attrition much more difficult FOR THE ENEMY.Period.
Intelligence Support to Targeting
COIN Specific Intelligence Preparation of the Battle space
(IPB) – the systematic,
continuous process of analyzing the threat and environment in a
specific area with the
NETWORK in perspective.
The commander uses IPB to understand the battle space and the
options it presents to friendly
and threat forces.
By applying the IPB process, the commander gains the information
necessary to selectively
apply and
maximize his combat power at critical points in time and space on the battle
space.
Irregular Warfare IPB
The principal difference between IPB for a conventional warfare
environment and that of
irregular warfare
is the focus on people and the accompanying high demand for detailed
information (e.g. –
census data and demographic analysis) required to support the commander’s
decision-making process.
Force protection in a COIN environment is dependent on several
factors. These factors can be
studied and
detailed by compiling all data, demographic, human terrain, enemy, environment
and
census. The
intelligence preparation of the COIN battlefield is very different than that of
conventional battlefield. Here we are concerned with specific physical data so
as to be aware of
ambush points,
egress and ingress routes,corridors,avenues of approach for the enemy, areas or
profiles which
can serve as cover for our troops if the enemy launches a surprise attack,
areas
which can
provide a good cover for the enemy and which can serve as good concentration
zones
for their personnel etc.Hence
intelligence preparation of the battlefield is of prime importance to
avoid mishaps
like Dantewada and the Kashmir cases. In case of jungle warfare this is more
important and
severe constraints are imposed due to very thick foliage, canopy, water areas,
darkness
etc.HUMINT is something which might be the only intelligence discipline which
can
work, other assets being
degraded in performance/capability due to the jungle environment.CI
support is to
HUMINT of prime importance, particularly in inhabited areas belonging to the
local
community as the
insurgents HUMINT source is the same local population. This will be detailed
later as to
how to employ CI techniques in a COIN environment.
While preparing the intelligence assessment of the battlefield in
a COIN environment we need to
consider the
geospatial aspects in its entirety. To achieve this we must put on paper a
mapping of
all explosive hazards
attributes and movement patterns of the people and insurgents. Detailed
tracking
information should be mapped out on map and imagery templates. This tracking g
information can be
the event and movement patterns of the community people and insurgents
prior to,
during and after an explosive hazard detonation and the emplacement of
explosive
hazards, types,
composition, method of emplacement etc.Thereafter pattern analysis coupled
with terrain analysis can be
executed on these information.
To enable mapping consider the following:
1. All EH detonations, arrest of people with EH devices over time
need to be tracked and
displayed
graphically on a map template.
2. The technology used ,whether the EH was buried or thrown at the
security forces ,
whether it is of
blast fragmentation type or shaped etc need to be documented. This will
yield the
operational characteristics of the enemy. Again every EH needs to be
tracked...keeping
a time frame in perspective.
3. Every IED explosion or seizure translates to information about
the bomb maker –his
signature. Examine
the IED to ascertain the nature of ingredients, technology used,
tactics
etc.Again map out this signature profile for every IED.
4. Map the IED events density over the area. Locations, dates and
frequency need to be used
as reference points.
5. Considering only the type of EH used if mapping is done then we
can get a good idea of
sources of
particular types of IED or any other interpretation.
6. Keep in mind that one should track all EH events with respect
to adjoining structural,
organizational, religious entities. For example there can be a local village
near frequent
IED explosions that is hostile to our security forces. Or say a
religious unit is nearby
which is
pro-insurgent. These entities can be processed for more intelligence.
7. Map out those areas of the physical terrain that can act as
good ingress and egress
points/routes/corridors to potential sites for EH emplacement.
8. Recorded information about the flow of enemy personnel,
weapons, etc need to be
considered in its
entirety.
9. From all these EH events based mapping identify/locate areas
which may be used for
deployment of
Ordnance/EOD /Engineers personnel and equipment preferably under
cover to
assist in rapid response to IED blasts or attempts for emplacement.
10. Map out all the routes usually taken by the security forces ,
especially in friendly areas
and study the corresponding
terrain in detail so as to ascertain any area/s /points worthy
of IED emplacement
/vulnerable to IED and post IED attacks..Identify those
movement
patterns of the
security forces which are very frequent and hence liable for IED’ing.
11. Identify those areas where emplacement of an IED can
potentially cause harm to security
forces but not
to the local community shelters. Of particular note are those communities
who are pro-insurgency.
12. Of all the possible emplacement areas on the map identify
those areas that can serve both
as emplacement and also offer
terrain advantages for immediate secondary gunfire attack
by hidden enemy personnel.
13. Map out those areas of the physical terrain which can multiply
the IED explosion severity
by virtue of natural
structures and profiles.
14. Locate and map all areas that can offer good concealment for
ammunition and weaponry
caches and
IEDs.
15. Map HUMINT.For example an insurgent operative was arrested in
a certain area away
from his place of residence,
another defined area.
16. (6) From all the EH points on the map
identify those that are of low damage capacity than
those that
inflict mass casualties. The former takes less time for emplacement and
difficult to
prevent compared to the latter. Color code these two type—thus a geospatial
of such ‘’White-noise’’EH
devices and ‘’Mass-casualty; EH devices help the
Commander to get a better understanding, his situational awareness
is heightened.
COIN targeting necessitates overwhelming intelligence from ‘’bottom-up’ for successful
kinetic/non-kinetic operations. Hence ground
level units need to be trained and tasked with
intelligence collection. It is near impossible to
dedicate the very few specialized intelligence
assets to all
the operating forces in the area of operations. Here are the key challenges of bottomup
collections:
1. Determining what is important information. Leaders need to
determine PIRs for each
mission.
2. Determining where to start – in terms of information or
geography. Based upon key
terrain (human
and/or geographic).
Conventional operations and COIN/Antiterrorist operations (This
can be termed operations
against
networked criminal enterprises) are different in that the intelligence
preparation of the
battle space
takes into consideration not only threat elements but also the human terrain—that
is
the local population. Unlike
kinetic attack priority in conventional operations (kill/capture) in
COIN operations non-kinetic attack modes are often the desired
outcome – non-kinetic attacks
taking into
account civilian community heads, population psychological operations,
insurgent
targets social
network, targeting his social contacts to judge his resultant movements and
tracking him to
finally locate his cell members or leadership, exploitation of targets other
community
traits—in effect besides personality targeting we are also concerned with the
fact
(non-kinetic fires) that units must
project the second and third order of effects after they mount
any operation. Operations on a
population, with which the targeted individual interacts, may
have second and third order
effects on that targeted individual (e.g. – he may increase
communications or flee the area—in the former case SIGINT intercepts can yield a
lot of
information about
his immediate network , if his communications are verbal and physical
meetups
surveillance will be the preferred tool whereas in the latter case if he flees
the area he
can be tracked to know his
sanctuary—he is bound to contact his team members , move in their
hideouts.).All in
all kinetic attack fires can yield much more intelligence than just by
acquiring
battle order
intelligence. Only resorting to kinetic fires of kill/capture can never solve
an
insurgency
problem., As the soldiers on the ground are those who are frequently in direct
contact
with community members (and
hence those of them who are affiliates/sympathizers/facilitators
of the insurgents) they have
the best opportunity to gain intelligence information by conducting
tactical
questioning (patrols, checkpoints, choke points) or by casual elicitation
methods in
normal
scenarios.
Later it will be shown that setting up a company level
intelligence cell and enabling tactical
teams with
intelligence assets gives a major thrust in intelligence collection and also
counterintelligence activities.
There needs to be a change in focus of effort between command
levels.
1. Stress should be given to the fact that tactical company and
platoon level units conduct
operations with a
high degree of success and hence higher levels of command must push
intelligence staff and information down to lowest points of collection
(initial points) , that
is the company/battalion
levels.
2. At the same time low density high demand ISR assets need to be
stretched and spread
across the area
of operations to gain a better situational understanding.
With these two initiatives the Command Headquarters will not lose
control over its intelligence
assets and will
neither lose the privilege of gaining situational understanding exclusively. On
the
contrary it will
be able to gain more accurate intelligence inputs. Till so far the intelligence
needs
of individual ground units or
any feedback from them was generally ignored what with the
Battalion intelligence officer forwarding the intelligence summary
report to higher headquarters
with the overall intelligence
picture of the area of operations falling under the Battalions
jurisdiction.
REQUIREMENT FOR INTELLIGENCE COLLECTION AT UNIT/PLATOON
LEVEL:
It is near impossible to allocate specialized intelligence assets
to every operating force in the
Area of Ops, as such assets are few in number and the fact that
majority of the information
required for
targeting flows ‘’bottom-up’ (that is the lowest level troops) necessitates the
creation
of intelligence collection
units at troop level either organic to the tactical combat ground unit or
as a modular unit capable of
plugging into any company or unit as per requirements. This fact
should be taken
seriously into Staff consideration for targeting, particularly in asymmetric
type
warfare where
the network must be targeted and where delivery of fire-power is dependent on
very specific intelligence.
Building the Intelligence Picture
a. Insurgency has its HUMINT base among the ‘’people’’,
hence it becomes very important
to know the human terrain, that is physical description, name, location, relationships,
biometrics, job,
etc. All these information are more rapidly accessible by the lower levels
units
like the company and
platoons/sections. Lieutenants and NCOs can utilize their leadership
appropriately in this regard by detailing their men to extract information
about the human terrain.
The lowest level that is the sepoys/soldiers can be trained to use
tactical questioning to get this
information. The
CLIC is ideally suited for this purpose as a unit. We must incorporate female
soldiers took to
handle the feminine component of the local population—they are averse to be
questioned by male
soldiers, and the traditional conservative approach of rural/semi urban
families prevents
access to womenfolk by male soldiers. We must remember we are operating in
an irregular environment, not
in a conventional warfare setup; hence we require very specific
information. After
collection by the lower level echelons the information is evaluated and
transformed into
intelligence products and then exploited via the targeting process.
What exactly is targeting? Targeting is just not kill/capture—the
kinetic component of warfare.
We have both kinetic and non-kinetic fires, selected as the case
may be. Particularly in an
asymmetric
environment like COIN operations, we are more concerned with the population. We
need to create conditions among
the population which will act as enablers for the COIN
operation. Hence
targeting is not just concerned with degrading the enemy’s capabilities. In the
past we have had our special
forces go out on missions with a specific objective in mind, as
against our
conventional warfare setup where targeting is distributed, not personality
based and
aimed at the
enemy’s command and control nodes, logistics and weaponry systems. But here in
case of COIN target engagement
is like those of our special forces in the past where conventional
forces act like
special forces with ‘’personalities’’ in the objective window. The targets are
‘’individuals’’ and ‘’populations’’, where we are concerned with
‘’second-order’’ and ‘’thirdorder’’
effects on the
‘’population’’ of our actions against the targeted’’ individual’’.(For
example we can
conduct certain operations among the community population which will either
make the targeted individual
flee the area or prompt him to contact his connections amongst the
population or he
may resort to communicating with his men outside the community periphery—
in all these cases we can
have a surveillance and signals \intercept setup on him and track these
movements/communication intercepts).Hence commanders must
understand this very important
concept—We must
not limit COIN operations only to kinetic targeting, we must consider the
second and
third order effects of our delivering effects on an individual; we must take a
holistic
view—a system
comprising our forces and activities, the insurgent/s and the population. Even
if
we successfully identify and
track a individual and have the capability to kill/capture him at any
time according to our wish ,sometimes
it’s better not to and let him loose and keeping him under
surveillance , we further carry out non-kinetic targeting operations
(psychological for example
on the community leaders who
we have reason to believe sympathize with the insurgents) on the
community
population to ascertain the second and third order effects to know more about
the
targeted
individual and his network.
Kinetic and non-kinetic Personality targeting: Intensive intelligence activity is required in a
COIN environment to single out ‘’personalities’ either for kinetic
or non-kinetic targeting.
Personality targeting is not always killing or capturing the
insurgent. It can be the manipulation
of the target, exploiting
him, reaching out to him (also community leaders and individuals of
influence, power)
through meetings, negotiations—in short exerting influence on him so as to
determine members
of the larger network, plans, foreign influence and anything of
counterintelligence interest. Compare this with warrant based targeting where the
prosecution of
the insurgent by the Law
instills a confidence in the population and lends a semblance of
credibility to the
operation in that ‘’look these guys are following the Law instead of killing
them’’.The idea of kill is
never the solution, an insurgency can never be put to an end by killing
alone. The
forces need to positively influence the population and also carry out
psychological
ops and exploit the enemy to
its advantage by resorting to non-kinetic personality targeting. True
we also have to resort to
kinetic targeting, either to remove the target completely from the
insurgent network
thus putting an end to his influence on the network or to remove him
temporarily so as to
reach certain counterintelligence objectives, say leading to apprehension
among the
members, forcing them to make contacts or any other action that can, if placed
under
surveillance, lead to important information about the enemy. Whether it is
kinetic personality
targeting or
non-kinetic, we need to determine the best course of engagement after
collecting
sufficient
intelligence on the targets influence in the insurgent group and how much that
influence can be
removed by which method of engagement and our influence imposed both on
the target and the group.
Targeting the entire network and targeting the individual have
each a difficulty rating. In the case
of the former the task is of
much greater magnitude than that of the latter where the
counterintelligence operative is facing the least opposition force—the single
individual.
Collecting information on the network as a whole is difficult but
targeting an individual after
accessing him in
whatever way possible results in much detailed information after execution of a
series of
influence-based personality attacks.
It is much easier to categorize targets, as then particular
targeting effort can be applied to each
category leading
to manageable chunks of information—a quantum approach to intelligence
collection. Targets
can be classified by function in the group, to what degree that function
influences group
decisions and activities and how much is the accessibility of the individual.
Another category from the local population perspective can be
those insurgent individuals who
are in close liaison with
community members. Categorizing and grouping such individuals is a
must so that operations can be
conducted on each separately without any confliction.
It is very important to consciously use targeting techniques
rather than as a consequence for
which the
Commander was not prepared for. This can have an adverse reaction on the
population. Hence
it’s very very important to execute continuous intelligence collection and
management with
clearly defined intelligence priorities. It should be understood that often
choosing to
target an entity may jeopardize the targeting objective on another. COIN
targeting
operations are
never linear like in conventional warfare.
Right from the Command headquarters down to platoon/section level
as well as adjacent
companies/Bn – all of these need to be part and parcel of the target
management process. It can
so happen a target in one
Area of operations being tended to by a Bn also influences the
insurgent
operations in another Area of operations. Or there could be an area far from
the
geographical boundary of the disturbed area but under the Command where
insurgency is at its
nascent stage
(or insurgents have flee’d from this disturbed area and are preparing to secure
that
area for their operations and
projecting the latter into the disturbed area with that area as base)
and the insurgent HVT and HPT
directly or indirectly affect the insurgents decision making
processes in that
new area.
To create such a targeting management system we must identify all
players from a holistic point
of view , not only the enemy
but its sympathizers in the local population , its direct supporters ,
the material flow circuit in
terms of money , weapons , fooding and the sources of availability of
these , and
all hostile and benign aspects of the enemy. Thus we are not preparing to attack
only
the enemy but the ENTIRE
NETWORK.
The Command headquarters should lay down SOP for identifying and
nomenclature of Targets
so that uniformity is
maintained at every level, vertical and horizontal throughout the Command.
This will also facilitate the systematic management of the Target
folders database. It could be
that the standard method of
nomenclature may not apply to all targets as some may overlap in
terms of
capability, position, multiple lines of operation or categories. Certain
disciplines such as
SIGINT and IMINT will use their own methods of nomenclature and
categorizing, different from
HUMINT methods. Here it should be seen that although we cannot
change their methods of
nomenclature, the manner they feed into the ‘’targeting process’’ should
translate to the standard
laid down by the Command
headquarters. Still the standard should attempt to introduce
uniformity as far
as practicable across all echelons of Command.
With the company level intelligence cells, the Bn intelligence
platoons providing intelligence up
the chain and the ‘’top-down’’
standard mentioned above will foster cross-leveling and
coordination of targeting information provided by those units/cells.
Categories:
Kill/Capture: The most common category. The equation that a kill is a kill is not valid in
COIN. Killing one insurgent can create 3 out of feelings of
vengeance. It’s very important to
have a holistic view of the
entire COIN campaign including the local population and target
centers of
influence (for and against the campaign) with appropriate techniques, finally isolating
the enemy from its support
base and then going in for the kill.
Detaining for prosecution: Strategic communications, key leader engagement, and civil affairs
fall in this category. Here we
need even more intelligence so as to obtain a conviction in the
Court of law apart from identifying and apprehending the convict.
Getting him convicted rather
than killing him won’t raise
the issue of vengeance that much and the local population too will
appreciate this
element of legality in the operations as everyone is opposed to killing.
Sometimes
with the process of engaging
targets and external influences, it might be justified to convert a
target with the
kill/capture tag to that of warrant based targeting.
Influence Targeting: Key
community leaders, those elements of the population who are proinsurgency
and lend direct/indirect t
support, enemy couriers/prisoners who may be “turned” by
CI agents to get inside information, those who are anti-insurgency
and those that facilitate the
enemy’s TTPs but
project a clean image.
NOTE: Other details on how to create an organic intelligence unit
at boot-level , establishing
target folders
, merging HUMINT and CI capabilities to assume a tactical HUMINT capability ,
source
operations , force protection (VERY
IMPORTANT TO AVERT DANTEWADA
AND KASHMIR CAMP FIASCOS) , unit protection , personnel-physical-information security
, Counterintelligence tactics , techniques and procedures , HUMINT
tactics , techniques and
procedures ,
intelligence requirements and collection management , intelligence cum force
projection
capability(interim-combat team with organic ISR assets) , company support
intelligence team creation , ES2 concept (every soldier is a sensor) , military
police intelligence
operations ,
HUMINT/CI doctrinal deficiencies and recommendations, need for professional
military
intelligence education and recommendations and other topics are detailed in 4
available
books by the
same author.
KESHAV MAZUMDAR