Collection

Collection of intelligence against enemy targets focused on the threat’s large networks, includ­ing command, control and communications; air defense; and sustainment. Intelligence assets at all levels utilized a balance of the various intel disciplines—human intelligence (HUMINT), sig­nals intelligence (SIGINT), imagery intelligence (IMINT), and measurement and signatures intelli­gence (MASINT)—to find the enemy for targeting. Tactical and operational Military Intelligence (MI) units used their organic systems as well as Tactical


Exploitation of National Capabilities (TENCAP) feeds to find concentrations of Soviet forces.

Analysis

Define the battlefield environment and describe the battlefield effects. In this part of IPB, the intel­ligence section focused on the effects of weather and the physical terrain on friendly and enemy operations. It focused on the military aspects of terrain, mobility and the impact of terrain on the range of the weapons systems.

Evaluate the threat and determine threat courses of action. Determining the effects of weather and terrain allowed an intelligence section to predict an enemy force’s scheme of maneuver in a situational template. Further adjustments were made by taking into account range fans, doctrinal rates of move­ment, and the space and time between echelons. Units that trained in exercises against this threat believed that the IPB process did a good job of depicting its operations. The reality, however, is that we may never know, because we never faced the Soviet Army in battle.

Targeting

Tactical targeting in conventional operations had a kinetic focus. Friendly forces targeted high-payoff tar­gets that would weaken the enemy at a decisive point. These target sets traditionally included reconnaissance units, armor, engineer equipment, long-range artillery, rockets, and attack-aviation assets. At the operational level, the targeting effort focused on key enablers such as petroleum storage facilities, supply warehouses, and ammunition supply points. Additionally, using Infor­mation Operations (IO) and Psychological Operations (PSYOP), friendly forces tried to demoralize enemy forces and dissuade them from fighting and to influ­ence other forces. During a conventional fight, intel­ligence supported most parts of the targeting process: decide, detect, deliver, and assess.

Intelligence Support to COIN

Supporting COINoperations with intelligence requires the analyst to know the indigenous people in a way not required by conventional operations. This human-intelligence dimension involves exam­ining the role that culture, demographics, political

DoD


In COIN, the preponderance of HUMINT comes from the units who have the most familiarity and contact with the population. Those who have daily contact notice changing conditions in their areas before anybody else. In this photo, members of a civil affairs team work with Iraqi water treatment facility workers to assess the damage to a water treat­ment facility.

 

 

support, religion, and ethnicity play. It also neces­sitates learning about patterns of social network­ing. The intelligence cycle begins with directing requirements to different intelligence assets and then conducting collection operations.

Collection

In the COINenvironment, identifying the enemy is a significant obstacle and an important part of the collection process. Potential adversaries have the advantage of blending in with the population. Iden­tifying insurgents must occur in order to separate the insurgents from their bases of support through population control.

The focus of collection efforts in COINdiffers greatly from that of conventional combat operations. Because human factors are extremely important, standoff collection assets have less value. In COIN, useful intelligence is most often obtained through personal contact with the population. This puts a dis­proportionate level of importance on HUMINTand requires a different understanding of it. In conventional operations, HUMINTis the domain of interrogators and counterintelligence agents; that has changed.

In COIN, the preponderance of HUMINTcomes from the units who have the most familiarity and contact with the population. Special Forces teams, Civil Affairs (CA) personnel, the unit chaplain, the commander, engineers, the squad automatic weapon gunner, and everybody else who has daily contact with the population notice changing conditions in their areas before anybody else. Some of the changes might match indicators and warnings from the intelligence section that precede an insurgent action. Input from first-contact units gives the commander the ability to see first, understand first, and act first. The increase in situational awareness helps friendly forces gain and maintain the initiative, which is critical in COIN.2

While COINdemands that we break our reliance on technical collection and put renewed emphasis on HUMINT, the other intelligence disciplines—SIGINT, IMINT, and MASINT—still have value. Friendly forces can take advantage of national collection assets using organic TENCAP systems to confirm or deny HUMINTreporting. As Colonel Rick Allenbaugh notes, “[In a COINtargeting cycle], the key is [still] cross-cueing and synchronization.”3  Open-Source Intelligence (OSINT) also gains a measure of impor­tance that it does not have against a conventional threat. The intelligence analyst has much to gain from what people say on the radio and write in newspapers. Just gauging the number of pro- and anti-government newspapers printed in a certain area is telling.

The sources of intelligence and the collection assets that an intelligence professional has access to in a COINenvironment are much different from those of a conventional combat operation. In a conventional operation, the intelligence section accesses organic assets with limited or no access to interagency, international, or national sources of information, especially at lower echelons. In COIN, intelligence operations strive to fuse intelligence from nonorganic collection sources into a seamless picture of the insurgency networks and to provide corroborating intelligence for targeting.

As noted by retired Major General James Marks, maneuver commanders are also conducting opera­tions to gain intelligence: “Commanders at all levels must develop intelligence to develop their missions. Higher headquarters often will not and cannot provide sufficient clarity of task or purpose to drive operations at the lower levels.”4  As a result, intelligence opera­tions are now considered operational missions. For example, operational elements may plan to increase patrols and establish roadblocks surrounding a neigh­borhood suspected of harboring Al-Qaeda senior lead­ership. Door-to-door checks through residences may trigger movement of a target that might be detected by unmanned aerial vehicles or by cordon-and-search forces when the target attempts to escape the area. Another example of the relational changes is the inte­gration of intelligence professionals into information operations and the nonkinetic targeting processes.

Operators are now trained for and accustomed to collecting forensic evidence during search operations During site exploitation, residences suspected of providing safe havens to insurgents are now treated much like crime scenes. Operators search for and collect items that may provide leads for future operations. As Allenbaugh notes, “Forensics are new and not fully accepted or understood.”5 Build­ing a forensic case has two major benefits: It allows Host-Nation (HN) security forces to build legal cases against insurgents and their supporters; and it provides information that interrogators can use to confront suspects and gain more intelligence on their network and operational plans.

The COINenvironment requires joint, interagency, international and HNcollaboration for collection operations and target development. National intel­ligence support teams, when deployed to an opera­tional command, provide access to national-level collection assets from Other Government Agencies (OGAs). Joint Interagency Task Forces (JIATFs), composed of military and government intelligence analysts and collectors, offer another way of access­ing national intelligence and analysis.6 Military ana­lysts fuse that intelligence with organic collection to gain the best possible understanding of the insurgent network, high-value targets and the populace.

Centralized and synchronized intelligence col­lection between all elements deployed in a theater is important for providing a more complete picture of terrorist networking through more thorough intelligence fusion. In current operations, a target tracked by the JIATFin Afghanistan or Pakistan may carry operational plans between the Al-Qaeda senior leadership and other operatives, and later turn up in another command’s sector in Iraq. This makes mutual support between commands a necessity. The insurgent network is linked; we should be, too.

Mutual support between the various units, agen­cies, and countries often meets parochial and cul­tural roadblocks. Intelligence professionals must work cooperatively but forcefully to cut through bureaucratic red tape and to keep everybody focused on the end state: actionable intelligence. The synergy of intelligence collaboration is too valuable to sacrifice to petty concerns.

 

Analysis

Define the battlefield environment and describe the battlefield effects. One of the requirements in the first IPB step is to establish an Area of Interest (AI).7 Although U.S. forces face adversaries who conduct transnational operations and aspire to lead a global insurgency, the AI, as a practical matter, cannot be the entire world. Intelligence analysts work to incorporate local nodes that the insurgents use to connect with other parts of their network into the AI. Doing this creates an AI that encompasses a manageable area for analysis. These AIs may include avenues of approach that cross an inter­national boundary and lines of communication, including known or likely courier routes, SIGINTnetworks and local Internet service providers.

Lieutenant Colonel David Kilcullen, in his article “Twenty-Eight Articles: Fundamentals of Company-level Counterinsurgency,” offers some valuable advice about studying the terrain: “Know the people, the topography, economy, history, religion and culture. Know every vil­lage, road, field, population group, tribal leader and ancient grievance. Your task is to become the world expert on your district.”8

Depending on the operational environment, a myriad of other demographic considerations may also become relevant in COIN. These considerations include social class structure, race, ethnicity, tribe, political party, gender, age, physical ability, national­ity, language, religion, professional or occupational status, and employment levels. Additionally, key personnel and groups have become the new key terrain. These may comprise religious clerics, finan­cially powerful families, influential members of the opposition, or anyone with influence over a large or important constituency. Insurgents may target, agitate, or subvert any of these groups to further their aims.

Key terrain also encompasses the neutral pockets of the population, the “fence sitters” who represent the operational center of gravity.9 Intelligence sec­tions should graphically depict the geographic areas of these various groups in population status overlays and continuously develop the relationship of social networks using link diagrams. Population analysis enables military forces to identify key formal and informal leaders as well as groups of people who require intelligence and operational focus. This socio-cultural analysis bolsters the power of full-spectrum military operations by providing a starting point for winning “hearts and minds.”

An evaluation of the battlefield’s effects begins with an analysis of the environment and its effect on friendly and enemy operations. The analyst also considers political topography and the factors that relate to it. These may include infrastructure and enemy capabilities that previously were not evalu­ated. In the COINenvironment, one must consider the importance of infrastructure and not merely its location and effect. Opening an office of a govern­ment ministry in a certain neighborhood could have second- and third-order effects that the commander must weigh when he considers COAs.

Owing to technology and the asymmetrical nature of the threat, the battlespace now heavily favors the use of information operations. Using cyberspace and the media, the insurgents seek to influence their target audience, expand their numbers, and exploit their acts. Outlets that allow the insurgents to spread their message must be incorporated into the analysis of the environment. COINforces should pay atten­tion to Internet pages, in particular, as they provide an effective means of reaching a large audience from an electronic sanctuary.

Evaluate the threat and determine threat courses of action. The requirements of steps 3 and 4 of IPB, as outlined in U.S. Army Field Manual 34-130, Intel­ligence Preparation of the Battlefield, show that the process is adaptable to COIN, although COINpresents additional challenges. Step 3 consists of converting patterns of operations to graphics,describing, in words, the threat’s tactics and options, identifying high-value targets (HVTs), and defining the threat capabilities.10

COINforces must exercise operational patience and allow enough time for insurgent patterns of operation to emerge. Interrogations of detained insurgents and the exploitation of captured manu­als, equipment, and information will also help to confirm suspected patterns of operation and tactics, techniques and procedures.

In assessing threat capabilities, the intelligence section will try to link personnel with events using an activities matrix. Aseries of incidents, along with information from captured personnel and equipment, may help reveal key personnel within the network. Examples may include bomb makers, financiers, and arms dealers. Their relative power within the network is high because multiple opera­tional teams rely on the support that they provide.11 Individual teams or cells, on the other hand, have less connection to the network. This makes finding them a more formidable task. The section has a number of analytical tools, such as the association matrix for mapping the network and finding its key nodes (who may become HVTs).

One of the greatest challenges in COINis to iden­tify those pockets of the population that indirectly or secretly provide support to the insurgency. Winning over the population denies the insurgents their base of support. To do this, U.S. forces must obtain suf­ficient cultural intelligence to gain rapport, trust and credibility as an ally of the HN. Cultural missteps impair our relationship with the HNand the people. The people have to believe that the government can fulfill their needs and personal interests. “We never do a good job of cultural intelligence: of understand­ing what makes people tick, what their structure is, where authority lies, what is different about their values, and their way of doing business.”12

Targeting

Owing to the demands of the “three block war,”13 in which U.S. forces could find themselves pro­viding humanitarian assistance, conducting peace operations and fighting a mid-intensity battle simul­taneously, targeting has become more complex. It also demands much more from the intelligence com­munity. With the full-spectrum operations required by COIN, U.S. forces do two types of targeting:

● Lethal—targeting of key leaders and nodes (“kill/capture,” raid)

Nonlethal—gaining support from the popula­tion (“hearts and minds”)

The obvious difference in the two comes in the “deliver” phase. One type of targeting uses combat operations (maneuver and firepower) to destroy, while the other uses nonlethal fires (IO and PSYOP) and CAto persuade. The “detect” phase, however, is also different. The first target is threat-based, but the second considers the neutral population as the target audience. The first type requires the track­ing of certain key leaders, while the second type requires an understanding of the environment and the people. The first poses technical challenges; the latter is conceptually difficult.

In order to maintain contact with key leaders or other HVTs, the targeting process in COINmore closely follows “decide, detect, track, deliver, and assess,” instead of the cold war “decide, detect, deliver, and assess.” The change places greater demands on intelligence assets to provide an “unblinking eye” or continuous surveillance of either fixed or moving targets. We know that lethal targeting does not itself provide a solution in COIN.14

We have to target the people’s support, which is the center of gravity for both the HNgovernment and the insurgents. Understanding how factors like culture, religion, and tribal structure cause different behaviors and perceptions is difficult; it requires education and experience. Intelligence sections should seek out a HNmilitary counterpart (Eng­lish-speaking or not), other government agencies, nongovernmental organizations, immigrants within the ranks, or others who have area expertise.15

Having contributed to the “detect” phase of tar­geting, the intelligence analyst is still not finished—the “assess” phase is critical in COIN. Instead of merely doing a battle-damage assessment, the analyst must anticipate the reaction of key groups and second- and third-order effects. AUAV camera will not pick up the most important effects. Intel­ligence analysts must be the commander’s experts on culture and be able to predict the consequences of servicing targets.

Acritical aspect of targeting the insurgents and the population is that both groups form part of a larger social network. Killing or capturing a key leader could generate ripple effects throughout that network and outside it. Targeting certain groups through nonkinetic means will also affect members of other groups that because of fear, insult, or jeal­ousy, develop a connection to the event.16 Using link analysis, the analyst should try to anticipate these unintended consequences so the commander can more accurately assess his operational risk. With proper intelligence support, targeting allows us to assist the HNgovernment to secure popular support, which, once accomplished, is decisive.

Conclusion

Almost overnight, it seems, MI analysts have gone from templating Soviet motorized rifle divi­sions to assessing the capabilities of clans, tribes, gangs, and militias. The practice of intelligence has evolved from a military science in conventional operations to a military art in COIN. With that change came the challenge of learning about dif­ferent peoples and their environments.

In COIN, the environment is as important as the enemy, because the neutral majority, the center of gravity, resides there. COINrequires an apprecia­tion of cultures, religions, tribes, classes, ethnici­ties, and languages, so that the people will view U.S. forces and their own government positively and work against the insurgents. Knowledge of the population, social networks, and the insurgency helps us to highlight the importance of human fac­tors in fighting an insurgency. Consequently, most intelligence in COINis collected by HUMINT, including information from Soldier debriefings and reporting. The other intelligence disciplines work in support to confirm or deny HUMINT reporting.

To target the population effectively, intelligence professionals use all-source intelligence gained from HN, joint service, interagency, and multinational part­ners. Tearing down the walls between these groups and fusing intelligence enables effective targeting. Targeting the enemy and the population through lethal and nonlethal means results in a weakened insurgency that has been denied its base of support. Intelligence and operations, working closely together and with the HN, bring about this end state. MR