►Collection
Collection of intelligence
against enemy targets focused on the threat’s large networks, including
command, control and communications; air defense; and sustainment.
Intelligence assets at all levels utilized a balance of the various intel disciplines—human intelligence (HUMINT), signals
intelligence (SIGINT), imagery intelligence (IMINT), and measurement and
signatures intelligence (MASINT)—to find the enemy for targeting. Tactical and
operational Military Intelligence (MI) units used their organic systems as well
as Tactical
Exploitation of National Capabilities (TENCAP) feeds to find
concentrations of Soviet forces.
►Analysis
Define the battlefield environment and describe the
battlefield effects. In this part of
IPB, the intelligence section focused on the effects of weather and the
physical terrain on friendly and enemy operations. It focused on the military
aspects of terrain, mobility and the impact of terrain on the range of the
weapons systems.
Evaluate the threat and determine threat courses of
action. Determining the effects of
weather and terrain allowed an intelligence section to predict an enemy force’s
scheme of maneuver in a situational template. Further adjustments were made by
taking into account range fans, doctrinal rates of movement, and the space and
time between echelons. Units that trained in exercises against this threat
believed that the IPB process did a good job of depicting its operations. The
reality, however, is that we may never know, because we never faced the Soviet
Army in battle.
►Targeting
Tactical
targeting in conventional operations had a kinetic focus. Friendly forces
targeted high-payoff targets that would weaken the enemy at a decisive point.
These target sets traditionally included reconnaissance units, armor, engineer
equipment, long-range artillery, rockets, and attack-aviation assets. At the
operational level, the targeting effort focused on key enablers such as
petroleum storage facilities, supply warehouses, and ammunition supply points.
Additionally, using Information Operations (IO) and Psychological Operations
(PSYOP), friendly forces tried to demoralize enemy forces and dissuade them
from fighting and to influence other forces. During a conventional fight,
intelligence supported most parts of the targeting process: decide, detect,
deliver, and assess.
Intelligence
Support to COIN
Supporting COINoperations
with intelligence requires the analyst to know the indigenous people in a way
not required by conventional operations. This human-intelligence dimension
involves examining the role that culture, demographics, political
DoD
In
COIN, the preponderance of HUMINT comes from the units who have the most
familiarity and contact with the population. Those who have daily contact
notice changing conditions in their areas before anybody else. In this photo,
members of a civil affairs team work with Iraqi water treatment facility
workers to assess the damage to a water treatment facility.
support, religion, and ethnicity play. It also
necessitates learning about patterns of social networking. The intelligence
cycle begins with directing requirements to different intelligence assets and
then conducting collection operations.
►Collection
In the COINenvironment,
identifying the enemy is a significant obstacle and an important part of the
collection process. Potential adversaries have the advantage of blending in
with the population. Identifying insurgents must occur in order to separate
the insurgents from their bases of support through population control.
The focus of collection efforts in COINdiffers greatly from that of conventional combat
operations. Because human factors are extremely important, standoff collection
assets have less value. In COIN, useful intelligence is most often obtained
through personal contact with the population. This puts a disproportionate
level of importance on HUMINTand requires a different
understanding of it. In conventional operations, HUMINTis
the domain of interrogators and counterintelligence agents; that has changed.
In COIN, the preponderance of HUMINTcomes from the units who have the most familiarity
and contact with the population. Special Forces teams, Civil Affairs (CA)
personnel, the unit chaplain, the commander, engineers, the squad automatic
weapon gunner, and everybody else who has daily contact with the population
notice changing conditions in their areas before anybody else. Some of the
changes might match indicators and warnings from the intelligence section that
precede an insurgent action. Input from first-contact units gives the commander
the ability to see first, understand first, and act first. The increase in
situational awareness helps friendly forces gain and maintain the initiative,
which is critical in COIN.2
While COINdemands
that we break our reliance on technical collection and put renewed emphasis on
HUMINT, the other intelligence disciplines—SIGINT, IMINT, and MASINT—still have
value. Friendly forces can take advantage of national collection assets using
organic TENCAP systems to confirm or deny HUMINTreporting.
As Colonel Rick Allenbaugh notes, “[In a COINtargeting cycle], the key is [still] cross-cueing and
synchronization.”3 Open-Source Intelligence (OSINT) also gains
a measure of importance that it does not have against a conventional threat.
The intelligence analyst has much to gain from what people say on the radio and
write in newspapers. Just gauging the number of pro- and anti-government
newspapers printed in a certain area is telling.
The sources of intelligence and the collection assets that an
intelligence professional has access to in a COINenvironment
are much different from those of a conventional combat operation. In a
conventional operation, the intelligence section accesses organic assets with
limited or no access to interagency, international, or national sources of
information, especially at lower echelons. In COIN, intelligence operations
strive to fuse intelligence from nonorganic
collection sources into a seamless picture of the insurgency networks and to
provide corroborating intelligence for targeting.
As noted by retired Major General James Marks, maneuver commanders
are also conducting operations to gain intelligence: “Commanders at all levels
must develop intelligence to develop their missions. Higher headquarters often
will not and cannot provide sufficient clarity of task or purpose to drive
operations at the lower levels.”4 As a result, intelligence operations are now considered operational
missions. For example, operational elements may plan to increase patrols and
establish roadblocks surrounding a neighborhood suspected of harboring
Al-Qaeda senior leadership. Door-to-door checks through residences may trigger
movement of a target that might be detected by unmanned aerial vehicles or by
cordon-and-search forces when the target attempts to escape the area. Another
example of the relational changes is the integration of intelligence professionals
into information operations and the nonkinetic
targeting processes.
Operators are now trained for and
accustomed to collecting forensic evidence during search operations During site exploitation, residences suspected of providing
safe havens to insurgents are now treated much like crime scenes. Operators
search for and collect items that may provide leads for future operations. As Allenbaugh notes, “Forensics are new and not fully accepted
or understood.”5 Building a forensic case has two major benefits: It allows Host-Nation (HN) security
forces to build legal cases against insurgents and their supporters; and it
provides information that interrogators can use to confront suspects and gain
more intelligence on their network and operational plans.
The COINenvironment
requires joint, interagency, international and HNcollaboration
for collection operations and target development. National intelligence
support teams, when deployed to an operational command, provide access to
national-level collection assets from Other Government Agencies (OGAs). Joint Interagency Task Forces (JIATFs),
composed of military and government intelligence analysts and collectors, offer
another way of accessing national intelligence and analysis.6 Military analysts fuse that intelligence with organic
collection to gain the best possible understanding of the insurgent network,
high-value targets and the populace.
Centralized and synchronized intelligence collection between all
elements deployed in a theater is important for providing a more complete
picture of terrorist networking through more thorough intelligence fusion. In
current operations, a target tracked by the JIATFin
Afghanistan or Pakistan may carry operational plans between the Al-Qaeda senior
leadership and other operatives, and later turn up in another command’s sector
in Iraq. This makes mutual support between commands a necessity. The insurgent
network is linked; we should be, too.
Mutual support
between the various units, agencies, and countries often meets parochial and
cultural roadblocks. Intelligence professionals must work cooperatively but
forcefully to cut through bureaucratic red tape and to keep everybody focused
on the end state: actionable intelligence. The synergy of intelligence
collaboration is too valuable to sacrifice to petty concerns.
►Analysis
Define the battlefield environment and
describe the battlefield effects. One of the requirements in the first IPB step is to establish an
Area of Interest (AI).7 Although U.S. forces face adversaries who conduct transnational
operations and aspire to lead a global insurgency, the AI, as a practical
matter, cannot be the entire world. Intelligence analysts work to incorporate
local nodes that the insurgents use to connect with other parts of their
network into the AI. Doing this creates an AI that encompasses a manageable
area for analysis. These AIs may include avenues of
approach that cross an international boundary and lines of communication,
including known or likely courier routes, SIGINTnetworks
and local Internet service providers.
Lieutenant Colonel David Kilcullen, in his article “Twenty-Eight Articles:
Fundamentals of Company-level Counterinsurgency,” offers some valuable advice
about studying the terrain: “Know the people, the topography, economy, history,
religion and culture. Know every village, road, field, population group,
tribal leader and ancient grievance. Your task is to become the world expert on
your district.”8
Depending on the operational environment,
a myriad of other demographic considerations may also become relevant in COIN.
These considerations include social class structure, race, ethnicity, tribe,
political party, gender, age, physical ability, nationality, language,
religion, professional or occupational status, and employment levels.
Additionally, key personnel and groups have become the new key terrain. These
may comprise religious clerics, financially powerful families, influential
members of the opposition, or anyone with influence over a large or important
constituency. Insurgents may target, agitate, or subvert any of these groups to
further their aims.
Key terrain also encompasses the neutral
pockets of the population, the “fence sitters” who represent the operational
center of gravity.9 Intelligence sections should graphically
depict the geographic areas of these various groups in population status
overlays and continuously develop the relationship of social networks using
link diagrams. Population analysis enables military forces to identify key
formal and informal leaders as well as groups of people who require
intelligence and operational focus. This socio-cultural analysis bolsters the
power of full-spectrum military operations by providing a starting point for
winning “hearts and minds.”
An evaluation of the battlefield’s effects begins with an analysis
of the environment and its effect on friendly and enemy operations. The analyst
also considers political topography and the factors that relate to it. These
may include infrastructure and enemy capabilities that previously were not
evaluated. In the COINenvironment, one must consider
the importance of infrastructure and not merely its location and effect.
Opening an office of a government ministry in a certain neighborhood could
have second- and third-order effects that the commander must weigh when he
considers COAs.
Owing to technology and the asymmetrical nature of the threat, the
battlespace now heavily favors the use of information
operations. Using cyberspace and the media, the insurgents seek to influence
their target audience, expand their numbers, and exploit their acts. Outlets
that allow the insurgents to spread their message must be incorporated into the
analysis of the environment. COINforces should pay
attention to Internet pages, in particular, as they provide an effective means
of reaching a large audience from an electronic sanctuary.
Evaluate the threat and determine threat
courses of action. The
requirements of steps 3 and 4 of IPB, as outlined in U.S. Army Field Manual
34-130, Intelligence Preparation of the Battlefield, show that the process
is adaptable to COIN, although COINpresents
additional challenges. Step 3 consists of converting patterns of operations to graphics,describing, in words, the threat’s tactics and
options, identifying high-value targets (HVTs), and
defining the threat capabilities.10
COINforces must exercise operational patience and
allow enough time for insurgent patterns of operation to emerge. Interrogations
of detained insurgents and the exploitation of captured manuals, equipment,
and information will also help to confirm suspected patterns of operation and
tactics, techniques and procedures.
In assessing threat capabilities, the
intelligence section will try to link personnel with events using an activities
matrix. Aseries of incidents, along with information
from captured personnel and equipment, may help reveal key personnel within the
network. Examples may include bomb makers, financiers, and arms dealers. Their
relative power within the network is high because multiple operational teams
rely on the support that they provide.11 Individual teams or cells, on the other hand, have less connection
to the network. This makes finding them a more formidable task. The section has
a number of analytical tools, such as the association matrix for mapping the
network and finding its key nodes (who may become HVTs).
One of the greatest challenges in COINis to identify those pockets of the population that
indirectly or secretly provide support to the insurgency. Winning over the
population denies the insurgents their base of support. To do this, U.S. forces
must obtain sufficient cultural intelligence to gain rapport, trust and
credibility as an ally of the HN. Cultural missteps impair our relationship
with the HNand the people. The people have to believe
that the government can fulfill their needs and personal interests. “We never
do a good job of cultural intelligence: of understanding what makes people
tick, what their structure is, where authority lies, what is different about
their values, and their way of doing business.”12
►Targeting
Owing to the demands of the “three block
war,”13 in which U.S. forces could find themselves
providing humanitarian assistance, conducting peace operations and fighting a
mid-intensity battle simultaneously, targeting has become more complex. It
also demands much more from the intelligence community. With the full-spectrum
operations required by COIN, U.S. forces do two types of targeting:
● Lethal—targeting of key leaders and nodes (“kill/capture,”
raid)
● Nonlethal—gaining support from
the population (“hearts and minds”)
The obvious difference in the two comes in the “deliver” phase.
One type of targeting uses combat operations (maneuver and firepower) to
destroy, while the other uses nonlethal fires (IO and
PSYOP) and CAto persuade. The “detect” phase,
however, is also different. The first target is threat-based, but the second
considers the neutral population as the target audience. The first type
requires the tracking of certain key leaders, while the second type requires
an understanding of the environment and the people. The first poses technical
challenges; the latter is conceptually difficult.
In order to maintain contact with key leaders or other HVTs, the targeting process in COINmore
closely follows “decide, detect, track, deliver, and assess,” instead of the
cold war “decide, detect, deliver, and assess.” The change places greater
demands on intelligence assets to provide an “unblinking eye” or continuous
surveillance of either fixed or moving targets. We know that lethal targeting
does not itself provide a solution in COIN.14
We have to target
the people’s support, which is the center of gravity for both the HNgovernment and the insurgents. Understanding how factors
like culture, religion, and tribal structure cause different behaviors and
perceptions is difficult; it requires education and experience. Intelligence
sections should seek out a HNmilitary counterpart
(English-speaking or not), other government agencies, nongovernmental
organizations, immigrants within the ranks, or others who have area expertise.15
Having contributed to the “detect” phase
of targeting, the intelligence analyst is still not finished—the “assess”
phase is critical in COIN. Instead of merely doing a battle-damage assessment,
the analyst must anticipate the reaction of key groups and second- and
third-order effects. AUAV camera will not pick up the most important effects.
Intelligence analysts must be the commander’s experts on culture and be able
to predict the consequences of servicing targets.
Acritical aspect of targeting the insurgents and
the population is that both groups form part of a larger social network.
Killing or capturing a key leader could generate ripple effects throughout that
network and outside it. Targeting certain groups through nonkinetic
means will also affect members of other groups that because of fear, insult, or
jealousy, develop a connection to the event.16 Using link analysis, the analyst should try to anticipate these
unintended consequences so the commander can more accurately assess his
operational risk. With proper intelligence support, targeting allows us to
assist the HNgovernment to secure popular support,
which, once accomplished, is decisive.
Conclusion
Almost overnight, it seems, MI analysts
have gone from templating Soviet motorized rifle divisions
to assessing the capabilities of clans, tribes, gangs, and militias. The
practice of intelligence has evolved from a military science in conventional
operations to a military art in COIN. With that change came
the challenge of learning about different peoples and their environments.
In COIN, the environment is as important as the enemy, because the
neutral majority, the center of gravity, resides there. COINrequires
an appreciation of cultures, religions, tribes, classes, ethnicities, and
languages, so that the people will view U.S. forces and their own government
positively and work against the insurgents. Knowledge of the population, social
networks, and the insurgency helps us to highlight the importance of human factors
in fighting an insurgency. Consequently, most intelligence in COINis collected by HUMINT, including information from
Soldier debriefings and reporting. The other intelligence disciplines work in
support to confirm or deny HUMINT reporting.
To target the
population effectively, intelligence professionals use all-source intelligence
gained from HN, joint service, interagency, and multinational partners.
Tearing down the walls between these groups and fusing intelligence enables
effective targeting. Targeting the enemy and the population through lethal and nonlethal means results in a weakened insurgency that has
been denied its base of support. Intelligence and operations, working closely
together and with the HN, bring about this end state. MR