WRITEUP: MY INTENT TO WRITE THE THREE DOCTRINAL BOOKS FOR INDIAN ARMY
Books are here..translation facility on left top corner of the page
My intent is to incorporate solution for UNCERTAINTY in warfare in existing Doctrine. Uncertainty leads to Surprise , something which is the primary Endeavour of any Commander in warfare. Indications and Warning surely affords a solution , but indications and warning often leads to a reactive intelligence collection. we wait until a new capability or weapons system is discovered , that capability or system is implemented by the enemy with devastating results , still we cannot counter it as it being new we do not have a defense system nor a counter-system , and by the time we develop it they have either have had sufficient time to test it practically on us and develop it further or we have had terrible losses in our armed forces , installation , C2 nodes or for that matter overall defeat. Had we incorporated adaptability , creativity , exploration , continual experimentation , critical reviews of existing tactics , techniques , procedures and SOPs in light of intelligence information about an asymmetric enemy with our counterintelligence being totally offensive to get us information on plans before the indicators surface (that’s why I said reactive intelligence collection--before the indicators surface we know nothing of their plans) then we wouldn't be taken by surprise and we would have been prepared for that new developed capability or weapons system.
In present times we are dealing with asymmetric enemies more and more be it insurgency , terrorism or even conventional enemy with a solid devastating new capability or weapons system or tactics which far offsets our capabilities , weapon system or tactics granting him an asymmetric advantage.
Let’s start by touching on tactics and techniques and procedures in this light of asymmetric warfare:
Tactics:
At the point of engagement. We have a repository of tactics , laid down the ages by different types of combat scenarios. In order to counter an enemy’s attack we resort to an arrangement of methods known as tactics. We cannot depend on one particular tactic. What we have is a menu. We simply choose which one suits the current tactical/operational environment to inflict a defeat on the enemy. We can never have a surety of which tactic to use in the case of asymmetric warfare , each application is unique. It could be that previously the tactic was used with success in one particular type of combat situation. It could very well be the asymmetric enemy has adapted itself to most of our existing tactics and invented their own newer tactics and here we are caught badly; we have nothing in the menu to choose from. An adaptive enemy can inflict havoc if our doctrine is not flexible. Is tuned to conventional form of warfare. We should remember UNCERTAINTY leads to a lapse in the situational awareness and development of the commander , thus he does not know what to plan , and thereafter what tactics , techniques or procedures he will employ. Doctrine SHOULD focus well on a WARNING system. To envisage and implement a good warning system so as to reduce the critical factor uncertainty and hence eliminate SURPRISE , we need a solid proactive intelligence setup in place with a robust counterintelligence framework.
1.Without a good intelligence setup we cannot fathom enemy's intentions ;hence uncertainty exists.
2.We have intelligence reports about the timing , plan and even existence of an enemy attack but we interpreted so badly that uncertainty still exists as to why the attack happened. Here again intelligence failed. We did get intelligence on plan , timing and on the attack itself but could not collect sufficiently to decipher the strategic intent. Or even the intermediate intent. We defined our intelligence requirements improperly(critical in collection management , given in my book on HUMINT);in fact facing an asymmetric enemy or even the invisible terrorist it is very difficult to judger intent despite the happening of the attack. This is usually not the case in conventional warfare. Where we can make good guess about the OB , conduct an intelligence preparation of the battlefield..conduct aerial reconnaissance , exploit using counterintelligence and intercept radio signals. But in asymmetric warfare , in urban/jungle terrain; all this is very difficult or near impossible.
3.Even the existence of a new weapon by the enemy. Or tactic. creates uncertainty.Ok we have information on this new weapon.Fine.But did we study it closely? Did we log all the attacks made by this new weapon or did we focus only on its particular characteristics which just fits our current tactical requirements? If it’s a new tactic developed by the enemy did we explore to see how often it has been used and to what degree of success? The latter can pinpoint our vulnerabilities to this type of attack. As the potential for asymmetry increases, so does the level of uncertainty and the potential for tactical, operational, and strategic surprise.
These 3 cases demonstrate that despite good collected intelligence there will still be gaps. And in the case of the elusive asymmetric enemy these gaps can be big. And these intelligence GAPS NEED TO BE IDENTIFIED , INTELLIGENCE REQUIREMENTS CAREFULLY DEFINED IN LINE WITH THESE GAPS AND A COLLECTION PROTOCOL DEVISED. Only then we can reduce uncertainty and hence the critical element SURPRISE. There is no playbook of tactical solutions;
Techniques and procedures.
Techniques are the general, detailed methods soldiers and commanders use to perform missions and functions--in particular they are methods how we utilize equipment and employ manpower. Procedures are standard and detailed courses of action to achieve objectives or complete an assigned tasking. Doctrine is built up on the foundation of techniques and procedures--these form the lowest rung. Techniques and procedures are built in the force , integral to the force , are set standards and give uniformity to the overall setup of the security of an installation or information acquisition/dissemination and the security of plans , operations and other activities. If we have to project any changes we keep as baseline the SOPs..The SOPs are the ''technicals'' in war matrix. Techniques and procedures vary with organization , equipment and environment. In brief techniques and procedures set down standards of operating and are instilled by repeated training. The military saying--''Train as you fight and fight as you train'' aptly describes the importance of techniques and procedures. The adage that forces fight as they train is applicable. Armies cannot afford to make everything up as they go. Of necessity we apply existing techniques and procedures against asymmetric opponents, and with some adaptation, they work. In other cases, if there are no existing techniques and procedures, and innovative combinations of existing Techniques and procedures will not work, we develop new techniques and procedures to integrate into existing Ones to solve a unique problem. If it appears the situation that prompted the change might recur, we must tell other forces about the solution so they do not have to learn from bitter experience.
Uncertainty is critically responsible for defeat through surprise and to reduce uncertainty combat forces need to be aggressively adaptive. Combat is adaptive in nature as all military forces adapt to changing tactical , operational environment. No admixture of tactics , techniques and procedures can be used as standard prescription solutions , doing so might result in defeat. Here again I stress on uncertainty--be it conventional warfare or asymmetric warfare. Military drills and OPs need to be continually assessed against current scenarios. Especially so in an asymmetric type of conflict.Techniquers and procedures need to be adapted to the current environment , for this creativity , experimentation , exploration training , dissemination and critical reviews are needed.
Existing doctrine might have the answer to the employment of a tactic by the enemy to ensure their asymmetric advantage. This means that the commander can selectively apply existing tactics to counter that advantage by recognizing some inherent weakness in the enemy. We have a certain weakness the enemy knows and who can capitalize on that. To prevent that we go by selected relative strengths and complementary means to protect that weakness. Say for example the enemy employs a hit and run technique with high mobility in hilly areas and on the plains. As being on foot they can negotiate areas/lanes/passes easily than us who are mounted on vehicles. The enemy here has a clear asymmetric advantage. But come winter the commander got intelligence that they cannot move far from their camps but we can as we are moving in self contained vehicles to counter the winter and adequately armed and protected. Now the commander has an asymmetric advantage. Hence during the winter the enemy does not venture far from their bases so the commander envisages a plan wherein we attack hard right on the enemy camps. As a result they either have to vacate and retreat to safer bases or get killed/captured. So the commander develops an asymmetric approach which the enemy cannot counter. Here we find the solution was standard tactics existing in our doctrine , only what needs to be done is to understand perfectly their weakness vs.-a visa our weaknesses and hence the corresponding asymmetric advantages and disadvantages. The commander need not develop any technology to solve the military problem. The answer is there but available only if the commander can correctly asses the enemy actions. That during winter the enemy is most vulnerable in terms of mobility. The commander MUST EXPLOIT ANY ASYMMETRICAL DISADVANTAGE. OF THE ENEMY , or in other words any asymmetrical advantage he gets his hands on. But the most important thing to note here is even if we realize our asymmetric advantage we must properly tie it to a strategy. Not just employ tactics randomly. We had the asymmetric advantage in winter in terms of mobility. The strategy that worked was to hit them right at their bases .
So on one hand doctrine might not have the answer to a new tactic and again on the other hand our commanders must possess creativity and the ability to take rapid initiative to achieve an asymmetric surprise using standard selective tactics , techniques and procedures against the backdrop of careful assessment of the enemy tactics ;or in other words the commander executes doctrine in newer ways hitherto unexplored. .
Counterinsurgency or for that matter when we write doctrine for any form of asymmetric warfare we must remember we have to adapt to the enemy’s asymmetric capabilities , both potential and actual and configure our asymmetric capabilities in tune of the formers so that when they apply their new tactics they cannot counter our capabilities. True we have a huge repository of tactics by virtue of being a much superior force in terms of all military factors but these are useless if we do not incorporate flexibility and adaptability in our doctrine. This is not the conventional enemy with a predictable order of battle , table of organization and equipment and standard army doctrine. While writing doctrine we must not forget asymmetric warfare leads to second and third order effects which further requires more flexibility and adaptibility.For example in a COIN environment there are more players like local village heads , centers of political influence , corrupt administration officials of the local government , press , social groups and the local inhabitants themselves in the area of operations apart from religious institutions. Any tactical victory ..that is to say victory in first sight can have second and third order repercussions among these environmental variables and these can be negative or positive , they can be capitalized by the enemy , the enemy can extract sympathy from affected villagers or can resort to extensive propaganda highlighting the negative effects of the so called victory on local variables. Second and third order effects can give rise to further exploitation opportunities to both sides.
Characteristics of Effective Doctrine
Effective doctrine in an era of increasing asymmetry must have the following characteristics:
Conventional warfare doctrine projects combat scenarios assuming a symmetric enemy. We retain an edge over the enemy with our superior strength defined by superior capabilities. As long as we have these capabilities we can match any symmetric enemy. What if we are facing an asymmetric enemy which doesn’t stand a chance against our capabilities? What if recognizing this fact they resort to a newer capability whose configuration is so different that our conventional capabilities repository lacks an answer to that capability? We resort to an examination of our capabilities vis-à-vis to their newer capabilities and find we are short of effectiveness , say in one particular capability. We delete it from our repository and unless we cannot design a superior capability an area of vulnerability is created , inviting the enemy to resort to an effective course of action. We must replace that void with a superior capability or we suffer defeat. It could very well be that particular enemy capability is there before our eyes but we failed to assess the efficacy of the capability in the long run. The Japanese lance torpedo inflicted good casualties for quite some time on the US Navy in the Second World War until one day this lack of counter-capability was realized by the Americans and they designed a counter-system. Hence Doctrine must have an operational concept that includes more than high-intensity conventional warfare.
During writing doctrine we must forecast , not predict what is going to happen in the near term or in the long run. We should be able to accurately assess the enemy’s future intent and mind you this is not predictive intelligence , this is forecasting based on collected intelligence inputs. Prediction is different from forecasting. In forecasting we have as premise a database of information which you can say acts more or less like a statistical system on which operations are executed to infer , to forecast. In intelligence parlance we conduct intelligence analysis. Again here we should have a solid collection and asset management system with requirements management in the fore. Properly defined requirements , that is intelligence requirements predicated by intelligence gaps , can save a lot of time and effort and very less wastage of collection assets would result. Also ISR synchronization will be feasible.
In our doctrine we must pull our past successes and failures , current developments , including all available combat information-be it theoretical , historical or empirical so that the database on which forecasting is based can be well understood by our commanders and line soldiers.
In asymmetric warfare we are confronted with an enemy which is quick to adapt , moves unpredictably , has no properly discernible order of battle or movement patterns which are rather very ambiguous , which uses the physical and human terrain very effectively , which resorts to cunningness and deception , which mixes in with the local population and wears no uniform--all these factors present a highly asymmetrical enemy and hence the first and foremost thing we need to incorporate in our doctrine is exactly what are we after , the precise definition of the problem which is facilitated by an intensive study of the physical and human terrain , sending in our HUMINT collectors and agents to conduct a thorough intelligence preparation of the COIN battle space--so very diff from conventional ones--to determine the social , cultural , demographic , political , military , logistical networks and ,physical terrain and other physical factors like safe houses , staging areas,--so that we clearly understand the problem in hand and devise a suitable remedy. We must be adaptive. Highly adaptive--discarding standard intelligence collection ops and resorting more to HUMINT , CI supported where possible by IMINT.Tactical HUMINT teams at platoon level comprised of a mix of HUMINT and CI operatives , one linguist , one psyops agent and one civil affairs /liaison operative can accompany standard R&S Patrols --tactical questioning does not require specialized intelligence training and there will be ample opportunity during recce when you come across civilians , refugees , village heads who can be exploited and valuable information extracted. Hence the bottom-line while writing a doctrine is you need to be adaptive and creative like your enemy and be prepared to innovatively implement newer techniques of intelligence collection. More important is that the entire command should be involved , right from the highest level to troop level. Pushing intelligence capability right down to troop level is a MUST. Every soldier should be a sensor. even infantry men or support services personnel. These are secondary collectors , very very vital for an accurate assessment of the battle space , for building up the situation awareness of the Commander. Only detailing intelligence detachment personnel to support units are NOT enough. THIS POINT SHOULD BE NOTED. In my books elsewhere on this site I have detailed company intelligence support teams structure , platoon level/company level organic intelligence unit , projecting intelligence capability beyond area of operations (as insurgency in the current AO can have second order effects in adjacent areas or it could well happen that the moment current ops are over in a particular AO the commander is ordered to proceed further into unexplored territory and doing so without previously allocating some intelligence resources so as to gain advance info(while ops are currently on in the previous AO) will cause a wastage of critical time as assets will have to be deployed again with reconnaissance and surveillance teams to conduct an intelligence preparation afresh--you just cant barge into unknown territory , particularly a jungle or urban environment where a highly cunning adaptive asymmetric enemy lies in wait.
Doctrine must educate the Army to the fact that military actions often have second- and third order Effects (the law of unintended consequences).Uncertainty and asymmetry compound these unintended consequences. The insurgent force for example may or may not have a match for one particular capability of our much superior deployed military force If it doesn’t then to them we are most asymmetric and hence will be deterred from making attacks. Hence we must reinforce and capitalize on our strengths and apply them in an asymmetric fashion. Doctrine should do exactly this , focusing on our particular strengths and capabilities which may or may not find their equivalent in enemy forces and guiding us to properly apply them in an asymmetric fashion to retain the asymmetric edge over an asymmetric enemy.
Doctrine must include a system able to rapidly reassess current TTP against emerging threats, capture innovative solutions to new tactical problems, and promulgate new TTP to the field, actively and regularly collect lessons learned in the form of new and modified TTP and produce and disseminate reports that capture new TTP. We need to support this effort and improve its already superb ability
Promulgating New Doctrine
If out army is a dominant one , the enemy will resort to more and more asymmetric attacks. We should recognize this and base our Doctrine on exactly this concept. Offensive , Defensive , Stability and Support operations should evolve around the nucleus of asymmetric dimension. In asymmetric environment , it’s a two sided street. In fact tactical combat are the order of the day. we are fighting battles , not wars. The soldier on the ground needs to take the initiative , intelligence capability must be pushed down to him and all technological advancements should be made with the objective to complement his capabilities , not replace them. Conventional ISR platforms should never be solely depended upon , HUMINT should be given top priority along with CI and SIGINT.C2 should emphasis ground level initiative , technical control should be more refined and a must and asset , collection management predicated by sound requirements defibnition.Tactical questioning , secondary collectors , and counterintelligence plugged into modular intelligence support teams should come into existence rather than the standard Det-type support networks. Execution of military operations should be decentralized , more initiative given to lower and middle levels of command , every soldier a sensor , mission command will be successful if all these levels are involved by their commanders exercising a disciplined initiative keeping the the main commanders primary intent in perspective.
We should not only assess the current operational environment by conducting pre and post operation review on standard lines , such as intelligence preparation of the battlefield , battle damage assessments ,successes of psyops , HUMINT and CI successes and failures , but also on the 2nd and 3rd order effects , and tertiary effects like that on contiguous area or near-distant areas where , say , insurgency is in the budding stage and developments here can influence that movement t--for example the insurgents could escape to safe areas there and reinforce while at the same time assist the budding mo0vement , or post battle effects in current AO leads to a psychological effect in the adjacent areas or other areas of interest initiated by political groups , pro-insurgent groups and the like. Doctrine should stress creativity and exploration--the latter can also be manifested by intelligence projection cum R&S Teams , foraying into unknown and untested territory with the intent to aid the commander still busy in ops in current AO in situation awareness and development of the area of interest where orders might come anytime to move in to clear and secure , hence the commander wont have to waste time and effort in intelligence collection and resources wont be wasted .Doctrine should include all military theory of conventional battle operating systems and conduct a thorough review in light of asymmetric conditions to achieve all what has been said so far. Where do we stand right now in terms of Army Doctrine for operations against increasingly asymmetric Opponents?
Uncertainty is the lowest common denominator for Doctrine to be written for current operational theorems and recent operational experiences. Am not saying that we discard earlier doctrinal concepts or expunge them. In fact Doctrine came into existence since the earliest Wars like those during the era of Napoleon Bonaparte and during WW1.Over the centuries combat principles , phenomena have been observed , distilled , compiled and assimilated. Classical theories like battlefield operating systems have also been studied and incorporated. Wars have been won using these doctrinal concepts. But wars have been lost too--like the Japanese Lance torpedo , the sudden advent of the machine gun , tilting an asymmetric advantage in favor of the proponent force or the total lack of technology to clear minefields. A conventional enemy could also get a huge asymmetric advantage by the creation and successful deployment of a capability or weapons system , which springs as a total surprise for our military , has devastating destructive effect and where we have absolutely no defense system. This is where previous existing doctrine fails. We need to continually study and assess our past successes and failures , but most important we need to undertake a critical review of our existing operational and tactical environments , experience and leave room in our doctrine for adaptation to the uncertainty arising out of asymmetric nature of current conflicts as uncertainty leads to intelligence gaps and this gaps if not attended to leads to bad situational awareness of the commander finally leading to the very tenet of victory in war by the enemy--SURPRISE.
Hence we must write doctrine where :
Doctrine must keep uncertainty in the fore , in focus , sharp focus and where applicable may permit usage of prescriptive type of solutions (if absolutely the combat scenario is a template mimicking a previous situation) but should not encourage only such type of solutions but should keep uncertainty as a predicate or in other words , should be prepared to adapt to the most asymmetric type of conflict where standard routine combat templates don’t exist. Everything is fluid , changing , with the element of surprise not only in the beginning of the conflict but can happen again anywhere during the course of conflict. Doctrine should enable exploration , criticism , experimentation , creativity and adaptation. Current TTPs should be creatively applied to newer battle configurations. And there should be room to create entirely new TTPs to confront newer battle conditions.
We must recognize our asymmetric advantages , these may not be recognized as such ..may be misinterpreted as enhanced capability--the term ''asymmetric advantage'' is important here as if we view it from this perspective with all knowledge about nature of asymmetric opponents and warfare , we can then leverage our advantage in a proper manner , asymmetrically. Yes-asymmetrically.
Continual assessment , review and feedback with regard to e existing doctrine are critically important. We must retain successful and useful concepts and discard those which have failed to stand against our enemies or more important those that have been rendered useless by our enemies.
Doctrine should emphasize a new form of leadership training where leaders are tuned to asymmetric conflicts apart from education in conventional warfare. Just like a fresh intelligence graduate from the intelligence officers school who is assigned to a Det takes a long time to be an intelligence professional , thus his throughput being much low during his tenure in the unit till he has imbibed professionalism , similarly commanders who have led conventional operations find it difficult to properly handle asymmetric type combat situations where their experience fails , where they get trapped in intelligence traps wherein previous experience moulds their behavior while taking decisions , planning , setting COAs and issuing intelligence requirements to collection agents. Not only this ,they , due to this intelligence trap ,discard others opinions with the ''I AM RIGHT AS THIS IS THE ONLY WAY OUT , THE SITUATION IS MORE OR LESS SIMILAR TO THAT SO AND SO OPERATION’. Here had he been exposed to an academic programme together with real life simulation or training where asymmetric opponents are the enemy he would have had entirely different perspectives about the conflict. Hence we must not have just an education system but a professional military education system where both conventional and asymmetric types of warfare are dealt with , for enlisted personnel , for commissioned officers and also higher echelon staff and commanders. If we don't do this we cannot do the most important thing about doctrine , promulgating it. It’s not sufficient to write a doctrine after understanding the need to write it anew. It’s much more important to promulgate it in the field and the Army’s educational system. We cannot make every individual study the doctrine , we can have internet and other systems so that soldiers to commanders can access the doctrine but still individual study cannot be 100% nor compliance to that can be ensured--to offset this we can have educational programmes where studies are professionally oriented , leadership courses are so configured so as to churn out professionals who have assimilated thoroughly the new doctrine.
__________________________________________________________________________________________________
Intelligence-Asymmetric Warfare perspective
An efficient intelligence service must conduct planning, deployment and management of collection assets and platforms, execute, control and evaluate the operations with the primary mission to retain a decision advantage over the opponent, both in peace time and during War/LIC.Two main approaches must be embodied: Criminalization Strategy and Prevent disrupt and counter the enemy’s multidimensional intelligence threat. In the first approach the apprehended elements are captured and convicted as per court of law whereas in the second strategy we intend to thwart enemy actions using HUMINT/Counterintelligence. Intelligence feeds into both strategies in four modes of deployment: to make strategic assessments, including of the sources, nature and levels of threat, and the need for new resources or security measures; to feed into criminalization operations in which individuals may ultimately be dealt with through the courts; to feed into control operations such as disruption and surveillance; to feed into control operations which deal with individuals by overt executive measures. These modes are not exclusive to terrorism, save for the final option.
HUMINT is generally considered ‘’passive’’—assets and platforms in the form of HUMINT operatives and governmental/commercial (or official cover/unofficial cover) bases. This is an approach with a fallacy---HUMINT should be proactive, sometimes defensive and not always reactive. A patrol debrief tells us there is a sudden troop movement in named area of interest alpha and so we begin intelligence activity.Thats reactive.Had we deployed HUMINT agents well in advance to look beyond the forward areas by intermingling with the local population on a daily basis, eliciting information, keeping continuous contacts with the sources/informers,liasing with local police, keeping a tab on political developments and open source intelligence like publications,newspapers,media,rallies,public meetings, information gleaned from the internet about enemy govt policies, their arms purchases, their foreign policies with respect to our nation—all these will definitely give the HUMINT agent a feel of the pulse in the area of operations and if there is any ‘’imminent’’ change in it (mind you, I didn’t say any ‘’change’’ in it like the reported deployment) he is bound to catch the new pulse. Before deployment to an area of operations HUMINT and CI personnel should move in first to secure the ‘’human terrain’’ as well as the physical terrain from the intelligence perspective. This is what we can term –‘’intelligence and force projection capability’’ for an area of operations which is unknown to us in all terms. This is frequently the condition when the tactical commander successfully wraps up an operation in a defined AO and then is suddenly ordered to move into a new area much forward and totally unknown and occupied by enemy provocateurs and agents. Had he projected his force and available intelligence assets(after deploying his main assets for current operation and earmarking those available for projection tasking , like HUMIT,CI..) in the new AO while he was conducting his ops in the present AO , he could have been well prepared when the order came in. Here intelligence preparation of the battlefield will focus on both the local populace and the physical environment. The intent is to act as a forewarning system for the to-be deployed troops. This is also a force-protection intiative.Similarly when operations are being conducted in one Area of operations during a larger campaign commander’s pitch in all platforms of intelligence collection systems to accomplish a tactical victory. That is fine and is the standard procedure in the event of a conflict. What the commander doesn’t think is to extend his view beyond the Area of operations far away in hostile territory which is yet to see our troops in action and which is in control of the enemy. We need to project a part of our intelligence collection assets into that area/territory.
Foremost in the analysis of Intelligence tactics/strategies are the following questions: what was the quality of the intelligence; what were the processes in which the intelligence was used and did they put the intelligence to a suitable test?
Security Education and Training
The Indian forces need to be instilled with adequate security awareness and to this end programs and education/training materials and methods should be designed more appropriately/Personnel, installation and information—these three are critical assets and need to be fully secured against multidimensional threat intelligence collection efforts. Security education and training should be inducted in the force with exactly this intent. The focus should be primarily on the multidimensional threat intelligence collection efforts, the espionage threat and overall security threat factors. The soldier’s awareness should be heightened in these fields. The concept of insider-threat should also be a major area of study.Terrorism and insurgency should be dealt with Force Protection in the fore. The basic philosophy (here it is defensive in nature) is to deny unauthorized access to classified information together with personnel, physical, and information security. The design of the training program should take into considerations unique characteristics and requirements of each unit.We should push down intelligence to the boot level--Every Soldier is A Sensor.This is the transformation in current intelligence doctrine.Even the average infantry man can gain intelligence during patrolling , cordon and search ops or during recce/surveillance by tactical questioning.
INTELLIGENCE OPERATIONS
The success of Counterinsurgency operations are predicated by the availability of timely, accurate and specific intelligence about the enemy,its plans and intent and its strength,dispositions,capabilities and TOE.
HUMINT and CI are two disciplines which help in detecting enemy capabilities , intent and countering enemy intelligence collection activities.In a typical Army Intelligence structure , the intelligence assets are located at Div and Bde levels , with the Bde having a HQ company and Intelligence Bn , each Bn catering to a specific collection/counterint discipline. For example there can be an Ops Bn , a reconnaissance Bn , a tactical exploitation Bn,a forward collection Bn ,or a strategic SIGINT Bn.There is also a Div MI Bn and a theater intelligence Bde.
Military intelligence brigades coordinate, manage, and direct intelligence and surveillance; they conduct collection management, all-source intelligence analysis, production; and they disseminate information in support of national, joint, interagency, multi-national, regional combatant command, and Army service component requirements.
I have attempted to create platoon/company level intelligence structures , intelligence support teams , forward projection force with int as enabler--all three with HUMINT and CI assets plugged in.A plug-and-play or modular int capability can achieve desired results in today's unconventional warfare where it is distributed , non-linear.Such teams can also play a major role in a very large operational battlespace.
Intelligence Whatever be the divisions in function or overall structure , HUMINT and CI are indispensable to thwart enemy intelligence activities , to conduct force protection in a optimum manner,to keep our forces combat-ready to deliver precision strikes and to always keep the decision advantage in our favor with the element of surprise by the enemy being put at the minimum.Both disciplines are time intensive and inter-human interactions over prolonged periods have turned the tradecraft into a very specialized skill involving human perception,behavior,psychology and other traits.Unlike other disciplines like SIGINT,IMINT,MASINT,GEOINT HUMINT and CI have in common human sources , the human element and hence is susceptible to error , deception by the enemy , fraught with risks and psychological stress including human vices predicated by money and other factors which are usually the byproduct of information-transactions (quid-pro-quo).But it is exactly these problems which prompts intelligence professionals to come up with newer tactics so as to minimize these negative factors and the resulting exploration and research in the field of HUMINT and CI leads to refined methodologies , TTPs which have been found to be effective in many cases.
ISR assets require the flexibility to detect a wide range of emerging threats. While the ability to detect conventional military threats remains important, the ability to address the asymmetric, non- conventional threat gains importance. Tracking the location and activity and predicting the intent of individual threats is a new challenge at the tactical echelon.
Keshav Mazumdar
29/12/2015
***PROFESSIONAL MILPROFESSIONALITARY EDUCATION