NEWS CLIPPINGS:
Kashmir attacks: Indian troops killed
INCIDENT
1 : Security forces in Indian-administered Kashmir say they have shot
dead three men who stormed a police station and an army camp, killing
at least 10 people. The gunmen were wearing Indian army uniforms when
the attacked the station in Kathua district and the base in Samba
district, said police.
Kashmir has seen an armed insurgency against Indian rule since 1989.
Indian Prime Minister Manmohan Singh described the attack as barbaric, but said it would not derail peace efforts.
He is due to meet his Pakistani counterpart, Nawaz Sharif, on the sidelines of the UN General Assembly this week.
Peace
talks between the two countries have been stalled for the past two
years, and dialogue is expected to ease recent tensions along the Line
of Control that divides Kashmir between the two countries.
India has a large security presence in Kashmir with tens of thousands of police and paramilitary forces deployed in the region.
On Thursday morning the attackers, dressed in army uniforms, arrived at a police station in Hiranagar in Kathua and opened fire.
Four policemen and two civilians were killed in the attack, police said.
The militants then hijacked a truck and fled, senior Kashmir police official Rajesh Kumar told Reuters news agency.
"They
abandoned the truck on the national highway and perhaps took another
vehicle and carried out an attack on the army camp in Samba," he said.
“Militants
early this morning attacked the Mesar camp of 82 armored regiment in
Samba district. They are using grenades and automatic gunfire to carry
out the attack. Most likely, two militants are involved in the attack,”
a senior police officer told IANS.
The Army camp houses 82 armored
regiment which comes under the command of Army's 9th Corps that is
headquartered in Yule Camp (Dharmshala) in Himachal Pradesh.
The
same camp was also attacked on September 26, 2013 by militants after
they had attacked the Hiranagar police station in Kathua district.
Twelve people had been killed in that attack.
Today's militant
attack came on the morning of the start of the nine-day Navratri
festival, and on a day when Muslims are celebrating Nowruz, or the
Persian New Year, in the state.
Just yesterday, six people including
two militants were killed in a similar attack on the Rajbagh police
station in Kathua district. Intelligence reports had indicated that
four militants were involved in Friday's attack, but only two had been
killed.
Intelligence sources said that they believe the Saturday's
attack is being carried out by the two guerrillas who survived in
yesterday's attack after escaping from the spot.
REPITITION? The
Mesar camp was also attacked on September 26, 2013 by militants after
they had attacked the Hiranagar police station in Kathua district.
Twelve people had been killed in that attack. On Friday, six people
including two militants were killed in a similar attack on the Rajbagh
police station in Kathua district.
INCIDENT 2 : Jammu: A civilian
and three security personnel were killed on Friday when two
heavily-armed militants stormed a police station in Jammu and Kashmir
before being gunned down, police said.
The attackers were killed
over seven hours after they barged into the Rajbagh police station
complex in Kathua district after gunning down the lone guard at the
main gate, police officials said.
Armed with automatic weapons and
grenades, the militants, dressed in military fatigue, carried out the
sudden attack at around 6 a.m.
Once the attackers sneaked into the
complex, about 65 km from Jammu on the highway to Pathankot and just 15
km from the Pakistan border, they opened fire at a building occupied by
the Central Reserve Police Force (CRPF), killing two of its men.
A
civilian was also killed but it was not clear in what circumstances.
Ten others, almost all of them security personnel, suffered varying
injuries in the audacious attack.
Inspector General of Police Danish
Rana announced the death of the two militants. The others dead were a
policeman, two CRPF personnel and a civilian.
The injured included seven CRPF men, a deputy superintendent of police, a police constable and a civilian, Rana added.
INCIDENT
3 : 300 rebels initially attacked a convoy of the paramilitary Central
Reserve Police Force (CRPF) in the Talmetla area as they were returning
from an operation. India's home minister P Chidambaram said that it
appeared that the forces had "walked" into a rebel ambush by returning
to the police base via the same route they had come. "Something has
gone very wrong. They seem to have walked into a trap set by the
[Maoists] and casualties are quite high," he said. Police sources
reported that the Maoists triggered two land mines targeting the mine
protected vehicles carrying the jawans. The attack took place when the
CRPF unit belonging to the 62 Battalion entered the forest for an
operation between 6 and 7 am and were ambushed by the Maoists.
The Threat.
The
threat, the adversary must be known as much as possible for successful
CI operations. A thorough analysis of threat and its capabilities is
very necessary. The adversary conducts multidimensional intelligence
activities and its doctrine dictates that to be successful it should be
aggressive, conducting its reconnaissance operations actively and
continuously under every set of conditions and that continuity,
timeliness and accuracy is essential
Adversary may use HUMINT,
IMINT, SIGINT AND OTHER INTELLIGENCE DISCIPLINES operated through a
variety of collection platforms and to counter this tactical or
strategic threat, as the case may be, we must have a comprehensive CI
program in place. The adversary uses multisensor collection means to
offset our attempts of countermeasure and deception.
The foreign
intelligence service conducts intelligence collection about our forces
and hostile attack. Herein comes the very important concept of force
protection. They target defense personnel , resources , activities and
critical information.CI support to force protection involves actions to
prevent or mitigate hostile actions against these entities.It should be
noted that the military police functions are not adequate to cover the
security of these entities –CI support is a must.In a deployable
situation the enemy targets the vulnerable rear positions and the
support elements.Hence security is beefed up where troops are housed ,
dependants and other personnel are made aware of the threat—this is
where the CI elements are active..
The military police and allied
elements take stock of the situation in the army area but are less
aware of the ground situation ‘’outside the fence’’.Hence recourse is
made to establish contact with civil intelligence agencies and local
police for updates on any threat intelligence in the proximity of the
base. Moreover the military police have no jurisdiction outside the
base. Strengthening the physical defenses is one way to prevent the
application of hostile intent but what is more important is enemy
pre-operational surveillance activities. But the difficulty is that
these activities are innocuous.
Let’s take an example to illustrate
the point. A vehicle approaches the gate of a military camp. On being
questioned by the guard on duty the driver says he had no intention to
turn up there—he had made a wrong turn. Now this is an acceptable
excuse and further interrogation may not help. The driver is instructed
to leave the area.Fine.It is equally possible he is saying the truth.
But consider the situation where the the threat index in the area is
high and hence from the force protection perspective the driver who can
equally well be a insurgent has just conducted successfully a
preoperational surveillance. There are options. The license details of
the driver can be jotted down. The car details and license plate number
can be taken. Offhand queries can be made. A listing can be made of all
‘’lost motorists’’. The information can be shared with the local
police. If it is found out the same driver has turned up at other
installations with the same story , well we have a case of
pre-operational surveillance and with the jotted information in hand
steps can be taken. But still the case is rare as there are several
instances of genuine lost motorists.
Whatever any installation
together with its constituent personnel , their dependants , operations
and information is susceptible to hostile attack and intelligence
collection.CI elements must shield the installation from such intent by
guarding the rear and vulnerable areas.CI should lend support to
mobilization security , major records repositories , anti and
counterinsurgency operations , rear operations , psychological
operations , battlefield deception , operations security and CSIGINT.
We
can categorize the threats based on intent. This can be incorporated in
the force protection doctrine. Hence we can allocate HUMINT resources
in an appropriate manner without any duplication or wastage. Type 1 can
be criminal activity geared towards army bases ,Type 2 can be
penetrative reconnaissance and sabotage operations , and Type 3 can be
major land , amphibious , air and missile attacks. Thus commanders can
tailor defensive actions compatible with the type of attack. Mission of
CI can be clearly defined , objectives stated and
qualitative/quantitative protocols in collection efforts underscored.
Keeping each type of attack in perspective and with the notion of CI as
‘’looking inwards’’ in mind we can identify the critical areas of
installations, and implement security measures. At the same time we can
launch aggressive CI operations to frustrate enemy intelligence
collection efforts.
It is true that a multidisciplinary intelligence
approach is effective to thwart enemy collection efforts but CI and
force security measures play key roles. To neutralize/destroy enemy
intent we need CI to the fullest capacity. Other intelligence
disciplines can be cued but CI is top priority. To identify our
vulnerabilities we must resort to counterintelligence. Intelligence is
looking outward but CI is looking inward. Intelligence collection is
not concerned with the end result but counterintelligence is concerned
with the ‘’intent’’ of collection.CI should always be on an aggressive
footing. We need a comprehensive CI doctrine detailing all of these and
more.
We should bear in mind that this era is not exclusively the
era of conventional combat. Asymmetric warfare is the order of the day.
Insurgents take years to plan an operation. They conduct extensive
pre-operation surveillance , they have their own counterintelligence
networks and this long period justifies the employment of intelligence
and CI .
The CI department should tackle the type 1 , 2 and 3
threats.CI cells should come into existence and should be staffed with
HUMINT , SIGINT and IMINT elements. Priority should be on analysis of
threat intelligence.MI should be particularly in charge of analysis of
Type 3 threats.Elements from Special task forces , explosive ordnance
disposal, medical , operations and communications should also staff the
CI cells. The CI elements should fortify their collection and
investigation capabilities. They should maintain a threat database
which will include the structure and capabilities of foreign
intelligence services , details of insurgent organizations and timeline
of attacks perpetrated by them and also criminal enterprises because it
is well established that insurgents and criminals share information and
resources. This database should be continually updated. The
intelligence information contained in this database should be readily
available on request. Included in this database should be latest
physical security measures , details of explosive ordnance effects—all
contributed by specialists. All source intelligence should be further
fused in with the intelligence contained in the database.
The CI
analytical cell should not only produce daily threat summaries but also
act as and I&W system. It should receive worldwide inputs of
insurgent developments as well as national cases. It should interface
with civil intelligence agencies through liaison methodology thus
updating threat information. The unit CI cells should be extrapolated
to the creation of similar cells at all major commands which will focus
on the respective area of responsibilities. These cells would produce
threat and vulnerability assessments.
In addition to these functions
these CI cells should be ready to be deployed to support major exercise
and contingency deployments.
These CI cells will facilitate the
formulation of the commander’s information requirements as the
dissemination of intelligence products to the latter will heighten his
perception of the situation , also these cells can communicate two ways
with the collectors on the ground from parallel intelligence units thus
achieving coordination between different intelligence disciplines.
Investigative leads and operational opportunities result from all these
efforts.
The Army Head Office (AHO) exercises technical control, review, coordination and oversight of CI
Controlled
activities. a. Will execute a system of review of CI activities ,
ensure compliance and proper accounting. Will have direct control over
an investigation, task the CI elements , provide guidance to
operational and investigative CI activities and if necessary refer the
CI activity to a sub-office. But the Head office assumes full and
direct control. Monitor the management of case files and other records
storage and retrieval system , processing of these and transfer to the
repository , maintaining the quality assurance of of investigative
reports, monitor source ops and CE projects, ensure liaison activities
with other agencies are properly conducted with optimum exchange of
information and dissemination of information falling under their
purview in a timely manner and approve or disapprove CI case summaries.
In summary the AHO
∙Provides technical support to all CI assets and coordinates and deconflicts CI activities in the deployed AO
∙Coordinates and supervises CI investigations and collection activities conducted by all services and components in the AOIR.
∙Establishes and maintains the theater CI source database.
∙Coordinates with the HOC (see HUMINT section) for CI support to detention, interrogation, refugee, and other facilities.
∙Manages requirements and taskings for CI collectors in the AO in coordination with the HOC.
∙Expedites preparation of .CI reports and their distribution to consumers at all levels.
∙Coordinates CI activities with senior CI officers from all CI organizations on the battlefield.
∙Performs liaison with national level CI organizations.
The
Sub offices will coordinate technical direction and tasking from the
head office , monitor all CI activities within its area of operation
and provide feedback to the head office , conduct CI investigations
tasked to it by the head office , and also those that it assumes worth
taking up , excepting those investigations directly controlled by the
head office , ensure proper dissemination to end users as well as the
head office and ensure the accuracy , compliance with CI policy of all
CI reporting. Briefing commanders and intelligence officials.Liasing
with external agencies and disseminating information to them that falls
under their purview.
We need to have a force protection intelligence
doctrine,strengthen it,define the role of MI in force protection
efforts and priotize collection and analysis of intelligence on force
protection threats.We need a robust HUMINT capability supported by
CI—the optimum integration of both is the need of the hour.We have the
LU , CI and IFSU but still we lack a viable HUMINT mission.Whatever
HUMINT we have is afforded by these units directly or indirectly and we
must use this to the fullest potential to counter force protection
threats.To improve the HUMINT capabilities MI should assign additional
resources.Duplication resulting from the efforts of the MI constituents
need to be removed and the respective roles clarified.Duplication
creates confusion and wastage of resources.We must have a comprehensive
CI doctrine.The CI units should be staffed with more personnel , both
in major cities/foreign areas and in collection activities.Analysis of
force protection intelligence should be properly delegated to CI cells
and to this end CI Analytical cells should be dispersed at Army
Headquarters and major commands
DEFENSIVE CONSIDERATIONS IN COIN
PROTECTION
Protection
is the maintaining the effectiveness and survivability of military
installations, camps, personnel, equipment, information/communication
systems and other facilities located within the area of operations in
any COIN mission. In case of COIN the protection concept is different
than that of a conventional force protection scenario in that the
element of the protection of the local populace/communities inhabiting
the AO is also taken into account. Now if this element is granted due
protection, is secured from the insurgents psychological ops and
transactional overtures(seeking safe houses, staging areas in the local
area, taking pseudonyms or as family members to deceive the forces
against a false or ideologically goaded sense of protection for the
community members or any other assumed social benefit not accorded by
the government) then in turn the security forces gain allies who will
feed intelligence about the enemy and information pertaining to
military security thus enhancing the security of the tactical units and
installations itself.
TECHNIQUE CONSIDERATIONS DURING COUNTERINSURGENCIES
Insurgents
resort to lethal and nonlethal attacks against groups of soldiers, unit
commanders and civilians. Lethal attacks include killing and IED
whereas non-lethal attacks are kidnapping and ransom, subversion or
psychological/intimidation/threats. To thwart such attacks and deter
the enemy the following basic site-protection operations may be
included as foundation steps in the overall unit protection program.
Observation
Post: An OP is inadequately capable of protecting any vital asset of
the unit using combat power but it can observe any enemy visual action
and alert combat support immediately. It should be capable of defending
itself and must have a communications backup/night vision devices and
long range binoculars.
Stationary posts and static bases: Each post/base must take into consideration following factors before being assembled:
Critical asset dimensions Threat severity
Nearest reserve troops in terms of the time to inform them and the distance.
Keeping
these into consideration a detachment/s occupies the post/base, full
time and equipped with night vision devices and surveillance equipment.
It’s a very good idea to include mobile surveillance teams to keep an
eye in the area in close proximity of the base perimeter.
Patrols:
a)Foot
patrols: Both critical and low priority assets may be covered by foot
patrols but usually low priority assets are allocated for protection.
Foot patrols are susceptible to ambush and hence patrol timings must be
random. This also helps in maintaining the element of surprise. Patrols
must be well armed to defend themselves and have the necessary
communication facility toi call for support if the need arises. The
support team should be locally positioned and not far away.
b)Vehicle patrols: All the above apply equally to vehicle patrols.
c)Aerial
patrols: Inaccessible areas can be kept under routine patrolling
surveillance. Here they supplement foot and vehicle patrols in that
they offer an extension in the coverage area. It can so happen that
critical assets are positioned long distances away in terrain
unsuitable for foot/vehicular patrolling.
RANDOM ANTITERRORISM MEASURES
It
is very likely that the enemy keeps our forces and installation under
surveillance. Their priority is to discern the overall security plan.
Hence to throw them off track we must introduce a random element
whenever possible. This also helps us to spring a surprise on the
enemy. The main criterion here is to alter the security posture from
time to time thus defeating the enemy’s surveillance attempts. The
enemy through surveillance attempts to know our possible
actions,intent,order of battle,dispositions,etc.True surveillance is
not strictly an intelligence activity on the part of the enemy but it
is an enabler of intelligence. Hence we should tackle enemy
surveillance on an equal footing with our intelligence and
counterintelligence efforts. Just like we use deception in
counterintelligence based defensive and offensive activities.
Similarly we must use randomness to thwart enemy surveillance efforts.
•Vehicular barriers to route traffic around base.
•Random security patrols
•Floodlights should operate at random times.
•Guard duty shifts must be practiced at random times.
•Changing access time for entry points.
•Access procedures/passwords must be changed at random.
•Searching personnel must be randomized—the method that is.
•Maintaining random observation of surrounding areas utilizing unmanned systems if available/remote systems.
Armor Protection
We
can increase the quantum of protection considerably by vehicle and
personnel armor. But it must be kept in mind armor weight reduces the
mobility of both the vehicle and soldier—in the case of the latter his
maneuverability and endurance gets affected adversely..In addition
heavy armor wears engine parts of the vehicles. But it is true that
insurgent attacks become very much ineffective on armor shielded
vehicles and personnel.
Hardening
Hardening is intended to defeat
or negate /deter an attack. Hardening makes it very difficult for
insurgents to carry out attacks.
Study the terrain carefully and see
to it that natural obstacles can be emplaced to deter the movements of
the insurgents. Naturally available materials can be used to protect
personnel,
equipment and facilities. Physical protection can be
effected using sandbags, walls, shields, concrete barriers. Proper
selection should be made in keeping with nature of attacks: Blast,
indirect/direct fires, heat, and radiation. Electronic warfare demands
a different set of materials/systems.
COUNTERINSURGENCY BASES
COIN
forces must have a base from which to operate and also project. Bases
are secure areas from which the COIN objective is to isolate the
insurgents from the support facilities and protect the local
populace/communities. The base must be carefully selected, reinforced
and rendered fully defendable. Command relationships should be clearly
defined. Bases can be of 3 types: Forward operating bases, Combat
outposts, and Patrol bases. The nature of the mission and size of the
unit (Company etc) determines the size and location of the base.
FORWARD OPERATING BASES
Sometimes
the nature of operations, the terrain, the size of the AO as well as
the size of the units necessitate a separate forward placed operating
base for the Battalion which itself commands controls, communicates and
supports deployed units. It provides intelligence support, sustainment,
replenishment and personnel support as well as functions also as
staging area. Each area of operation may have one forward base. A
forward operating base acts as a secure location for the planners and
command staff so as to plan operations, provides security to the local
populace and acts as a deterrent for the insurgents nearby by hampering
their mobility and subjecting them to an increased threat. We can have
both Brigade FOBs and Battalion Fobs. In the case of Bde FOBs they act
as rear areas for Bn Companies which are forwardly deployed. FOBs
should maintain either secured road/water or air sustainment capability.
COMBAT OUTPOSTS
Observation
posts are reinforced with fire power and combat teams and hence take
the shape of a combat outpost. They are positioned at strategic points
inside insurgent-0dominated areas , are company or platoon sized,
possess the ability to conduct combat operations on a limited scale and
are in contact with base headquarters as well as horizontally with
other combat outposts , in effect networking both horizontally and
vertically so as to:
Cut of insurgent logistical lines
Provide security to the local populace in the immediate neighborhood of the COP
Maintain direct contact with the local populace and hence keep an eye on the activities / strangers
These
are not possible from remote bases operating from outside insurgent
dominated areas. The negative factors in this type of arrangement are
increased risk to the soldiers and limited area of
operations ,
nevertheless proper networking among the combat outposts helps greatly
in keeping a grip on the insurgency and the kill ratio as well as
protecting the populace. It is very important to plan the position of
the outpost, the emplacement, complete with secure logistical lines,
communication systems and reinforcement capability. Each COP is
assigned a sector of the AO.
Outposts may be employed—
•To secure key lines of communication or infrastructure.
•To secure and co-opt the local populace.
•To gather intelligence.
•To assist the government in restoring essential services.
•To force insurgents to operate elsewhere.
Priorities of Work
Certain factors need to be considered while establishing combat outposts.
∙The selected area must be free of noncombatants , civilians and the like.
∙To
hinder the enemy’s movement , obstacles to his entry to streets ,
underground passages,marked areas in rough/jungle terrain should be
emplaced.
∙Carefully choose positions to set up weapons to cover likely avenues of approach.
∙Clearing fields of fire
∙Cover and camnouflage.
∙Obstacles/barriers may be integrated with weapons so as to be auto-triggered.
∙There should be easy access between positions and the routes must not hinder speed.
PATROL BASES
Patrol bases are secured areas which serve as long period halting points for patrols. They may be permanent or temporary.
1.Sometimes
it is important for patrols to remain hidden or halt all operations as
information is received that they are liable to be detected.
2.Again
detailed study of an area requires long periods of reconnaissance so
they need a place to hide,and then later launch recce ops.
3.After
long periods of recce operations,the troops get exhausted and hence
retire to a patrol base for food,sleep or rest,weapons/equipment
maintenance
4.After detailed reconnaissance the patrol commander needs to sit down with his senior NCOs and devise future course of action.
5.In
cases when the patrol is in enemy area after infiltrating the area,in
small groups , they set up temporary patrol bases where they can later
meet and regroup and make further plans.
6.Finally a patrol base is a good launching pad for consecutive or concurrent operations such as
7.raids,reconnaissance,surveillance and ambush.
Purposes
In counterinsurgency operations, collocating patrol bases in population centers enables combined forces—
•To deny the insurgent access to the local population.
•To influence and assist the local government.
•To provide security.
Methods of Establishment
The same priorities of work described for combat outposts apply also to patrol bases:
• Move in with the indigenous population. The advantages are that Soldiers
will have more direct contact with the local administration, the locals will identify the forces with the government.
The
disadvantages insurgent sympathizers from among the masses may inform
insurgents about patrol movements with relative ease, attacks on the
base will have collateral damage effects, and houses cannot be really
hardened against attacks..
• Build a new patrol base. Although more
isolated from the population, new patrol bases are usually on chosen
ground and, therefore, easier to defend. Additionally, they are far
more resource and personnel intensive during construction. It is
generally advisable to set aside detailed planning time before sending
a combined force to occupy the terrain.
PLANNING CONSIDERATIONS FOR A BASE DEFENSE
TERRAIN
Key terrain factors to consider include the following:
∙
The terrains may add to defense by virtue of its natural
characteristics.Hence conduct a thorough study of the terrain.To
enhance its natural defensive characteristics more utilize artificial
obstacles/barriers.
∙ The patrol bases must have all access routes
to it , by road or waterways , under control.The same applies for all
lines of supply and communication and civilian access.
The best technique for base defense is the perimeter defense.
RSTA AND ISR OPERATIONS
Intelligence
drives operations and vice versa. In effect the enemy situation drives
operations. For the enemy situation to drive operations we must have
perfect intelligence about the enemy. To this end Reconnaissance ,
Surveillance and Target Acquisition should work hand in hand with ISR
SO AS TO ACHIEVE PERFECT SYNCHRONIZATION in the deployment and
operation of sensors, assets and processing, exploitation and
dissemination of intelligence.RSTA/ISR should focus on the priority
intelligence requirements.Recconnaisance and Surveillance confirm or
deny threat actrivities,plans,courses of action which were gauged by
the Commander and his staff during planning , war gaming and sessions
with the collection manager and counterintelligence specialists.By
focusing RSTA/ISR on the commanders needs, his critical and priority
intelligence requirements we can deploy and use RSTA/ISR sensors and
assets in the most optimum fashion , totally integrated and
synchronized resulting in timely and accurate information, combat
information and intelligence to be disseminated to the targeting
platforms.
Every operation is initiated as per plan and this
planning has certain decision points.RSTA/ISR should take these
critical decision points in perspective , primary perspective and focus
all collection platforms and assets on these points and see to it that
al information linked to these decision points are gathered , nothing
left out and disseminated in time to the commander. Again for this
synchronization is essential. Targeting requires proper detection of
the target and evaluation of its importance. Further there should be
sufficient reason to nominate the target to the attack platforms. To
this end synchronized RSTA/ISR operations collect all possible
information about the target and pass it on for evaluation and
thereafter if the target satisfies the criteria for nomination the
intelligence on the target is passed on to the targeting platform.
After an attack on the target, kinetic/nonkinetic attack or
exploitation operations, RSTA/ISR is required to assess the
effectiveness of the attack.
DETECT
HPTs need to be detected and
located accurately in order to engage them and here is where all assets
available to the Commander must be used to maximum efficiency.HPTs are
critical nodes in the insurgent network.Engaging and destroying them
successfully can render the mission of the insurgent group unsuccessful.
The
priority intelligence requirements associated with the HPT should be
carefully defined and resources allocated accordingly to get
intelligence on the target. As time goes on and collection assets bring
in information in line with the priority intelligence requirements the
situation development for the commanders needs is more accurate and
continuously updated. Detect the HPT involves tracking him as movement
is a factor. Detecting involves assets like HUMINT source,
an
anonymous tip, UAS, a combat patrol, SIGINT, DOMEX, rotary wing
aircraft, military working dog teams. The best means of detecting a
target during an insurgency is HUMINT, such, the detect activity
requires a detailed understanding of social networks, insurgent
networks, insurgent actions, and the community’s attitude toward the
counterinsurgent forces. For a target that must be engaged by nonlethal
means, the detect function may require patrols to conduct
reconnaissance of a leader’s home to determine if they are there, an assessment of a potential project, or attendance at a greeting to meet with a leader.