Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
4Activity
0 of .
Results for:
No results containing your search query
P. 1
Asymmetric Warfare Group "Attack the Network" Counterinsurgency Methodology: Part 1

Asymmetric Warfare Group "Attack the Network" Counterinsurgency Methodology: Part 1

Ratings: (0)|Views: 737|Likes:
Published by Impello_Tyrannis
OVERVIEW:
This document facilitates discussion, training and implementation of effective targeting methods at the Battalion and Brigade level. In this paper, the Oil Spot Strategy is discussed as a model for describing insurgent influence. This methodology can enable leaders to better understand the critical links within an insurgent cell and serve as a basis for understanding Attack the Network concepts.
BACKGROUND:
Over the past several months, AWG personnel met with various operations and intelligence professionals who described the continuing challenge of Intelligence Surveillance Reconnaissance (ISR) asset integration and synchronization at the Brigade Combat Team level. This does not mean there have not been major successes in both training and in war. There are Brigade Combat Teams (BCTs) and Battalions (BNs) in Iraq that have modified targeting and analysis functions to Find, Fix, Finish, Exploit and Analyze threats and Disseminate (F3EAD) the information; they pushed intelligence to the lowest level possible and provided accurate, predictive analysis that resulted in the kill or capture of numerous High Value Individuals (HVls). Many times success seems to hinge on the validity of one crucial piece of data-one valuable human source or one Signals Intelligence analyst that is THE Subject Matter Expert. This trend indicates a need for an adaptation of target methodology and its link to collection platforms. Challenges with producing continuous, precise targeting data are further compounded in an asymmetric environment.
OVERVIEW:
This document facilitates discussion, training and implementation of effective targeting methods at the Battalion and Brigade level. In this paper, the Oil Spot Strategy is discussed as a model for describing insurgent influence. This methodology can enable leaders to better understand the critical links within an insurgent cell and serve as a basis for understanding Attack the Network concepts.
BACKGROUND:
Over the past several months, AWG personnel met with various operations and intelligence professionals who described the continuing challenge of Intelligence Surveillance Reconnaissance (ISR) asset integration and synchronization at the Brigade Combat Team level. This does not mean there have not been major successes in both training and in war. There are Brigade Combat Teams (BCTs) and Battalions (BNs) in Iraq that have modified targeting and analysis functions to Find, Fix, Finish, Exploit and Analyze threats and Disseminate (F3EAD) the information; they pushed intelligence to the lowest level possible and provided accurate, predictive analysis that resulted in the kill or capture of numerous High Value Individuals (HVls). Many times success seems to hinge on the validity of one crucial piece of data-one valuable human source or one Signals Intelligence analyst that is THE Subject Matter Expert. This trend indicates a need for an adaptation of target methodology and its link to collection platforms. Challenges with producing continuous, precise targeting data are further compounded in an asymmetric environment.

More info:

Published by: Impello_Tyrannis on Oct 14, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/27/2012

pdf

text

original

 
OVERVIEW:
UNCLASSIFIED
/ /FOR
OFFICIAL
USE
ONLY
MARCH
2009
ATTACK THE NETWORK PART 1:OIL SPOT METHODOLOGYASYMMETRIC WARFARE GROUP
This document facilitates discussion,trainingandimplementationof effective targeting methods at the BattalionandBrigade
le
vel.
In
thispaper,the
Oil
Spot Strategy
is
discussedas amodel for
de
scribing insurgent influence. This methodology can enable leaders to better understand thecriticallinkswith
in
aninsurgent cellandserve
as
a basis for understanding Attack theNetwork concepts.
BACKGROUND:
Over
the past several months,
AWG
personnel metwith variousoperations andintelligenceprofes sionalswhodescribed the continuing challenge of Intelligence Surveillance Reconnaissance
(ISR)
assetintegration and synchronization at the Brigade CombatTeam leve
l.
Th
isdoes not mean there have notbeen major successes
in
bothtrainingand
in
war.There are Brigade Combat Teams(
BCTs
)and Battalions(
BNs
)
in
Iraq that have modified targeting and analysis functions to
Find,
Fix,
Finish,Exploit and
Ana
l
yze
threats and Disseminate(
F3EAD)
the information;they pushed intelligence to the
lo
west levelpossibleandprovided accurate,predictiveanalysis
that
resulted
in
the killorcapture of numerous
High
ValueIndividuals
(HVls).
Manytimes success seemsto hinge onthe
va
lidityofonecrucialpieceof
data-one
valuable human source or oneSignalsIntelligenceanalyst
that
is
THE
Subject Matter Expert.This trendindicates aneedfor
an
adaptation of target methodology and its link to collection platforms. Challenges
wi
thproducing
con
tinuous,precise targeting data are further compounded
in
an asymmetric environment.Current doctrine,focused
on
targeting and
ISR
,ismost effective
in
a
Attacking
a
network
deliberate Military DecisionMakingProcess
(M
DMP
),
but
it
is
moredifficult to
requires leaders
and
achievedesired effects against
an
asymmetricthreatwithout modifying our
analysts
to
understand
analysis,integration and synchronization of intelligence assets. Specifically,
th I·
k
betw
hh
II
buh d·
.d
··
d I h
..
.e
In
een an en-t e c a enge ecomes,ow
0
we
target spec
IC
In
IVI
ua
sw
en
timing
IS
crucial?"Find,
Fix,
Finish, Exploit, Analyze, and Disseminate
(F3EAD)
is an ef-
emy's Critical Capabili-
fective methodology for
the
CounterInsurgency
(COIN)
fight.
The
benefit of
ties, ReqUirements,
and
utilizing
F3EAD
is
that it
refines thetargetingprocess to identify anddefeat
Vulnerabilities,
as
well
specificindividuals. A potential down-side to this approach is focusing criticalcollectionassets
on
targets
that
are at the lowest leveland notfocusing assets as,
indicators
reflectingagainst networks.Theargument can
be
made
that
the defeat ofTier
III
and
that
an
enemy action
lower targets creates only a momentary vacuum
that
will
be
filled
by
other
re-
has occurred.
cruits quickly. A
BCT
must develop a method for attacking
an
entire network to
'--
________
'
be
successful atachieving aBrigade Commander'sintent
on
a mission(e.
g.
neutralize InsurgentX
Spe
cial Groups
in
zone). Attacking a network requiresleadersandanalysts to understand the link between
an
enemy's Critical Capabilities, Requirements,andVulnerabilities,
as
well
as,
indicatorsreflectingthat
an
enemy action has occurred.
The
change required is not drastic.
In
fact, much ofwhat
is
taught
in
Intelligence Preparation ofthe Battlefield
(IPB)
canbe used; units need to focus on non-traditional indicators
at
the lowest possiblelevel.
In
the
COIN
fight, analysts at the
BN
and
BCT
levelhavetounderstandeachthreat'scenterof grav ity,ideology andmethodology. Unitsmustalso identify the most vulnerable, critical nodeswithin a net workfor targeting focus.Thislevelofanalysisisrequiredbefore
ISR
can
be
prioritized and,ultimately,UNCLASSIFIED/ FOR
OFFICIAL
USE
ONLY
 
UNCLASSIFIEDj
FOR
OFFICIAL USE
ONLY
findand fix
HVls
.It
is
notenough todetermine thereare certain enemy key leaders
in
your zone.Leadersand analysts,especially membersof
BCT
and
BN
S2
staff sections, musthavea fundamental understanding
of
enemy capabilities
in
theirarea of operation.This
un
derstandingmust be derived from the enemy's area ofinfluencebecausethethreat often operates overlongdistances and does not compartmentalize op erations based
on
terra
in;
theytakeadvantage of their capabilities and hidetheirvulnerabilities.
INSURGENTINFLUENCEDESCRIBED
THROUGH
THE
OILSPOTMETHOD:
The
Oil
Spot method applied to countering aninsurgencyis nota
ne
wconcept. Commanders are applyingthis method to the
COIN
fight to successfully protect thestrategic center of gravity
in
Iraq:theBaghdad popula tion.
The
primaryintentofPart I
in
this series
is
to
de-
scribehowthe
Oil
SpotMethod canhelpvisualizeinsur gencynetworks.Part
II
will continue thediscussion
by
de-
scribing Center of Gravity Analysis, via the
Dr.
Strangemodel,to understand the parts of a network
that
should
be
targeted at the
BCT
level.Part
III
completestheseries
by
describing effective
COIN
templating and
ISR
techniques.
Oil
Spot
Strategy
-
Counter
InsurgencyApplication
o
A.Ideological
Base
B.
Intermediaries
oooo
C.
Population
An
insurgency works counter tothe efforts of the established government.Insurgentleadersmore than likelycannotdirectly influenceor controlthe population; their ideology may notappealtomostpeo ple theywantto
win
over.
To
ensure their own survivabilit
y,
insurgentleadershave toisolatethemselves fromthe very thing theywantto control, the people (the
COIN
Center of Gravity).
Even
if the insurgentleadershave the popular support of the people they musthavegood Operational Security orriskcompro mise. A fledgling insurgency's first priorityisto protect thetrustedcircle ofhard-core,ideologically focusedleaders.Insurgent leadersare usually categorized
as
an ideological based insurgency and arethe TierI targetsfriendly forces must isolate and neutralizethroughbothlethaland non-lethalmeans.
As
thiscircle oftrustbuilds, the insurgentlead ersfindvetted agents that are outside theinnercircle
(w
ithaccess
to
thegeneral population, butlimited
ac-
cesstokeyleaders
).
These middle-menare called"intermediaries".
The
intermediariesinteractwith theleaders tounderstand their objectives and establishthelinkswith valuable facilitators
wi
thin the population.
Once
thislinkage fromthe ideologicalbaseto thegeneralpopulation isestablished,theinsurgency isreadyto moveto thenext level of influencing the center
of
gravity.
Establishing
the
Ideological Base and Links
to
Intermediaries
A.Id
eo
l
ogica
l
Base
B.
Intermedi
ari
es
o
C.
Popula
tJ
Ofl
'I
ntermedlariesNeeded
to
R
eachGenera
l
Populace
Wh
ile
Reducing
Ri
skof
Compromise
'
UNCLASSIFIEDjjFOR
OFFICIAL
USE ONLY
 
UNCLASSIFIED/
FOR
OFFICIAL
USE
ONLY
Intermediaries, or Tier
II
targets, may adopt theideological beliefs of the insurgent leaders, but theymay
be
motivated byother factors including revenge,money, poorgovernmentleadership/prpgrams and
re-
ligion. Intermediaries are a part of the population, butare susceptibletorecruitment
by
the ideological base.
They
al
so
haveconnectionswithin theircommunities andknowthe potential recrui
ts
for operational cells.
Not applying the
F3EAD
Methodology against
T1er
I
or
lltatgets
can
cause more attention
to
be
paid
10
threat action than capabilities, causing com-
manders
10
focus
on
those who have taken directaction
against
us
rather than
on
thosewhoare morecapable
and
dangerous.
The
targeting aspects of the
F3EAD
Methodologymodifies the
D3A
Methodology based
on
proven Spe-cial Operations Forces'Tactics,TechniquesandProce- dures. A practical applicationof
F3EADis
in personalitytargeting,but
F3EAD
is much morethan that.
F3EAD
should
be
used
as
a commander's tool to visualize andunderstand the terrain, threat,friendlycapabilities and intendedeffects.Not applying the
F3EAD
MethodologyagainstTierI or
II
targets can cause more attention to
be
paid to threataction than capabilities,causingcom- mandersto focus
on
thosewhohave taken directac- tion against
us
rather than
on
thosewhoare more
ca-
pable and dangerous.
As
aresult, targeting focuses
on
Tier
III
targets: individuals normallya part of the centerofgravity
that
both Coalition Forces and the insurgentideologicalbase are fighting forcontrol over.Thecon- sequenceofthistargeting focus
can
include immediate(butshort term)gains
in
security,loss of populace sup-port for other initiatives,andadditional motivation fordisenfranchised personnel to join the insurgency.
To
counterour actions, all the intermediaries have to
do
isrecruit another disaffected person from the population.There is no lasting effect
on
the insurgency.
Reaching Out to the Population/Establishing
Cells
A.I
deo
l
ogic
al
Base
o
o
.I
ntermedia
ries
C.
Pop
u
la
ti
on
A.
B.
C.
"
Inter
me
di
aries
T
rans
la
te
I
deo
l
ogicalMo
tivati
on
s i
nto
Purpos
e"
FIND,FIX,FINISH,EXPLOIT,ANALYZE, DISSEMINATE
-
TargetingofLevelllllndjYidualsandOutcome
"New
Unks
FormedQu
ic
kly/Ce
ll
Capabititles Not SignificantlyImpacted"
UNCLASSIFIED//FOR
OFFICIAL ONLY

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
leatherartist liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->