New Tactics for a New Enemy By John C. Decker

Similar documents
Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob

Rapid Reaction Technology Office. Rapid Reaction Technology Office. Overview and Objectives. Mr. Benjamin Riley. Director, (RRTO)

Shadow 200 TUAV Schoolhouse Training

DETENTION OPERATIONS IN A COUNTERINSURGENCY

THE GUARDIA CIVIL AND ETA

Improving ROTC Accessions for Military Intelligence

United States Military Casualty Statistics: Operation Iraqi Freedom and Operation Enduring Freedom

The first EHCC to be deployed to Afghanistan in support

The Fully-Burdened Cost of Waste in Contingency Operations

AFCEA TECHNET LAND FORCES EAST

Military to Civilian Conversion: Where Effectiveness Meets Efficiency

ASAP-X, Automated Safety Assessment Protocol - Explosives. Mark Peterson Department of Defense Explosives Safety Board

Opportunities to Streamline DOD s Milestone Review Process

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

Dynamic Training Environments of the Future

Biometrics in US Army Accessions Command

Improving the Quality of Patient Care Utilizing Tracer Methodology

DDESB Seminar Explosives Safety Training

Perspectives on the Analysis M&S Community

Mission Assurance Analysis Protocol (MAAP)

Independent Auditor's Report on the Attestation of the Existence, Completeness, and Rights of the Department of the Navy's Aircraft

Panel 12 - Issues In Outsourcing Reuben S. Pitts III, NSWCDL

Contemporary Issues Paper EWS Submitted by K. D. Stevenson to

White Space and Other Emerging Issues. Conservation Conference 23 August 2004 Savannah, Georgia

USMC Identity Operations Strategy. Major Frank Sanchez, USMC HQ PP&O

Social Science Research on Sensitive Topics and the Exemptions. Caroline Miner

Cerberus Partnership with Industry. Distribution authorized to Public Release

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan

Office of Inspector General Department of Defense FY 2012 FY 2017 Strategic Plan

Representability of METT-TC Factors in JC3IEDM

Intelligence, Information Operations, and Information Assurance

Afloat Electromagnetic Spectrum Operations Program (AESOP) Spectrum Management Challenges for the 21st Century

Battle Captain Revisited. Contemporary Issues Paper Submitted by Captain T. E. Mahar to Major S. D. Griffin, CG 11 December 2005

The Security Plan: Effectively Teaching How To Write One

Office of the Assistant Secretary of Defense (Homeland Defense and Americas Security Affairs)

The Coalition Warfare Program (CWP) OUSD(AT&L)/International Cooperation

MAKING IT HAPPEN: TRAINING MECHANIZED INFANTRY COMPANIES

Required PME for Promotion to Captain in the Infantry EWS Contemporary Issue Paper Submitted by Captain MC Danner to Major CJ Bronzi, CG 12 19

Fiscal Year 2011 Department of Homeland Security Assistance to States and Localities

Report Documentation Page

Determining and Developing TCM-Live Future Training Requirements. COL Jeffrey Hill TCM-Live Fort Eustis, VA June 2010

712CD. Phone: Fax: Comparison of combat casualty statistics among US Armed Forces during OEF/OIF

DOD Native American Regional Consultations in the Southeastern United States. John Cordray NAVFAC, Southern Division Charleston, SC

Integrity Assessment of E1-E3 Sailors at Naval Submarine School: FY2007 FY2011

Tim Haithcoat Deputy Director Center for Geospatial Intelligence Director Geographic Resources Center / MSDIS

Defense Health Care Issues and Data

For the Period June 1, 2014 to June 30, 2014 Submitted: 15 July 2014

Test and Evaluation of Highly Complex Systems

Language Training in MIBOLC. By 2LT Lauren Merkel. If all our soldiers spoke Arabic we could have resolved Iraq in two years.

Defense Acquisition Review Journal

US Coast Guard Corrosion Program Office

Army Modeling and Simulation Past, Present and Future Executive Forum for Modeling and Simulation

Munitions Response Site Prioritization Protocol (MRSPP) Online Training Overview. Environmental, Energy, and Sustainability Symposium Wednesday, 6 May

terns Planning and E ik DeBolt ~nts Softwar~ RS) DMSMS Plan Buildt! August 2011 SYSPARS

AUTOMATIC IDENTIFICATION TECHNOLOGY

Wildland Fire Assistance

Operational Energy: ENERGY FOR THE WARFIGHTER

Air Education and Training Command

Integrated Comprehensive Planning for Range Sustainability

The Landscape of the DoD Civilian Workforce

Lessons Learned From Product Manager (PM) Infantry Combat Vehicle (ICV) Using Soldier Evaluation in the Design Phase

IMPROVING SPACE TRAINING

Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance

SSgt, What LAR did you serve with? Submitted by Capt Mark C. Brown CG #15. Majors Dixon and Duryea EWS 2005

ALLEGED MISCONDUCT: GENERAL T. MICHAEL MOSELEY FORMER CHIEF OF STAFF, U.S. AIR FORCE

Military Health System Conference. Putting it All Together: The DoD/VA Integrated Mental Health Strategy (IMHS)

Joint Committee on Tactical Shelters Bi-Annual Meeting with Industry & Exhibition. November 3, 2009

Laboratory Accreditation Bureau (L-A-B)

CRS prepared this memorandum for distribution to more than one congressional office.

Infections Complicating the Care of Combat Casualties during Operations Iraqi Freedom and Enduring Freedom

Software Intensive Acquisition Programs: Productivity and Policy

711 HPW COUNTERPROLIFERATION BRANCH

Unexploded Ordnance Safety on Ranges a Draft DoD Instruction

DoD Countermine and Improvised Explosive Device Defeat Systems Contracts for the Vehicle Optics Sensor System

Issue Paper. Environmental Security Cooperation USARPAC s: Defense Environmental and International Cooperation (DEIC) Conference

AMC s Fleet Management Initiative (FMI) SFC Michael Holcomb

In 2007, the United States Army Reserve completed its

Product Manager Force Sustainment Systems

The Shake and Bake Noncommissioned Officer. By the early-1960's, the United States Army was again engaged in conflict, now in

Concept Development & Experimentation. COM as Shooter Operational Planning using C2 for Confronting and Collaborating.

The Need for a Common Aviation Command and Control System in the Marine Air Command and Control System. Captain Michael Ahlstrom

Army Aviation and Missile Command (AMCOM) Corrosion Program Update. Steven F. Carr Corrosion Program Manager

Information Technology

Report No. DODIG December 5, TRICARE Managed Care Support Contractor Program Integrity Units Met Contract Requirements

Afghanistan Casualties: Military Forces and Civilians

Where Have You Gone MTO? Captain Brian M. Bell CG #7 LTC D. Major

U.S. Military Casualty Statistics: Operation New Dawn, Operation Iraqi Freedom, and Operation Enduring Freedom

United States Army Aviation Technology Center of Excellence (ATCoE) NASA/Army Systems and Software Engineering Forum

MILITARY MUNITIONS RULE (MR) and DoD EXPLOSIVES SAFETY BOARD (DDESB)

Streamlining U.S. Army Military Installation Map (MIM) Production

The Advantages of Commercial Satellites versus Military Satellites. Captain Thomas J. Heller

National Continuity Policy: A Brief Overview

The Army Executes New Network Modernization Strategy

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

Electronic Attack/GPS EA Process

DOING BUSINESS WITH THE OFFICE OF NAVAL RESEARCH. Ms. Vera M. Carroll Acquisition Branch Head ONR BD 251

Chief of Staff, United States Army, before the House Committee on Armed Services, Subcommittee on Readiness, 113th Cong., 2nd sess., April 10, 2014.

Developmental Test and Evaluation Is Back

The Marine Corps Physical Fitness Test: The Need to Replace it with a Combat Fitness Test EWS Contemporary Issue Paper Submitted by Captain E. M.

ASNE Combat Systems Symposium. Balancing Capability and Capacity

Transcription:

Over the last century American law enforcement has a successful track record of investigating, arresting and severely degrading the capabilities of organized crime. These same techniques should be adopted by the military when targeting asymmetrical New Tactics for a New Enemy insurgents and terrorist organizations. Other outside the box thinking has Figure 1 Alleged Gambino family member apprehended in a multiagency sweep of 87 suspects in early 2008, severely disrupting the Gambino's family activities. (Robert Stolarik for The New York Times) been successfully employed in Iraq such as taking censuses, utilizing BATS (biometric automated toolset systems) to successfully identify correct individuals, using anthropologists to help define human terrain, and using multimillion dollar systems to jam garage door remotes as a counter-ied measure. These all demonstrate that we have to be ingenious and open to ideas from all sectors of society to counter and defeat our enemies. The main benefit of using law enforcement tactics, training and procedures (TTP s) would be more focused intelligence collection techniques on individuals and organizations and better training of soldiers on what types of Figure 2 Human terrain mapping, overlapping ethnic and tribal regions of standard political map (Naval Postgraduate School, Kunar province, www.nps.edu/programs/ccs/kunar.html) tactical questions (TQ s) to ask, and sensitive site preservation. This would 1 Page

Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 2008 4. TITLE AND SUBTITLE New Tactics for a New Enemy 2. REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) University of Military Intelligence,Fort Huachuca,Sierra Vista,AZ,85613 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 11. SPONSOR/MONITOR S REPORT NUMBER(S) 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Same as Report (SAR) 18. NUMBER OF PAGES 5 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

New Tactics for a New Enemy also have added benefits by decreasing the antagonism created by detaining the wrong individuals, increase the Iraqi Judicial conviction rate, and decrease the number of individuals captured but later released due to a lack of evidence. By DoD definition terrorism as The calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. i And the FBI defines organized crime activities as the use of actual or threatened violence, corrupt public officials, graft, or extortion, and generally have a significant impact on the people in their locales, region, or the country as a whole. ii Because of the similarities in structure, and actions between organized crime, insurgents, and terrorist organizations, it is a simple transition to transfer TTP s of the law enforcement community to the intelligence collection and targeting process. The TTP s that would have the largest return on investment on the every soldier as a sensor category would focus on tactical questioning during raids and at traffic control points (TCP s) and preservation of raid sites for exploitation of sensitive materials, documents, and electronics. Whereas the S2 section would focus on more detective-like tasks such as exploiting and assess sensitive materials, background investigations on person s and events, and building evidence and linking individuals to groups and groups to events. The training for this would be done on independent timelines as needed by different units, but would focus on working with and learning the TTP s from the law enforcement community. The difficulty with this detective-based training would be integrating it into an already tight training schedule while maintaining all the standard competences and tool training the Army already has in place for this type of mission such as Analyst Notebook, Pathfinder and pattern analysis. Additionally, the S2 s will need further training on working with ES2 s, the field sensors in the Global War on Terror (GWOT). In order to provide the new training, some element of the current curriculum will be forfeited. The argument 2 Page

New Tactics for a New Enemy for this forfeiture being that right now the GWOT, and asymmetrical warfare fighting, are the most likely situations our forces will find themselves in over the next 10-15 years iii. As such, more emphasis should be placed on successful methods to combat this warfare, instead of training focused on force-on-force conventional warfare tactics. As a specific example, my unit, a CSSB BN in the ARNG, would spend one weekend a quarter learning the TTP s from a local law enforcement agency. This course would be approximately 3 hours. The drill following the course would have a 2-3 hour session on reviewing and practicing the previous drills TTP s and giving a short presentation as needed to our soldiers for ES2 training. The 3 rd drill in a given quarter would spend 2-3 hours working on a joint scenario with the line soldiers to practice the S2 and ES2 TTP s seamlessly. The following quarters would pursue a similar pattern with a culmination event working with the local law enforcement so they can monitor and give feedback on the application of the TTP s taught. A one quarter training example for drill weekends (1 day being for soldiering skills, 1 day being for section specific training) is given below to demonstrate how this training could be fit into a standard training plan: 3 Page

Dates NOV- XX DEC-XX METL Task(s) Provide Command and Control (63-1- 4045), & Provide Tactical or Operational Logistics Support Provide Command and Control (63-1- 4045), & Provide Tactical or Operational Logistics Support Provide Command and Control (63-1- 4045) (U), & Provide Tactical or Operational Logistics Support (U) Collective Task Perform Intelligence Preparation of the Battlefield (IPB) (20-7- 1010) Perform Intelligence Preparation of the Battlefield (IPB) (20-7- 1010) Provide Intel Support to Deployment (34-6-2049) New Tactics for a New Enemy Individual Task (if applicable) Notes Trainer Comments Reference Develop an Incident Overlay (TN: 301-96B-1160/ REF: STP 34-96B16-) Develop Demographic and Population Overlay (TN: 301-96B-1159/ REF: STP 34-96B16-) Develop a Situation Template (TN: 301-96B-1153/ REF: Securing a site for SSE and forensics/historical search for similar events (MO) Assist in the Development of Intelligence Preperation of the Battlefield (IPB) Products (TN: 301-96b- 1350/ REF: STP 34-96B16-) Write an Analytical Paper (TN: 301-96B- 2451/ REF: STP 34-96B16-) Securing a site for SSE and forensics/historical search for similar events (MO) Report Intelligence Information (TN: 301-371-1000/ REF: STP 21-1-SMCT) Integrate Threat Capabilities into Mission planning (TN: 159-200-2020/ REF: STP 21-24-SMCT Securing a site for SSE and forensics/historical search for similar events (MO) IPB SGT XXX 1.5 hours IPB LT XXX 1.5 hours IPB SGT XXX 2 hours Law enforcment TTP's Local law enforcment 3 hours IPB SGT XXX 2 hours Analytical Thinking S2 practice and presentatio n to line CO's Law enforcment TTP's. Scenario with line CO's LT XXX LT XXX SGT XXX SGT XXX between drills and 3 hours for presentations 3 hours (2 hours practice, 1 hour instruction to CO's) 2 hours 2 hours STP 21-24- SMCT/ STP 34-96B15- STP 21-24- SMCT/ STP 34-96B15- Rehearsal Date SEP-XX SEP-XX SEP-XX NOV-XX NOV-XX SGT XXX 2 hours NOV-XX To continue to successfully pursue this war, we must be as adaptive and ingenious as our foe and modify our strengths so the enemy cannot negate them. By borrowing TTP s from the law enforcement community we can streamline our targeting and associated intelligence collection efforts, we can be more precise in whom we target and, thus, decrease negative attributes such as wrongful detention, or catch and release situations. Adding additional training into an already over packed training schedule will cause challenges. However, due to the likelihood of similar operations continuing for the next decade and beyond, a new approach should be emphasized over more traditional intelligence training. 1LT John Chris Decker is the S2 in the 158 th CSSB. He enlisted in the Army in 2003, followed by ROTC in 2004-2006 while attending graduate school, and has recently completed his BOLC courses. He is 4 Page

New Tactics for a New Enemy a graduate of Arizona State University s Ira Fulton School of Engineering with a Masters Degree in Material Science Engineering. 1LT Decker is a full time employee with Intel Corporation as a Process Engineer as his civilian career. i Department of Defense definition of terrorism, Joint Pub 1-02, Department of Defense Dictionary of Military and Associated Terms, 12 April 2001 ii Federal Bureau of Investigation definition of Organized Crime, http://www.fbi.gov/hq/cid/orgcrime/glossary.htm iii US Army TRADOC, MIBOLC III course material/instructions 5 Page