Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

download Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

of 7

Transcript of Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

  • 8/12/2019 Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

    1/7

    Targeting and Intelligence at the Company

    Level: Lessons Learned from a CoIST in

    AfghanistanBy Christopher G. IngramJournal Article |Jun 18 2013 - 1:30am

    Although the mission in Afghanistan is drawing to a close, lessons learned from this fight will shape

    preparations for future counterinsurgency efforts. This fight is often a small-unit battle, with Company-

    sized elements requiring organic intelligence capabilities to leverage information into tactical success.

    This article seeks to build on experiences operating a Company Intelligence Support Team (CoIST) within

    a Stryker Brigade in southern Afghanistan. Company-internal intelligence-gathering and targeting, along

    with how the company interacts with battalion in this process, is addressed in an attempt to avoid

    mistakes already made, and streamline the efforts of future CoISTs. Given resource and manpower

    constraints within any element, the key to a successful CoIST becomes building the right team and

    developing tailored pre-deployment training. CoISts are at a disadvantage, upon arrival on a

    counterinsurgency battlefield, and need to focus targeting priorities and manage the volume of incoming

    information to provide Commanders and Soldiers with actionable intelligence that will protect Soldiers

    and defeat enemy networks. How to focus those efforts and turn intelligence gathered into disruption

    tactics, as a prelude to clear, hold, build will also be addressed.

    A principle in counterinsurgency is that units, especially at the Company level, must organize themselves

    for intelligence[1]. In counterinsurgency operations, where each Company (and in many cases, Platoons)

    has their own Area of Operations and every Soldier is a sensor[2], the role of Company Intelligence

    Support Team (CoIST) in synchronizing Intelligence, Surveillance, and Reconnaissance (ISR) and

    integrating this with the targeting process is critical to successful effects on the battlefield. The purpose of

    the article is to present lessons learned by a CoIST operating in southern Afghanistan within the paradigm

    of current Army doctrine and manning. Company-internal intelligence gathering and targeting, along with

    how the company interacts with battalion in this process is addressed in an attempt to avoid mistakes

    already made, and streamline the efforts of future CoISTs. My own experiences operating a CoIST within

    a Stryker Brigade in southern Afghanistan form the basis of this article, intended to provide future leaders

    a road map of friction points and best practices. Though the mission in Afghanistan may be drawing to a

    close, the lessons learned from this modern counterinsurgency fight will shape the preparation for future

    conflicts.

    The Right Team

    If effective operations are shaped by timely, specific, and reliable intelligence, gathered and analyzed at

    the lowest possible level,[3]then a successful company requires a CoIST that is properly manned

    properly and trained, capable of critical thinking, and efficient in its execution. Though the Army

    continues to debate providing dedicated CoIST manning in Company headquarters, it is critical to choose

    http://smallwarsjournal.com/author/christopher-g-ingramhttp://smallwarsjournal.com/author/christopher-g-ingram
  • 8/12/2019 Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

    2/7

    the right Soldiers for the job. While the Army recommends six personnel to man the CoIST, enabling 24-

    hour operations[4], we were able to effectively operate with as few as three or four well-trained personnel

    for most of the deployment.

    Manning the CoIST with the right skill-sets requires a trade-off with other elements in the company andbattalion. Some units assign the CoIST to the Fires Support Officer (FSO), while others prefer assigning a

    Maneuver Officer to the role. With FSOs increasingly tasked with non-lethal targeting in

    counterinsurgency conflicts, this choice has the benefit of integrating all of the targeting under the

    responsibility of one individual. Assigning a maneuver platoon leader with the task limits maneuver

    capabilities for the company. In our battalion, the Mobile Gun System Platoon Leader received the

    additional duties of Headquarters Platoon Leader and CoIST Officer, providing a maneuver Lieutenant to

    the Company Command Post to assist in Command and Control and integrate ISR into operations. This

    choice allows the Battalion Commander to put an officer in the position who possesses a solid

    understanding of small-unit tactics. Assigning a junior intelligence officer at the Company-level may not

    be the answer to this dilemma, given the limited experience and understanding of the tactical-level fight

    most intelligence Lieutenants would bring to the table. Until the Army prioritizes CoIST to the point ofproviding additional manning to company-level operations, this will continue to be a costly choice.

    Choosing Soldiers to man the CoIST requires taking intelligent Soldiers with the capacity for critical think

    and analysis from the maneuver platoons to provide their skills to the company as a whole. Additionally,

    though the battalion intelligence shop may be hesitant to provide one of its analysts to each company, this

    decision is consistent with pushing intelligence analysis to the lowest level and is one of the most effective

    ways to provide the battalion with an accurate understanding of each company battle space. The trained

    intelligence analyst provided to our CoIST by the battalion brought technical skills to the company level

    and improved communication with battalion, making him critical to our success on the battlefield. The

    infantry Soldiers assigned to the CoIST had their ability to think critically, operate digital systems, and

    execute projects independently.

    Pre-Deployment Training

    The CoIST officer and analysts received additional training for almost a year prior to deployment on

    intelligence doctrine, systems, and CoIST operations. At this nascent stage in the development of CoISTs,

    the military needs to place additional emphasis on developing doctrine, standardized training, and training

    exercises I order to prepare CoISTs for deployment. Training in targeting, ISR integration, technical

    systems (such as Palantir, TIGR, etc), and information management is critical to an effective CoIST.

    These are perishable skills, which require regular training exercises in the classroom and in the field.

    Developing interactive simulation training that forces CoISTs across the brigade to integrate systems they

    will be using in combat and coordinate horizontally and vertically would be a realistic and invaluable

    exercise.

    The last phase of this training should also provide CoISTs pre-deployment real-time capabilities to

    interact with the CoISTs that they will be relieving in theatre to begin gaining an understanding of their

    future battle-space. The limited look our CoISTs received provided the best insight into the battles ahead.

    By the time we deployed, our Soldiers brought both the understanding of ground warfare tactics,

    techniques, and procedures learned through years of infantry training and a basis for the knowledge of

    how to effectively operate as CoIST. Improved pre-deployment training would facilitate troops hitting the

    ground without a loss of forward momentum.

    Target the Terrain

    When entering unfamiliar terrain on an asymmetric battlefield, it is easier to determine from where you

  • 8/12/2019 Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

    3/7

    are being attacked, than to know precisely who is committing that hostility. In targeting, it is most

    tempting for CoISTs to try to identify the individuals by name and fixate on these individuals as targets.

    Figuring out who is in command and targeting that individual can reap great benefits but takes time. Old

    techniques like terrain analysis to identify likely enemy avenues of approach, chokepoints susceptible to

    IED emplacement, and possible points of origin for small arms fire, can be more effective for CoISTsearly in deployment to a new area of operations. Combining these classic analysis techniques with current

    persistent ISR capabilities and historical data from previous unit SIGACTs can provide CoISTs the ability

    to develop actionable intelligence that is useful a patrol stepping outside the wire.

    In southern Afghanistan, we found that Taliban consistently used well-established ambush positions that

    provided cover and concealment, were within range of likely friendly avenues of approach, and allowed

    for quick exfil. Many of these positions had probably been used for similar harassing fire on the Soviets

    decades prior. Identifying these positions, made possible by sorting through historical SIGACTs and

    targeting them with ISR, was effective, especially when combined with deceptive patrolling techniques

    such as a feint. On numerous occasions, we were able to use dismounted patrols in a feint towards the

    enemy objective to identify their ambush positions and observe their arming of IED positions, allowingfor follow-on exploitation. This could be accomplished with a patrol in conjunction with persistent ISR

    and close combat air, held at a distance until the enemy committed to their fighting positions.

    The previous unit in our area of operations regularly took contact whenever their surveillance aerostat was

    brought down in daylight, often from the same fighting position. Placing additional assets, such as

    snipers, in towers to respond was not effective, and placing mounted patrols outside the wire each time the

    aerostat needed to come down for weather was a drain on resources. By focusing on the point of origin as

    the target, we were able to confirm enemy fighting positions and pattern of life. The fighting position had

    adequate cover that the fighters felt safe from the direction of the combat outpost. By emplacing our own

    ambush position behind the identified fighting positions, using the cover of darkness the previous night,

    our unit lowered the aerostat after daylight, triggering the enemy response, which we successfully engaged.

    Individuals as targets are high payoff but are better to be considered as targets of opportunity than the

    priority. In our experience, terrain was a more effective and certainly a more efficient target. It is

    possible to render key enemy leaders ineffective when by denying IED emplacement locations, fighting

    positions, and lines of communication. Understanding enemy networks and focusing on valuable nodes,

    such as a particularly skilled IED maker, should still be a goal that is attainable as the CoIST becomes

    familiar with the area of operations, but the unit is most vulnerable in the first days in the area or the first

    days of the fighting season, when an effective offense of terrain denial and interdiction can be the best

    defense.

    Manage Information

    Time in sector and use of persistent ISR (aerostats, unmanned aerial vehicles, and fixed cameras on

    outposts, combined with signals intelligence) will allow the CoIST to develop and improve its

    understanding of the battlefield and of enemy patterns of life. Disseminating this intelligence vertically

    and horizontally will facilitate operations and serve as a force multiplier. This knowledge is useless if it is

    not shared with the Soldiers to the lowest level, wasted if it not shared with units in adjoining areas of

    operations, and limited in its potential if not shared with higher headquarters for analysis in the broader

    context with additional assets. While this seems simple in concept, it becomes complicated by multiple

    communication and analysis platforms. The sheer volume of data, from intercepted communications to

    persistent ISR video feeds can be overwhelming to manage and digest, but attention to this pays dividends

    by disseminating the data to levels where the resources to analyze may exist and eliminates the time

    required to retrieve data when needed.

  • 8/12/2019 Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

    4/7

    PowerPoint provides the ability to effectively portray informational graphically, but limits the ability to

    analyze information across multiple events. Additionally, ISR audio and video data is useful for

    dissemination and analysis, but difficult to transmit across platforms with limited bandwidth. Information

    management and dissemination is one of the more daunting challenges a CoIST may encounter. The

    primary audience, Soldiers and Platoon/Company leadership, may best digest information on one platform(maps, videos, or even a whiteboard) while higher headquarters is likely to require information in a

    different format for their products. This is a time-consuming challenge that degrades the ability of the

    CoIST to focus on gathering and analyzing additional information.

    It is critical, at all levels, to develop a seamless system to manage the information of operations and

    intelligence. The debate between Distributed Combat Ground System and Palentir is only one facet of

    this challenge (note: we used Palentir exclusively and found it more-user friendly and effective).

    Communication between all levels of command (from Division to Company) prior to deployment to

    develop standard reporting criteria and information management procedures can minimize the time wasted

    on duplicate efforts in combat that divert the focus of an overwhelmed CoIST. This is an especially acute

    source of friction early in a deployment, when command and control systems are being adjusted andestablished, CoISTS are attempting to understand the enemy situation, and squads are maneuvering in

    unfamiliar terrain.

    Disruption First

    Moving in to our combat outpost, it became immediately clear that we had a large area of operations but a

    much smaller battle space. While our Company area of operations may have extended several kilometers

    from our outpost, the security bubble established by previous units was limited to primary lines of

    communication and less than a few hundred meters from each piece of tactical infrastructure. Doctrinally,

    the key approach to counter-insurgency is clear, hold, build. The primary tasks of the first phase of this

    approach are to provide continuous security for the local populace and eliminate insurgent presence.

    This population-centric denial of strongholds is a key to success, but as doctrine points out, some cases

    may require attacks to disrupt such strongholds, even if counterinsurgents cannot clear and hold the area[5]

    .

    Persistent ISR and indirect capabilities provide friendly forces the ability to affect the battlefield beyond

    that which manning/resources/enemy situation allow for clearance operations. This facilitates disruption

    as a key task to set the conditions for clear, hold, build. Just as the value of clearance is lost when not

    followed by hold and build, disruption alone cannot defeat an insurgency. FM3.90 notes that disruption is

    never an end, it is the means to an end.[6]The integration of indirect fires, used to disrupt an enemys

    operational tempo on the battlefield and reduce enemy capabilities can be critical to setting the conditions

    for follow-on clearance operations.

    Disruption, prior to clear/hold/build, can degrade enemy capabilities, provide valuable information on

    enemy patterns of life, and identify enemy fighting positions/caches/IED hotspots. Disruption integrates

    intelligence, maneuver, and indirect fire assets to interdict enemy lines of communication or IED

    emplacement prior to clearance operations. MAJ John Kennelys article Insurgency Disruption for the

    Warfighter[7]reinforced the tactics our Company employed and refocused our thinking on tactics we

    could use to set the conditions for future operations. In a village within our persistent ISR coverage, local

    Taliban had established a defensive network of over 30 IEDs blocking all likely avenues of approach. A

    clearance operation of the village would have entailed navigating precariously through this belt. However,

    by targeting the terrain, utilizing persistent ISR and calling in indirect fire assets during IED emplacement

    and maintenance activities, we were able, over time, to identify the entire IED belt, degrade the enemys

    ability to maintain these defensive obstacles (IEDs were turned on/off daily to allow local farming), and

  • 8/12/2019 Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

    5/7

    undermine Taliban influence in the area. This village, that the Taliban was intent on holding and used as a

    point of origin for attacks on our combat outpost was effectively marginalized, attacks ceased, and the

    IED belt was negated. The best argument for utilizing disruption effectively to set the conditions for

    clearance operations is the reduced risk to friendly forces on the ground.

    Exploit with Minimal Resources

    Successful operations provide the clues for the first steps in the direction of the next intelligence find or

    operation. Finding an IED or a weapon and destroying it may degrade enemy capability temporarily, but

    exploiting that successful operation to identify the supplier is the role of the CoIST. However, the CoIST

    itself is both unlikely to be at the point of retrieval or have the capability to fully exploit the asset. This

    requires the CoIST to facilitate training Soldiers in the company and its partners in tactical site

    exploitation, and to transport materials to higher headquarters for proper exploitation in a timely manner.

    At the tactical level, taking the time and care necessary to properly exploit evidence is far simpler in

    training than in combat. Additionally, the tactical site exploitation supplies that units are advised to use[8]

    are often cumbersome when combined with all the other counter-IED, communications, medical, andother gear Soldiers are required to carry. Soldiers are already burdened with enough gear. Training in

    tactical site exploitation combined with identifying and minimizing the critical supplies to accomplish this

    task will improve its implementation. Squads are not likely to carry tactical site exploitation backpacks

    with every possible tool for a Hollywood-style crime scene investigation, but they can bag, tag, and

    document a cache sufficient to get the information needed for exploitation with proper training. Soldiers

    already wear gloves and carry a pen, so a pouch with a camera, plastic bags, and note-cards can

    successfully accomplish most tactical site exploitation activities. Combined with a biometric enrollment

    device and chemical detection kit, there is little else that a well-trained squad on the ground will need for

    tactical site exploitation and tactical questioning of suspected insurgents.

    Costly Lesson Shared

    Although the preference would be to claim that this article is based on a flawless record, these lessons are

    not comprehensive and all came at a cost. A comparison of the enemy situation template prior to our

    arrival and upon our transfer of authority to the next unit paints a picture of enviable success. However,

    along that path enemy forces exploited our limited maneuver capability to engage fixed positions, emplace

    IEDs along critical lines of communication, and draw friendly forces into defensive IED belts with small-

    arms fire. As a CoIST, the goal is to avoid those sacrifices by knowing the enemy, predicting their

    activity, and providing friendly forces with the intelligence to guide successful operations. Friendly

    casualties are an emotional jolt to CoIST members who will question if they could have predicted and

    avoided these losses. The answer is probably not; the enemy, regardless of our efforts, will always have a

    vote. However, sharing these lessons learned will hopefully build on the growing understanding of therole intelligence plays at the tactical level, and avoid the friction and mistakes that degrade our

    warfighting capabilities.

    [1]Kilcullen, David, Dr. (LTC) Twenty-Eight Articles: Fundamentals of Company-Level

    Counterinsurgency

    [2]FM 3-21.75 Chapter 8, Every Soldier is a Sensor

    [3]FM3-24

  • 8/12/2019 Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

    6/7

    [4]Center for Army Lessons Learned 10-20: Company Intelligence Support Team Handbook

    [5]Paragraph 5-53, FM 3-24

    [6]Paragraph B-50, FM3.90

    [7]Kennely, John, Insurgency Disruption for the Warfighter, Small Wars Journal, August 2012

    [8]Center for Army Lessons Learned 07-26: Tactical Site Exploitation and Cache Search Operations

    About the Author

    Christopher G. Ingram

    1LT Christopher G. Ingram is an Infantryman. Prior to joining the Army he served

    as a foreign policy advisor in the United States Senate and taught courses in

    international conflict at Louisiana State University, where he is currently writing his

    PhD dissertation. He holds a MA in International Affairs from American University,

    Washington DC, and a BA in International Studies from Troy University, Troy AL.

    Most recently, he served in Maiwand District, Kandahar Afghanistan as a Platoon

    Leader and Company Intelligence Support Team Officer in Bravo Company, 4th

    Battalion 23rdInfantry Regiment, 2ndBrigade 2ndInfantry Division (Stryker

    Brigade Combat Team). The views expressed in this article do not represent the

    views of the Department of Defense.

    Available online at : http://smallwarsjournal.com/jrnl/art/targeting-and-intelligence-at-the-

    company-level-lessons-learned-from-a-coist-in-afghanistan

    Links:

    {1} http://smallwarsjournal.com/author/christopher-g-ingram

    {2} http://smallwarsjournal.com/node/add/article#_ftn1

    {3} http://smallwarsjournal.com/node/add/article#_ftn2

    {4} http://smallwarsjournal.com/node/add/article#_ftn3{5} http://smallwarsjournal.com/node/add/article#_ftn4

    {6} http://smallwarsjournal.com/node/add/article#_ftn5

    {7} http://smallwarsjournal.com/node/add/article#_ftn6

    {8} http://smallwarsjournal.com/node/add/article#_ftn7

    {9} http://smallwarsjournal.com/node/add/article#_ftn8

    {10} http://smallwarsjournal.com/node/add/article#_ftnref1

    {11} http://smallwarsjournal.com/node/add/article#_ftnref2

    {12} http://smallwarsjournal.com/node/add/article#_ftnref3

    {13} http://smallwarsjournal.com/node/add/article#_ftnref4

    {14} http://smallwarsjournal.com/node/add/article#_ftnref5

    {15} http://smallwarsjournal.com/node/add/article#_ftnref6

    {16} http://smallwarsjournal.com/node/add/article#_ftnref7

    http://smallwarsjournal.com/author/christopher-g-ingramhttp://smallwarsjournal.com/jrnl/art/targeting-and-intelligence-at-the-company-level-lessons-learned-from-a-coist-in-afghanistanhttp://smallwarsjournal.com/jrnl/art/targeting-and-intelligence-at-the-company-level-lessons-learned-from-a-coist-in-afghanistanhttp://smallwarsjournal.com/jrnl/art/targeting-and-intelligence-at-the-company-level-lessons-learned-from-a-coist-in-afghanistanhttp://smallwarsjournal.com/jrnl/art/targeting-and-intelligence-at-the-company-level-lessons-learned-from-a-coist-in-afghanistanhttp://smallwarsjournal.com/author/christopher-g-ingramhttp://smallwarsjournal.com/author/christopher-g-ingram
  • 8/12/2019 Targeting and Intelligence at the Company Level- Lessons Learned From a CoIST in Afghanistan

    7/7

    {17} http://smallwarsjournal.com/node/add/article#_ftnref8

    {18} http://smallwarsjournal.com/jrnl/art/afghanistan-lessons-learned-from-an-isaf-perspective

    Copyright 2014, Small Wars Foundation.

    Select uses allowed by Creative Commons BY-NC-SA 3.0 license per our Terms of Use.

    Please help us support the Small Wars Community.

    http://smallwarsjournal.com/content/terms-of-usehttp://smallwarsjournal.com/node/6350http://smallwarsjournal.com/node/6350http://smallwarsjournal.com/content/terms-of-usehttp://creativecommons.org/licenses/by-nc-sa/3.0/