Memetic Warfare The Future of War PDF
Memetic Warfare The Future of War PDF
Memetic Warfare The Future of War PDF
This issue features two articles by Colonel Franz, Chief, Information Dominance Center (IDC), ISAF and
Lieutenants Colonel Pendall and Steffen on how the International Security Assistance Command has
implemented an information–sharing architecture to create a comprehensive common operating picture
across the Afghan theater. The IDC is the most decisive information and knowledge management effort
ever executed in Afghanistan with a focus on governance and development, key aspects that most impact
the daily lives of Afghans.
Colonel Cox presents the case for a new intelligence discipline, Document Exploitation or DOMEX. He
presents the historical context and follows through to today’s operations with comments and recommen-
dations. Major Harris and Captain Bronson describe lessons learned and observations from the deploy-
ment of the first active duty Maneuver Enhancement Brigade to Afghanistan with the mission to manage
terrain and C2 operations. Major Assadourian discusses a holistic approach to developing security met-
rics. First Lieutenant Hancock explores the emerging field of Memetics and implications for memetic op-
erations in the military environment. Claudia Baisini and James Nyce make a case for the inclusion of
Experiential Learning techniques in traditional military training to meet the challenges of fighting in non-
traditional operating environments. Chief Warrant Officer Two Negron discusses the capabilities of the
Tactical Exploitation System-Forward for use in a Communications Intelligence function. Vee Herrington,
USAICoE’s Chief of the U.S. Army’s MI Library at Fort Huachuca, describes an ongoing experiment to in-
corporate eReaders into training.
Readers will also find articles on the 2010 MI Hall of Fame inductees and the 2010 recipient of the LTG
Weinstein Award within the issue. As the Doctrine reengineering efforts continue, we offer a focus article
on the recently released FM 2-0, Intelligence.
In an effort to catch up, the October December 2009 issue is now the July September 2010 issue. That
means there will be no October December 2009 issue. You will find all of the articles and information
scheduled for that issue in the July September 2010 issue. As the Editor, I apologize for any inconvenience
to both the writers and readers of MIPB. If you have any questions regarding this please email to MIPB@
conus.army.mil.
Mark your calendars: The 2010 Intelligence Warfighters Summit—The Critical Enabler for Full
Spectrum Operations is scheduled for 6 through 10 December at Fort Huachuca.
Sterilla A. Smith
Editor
MILITARY INTELLIGENCE
PB 34-10-2 Volume 36 Number 2 April - June 2010
Commanding General
Major General John M. Custer III
Deputy to the Commanding General FEATURES
Mr. Jerry V. Proctor
Deputy Commander for Training 11 Command’s Information Dominance Center Fuels Comprehensive
Colonel Dennis A. Perkins Operations
Acting Director, Directorate of Doctrine
by Colonel George J. Franz, Lieutenant Colonel David W. Pendall, and
Mr. Stephen B. Leeder Lieutenant Colonel Jeffery D. Steffen
15 Host Nation Information Requirements: Achieving Unity of Understanding
in COIN
by Colonel George J. Franz, Lieutenant Colonel David W. Pendall, and
Lieutenant Colonel Jeffery D. Steffen
22 DOMEX: The Birth of a New Intelligence Discipline
MIPB Staff:
by Colonel Joesph M. Cox
Editor 33 Tactically Tailoring the Maneuver Enhancement Brigade
Sterilla A. Smith
by Major Marilyn Harris and Captain Carolyn Bronson
Design Director
37 Security Metrics in COIN: Effects Based Analysis
Patrick N. Franklin
by Major Charles Assadourian
Design and Layout
41 Memetic Warfare: The Future of War
Patrick N. Franklin
Lawrence Boyd by First Lieutenant Brian J. Hancock
Cover Design
47 Lethal Theory: Some Implications
Lawrence Boyd by Claudia Baisini and James M. Nyce
62 eReader Technology as USAICoE
Inside Back Cover
by Vee Herrington, PhD and Captain Ryan Gerner
Patrick N. Franklin
65 TES SIGINT: A Conventional Warfare ELINT System Supporting an
Issue Photographs
Courtesy of the U.S. Army Unconventional COMINT Fight
by Chief Warrant Officer Two Raul Negron, Jr.
Currently, the intelligence warfighting function in- will compete with some growing economies for
cludes a formidable set of capabilities across all technical advantage.
echelons from “mud-to-space.” This flexible force ÊÊ By 2020, organized crime is likely to thrive in
of personnel, organizations, and equipment collec- resource-rich states now experiencing political
tively provides commanders with the timely, rele- and economic transformation.
vant, accurate, predictive, and tailored intelligence ÊÊ By 2025, urban growth will concentrate in
they need. We provide the intelligence that continu- coastal areas. The majority of urban populations
ously supports the commander in visualizing the op- will live within 60 miles of coastlines.
erational environment (OE), assessing the situation, ÊÊ By 2030, the world’s urban population will be
and directing military actions through intelligence, over 4.9 billion fostering:
surveillance, and reconnaissance synchronization ÊÊ Interdependent economies.
and the other intelligence tasks. ÊÊ The interaction of differing societies and
The intelligence warfighting function is comprised cultures.
of nine powerful intelligence disciplines. Eight of ÊÊ More powerful non-state actors.
those disciplines essentially feed the discipline of ÊÊ Porous international boundaries.
all-source intelligence which in turn is focused on ÊÊ The inability of some nation-states to fully
the commanders’ requirements. Technological ad- control their territory, economy, and to pro-
vances have enabled single-discipline analysts to vide security and services.
leverage other analysts and information and to con- ÊÊ By 2030, competition for access to and control of
duct multi-discipline analysis to an extent not pos- natural resources (energy, water, and food) will
sible in the past. However, all-source intelligence is dramatically increase areas of potential conflict.
still the nexus that integrates information and in- ÊÊ “…Cyber security risks pose some of the most se-
telligence from all units and the other intelligence rious economic and national security challenges
disciplines. of the 21st Century” according to the Presidential
Future OEs will be greatly impacted by globaliza- Cyberspace Policy Review, May 2009.
tion. “Globalization and growing economic interde- The Joint Operational Environment 2010 observes
pendence, while creating new levels of wealth and that, “with very little investment, and cloaked in a
opportunity, also create a web of interrelated vul- veil of anonymity, our adversaries will inevitably at-
nerabilities and spreads risk even further, increas- tempt to harm our national interests. Cyberspace
ing sensitivity to crises and shocks around the globe will become a main front in both irregular and tradi-
and generating more uncertainty regarding their tional conflicts. Enemies in cyberspace will include
speed and effect” according to the National Defense both states and non-states and will range from the
Strategy, June 2008. unsophisticated amateur to highly trained profes-
Key aspects of globalization include— sional hackers. Through cyberspace, enemies will
ÊÊ Non-state groups, organized crime, and cultural target industry, academia, government, as well as
and environmental change will stress already the military in the air, land, maritime, and space
fragile social and political structures. domains.”
ÊÊ American science and technology communities, In future OEs as U.S. forces conduct increasingly
both commercial and Department of Defense, complex operations, Army intelligence will con-
(Continued on page 4)
2 Military Intelligence
CSM Forum
Command Sergeant Major Gerardus Wykoff
Command Sergeant Major
U.S. Army Intelligence Center and Fort Huachuca
Currently, the U.S. is in an era of persistent global completed a 15 month deployment to Iraq on
conflict. It is a new era where our warfighters have to December 2008 and is now preparing for another
think outside the box to understand and defeat our deployment in support of Operation Enduring
enemies of today. MI Soldiers must learn and adapt Freedom. One of the many success stories for the
the intelligence disciplines to support the warfighter 319th and 519th MI Battalions is Operation Defeat
in countering these threats to our Nation. Al Qaeda in the North; an operation employing
the gamut of intelligence sensors such as Human
I will be retiring in June 2010 after 26 years of
Intelligence (HUMINT), Counterintelligence (CI), Aerial
service to the U.S. Army and the Army Intelligence
Surveillance, Long Range Surveillance, and many
Corps and I would like to use this last opportu-
more.
nity to recount some of the MI success stories I
have witnessed and to remind MI Soldiers about Another BFSB that has astounded me is the 504th
their heritage. MI personnel have been a part of out of Fort Hood, Texas. The 504th BFSB has come
the Army since its founding in 1775, but it wasn’t a long way since its first unit designation as the
until July 1962 that a number of intelligence and 137th Signal Radio Intelligence Company (Aviation)
security organizations were combined to form this during World War II. Today, the 504th has a Network
branch of service. On 1 July 1987, the MI Corps Support Company, a Forward Support Company,
was activated as a regiment under the U.S. Army and a Long Range Surveillance Troop which fur-
regimental system. Currently, most of the Corps ther help our intelligence efforts across the globe.
falls under the U.S. Army Intelligence and Security
Command (INSCOM). INSCOM had originally been Let us not forget our MI efforts in South and
formed to meet the intelligence needs of the Cold Central America, led mainly by the 470th MI
War. However, by adapting and tailoring its multi- Brigade. With its aerial exploitation, interroga-
discipline capabilities, the command had success- tion, and electronic warfare battalions, the 470th
fully positioned itself for the 21st century and is MI Brigade continues to fight the good fight for
now prepared to confront an increasingly diverse U.S. Army Southern Command in countries such
world threat and the new menaces posed by terror- as Colombia, Honduras, and Argentina.
ism, weapons proliferation, and cyber war. I could continue to name all the MI units that
Throughout my time as the MI Corps Command bring the U.S. Army success, but I want to men-
Sergeant Major, I visited many MI units from tion the one MI brigade whose battalions strive to
around the world to observe training and opera- the fullest to create the Intelligence professionals
tions. With each visit, I noted great successes of for today and the future–the 111 th MI Brigade. The
our Corps. In the process, I have also noted areas 111 th continues to successfully shape and mold
where those units could improve. I’ve taken these our HUMINT and CI Soldiers, our Intelligence
notes back to the Intelligence Center of Excellence Analysts, our Imagery Analysts, and our Signals
here in Fort Huachuca, Arizona to better improve Intelligence Soldiers, our Intelligence officers
the training we provide to new Soldiers of the and warrant officers, and the newest addition to
Corps. the Fort Huachuca School house–the MOS 09L
Linguists.
During my travels I have seen the greatness
that there is in units such as the 525th Battlefield We should all understand that we are a nation in
Surveillance Brigade (BFSB) which successfully multiple conflicts and the mission to handle each
(Continued on page 5)
4 Military Intelligence
of these conflicts will always entail intelligence re- “Quiet Professionals” will always prevail in times
quirements. Every day, these intelligence require- need. Before I close, I want to remind you all of the
ments need to be fulfilled by strong-willed Soldiers creed that defines the Intelligence professional:
who extract, analyze, and report information in or-
der to help combat commanders make timely deci-
sions, save lives, and neutralize enemy threats to
their missions and their Soldiers. I am a Soldier first
but an Intelligence Professional
One point I have always tried to make with many
second to none.
of the units I have visited is that Army Intelligence
is not just fighting our wars and battles in foreign With pride in my heritage,
lands, but from our own soil as well. As you are but focused on the future.
reading this, a CI Soldier is working to keep our Performing the first task of an Army
nation safe by protecting our intelligence informa-
tion; an Imagery Analyst is receiving aerial imagery To find, know, and never lose the enemy.
from different battle fronts and analyzing the im-
ages to provide intelligence products. Bottom line With a sense of urgency and of tenacity,
up front–an MI Soldiers does not need to have a Professional and physical fitness,
combat patch to show that he or she is taking part
in the fight. And above all:
Integrity–for in truth lies victory.
I want to thank all of the Soldiers of our beloved
MI Corps. Without your efforts, our Armed Forces Always at silent war while ready for a shooting
would be blind in battle. Although the U.S. Military war; the silent warrior of the Army team.
is in a struggle for the long-haul on several different
fronts around the world, your professionalism and
dedication as MI Soldiers has always and will always Soldiers of the MI Corps, thank you for your ex-
keep our ground commanders one more step ahead cellent service to the Army and the United States
of our foes. I am proud to know that this Corps of of America.
Army Strong!
FM 2-0 Intelligence (March 2010), the Army’s keystone manual for Military Intelligence (MI), introduces
several major changes to intelligence doctrine.
Recent lessons learned from various operational
environments (OE), extensive transformational
changes in MI structure, and major revisions
in Joint and other Army doctrine dictated revi-
sions to this FM.
The Army’s operational concept is full spec-
trum operations within diverse OEs requir-
ing continuous, simultaneous combinations
of offensive, defensive, and stability or civil
support operations. Intelligence facilitates
understanding of portions of the operational
and mission variables (i.e., enemy, terrain
and weather, and civil considerations) to sup-
port the commander in decisionmaking pro-
cess to achieve success on the battlefield. The
most important role of intelligence is to drive
operations by supporting the commander’s
Relationship between the Operations and Intelligence Processes
decisionmaking.
6 Military Intelligence
on answering the commander’s requirements and enable the quick retasking of units and assets as the
situation changes.
For intelligence purposes, there are three types of requirements that result from ISR synchronization–
PIRs, intelligence requirements,
and information requirements.
Each requirement is broken
down into discrete pieces to an-
swer that requirement. These
pieces are referred to as indi-
cators and specific information
requirements (SIRs), which fa-
cilitate the answering of the re-
quirements. The indicators and
SIRs are used by ISR planners
to develop the ISR plan. The il-
lustration (right) shows the pro-
cess of developing requirements
and integrating them into the
ISR process.
Requirements development and integration into the ISR process
8 Military Intelligence
support the commander’s situational understand-
ing. The illustration (right) exemplifies the tactical
portion of the Army intelligence enterprise.
As an emerging capability, the Distributed
Common Ground Station-Army (DCGS-A) provides
a net-centric, enterprised ISR, weather, geospatial
engineering, and space operations capability to or-
ganizations of all types, at all echelons—from battal-
ion to joint task force levels. DCGS-A will be the ISR
component of the modular and future force Battle
Command System and the Army’s primary system
for ISR tasking, posting, processing, and conducting
analysis concerning the threat, terrain and weather,
and civil considerations at all echelons.
DCGS-A core functions are:
ÊÊ Receipt and processing of selected ISR sensor
data.
ÊÊ Control of selected Army sensor systems.
ÊÊ Facilitation of ISR synchronization.
ÊÊ Facilitation of ISR integration.
ÊÊ Fusion of sensor information. Example of the tactical portion of the Army intelligence enterprise
ÊÊ Direction and distribution of relevant threat information and intelligence.
ÊÊ Facilitation of the distribution of friendly and environmental (weather and terrain) information.
Other New Concepts and Emerging Capabilities
Biometrics Enabled Intelligence is the intelligence information associated with biometrics data that
matches a specific person or unknown identity to a place, activity, device, component, or weapon that sup-
ports terrorist or insurgent networks and related pattern analysis; facilitates high-value individual target-
ing; reveals movement patterns, and confirms identities (DODD 8521).
Commanders require the ability to link identity information to a given individual. Biometric systems are
employed to deny threat forces freedom of movement within the populace and to positively identify known
threats. These systems collect biometric data and combine them with contextual data to produce an elec-
tronic dossier on the individual.
The ability to positively identify and place an individual within a relevant context adds a level of certainty
that significantly enhances the overall effectiveness of the mission. Personal identification enabled by bio-
metric technology can help identify and locate specific individuals in support of targeting. This capability is
necessary for force protection and security missions as well as when an operational capability is required
to achieve an advantage in all operational themes and across the spectrum of conflict.
Human Terrain Analysis Teams assist with socio-cultural research and analysis. As part of build-
ing their situational understanding, commanders consider how culture (both their own and others within
the AO) affects operations. Culture is examined as part of the mission variable-civil considerations.
Understanding the culture of a particular society or group within a society significantly improves the
force’s ability to accomplish the mission.
Document and Media Exploitation (DOMEX) is the systematic extraction of information from all media in re-
sponse to commander’s collection requirements. When conducted properly, DOMEX operations are intended to:
ÊÊ Maximize the value of intelligence gained from captured enemy documents.
ÊÊ Provide the commander with timely and relevant intelligence to effectively enhance awareness of the
enemy’s capabilities, operational structures, and intent.
10 Military Intelligence
April - June 2010 11
12 Military Intelligence
April - June 2010 13
14 Military Intelligence
Host Nation Information Requirements:
Achieving Unity of Understanding in COIN
The opinions contained are those of the authors and do not reflect the views of NATO, the U.S. Department of
Defense or the U.S. Army.
Reprinted from Small Wars Journal, posted 15 January 2010 at http://smallwarsjournal.com/blog/journal/
docs-temp/348-franz.pdf.
Introduction
Understanding the complex operational environ- tion requirements (CCIR). More than just asking
ment (OE) in Afghanistan means seeing the local the right questions, the ISAF and Afghan operat-
conditions and activities and how they affect peo- ing forces along with civilian partners in the field,
ple’s lives. If the Government of the Islamic Republic must understand what the answers are that will
of Afghanistan (GIRoA) and NATO’s International drive resources and prioritization, providing bet-
Security Assistance Force-Afghanistan (ISAF) are ter insight into the real issues and perceptions at
truly focused on gaining the support of the peo- local levels. The IJC has created a reporting sys-
ple, we must better understand the lens through tem and fusion process to bring this information
which the people are watching our efforts play out to the command in a timely, accurate and com-
and we must know what may drive them away prehensive way.
from supporting the government. This means un- The Need for HNIR, Why Now?
derstanding not only the nature of the threats to Things have gotten worse for the Afghan people
security posed by negative influences, insurgents, since 2005. Despite significant financial and secu-
and terrorists but also the aspects of Governance rity contributions of the international community
and Development that most impact their daily lives. and from the Afghan people, in terms of dollars,
Host Nation Information Requirements (HNIR) is a time and lives, many areas of Afghanistan are now
category of reporting on these critical factors affect- less secure and less governed. The reasons are
ing the people in Afghanistan. likely two-fold: a strategy that embraced counter-
More important than the structure of government, insurgency (COIN) concepts but failed to apply it at
people are most concerned about the extension of the operational and local levels, and a near-absence
governmental services and the ability for their na- of synchronicity coupled with disunity of effort
tional and local officials to deliver basic necessities among ISAF, the International Community and the
and support for a functioning community–to include Government of Afghanistan, to include the Afghan
security. But the OE in Afghanistan is much more security ministries. These two root problems have
complex, nuanced and dynamic than just answering been identified by informed and not-so informed ob-
the question of satisfactory governance–rendering a servers. The inability to adjust course has been sty-
basic collection of facts, polling data, anecdotal ref- mied by inertia to change, organizational culture,
erences and statistics insufficient for true under- complacency, in some cases apathy and greed; and
standing within the partnered commands. perhaps most importantly, an inability to develop,
The ISAF Joint Command (IJC) instituted a bot- see, share, and understand information falling out-
tom up, inclusive information system to answer side traditional information spheres.
key information gaps and assist ISAF and Afghan The current doctrinal approach to CCIR in a COIN
Partners with clear commander critical informa- environment is insufficient to address the key el-
16 Military Intelligence
level decisions. Indeed, the IJC must advocate the The intelligence function is an important compo-
local commander’s district-level awareness across nent in answering the HNIR but the preponderance
the spectrum of operations into the decisionmak- of information will come from unclassified contrib-
ing processes of military, governmental, nongov- utors. The information is available in a variety of
ernmental, and civilian organizations. Only then reporting processes or can be readily obtained by
will the Regional Commands and subordinate el- overt means, and often from non-military sources.
ements benefit from the unity of effort across all Whereas intelligence is usually related to data and
levels of command and government. specific information an enemy is deliberately try-
ing to conceal or keep secret, the information on
What are HNIRs?
the friendly nation characteristics and local cir-
HNIRs represent a commander-driven cultural
cumstances is visible and collectable in the normal
change within the ISAF Joint Command. They are
course of operations and trust-based interaction
more than just questions─they are tailored and are
among partners in a COIN environment. Certainly,
the “right questions” to drive effective population
there is a place for intelligence collection to provide
based COIN. HNIR enable the commander to make
certain details and discern the existence of decep-
informed decisions and allow him to more effec-
tion or bias within the HNIR, but the vast majority
tively conduct the full spectrum of military and ci-
of the information is openly exchanged.
vilian activities that will achieve popular support for
government. Information at local levels is system- Specific examples of HNIR may include:
atically collected by organizations across the com- ÊÊ What influences are inhibiting the extension of
mand, fused, and analyzed to produce knowledge governance in district X? (Governance)
and understanding. ÊÊ Who are the key influencers and community
HNIR is information the commander needs about leaders that will determine the right projects for
friendly nation institutions or organizations in order economic development? (Development)
to partner effectively, develop plans, make decisions, ÊÊ What partnership activities should we take to
and integrate with civilian activities. Depending on ensure sustainable freedom of movement for the
the circumstances, information may include the population? (Security)
status of provincial, district or local governance, ÊÊ What resources are required to facilitate the ac-
economic development, infrastructure, or security cess to justice for the district Y? (Justice)
forces. Other examples include: ÊÊ What grievances are present and are inhibiting
ÊÊ Popular support–sympathizers and active supporters. trust between the local tribal elders and the dis-
ÊÊ Population conditions, beliefs, and structures. trict administrators? (Governance)
ÊÊ Infrastructure, services, and economy. ÊÊ Where and when can we enhance the growth of
government capacity to serve the population?
ÊÊ Governance development, capacity, and tactics–
(Governance)
central government, engagement/empowerment
of traditional governmental structures, overall Understanding with Context
governance, power brokers. We approached the development of HNIR with a
ÊÊ Host Nation security force development, capac- key related question at the forefront of the process
ity, and impacts (tactical and institutional.) design: How can we contextualize the HNIR ques-
The scope of HNIR is designed to be compre- tions to help our experts identify collectable data
hensive. These information requirements are far and information that will lead to an informed as-
broader than “intelligence,” rely on functional ex- sessment supporting the commander’s decisions?
perts and integrated processing, and every orga- Examples: The number of sitting judges (data
nization is a potential contributor and “sensor” in point) doesn’t matter to the Rule of Law if they see
the field. The challenge is to harness the staff ex- no cases nor make judgments (harder to measure).
pertise and information flow to inform the com- What would indicate change in the Rule of Law?
mander and staff so that the context, subtleties, How about tribally accepted Informal Justice? In
and biases inherently important in COIN are sur- fact, thinking through the judicial question leads
faced and understood. to another─how to assess satisfaction with the ju-
18 Military Intelligence
internal and external to the command, based on spe- provide subject matter experts to work in and with
cific informational requirements. an analytical cell designed to integrate HNIR assess-
ments across the headquarters.
Enabling the Command: Building the
Process, the Team, and Making this Step 1: Identify Advocacy and Expertise:
Work ÊÊ Within the IJC and ISAF staff functions.
Assessing and updating HNIR operations will fall ÊÊ Within governmental and NGOs from both the
on a cross functional center and working group that international community and Afghanistan.
reviews the quality, quantity, analysis, and produc-
ÊÊ Within IJC subordinate commands and the
tion cycle to ensure the HNIR are answered appro-
ANSF.
priately for the commander.
ÊÊ Within professional specialties from both inter-
Expertise and Partnership. It became clear that national community and Afghanistan.
each staff element would be able to provide only a
portion of the information required, leaving the chal- Endstate: A fully developed contact network along
lenge to assign and qualify staff advocacy for each organizational and professional authorities and ex-
HNIR. This responsibility would require the staff pertise to refine HNIR and assist with the develop-
section to validate the HNIR including developing ment of reporting criteria.
indicators and specific information requirements; Developing the “Right Questions.” Further anal-
ensure collection; ensure data is ingested into com- ysis of the HNIR was required to identify or refine
mon databases for easy access and analysis, and indicators or information requirements across the
20 Military Intelligence
sion partners to enable effective decisionmaking ing a shared understanding of the environment, and
processes for military, governmental, nongovern- enabling all partners to cooperate more effectively to
mental, and civilian organizations. achieve positive results. The IJC and its mission part-
Conclusion ners, in support of the GIRoA, are involved in a com-
plex argument between an elected government and
As with most processes executed during COIN op-
negative influences for the support of the population.
erations, this HNIR effort will never be complete. The
As we do those things that most benefit the people
intended outcome of creating an HNIR information
of this country, understanding the environment in
sharing system is to increase the understanding of a
which they live will be the most critical knowledge we
complex OE and to present a coherent, comprehensive
will all need to be successful. HNIR is just one step,
common operational picture, not piecemealed and re-
albeit an important one for the IJC Commander and
ported as independent packets of data or information.
staff, in the right direction.
Based on analysis of eight years of operations in
Afghanistan, a new category of critical information
has emerged as the central driving force for the IJC Colonel George Franz is the Chief, IDC for the ISAF Joint
Command, Kabul, Afghanistan.
commander. The design of the HNIR process is to
bring Host Nation and population centric informa- Lieutenant Colonel David Pendall is the Chief CJ2 Planner for
tion to the forefront of command decisionmaking. the ISAF Joint Command Future Operations Planning Team in
The development of an Afghanistan Information Kabul, Afghanistan.
Environment will enable a more open and holistic Lieutenant Colonel Jeffery Steffen is the Knowledge
information sharing process; recognized across the Manager within the IDC for the ISAF Joint Command, Kabul,
command and by our partners as critical to develop- Afghanistan.
UMI
source) that are designed to be offered as Distributed Learning (dL)
via the UMI technologically advanced online delivery platform(s).
UMI online registration is easy and approval of use normally takes only a day or two after a user request is
submitted. Go to http://www.universityofmilitaryintelligence.us/DOD_Authorization.asp, read and accept the
standard U.S. Government Authorized Use/Security statement, and then follow the instructions to register or sign
in. The UMI Web pages also provide feedback and question forms that can be submitted to obtain more information.
The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of the Army,
Department of Defense, or the U.S. Government.
Introduction
Prior to 9/11, Document and Media Exploitation and what steps can be taken to enhance operations,
(DOMEX) capabilities were neither well defined and then offer recommendations on how the IC and
nor sufficiently developed or understood to ad- the Department of Defense (DOD) can better orga-
equately support combat operations. Despite les- nize, train, man, and equip itself to meet DOMEX
sons learned from previous conflicts, U.S. forces challenges in the future.
entered the War of Terror without mechanisms Historical Context
to properly collect, process, and disseminate in- The U.S. military and other branches of our govern-
telligence derived from DOMEX. In the past 18 ment relied on what was originally titled Document
months, the volume of captured digital information Exploitation (DOCEX) for as long as we have prac-
from law enforcement, intelligence, and civil court ticed the art of intelligence. Discovering the enemy’s
cases has exploded. Recent investigations of Umar intentions through examination and exploitation
Farouk Abdulmutallab, the alleged terrorist who of captured documents was nothing new. In war-
attempted to detonate plastic explosives on board fare, exploitation of adversary documents normally
a commercial airliner, and U.S. Army Major Nidal begins at the point of capture and progressively
Malik Hasan, the man accused of killing Soldiers becomes more detailed and sophisticated as the
at Fort Hood, rely extensively on close examination document moves through a process of triage, trans-
of personal computer data by federal law enforce- lation, and promulgation.2
ment agencies. These are just two cases amid an
The Civil War provides many examples of troops
avalanche of harvested digital media that create a
capturing and attempting to exploit enemy doc-
national security issue which merits a system that
uments. The assassination of President Lincoln
can reliably sift intelligence and quickly share it in
caused a detailed review of captured Confederate
order to protect lives and preserve security.
documents once thought trivial or of little value for
In response to a recent congressional inquiry, two military operations, seeking proof that Southern
respected leaders of the Intelligence Community (IC) leaders were linked to the assassination plot.3
commented that “there is no doubt that “DOMEX By 1920, the U.S. Army War Department intelli-
provides critical intelligence unavailable through any gence regulation emphasized the value of DOCEX:
other discipline.”1 Without question, our DOMEX ca- “Experience has shown that the information derived
pabilities have evolved into an increasingly special- from documents is second in value only to that se-
ized full-time mission that requires a professional cured by the actual examination of prisoners. Too
force, advanced automation and communications much stress cannot be laid upon the importance of
support, analytical rigor, expert translators, and the rapid and systematic examination of every doc-
proper discipline to process valuable information ument captured.”4
into intelligence. Unfortunately, DOCEX was never a high priority
This article will examine the historical roots of in terms of training and resources as the Army en-
DOMEX operations to present day activities, explain tered World War II. In Europe, the 1st Army had a to-
why DOMEX should be an intelligence discipline, tal of five personnel assigned to their DOCEX team
review how the Army improved DOMEX capabilities, for combat operations from January 1944 to May
22 Military Intelligence
1945.5 This team would disseminate intelligence manpower at our level to conduct any type of ex-
reports after documents were reviewed and trans- tensive DOCEX.”9 From the outset of Operations
lated, usually 48 hours after capture. But with the Enduring Freedom/Iraqi Freedom (OEF/OIF),
capture of between 250 to 1,000 pounds of docu- there was a shortage of trained HUMINT collec-
ments each day, the organization was of marginal tors and they were a precious resource. Major
assistance to tactical operations. General Barbara Fast, the Multi-National Corps-
Iraq C2, stated that “it became imperative once we
1st Army reached several conclusions about
were in Iraq to establish a strong HUMINT capa-
DOCEX intelligence: “documents arrived too late for
bility to understand the situation on the ground,
operational exploitation” and “sufficient personnel
but we lacked the number and some of the skills
were not trained to help Corps and Division levels”.6
required to be as successful as we needed to be.”10
Through the Korean War and into Vietnam, DOCEX
Predictably, the scant numbers of HUMINT collec-
remained relevant and necessary to gain intelligence
tors were in high demand just for their core mis-
on the enemy, but it was viewed as something tem-
sion sets: tactical questioning, debriefings, source
porary in nature. When we needed it, we built or-
operations, and interrogation of detainees. DOCEX
ganizations to meet the demand, then forgot about
wasn’t a priority.
lessons learned after conflicts ended.
DOMEX Goes National
Why was U.S. Army DOMEX Not
As the military struggled with DOMEX activities
Prepared for 9/11?
between 2001 and 2003, the first tangible effort to
The first problem was that after Vietnam, U.S.
institutionalize DOMEX at the National and strategic
Army DOCEX missions and functions were doc-
level came with the creation of Defense Intelligence
trinally pinned to interrogators: “the first intel-
Agency’s (DIA) National Media Exploitation Center
ligence specialists who could examine or exploit
(NMEC) in 2003.11 The NMEC was created to serve
captured documents, in addition to interrogating
as the lead government agency for the rapid pro-
prisoners of war, and will scan documents and ex-
cessing, exploitation, dissemination and sharing of
tract information.”7 Accordingly, DOCEX proce-
all acquired documents and media between strate-
dures became firmly rooted within the interrogator
gic/national through tactical/local levels across the
Field Manual (FM) under the human intelligence
Intelligence, Counterintelligence (CI), military, and
(HUMINT) discipline.
Law Enforcement (LE) communities to enhance the
The second problem was the direct result of plac- safety and security of the Nation.12
ing DOCEX responsibilities on interrogators within The swift expansion of DOMEX enterprise created
HUMINT. There simply weren’t enough collectors (CI many different efforts across the IC and DOD which
and interrogators) to accomplish the DOCEX mis- required significant funding from congress. In 2005,
sion. As the Army reduced its force size in the early the U.S. Senate Select Committee on Intelligence
70s under a transformation initiative called “Army of (SSCI) conducted an audit to review the practices
Excellence (AOE),” it became apparent that an inter- of collecting, processing, translating, and reporting
rogation force would not be a large one. Close study intelligence obtained from overtly captured and/or
of the AOE with respect to interrogator strength re- clandestinely acquired paper documents and elec-
vealed early concerns that there weren’t enough in- tronic media.13 The SSCI wanted to analyze and
terrogators in Army inventories to conduct HUMINT evaluate the intelligence value of DOMEX efforts
missions and equally support DOCEX missions.8 and assess the budget implications for sustaining
What Were the Consequences of Not DOMEX over the long term. The SSCI audit findings
Being Prepared? concluded that:
One intelligence leader stated: “DOCEX didn’t ÊÊ DOMEX had become an integral source of valuable
work; we did our own DOCEX when we could. intelligence information supporting both tactical
Otherwise, it was sent to some CJTF-76 DOCEX operations in OEF/OIF and Iraq and strategic anal-
section for processing that was virtually a black ysis in national intelligence agencies,14 but there
hole because I never received any feedback from was a perception of slight duplication of effort and
anything we sent forward. We just didn’t have the redundancy in terms of reporting intelligence.
24 Military Intelligence
the core HUMINT missions of tactical questioning,
debriefing, source operations, and interrogation.21
This must be changed immediately. We already
know that Army DOMEX operations were not suc-
cessful in the early stages of OEF/OIF because
we expected interrogators to conduct the mission
based on our doctrine. Recommendation: Publish
an interim change to the FM and clarify DOMEX
functions and responsibilities.
4. The U.S. Army Intelligence Center of Excellence
(USAICoE) diligently worked the timely release
of Training Circular (TC) 2-91.8 DOMEX Enabled
Intelligence.22 The publication codifies DOMEX
Figure 1. doctrine and general tactics, techniques, and pro-
(GEOINT), and Measurements and Signatures cedures from tactical to strategic environments.
Intelligence (MASINT)–DOMEX reporting and anal- Unfortunately, based on restrictions on the num-
ysis are considered intelligence products”.18 Aside ber of FMs, the TRADOC Commander limits MI
from correct recognition of DOMEX as an intelli- Doctrine to only four FMs. A DOMEX FM could
gence discipline, the U.S. Army must also correct better serve as a blueprint for other military ser-
several doctrinal disconnects to set a better course vices to follow as they develop their organization
for the future. Below are four key doctrinal items and training models. Recommendation: The U.S.
that Army intelligence leaders must address: Army should convert the TC into an FM and ti-
tle the FM “DOMEX Operations” not DOMEX–
1. The most recent final draft of FM 2-0 Intelligence Enabled Intelligence. Saying that there is
incorrectly states that DOMEX is “an emerging DOMEX–enabled intelligence is akin to stat-
capability” but goes into profound detail spell- ing there is bullet-enabled infantry.
ing out the fundamentals of all other intelligence
Organization. The need for tactical DOMEX
disciplines.19 The FM misses a tremendous op-
capabilities across the services has never been
portunity to devote a short chapter to DOMEX
greater; the services must address this organi-
and bring together the central thoughts and
zational gap immediately. The Army learned that
themes thinly spread throughout the document
designating HUMINT Collection Teams (HCTs)
into a single, concise framework that reinforces
for DOMEX missions was a poor strategy.23 The
what DOMEX actually is–an intelligence disci-
Department of the Army (DA) G2 quickly recog-
pline. Recommendation: Use FM 2-0 to state that
nized this and established Multi-Functional Teams
DOMEX is an intelligence discipline.
(MFTs) within the Army’s Battlefield Surveillance
2. TRADOC’s Concept Capability Plan (CCP) for Brigade. The MFT task organization uses four
Intelligence, Surveillance, and Reconnaissance intelligence military occupational specialty
(ISR) for 2015-2024 fails to clearly articulate
Army DOMEX capabilities required to suc-
ceed as we face future threats. The CCP barely
mentions the term DOMEX and incorrectly
states that DOMEX capabilities are required
with HUMINT.20 This doctrinal miscue makes
it look as though TRADOC is out of step with
current Army intelligence and ISR doctrine.
Recommendation: TRADOC must develop a com-
prehensive DOMEX capabilities list in the CCP.
3. FM 2-22.3 HUMINT Collector Operations incor-
rectly maintains that “DOCEX” vice DOMEX is a
HUMINT collection function and mixes DOMEX in
26 Military Intelligence
With respect to U.S. Army intelligence train- integrate across existing core, collection, process-
ing, I recommend that a new MOS be designated ing, and dissemination intelligence systems.29
that specifically covers DOMEX (exploitation of Leadership. From a tactical and operational staff
documents, media, and personal electronic de- perspective, G2/J2/C2 (HUMINT) staffs are in posi-
vices) or at a minimum, an additional skill identi- tion to supervise DOMEX. The 2X staff directorates
fier (ASI). Currently, USAICoE provides baseline are fully engaged in coordinating and managing nu-
intelligence skills training for eight enlisted in- merous HUMINT and CI collection activities across
telligence MOS career fields, the five MOSs men- the areas of operation; they cannot be responsible
tioned in the MFT organization and MOSs 35F for the management and integration of DOMEX
Intelligence Analyst and 35G/H Imagery/Common assets on the battlefield. I believe that we should
Ground Station Analyst.26 Only MOSs 35M and closely examine the pilot strategy, underway in U.S.
35T Military Intelligence Systems Maintainer/ Forces Afghanistan, which created a J2E–the “E”
Integrator receive some DOMEX training. This is standing for exploitation. By separating DOMEX
a start but it’s not enough. Recommendation: At a from the HUMINT organization and assigning an in-
minimum, I recommend that the MOSs 35F, 35M, telligence officer to manage the DOMEX intelligence
35L receive DOMEX training as well. Mobile train- cycle, we are better postured to provide quality con-
ing teams from the Defense Cyber Investigations trol of the entire DOMEX system. We can also look
Training Academy (DCITA) and National Ground at methods to fuse science and technology (biomet-
Intelligence Center (NGIC) could also assist rics, crime scene forensics, etc.) along the DOMEX
USAICoE to provide specialized computer forensic path to leverage opportunities to positively link in-
training to Soldiers.27 dividuals to networks. I expect lessons learned from
Materiel. Because DOMEX functions were the J2E concept will make a solid case for keeping
historically linked to HUMINT as a function, a DOMEX out of direct HUMINT management.
HUMINT reporting system Personnel. Each service must determine which
was the only Program of personnel in their force will be the primary opera-
Record (POR) to support tors of DOMEX equipment and assess what support
DOMEX. The CI/HUMINT personnel are required to maintain their programs.
Automated Tool Set pro- Support personnel are required to cover mainte-
vided an HCT with a ca- nance requirements and operate across the five
pability to collect, process functions of the Joint intelligence cycle. It’s also im-
and disseminate infor- portant that the services track their DOMEX trained
mation obtained through personnel with an ASI or separate MOS. Military of-
document exploitation.28 ficer and enlisted personnel management systems
It wasn’t nearly capable need to recognize and codify the new skill sets.
enough to satisfy a broad Perhaps now is the time to develop and codify the
range of DOMEX equipment and software re- multi-functional intelligence staff officer that has
quirements to fully exploit information within training in DOMEX tasks. These leaders will help
computers, portable storage devices, video imag- intelligence manage three additional tasks (analyze,
ery, and a host of other items. disseminate, and assess) that continually occur.
Today’s the Army’s DOMEX equipment suite of- Thoughts on the Future of DOMEX
fers significant advances over what was available The true significance of DOMEX lies in the fact
to theater forces three years ago. The U.S. Army that terrorists, criminals, and other adversaries
Intelligence and Security Command, DA G2, and never expected their material to be captured. The
the Army DOMEX program manager worked hard to intelligence produced from exploitation is not
field a standardized set of DOMEX equipment that marked with deception, exaggeration, and mis-
met operational needs in support of OIF/OEF across direction that routinely appear during live ques-
the Army and ensure that the equipment was com- tioning of suspects.30 As our adversaries continue
patible with inter-agency standards. The Army must to move from paper to digital-based technologies,
align these QRC efforts into PORs which seamlessly the exploitation of digital media, personal elec-
28 Military Intelligence
data point reveals that since Fiscal Year 2005, ing of Army tactical DOMEX teams. In this capacity,
DOMEX data at NMEC has witnessed nearly a the NGIC/DOMEX PM worked closely with NMEC
tenfold increase while government employees as- over the past three years to field and sustain an
signed to manage one of the most challenging in- Army tactical DOMEX presence in OIF/OEF. To
telligence missions in the IC has remained fairly better support strategic through tactical DOMEX
flat (around 50 employees). research, development, test and evaluation appro-
priation initiatives, the ADO should serve as the
With the ever increasing demands for DOMEX,
DOD lead and action arm for the NDA. The ADO
flowing from homeland security LE activities (FBI,
would be for DOMEX what the Army Cryptologic
DHS, etc.), we are now at a critical junction to ei-
Office is for SIGINT, placing it in an ideal position to
ther make a change to improve capacity to handle
assist the other services reach their DOMEX equip-
the volume of expected data or continue on course
ment and standardization goals.
and risk not being in a position to thwart terrorist
acts while in the early stages of planning. Deployment of a Federated DOMEX IT
Infrastructure. I recommend that the NMEC and
The FBI’s National Virtual Translation Center ADO publish collection and processing standards
(NVTC) should be realigned within the newly cre- to industry in order to select the best solutions for
ated NDA to gain more efficiency on the manage- our DOMEX architecture. Clearly an advanced IT
ment of translation resources not only for timely infrastructure is required at the National level to
and accurate translations of foreign intelligence, help quickly organize, process, and disseminate
but for DOMEX as well. The NVTC is currently the captured information in virtually all formats in
clearinghouse for facilitating interagency use of many languages. If the National DOMEX architec-
translators, partnering with elements of the U.S. ture is to truly be a “single, dynamic, integrated,
Government, academia, and private industry to and federated system, with cutting edge auto-
identify translator resources and engage their ser- mation using the best-of-breed tools,” 39 then our
vices. NVTC is a DNI Center, and the FBI is its collection and processing systems must tackle
Executive Agent. 38 two distinct problems that Dr. Simon Garfinkel
The USD-I should direct the establishment of a labels “deep” and “broad”.40
Military Support Branch in the NDA under the lead- The deep DOMEX problem covers the kind of doc-
ership of a one-star general. The military support ument or data-storage device (a hard drive, DVD, or
branch should include liaison officers from each personal electronic device) that is captured and be-
combatant command (COCOM) in order to improve comes available for analysis. The analytical goal is
global mission management of DOMEX activities. to find out everything possible about the data stor-
The support branch could help COCOMs link their age device. The DOMEX operators and analysts who
DOMEX priorities into the NDA and better harness receive a laptop, for example, want to know every-
national DOMEX holdings to consumers support- thing possible about it; not just the content, but the
ing host nation counterterrorist efforts. Creation application programs, the configuration settings,
of a military support branch at NDA would fol- the other computers with which these machines
low similar constructs already in place at NSA and had come into contact, and so on.41
NGA. The lack of a military support branch assist-
The broad DOMEX problem is the reverse.
ing NDA prevents traction to fully synchronize and
Instead of having unlimited resources to spend
leverage DOMEX collection capabilities across the
on a particular item, analysts are given a large
services and align large-scale DOMEX procure-
number of digital objects and a limited amount
ments and solutions for the services as research
of time to find something useful to their mission.
and development drives change.
In recent years the volume of captured digital in-
The USD-I should direct that the U.S. Army desig- formation seized on the battlefield or within LE
nate the Army DOMEX Office (ADO) as DOD lead for investigations has exploded. The landslide of digi-
service DOMEX program procurement. DA G2 des- tal media makes the broad problem quite compel-
ignated NGIC as the dedicated DOMEX Program ling from both a national security and commercial
Manager responsible for the development and train- perspective, a system that can reliably find the
30 Military Intelligence
of Special Investigations, or sailors from the Office 6. Ibid., 84.
of Naval Intelligence. 7. FM 30-15, Intelligence Interrogation, March 1969, 3-7.
One thing is certain–all military services must 8. Mark S. Partridge, “Asking Questions: Will Army Tactical
identify DOMEX training requirements for their Interrogation Be Ready For War?” School of Advanced Military
forces and develop an appropriate communica- Studies Monograph, 17 December, 1986, 37.
tions infrastructure to relay DOMEX intelligence 9. Operational Leadership Experiences Project, Combat Studies
laterally and upward into the national intelli- Institute, Fort Leavenworth, Kansas, Interview with CW3 Kenneth
Kilbourne, February 2009, 8.
gence system. I recommend that the ADDNI/OS
or USD-I designate the Navy and Marine Corps 10. Donald P. Wright and Timothy R. Reese, On Point II, Transition
Intelligence Training Center, and USAICoE as the to the New Campaign: Operation Iraqi Freedom, June 2008, 195.
(Interview with MG Fast, CJTF-7 C2)
primary DOMEX institutional training bases for the
military services. The roles and functions of the 11. ODNI, 2009 DOMEX Annual Report.
Joint Military Intelligence Training Center and the 12. NMEC Mission Statement, 2009.
DCITA as authorized training venues need to be
13. U.S Senate, Select Committee on Intelligence. Report Number
clearly spelled out within an ICD or USD-I mes- 111-16, Period Covered–4 January 2007 to 2 January 2009, 42.
sage to clarify their interaction with the IC and
14. SSCI Audit of IC Domex, April 2007.
DOD DOMEX education system.
15. Dan Butler, Paula Briscoe, Roy Apselloff, ODNI, National
We must take several additional steps to strengthen Document and Media Exploitation Enterprise Vision Pamphlet,
each of the six ODNI priorities in order to achieve Message from DOMEX Seniors, April 2009.
an enduring DOMEX capability across the national, 16. Richard P. Zahner, “Rebalancing the Army Military Intelligence
military, intelligence, homeland security, and law Force,” AUSA Green Book, October 2009, 186.
enforcement communities, at all levels–strategic,
17. JP 1-02, Department of Defense Dictionary of Military and
operational, and tactical. Associated Terms, 31 August 2005.
sion is required to designate DOMEX as an intel- 19. FM 2-0, Intelligence (Final Draft), March 2009, 1-30.
ligence discipline and to create a National DOMEX 20. TRADOC Pam 525-7-9, Version 1.0, 12 August 2008, 40.
Agency. Similar conditions and decisions were made
21. FM 2-22.3, Human Intelligence Collector Operations, September
over 50 years ago as our government created agen-
2006, 1-6.
cies for HUMINT and SIGINT. If the strategic objec-
tives are to extend intelligence to all who need it 22. TC 2-91.8, Document and Media Exploitation Enabled
Intelligence (Final Draft), 25 July 2008.
and to facilitate Homeland Defense through exten-
sive collaboration, then if we fail to create a National 23. FM 2-22.3, 2-6.
DOMEX Agency, then I believe DOMEX will return 24. U.S. Army MI BN (BFSB) MTOE, DOCNO 34105GFC18, Para
to its previous condition of atrophy across the IC 206, Lines 02-17.
and DOD and our nation will not be in a position to 25. U.S. Army Combined Arms Center, Site Exploitation Concept of
effectively safeguard itself from multiple threats. Operations (CONOPS), 2010-2016.
37. Deputy Director of National Intelligence for Policy, Plans, and Colonel Joseph Cox served as Commander, 519 th MI
Requirements, 2009 National Intelligence: A Consumer’s Guide. Battalion (BfSB) during OIF 07-09 between September
2007 and December 2008. He is a 1987 graduate of OCS
38. Ibid
and has also served in the 525th MI Brigade; 82d Airborne
39. ODNI, National Document and Media Exploitation Enterprise Division; 75th Ranger Regiment; 205th MI Brigade, and
Vision Pamphlet, the 525 th BfSB. He recently completed a U.S. Army Senior
40. Simson L. Garfinkle, “Document and Media Exploitation,” Service College Fellowship Program in Washington, D.C.
Association for Computer Machinery, accessed at http://queue. and is now the Commander, 501 st MI Brigade, Korea.
acm.org/detail.cfm?id=1331294. Colonel Cox may be reached at [email protected].
32 Military Intelligence
by Major Marilyn Harris and Captain Carolyn Bronson
I I (-)
lored to conduct full spectrum operations. This was A 755ECES/FET ESFS
E
ECP 3
A 15
the inaugural combat deployment of a MEB during B
I I (-) I
TWRS
CA ESFS
PRT 755 ECES/UD
which it served as BSO. TF Warrior was uniquely CA
B
426
PRIME BEEF
/QRF
ESFS
tailored with a mix of international partners, sev- 3 MP 410
337
410
MP BASE
OPS
SAA
Human Bagram AF
eral types of battalions, Provincial Reconstruction (-)
PMT
PMT
Terrain FOB Salerno
FOB Fenty
BSB FOB Sharana
Teams (PRTs), an Agribusiness Development Team, B 57 Partnership
X
E
SECFOR
634 Camp Eggers
(ADCON)
ETT
ETT
a Human Terrain Team (HTT), two Police Mentor E 2/43
COORDINATION
ANP
3 201
OPCON
34 Military Intelligence
infiltration routes and exfiltration routes in vicinity governance, development and information efforts
of attack sites. There was limited visibility on sus- throughout the TF AO.
pected enemy supply routes, which precluded the Challenges–MEB ISR Comparison
TF from interdicting insurgent movements of weap-
Theater level ISR assets were recurrently allocated
ons, ammunition and explosives.
in support of TF Warrior operations for a limited du-
In the development LOE, this paucity of assets ration during the execution of offensive operations.
prevented us from monitoring the many develop- However, due to the dynamic nature of the OE, the
ment projects that were in construction through- sparsely allocated full motion video support did not
out the AO. These projects primarily included provide us the required persistent surveillance ca-
road and bridge construction and the establish- pability. Limited duration ISR coverage is insuf-
ment of new government facilities. Many of these ficient for a COIN environment. Due to shortages
projects were consistently threatened for attacks of Theater ISR assets, mission priorities often pre-
by insurgent forces. Key bridges were destroyed cluded the allocation of ISR in support of TF Warrior
to preclude Coalition Forces aiding defending operations.
Afghan forces against insurgent forces. Once re- As a result of constraints, the MEB ISR assets
paired these key areas continued to receive ad- were not on par with BCT peers. TF Warrior’s ISR
ditional threats of attacks. The low visibility of capabilities were severely limited in comparison to
these projects constricted our views of the overall other BSOs. Although its OE was much more per-
security and progression of these projects, which missive, information requirements existed outside
directly affected the freedom of movement of the of the security LOE that were critical in aiding the
local populace. commander to monitor measures of effectiveness of
There were numerous reports suggesting that his decision points in governance, development and
key and influential personnel in government and information LOEs. All BSOs should have dedicated
Afghan security positions were cooperating with ISR capability whether from organic, direct support
known insurgents throughout the AO. These re- or general support enablers. This augmentation
ports remained unconfirmed due to a lack of dedi- should be considered during the sourcing phase for
cated assets that could assist in monitoring all unit deployment to ensure units are properly tai-
activity of these individuals to known insurgents’ lored for mission execution.
AOs. In addition there was limited coverage of all
Tailoring for the Operational
activity in vicinity of mosques that were reported
Environment
to be used for insurgent meetings and pre-staging
Modified table of organization and equipment
locations for attacks. This limited our knowledge
(MTOE) design shortfalls revealed that force develop-
of any anti-coalition and anti-Afghan govern-
ers should consider ISR augmentation of UAS pla-
ment rhetoric that was being used in support of
toon and tactical SIGINT support for the MEB during
insurgent information operations, which inevita-
bly caused issues in our ability to promote a suc-
BCTs v. MEB Collection Assets
cessful pro-Government of the Islamic Republic of International
BCT 1 BCT 2 BCT 3 TF WARRIOR
Afghanistan and Afghan National Security Forces BATTLE GROUP
The overall effect of a lack of ISR assets dedicated GCS GCS GCS
to the TF was a huge limitation on lethal and non- JSTARS CGS CGS JSTARS CGS CGS JSTARS CGS CGS
lethal targeting opportunities on known insurgents HUMINT HUMINT HUMINT HUMINT HUMINT
and the overall ability to prevent/deter/detect in- CI HCT HCT CI HCT HCT CI HCT HCT HCT HCT CI
FR
HT
FR
HCT
HCT
HCT
OMT
HCT
HCT
PS
STG
STG
LLVI
LLVI
PS
PS
STG LLVI
LLVI
PS
PS
STG LLVI
LLVI
LLVI
FR
LLVI
FR
STG
SIGINT IMINT
location. Operations were often postponed because 1LT 35G 1LT 35C CPT 31
CRIMINT
of the inability to confirm or deny enemy presence or
NCOIC 35L E-6 NCOIC 35 E-6 CW3 CID
NCO 35L E-5 NCO 35 E-5 NCO E-7/E-6 31B
for force developers to update the MTOE for the MEB, NCOIC E-7 31B
NCO E-6 31B
4 X CIVILIAN LEPs
36 Military Intelligence
by Major Charles Assadourian
Introduction
The methods of measuring progress in any large ends in conviction of the insurgent. Prior to this, the
endeavor are essential, yet often difficult to agree security forces must capture the individual and ex-
upon.1 This is particularly true when the endeavor ploit all available evidence at the point of capture or
requires qualitative measures. Public debate re- other relevant location. Prior to capture, the secu-
garding counterinsurgency (COIN) often raises this rity forces must have a warrant or positive identifi-
issue, but attention span in the news cycle does cation of incriminating activity. Prior to the warrant
not permit complex answers to complex problems.2 the security forces must receive tips or reporting of
This complexity stems in part from the numerous incriminating activity, such as the assembly of an
entities involved which include external or foreign improvised explosive device. Prior to the tips or re-
forces, host nation (HN) forces, HN government porting, the insurgent must attempt an attack or
agencies, subsets of the population, and insurgent activity which would lead to a kinetic attack. Thus,
elements. Given this complexity, how can leaders six different metrics result from the timeline in
translate the desired end state into specific tasks case studies with positive outcomes. The acronym
for Soldiers? Answering this question first requires SLTWC2 captures these benchmarks for success.
clarification of desired outputs of the tasks.
Traditional measures of security in COIN often fo-
cus on the number of attacks executed or number
of detainees captured.3 While these are valid mea-
sures, a more holistic approach requires an exami-
nation of instances resulting in positive outcomes.
In this, HN government and population activities
are as important as enemy activities. Appropriate
measures include events on the timeline in cases
SLTWC2 Security Metrics
with successful outcomes. Such measures can
shape priority intelligence requirements and rein- 1. SIGACTS.
force or shape the commander’s assessment of the 2. Local security force networking.
environment. 3. Tips and reports.
Based on this, an examination of the “success- 4. Warrants.
ful event” timeline or process, starting from the last 5. Captures and sensitive site exploitation.
event back to the beginning significant activity or in- 6. Convictions.
criminating act, produces measurable data points. These metrics serve to evaluate the effects on
Apart from a lack of casualties, the ideal situation the environment as well as those on the enemy.
38 Military Intelligence
must actually be in the lead, and not just appear to include a trained and certified investigative officer
be in the lead. Networking effects are primarily rec- to supervise biometric and forensic collection and
onciliation of insurgent elements and fence sitters processing of evidence. The capture must lead to
but also lead to the other four effects. initial and follow on judicial reviews. Proper chain of
custody helps determine admissibility in court. This
Tips and Reporting. As networking begins, tips
requires timely release of the details of the capture
and reports will begin to flow in to the extent that
to HN authorities. Understanding HN investigative
support for COIN exists within the community.
standards and any gap with desired standards aids
These can vary from mere rumors to incriminating
the foreign force in providing assistance.
physical evidence and come from initial contacts
or historical relationships. It is important to get The significance of captures varies according to
sworn statements, and when possible, testimony. the detainee’s place in the threat order of battle and
Atmospherics, early warning, cache, or high value the willingness to provide information in interroga-
target locations are most meaningful in areas with- tion. Cache significance varies according to size and
out significant prior reporting. content. Detention orders following an unplanned
detention reflect positively on the legal environ-
Counterinsurgents must be alert to filter false ac- ment. Dry holes, indicators of early warning, or
cusations or deceptive information. Tracking the subsequent releases often reflect negatively. While
volume, accuracy, tone, and geography of reporting a desired end state in itself, capture can often lead
yields key insights into both the enemy and the op- to the other four desired end states.
erational environment. An increase in tips and re-
Convictions. True success following a capture in-
porting often indicates an increase in reconciliation
cludes a conviction in an HN court. This requires
and can lead to other desired effects.
the political will to prosecute and knowledge of spe-
Warrants. Following a stream of reporting the cific judicial preferences. Key aspects of conviction
counterinsurgent should seek a warrant. Critical outcomes include judicial throughput, length of
to this are topics such as appropriate jurisdiction, sentences, number of pardons, conviction/acquit-
judicial independence, and biometric matches. tal rate, specific roles of the defendants, and the de-
After obtaining a warrant, wanted posters and tails of testimony. It is important to consider that
other targeting efforts possess a greater level of le- the need for judicial independence must have a sig-
gitimacy. The ability to obtain a warrant depends nificant impact on meetings with judges.
upon available evidence and probable cause, ju- Failure to convict can result from complicity, in-
dicial independence, resistance to corruption and competence, investigative or judicial corruption,
political connections, and investigative and judi- or exposure of false accusations. While most pre-
cial competence. fer to think of courts as apolitical, courts often
Investigative officers must be able to analyze and demonstrate a certain legal threshold which may
summarize incriminating information as well as or may not be met by available evidence. This re-
gather and present evidence. Warrants are also crit- quires significant HN administrative skill sets.
ical for the release of detainees into HN police cus- Within this metric, convictions in cases of exter-
tody from external force custody. The publishing of nal force casualties weigh more heavily than HN
warrants generally results in one of three things: victims, as the threshold is generally higher for
the insurgent is turned in (capture), flees (exile), or the external force. Regardless, each conviction
claims innocence (reconcile). In all three instances, marginalizes or exiles a specific threat but can
case development does not end at this point, as the also lead to the other effects.
ideal case ends in successful prosecution. Conclusion
Captures and Sensitive Site Exploitation. After The use of SLTWC2 enhances planning to better
obtaining a warrant, the counterinsurgent typically define and apply resources to influence the envi-
enjoys increased legitimacy to conduct detentions. ronment. These metrics flow from the desired end
Conversely, extra-legal actions reduce security force states and the events which precede them. SLTWC2
credibility and the perception of professionalism. offers opportunities in subordinate criteria to exam-
Like SIGACTs, capture and search actions should ine both quantitative and qualitative measures. It
Endnotes
1. David Kilcullen, Testimony before the House Armed Services Major Charles L. Assadourian is currently the S2 for 2nd
Committee Hearing on HR 1886, the Pakistan Enduring Assistance Brigade, 1st Calvary Division and recently returned from
and Cooperation Enhancement (PEACE) Act 2009, 23 April 2009. 3. deployment in MND-N. His last assignment was as the
2. Eli J. Margolis, “How to Measure Insurgencies,” Small Wars S2X for 1st Brigade, 1st Cavalry Division where he served in
Journal Posting, 12 September 2007. MND-B from October 2006 to January 2008. He is a 1997
graduate of the U.S. Military Academy at West Point where
3. Jonathan J. Schroden, “Measures for Security in a
he received a BA in Political Science. He is a graduate of
Counterinsurgency,” Journal of Strategic Studies, 32, 5 (October
2009): 715.
the Air Assault School, FAOBC, MICCC, and the Signals
Intelligence Officer Course. Major Assadourian can be
4. Tom Ricks, “Kilcullen (I): Here’s what not to measure in a reached at [email protected].
COIN campaign,” Foreign Policy, 8 February 2010. Accessed
40 Military Intelligence
Memetic Warfare: The Future of War
tute itself, requiring the U.S. to intervene once more
by First Lieutenant Brian J. Hancock at the cost of additional lives and other resources.
This article will explore how an emerging subfield
Introduction of psychology known as memetics can be used to
The War on Terror pits the large conventional units identify and target the specific root causes of insur-
of the U.S. against small, agile, and adaptable en- gency and other challenging social problems such
emies around the world. The post modern world of as youth gang violence, the welfare cycle, or the de-
warfare is characterized by a threat which can raise terioration of the public school system.2 Finally a
funds within the boundaries of the country it wishes practical model for constructing and propagating
to attack, train and acquire equipment within those benevolent memes in theatre, at the brigade level,
same boundaries, and then ultimately execute its will be presented.
mission. Memetics Defined
The response of the U.S. to this unprecedented chal- The Oxford English Dictionary defines a meme
lenge is embodied in the 2006 revision of FM 3-24 as “an element of culture that may be considered
Counterinsurgency. This counterinsurgency (COIN) to be passed on by non-genetic means, especially
manual is a significant improvement over its prede- imitation.” In his landmark book, The Selfish Gene,
cessors. It recognizes how non-military aspects of the author Richard Dawkins coined the word meme to
environment bear significantly on shaping insurgency describe cultural replicators which spread through
and fueling terrorist movements. It devotes signifi- the social body akin to how genes spread through
cant attention to recognizing these factors, and pro- the biological body.3 Memes form the invisible but
vides frameworks for analyzing and addressing them. very real DNA of human society. A meme is essen-
Two such frameworks are ASCOPE (areas, structures, tially an idea, but not every idea is a meme. In or-
capabilities, organizations, people, and events) and der for an idea to become a meme it must be passed
PMESII-PT (political, military, economic, social, infor- on—or replicated to another individual. Much like a
mation, infrastructure, physical environment, time). virus moves from body to body, memes move from
mind to mind. Just as genes organize themselves
While the revision of FM 3-24 is a significant im-
into DNA, cells, and chromosomes, so too do repli-
provement over its predecessors, it does have short-
cating elements of culture organize themselves into
comings. As insurgent movements continue to
memes, and co-adaptive meme complexes or “me-
evolve, the most successful operate in complex ur-
meplexes.” The study of these replicating elements
ban terrain, receive indirect support from criminal
of culture is known as memetics.
activities and external agencies which reduces their
need for popular support, and have an ideologi- Sample memes include “Look both ways before
cal appeal grounded in religious fundamentalism. you cross the street,” “Just say no,” the first four
The new manual devotes only a single paragraph notes of Beethoven’s 5th symphony, or “If you martyr
to this environmental change indicating that urban yourself you will receive 72 virgins in the afterlife.”
insurgencies are “difficult to counter” because they As illustrated by the last example it is important to
require little or no popular support.1 Even more note that memes do not necessarily have to be true
significantly, the doctrine of breaking up the rich in order to be successful at replicating themselves.
tapestry of a society into bite size pieces is an at- The memes an individual possesses forms the ba-
tempt to apply a reductionist mindset to a complex sis of his artifacts and behaviors. Some memes
adaptive system. The predicable end result is that replicate more successfully as a related set, or me-
the symptoms of the insurgency are treated in the meplex, than as individual elements. Sample meme-
hopes that the insurgency will go away, while the plexes include the scientific method, communism,
actual root causes–pathogenic memes, or viruses of and radical Islam.
the mind–are never addressed. This leaves open the Genes are measured along three principal axes,
possibility that in time, the insurgency will reconsti- specifically fidelity, fecundity, and longevity.4 Genes
42 Military Intelligence
The discovery of John Walker Lindh (The American mander may direct memetic operations to support
Taliban) brought to light one of the critical short- democracy. While democracy is not a perfect form
comings of modern COIN practice. As the U.S. does of government, it is more stable and peaceful than
not practice COIN at home, it can neither predict other forms of government. With the objective estab-
nor defend against home grown extremists. John lished the next step is to break down the individual
Walker was rushed to justice, and as a result very components of the memeplex of democracy that will
little intelligence was gained from him and a valu- have to be propagated within the target audience. The
able opportunity to understand the extremist move- Organization of American States has sub-divided de-
ment was lost.11 The application of memetics affords mocracy into six essential elements:
the understanding that John Walker was in fact ÊÊ Freedom
suffering from a disease of the mind. Had he been
ÊÊ Human Rights
de-programmed, and inoculated against the cult
ÊÊ Rule of Law
memeplex, it would have been possible to re-insert
ÊÊ Free Regular Elections
him as a double agent and begin taking the Taliban
apart from within. ÊÊ Pluralistic Political System
ÊÊ Separation of Powers
Curing Insurgency and Terrorism These components happen to be memeplexes in
The ultimate long term cure for terrorism and in- their own right, and if this was an actual operation,
surgent movements is to attack them at the atomic they would have to be further sub-divided into their
level through a process of memetic warfare. By respective memes. In the interest of simplicity (and
identifying, cataloguing, and tracing the pathogenic brevity) this step will be overlooked. The process of
memes that lead to these behaviors it will be possi- memetic component definition is summarized in
ble to predict when and where they will occur. When Figure 1.
the IC perceives that a certain dangerous meme set
Determine the Memes Needed to Support a Goal Idea
is reaching critical levels within a community, it can
trigger operations to quarantine the area and send
in an expert team of educators to execute an inocu-
lative and preventative education program on the . .
tactics of mind control and destructive cults.
Memetic Warfare
The principle of memetic warfare is to displace, or
overwrite dangerous pathogenic memes with more
benign memes. Once a critical level of saturation of
the new meme set is achieved in the target popu-
?
lation, undesirable human artifacts and behaviors
such as weapon caches and IED attacks will disap-
pear. Ideally the virus of the mind being targeted
will be overwritten with a higher fidelity, fecundity,
and longevity memeplex in order to assure long term
sustainability. When this is not practical, it is still
possible to displace a dangerous memeplex, by cre-
.
ating a more contagious benign meme utilizing cer-
tain packaging, replication, and propagation tricks.
The process of offensive memetic operations down
range should be sanctioned via a memetic annex in
the Theatre level operations order. This annex will
.
clearly articulate the commander’s intent for the
end state of the process. For instance, in order to
facilitate stability and support operations, the com- Figure 1. Memetic Component Definition.
44 Military Intelligence
sensors within their specific areas of expertise to col-
Introduce under cover agents into
society you wish to infect with goal lect and channel feedback to the Military Intelligence
ideas(s). (MI) control cell. The MI staff will make any nec-
essary adjustments to the message to achieve the
Agents indentify and indoctrinate
community leaders that are already
commander’s intent, while mitigating second and
suspectible to infection with third order effects, and then push the refined mes-
memetic structure of goals(s).
sage through the appropriate propagation platforms
once more.
Achieving the desired level of memetic satura-
. tion will result in the target population exhibit-
ing the artifacts and behaviors that will support
the ongoing coalition mission. It is important to
note, that the memetic process does not end here.
If a process of monitoring is not put in place to
ensure that the memetic message maintains a
critical mass, the target population may revert to
previous undesirably artifacts and behaviors. For
a relatively cheap ongoing investment, memetic
monitoring can insure that unforeseen and/or
emergent entities do not unravel the meme set
and compromise future security. This critical pro-
cess is detailed in Figure 4.
.
.
Commando Solo
HCT
Target
ACE MI CA Audience
NGOs/PVOs
IO
CW YES
Key: PAO
HCT = Humint Collection Team
CA = Civil Affairs
IO = Information Operations Diplomats
CW = Cyber Warfare Feedback Loop
- - - = Inorganic Asset
Figure 3. Brigade Level Memetic Propagation Model. Figure 4. Memetic Status Monitor.
46 Military Intelligence
Lethal Theory:
Some Implications
by Claudia Baisini and James M. Nyce
Introduction a deeper understanding of the local culture is criti-
The conflicts in which our Armed Forces are en- cal to the squad leader’s reading of the operational
gaged are increasingly characterized by large civilian situation due to the high density of civilian popula-
presence and involvement, difficulties in identify- tion in military operations in urban terrain.
ing possible threats, high tempo, and dense terrain. The findings suggested the issue of context is the
The concept of the “three block war,” introduced by most relevant way to think about culture, with an
General Krulak, reiterates the necessity of making emphasis on the visual dimension. In other words,
a broad range of decisions in little or no time at the to support the role of a unit’s leader in populated
micro tactical level.1 Far more complex than “shoot, settings–the three blocks, what he sees and reads
don’t shoot,” the group leader has considerable re- in the social landscape turned out to be paramount.
sponsibility in decisionmaking. In order for him to Furthermore, while it is possible to derive a generic
have the best possible situational awareness, he system of values that reflect the structure of the lo-
must have the necessary skills (not tools or rules). cal culture, it has to be kept in mind that countries
He must be provided with the capability of learning such as Afghanistan are highly fragmented among
from the operational context, stretching his mental diverse ethnic groups, tribes, and kinships. It is
models and transcending the obvious. necessary to gain a deeper local understanding, one
Research suggests that visual orientation is an that cannot be easily extrapolated from more gen-
important ability for a group leader in urban com- eral statements about a culture. It is highly context-
bat; what one sees and how one interprets what is dependent.
seen can be decisive. What has received less atten- U.S. Army and Marine Corps doctrines raise
tion is the fact that the ability to make fast decisions the issue of “learning” and, particularly, “learning
in a critical situation depends also on the ability to while acting” as paramount in the complex coun-
make the right judgment of the situation; to perceive terinsurgency (COIN) operational environment.
and understand context appropriately. Such ability Both FM 3-07 Stability Operations and FM 3-24
requires sophisticated context-based training that Counterinsurgency also stress the “bottom up” na-
gives the group leader the mindset to learn and un- ture of such operations. While orders come from
derstand the context appropriately while deployed. above, it is only at the local tactical level that proper
This following discussion stems from a study con- situational awareness can be achieved.4
ducted at the Swedish National Defense College in If we look at the squad leader in a three block war
2006 which focused on identifying the most rele- environment, what is crucial to him is the context
vant issues for conducting military operations in a which culture, of course, informs. Whether he is
built up area in a distributed operation.2,3 In distrib- leading his squad in patrolling (observation) or close
uted operations a battalion’s squads are generally quarter battle (CQB) or engaging against rebels or
autonomous and are spread throughout the opera- being ambushed, he needs to learn how to watch
tion area; thus, the squad leader has considerable and interpret what he sees and he must refer to the
decisionmaking power. The focus is on the squad local context (understand what he sees in relation
leader’s competence, judgment, and decisionmak- to where he is) rather than interpreting it based on
ing capabilities, which are highly dependent on his preconceived ideas or prior de-contextualized knowl-
situational awareness. The study’s premise was that edge/information. Furthermore, he must do it fast,
48 Military Intelligence
operational environment. The way in which an in- These two images (below left and right), represent-
dividual sees the world is the product of the indi- ing how a main road in Malawi looks, may seem un-
vidual’s personal history, experiences, upbringing, usual to most Westerners. What is unusual to us is
personality, and his social context. The interaction that there is always someone walking aside the road,
between the individual and the social context has any time of the day or night. Always. If this is related
the double effect of constructing how the individual and read through our Western experience, it would
sees the world (hence the way he acts) and, in turn, never be considered a main road. This is because ac-
constructing his social context.17 To put in Kurt cording to what is normal for us on a main road there
Lewin’s words behavior is a function of personality will be vehicular traffic and no pedestrians. We would
and context.18 suspect that something is wrong if we were driving on
The way we look at a situation defines (and limits) an interstate and saw many people walking along it.
what approach we will have in relating to that par- Hence, if we found ourselves in Malawi and saw
ticular situation. Everyday interaction tends to re- the road as illustrated in the first image, we would
confirm and reinforce previous habitus. To illustrate perceive the situation as normal. The very fact that
how our intuition can mislead us when it comes to the road looks normal to us (no people) is the most
understanding a variety of local contexts— relevant indicator for local people (or an intuitively
skilled warfighter) that there is something wrong.
This could be a main road to a rural community
anywhere. Also, what may be seen as normal in Malawi may not
be the case for a country road (Image 1) in Zimbabwe,
1
a neighboring country to Malawi. This raises the
question as to what extent we can generalize knowl-
edge about local conditions. There is a tendency to
either over generalize or over particularize knowledge
especially when it comes to cultures other than own.
This article will suggest a third, alternative path.
As Heuer19 describes, we tend to see what we ex-
pect to see, but we would like to add that what we
expect to see, what guides our attention, is a prod-
uct of our social context.20 Most attempts to take
local context into account have taken the route of
either learning basic content knowledge about oth-
ers or attempting to memorize normative rules and
principles that proscribe certain behavior. This ap-
Now look at the next pictures. proach to learning about local context has at least
2 3
50 Military Intelligence
ing change, revealing that attention is crucial for The method was developed by necessity. Streets
the detection of change. and alleys were often mined, entry points into build-
These results challenge traditional training and ings were watched or booby-trapped. An alternative
simulation paradigms that attempt to reproduce re- to usual ways of exit and entrance had to be in-
ality (the context) as perfectly as possible, to train vented or discovered; this is where creative thinking
the Soldier to a sort of automatic “internalized and came into the picture. Aviv Kokhavi, commander of
reflexive response.” We need to take these represen- the paratrooper brigade, had just returned from a
tations one step further. The role played by what leave during which he studied philosophy, social
the subject expects to see cannot be handled well science, and architecture; subjects that influenced
in photorealistic simulations as presently imple- his way to envisage battle. As he explained:
mented. These kinds of simulations do not help ac- “This space that you look at, this room that you
tors internalize the sort of reflex that guides quick look at, is nothing but your interpretation of
it. Now, you can stretch the boundaries of your
response to certain stimuli. What is often crucial in
interpretation, but not in an unlimited fashion,
operations in close interaction with civilian popula- after all, it must be bound by physics, as it
tion is to be able to see what we are not conditioned contains buildings and alleys. The question is
to see. To achieve this, we need to move education, how do you interpret the alley? Do you interpret
training, and simulation technology beyond a con- the alley as a place, like every architect and town
cern with detecting and reinforcing certain rules of planner, to walk through, or do you interpret the
behavior or by producing “better” reproductions of alley as a place forbidden to walk through? This
depends only on interpretation. We interpreted
reality. The task should be to support staff capabil-
the alleys as places forbidden to walk through,
ity to recognize what is salient in that reality, and to and the door as a place forbidden to pass
teach them to move beyond the paradigms of what is through, and the window as a place forbidden to
obvious to them in order to understand the context look through, because a weapon awaits us in the
in which they are immersed, and act accordingly. alley, and a booby trap waits up behind the doors.
This is because the enemy interprets space in a
Transcending the Obvious: Lethal traditional, classical manner, and I do not want
Theory to obey this interpretation and fall into his traps.
Eyal Weizman’s Lethal Theory illustrates a way Not only do I not want to fall into his traps, I want
to surprise him! This is the essence of war. I need
of thinking that transcends the obvious. In a 2002
to win. I need to emerge from an unexpected place.
operation in Nablus the IDF (Israel Defense Force) And this is what we tried to do.”36
conducted a maneuver their commander described
Weizman’s argument is that to become effective
as “inverse geometry,” the reorganization of the ur-
warfighters in urban contexts it is necessary to:
ban syntax by means of a series of micro-tactical
actions.”33 By reinventing the way the topography 1. Realize what common sense representations
of a whole town is regarded soldiers literally moved are.
“through walls.” They did not use any roads, streets, 2. Use high order social theory to destabilize the
courtyards, etc. that constitute the logical, alleged “taken for granted” order of things.
common sense syntax of the city. They did not use 3. Use the same theoretical set to identify strategic
windows or doors. Rather “they moved horizontally advantage.
through walls and vertically through holes blasted In other words, the capability to visualize opportu-
in ceilings.”34 Walls are no longer barriers and nities that otherwise would be masked by common
streets are no longer ways through; all conventional sense. What is relevant is not so much that the end
geographic marks of a city were inverted or turned result is that the topography of an urban setting is
upside down. “Rather than submit to the authority exploited (that of course is the endpoint of any doc-
of conventional spatial boundaries and logic, move- trine and strategy.) Rather it is to deconstruct the nat-
ment became constitutive of space. […] The IDF ural order of things as one’s opponent understands
strategy of “walking through walls” involved a con- it and from this deconstruction gain operational ad-
ception of the city as not just the site, but the very vantage. What Weizman does not discuss in detail is
medium of warfare–a flexible, almost liquid, medium how this might be taught to frontline warfighters. It
that is forever contingent and in flux.”35 appears that he assumes that an adequate grasp of
52 Military Intelligence
Experiential and Situated Learning ways of thinking, one has to be less bound by what
Lave, contrasting with most traditional classroom is perceived as obvious or passively learned such
learning activities that involve abstract, but not asas “typical behavior of the local culture,” to being
necessarily contextualized knowledge argues that more receptive, agile, and prone to catch reality in
learning is situated, learning is embedded within ac- its whole and its details: le Coup d’Oeil.
tivity, context, and culture.44 Knowledge needs to be
Endnotes
presented in authentic contexts–settings and situa-
tions that would normally involve that knowledge. 1. General Charles C. Krulak, “Cultivating Intuitive Decision
Making,” Marine Corps Gazette, May, 1999. Accessed at
Not only should it be presented in authentic http://www.au.af.mil/au/awc/awcgate/usmc/cultivating_
contexts, we would argue, but the method should intuitive_d-m.htm
also combine such contextualization with ac- 2, 3. Claudia Baisini and James M. Nyce, ”Mapping Culture (MAC),”
tive participation. Kolb developed the concept Concept Study Final Report, Swedish National Defense College,
January 2007.
of Experiential Learning from the work of Kurt
Lewin. According to Lewin little substantial learn- 4. FM 3-24/USMC 3-33.5 Counterinsurgency, December 2006 and
ing takes place without the involvement of some FM 3-07 Stability Operations, October 2008.
or all of the following dimensions: 5. Major Brian R. Reinwald, “Tactical Intuition,” Military Review,
September-October 2000, 88.
ÊÊ Watching.
6. Krulak.
ÊÊ Thinking.
ÊÊ Feeling. 7. Ibid.
ÊÊ Doing.45 8. Ibid.
Without engaging such dimensions we remain 9. Colonel James E. Mrazek, “Intuition: An Instantaneous Backup
System?”Air University Review, January-February 1972. Accessed
not much more than passive recipients and passive
at http://www.airpower.au.af.mil/airchronicles/aureview/1972/
learning alone does not engage our higher brain func- jan-feb/mrazek.html.
tions or stimulate our senses to the point where we
10. Krulak.
incorporate the lessons into our existing schemes.46
11. Reinwald, 86.
We must put our knowledge into action.
12. Ibid., 80.
Conclusion
13. Lieutenant Colonel Kelly A. Wolgast, “Command Decision
Well designed education and training that aims at
Making: Experience Counts,” USAWC Strategy Research Project,
developing the necessary competencies and skills to Carlisle Barracks, 2005, 2. Accessed at http://www.au.af.mil/au/
learn about a new context (while engaging with it) is awc/awcgate/army-usawc/cmd-decis-mkg.pdf.
what is needed to prepare our Soldiers to meet the 14. David J. Bryant, PhD, Robert D.G. Webb, PhD, and Carol
challenges of the complex operational enviroment. McCann, “Synthesizing Two Approaches to Decision-making in
Such education would be one that forces them to take Command and Control,” Canadian Military Journal, Spring 2003.
Accessed at http://www.journal.forces.gc.ca/vo4/no1/command-
charge of the problem at hand, break it down, turn it,
ordre-01-eng.asp.
look at it from all angles, and decide what more infor-
mation they need to make a decision about what to do 15. Gary A. Klein, Sources of Power: How People Make Decisions
(Cambridge: MIT Press, 1998).
next. This is what simulation technology might profit-
ably be used for–to allow the staff to learn how to liter- 16. Wolgast, 7.
ally look through a building, break it down in pieces, 17. Peter L. Berger and Thomas Luckmann, The Social Construction
turn it, rotate it, and consider a variety of options– of Reality: A Treatise in the Sociology of Knowledge (Garden City:
Anchor Books, 1966).
some intuitive, some not so obvious.
18. Kurt Lewin, “Field Theory in Social Science: Selected Theoretical
It is not the simulator that should do this for Papers,” D. Cartwright, ed. (New York: Harper and Row, 1951).
them; nor is it necessary in order to achieve this
19. Richards J. Heuer, Jr., Psychology of Intelligence Analysis
kind of competence to reproduce a populated “vil- (Hauppauge: Nova Science Publishers Inc., 2006).
lage” for them. Rather the task here is to help them
20. Social context that is generated by interactions among people,
to play with what we think reality is, and go beyond
but also among people and things. For more about this see John Law
it, in other words to transcend the obvious. In or- and John Hassard, “Actor Network Theory and After,” Sociological
der to stimulate the development of more creative Review Monographs (Oxford: Wiley-Blackwell, 1999).
22. Marvin M. Chun and Ingrid R. Olson, “Perceptual Constraints on 42. Mrazek.
Implicit Learning of Spatial Context,” Visual Cognition 9 (3) (2002):
43. Geoffrey R. Norman and Henk G. Schmidt, “The Psychological
273-302.
Basis of Problem-based Learning: A Review of the Evidence,”
23. Justin A. Junge, Brian J. Scholl, and Marvin M. Chun, “How Academic Medicine 67 (9) (September 1992).
is Spatial Context Learning Integrated over Signal Versus Noise? A 44. Jean Lave, Cognition in Practice: Mind, Mathematics, and Culture
Primacy Effect in Contextual Cueing,” Visual Cognition 15 (1) (2007): in Everyday Life (New York: Cambridge University Press, 1998).
1-11.
45. David A. Kolb, Experiential Learning: Experience as the Source
24. Marvin M. Chun, “Scene Perception and Memory.” Accessed at of Learning and Development (Englewood Cliffs: Prentice Hall Inc.,
http://camplab.psych.yale.edu/articles/Chun_03PLM.pdf. 1984).
25. Ullman in Chun and Olson, “Perceptual Constraints on Implicit 46. Ibid.
Learning of Spatial Context,” Visual Cognition 9 (3) (2002): 273.
27. Marvin M. Chun, “Contextual Cueing of Visual Attention,” Claudia Baisini, M.Sc. attended the University of Milan, and
Trends in Cognitive Sciences 4 (5) (May 2000):170-177. Aberdeen King’s College completing studies in Organizational
28. Marvin M. Chun and Rene Marois, “The Dark Side of Visual
Studies, Cross Cultural Strategy, International Business, and
Attention,” Current Opinion in Neurobiology 12 (2002), 184-189. Organizational Change and Learning. Following a term at
Copenhagen Business School in Cross Cultural Marketing
29. Steven B. Most, Brian J. Scholl, Erin R. Clifford, and Daniel J. Strategy she took her M.Sc. in International Management
Simons, “What you See is What You Set: Sustained Inattentional
at the Graduated Business School of the University of
Blindness and the Capture of Awareness,” Psychological Review 112
Gothenburg, Sweden. Her Master’s Thesis was on “Knowledge
(1) (2005): 217-242.
in Knowledge Intensive Organizations: The Case of Crime
30. Chun and Marois, “The Dark Side of Visual Attention.” Investigation and Consulting Firms.” She joined the staff of
31. Todd A. Kelley, Marvin M. Chun, and Kao-Ping Chua, “Effects of the Swedish National Defense College in Stockholm 2004
Scene Inversion on Change Detection of Targets Matched for Visual where she participated in such projects as Planning under
Salience,” Journal of Vision 2 (2003), 1. Time and Pressure in COIN (PUT) and squad leader Situational
Awareness in MOUT. Her current focus is on the development
32. Ibid., 1-5.
of a method to understand the mindset of relevant actors
33. Eyal Weizman, Hollow Land: Israel’s Architecture of Occupation in the area of operations, based on how our biases and
(London: Verso, 2007), 53. categorizations influence our own understanding. She is
34. Ibid. also researching the development of education, training,
and methods to enhance observation skills and foster
35. Ibid. meta-cognition and re-framing. The project is conducted in
36. Brigadier General Aviv Kokhavi in Eyal Weizman “Hollow Land: cooperation with the FBI Academy (Behavioral Science Unit,
Israel’s Architecture of Occupation” (London: Verso, 2007), 55-56. Terrorism Research and Analysis Project) and USJFCOM
J9 within the framework of MNE6. Ms. Baisini is a PhD
37. Mrazek, 6.
candidate in Neuroscience at Karolinska Institute, Stockholm
38. Ibid. Brain Institute. Her doctoral project combines her previous
49. Lewin. knowledge in Organizational Theories with Neuroscience in
research on neurological implications of learning creativity
40. As an example, for a micro-tactical exercise squad leaders
(divergent thinking), re-framing and plasticity. She is an
might be given an operational task in a built up area that they must
adjunct lecturer of Anthropology at Ball State University and
perform using a glass model (Glass-Box™) of the built up area. This
model represents all the structural elements of small, multi-level
may be reached at [email protected].
Middle East urban area, is transparent on all sides, and can be
assembled and reassembled (deconstructed) in many different ways. James M. Nyce, PhD is an associate professor in the
It is designed to support both visualization and decomposition of Department of Anthropology, Ball State University. He is
what both the problem and a solution might look like. The Glass- a visiting professor in military technology and war science
Box™ design also adds the very important tactile dimension to
at the National Defense College, Stockholm, Sweden from
the drill. Soldiers could use the model, possibly divided into two
1998 through 2000 and 2005 to the present. Since 2005,
competing teams, to find situationally appropriate solutions to
the task, since an obvious common sense solution, (such as going
he has been scientific advisor to a research project that has
through doors and windows) is forbidden by the exercise’s rules. focused on the military intelligence function, organizational/
What Glass-Box™ methods and exercises are designed to support is technological change and professional development. He
the kind of intuitive, reflexive operational context specific awareness is also visiting professor in Lund University’s Master’s
we have discussed and argued for here. Program in Human Factors.
54 Military Intelligence
1st School Brigade. It is here that he revitalized
training and incorporated students in the Officer
Basic Course as junior leaders.
In January 1985, he headed to Turkey where
he would serve as the OIC of Space Operations
(Hippodrome), Field Station Sinop, until January
1986. In February 1986, CPT Baker was assigned
to the Pentagon as both Staff Action Officer and the
Staff Action Control Officer. In June 1989, Major
Baker returned to Germany as the Intelligence
Officer to the 2nd Armored Calvary Regiment,
Nurnburg Germany. In June 1990, he took com-
mand of 502nd MI Company and conducted intel-
ligence operations in support of Operation Desert
Storm. In November 1991, he assumed the duties
of the Deputy Regimental Executive Officer, 2nd
Armored Cavalry Regiment.
After three years in Germany, Lieutenant Colonel
Baker took command of the 124th MI Battalion, 24th
Infantry Division (Mech), Fort Stewart, Georgia. As
Commander, he built and tested the first Analysis
and Control Element in the Army. He pioneered this
new MI concept and developed the tactics, tech-
niques, and procedures that became the basis for
Colonel Daniel Baker (U.S. Army, subsequent Army doctrine.
Retired)
Colonel Daniel Baker enlisted in the U.S. Army He left command in June 1994 to attend the
in 1970 and later commissioned in 1976 as a National War College at Fort McNair, Washington,
Second Lieutenant, Military Intelligence (MI), D.C. LTC Baker returned to the Pentagon where
completing the MI Officer Basic Course at Fort he held the position of Intelligence Coordination
Huachuca, Arizona. His first assignment as a 2LT Officer (Europe), J2 Joint Staff/Defense Intelligence
was serving as the Deputy Officer in Charge (OIC), Agency for two months before transitioning to the
Detachment I, 201st Army Security Agency (ASA) J2’s Executive Officer. Fifteen months later he filled
Company, Wurzburg and then Detachment M, the role of J2 Special Assistant for seven months fol-
Stuttgart, Germany. He later moved to Augsburg lowed directly by the position of the Assistant J2.
and assumed duties as the Operations Officer In June 1998, Colonel Baker assumed command
of the 201 st ASA Company. In February of 1981, of the 513th MI Brigade, U.S. Army Intelligence
Captain Baker returned to Fort Huachuca where and Security Command, Fort Gordon, Georgia.
he assumed duties as the Branch Chief/ Senior There he introduced new enduring operational
Instructor of the Advanced Individual Training constructs and capabilities, including the Army’s
Company, U.S. Army Intelligence Center. He was first operations level Measurement and Signature
also the Commanding General’s Aide-de Camp Intelligence Exploitation. In July 2000, he became
and Commander, Delta Company, 2 nd Battalion, the Assistant Chief of Staff for Intelligence (G2),
56 Military Intelligence
Upon graduating in January 1990, MSG Chunn Brigadier General Richard T. Ellis (U.S.
was assigned as the I Corps Tactical Operations Army, Deceased)
Center Support Element Sergeant Major at Fort Brigadier General Richard T. Ellis was commis-
Lewis. In March 1990, he deployed in support of sioned as a Second Lieutenant, Military Intelligence
Team Spirit, Republic of Korea, and while deployed (MI) in 1978 and reported to MI Officer Basic Course
was notified of his selection to Sergeant Major and at Fort Huachuca. His first assignment was serv-
appointment to Command Sergeant Major. Once ing as the Foreign Area Officer and later Intelligence
he returned to Fort Lewis, he assumed duties as Contingency Fund Class A Agent, 500th MI Group,
the CSM, 109th MI Battalion. After the inactivation Camp Zama, Japan. In August 1980, First Lieutenant
of 109th in May 1991, CSM Chunn was assigned Ellis became the Administration Officer of the 149th
as the CSM of the 14th MI Battalion, 201st MI Military Detachment, 500th MI Group. In August
Brigade. He subsequently served as the Brigade 1981, he was assigned to the 500th MI Group as
CSM for the 201st MI Brigade before moving to the the Assistant Operations Officer/Team Chief of the
524th MI Battalion, 501st MI Brigade in 1993. In Foreign Liaison Detachment.
March 1995, CSM Chunn assumed duties as the
CSM of the 748th MI Battalion in San Antonio, Upon his return to the U.S. in 1982, 1LT Ellis at-
Texas. After ten months, he was reassigned to tended the MI Officer Advanced Course at Fort
Fort Meade, Maryland to serve as the CSM of the Huachuca. In March 1983, after his promotion to
704th MI Brigade from 1996 to 1998. Captain, he headed to Fort Bragg, North Carolina,
where he assumed duties as the Counterintelligence
CSM Chunn’s final assignment was as the CSM
(CI) Team Chief and later the Intelligence Officer of
of the U.S. Army Intelligence School and Fort
1st Battalion, 7th Special Forces Group (Airborne),
Huachuca. In this post, he initiated the Enlisted
Joint Task Force-11, Honduras. After approximately
Assignment Council and a local chapter of the
two years, CPT Ellis became the Chief of Combined
Sergeant Audie Murphy Club. He also established
Security Element and Assistant Intelligence Officer of
the Doctor Mary Walker Award Program, recogniz-
the 1st Special Forces Operational Detachment-Delta
ing outstanding service for volunteers as well as the
CSM (Retired) Doug Russell Award Program, recog-
nizing junior MI enlisted soldiers. In January 2001,
CSM Chunn retired from active duty after serving
honorably for 30 years.
CSM Chunn’s civilian education includes a BA in
Liberal Arts from the University of the State of New
York and an MA in Management from the University
of Phoenix. His military education includes the
Airborne Sensor Specialist Course; the Basic
Leadership Course; the Advanced Noncommissioned
Officer’s Course; the Criminal Investigation Course;
the Instructor System Development Course; and the
Sergeants Major Academy.
His military awards and badges include the
Distinguished Service Medal; the Meritorious
Service Medal (7 OLCs); the Army Commendation
Medal (3 OLCs); the Army Achievement Medal; the
Good Conduct Medal (10th award); the Air Force
Outstanding Unit Award; the Joint Meritorious Unit
Award; the Army Service ribbon; the Overseas Service
Ribbon; the Noncommissioned Officer Professional
Development Ribbon; the National Defense Service
Medal, and the Senior Aircraft Crewmember Badge.
58 Military Intelligence
then as the first S1, Signals Intelligence Directorate,
National Security Agency at Fort Meade, Maryland.
In 2001, BG Fast assumed duties as the Director
of Intelligence, J2, U.S. European Command in
Stuttgart, Germany where she served with dis-
tinction for two years. Following her time in
Germany, BG Fast returned to Fort Huachuca
where she had begun her career 25 years earlier.
There she served as the Assistant Commandant
of the U.S. Army Intelligence Center and Fort
Huachuca. While in this position she deployed
to Iraq to become the first Director of Intelligence
(C2) for Combined Joint Task Force-7, then Multi-
National Forces-Iraq, Operation Iraqi Freedom.
Upon returning from Iraq, Major General Fast
served as the Senior Intelligence Officer before as-
suming command of the U.S. Army Intelligence
Center and Fort Huachuca where she served as
the Commanding General for over two years.
MG Fast’s final assignment was the Deputy
Director of the Army Capability Integration
Center and G9 at the U.S. Training and Doctrine
Intelligence Production Section, then Adjutant in
Command, Fort Monroe, Virginia. In July 2008,
the 303rd MI Battalion. In June 1983, she was se-
MG Fast retired from active duty in the U.S. Army
lected over numerous combat arms nominees to be-
after having served honorably for over 32 years.
come the first female Aide-de-Camp to the Deputy
Commanding General, III Corps. In 1984, CPT Fast She is a graduate of the MI Officer Basic and
headed to Alexandria, Virginia where she served first Advanced Courses; Intelligence Staff Officer
as the MI Professional Development Officer, then as Course; Tactical Surveillance Officer Course;
the Captain’s Assignment Officer, MI Branch, and Defense Sensor Interpretation and Application
finally as the Special Operations Assignment Officer Training Course; the Armed Forces Staff College,
at the U.S. Army Military Personnel Center. and the U.S. Army War College. She holds BS in
Education degrees in German and Spanish from
In July 1987, Major Fast was assigned as the Chief
the University of Missouri, an MS in Business
of the Advanced Systems Section, J2, U.S. European
Administration from Boston University, and an
Command at Stuttgart, Germany. After two years,
Honorary Doctorate of Laws from Central Missouri
MAJ Fast became the Executive Officer of the 18th
State University.
MI Battalion, Munich, Germany. While assigned to
Munich she also served as Deputy, and then later, MG Fast’s awards and badges include the Defense
as the Chief of the Intelligence Division, 66th MI Superior Service Medal (1 OLC); the Legion of Merit;
Brigade. In 1992, Lieutenant Colonel Fast assumed the Bronze Star Medal; the Defense Meritorious
command of the 163rd MI Battalion, Fort Hood, Service Medal; the Meritorious Service Medal (4 OLCs);
Texas. Following command, LTC Fast became the the Joint Service Commendation Medal; the Army
first ever female Division G2, 2nd Armored Division Commendation Medal; the Army Achievement Medal
at Fort Hood, Texas. In 1996, Colonel Fast took (1 OLC); the National Defense Service Medal with one
on a third command, this time the 66th MI Group Bronze Service Star; the Global War on Terrorism
(Provisional) in Augsburg, Germany. Returning to Expeditionary Medal; the Army Service Ribbon; the
the U.S., Brigadier General Fast embarked upon a Overseas Service Ribbon; the Joint Meritorious Unit
new position as the Associate Deputy Director for Award; the Meritorious Unit Commendation, and the
Operations/Deputy Chief, Central Security Service, Army Superior Unit Award.
60 Military Intelligence
2011 Military Intelligence Corps
Hall of Fame Nomination Criteria
This is the Digital Age! Why are we printing millions tive technologies might just be eReader technology.
of pages per year? This set the stage for launching a series of eReader
—Major General John M. Custer III, trials throughout 1st and 2nd quarters of 2010.
Commanding General, USAICoE, March 2009
It seemed timely to pursue this, since the U.S.
Introduction Army Training and Doctrine Command had just
The above statement from the Commanding General sent a memorandum on 3 April 2009 supporting
(CG) was the impetus kicking off the explora- eReaders for reducing printing: “eReaders can pro-
tion of using eReader technology at the U.S. Army vide one possible solution for the current practice
Intelligence Center of Excellence (USAICoE) instead of printing and physical distribution of courseware,
of traditionally printing and distributing course training support materials and products.” In addi-
materials to the hundreds of students attending tion, several universities throughout the country
classes. The CG was referring to the fact that the (University of Washington, Arizona State University,
Training Materials Support Branch (TMSB) in 2009 Princeton, Case Western Reserve University, and the
printed almost 20 million pages of courseware for University of Virginia) had jumped on the eReader
the classes at the Intelligence School. For example, bandwagon and were conducting trials. The focus of
the MI Captains Career Course alone issues 60 doc- these university studies was mainly on environmen-
uments to 880 students in 27 classes during the tal issues, cost savings, and the impact on learning.
year–many of these documents are Field Manuals
and consist of hundreds of pages. Selecting an eReader for the Trials
eReaders were emerging technology in the summer
Instead of issuing a huge package of printed materi-
of 2009 and few were on the market. The iPad was
als (Field Manuals, Army Regulations, student hand-
just a rumor and other devices such as the Plastic
outs, practical exercises, etc.), why not issue a small
Logic Que were many months from hitting the mar-
device which holds all of the documents? This de-
ket. As such, only four eReader devices were evalu-
vice is called an eReader, which is a small hand-held
ated based on the prioritized requirements of the
digital reading device. It is lightweight, portable, and
school. As Table 1 shows, the JetBook, the Amazon
reads and feels like a book. Many are wireless, allow
Kindle DX, the Sony and the iRex were all consid-
notetaking and some even read to you. The devices
ered for the trials. The prioritized requirements were
are searchable, so if you want to find information on
the following: the screen had to be large enough to
a topic you can search hundreds of documents and
read PDF documents; content had to be searchable;
books residing on the eReader in an instant.
and the device had to have the capabilities for book-
Background marking and notetaking. Although more costly than
In June 2009, the CG asked Dr. Vee Herrington, Table 1 eReader Requirements
62 Military Intelligence
the Sony, the Kindle DX was selected because of the nary Kindle trial results showed that the students
larger screen size. liked the idea of eReader technology but felt that the
Kindle lacked some of the capabilities. They wanted
eReader Trials and the Endstate
a touch screen and thought the Kindle was too slow
Requirements
and would often freeze up–especially during quiz-
Prior to embracing an emerging technology,
zes! The following classes were selected for the trials:
USAICoE needed to run trials to look at the impact
Basic Officer Leaders Course (BOLC), Senior Leaders
on learning of using eReaders. Will the instructors
Course (SLC), Brigade Combat Team S2 Course (BCT
and students find them an acceptable alternative to
S2) and the Warrant Officer Basic Course (WOBC).
paper? Will eReaders be durable enough? Will they
Table 3 Conduct of eReader Trials
have the features and capabilities that students want
in an eReader? Cost savings was also an issue–over
the next five years, would eReader technology save
money over printing costs?
An endstate is the set of required conditions that
defines achievement of the commander’s objectives.
The eReader endstate is:
ÊÊ USAICoE adopts eReader technology as the main
training material source.
ÊÊ Best eReader on the market, based on value,
capabilities, and durability is selected.
ÊÊ Students and instructors find the eReader an Before each trial, class training was conducted on
acceptable alternative to paper. how to use the eReader. A survey instrument was
ÊÊ eReader does not degrade learning. created to measure behaviors and attitudes toward
ÊÊ USAICoE saves money over printing costs and eReader technology. In addition to collecting demo-
students read more books on the CG’s Reading graphic data, 17 survey questions focused on the
List with better availability. ease of use of the eReader, the attitudes of using
eReader technology instead of paper copies for class
Measures of Effectiveness
materials, reading and study habits, capabilities
The Army uses measures of effectiveness (MOEs) to
they desired in an eReader, and problems encoun-
give insight into how effectively a unit is performing.
tered during quizzes and tests using an eReader.
For the eReader project the MOEs in Table 2 were de-
veloped so an informed decision regarding the future The instructors also were surveyed and asked
of eReader technology at the school could be made. questions related to instructional issues. For exam-
Do trial results support continuing and expanding ple, they were asked if they had to change the way
the eReader project to include future classes? they instructed because the students were using the
Table 2 Measures of Effectiveness eReader. Did the instructors give the students more
time during quizzes and tests or did they teach at
a slower pace? Also, the instructors were surveyed
about whether they felt the class did as well aca-
demically as previous classes. In addition to the in-
structor survey questions, the grade point averages
(GPAs) of previous classes were obtained.
Results
Besides the survey instrument questions, after ac-
tion review comments were collected. Even though
Five trials were conducted between September 2009 the majority of the participants agreed they would
and March 2010. The Kindle DX was the main focus prefer eReader technology to carrying around a pile
of the trials. However, a smaller trial of 20 students of books and documents, they felt that neither the
using the Sony Reader was conducted since prelimi- Sony nor the Kindle DX was the perfect solution.
Endnote
1. Sarah Rotman Epps and James McQuivey, “Ten Predictions
for the E-Reader/E-Book Market in 2010,” Forrester Research, 1
December 2009, accessed at http://paidcontent.org/article/419-
ten-predictions-for-the-e-book-market-in-2010
64 Military Intelligence
by Chief Warrant Officer Two Raul Negron, Jr.
Yesterday, Today, and Tomorrow: The Army began fielding the TES-FWD during the
Facts and Misconceptions early part of this decade, as a Corps and Echelons
The Tactical Exploitation System-Forward (TES- above Corps system used to support Corps and
FWD) is an integrated Tactical Exploitation of Theater Commander’s priority intelligence require-
National Capabilities (TENCAP) System, the lin- ments (PIR). The TES-FWD was built to merge the
eage of which can be traced back to the Modernized functions of the MIES, ETRAC, and AEPDS into a
Imagery Exploitation System (MIES), the Enhanced single system. The system reduced tactical foot-
Tactical Radar Correlator (ETRAC), and the prints and improved the ability to leverage National
Advanced Electronic Processing and Dissemination and theater level Imagery Intelligence (IMINT) and
System (AEPDS). The MIES received and processed SIGINT data in support of warfighting capabilities.
National imagery data. The ETRAC system pro- The TES-FWD is recognized for its Electronic
cessed Advanced Synthetic Aperture Radar data Intelligence (ELINT) capabilities. Providing ELINT
from theater intelligence, surveillance, reconnais- support to commanders is critically important, as it
sance platforms, while the AEPDS was responsible provides details of adversary radar and Electronic,
for receiving and processing theater and nationally Missile, and Ground Orders of Battle. ELINT contin-
derived Signals Intelligence (SIGINT) data. All three ues to provide the U.S. and its allies with situational
were stand-alone systems, serving as pre-proces- awareness and indications and warnings (I&W) re-
sors for the All Source Analysis System. garding threat countries’ radar, missile, and ground
force postures and intentions. ELINT supported
conflicts such as the Cold War, Operations Desert
Storm/Desert Shield, and will continue to support
major conflicts of the future. The threat of a high
intensity conflict still exists, and as in the plan-
ning and execution coordinated by Coalition Forces
in support of the initial phase of Operation Iraqi
Freedom (OIF), ELINT will always be one of the pri-
mary intelligence disciplines used to support major
combat operations of the future.
Often overlooked are the TES’ Communications
Intelligence (COMINT) capabilities. Understanding the
TES’ full capabilities also allows commanders to lever-
age COMINT data. Today’s conflicts–OIF, Operation
Enduring Freedom (OEF), the Horn of Africa, the
CW2 Raul Negron in Baghdad, Iraq. Next to him is the TES-FWD’s
Advanced Miniaturized Data Acquisition System antenna, which Philippines, and other theaters of interest–are COMINT
provides access to SIGINT data. orientated fights. Fully utilizing the TES’ COMINT ca-
66 Military Intelligence
ity. The TES’ JWICS network feeds are similar to mized footprint system has been consistent with the
the SATCOM feeds. However, unlike the SATCOM Army’s force modularization process.
feeds, the network feeds contain intelligence data The threat of conventional warfare against the
of a higher classification. This intelligence data en- U.S. remains a reality. The TES-FWD is ready and
hances the Secret level data received via the TES’ able to support such a conflict. Its various ELINT
SATCOM broadcasts, which results in increased sit- processing capabilities will ensure commanders
uational awareness across the battlefield. and their forces are provided the most timely and
Combat support takes place on the TES’ Secret accurate enemy missile, radar, and ground disposi-
level network. This level of intelligence is relayed tions. Today, however, the TES-FWD is also able to
to units supporting numerous types of operations. support the OIF and OEF unconventional COMINT
In Iraq, units based their Electronic Warfare (EW) fights. The TES-FWD’s multiple receive and trans-
support on the intelligence exploited and analyzed mit paths and its inherent ability to interface with
by TES analysts. TES SIGINT analysts monitored communications enabling systems and National
historic and immediate intelligence reporting, and systems has proven to be the TES-FWD’s strength.
when required, disseminated NRT I&W to convoys As an integral part of MNC-I, the I Corps TES-FWD
within their areas of responsibility. TES analysts has supported elements that range from logistics
also cross-cued simultaneously with National, the- and support units, to special operations units, and
ater ISR, and EW assets to refine threat reporting. to Corps and above customers.
High interest tippers were relayed over chat chan-
nels to EW personnel, who relayed threat reporting
to ground units and EW support. The cross-cueing
results undoubtedly saved Coalition Force lives dur-
ing convoy operations.
The TES-FWD’s ability to interoperate and
cross-cue with National systems is what truly
makes the system distinct. It receives real-time
downlinks from select National systems. The
downlinks are received and processed within the
system’s internal servers and processors and are
used to conduct SIGINT analysis. The results
were used to provide EW analytical support to
special operations units during time-sensitive
targeting missions. Throughout the course of
their deployment, I Corps TES SIGINT analysts
Courage!
helped facilitate the detainment of persons of in-
terest. The downlinked data was also used to con- The misconception that TES only provides ELINT
duct COMINT searches. Typically, the COMINT support and is only suited for conventional warfare
searches were used to provide situational aware- nearly resulted in leaders overlooking the SIGINT
ness in support of counter-smuggling and coun- capabilities organic to it. TES is equally capable of
terinsurgency requirements. providing SIGINT support to the unconventional
Conclusion fight, as clearly demonstrated by the I Corps TES
Over the last 20 years, TENCAP SIGINT sup- team during OIF 09-11.
port systems have provided direct access to intel- As the War on Terror continues, the TES-FWD’s
ligence for commanders. The capabilities of these design makes it configurable and tailorable to sup-
systems improved as technological advancements port large scale or smaller conflicts. Its deployability
made the gathering, processing, and exploitation of is based on the intelligence requirements necessary
intelligence data more accessible and timely. Their for commanders to accomplish their missions and
migration from many stand-alone and large foot- offers commanders an expeditionary capability. OIF
print systems to a single multi-purpose and mini- requirements have called for the full employment of
68 Military Intelligence
Professional Reader
A Vietnam War Reader: A Documentary
History from American and Vietnamese
Perspectives
by Michael H. Hunt, Ed.,
(The North Carolina Press, Chapel Hill, NC, 2010)
256 pages, $59.95, ISBN 978-08078-5991-9
One of the characteristics of a good book is the pre-
sentation of both sides to a story. This is what the au- However, the gist of the book is really about the
thor has done in providing a masterful commentary Vietnam War period and American involvement in it
of the Vietnam War and the American involvement through a Vietnamese perspective. It is in this time
in it. He has gathered a wide variety of viewpoints frame that readers are exposed to a series of com-
and sources of information about one of America’s munications made by a wide variety of individuals
most controversial wars showing the reader how it on both sides who were affected by the Vietnam War
affected many different individuals. The uniqueness or who felt a need to comment on it. These com-
of the book is that we as Americans and others get munications contain comments made all the way
important insights into how the North Vietnamese from low ranking soldiers on both sides of the con-
viewed the war, what they did, and how it affected flict to major world leaders such as the president
them. However, there is also considerable coverage of the U.S. and the leader of North Vietnam. For
of how it affected the Americans who served in that example, a private first class who fought for North
controversial war. Vietnam in the Tet Offensive and who was later cap-
The book, however, is not just about America’s tured, notes that he wanted to liberate the country
relation to the war or Vietnamese participation in from the American imperialist. (155) On the other
it. For example, the author begins the work with a hand, a young American army soldier wrote to his
basic chronology of events affecting Vietnam and Mom and Dad that “Everything is just fine—in fact
ends it with American diplomatic relations being it’s better than I thought it would be,” even though
established with Vietnam in 1995. The amount he was later killed. (127) Contrasting views of one’s
of information found in the book before the huge involvement, perceptions, and experiences of indi-
American military presence comes about is quite viduals on both sides of the war are what make this
interesting and valuable because it helps to un- book so interesting and different from other books
derstand the motivation and characteristics of about the Vietnam War which generally give just
the Vietnamese people. What we see is a country one side’s view. The North Vietnamese are pictured
dominated for a long time by foreigners and ex- as being motivated in the war by a strong sense of
ploited in various ways by outsiders. We also see patriotism and a desire to unite Vietnam into one
a strong sense of unity among the people, coupled country, while the U.S. is pictured as fighting to
with a feeling of nationalism, and a desire for in- stop the spread of communism. A need recognized
dependence. For generations, indigenous leaders by the North Vietnamese to enlist the popular sup-
had sprung up in Vietnam to improve the coun- port of ordinary peasants is also contrasted with the
try, but were often made ineffective by outside po- My Lai Massacre where a large number of unarmed
litical interests. After the Vietnam War and the peasants were killed by the American soldiers.
Americans depart the country once becomes uni- Although the book does contain reflections of mili-
fied with a hope for improvements. tary personnel on both sides, there is plenty of com-
Read any
good books
lately?
We welcome reviews of books related to
Intelligence or Military History. Please re-
view our list of available books and book
review submission standards under the
Professional Reader Program at https://
icon.army.mil/apps/mipb_mag/.
70 Military Intelligence
Professional Reader
The Enemy in Our Hands
by Robert C. Doyle,
(The University Press of Kentucky, Lexington, KY, 2010)
496 pages, $34.95, ISBN: 978-0-8131-2589-3
This book is about the treatment of enemy prison- both sides at times seemed to be lacking as exem-
ers of war (EPWs) held by the Americans. Its author, plified by events present at the Union POW camp in
Robert C. Doyle, has published two other works Elmira, New York and the Confederate POW camp
dealing with the subject of POW status. He has also at Andersonville, Georgia.
been a consultant for a number of documentary film
As mentioned above, a country’s culture also af-
projects and has made presentations regarding his
fected the way EPWs were treated. Japan (during
professional interests at various prestigious institu-
World War II) is cited as an example. Examples of
tions such as the U.S. Air Force Academy. Hence, he
Japanese culture of the times that may have influ-
is quite capable of writing on the subject of POWs.
enced how Americans treated Japanese prisoners
The author notes that “the objective of this work is
are illustrated in the following quotes: “Because they
to contribute to filling in some blanks left hazy, and
believed that surrender was an act of shame and dis-
in many cases, empty in the many studies of the
grace to all soldiers of all nations, the white flag of
American experience of war.” (xvii)
surrender meant little to the Japanese. Regardless
The scope of the book is quite large since it covers of how deceitful it may have seemed, Japanese sol-
the period from the Revolutionary War to the cur- diers often lured their enemies into open death
rent War on Terror. One of questions researched by traps where, instead of surrendering honorably,
Doyle was how the U.S. treated its enemy EPWs. The they waited in ambush. Wounded men kept hand
answers depended on a number of factors such as grenades for use against unsuspecting enemy sol-
what wars, what times, and who the enemy was at diers who attempted to help them.” (206)
the time of the war. Other factors could also explain Another part of the book quotes an individual who
the treatment toward EPWs such as their behavior served Japan when the Americans invaded Saipan.
while imprisoned, the attitudes of their captors, the “In those days, Japanese soldiers really accepted
Geneva Convention, and the culture of a particular the idea that they must die. If you were taken alive
country which holds POWs. as a prisoner you could never face your own fam-
Upon reading the book one learns that during ily. Those unable to move were told to die by a hand
a major war against a nation state like Germany grenade or by taking cyanide. …Ones like me, who
and Japan, soldiers who became prisoners of the from the beginning were thinking about how to be-
Americans and incarcerated in the U.S. were gener- come prisoners, were real exceptions.”(209)
ally treated in a humane manner. This was also true The time frame of World War II is viewed as a com-
during the American Revolutionary War with the mendable period in American treatment of the EPWs
exception perhaps of the Loyalists who sided with incarcerated in the U.S. Perhaps the reasons for
England during the conflict. However, during the this type of favorable treatment by the Americans
Civil War humane treatment of captured soldiers by was the Geneva Convention of 1929 which man-
https://ikn.
72 Military Intelligence
In honor of LTG Weinstein, the Military Intelligence (MI) Corps created the LTG Sidney T. Weinstein
Award for Excellence in Military Intelligence in 2008. Each year the award recognizes one outstand-
ing MI Captain who, through his or her actions, demonstrates the values and ideals for which LTG
Weinstein stood: Duty, Honor, and Country.
Captain Charles Bailey enlisted in the U.S. Army as a Counterintelligence (CI) Agent following graduation
from Keene State College with a BA in History. Upon completion of his initial training, he was assigned to
a CI team with the 202nd MI Battalion, Fort Gordon, Georgia.
Selected to attend Officer Candidate School, CPT Bailey earned his commission as an Infantry Officer
in January 2003, and subsequently attended and graduated from Airborne and Ranger schools. His first
assignment was as a Rifle Platoon Leader with the 1-17 Infantry Regiment, 172nd Stryker Brigade Combat
Team. He was then selected to lead the reconnaissance platoon, both in garrison and in Mosul, Iraq in
support of Operation Iraqi Freedom. CPT Bailey led numerous offensive operations resulting in the death
or capture of more than 100 armed insurgents. In June 2006, he was wounded in a suicide vehicle borne
improvised explosive device attack and assigned to Walter Reed Army Medical Center. Determined to con-
tinue to serve his country, he re-branched into MI.
Following attendance of the MI Captains Career Course, CPT Bailey was assigned to the 66th MI Brigade
where he briefly served as Assistant Battalion S3 before being selected to lead the Headquarters and
Operations Company of the 105th MI Battalion. Following the inactivation of the 105th, he was selected to
command the Stuttgart MI Detachment and the Communications and Technology Detachment-Europe,
2nd MI Battalion in June 2008. During his command, he provided vital CI and force protection support to
one of the more critically important garrisons in Europe and to senior leaders in European Command and
Africa Command.
Captain Bailey’s awards and decorations include the Bronze Star Medal, Purple Heart, Army Commendation
Medal (1 OLC), Army Achievement Medal (1 OLC), Valorous Unit Award, Iraq Campaign Medal, Global War
on Terrorism Service Medal, Combat Infantryman Badge, Ranger Tab, and Airborne Badge.
ATTN: MIPB (ATZS-CDI-DM-12)
BOX 2001
BLDG 51005
FORT HUACHUCA AZ 85613-7002