INTELLIGENCE FUNCTION ADDED TO CORPS OF MILITARY POLICE UNITS

Page 1

MILITARY POLICE INTELLIGENCE CAPABILITY

KESHAV MAZUMDAR ATO CMAS


MILITARY POLICE INTELLIGENCE CAPABILITY

A military police Commander leads soldiers so as to protect the army installations and soldier’s lives. The military police function in addition to:          

Reconnaissance and Surveillance operations (R&S) Area security operations(AS) Law and order operations(LO) Internment/Resettlement operations(IR) Criminal Investigations Maneuver and Mobility Support Response force Liaison EPW handling Base Defense

also has an intelligence component , the criminal intelligence dimension wherein the military police identify local criminals in neighborhood of the military base/installation,terrorists,subversive elements, drug mafia , army personnel who are liable to be subverted, civilian contractor’s who can cause security concerns and other elements, apprehend them , conduct limited preliminary interrogation and if intelligence is obtained that can affect commanders mission or is of use to higher, adjacent headquarters, is fed to the Intelligence officer of the Command/supported unit for further action. The military police intelligence function heightens the situation awareness of not only the MP Commander but also the Commanders of the adjacent units/supported unit if any and the Command. So far in our Indian military environment the military police was never involved with HUMINT operations. But this is the exact area which should be brought into focus during MP operations, an area which if properly leveraged can be a force e enabler. Routine MP operations like patrolling, convoy movement, community interactions and those operations which are associated with standard military tactical operations either during rear-area security or forward operations—all these give ample opportunity to the MP personnel to collect intelligence, evidence or any data—raw data that is, not yet collated, analyzed but of sufficient significance so as to be given merit and deemed fit to be forwarded for


interpretation,analysed,transformed into an intelligence product. The MP can function as an auxiliary intelligence unit and considering its protective and reconnaissance/surveillance attributes, the addition of the intelligence function to existing MP functions will in no way burden the soldier or the unit nor interfere with its operations and as for training , a minimal training is sufficient—the MP soldier already posses an inquisitive intelligent mental frame with an acumen for intelligence. The MP unit can definitely act as an enabler for the intelligence units and provide support in form of information accessed during MP operations or during joint operations with the tactical units. Prior to any combat operation or mission , whether tactical or operational, although nowadays intelligence is generally tactical driven , an intelligence preparation of the battlefield is conducted by the Commander in charge of the operation. The area of operations is examined carefully by taking into consideration nearly every factor including physical terrain,atmospherics,and enemy characteristics in Toto thus getting a clear picture of the threat and environment through systematic study. It is designed to support staff estimates and military decision making. In any combat operation we have certain critical points known as decision points DPs in time/space. These DPs are the nerve points in the combat chain/network if we can imagine all combat sequences and subsequences as a network. These nerve points/nodes can be ‘’killed’’/’’choked’’/’’destroyed’’ and to do that we must ascertain them in advance. That is identify them and if not identify then at least anticipate them. To this end we must have a clear picture of the battle space ,physical terrain and the enemy characteristics and the effects this battle space will have on the actions of both the enemy and our own, the likely course of actions of the enemy and the resultant actions of ours and the likely follow-up courses of action of the enemy—this way we are in near-total control of the situation , we can determine the DPs and focus our combat power/tactics on those points and strengthen our own combat power. So that’s it. The intelligence preparation of the battlefield—the most important prerogative of the commander and staff before planning and it is here that the other commanders or in other words commanders of adjacent units and at all levels should also come forward and participate in the planning and the MP unit commander is no exception. Intelligence feeds/information inputs from the MP functions (R&S,AS,IR,LO) are directly fed to the intelligence officer in the staff who with the assistance of the intelligence unit officer


conducts processing and tables the intelligence as primary input to the commanders planning desk. The MP units collect police,criminal,combat information as well as advise on possible threat scenarios and anticipated COAs while assisting the Staff intelligence officer during the preparation of the intelligence estimate. The MP should conduct the intelligence preparation of the battlefield with the objective to conduct intelligence led police operations. MP INTELLIGENCE INPUTS ARE VITAL FOR FORCE PROTECTION MEASURES. The HUMINT dimension in an otherwise strictly policing oriented MP battalion(with which we are familiar but not the HUMINT aspect) is often overlooked due to the very doctrinal concepts and TTPs of MP.These outline MP functions, limiting them to strictly security control such as access control, manning checkpoints, conducting investigations and other policing duties, maintaining security of installations,bases,camps and in times of war accompanying MI teams for facilitating segregation , movement and detention of HUMINT/CI sources , EPWS,refugees, and the like. But there is a HUMINT base that the MP can tap into to acquire intelligence information. It is not being purported that the MP solely acts as an intelligence unit. What I mean to say here is with minimum formal training in tactical questioning and interrogation (although the former sometimes or on many occasions yields the information the MP personnel are looking for) the MP can collect, gather or collate raw data (information not yet analyzed) from the reports, actions and activities of soldiers in an area of operation. Routine operations including convoy travel, interaction with the local populace, as well as standard military operations provide a wealth of raw data which can be collated and analyzed.

The MP Intelligence function supports, enhances, and contributes to the commander's protection program, situational awareness, and battlefield visualization by portraying relevant threat information that may affect his operational and tactical environments. This threat information—whether it is police, criminal, or combat information—is gathered while conducting MP functions. all information collected while conducting MMS, AS, I/R, and L&O functions continues to be reported through the proper channels so that it can be analyzed by the Intelligence Officer .The MP maintains constant liaison and communication with higher intelligence staff , civil police , adjacent units , in case


of COIN PSYOPS platoons/units , and all security forces elements in the Area of operations for whom the information is of value. The Battalion Commander and the PM look after the MP intelligence activities. Accordingly they allocate available staff resources in their command in the most appropriate manner to monitor the MP activities.

IPB PROCESS AND PIO FUNCTION 

The Commander and Staff conduct an intelligence preparation of the battlefield (area of operations in case of COIN) to assess the enemy’s capabilities, order of battle, strength etc , environmental factors and physical terrain affecting operations of both the enemy and our forces while gauging the overall situation by exploring all the possible courses of action of the enemy. In case of COIN an additional element comes into the picture , the local populace. In short IPB increases the situational awareness of the Commander and assists in identifying intelligence gaps. Thus the Commander can selectively apply his combat power while retaining the decision advantage. The battle or any tactical operation has decision points in the combat cycle , these decision points of the enemy need to be targeted.IPB is a very very essential pre-planning component and is the foundation on which rests the success of any mission.MP units should also contribute to IPB in their own way. During Area Security , Internment and Resettlement , Patrolling and Reconnaissance , Critical Assets Protection , EPW and Detention operations and TCP/Check post-Roadblock manning and screening operations they often come into contact with witting persons , walk-ins , apprehended suspects , local populace , escapees , criminal elements and other elements like terrorists , infiltrators , insurgents at check posts etc who can be sources of information of intelligence value , whether it is extracted in normal course of conversation , or by interrogation.When such information is received , the MP personnel forward it to the PM , Higher HQ, adjacent MP units , adjacent combat units , civil affairs dep’t , the local police and other agencies for further action. In addition all apprehended, detained individuals are escorted to rear areas or interrogation centers for further exploitation. The MP thus serve a very important role in secondary intelligence collection so that the primary collectors like HUMINT and CI


agents can focus on more important issues like the prioritized intelligence requirements of the Commander. The IPB process consists of the following four steps: 

Define the battlefield environment. Here the intelligence staff officer and team identify the , the leadership, strength , capabilities , disposition , table of organization and equipment and all other factors highlighting the enemy’s order of battle. In addition the area of operations perimeter is determined and areas of interest too are taken into reckoning(as in COIN an insurgency movement , on being strongly suppressed by the COIN forces , may shift to an adjacent area or it could be that the insurgency in the AO influences the population of the areas of interest too which could later become launching areas for operations in the current AO by the insurgents).Also the various courses of action that can most probably be resorted to by the enemy are considered. Intelligence gaps/requirements are identified and prioritized in accordance with the mission. Describe the battlefield effects. Here the physical terrain , the weather and all environ mental factors are studied closely as to how they can affect both the enemy’s capabilities and that of our forces. Although final course of actions are developed later but still an assessment is made how these environmental and terrain factors can affect all possible course of actions. But here specific course of actions are not considered ..In this phase of IPB a general study of enemy and our forces capabilities/ops are conducted in the backdrop of terrain , weather , local infrastructures , and geography. Evaluate the threat. Here in this critical phase the intelligence staff attempts to determine how the enemy will employ his forces in combat , what possible tactics he may resort to under similar conditions. Here doctrine is very important , more important are updates to it , historical , and any current operations against the enemy wherein lies the recorded information about what tactics and techniques he had resorted to , what were the outcomes , how they were neutralized , our success and failures etc.The intelligence staff studiers all past and present records about the enemy and also creates threat models corresponding to different hypothetical scenarios. In case of an enemy which is less known and records are few , intelligence about him is gathered from e very source possible , including open sources. It should be born e in mind that open sources like




the web , news , media , enemy opinions and policies which are made public , enemy weapons purchases which can be accessed from media etc account for more than 90% of the intelligence we have about the enemy. This is a fact but often overlooked and only military intelligence assets employed. Whatever , for a lesser known enemy more aggressive intelligence activity is required in earlier two phases so that this phase may be tended to satisfactorily and threat models constructed. Determine the threat's COA. Finally here , with all information in hand from earlier IOPB phases , potential enemy objectives and COAs open to him are determined and modeled.

It should not only be the Command intelligence staff’s prerogative to conduct an intelligence preparation of the battlefield. Each and every Army Commander and his including the MP should undertake this responsibility during the planning phase , the latter utilizing IPB as a tool for executing police intelligence functions. During the IPB process, the Command intelligence staff uses all available databases, intelligence sources/products, and related MI disciplines to analyze the threat and the environment. The MP supports this process by providing the police, criminal, and combat information collected during execution of Area Security , Maneuver and Mobility , Law and Order, Internment and Resettlement , Base Defense , Reconnaissance and Patrolling Critical Assets Security , EPW handling , Liaison with civil police band Criminal investigation operations.

PASSIVE MODE PIO


The MP team received the information while conducting a TCP and submitted it through the appropriate chain of command, which resulted in an action taken. This example stresses the importance of submitting information up the chain of command regardless of whether it may be police, criminal, or combat information. ACTIVE MODE PIO

When the Brigade Int officer in conjunction with the Col(GS)Int officer identifies gaps in intelligence that is any missing information about the threat/threat situation which should be known by the Commander, they study its relative importance compared to other intelligence requirements and may label it as priority requirement. Thereafter they evaluate the collection assets as to availability , capability and performance history and thereafter the Staff officer (Ops) go on to task the selected assets with the collection activities. At this stage if the officer feels the MP has a role in the collection then he will task the PM through appropriate channels. As such he must provide the PM with a clear picture of the requirements and the ground situation. The MP performs certain functions such as Law and Order , Area Security , Maneuver and mobility support , Route R&S , Reconnaissance , Area Damage Control , Base Defense , Critical Site and Asset Security , EPW/CI handling , Criminal investigations etc.Out of these operations Area Security , Law and Order , Reconnaissance and Maneuver and Mobility Support operations enable the MP personnel to gather data/information which may be of intelligence value. This is so because during the conduct of these operations they come in frequent contact with other organizations in the area of operations , police authorities , local populace , NGOs,and paramilitary forces/security forces who may volunteer information which they have obtained during their own course of operations , or during criminal investigations or as the case of local civilians may be , what they have observed and heard in their local communities. If the MP receive, observe, or encounter information (police, criminal, or combat) while performing these functions, they will immediately submit a report to relay information up the chain of command. Now the PM after receipt of the mission from the Ops officer analyses it and decides which MP function out of the four can yield the required information arising out of the information gap (prioritized intelligence requirement) and accordingly tasks the MP


personnel carrying out that function. The personnel will be instructed to collect information in this regard and once they do get any information they should immediately notify higher HQ , adjacent units in appropriate report format which will include the size , activity , location , unit , time and equipment and also spot reports containing brief spot assessments. The MP personnel may encounter two types of information: criminal and combat information.     

They should without delay inform the adjacent units (or the units operating in the area) about the criminal activity and warn about possible force protection breaches. Pass on the information to the local police and intelligence agencies Update its own criminal intelligence folder as well as the folder with the intelligence officer in the Brigade and Col(GS)Int . Extrapolate and utilizing more collection determines future criminal trends and other related/potential criminal activity. Determine if further MP support is required for the affected area so that the criminal activity may not hamper our ops and breach force protection measures. If combat information is obtained, the MP—   

Pass on the information up the chain of command to the BGS(Int) office Pass on the information to the PM The intelligence collection activity being conducted by the MP personnel are directed by the intelligence requirements. Now as further combat intelligence surface they may need to adjust their intelligence collection plan , integrate the new information in the process and if necessary take appropriate action. They should immediately inform the units in the AO of the combat intelligence information. This is very important.

MP INFORMATION FILES REPOSITORY : All information procured by MP personnel must be systematically recorded in files called activity files. These files should be protected by access protocols. They should not be available for general inspection/review but only personnel authorized by the Garrison commander can access the files. They generally contain information of policing and investigation nature. We can divide them into further three categories:  AREA FILES


 

ACTIVITY FILES INDIVIDUAL FILES.

Area Files : Included are any information of policing interest on any geographical area falling within the installation/base perimeter or adjacent areas up to a certain definable distance. This distance should be based on the assumption that any threat activity can hamper base operations and security of personnel, equipment and information. Housing areas, supply and storage areas, recreational/training areas and off post hotels,clubs,bars or any area which is prone to civil disturbances or which can act as staging areas/sanctuary for criminal elements/terrorists. During the conduct of intelligence operations the MP personnel can interact with the local community off post and elicit information or use tactical questioning during patrolling/reconnaissance operations. Activity Files : Activity files contain any or all information that is of interest to the MP. Bear in mind that activity files are not limited in content by geographical area constraints or jurisdictions. There can be threats to military personel,installations,information systems, logistical routes and operations. These threats cannot be overlooked and military security takes priority over everything. If individuals not belonging to the defense sector are tagged then their profile is recorded in these activity files. Instances such as damage/sabotage or theft of military equipment/property/weapons/ammunition/records ,espionage or disclosure of classified information by unauthorized personnel ,demonstrations being conducted on/adjacent to the military base with a violent undertone/implications or any other attribute/size/character which predicts disturbance likely to affect the conduct of military operations/activities adversely –all of these are recorded in the Activity files. Threat profiling that is to say all direct/indirect threats to military personnel or civilian defense personnel is recorded in these files. One should be specific while ascertaining these threats if and how they adversely impact the official duties/functions of the threatened personnel as this may indicate the intent of the adversary from a perspective of the latter’s higher echelons, say a case of counterintelligence., Another area of interest is the security of key military projects/facilities and classified defense contracts and any threat/s to these by identified persons or by demonstrations need to be recorded in Activity files. Any act which violates law and order on the installation premises and all subversion cases should be accounted for in these files. Finally cases where there is a question about the loyalty/discipline/morale of any military/nonmilitary DOD personnel should be logged in these Activity files.MP Activity files ,if maintained meticulously can be a great asset for counterintelligence personnel. Individual Files- Any individual identified as being of special significance to law enforcement, either because of activities, leadership, contacts, or even as a symbol of some nature, must have a dossier duly maintained and updated. This dossier is nothing more than a complete biography to include information on habits, income, friends, weaknesses, and personal history. The individual’s police


record, disciplinary record, and details of other contacts with law enforcement agencies are included.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.