RDDC IAFIE 2015 Riding the Nexus

advertisement
The 11th Annual International Association for Intelligence Education
Riding the Nexus: Cases from Danish Defence
(WORKING PAPER!!!)
Dr. William L. Mitchell
C2 & Intelligence
Centre for Joint Operations
Royal Danish Defence College
IMO -VF11@fak.dk
Panel (B) Future Trends - international Perspectives
Chair: Bob DeGraff,
Weds June 24, 2015 1300-1430hrs
Marymount University
Abstract
The paper will present an overview of the process to reinvigorate
intelligence education within Danish Defence that started in 2009. It will
focus on the efforts to synchronize education and training within this
process, and some of the lessons learned. The paper will specifically draw
upon two cases. The first case deals with efforts to move from education
to training through the teaching of Target Network Modeling as a
common language and technique for the production of intelligence
products to facilitate shared situational awareness. The second case,
examines efforts to move from training to education with the integration
of training technique intelligence roll-ups into Masters level intelligence
courses, forming the frameworks around various concepts for group
discussion, such as awareness vs. understanding, initiative, and deception.
UNCLASSIFIED
Introduction
The background to this paper starts in Afghanistan 2007, where the
International Security and Assistance Force (ISAF) was scrambling to
adapt to a new strategy adopted by the Taliban. Instead of trying to form
up larger manoeuvre units for more conventional style attacks, they
learned from the success of Iraqi unconventional tactics against the US. It
is here the Afghanistan insurgency, with Improvised Explosive Devices
(IEDs) quickly becoming the number one killer of Afghan and ISAF
forces. Until that point, cold war military intelligence doctrine,
methodologies, and training, was suffice to effectively manage the
operational
environment.
However
operational
environmental
complexities brought to the forefront after 2008, began to illustrate the
outdated weaknesses of military intelligence. It was not a case of there
being insufficient collection assets, or near real time
situational
awareness – but rather the education levels of the analysts, and the lack of
common professional
language and methodologies between analysts.
You might risk many lives and millions of dollars to collect intelligence
in order to answer a question, but one poorly educated all-source analyst
could nullify this investment, with a few poorly thought out sentences.
This experience was the start to intelligence research that would focus on
the battlespace analytical functions, methodologies, and language. It is
here Danish defence began a determined drive to develope common
language and methodlogical tools that facilitate the interaction of theory
and practice for intelligence analysis. Tools that can easily adjust to the
right levels of experience, education available, and be applicable in
diverse operational environments.
UNCLASSIFIED
Theory
The first challenge was to try and establish at theoretical framework
around intelligence studies that could act as its ontological foundation
when discussing specific analytical techniques or methodologies.
Essentially it was about more about finding the place of intelligence
studies within already established meta-theoretical frameworks and
communicating it to military analysts in a manner that they both
understand it, and find it useful in practice. To this end, we built a
reference chart that allows some superficial mapping of theories and
methods within a framework of theory vs. practice (See Fig. 1.0). In this
many using caveats and lessons learned from the battlespace we can
illustrate the how meta-theory actually relates to methodological choices
in operational planning.
Fig. 1.0 Theory vs. Practice Orientation Chart
Using this overview approach to bridge the theory-practice divide in
military intelligence education has proven effective when combined with
UNCLASSIFIED
concrete examples that start in the battlespace. One such example, is the
case of “The Lost Shuras”. In Afghanistan in 2008, the Taliban had
moved their ‘shura’ meetings indoors, away from the open fields in the
countryside. This was a significant Training, Tactics, and Procedure
(TTP) change from previous behaviour, and we had to think of new
methods to help find where they were now holding their shuras. Drawing
on some of the cultural norms described in the Pashtuwali - a cultural
rule-book of sorts for Pashtu tribes in Helmand – ISAF was able use
certain “norms” as guidance for intelligence collection platforms. When
explaining to students this bridge between this operational collection
activity and meta-theory, it is simply pointed out that the constructivist
understanding of ‘norms’, expected patterns of behaviours, can be
exploited for better positioning of collection assets - if one knows how to
find and understand culture norms. In this case, it was quickly identified
that Taliban “shuras” were now being held in Mosques and schools, and
this fact was discover not by waiting for the Taliban to make a signals
mistake, but rather by focusing collection assets onto something
completely different within the cultural pattern of life around the Taliban
– such as the local petrol shop owner, or even the local cook. Thus the
link between understanding constructivism as a meta-theory with its’ key
tenant concerning norms and identities - and the placing of ISTAR1
assets in the battlespace - is made.
Practice
In practice, when training with various cases, whether they are actual
intelligence collection plans, or support to actual operations through
activities such as target generation and evaluation, the theory-practice
orientation chart provides a common point of reference for comparative
1
Intelligence, Surveillance, Tracking, Aquisition, and Reconnaisance
UNCLASSIFIED
studies, or discussions on the products produced by the analytical
process. In Fig.2.0 you can see an example of some of the products that
can be linked back to key choices and key assumptions that belong to
middle and meta social theories.
In the example, the application of
cultural theories to build a human terrain layer through clan identification
& pattern of life (PoL) of the operational area and pirating challenge.
Including the guidance for further collection.
The main argument for teaching intelligence students to recognize their
relationships to middle and meta-theories was quite simple, the theories
with the assumptions that affect world views are there. Whether or not
one decides to recognize and understand their impact on their operational
choices. This point is also illustrated through the fact, that those who
learn this theory-practice orientation method can read an intelligence
report, an operational plan, or even a campaign plan, and relate some of
the choices in them, to various middle and meta theoretical assumptions.
Once military intelligence students have this common theory-practice
understanding, it becomes possible to identify tools that facilitate
UNCLASSIFIED
effective intelligence analysis training that strengthens the bridge between
them.
The following sections will present two techniques that we use in Danish
Defence to facilitate bridging the theory-practice divide. Both techniques
have been developed from hard lessons learned in real battlespaces in the
21st century. The first technique is Target Network Modelling (TNM) that
is being taught a decomposition and visualization technique that should
facilitate the shared situation understanding. The second tool is purely a
training technique derived from real battlespace information sharing
systems. It attempts to capture the essence of complexity, uncertainty, and
the time & space challenges of real world intelligence – but in a
manageable classroom setting in the form of short tear-line intelligence
tweets – we call them Intelligence Roll-Ups.
Target Network Modelling
Target network modelling (TNM) is a formal methodology to facilitate
shared situational understanding.
2
In this manner gathering strength in
from others that will help improve the model – fellow analysts,
intelligence collectors, decision-makers, operational planners, and
military commanders – inter-agency cooperation across organizational
boundaries. Similarly, TNM becomes a vehicle for conveying the
complexity of a situation to decision-makers in a fashion that they can
quickly understand. Another significant benefit, is the simple act of
tagging in the TNM, it inherently provides a mechanism for tracking the
2
Situational understanding (SU) refers to the "product of applying analysis and
judgment to the unit's situation awareness to determine the relationships of the
factors present and form logical conclusions concerning threats to the force or
mission accomplishment, opportunities for mission accomplishment, and gaps in
information"
UNCLASSIFIED
historic development of targets, operational environments or narratives,
over time. This is a very good basis for intelligence product generation
and comparison. In Fig. 3.0 is an example of a TNM representing a
situational understanding of a threat finance network in the Horn of
Africa region - as understood by one group of intelligence analysts.
.Fig. 3.0 Example TNM Threat Finance
Through decomposition and visualization a very complex operational
environment can be communicated very efficiently. However where the
TNM really contributes to riding the nexus between theory and practice,
is its inherent reliance on hypotheses to provide understanding. If you
look at the different relationships between entities in Fig. 3, you will find
a variety of hypotheses being generated. The link between “AQAP” and
Saudi Arabia is a hypothesis, or the “end-state” and Al-Shaabab, or the
Shura Council and the Houthi Insurgents. All of which provide
intelligence analysts with a rich environment for the application of theory
and method to actual operational issues. For Danish Defence TNM is a
UNCLASSIFIED
technique that is currently used in the field - as well as being taught in the
classroom.
Intelligence Roll-Ups
Intellignce roll-ups have been a technique used in Danmark for
intelligence training since 2011. Its origins lie in the battlespaces
of Iraq and Afghanistan when the Joint Chat (J-Chat) was
developed and applied in actual operations. Essentially, a real
time chatroom was established on classified networks for
operational and tactical command and control, including the
integration of intelligence specific chatting. Much like todays
Twitter messages, intelligence inputs tagged (name of who sent
them), and sent real time to a central screen that showed the
sender, time and date. All messages were kept as short as
possible – really forcing the essentials to be shared with all who
were logged into the chat room. The J-Chat was so effective,
that also became judicially acceptable as a log of events for after
action reporting and story boarding. From the battlespace we
began moving this format into the classroom to support the
training of all-sources intelligence analysts.
Essentially, we would start with the end-state and work
backwords generating time-lined intelligence posts in a J-Chat
style log. The utility of this technique in the classroom was an
absolute game changer on so many levels with regards to how
we taught intelligence analysis. Suddenly, it was possible to
UNCLASSIFIED
quickly adjust the levels of complexity of the intelligence
problem as needed or fine tune it to help focus on specific
analytical products we will train. This could include tradition
INTSUM type reports to target lists, intelligence gaps lists,
intelligence collection planning, and time-lining, PoL tracking,
geo-rectification, ISTAR synchronization and much, much,
more. In Fig. 4.0 below you can see an example of one such
training roll-up and the different elements included.
Fig. 4.0 Example Intell Roll-UP
UNCLASSIFIED
Much like the use of TNMs, using Intell Roll-Ups to train the intelligence
analyst contributes not only to developing a common language around
how one works with intelligence, but rides the nexus of theory-practice
by once again inherently requiring the formulation of the hypotheses that
will drive any TNMs produced, as well as the production of indicators
that can be used to check these hypotheses.
Conclusion
It is hoped that by sharing experiences with techniques for teaching
intelligence analysis, that we can learn from others to make our education
more effective for the 21st century battlespace. Denmarks’ military has
been in constant conflict since 2001. Lessons learned from Iraq,
Afghanistan, Libya, Syria, Mali, and Iraq once more, have indicated
strongly that we must better understand the situation first, before we plan,
organize, and execute. This has placed a lot focus on how we teach our
intelligence analysts, and the quality of that education has become more
important than ever. The ability to produce intelligence analysts that can
ride the nexus between theory and practice is essential to manage the
complex missions that characterise warfare in the 21st century.
Download