ACTION INTERFACES as Zones of TACTICAL DEVELOPMENT against the Enemy. Part One.

Introduction.

The action interface is a spatial concept that defines the zone and space where we develop violent action against the enemy and his means, following tactical criteria adapted to the nature of our objectives. The effective action factor in the action interfaces is the combined arms or inter-arms system.

In a penetrating attack, for example, the surface of the interfaces is quantitatively limited and these are selected in the enemy’s depth, according to their critical points and those that hinder the advance of our forces, for example, observatories and anti-tank firing points. In defense, we quantitatively increase the potential interfaces in our depth and in a somewhat laminar way.

The interface is what makes tactical action and the destruction of the enemy possible, applying a pure, chosen, selective and favorable attrition. The absence of interfaces, on the contrary, gives a certain security to any force. With the presence of the enemy, even close by, being a threat.

The interface is not only linear or frontal and with the depth of the range of heavy infantry weapons and tanks. But is extended superficially and spatially by the action of indirect artillery, surface destruction means (reactive artillery) and combat and bombing aircraft. The smaller the interface in an area of ​​operations, the more the operational maneuver criterion will work and in a larger interface. We will seek from advantageous positions and with effective and synergistic means (combined or inter-arms) to annihilate (incapacitate) the enemy.

The speed of exchange (actions and effects) in the interface is qualitatively variable and is conditioned by the transitability of the terrain and by the nature of our intention. In the attack we seek the fluidity of tactical actions. In defense, we wish to add a thickening to them, which will help us break the enemy in front of the front limit of the defense position and in the various ambushes and prepared fire pockets, both main and alternative as well as supplementary, preferably before their irruption.

In the interfaces there are certain critical points, where our tactical interaction with the enemy will be especially effective. These are their tactical vulnerabilities, their gaps in protection or combat capacity or their neglected means of defense, even if they are only so for a time. Combat reconnaissance is essential to detect them and it is the tactical leader’s mission to decide which one or ones to act on, seeking in the tactical decision, the operational significance of the higher command.

Combat capacity is applied on an interface with a variable depth depending on the weapons. Combat capacity has a maximum, useful, relatively stable value for the different weapons or weapon systems, which we can measure in men per meter of action interface.

For the shock, for example, it is not possible to use more than one man per 1.5 ms. of contact interface. For rifle fire, considering a platoon of 50 men useful for about 300 ms of interface, its value drops from 0.6 to 0.15 men per m. of front. Artillery would produce a blinding, disruptive, neutralizing or destructive effect, added to the action in the interface, but complementary to it and never a substitute. Machine gun fire would not substantially lower the proportion, since its fire “equivalent” to that of a certain number of infantry, depending on the terrain and its ability to acquire targets, in rapid fire of 15 rounds per minute and marksman.

Development.

However, from the wars of antiquity to the wars of the 1980s, dispersion has increased from a proportional value of 1 to 5,000 on the battlefield or tactical field. For modern static organized defense, it is equivalent to a battalion of 750 men in 3 km2. Mobile or nuclear defense can triple that surface. This dispersion has emptied the battlefield, now covered by direct fire and indirect fire support, and has allowed the operational terrain of large units to be greatly deepened, up to 50 to 75 km.

An obstruction, a gorge, a river in which the interface was reduced or altered, would limit the real possibilities of the attacker and greatly empower the defender. Thus, the defensive battle of King Leonidas in the Thermopylae gorge would be an example of containment of overwhelmingly superior forces, due to the absolute limitation of the interface of action between the Persian and Spartan armies and not being able to apply it to the critical Greek centers, for example, an exposed flank, until a shepherd served as a guide to a Persian contingent to reach it.

All this operational complication simultaneously makes most of the forces employed in an action unproductive or inactive at a given time.

Given that there is this practical limitation to the use of our available combat capacity, due to the disproportion between tactical space and combat interface, the issue of achieving the maximum application of our force arises.

To achieve this we must:

Increase as much as possible our favorable interfaces with the enemy, especially on the weak and critical points of his deployment; adequately rotate the units in tactical contact; maintain an adequate space for maneuver in our tactical rear, which allows us to push forward the necessary spears of attack or maintain the different possible defensive interfaces in the face of enemy irruption or penetration.

And employ each weapon in the most favorable possible interface of action:

Thus, the weight of the effort will be borne by the infantry in prepared attacks against an enemy ready to repel (for example, an anti-tank front), at long advance distances and in terrain with limited visual control, such as forests, built-up areas and broken terrain, with the tanks supporting them with fire and advancing by covered jumps. The tanks can go ahead in encounter attacks, in slightly undulating terrain and if the enemy has a poorer combat readiness, but taking care that the infantry closes the distance quickly. For short distances, we use the joint attack in the same sector; both weapons can advance from different positions in a convergent attack in encounter combats and in enveloping combats, the synchronization of both being fundamental. Inside the enemy position, the tanks attack the firing positions with their fire and the infantry clears the positions from their flanks.

It is also possible to structurally increase our favorable action interfaces with the enemy.

This is achieved in the attack by breaking through and penetrating favorable sectors and always by encirclement, reversal of fronts and encirclement and by coordinated frontal and overflow pursuit. The attacker’s successive echelons can, in turn, create a favorable action interface against an enemy that is not sufficiently defended, for example, artillery positions or communication centers or logistics parks, and also by a flank attack from our depth with mechanized or armored units, on an enemy counterattack against our penetration.

In the defense, the opposite will occur. The breach of the defense zone, even if it is mobile, will be avoided by increasing the possible unfavorable interfaces for the enemy along its «range».

This is achieved by the echelon in depth of active defensive means and by their preferential placement on the counter-slopes, in covered, hidden, preferably flanking, alternative and supplementary positions and received by a local infantry defense and seeking good and intersecting firing sectors. Also by the increase in interceptions (reinforced cuts, quickly placed minefields, natural obstacles more or less perpendicular to their sectors of advance) defended by fire, which channel the attack towards zones of convergent fire or which delay and erode it. And, finally, by the timely use of local counter-shocks and counter-attacks by mobile or, at least, rapid, tactical or operational reserves. These constitute the extraordinary and unexpected force that acts on enemy vulnerability, which is then in disorganization, dispersion and neutral morale before the consolidation of its gains from the attack.

The effective action factor in the action interfaces is the combined arms or inter-arms system. Each of them individually presents “action characteristics” and more convenient transitability, which give them a preferable target profile and tactical deployment qualities, from whose combination in the system arises the synergy of the whole.

(To be continued)

Military and National Intelligence, failures and results.

Introduction and Development.

The intelligence services of large countries are often correct in their opinions and forecasts.

The specific intelligence tasks to which a few modern agents are dedicated usually end with partial or total success.

Complex works with ramifications and developments, which hide an estimable but not certain future, fail miserably. Because of this complex and future peculiarity. And, because the ability to observe and measure a parameter of the human soul is something elusive, doubtful and uncomfortable. Next we will see several specific cases.

The reasons for the divergence of successes between singular cases and the projection into the future (foreseen solution) of complex issues, transcending time, are partly in the difficulty of their conception, in the risk that is run in venturing and in the non contrasted exposure to the commands. Obviously, there is a dialectic here between the concealment carried out and the cognitive and intuitive process of its imagination, development and projection (estimated solution).

Only analysts freed from Scholasticism and field manuals are capable of placing themselves in the free, impartial and lucid mental state or position. To capture anomalous, complex and difficult enemy situations. Since they are paid for results and speed, which are contradictory variables, the luxury of putting an analyst agent in a “quiet position” for an unpredictable, indefinite period of time is not usually acceptable.

The new techniques for detecting, observing and tracking targets should not be underestimated. Based on computers, electronic sensors, Artificial Intelligence. But, the presence of field agents should not be suppressed, but rather supported and increased. Cyber monitoring can specify for our spy the precise area of investigation and study.

BRIEFING OF A FIELD AGENT

The field agent is an infiltrator in a neutral or hostile environment. Able to approach and penetrate the government, business or social media of the rival. And capture relevant, important information in a consistent and sustained manner. The field agent gives a seal of verisimilitude or even reality to the information captured from the enemy.

It is not easy to recruit, train and insert your own field agent. Hence, in an era of haste, superficiality and intellectual complexity, technological means have been favored over field agents for espionage work.

Afghanistan 2021.

We all remember the moments of the change of government in Afghanistan in August 2021.

During almost 20 years of staying there, the United States had spent enormous sums of money on said stay, providing various support to the Afghan State and to choosing, training and equipping the Afghan National Army. The Americans even boasted in their public communications, especially from the Defense Department, that they were making progress in the anti-terrorist fight against the Taliban.

MARINES GUARDING KABUL AIRPORT

This turned out to be like the “Potemkin villages.” That the Russian minister of that name prepared in the path that Tsarina Catherine the Great would follow on a trip. So that her trashy inhabitants would appear happy and shiny as her Imperial Majesty passed by.

As soon as the last American troops had to withdraw, the Afghan soldiers, who also turned out to be shoddy, began to surrender their weapons and escape the feared wrath of the Taliban. US forces were only able to secure a defensive perimeter of the Kabul airport. But, the “friendly Afghans” and their families had to get there to board a flight. Fleeing the tidal wave of the barbarity of the Taliban (scholars of the Koran).

As it had been negotiated with the Taliban to accept control of the airport by Western soldiers for a few days, this was not enough for many «collaborators» of the Westerners (translators, drivers, cleaners, etc.) and their families. Many had to make a painful journey to Pakistan to gain their freedom and their lives.

Vietnam War. American stage,

In the United States, during the Vietnam War, the “Igloo White” program was established, endowed with 1.7 billion US dollars, between 1966 and 1971, for the tasks of collecting information on the North Vietnamese and Vietcong supply routes in South Vietnam. The route started from North Vietnam, entering Laos, near the common border, and was the line of all kinds of supplies for the aforementioned forces, operating in South Vietnam. The route was strewn with devices that simulated a plant and were transmitters of information for US intelligence. They measured 1.2 ms. and their battery lasted 50 days. Many times an unmanned flying object, a drone, was used, which collected information from the ground and transmitted it via television to a distant plane.

A SECTION OF THE HO CHI MINH ROUTE

With the data collected from traffic on the roads, the Americans decided on interdiction bombing actions, carried out by their different aerial devices, including the invisible, inaudible and precise B-52 strategic bombers. In early 1971, data from aerial photos after the bombings, taken from planes flying after the attack formations, allowed analysts to assume that the “truck war” was causing a very severe strain on the industrial capacity of North Vietnamese suppliers (China and the USSR).

Historia Desterrada: La ruta Ho Chi Minh: Eje logístico clave en la Guerra  de Vietnam

But, if it was true that so many trucks and equipment were destroyed, how was it possible that the communists maintained the initiative in South Vietnam? On the other hand, where were the tens of thousands of remains of trucks and other materials that literally plagued many of the roads and logistics parks on the Ho Chi Minh Route? Who bothered to remove them?

A more primitive stretch of the Ho Chi Minh Route

Another embarrassing issue was that the total number of vehicles counted by the US aviation as destroyed, exceeded several times the total number of cargo transport vehicles that North Vietnam had, according to Intelligency.

The answer to this essential mystery was soon given by the young American officers (juniors): they were eaten by a monster called the “Great Laotian Truck Eater”; a horrendous scavenger that rose towards dawn and devoured the vehicles destroyed by aviation during the night, after the required photographs for the “wreck count”, the count of debris achieved. Because Americans are very scrupulous with statistics and consider lying a «social sin» that is almost unforgivable for officials.

(TO BE CONTINUED)

The determining Parameters of Effectiveness in modern Warfare.

Essential Introduction.

This is obviously not a Treatise on the determining Parameters of Military Efficiency. Nor is it a Study on the Principles or Operating Systems of War. On which you have at your disposal enough articles on this Web Page, which you consult now.

It is a matter of making a brief explanation of the characteristics of these determining Parameters. That they should always work in Harmony and Cohesion.

So that, with this description in hand, you can easily define and know the Failures and Errors made by the Units in their most dangerous Job: War.

Doctrine and Regulations.

These determining Parameters must define and transmit the What and the How of the units and means in the war against the various possible enemies.

In other words, it supposes having good Principles of its Art-Science of War and Operating Systems suitable for modern, hybrid and cybernetic warfare.

And, they must do it in a broad, clear, creative, stimulating, flexible, participatant and decisive way.

The Determining Parameters and their full means of expression.

Those Determining Parameters are conceived and materialized by the Human Element of Weapons and War. Without it, they would only be more or less numerous sheets of letters. Waiting to obtain its meaning, always eminently practical, its full expression and its transcendent utility. They get it with their employment by the military.

Logistic chain.

Organizes and distributes the means to units. It could also participate more or less in its acquisition in the market. Generally includes health services.

It must be close, and it using various means: long-distance and delivery transport, warehouses or centers (hubs) or kitchens at various levels of action and with control and computer means. It must act informed, farsighted, proactive, organized and sufficient.

The Action Trilogy.

Units of the arms and services.

That they can integrate tactical and operational groups of Combined Arms with common tasks and missions. That they will be at one with each other, trained, also jointly, that they provide mutual support and a synergy of effects and that they have mutual respect.

Commands. officers.

They must be willing, empathetic, trained, motivated, decisive, respected, responsible and long-suffering.

Non-commissioned officer corps.

They must be close, trained, specific, capable, formed, loyal to the commands, soldiers and units and respected and highly regarded by the soldiers.

The Gravity Center of the Joint Effort of the Combined Means. 2nd Part.

An Instrument of the Command.

(continuation)

Now, closing the “historical and definer cicle”, the wars of V generation are called hybrid or multi functional wars, which, really, always have existed. With the major or minor participation of each one of the available “means of intervention» (Foreign Relations, regular and irregular Armed Forces, Economy, Cybernetics, etc) in the social group, to obtain the searched «functions of intervention» on the enemy. Forming a “means” mix, adapted to all situations and confrontation theaters.

Not for nominating nowadays with an exotic and new word, preferably foreign, one makes this way a «mean or a function of intervention» fresh and promising. The problem is that the ignorance of the history, still the recent one, impoverishes the new concepts, ideas and situations of conflict. Without winning in application, efficiency and cognitive capacity with it. With this, only it falls or repeats the previous history, returning to learn it. And that, as in a spiral screw, only changes the phenomenon temporal «plane of execution«. Where are kept safe and now partly secret, the different «essential parameters» of the phenomena of the conflicts and fights.

Almost all the «means of intervention» of the State, used to obtain his national aims, already were present in the panoply of means at his disposition, a long before this new name of the Hybrid War. The «functions of intervention» were developed by «means» adapted to the real possibilities of his epoch. And they were obtaining the looked aims, though they were very specific. There we have the actions of the SAS (Special Air Service) as «special forces of punctual intervention with limited objectives” in the enemy rearguard. Fighting against this one and to support and help the local «forces of resistance to the occupant». In the USA we have to the SEALs, the Rangers, the Delta force and the Special Forces, among others. In Germany is the GSG 9 group. In Australia and New Zealand they have the same name that the British corps.

Resultado de imagen de propaganda social
CHINESE PROPAGANDA AGAINST TAIWAN.

The strategic and tactical needs of the war and the functions of the «means of intervention» are slightly variable. And his variability is a function of the improvements in general training, scope, speed, capacity of shock and fire on the enemy, communications between «means», protection of these, etc. That offer the successive technologies applicable to the «means».

One of the «means of intervention» of a world or regional power to obtain his «national and strategic aims» are the «Foreign Relations«. That has a concept qualitatively more extensive than the Diplomacy. This refers to the State or government affairs, that treat two or more nations (alliances). And the diplomatic «function» is to negotiate by the political way what communicates to him his State, department or secretary. Asking and receiving successive instructions, if it was necessary, to support and continue the negotiation. And being kept or not in his execution and protocol relations, within the qualities of discretion, prudence and tact that characterize his trade.

Resultado de imagen de cuba en etiopía
Cuban «internationalists» forces help Ethiopy in 1977.

The Foreign Relations also include other relations and more heterodox actions. That is necessary to look for, to keep and to support in the exterior to obtain our National aims. This way, a function of the foreign relations is to appear for it, new opportunities and more secondary ways or routes and «means of intervention«. The Foreign Relations collaborate directly, since always it has been done, using the means and the in force national strategy, with the Intelligence, the Economy and the national Armed Forces. That is to say, acting together in a «mix» of functions and means of intervention, the war always has been Hybrid from the Prehistory. Creating new opportunities and ways, to apply and use the whole creative and potential capacity of the State, to achieve his strategic and operational aims.

Resultado de imagen de Metternich diplomacia
Prince Klemens Wenzel Metternich (1773-1859). As a chameleon diplomat he was more important in his achievements than Napoleon in his wars.

A succinct example between thousands of situations. The «Central Strategic Command of Combined War» can request to Foreign Relations the search of dissident or domestic enemy in a potential enemy country. Located one o more of these, there are valued his capacities, circumstances, implantation and operational possibilities. This way, FF. RR. would present a report to the Central Command in the shape of a «founded resolution”, involving in it. That is, valuing schematically the existing cases and being decided for one or two, depending on his qualities and our general or punctual convenience.

These dissidents or enemies will be politicians or also armed rebels. In the first case, our nation might grant to them asylum, scholarships, economic support and advice to his groups. In the second one, in a phase of major confrontation, we could also send supply and armaments, advisers and trainers and «special operations» or units of «foreign volunteers», to support and/or reinforce them in his insurgents activities.

At the beginning of the 16th century the «reformists and heretical» ideas of the priest Martin Luther propagated in the center and north of Europe, with the help of the press. The origin of the word propaganda arises during the Counter Reformation. It is a reference to the spread of the catholic faith. With the Jesuits in the forefront of this task of catechizing. Facing to the deviations from the preexisting orthodoxy, taught by the Lutherans, Huguenots, Calvinists, Erasmists, etc.

The propaganda always handles basic, essential information, that are easy and simple by definition. This is due to the fact that his «aim» (the «target«) is always large and numerous: the population of a certain country or region, or a religious, economic, racial or socially different extensive group. They are those that it is necessary to inform, convince and, according with the cases, to protect.

A «mean of intervention» against the enemies or to change or to influence wills, which was not known, for unthinkable, until a few years ago, is the Cybernetic War.

The cybernetic attacks can go to the software or the hardware of the personal IT, managerial or institutional systems. The software is the «logical support» of an IT system, which makes possible the accomplishment of the different tasks. This «logical support» includes the operating system and the applications or IT programs that those realize. The hardware is the machinery or the set of physical components of the computer. This way, summarizing, the software generates instructions that are executed by the hardware or physical support of the system.

June 2021 Cyber Attacks Statistics – HACKMAGEDDON

In general, the attacks are realized to the software of a system, looking for a «weakness» of this one. And using the malicious codes, the back entrances, etc. A penetration or attack to the software is prevented in general with an antivirus adapted to the received virus. To attack the hardware is necessary to act on the «physical component» of the computer. And his detection, with the nowadays existing miniaturization, turns out to be very improbable and long in the time, until the devastation is detected. The best way of acceding to the hardware is realizing the intrusion in the factories of components and of assemblies. But these are protected by control measures of components and external equipment, based on the nationality and the producer of them. Unless the attacker and the manufacturer undesirably match…

Imagen relacionada
Somewhat confusing scheme of Cyber War.

The Economy is an important and classic “mean of intervention» of the State and of the Nation. It means and involves in the effort of war the capacity of obtaining and producing all kinds of goods and services, intermediates and finals, that the technologies and processes in effect in each stage are capable of get and obtain.

Resultado de imagen de reagan and gorbachev

The Economy is tied directly with the applied, specific education, of the skilled workforce, who is needed and could be achieved in a nation. The own aptitude to obtain goods or services (even with tourism, raw materials, trade) appetizing to other nations or social groups, will serve for the direct exchange or for barter of the goods and services in which a society is showing a deficit. As an example, energy or specifically qualified workforce.

Also, in cases of need and usefulness, a nation can decide to assign more productive resources to the production of a certain good. But, all more it is required specialization in the production, the performances, both neat and economic (as cost of them) will be minor. By virtue of the laws of the diminishing performance and of the increasing costs that suffer these «specialized reconverted productive processes«.

It is very easy to use the cement in producing military goods of static defense (bunkers, defensive armed lines) and not to raise buildings with it; it is relatively easy to convert the industrial vehicles factories of into armored vehicles plants. And it is very difficult to obtain great performances from a dairy changed in an arms plant.

All of these «means of intervention» require been necessarily and sufficiently harmonized and coordinated by a «centre of gravity» of the Central Strategic Command in each theatre of operations. That, in a centripetal and convergent effort, simultaneously or successively, it would direct and apply the specific means at its disposal.

The End.

The Gravity Center of the Effort of the Joint Means

An Instrument of the Command.

Introduction.

The center of gravity is not an own physical unit, nor is its mission, neither a point in space or one with a predominant physical characteristic or an enemy unit.

The center of gravity is a coordinated flow of ideas of variable application, that generate original actions for fulfilling the mission and objectives. Originality, flexibility, variability, consistency, difficulty to predict by the enemy and effectiveness are essential to its establishment. Actually, the center of gravity is the instrument of direction, distribution and concentration, impulse and work. That the command has to focus on and unify, with the goal of accomplishing objectives and missions, and employing the efforts of his subordinate units and supports.

The chief is centered in his objectives and missions by means of the created center of gravity and follows a methodology for applying the operational systems.

The Efforts Concentration.

As far as concentration goes, the so called “principal effort” expresses an effect of penetration in a given direction and a sense of being able to arrive at the rupture and exploit it. The combined-arms and aerial efforts of the units are concentrated on this.

The center of gravity has a more spatial and temporal sense, looking for an “operational convergence” of “related efforts” towards an objective. Those are not necessarily contiguous, simultaneous or sequential, but are synergic and result in outcomes based on consideration of the optimal form (means economic) of action of each weapon and service.

The center of gravity is more global or holistic; the main effort is more adding and cumulative. The main effort is exemplified by the hammering strategy of French Marshal Foch on the European western front beginning in the summer of 1918. This strategy was used to overcome the Germans purely by eroding their battle capacity in the theater of operations. And only shifting its direction when German resistance was excessive.

The effects of the main effort are more direct, predictable and evident. Those of the center of gravity are more subtle and unexpected, at least in the first phases of a military action.

The main effort is an instrument of the tactical level and is not necessarily generalized to the other levels. The center of gravity can be used in all dialectical activity where several means (either in number or in nature, near or distant) can be used. Within each level of military activity, beginning with the superior one, the center of gravity brings together and harmonizes all activities to obtain the most important effect or objective of that level.

Developing.

At the strategic level, these would be the critical vulnerabilities of the enemy within the theater of operations. The nature of these would be informed by an important political component. At operational level the center of gravity would be created over the critical vulnerabilities of the campaign. At tactical level it would be the objective that would make operational transcendental the battle. If this was correctly addressed, as necessary for the operational direction, the objective would be that which would be decisive in the battle and get the exploitation of victory.

The center of gravity supposes a centripetal action of all the lines of performance, of the ramified activity of all the units and the services, not necessarily coincident, but convergent in their efficiency and result.

Following the communications ramified lines, we take advantage of the departure situation of each force and the transitability of the land, looking for the optimal use of the combined-arms set, reserves and logistics. By means of the different lines of attack or action we induce uncertainty in the enemy, we disperse his defensive capacity and disturb his plans for, and execution of, defense.

The ramified lines, in a final centripetal action, are peculiar to the center of gravity. The accumulation of forces in a sector, reiterating (inserted or successive units) or strengthening (adding tanks, narrowing the sector or providing greater fire support) the effort, is peculiar to the concept of the main effort.

Strategy: Does the Center of Gravity Have Value? - War on the Rocks
ALLEGORY OF THE WORKING OF THE CENTER OF GRAVITY OF THE MEANS

An example of the use of the center of gravity following those ramified lines at the strategic level, is found in Napoleon’s operations to secure the surrender of Ulm held by the Austrian army of General Mack and Archduke Ferdinand.

In an ample advance of its independent army corps, the Great Armée (about 210,000 men) crossed the center of Germany, from the Rhein to the Danube. With this it operationally interposed between the Austrians (about 40,000 men) and the allied Russian forces that went to help them. The French initiated the crossing of the Danube on October 7, 1805 and, during the following week, Napoleon converge most of his army corps in an enormous spiral on Ulm. While a sufficient force watched the arrival from the east of Russian General Kutuzov.

Batalla de Ulm - Wikipedia, la enciclopedia libre
THE SURRENDER OF MACK AT ULM’S OUTSKIRTS

General Mack made, in vain, several attempts at rupturing through Napoleon’s forces, applying his greatest efforts in Haslach and Elchingen. Both Austrian commanders quarreled among themselves and Archduke Ferdinand, with his 6,000 riders, separated from the main force and tried to escape to the northeast.

On the other hand, General Mack and the rest of his men (about 27,000, after the mentioned battles) met Napoleon’s overwhelming numbers at the doors to the city of Ulm since October, 14 and laid down their weapons at the feet of the Michelsberg mount. The capitulation was signed by General Mack on the 20th. The forces of Archduke Fernando were surrounded and won by the cavalry corps of Murat near Trochtelfingen. Another 12,000 Austrians surrendered in Neustadt. The campaign, without properly battles, cost Austria more than 50,000 men of her initial forces of about 70,000 troops.

The center of gravity directs, canalizes, gathers and orients the creation and the direction of the strike of different units and supports in each case. Its shift by the command allows the continuous adaptation to circumstances and the maintenance of focus on intermediate aims.

The center of gravity has as effective factors the speed of operations and logistics. The first allows optimal actuation of the combat capacity of forces and the second diminishes or compensates for the inevitable wearing down of the mobility capacity of troops and posible combat capacity during operations.

Its negative factors are poor transitability, including caused by obstacles, cuts and minefields, and battles command did not wish to engage in. The first “wears away” the operational mobility of the troops and the second “exhausts” their potential combat capacity.

Without those capacities, the fluidity, synergy and the ramified activity of thecenter of gravity tends to revert in a main effort in an operational direction that is quickly known by the enemy. So, the “stunning waves” that are generated on the enemy, cross-sectional to our advance in his operational zone, diminish with it in intensity and frequency, perhaps in the end, even disappear.

The direct elements of performance in the center of gravity are the combined-arms sets, the own and superior level of reserves (even including those in the mass of support or operational rearguard) and logistics. Once the center of gravity is conceived, it is applied and developed by means of the operational systems.

The Development and the Future.

The Hybrid War, a scolium?

Well, but this concept for command can be useful for the wars of I, II, III and IV generation (according to the US denomination, widely «accepted»). But, now we approach the era of the war of V generation: the hybrid or miltifacetic or multifunctional war.

Employing, in addition, digital, computer methods, using the precision and discrimination that allow mathematical algorithms and the technology of radiations and electromagnetic pulses.

NATO Pushed to Upgrade Romania to 'Center of Gravity' for Russian  Deterrence by DC Think Tank - Sputnik International
NATO UPGRADING ROMANIA TO GRAVITY CENTER IN THE DEFENSE OF EUROPE

But it is just that this model of dialectical confrontation with its variable component of physical strength, needs a harmonious and holistic integration of the available multidisciplinary means. By focusing them on achieving different objectives simultaneously or successively, that we want to achieve. And preserving the universal principle of optimization and saving means.

(TO BE CONTINUED)

THE FIGHT OF LIGHT INFANTRY AGAINST SUPERIOR ENEMY

Introduction.

It is possible to bring «coherent collective microdirection» to the tactical microterrain, giving specific missions and orders at battalion or company level. The units used will be light infantry, reinforced with material and experts (engineers, mines, mortars, anti-tank, anti-aircraft). The lower tactical unit will be the section with 2 or 3 squads of 3 to 5 men and their supports. She will receive a direct and simple mission, however dangerous, difficult and laborious. The operating time and available equipment will necessarily be short and light, unless the equipment can be bring forward at a protected . From the time of departure or crossing our own lines until their extraction or disengagement should not pass more than 40 hours. And, it would be preferable not more than 24 hours for an individual mission.

Operations.

The combatant’s means are: the terrain, with which he must melt and blend for his basic operations: march, attack and defense; the grenades are a part of his organic «heavy fire». Completing or replacing the 60 mm mortar, when the combatant is at the distance of subreptitious penetration or infiltration.

And the mode or manner of actions must be guided by harmony in the system «friend, enemy and ground» and the serenity and silence of the combatants. Thus, for example, harmony requires that in the infiltration of an enemy position the effect of camouflage on the advance of the fighter be respected. A shrub or bush cannot move forward or change position in such a way that it is shocking to one of the elements of the enemy’s security or combat advanced.

The attack.

Rather than attacking from afar, favoring the use of enemy heavy fire (artillery, mortars, aviation), the combatant must subreptitiously slide to more or less depth in the enemy’s tactical rear. To attack there operational or tactical targets: command and communications centers; warehouses, trucks parks and vehicles and general logistics equipment; barracks, heavy weapons and observatories of all branches. Depending on the type and the entity of the enemy unit attacked.

In a major attack, the section can advance 2 or 3 teams or raid squads. And, for a thorough reconnaissance of the enemy position, it can send 1 or 2 groups or scouting squads. The advancing sector or band of the section can reach 150 ms.

The enemy, in this subreptitious attack, can defend itself by changing the structure of its security zone. By increasing surveillance positions, it will further strengthen it. But, its security will not have improved qualitatively. Effective protection will come from superimposing that network of sniper pits and defense nests, a network of patrols without a fixed route. To hinder or detect and prevent the work of concealed, patient and silent penetration of the attacking groups.

The defense.

In defense, the fighter will do the same, but almost the other way around. It will melt and blend with the surrounding micro-terrain. Hiding as much as possible their battle positions and fortifications to the more numerous and/or technological enemy. Dissipating the tactical trail of their strong positions, both for combat or support.

Japanese in Battle. Enemy Methods

If fortified redoubts are used, they must be camouflaged and covered and partially excavated in the ground. Around them, there will be a swarm of shooters or pairs of them, covering its approaches at the appropriate distances. It is good to be able to maintain a crossfire, which distracts the attention of the enemy on the origin of it.

In urban areas, the light infantry will create a series of defense positions articulated in defense zones. The use of sewers and tunnels shall be continuous for concealment, protection and subreptitious maneuvres. The positions of direct heavy fire (anti-tanks, machine guns, light guns) will be embedded inside the buildings, controlling the rebuffs.

FM 7-8 Chptr 6 URBAN OPERATIONS

On a block, some buildings will be defended by pairs of fighters and others by sections. The movement of the fighters between and across the floors for tactical opportunity will be decided by the defenders. Access to the lower floors from the streets shall be obstructed and protected by booby traps and/or fire from other positions. The courtyards and lots can be suitable for the deployment of anti-aircraft and indirect heavy fire positions.

The mines, barricades, cuts and obstacles will be «interruptions covered by fire«, which break the enemy impulse. The «relative hidden heights» of any urbanized area and the twists and turns of the streets and tracks hide us and break enemy units. Our indirect artillery can register approaching routes and parks and squares, to disrupt enemy advances, concentrations and deposits.

Our tactical actions will seek to: override the enemy impulse; prevent it from encircling and surpassing our units; erode their advances from various sides; destroy their armored and transport vehicles; block their entrances to buildings from terraces and top and bottom floors; and advantageously anticipate their intentions and attempts.

FM 7-8 Chptr 6 URBAN OPERATIONS

All our efforts seek to make that the enemy, with our defense deployment and with the technics and tactics we use to make it work, lose all its numerical, technological, and fire and tactical motion capabilities advantages over us.

If we can have a «detached mobile group» outside the urban perimeter, that is not located by enemy reconnaissance or its air or ground units. It could harass, ambush, erode or attack, as the case may be, the enemy in its tactical rearguard. Their offensive actions must have the operational objective of weakening and disrupting enemy tactical capability. And with this task in mind, the various opportunities to fight against small enemy units and their supports of all kinds will arise. Another premise of their action is that our «detached group» must keep its security, always avoiding an unwanted encounter with the enemy, its premature detection and being surrounded by it.

The marches.

There is a third category of actions that are marches. These would be to the combat, between our own near or far positions and retrograde, with enemy persecution or not. The march to the combat, especially at the near and medium distances, aims to reach the combat positions of each branch with the enemy. Protecting and maintaining the combat and tactical movement capabilities of all units. To make the enemy feel, without any reduction, all our fighting capacity: fire, shock, infiltration.

Here, it is also necessary to get melt and blend with the march terrain. It can be different according to the sections of the route. Protection is the primary condition of our march, as we have not yet begun combat with the enemy. And, without it, we will have squandered and thrown away our opportunities and scarce military means.

Every march with the possibility of an unwanted encounter with the enemy is a march to the combat. And that possibility will define the security and concealment needs of our «marching groups«.

Chindits: The British guerrilla warriors who crippled Japan - Americas  Military Entertainment Brand
CHINDITAS ADVANCING ON NONHOSTILE GROUND

The reconnaissance of our routes must be sufficiently advanced, depending on our knowledge of the route and the enemy and their characteristics. That reconnaissance will be supported by a “vanguard with fighting capacity”. And considering always that its mission includes avoiding the fight with the enemy, except our rejection in a suffered ambush. The hidden and silent features of our fight strongly advise it.

Protection is a necessary element of surprise. Which is a cheap and effective multiplier of the combat capabilities of our light and lean units. Since the enemy tends to not «combat readiness» for most of the time. But this is a desirable and natural thing: lions rest more than 2/3 of their daily available time. And since the enemy needs a «time of detection and alert» to prepare to fight, he has to maintain an advanced security in an effective deployment. That guarantees him to count on such «essential time«, so as not to be surprised by our attack incursion.

The technological weakness of our deployment will be amply compensated, with the concealment, the longer running time, the security of this, the careful and necessary reconnaissance and use of the ground, which gives us that desired fusion with it.

Employing the most favorable terrain to advance: its folds, unevenness and concealment; and dragging to cross over waterlogged lands or near to the enemy and difficult to cross terrain; and the creative and varied camouflage; and making use of the concealment that gives us the night, as a natural reinforcement of our actions. To leave as little tactical footprint as possible for the enemy.

In the cities, there are means of concealment, which gives us their layout, their elements and their construction, the parks, the ditches and the sidewalks. Along with the metropolitan railroad system, the general sewer system and the tunnels of circumstances that we can excavate or reinforce.

To advance through the slopes, it is important to use our side or slope of the relative military crests. Considering that, the enemy will deploy on its side. And, whether or not advance some security, branches observers or forces near them. The distance to the ridge is important and different for the types of fighting. If the defender is somewhat separated, he could be attacked with grenades. And if it is very separately, this means leaving the attacker the domain of the subreptitious approach. Somewhat close, may allow you to detect the assailant and beat and reject him with grenades.

The Command Conduction.

The conduction of these units must include and then inspire and reflect the complementary and continuous character of their «essential polarity«. And that it acts in its conception, development, doctrine, implementation, equipment and training, logistics and support, marches and execution of missions and tasks.

Let us remember, now, that they are regular or semi-regular units, which protect themselves and fight, in a characteristic and singular way, with a greater or better equipped technologically enemy. And, employing in its dialectic war any form of fight (attack, rejection, retardant defense) or maneuvers. And acting partially and to the appropriate degree, as an irregular unit, confusing and merging with the tactical terrain.

Whereas, if we insist too much on a form, conception and implementation, the dynamics of the processes underway can end up moving us away from good doing and even from success. All this has to do with quantum mechanics, Heissenberg’s indeterminacy principle and Hobber’s principle, as natural and ultimate regulators of processes.

Thus, the direction, mode and realization of our means and objectives must be guided as the pilot of a small boat guides it. With the objective on the horizon and employing small course corrections to resume the initial and successive intentions.

Flowgram and Balance processes, actions and facts in the fight of light units in an different or extraordinary way.

Centralization // Coordination // Delegation

Authority // Information

Terrain // Terrain and Micro terrain

Strategy and Operations // Implementation

Intentions // Contingencies

Means // Chances

Organization // Error’s correction and prevention

Reinforcements // Carrying out

Intelligence // Reconnaissance and Intelligence application

THE RECONNAISSANCE AND THE INTELLIGENCE: A MILITARY OPERATIONAL SYSTEM. 2nd Part.

(FINAL)

The near future of tactical reconnaissance.

Major tactical reconnaissance weapons, tanks and low level flying aircraft tend to be vulnerable to modern infantry antiaircraft and antitank missiles. They appeared on the battlefield in the 1970s and have become more effective since then. Since the mid 1990s, these rockets have been incorporating various technologies such as double active heads, multiple search engines, which allow them to discriminate against enemy decoys and secure the target, and those that allow them to use variable flying heights. For example, upcoming infantry tank rockets will be able to locate, define and confirm their target by magnetic distortions of the environment (generated by the relatively large metal mass of the tank), acoustic signals, heat emissions (human and motor and weapons) and short wave emissions. Their way to the target will oscillate to circumvent possible weapons deployed against them.

Resultado de imagen de deep range combat and reconnaissance patrols NEW ZEALAND’S LONG RANGE RECON PATROL.

All this will tend to give greater importance in the reconnaissance of to the deep range combat and/or reconnaissance patrols. They are inserted by air or river means, as close as possible to its operations area and designed to stay longer in it.

Combat reconnaissance: The immediate and continuous contact with the enemy and determination of the capabilities of the fighting ground.

Combat reconnaissance conducts ground reconnaissance, the relation of his own army’s adjacent units in established contact points and the location of the enemy to help determine the enemy’s intentions and characteristics. This latter mission is subordinate to the goal of obtaining intelligence. Every unit must establish it always, without need for specific orders. It is important to advance the subunits as rapidly as possible; if only is conducted by infantry, it may be necessary use vehicles to transport troops, who can then continue on foot.

In open flanks and exposed wings, its range must be adequately extensive. By means of anticipated patrols, combat reconnaissance constitutes in its actuation a real security for units in the front.

 Its organs are armored reconnaissance companies and platoons, reconnaissance patrols of units in the different sectors, observatories and forward platoons of artillery, etc. The platoon at disposal of the H. Q. and services company can be useful in the battalion area for rapid action.

Combat reconnaissance has a basic function to detect resistances and weaknesses in the enemy deployment and weapons, and in the “interfaces of action” created on him. It needs to use tested skill, sufficiently intense and never superficial, that is knowledge about the weaknesses of tactical units and the fortresses of opposing deployments, as well as its efforts to present the illusion of such deployments. It is important to act according to the mission and the gravity center of the effort ordered by the high command. Colonel Tor made this point in his book “Infantry” (page 31 Madrid, 1943), “…advance through the enemy weak points and fight from one’s own strong points».

Resultado de imagen de soldiers on patrol  A PATROL…

Information collected from various sources, becomes available intelligence and is transmitted to those interested.

The reconnaissance generates information on the different action levels and the ground, which it also recognizes. That must be converted into intelligence. This is the reasonably reliable and sufficient knowledge (never excessive or intoxicating) of the enemy, of his intentions and possibilities and of the terrain, in its possibilities of struggle, transitability (more than ground ongoing), etc. Received updated and without continuity solution.

The elaborating organs of intelligence are different for operational and combat reconnaissances, since also they both generate different types of information. The principal difference are their qualitatively different levels of actuation, in which they must give the set vision: enemy, area and possibilities. And that the need for combat intelligence is urgent and more continuous, and its transcendence, very fleeting, so it is much less elaborate and more direct to fighting units, from its reconnaissance.

Once intelligence is created, it is integrated by the superior command, G-2. It will then be transmitted to units and interested commanders. Transmission must be protected by all existing means, guaranteeing secrecy and its arrival to the addresses by means of double couriers, coding, etc.

Transmitted intelligence must assemble the suitable characteristics of the moment and ensure reliability, continuity, transmission security, and the wealth of content and its sufficiency. It must also be opportune and continuous. The security of transmission of intelligence affects plans and decisions that based on it. It must be sufficient, rich and trustworthy enough to give command, within a reasonable amount of time, as complete idea as possible of a situation and to plan for its possible evolution and factors that will affect that evolution. Sufficiency drastically limits the excesses of unnecessary information which disorients and tires those in command that try to use them.

G-2 is converted this way into the penetrating and lucid eyes of the operative command.

The security as “opposed complementary” of the reconnaissance.

The reverse of the own reconnaissance is the fight against the enemy reconnaissance and the intelligence. She has as purpose to blind the enemy about our intentions and deployments, depriving him of operational information on us or misleading them. Security is the “opposite” (complementary, not antagonistic) of our reconnaissance.

Resultado de imagen de soldiers on patrol   COVERING A SECTOR…

One of the active ways of fighting enemy reconnaissance is employing our operations security. Other is to employ advanced detachments, type reinforced platoons, to push back the enemy’s reconnaissance by means of mobile fighting with its center of gravity” focused on where his reconnaissance have to operate. A pushed back reconnaissance can give erroneous information to its intelligence on the actual possibilities of possible axes of advance towards us, our real capacities or our defensive intentions.

One purpose of security is the immediate protection of units against surprises and the unforeseen, by keeping a sufficient “combat readiness” for such situations. Units must also keep necessary forces alert as part of maintaining a practical reaction time. The tasks of security are to protect units from direct fire of infantry heavy weapons, to detect and avoid surprises, ambushes and enemy incursions and to detect and reject enemy reconnaissance. Every unit establishes at all times the security sector, zone (brigade or regiment) and area (division), according to its size. Between 1/3 and 1/6 of the unit, according to the situation, carry out security functions; the organs of which are the different sub units of the branches employed.

For camping units or in assembly areas of different classes, a safety line is established to delimit the protected units and at suitable points (accesses, etc.) double sentries are placed. At difficult to secure places (gorges, etc.) rapid mine barriers are placed. From this line, security units advance fixed and mobile patrols. Fixed patrols monitor critical security points (dominating points, enemy possible observatories, inevitable passing points, etc), relying on the mobile units to achieve always an active security.

Resultado de imagen de campos de minas militares  MINES BARRIER.

And, this so useful and simple, is always done? No, sir, not always.

«On June 10, 1944, soon after the midnight, the second battalion of the 29th division of infantry of U.S.A. was prepared to pass the night. The men had traveled approximately 25 kilometers over the last 20 hours. The official in charge of the battalion, Commander Maurice Clift, chose a zone of two meadows so that the troops were to spend the night in the open. The men entered the zone and set themselves up for sleep along terraced hedges. They were so tired that no one bothered to untie their rucksacks and personal equipment. The majority fell asleep at once. Some heard the noise of approaching engines but thought they were American vehicles.

However, the vehicles were actually German tanks and trucks belonging to the 352nd infantry division. Unknown to each side, the Germans had been withdrawing along the same route that the American battalion followed in its advance. When they stopped, the German explorers detected the North American movements encamped in the meadows. They quietly advanced and surrounded the meadows.

Suddenly, the Germans threw flares. Under the sinister light, almost as brilliant as the midday light, its assault cannons opened fire on the hedges against the Americans. Along one of the hedges a platoon got up and was cut down by the German machine guns. Many Americans, scared and disoriented, were running in search of a way out of the meadow while the German infantries continued knocking them down them with repetitive fire. The shells of the German mortars were falling all over the meadows. The Americans responded with weak rifle fire, directed at the opposite hedges, which ran the risk of hitting either the Germans or their own men.

«It was terrible”, a survivor told General Cota. «We crawled more than 90 meters out of the field when we heard from behind the shouts of our men. I thought that the Germans were launching a bayonet charge against them».

The commander of second battalion, Lieutenant Colonel William Warfield had his command post in a farm close to the highway. Warfield tried in vain to establish a defense. Those officials who ran from the house towards the field were brought down rapidly. A German shouted in English to the command group: «Give up, give up!». «We will certainly not give up!”, roared Warfield. He tried to lead a small group towards meadow where the rest of his men were, but was killed instantly.

The battle lasted around 20 minutes. The battalion had 150 casualties with some 50 dead, slightly more than one third of its effective force. Just before dawn a gravely injured young lieutenant who was reporting to his division commander, General Charles Gerhardt, fell down suddenly on his knees and struck the soil with his fists, sobbing that he was sorry that all his men were dead and that he had left them where they had fallen.

General Gerhardt was angry. “Without regard for safety, he shouted, The battalion simply came to the field to fall asleep».

THE RECONNAISSANCE AND THE INTELLIGENCE: A MILITARY OPERATIONAL SYSTEM.

The reconnaissance generates information of the different operational levels of military action. This must be turned into intelligence. That is the reasonably trustworthy and sufficient knowledge of the enemy, his intentions and capacities and the fighting possibilities and transitability of fields, etc. To enable us to take a “founded resolution”, based on the use of our means and fighting forms, in accordance with our objectives.

Concepts y Principles of the Reconnaissance.

Reconnaissance is one of the most important functions to be fulfilled by units during operations. The information it provides, how it is elaborated and transmitted and to whom is a fundamental part of intelligence. This, finally, is one of the key factors of decisive command.

Resultado de imagen de SDKFZ 263.    SDKFZ 263.

Reconnaissance can be divided into strategic, operational or tactical and combat, according to its mission and the area it encompasses. The strategic one seeks to uncover key information about the enemy in the operations deep theater: his concentrations of forces, his great movements, his important defensive lines and possible surface targets, etc. A surface target becomes a “destruction zone” by the effective action of heavy weapons of destruction, for example, reactive artillery or tactical nuclear devices.

The operational or tactical reconnaissance tries to define the situation and the intentions of the enemy in the operations area of the great units, type division, corps or army. It determines the movements of the enemy in the border zone between forces, his formations and deployments, his defense lines and possible surface targets. This reconnaissance is carried out by aviation, drones, specific reconnaissance units and the reinforced reconnaissance armored battalion of the corps. In this respect, a total connection and complement must exist in the missions of aviation and ground reconnaissance and keeping in mind that its task is never of fighting.  

The reinforced reconnaissance battalion operates in a sector of up to 60 kilometers wide and 100 kilometers deep. Its advance over the parent unit must be at least 6 hours in order to utilize gathered information. On the basis of its reconnaissance order, battalion commander, keeping his companies always under control, can send up to 16 patrols of 3 vehicles to covering his sector, looking always for a gravitational center of the deployment. Having done this, he can send on the concentric center of the effort up to 2 patrols’ echelons, being relieved or being inserted, according to the used method. Finally, if the area to reconnoiter is occupied by the enemy, he can advance his companies as attack spears, under the screen of advance patrols. The battalion must not infiltrate very deeply inside the enemy deployment, if there exists a serious risk of being isolated.

Resultado de imagen de Panhard AML-245    PANHARD AML 245.

Not all Armies have given or given sufficient value to this last reconnaissance type, which depends on their military doctrine.

All the operational principles of reconnaissance could be summarized as follows: Always focus on the objective received from the command (its mission is to generate information, the combat will be done by others), seeking the maximum use of time and its means, getting and maintaining contact with the enemy and never losing the freedom of action. It will allow him to perform and to escape, without being caught by ever higher forces.

The tactical reconnaissance is also needed in the urban combats. Not always the tactical reconnaissance penetrates too much in the disputed or enemy area. The industrial or populated zones, full of «concealing relative heights» and staggered in depth, which offer protection from the enemy sights, even nearby, and covers against the light and heavy fire, «thicken» considerably the tactical maneuver of the contenders. Reducing this way, the depth of the fighting zone of the infantry. So, masses of the artillery, as batteries and medium groups of it, are deployed at very short distance to his enemy. In a artillery fighting zone then very next to the forward limit of the own defense position.

On October 9, 1942 a patrol of Soviet reconnaissance entered behind the German lines in Stalingrad, seeking to detect the enemy movements in his rear. The 4 men sheltered in an auxiliary railroad coach, torn and left, placed in a railroad between the workshops of the Red October factory (where before were made metallic pieces and small weapon), at North-East of the city. And the disputed Mamaiev hill, towards the geographical center of Stalingrad, which was offering grand sights on most of the city.

Resultado de imagen de Engesa EE-9 Cascavel brasileño. ENGESA EE-9 CASCAVEL.

During almost the whole day they remained in that hiding place, communicating by radio to his lines the German activity. They had located several dozens of German mortars and howitzers, accompanied by the trucks which were moving his ammunition, by the rear roads to some emplacements placed in the suburbs of Stalingrad’s west. Also they located numerous mortars and pieces placed in a glen at the north of the Mamaiev hill, doing fire against the Soviet positions in the city.

On having got dark, the explorers broke a telephonic cable of the fixed enemy network of communications and hoped that the Germans were coming to repair it. Very soon they observed the light of a lantern and when the soldier came closer, killed him to shots. One of the Soviets disguised himself with his uniform and placed close to the route of the railroad, hoping that another German came closer the cut cable. Soon another lantern started approaching by the way. The soldier fell in the ambush and the explorers made it unconscious. On having recovered, he met 4 Soviets of foot together near him. Pulled down the soldier Willy Brandt gave his name, range and unit of belonging. Psychologically they had already gained the hand on him.

Resultado de imagen de drones guerra Vietnam   DRONE AQM-34 Ryan Firebee, IN VIETNAM.

Immediately afterwards, the German told to the explorers that 94th German infantry division had come to the factories zone from the south of the city, that 24th panzer division was going towards there and that the Fuehrer had ordered that Stalingrad should be totally taken by October, 15. This confirmed to them the reason of the extensive movements estimated by them in the German operational zone.

For the small reconnaissance patrol, to take with it after his lines, a prisoner already interrogated, was more a nuisance and a danger that a minimal success. And, in spite of the hardness, even the brutality, of the combats in the city, they neither killed, nor mutilated him. The Soviets reported to Brandt that had revealed military secrets, took him to the railroad line and indicated the direction that he had to continue to reach his comrades and left him free”.

But, what is this of speaking about operational reconnaissance in the age of the electronics, the robotics and the computer science?

Almost 50 years ago, the North Americans had developed an arsenal of electronic devices, directed to the vigilance (surveillance) of his enemies in Vietnam. Already they had reconnaissance drones to monitor «from above» their guerrilla slippery enemy. That transmitted his images by television to the planes of detection and transmission, placed at dozens of km from the observed zone.

Resultado de imagen de sensor ADSID   ADSID SENSORS .

The principal sensor used in the remote vigilance was the ADSID (Air Delivered Seismic Intruder Device). It was thrown principally from the F-4 Phantom, following guidelines of navigation by radar, in order to cover adequately the observing zone, as a traffic route of men and vehicles, a parking or store. The device measured 91 cm. of length and 15 cm. of diameter. And on having fallen down was remaining almost buried, opening then a transmitting aerial of 120 cm. height, camouflaged as if it was a defoliated bush. His battery allowed it to issue during a month and half.

With these sophisticated artifices they were trying to observe the traffic of goods and men by the Ho Chi Minh Route, the route of supplies of the Popular Army of North Vietnam and the Vietcong in South Vietnam. It was a highly branched out and protected route that, departing from North Vietnam penetrated in Laos and crossed it. And then, detached diverse routes towards the different communist operations zones in South Vietnam.

The program «White Igloo» destined 1,7 thousands of million dollars between 1966 and 1971, for these tasks of compilation of information with the ADSID. With the information gathered from the traffic in the routes, the Americans were deciding the interdiction bombardment actions, using his different air devices, including the invisible and inaudible (with his cruise height) B-52 strategic bombardiers. At the beginning of 1971, the information of the aerial photos after the bombardments, taken by planes that were flying after the assault formations, allowed the analysts to suppose that the «war of trucks» was causing a very severe effort to the industrial capacity of the suppliers of North Vietnam (the USSR and China).

Resultado de imagen de Joint Surveillance Target Attack Radar System  A BOEING OF THE JSTARS SYSTEM.

But, if it was true that were destroying so many trucks and equipment, how was possible that the communists were keeping the tactical initiative in South Vietnam? On the other hand, where were the tens of thousands of remains of trucks that literally had to cover many of the ways and parks of the Route? Who were bothering to remove them? The response was given soon by the American junior officers: they were ate by a monster called the «Great Laotian Truck Eater»; a horrible rotten that was getting up towards the dawn and was devouring the vehicles destroyed by the aviation during the night, after the photography for «wreck count». Because the Americans are very scrupulous with the statistics and consider the lie an almost inexcusable social sin for his civil servants.

Up to today, almost 50 years later, the electronics, the robotics and the computer science have continued improving. But it does not seem that they are useful in Iraq, Afghanistan or Syria, to detect a “donkey bomb”; to avoid that group of cruel fanatics without God («as Allah does the Good, make you also the Good and do not promote the corruption (the “evil», the Noble Koran orders them), destroys great part of one of the principal mosques sanctuaries of the chiism in Samarra; to know if in an Iraqi or Syrian house are terrorists or only a terrified Arabic family, before demolishing her with heavy fire from a distance and extremely, according to his military operational doctrine.

In addition, during enough time still the air and spatial American means, as spy satellites, drones or not crewed planes and planes of the system Joint Surveillance Target Attack Radar System (JSTARS), will have serious limitations for the detection and check of small ground, even regular, forces. In the areas of difficult transitability and with possibilities of concealment, as mountains, jungles and forests, marshes and urbanized zones (industrial, of logistics, and of housings). Those not only offer concealment, but also coverings from the fire up to the near combat distances.

The Americans do not use the tactical reconnaissance, which demands some tactical characteristics of semi independent elite forces and a specific moral courage. And that is one of the most difficult tasks of the infantry. They use the combat reconnaissance and call her, expressively, reconnaissance.

(TO BE CONTINUED).

The modern Hybrid Warfare. 3rd. Part.

(THE END)

The Multifunctional, Total or Multisubject Wars.

In general, the attacks are realized to the software of a system, looking for a «weakness» of this one. And using the malicious codes, the back entrances, etc. A penetration or attack to the software is prevented in general with an antivirus adapted to the received virus. To attack the hardware is necessary to act on the «physical component» of the computer. And his detection, with the nowadays existing miniaturization, turns out to be very improbable and long in the time, until the devastation is detected. The best way of acceding to the hardware is realizing the intrusion in the factories of components and of assemblies. But these are protected by control measures of components and external equipment, based on the nationality and the producer of them.

The cyberattacks go to cybernetic networks of the society, both public and private, to the communications and means of control of equipment and networks. Becoming concrete definite in the facilities of different out-standing or strategic sectors of a country or alliance; like, industrial centers, military communications, administrative public negotiations, social opened networks, energy distributors, intranets of banks and economic means. And they seek to paralyze or to disturb the functioning of them or to distribute in them more or less opened tendentious information, to alter or to direct the public or particular general opinion in favor of the interests not always evident of the attackers.

Resultado de imagen de ataques ciberneticos mas famosos

The cyberattact is a «total attack» of swarm type; that is, of multiple and simultaneous or sequential character. It is directed on the economic, administrative, civil and military structures, which hold and allow that a «social group» should work. It is a «form of fight» in the cybernetic area. Where «one» seeks «to occupy» tactical or strategic «advantageous positions«. And «to damage» the enemy, preventing him from keep his pace, his «habitual tempo» of functioning and stealing and depriving him sometimes of the costly goods of research and development created by him. And that were allowing him to keep a competitive advantage in national «intervention means» in the industrial, economic and military fields. A branch of the cyberattack is the industrial espionage.

With them is achieved to seriously concern and debilitate the diplomatic, economic, military and civil sectors of a society. In the civilian is the original humus, the social essence, as creator of the «national morale» and the «will of defense» of the social group. Being those sectors the «means of intervention» with which a State counts for his global, holistic defense, against the aggression and external and internal dangers.

It is known the supposedly American attack using an advanced virus against the software of the Iranian centrifugal machines. That were operating to separate the isotopes of the Uranium 235 and Uranium 239 (not fissionable), using his different “molecular mass”. Seeking to obtain U235 enough pure to create «self fissionable critical masses«, the explosive of the atomic bombs, for his supposed nuclear devices. As the % of purity between an industrial use, to generate electricity, for example, and the great purity that needs a «critical mass», both «activities of successive enrichment» are perfectly recognizable by the foreign intelligence. In May, 2010 it was detected by the Iranians a malicious virus, called Stuxnet, in the of Nataz’s nuclear station. And that gave to a thousand of them the «order» of self-destructing. But, already in January of this year, the inspectors of the Atomic International Energy Agency (the AIEA) and the Iranian technical personnel had detected that many centrifugal machines were working slowly or badly and without a certain motive.

Resultado de imagen de ataques ciberneticos mas famosos

China takes a privileged singular position as a «great universal factory» in the global economy. And the same sells cheap products of immediate consumption on a large scale, that compete principally in price, which makes already products of high added value with the most modern technologies. This allowed him to lead one of the most significant and consistent cases of cyberattacks on a large scale against a country or coalition. The history was published by Bloomberg.

The agents of a unit of espionage and cybernetic war of the Chinese Popular Army managed to place some malicious «components» in the motherboards of IT equipment of the Supermike company, of San Jose, California. Who buys to Chinese factories, which have, in turn, subcontracts and suppliers of components in China. This way, the IT equipment with this «Trojan horse» allowed the cybernetic Chinese spies to accede for 3 years to industrial and governmental secrets of the EE. UU.

The anomalies emerged in 2015, when Elementary Technologies, who was designing software to compress files, reported of them in the baseplates of his cybernetic servants. Around 30 technological companies existed, between them Amazon and Apple, and diverse agencies of American intelligence, «invaded» in the Chinese attack. It was verified that the cybernetic servants of Elementary were mounted by Supermike, which is the major world producer of cybernetic servants.

It was found that some plates of the cybernetic servants had installed a «perfected component» that did not appear in his design and that it was not a chip. This multifunctional «foreign corps» would have been placed in 4 factories of China that mount the cybernetic servants of Supermike.

Resultado de imagen de ataque chino al hardware THE SUPPOSED CHINESE COMPONENT INTRODUCED IN THE HARDWARE.

The physical interventions in the hardware are more difficult, because all customers theoretically verify the equipment that they make or buy. Attack to the other people’s hardware foreign are doing usually during his traffic from the manufacturer to the client. That is the method that the American agencies use. But this malicious and comfortable manipulation of the Chinese spies can be effected because China is the great manufacturer (with license or without her) of hardware (computers, mobiles). And the directors and controls of his factories collaborate of well or badly degree with the «requests of the authorities», in a wide sense.

And, finally, some days ago was important the recidivist case, still not close, of the Chinese giant of the telecommunications Hua Wei. This way, the agencies of intelligence of the U.S.A- has warned that must not be used the products and services of Huawei and ZTE. Accusing that the terminals of these brands might be working as «cybernetic concealed agents«, spying for the Chinese government. Also, the Pentagon has prohibited to his personnel to introduce in the military bases the products of these brands.

China, as a great power example, of realizing his own and adapted «combinations» of means of intervention in his different stages.

Imagen relacionada CHINA’S ASPIRATIONS…

One first Chinese national foreign objective is to promote the multipolarity in the world structure of the great powers and his allies. Looking that does not exist a world hegemonic power, like the USA, that hinders him in the extension of his influence and power from his «nodal center«.

For it, he will create alliances and will establish agreements with others countries in detriment or in substitution of that hegemonic power. And he will be a «obstructionist intransigent actor» in all the actions that that power promotes unilaterally in the international forums (UNO, Atomic International Energy Agency). This way, the actions of the western nations in the Syrian conflict were frustrated and limited by the systematic veto of China to his approval in the Security Council. Though the Chinese communists consider to be out of the fight for the direct influence in the Moslem Middle East. And, the Chinese decision to renew his relations with the Sub-Saharan Africa, it was partly a strategic corollary of the «war to the terror» of the USA and the NATO in Middle East, as supplier region of crude oil and gas to the whole world.

Resultado de imagen de china poder político militar A CHINESE NAVAL GROUP OF STRATEGIC PROJECTION SAILS IN THE CHINA’S SOUTH SEA, AFTER CROSS  THE TAIWAN’S STRAIT.

China is for Russia and Russia is for China a partner, competitor and rival, if it is worth this polyvalent definition, which does that none of the expressions is in fullness. Both are «emergent powers«, according to the new nomenclature, determined in growing, in not get damage directly for the moment and in eroding the hegemonic power and his Europeans allied.

This way, the Chinese would not act directly, not by third interposed countries, in Syria, in the boiling cauldron of the Asia of the Southwest, scene of the global contest that sunnis and Shiites develop for the control and the supremacy in the Islam. But they will do it collaborating up to a point with the interests and the diplomatic propositions of the Russians. Reinforcing this way a political common position of counterweight and neutralization of the influence of West in the zone. And in exchange for a certain Russian reciprocity in favor of the Chinese interests, in other countries in which do not shock the national influences of both. Resultado de imagen de china Paracelso y Spratly. A CHINESE NAVAL BASE OF MISILES IN A SMALL ISLAND OF THE PARACELSO’S ARCHIPELAGO .

A strategic exterior Chinese preference goes towards the Indian subcontinent and to the nations of the first Asian circle of terrestrial and maritime nearness. The India is a radical rival at his measure, with whom it beared several frontier wars in the middle of the 20th century. The India has a political structure more advanced than China, the liberal participant democracy, still in spite of all his contradictions, ethnic, religious and social discrimination and lacks of all kinds. And it possesses a demographic strength that overcomes China’s people grow. Though lately the Chinese begin to realize the irrational of his «pseudo scientists» methods of the control of the birthrate. That the communist China applied in altars of a material rational progress. Progress which only enjoys in diverse degrees at the present, the members of the communist party and his families, the technical personnel who design, stimulate and develop it, the chiefs and officials of the armed forces and a minority of entrepreneurs and men of business. That have prospered at the shade of an institutional inveterate clientele of the mentioned public elites.

At the west of China, close with his Sinkiang’s immense region (Xinjiang), in the Oriental Turkestan, there is a rosary of former soviet socialist republics of 2 thousands Km long, that get until the Caspian Sea. They are, from east to west, Kazajistan, Kirguistan, Tadzikistan, Uzbekistan and Turkmenistan. And there form these countries a monolithic set of several etnias, gathered in the names of them, but extended over several simultaneously, of Turkoman origin, of the central steppes of Asia. And agglutinated also by his belonging to the Islam sunní. All this form a multinational defensive and refractory shield to the expansive activity and to the significant presence of the Chinese in his internal matters or in his exterior trade, always with effects of political guardianship. These Turkoman Muslims are rather potentials allied of the Great Russia, with only she puts a bit of care and dedication to attract and to attend them.

Imagen relacionadaCHINA PROJECTS IN  AFRICA HER ECONOMY AND INFLUENCE. DISPLAYING HERSELF AS A COUNTRY THAT NEVER WAS COLONISLIST.

Another great strategic preference of Beijing is to extend his influence and increase the economic and diplomatic bows with the development nations, specially those who have «natural resources and primary cultures«, that are necessary for the manufacturing production, the supply and the general development of the nations. She has taken it even far beyond his geographical borders of political influence or strategical military.

With the interminable income of his exports and with the knowledge of the development in many areas, China does intelligent and massive strategic national «landings» in diverse countries of Africa and Spanish America. With them it establishes «binding alliances» of backing, advising and support. Trying to anchor firmly and creating allies or «friends» by all this world in development. 

Going firmly by the political, economic, diplomatic and military way of turning to what China really seeks to be:

one (or the) hegemonic power in the 21st century.

 The litigious, even violent, and, at least, very menacing, that China keeps with the countries of the East Asian, demonstrate how awkward, despotic and subjecting can be his presence in the short distances. When China thinks that com into play his national interests or his national pride. Whose loss in hands of the «foreign powers» until almost middle of last century, is one of the neurotic tics of the exterior politics of Beijing, from October 1, 1949.

In the Sea of the South of China, this power is expansive and hegemonic. And keeps litigious more or less important with the rest of the Asian countries bathed by this sea. That are The Philippines, Malaysia, Brunei, Indonesia, Singapore, Thailand and Vietnam.

This sea has 3500 thousands Km2. And China thinks that it is his «Second Persian Gulf«, for the sub aquatic oil and natural gas deposits, existing and estimated. For comparison and perspective, the Mediterranean Sea only has 2500 thousands Km2 and his coasts bathe to 24 countries in three continents. None of which is hegemonic or expansive.

In order to settle itself in the «disputed archipelagos«, China follows a strategy of small and consolidated advances. Installing in them, in islands and rocky islands, military air or naval bases and extending the logistic capacities of some of them, substracting area to the sea. This has forced to some coastal countries to realize occupations in the islands of his regional seas. Destined, rather, to indicate his presence and sovereignty.

Two of the most showy cases are the archipelagos of Spratly and Paracelso.

The Spratly has hundreds of islands and rocky islands spread by more than 400 thousand Km2, near the Philippines. In relation to this archipelago, the Court of Arbitration of The Hague already pronounced that does not exist a legal base for the Chinese claims. And that the Spratly are not islands with economic projection. But, China, simply, does not recognize it.

The Paracelso’s archipelago, at 700 Km south of Hong Kong, is placed at the west of the southern Sea of China, in the entry of Tonkin’s gulf (Vietnam). There, China has crude oil platforms in dispute with the Vietnamese government. Near the Chinese facilities have been diverse incidents between the Vietnamese fishing boats and patrols and the Chinese ships of escort. That have dispersed them using water cannons.

THE NO “COMBAT AVAILABILITY” OF THE FORCES IN THE DEFENSE.

 

A variant exists of deficient or useless «combat availability» of a military force. And it happens when exists the «entrusted«, the «satisfaction» of the commands in the real state of alert of that one. Without assuming or to appreciate the failures in it.

The Development.

We know that the high limit of a characteristic or property is very difficult or impossible to reach. Some of them are the «total destruction» of the enemy and the absolute «public security» in a population or in a society. If you monitor the great public sites, airports, parks, they would attack a church or a mosque…There are always plenty of potential objectives and not enough security forces… But what is exigible and necessary is that the commands optimize the use of the received military resources, which always are insufficient, in the tasks at their charge. With it they will have made all the humanly possible for fulfilling them. Since the optimization of those is equivalent to his «good employment » and to everything what this involve.

The variant of the deficient «combative availability» that we treat, arises in the defense. And it has several possible origins and reasons. This way, we have the deficient organization and deployment of the security zone. That will allow in major or less measured its secret, patient and multiple penetration by enemy groups. That will not have to possess necessarily sappers’ training. Also the dominant positions near the more or less permanent and important position of the forces, must be garrisoned by advanced detachments of, at least, a squad.

The approximation routes to the forces, from certain distance, must be registered by the mortars, the artillery and/or the aircrafts of support. In some sections ambushes can be established and, in others, obstacles and barriers covered by the own fires. Other sectors can be provided with cameras and sensors. The thermal and acoustic airborne sensors can track and detect small enemy units in the different phases of their approximation march to the combat. The intelligence should facilitate trustworthy reports, with sufficient information and updated with the enemy intentions and plans in our zone and their development.

Resultado de imagen de soldados indisciplinados THEY ALSO COULD BE IRREGULARS.

In the irregular war, the enemy is in the habit of reconnoitre, at least initially and also in fluid conditions of fight, by observation. It is important to locate and eliminate these «reconnaissance positions», which will never be fixed, but alternative and ephemeral. The own patient observation is the way. And bearing in mind that, if the exigency is intense, every 30 minutes must be substituted the observer, Because he looks, but already he does not see. If additional means exist for it and as complement, it is necessary to use the patrolling against the armed or not native marauders, in the way of reconnaissances and attacks with limited aims.


Let’s remember that the correct security must prevent that our forces could be beaten by the fire of the enemy infantry weapons. Also, detecting the enemy, tactical surprises from him are avoided to those. And that the presence and/or the action of our forces in this zone, including the advanced detachments, have as a specific task, to win the sufficient time, in order that the forces that have advanced and deployed them, could reach the right «combat readiness» to reject the enemy. And for all this, the security is a irrenounceable part of our total “combat readiness”.

But, also the most experienced veteran or professional units can be «surprised» by the appearance in force of the unexpected enemy, in an assault against them. And it happens when they are entrusted or satisfy with a deficient security. That is another face, less evident and defined as such, of her not or insufficient own “combat availability«.

An Example from the Western Front in the Second World War.

On June 10 of 1,944, soon after the midnight, 2 º battalion of 29 ª division of infantry of U.S.A. was prepared to pass the night. The men had traveled approximately 25 Kms. during the last 20 hours. The executive official of the battalion, commander Maurice Clift, chose a zone formed by two meadows surrounded by hedgerows, in order that the troops were happening the night in the open. The men entered them and were left to fall down against the terraces of the hedges. So tired they were that nobody bothered to come untied the rucksacks and the personal equipment. The majority of they remained slept at once. Some few paid attention to the noise of a few engines coming closer, but they thought they were American vehicles.

They were actually German tanks and trucks belonging to 352 ª infantry division. Not known by none of two rivals, the Germans had been withdrawing and following the same route that the American battalion followed in its advance. When they stopped, the German explorers detected the North American movements in the meadows of encamped. The Germans advanced secretly and surrounded the meadows.

Suddenly, the Germans threw flares. Under the sinister light, almost as brilliant as the midday light, its assault cannons opened fire on the hedges against the Americans. Along one of the hedges, a platoon got up and was cut down by the German machine guns. Many Americans, scared and disoriented, were running across, looking for the meadows exit; the German infantries were knocking down them with its repetition fire. The shells of the German mortars were exploiting for all the zone of the meadows. The Americans were responding with a vague, jerky rifles fire, directed to the opposite hedges. Which could reach both the Germans and their own men in their strolling.

Resultado de imagen de soldados indisciplinados  WASTER SOLDIERS.

«It was terrible”, a survivor was indicating general Cota. «We had crawled more than 90 ms. out of the field, when we listened from behind, a shouting of our men. I thought that the Germans were launching a bayonet charge against them».

The commander of 2º battalion, lieutenant colonel William Warfield (ironically, camp of war), had his command post in a farm close to the highway. Warfield tried to establish a defense, but it was in vain. The officials who threw out the house towards the field, were brought down rapidly. A German shouted in English towards the command group: «Give up, give up!». «Of giving up, certainly not!», roared Warfield. He tried to lead a small group towards the meadows where his men were, but turned out to be dead immediately.

The battle extended about 20 minutes. The battalion had 150 casualties, including 50 dead, slightly more than one third of its effective. Little before dawn, a gravely injured young lieutenant who was reporting to his division commander, general Charles Gerhardt, was falling down suddenly on knees and was striking the soil with his fists. While was sobbing and was sorry that all his men were died and that he had left them to fall down.

The general Gerhardt got angry. «Without safety, shouted exalted. «Simply the battalion came to the field and threw to fall asleep».

An example of the modern counterinsurgency warfare.

The Bristish Complex Bastion in the province of Helmand.

Helmand is one of 32 provinces of Afghanistan. It spreads over 58.583 km ² at the southwest of the country and has a population around the million and half of inhabitants, of the pashtun and baluchi ethnias. The capital is Laskar Gah. In his Washer’s district, at the northwest of the capital, the Camp Bastion is installed. It is the principal military British base in Afghanistan. It can house between 20 and 30 thousand persons in all its facilities, British and American principally, depending on the Branch to which they belong and their missions, equipments and supplies. It occupies a total extension of 52 Km2, approximately 10 km per 5 km. It was designed to be the center of the logistic operations of the ISAF in Helmand. In addition, it is the major military British camp constructed outside their country after the II World War. Built by the British Engineers since the beginning of 2006, the Complex is placed in a desert zone and away from the populations and is provided with long clear sights in all directions.

The Camp is divided structurally in different «sections». Bastion 1 and 2 were first erected. Bastion 2 also contains the Camp Barber (USA) and the Camp Viking (Danish). Bastion 0 was added about 2010 and it houses the facilities of the external contractors. The Bastion 3 is used for the specific training of counterinsurgency. The Complex also includes Camp Leatherneck (of the USMC) and Camp Shorabak, of the National Afghan Army. Camp Bastion’s airport, which possesses two landing strips, attends more than 600 aircraft flights every day, in operations of combat, logistic and medicals. In the attached heliport are deployed the Westland WAH-6 Apache of multiple attack and the Boeing CH-47 Chinook of mixed transport. In these moments the Complex can handle and attend almost all the military and civil aircraft in use. The Complex also houses a great military campaign hospital. And large areas of this great base are protected by a nine meters high concrete wall, which spreads over a perimeter of more of 40km, inserted with special vigilance towers, with soldiers and high technology instruments.

Resultado de imagen de soldados indisciplinados SOLDIERS DRINKING IN THE JAIL.

The British base has been attacked in diverse occasions during his years of existence. The most “media” occasion has been this that we treat. In the assault were dead two Marines (of the attached Camp Leatherneck). And other nine persons, eight military men and a civil contractor, were hurt. Six McDonnell Douglas AV-8B Harrier II airplanes of the Marines Corps were destroyed and other two were very damaged. As for the logistic facilities, were destroyed three stations of fuels supply and damaged six aviation hangars not structurally reinforced.

The atack tactic of the Taliban.

The Taliban usual procedure to assault a weak defended or without spirit enemy position is this: at dawn they bombard with the fixed rocket launchers heavy fire, then they approach to use mortars, finally, the assault is realized by several independent squads, that converging advance shooting AK and RPD or PK machine gun bursts and their RPG and RL hollow charge grenade-launchers. They only fire on verified targets or from above and from below them. When they try to keep the surprise, the initiative and the confusion, to lengthen the military reaction time and to obtain a very local and temporary superiority, they act without their meager heavy fire support.

E incluso avanzan arrastrándose lenta y pacientemente. Por ejemplo, para romper un perímetro defensivo y dirigirse y atacar los hangares y aparcamientos evidentes de grandes aeronaves.

A characteristic of the Taliban is that they do not get involved in the defense of their positions. Once obtained the harassment of the enemy and extended the hurt, the mutilation and the stupor on the military men, they will move back. They are not so silly to wait intrepid for the heavy, precise and devastate military fire. Nor to presume of courage, in front of enemies with weapons of superior range and characteristics and capable of turning a surface target into a destruction zone. Also, there are the time and its corollary, the opportunity. The Taliban handle very well the tactical and operational times. They are masters of the patience, the waiting, the repetition of simple and easy trainings. For the important attacks they manage to use scale models of the goal. And, to penetrate in a base and attack the heavy and evident war aircrafts, only need to represent part of the perimeter, the directional location of the target and its identification, as well as the rejection fighting positions of the irruption sector.

Its execution.

Enough hours before 12 pm of Thursday, the 13th of September of 2012, the Taliban forces began to approach from several directions to the air zone of the Complex. To keep a low tactical trace, they followed dragging techniques in their advance to and through the security zone of the area. And up to there got, without being detected, 45 to 50 insurgents that, in three convergent spears of advance attacked by midnight, supported by their squad organic weapons. Not to being detected up to the beginning of the assault, also helped them the scanty combative availability of the men. And the tedious and unproductive routine of the guards and patrols, which creates the passive defense of a great protective barrack. Around 15 Taliban from two of the groups, managed to get through Camp Bastion’s perimeter and to effectively attack the air zone. Finally the attacking group was wiped out (dead and injured men and prisoners).

It was a «significant» assault, the British Defense Department declared, as the insurgents should never have come so far away. It was, admitted the ISAF, a «good coordinated» attack. Organized in three assault groups, the Taliban managed to get through the defense perimeter of the base. «They were well equipped and trained, dressing USA Army uniforms and armed with automatic rifles, grenade-launchers and explosive jackets», continued the ISAF in his communique. This mission assured that during the assault, the international troops killed 14 insurgents and hurt other one, who is arrested.

The British correspondents in Afghanistan assured that Camp Bastion has an excellent visibility from all parts and is extremely strengthened. The defense correspondent of the Daily Telegraph, who has been for more than twelve times in Camp Bastion, wrote on Sunday, the 14th: «In spite of being in the center of the most dangerous province of Afghanistan, I always felt completely sure, undoubtedly, from an assault of the Taliban. And honestly I believed that there were more possibilities of dying knocked down by a military vehicle that murdered by insurgents». The Coalition’s forces, make clear the correspondents, ask themselves how the Taliban were capable of giving this surprise attack to a strengthened and isolated complex barrack. And a spokesman, Adam Wojack, said that the Friday assault «was a sign for the Coalition that it is necessary to give much attention to the popular, local and international state of mind about Afghanistan».

On Monday, the 10th of September Zabihullah Mujahid, a spokesman insurgent, declared to Reuters that the Taliban were trying to use all their resources to kill the prince Henry (also called «Harry the Nude», his name of war), third in the succession line to the British throne. After the facts, another Taliban spokesman underlined that they attacked in «revenge» for the American amateur movie which offends Mohammed. And that they choose to commit an attack against Camp Bastion, because the prince Harry was there, acting as co-pilot gunner in the Joint Air Group.

 

And other one of an unsuccessful army …

On Sunday, the 18th of December, 2016, the franchise of the Islamic State in the Republic of Yemen realized an assault against the barracks of the so called National Security in al-Saulaba. That is placed 20 km at north of the coastal city of Aden, at the south of the country and that is now his nominal capital. One first showy characteristic of these suicidal assaults of the EI is that from August of this year, three assaults have been realized against the same barracks. Whose commands obstinatly mantain an ineffective and deficient «combative readiness» of the forces of the garrison, to keep their security.

In the last assault, the most lethal, died 50 soldiers of the Army of Yemen, loyalist to the president Abdo Rabu Mansur Hade. Hundreds of soldiers were still in the exterior of the barracks, waiting to receive the permission to enter and to receive their pays. One thousand soldiers had acceded already in the military facilities. But the access was limited to avoid agglomerations in the courts and facilities. Then, sunni terrorist slipped between the soldiers who were waiting out. And detonated his explosives jacket. Possibly liberating the so called “detonator of the dead man”.

The security is one of so called “principles of the war». That define «what to do» to obtain militarily our aims. And though it does not appear in all the existing lists of principles, specially in the shorter ones, the security is here to remain. And of its not observance, the efficiency and the power of other accepted principles will get reduced or disabled in their application. Since the principles constitute a global, harmonic and synergic set of the procedures of the to do well, for a military operational system.

EPILOG.

The combination of the usual defense and the mobile proactive defense exercises a synergic and convergent effect, of perfection and securement of the security zone. To detect and reject the tactical surprises of the enemy and to alert the own forces of his appearance from behind horizon. And to blur him the tracing of our defense zone. Thanks to the combat and observation advanced positions and the actions from them and of the patrols and advanced detachments. That would allow the enemy to glimpse and estimate where there would be the «defense positions» in the rejection zone and where the heavy fires of the defense would preferably go, in front of the forward limit of the mentioned zone.