Saturday, June 7, 2025
Advertise with us
Support us
Write for us
No Result
View All Result
claws
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
No Result
View All Result
CLAWS
No Result
View All Result
Home Articles

Smart Counter Insurgency: Integration of Technology in Operations

Marjuka Binte AfzalbyMarjuka Binte Afzal
January 15, 2021
in Articles
A A
0
Post Views: 42

  

 

Like all operations, the landscape of counterinsurgency is changing and evolving. With the advanced nature of information and communication technology and globalisation, the world is becoming more and more proactive in its way of arming itself for adversity, and so are the factors from which we pose threat from. Insurgencies and terrorism, as well as transnational organised crimes and syndicates, are now weaponised, with social media and the internet, and advanced technology and arms. It is significant to be well-aware of these advances and use the same techniques to build a better countermeasure against these insecurities and threats. To enhance the capacity and effectiveness of law enforcement agencies and military forces, it is imperative that we integrate technology in the operations. For the concern of counterinsurgency, we will discuss in this article the myriad of ways technology can be integrated with counter-insurgency operations to alleviate the way these operations are planned and executed to get the optimum results. While many studies of insurgency and counterinsurgency emphasise military tactics and terrorist responses, this article homes in on relevant use of technology and scientific innovations, and intelligence to show the Smart ways of counter-insurgency operations.

What is Smart Counter-Insurgency?

At its center, counter-insurgency (CI) is a battle for government legitimacy in the minds of its people.[i] When David Galula summarised the insurgent aim in 1963, he said, “If the insurgent manages to dissociate the population from the counterinsurgent, to control it physically, to get its active support, he will win the war because, in the final analysis, the exercise of political power depends on the tacit or explicit agreement of the population or, at worst, on its submissiveness.”[ii] One of the principal ways insurgents acquire popular support is by capitalising on the government ineffectiveness. In fact, government illegitimacy is considered by many CI strategists as the “root cause of and the central strategic problem in today’s unstable global-security environment.”[iii] Counterinsurgents must therefore have as their primary goal the creation of a government that derives legitimacy from its ability to provide effective security, responsive governance, and adequate economic development for its population. In fact, in his Inter-agency Counterinsurgency

The framework, Dr. David Kilcullen, the Chief Strategist of the Office of the Coordinator for Counterterrorism of the U.S. State Department in 2006 considers security, political, and economic mission elements to be co-equal “pillars.”[iv] and here is where smart CI comes into play. Because of the advanced use of technology and globalisation, the insurgency has acquired a new tactic of finding legitimacy through gaining public support, whether that be through spread of disinformation through social media or trying to dwarf administration with their show of power using new weapons and technology. These factors can be canceled out by the use of modern technology and intelligence by the government to arm the counter-insurgency forces. In several examples seen throughout the world, whether the use of unmanned vehicles and drones to attack insurgency camps, using tactical teams armed with advanced technology to take down insurgency operations, or effectively taking down insurgent messages on social media, states like Yemen, Afghanistan, Philippines, and many others come to the list.

How drones can be used in CI

By collecting actionable information from the war region, drones play an important role in counter-insurgency. The drone footage will assist government officials to locate the insurgent groups’ positions, track the insurgent leaders, and shut down their anti-national activities. In contrast to ground crew and manned aircraft, drones with their higher resolution payloads, multiple zoom-in capability, and extended endurance provide ground officials with a better view to differentiate between civilians and combatants. Drones provide the conventional counter-insurgency policy with logistical assistance and assist in avoiding civilian casualties. Drones have come quite useful in counter-insurgency operations, and Yemen comes in that list of examples. The decapitation operations in which drones play a principal role have led to tactical advantages and often stopped particular operations of terrorism, making it a lot easier to deal with the conflicts in Yemen strategically.[v]

Satellite Can Be Used/Integrated in Intelligence Gathering

Combat patrols in a counterinsurgency include raids, ambushes, security, saturation, and satellite patrols. The satellite patrol uses a base unit to control smaller units, or satellites, that leave and return to the base unit. The advantage of this technique is the unpredictability, to the enemy, of the route, size, locations, and the patrol’s overall axis of advance. Satellite patrols are given either an area or an axis of movement. As with all other patrols, they should have a specific task and purpose.

Controlling multiple small satellite patrols is difficult and requires an experienced leader and excellent communications. The US is known for its use of satellite communications (SATCOM) to scope into insurgent territories overseas.[vi] Gathering intelligence and location, as well as information about the geographical features of enemy terrain, is what makes satellite communication such a powerful attribute that can be added to CI.

How Surveillance Tools Can Be Used in Detecting Explosives In CI?

Surveillance on key individuals, organisations, and activities of interest must be identified and preserved. Increased surveillance of sensitive locations, especially government and civilian arms and ammunition sources, must be maintained. This requires the use of sensors and cameras and other electronic monitoring devices to the maximum to ensure that suspicious areas and routes used by insurgents are constantly guarded. RSTA (Reconnaissance, Surveillance, and Target Acquisition) and Information, Surveillance and Recognition are tasks that synchronize and incorporate sensors, asset and processing preparation, and operation; exploitation; and dissemination networks in order to directly support current and future operations. This is an integrated function for intelligence and operations. Sensory systems installed can detect movements within a wide area and let the users know if anyone is within the targeted vicinity and whether anyone is approaching.

How Social Media Be Used In CI?

Psychological Operations (PSYOPs) are a significant asset credited for the success in several Counter Insurgency operations. Social media has come to dominate the world with its instant dissemination of news and the deeply rooted effects on public opinion. But just like any other way of using social media, one such way is crafting online messages and contents and sending them to put as past of PSYOPs. In several cases, this tactic is called Strategic Communications[vii] rather than PSYOPs, since it is an attempt of the government s and decision-makers to disassociate their work from ‘propaganda’, which are often spread by insurgents. Examples like the “Green Revolution” of 2009 in Iran come to mind, which was triggered through social media posts on Twitter. The aim of PSYOPs is to therefore influence the target audience, each with highly tailored and specified narratives and approaches. Insurgents often use culture and religion as well as political concerns to bring in public support, but social media can be used as a media for

PSYOPs to negate that narrative with a counternarrative in its place that promotes peace and stability.

Counter Insurgency operations in South Asian states especially need revisiting. There needs to be a call for using smart CI methods to pad the capabilities and effectiveness of such operations so that conflicts are resolved faster. The enhancement and increase of intelligence gathering capacity, due to the use of unmanned vehicles, the decrease of casualty and human vulnerability, the increase of explosive capacity, operational enhancement and many more are just the few advancements using AI and modern technology can bring to the table. What needs to be done in the context of South Asia? There needs to be more technology acquired, and manpower needs to be trained and skilled. The interface integration is the most important factor here, there cannot be unequal application of technology, there needs to be modernisation and integration on a whole-scale. Countries like India, Pakistan, Nepal, and Sri Lanka have to different extents overcome the first hurdle of technicalities and introduced themselves to the world of Smart CI, but only to limited fields. South Asia needs to have more than just a one-solution-fits-all approach to Smart Ci and needs to be more innovative and optimistic about investing time and energy behind it, acquiring training and equipment, and creating skilled manpower to execute it, for a more holistic and integrated approach to countering insurgency.

End-Notes

[i] Donley, P. H. (2016). Joint Force Quarterly 81 (2nd Quarter, April 2016) Economic Development in Counterinsurgency: Building a Stable Second Pillar. Retrieved January 10, 2021, from National Defense University Press website: https://ndupress.ndu.edu/JFQ/Joint-Force-Quarterly-81/Article/702054/economic-development-in-counterinsurgency-building-a-stable-second-pillar/

[ii] David Galula, Counterinsurgency Warfare: Theory and Practice (Westport, CT: Praeger Security International, 2006), 4.

[iii] Eliot Cohen et al., “Principles, Imperatives, and Paradoxes of Counterinsurgency,” Military Review, March–April 2006, 49.

[iv] Kilcullen, David (28 September 2006). “Three Pillars of Counterinsurgency” (PDF).

[v] W. Andrew Terrill, “Drones over Yemen: Weighing Military Benefits and Political Costs,” Parameters 42 no. 4/ 43 no. 1 (Winter/Spring 2013), 17–9, 23.

[vi] U.S. Government. (2009). Counterinsurgency Guide. Retrieved from https://2009 2017.state.gov/documents/organization/119629.pdf

[vii] Kandemir, B., & Brand, A. (2017). Social Media in Operations – a Counter-Terrorism Perspective. Retrieved from https://www.stratcomcoe.org/social-media-operations-counter-terrorism-perspective

Tags: Counter-InsurgencyIndia’s National Security ChallengesMilitary TechnologyRegional Security
Previous Post

Indian Armed Forces Must Prepare to Fight New Generation Wars

Next Post

India and China Swap Roles amid Nepal Political Crisis

Marjuka Binte Afzal

Marjuka Binte Afzal

Next Post

India and China Swap Roles amid Nepal Political Crisis

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Support Us Donate Now

Web Updates

List of Shortlisted Officers / Candidates: PhD Batch – 7

Field Marshal Manekshaw Essay Competiton 2025

Guidelines to Publish with CLAWS

Summer Internship Capsule 2025

Application Form – Study Mtrl for DSSC 2025

[NEW] Application Form for membership for PROMEX (PART B or D)

  • Trending
  • Comments
  • Latest

Summer Internship Capsule 2025

April 8, 2025
Pahalgam Response: Why India Must Fight Smart?

Pahalgam Response: Why India Must Fight Smart?

May 2, 2025
Results | Field Marshal Manekshaw Essay Competition – 2024

Results | Field Marshal Manekshaw Essay Competition – 2024

April 2, 2025
Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

May 21, 2025

Front Organisations: The Valley’s Homegrown ‘Resistance’ or Pakistan’s Evolving Terrorism Tactics?

2
RISING TENSIONS IN KATHUA

RISING TENSIONS IN KATHUA

1
The Art of Negotitations Three Day Capsule Course | 07th – 09th May

The Art of Negotitations Three Day Capsule Course | 07th – 09th May

1
Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

1
Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Echoes Across the Line: PoJK post Op Sindoor

Echoes Across the Line: PoJK post Op Sindoor

June 2, 2025
Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

May 31, 2025
Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

May 31, 2025

Popular Stories

  • Summer Internship Capsule 2025

    0 shares
    Share 0 Tweet 0
  • Pahalgam Response: Why India Must Fight Smart?

    0 shares
    Share 0 Tweet 0
  • Results | Field Marshal Manekshaw Essay Competition – 2024

    0 shares
    Share 0 Tweet 0
  • Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

    0 shares
    Share 0 Tweet 0
  • Field Marshal Manekshaw Essay Competiton 2025

    0 shares
    Share 0 Tweet 0

About us

CLAWS

The Centre for Land Warfare Studies (CLAWS), New Delhi, India is an independent think tank on strategic studies and land warfare. The mandate of CLAWS covers national security issues, conventional military operations and sub-conventional warfare.

Follow Us

Browse by Category

  • Articles
  • Autumn 2019
  • Autumn 2020
  • Books
  • CLAWS Focus
  • CLAWS Journal
  • Essay
  • Events
  • External Publications
  • FMMEC
  • Intern Articles
  • Issue Briefs
  • Jottings by Director General Emiritus
  • Manekshaw Papers
  • Newsletter
  • Round Tables
  • Scholar Warrior
  • Seminars
  • Uncategorized
  • Web Updates
  • Winter 2019
  • YouTube Podcast

Recent News

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Echoes Across the Line: PoJK post Op Sindoor

Echoes Across the Line: PoJK post Op Sindoor

June 2, 2025
  • Site Map
  • Tenders
  • Advertise With Us
  • Terms of use
  • Privacy Policy
  • Other Think Tanks

© 2008-2024 Centre for Land Warfare Studies (CLAWS).

No Result
View All Result
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact

© 2008-2024 Centre for Land Warfare Studies (CLAWS).