THE RECONNAISSANCE AND THE INTELLIGENCE: A MILITARY OPERATIONAL SYSTEM. 2nd Part.

(FINAL)

The near future of tactical reconnaissance.

Major tactical reconnaissance weapons, tanks and low level flying aircraft tend to be vulnerable to modern infantry antiaircraft and antitank missiles. They appeared on the battlefield in the 1970s and have become more effective since then. Since the mid 1990s, these rockets have been incorporating various technologies such as double active heads, multiple search engines, which allow them to discriminate against enemy decoys and secure the target, and those that allow them to use variable flying heights. For example, upcoming infantry tank rockets will be able to locate, define and confirm their target by magnetic distortions of the environment (generated by the relatively large metal mass of the tank), acoustic signals, heat emissions (human and motor and weapons) and short wave emissions. Their way to the target will oscillate to circumvent possible weapons deployed against them.

Resultado de imagen de deep range combat and reconnaissance patrols NEW ZEALAND’S LONG RANGE RECON PATROL.

All this will tend to give greater importance in the reconnaissance of to the deep range combat and/or reconnaissance patrols. They are inserted by air or river means, as close as possible to its operations area and designed to stay longer in it.

Combat reconnaissance: The immediate and continuous contact with the enemy and determination of the capabilities of the fighting ground.

Combat reconnaissance conducts ground reconnaissance, the relation of his own army’s adjacent units in established contact points and the location of the enemy to help determine the enemy’s intentions and characteristics. This latter mission is subordinate to the goal of obtaining intelligence. Every unit must establish it always, without need for specific orders. It is important to advance the subunits as rapidly as possible; if only is conducted by infantry, it may be necessary use vehicles to transport troops, who can then continue on foot.

In open flanks and exposed wings, its range must be adequately extensive. By means of anticipated patrols, combat reconnaissance constitutes in its actuation a real security for units in the front.

 Its organs are armored reconnaissance companies and platoons, reconnaissance patrols of units in the different sectors, observatories and forward platoons of artillery, etc. The platoon at disposal of the H. Q. and services company can be useful in the battalion area for rapid action.

Combat reconnaissance has a basic function to detect resistances and weaknesses in the enemy deployment and weapons, and in the “interfaces of action” created on him. It needs to use tested skill, sufficiently intense and never superficial, that is knowledge about the weaknesses of tactical units and the fortresses of opposing deployments, as well as its efforts to present the illusion of such deployments. It is important to act according to the mission and the gravity center of the effort ordered by the high command. Colonel Tor made this point in his book “Infantry” (page 31 Madrid, 1943), “…advance through the enemy weak points and fight from one’s own strong points».

Resultado de imagen de soldiers on patrol  A PATROL…

Information collected from various sources, becomes available intelligence and is transmitted to those interested.

The reconnaissance generates information on the different action levels and the ground, which it also recognizes. That must be converted into intelligence. This is the reasonably reliable and sufficient knowledge (never excessive or intoxicating) of the enemy, of his intentions and possibilities and of the terrain, in its possibilities of struggle, transitability (more than ground ongoing), etc. Received updated and without continuity solution.

The elaborating organs of intelligence are different for operational and combat reconnaissances, since also they both generate different types of information. The principal difference are their qualitatively different levels of actuation, in which they must give the set vision: enemy, area and possibilities. And that the need for combat intelligence is urgent and more continuous, and its transcendence, very fleeting, so it is much less elaborate and more direct to fighting units, from its reconnaissance.

Once intelligence is created, it is integrated by the superior command, G-2. It will then be transmitted to units and interested commanders. Transmission must be protected by all existing means, guaranteeing secrecy and its arrival to the addresses by means of double couriers, coding, etc.

Transmitted intelligence must assemble the suitable characteristics of the moment and ensure reliability, continuity, transmission security, and the wealth of content and its sufficiency. It must also be opportune and continuous. The security of transmission of intelligence affects plans and decisions that based on it. It must be sufficient, rich and trustworthy enough to give command, within a reasonable amount of time, as complete idea as possible of a situation and to plan for its possible evolution and factors that will affect that evolution. Sufficiency drastically limits the excesses of unnecessary information which disorients and tires those in command that try to use them.

G-2 is converted this way into the penetrating and lucid eyes of the operative command.

The security as “opposed complementary” of the reconnaissance.

The reverse of the own reconnaissance is the fight against the enemy reconnaissance and the intelligence. She has as purpose to blind the enemy about our intentions and deployments, depriving him of operational information on us or misleading them. Security is the “opposite” (complementary, not antagonistic) of our reconnaissance.

Resultado de imagen de soldiers on patrol   COVERING A SECTOR…

One of the active ways of fighting enemy reconnaissance is employing our operations security. Other is to employ advanced detachments, type reinforced platoons, to push back the enemy’s reconnaissance by means of mobile fighting with its center of gravity” focused on where his reconnaissance have to operate. A pushed back reconnaissance can give erroneous information to its intelligence on the actual possibilities of possible axes of advance towards us, our real capacities or our defensive intentions.

One purpose of security is the immediate protection of units against surprises and the unforeseen, by keeping a sufficient “combat readiness” for such situations. Units must also keep necessary forces alert as part of maintaining a practical reaction time. The tasks of security are to protect units from direct fire of infantry heavy weapons, to detect and avoid surprises, ambushes and enemy incursions and to detect and reject enemy reconnaissance. Every unit establishes at all times the security sector, zone (brigade or regiment) and area (division), according to its size. Between 1/3 and 1/6 of the unit, according to the situation, carry out security functions; the organs of which are the different sub units of the branches employed.

For camping units or in assembly areas of different classes, a safety line is established to delimit the protected units and at suitable points (accesses, etc.) double sentries are placed. At difficult to secure places (gorges, etc.) rapid mine barriers are placed. From this line, security units advance fixed and mobile patrols. Fixed patrols monitor critical security points (dominating points, enemy possible observatories, inevitable passing points, etc), relying on the mobile units to achieve always an active security.

Resultado de imagen de campos de minas militares  MINES BARRIER.

And, this so useful and simple, is always done? No, sir, not always.

«On June 10, 1944, soon after the midnight, the second battalion of the 29th division of infantry of U.S.A. was prepared to pass the night. The men had traveled approximately 25 kilometers over the last 20 hours. The official in charge of the battalion, Commander Maurice Clift, chose a zone of two meadows so that the troops were to spend the night in the open. The men entered the zone and set themselves up for sleep along terraced hedges. They were so tired that no one bothered to untie their rucksacks and personal equipment. The majority fell asleep at once. Some heard the noise of approaching engines but thought they were American vehicles.

However, the vehicles were actually German tanks and trucks belonging to the 352nd infantry division. Unknown to each side, the Germans had been withdrawing along the same route that the American battalion followed in its advance. When they stopped, the German explorers detected the North American movements encamped in the meadows. They quietly advanced and surrounded the meadows.

Suddenly, the Germans threw flares. Under the sinister light, almost as brilliant as the midday light, its assault cannons opened fire on the hedges against the Americans. Along one of the hedges a platoon got up and was cut down by the German machine guns. Many Americans, scared and disoriented, were running in search of a way out of the meadow while the German infantries continued knocking them down them with repetitive fire. The shells of the German mortars were falling all over the meadows. The Americans responded with weak rifle fire, directed at the opposite hedges, which ran the risk of hitting either the Germans or their own men.

«It was terrible”, a survivor told General Cota. «We crawled more than 90 meters out of the field when we heard from behind the shouts of our men. I thought that the Germans were launching a bayonet charge against them».

The commander of second battalion, Lieutenant Colonel William Warfield had his command post in a farm close to the highway. Warfield tried in vain to establish a defense. Those officials who ran from the house towards the field were brought down rapidly. A German shouted in English to the command group: «Give up, give up!». «We will certainly not give up!”, roared Warfield. He tried to lead a small group towards meadow where the rest of his men were, but was killed instantly.

The battle lasted around 20 minutes. The battalion had 150 casualties with some 50 dead, slightly more than one third of its effective force. Just before dawn a gravely injured young lieutenant who was reporting to his division commander, General Charles Gerhardt, fell down suddenly on his knees and struck the soil with his fists, sobbing that he was sorry that all his men were dead and that he had left them where they had fallen.

General Gerhardt was angry. “Without regard for safety, he shouted, The battalion simply came to the field to fall asleep».

THE RECONNAISSANCE AND THE INTELLIGENCE: A MILITARY OPERATIONAL SYSTEM.

The reconnaissance generates information of the different operational levels of military action. This must be turned into intelligence. That is the reasonably trustworthy and sufficient knowledge of the enemy, his intentions and capacities and the fighting possibilities and transitability of fields, etc. To enable us to take a “founded resolution”, based on the use of our means and fighting forms, in accordance with our objectives.

Concepts y Principles of the Reconnaissance.

Reconnaissance is one of the most important functions to be fulfilled by units during operations. The information it provides, how it is elaborated and transmitted and to whom is a fundamental part of intelligence. This, finally, is one of the key factors of decisive command.

Resultado de imagen de SDKFZ 263.    SDKFZ 263.

Reconnaissance can be divided into strategic, operational or tactical and combat, according to its mission and the area it encompasses. The strategic one seeks to uncover key information about the enemy in the operations deep theater: his concentrations of forces, his great movements, his important defensive lines and possible surface targets, etc. A surface target becomes a “destruction zone” by the effective action of heavy weapons of destruction, for example, reactive artillery or tactical nuclear devices.

The operational or tactical reconnaissance tries to define the situation and the intentions of the enemy in the operations area of the great units, type division, corps or army. It determines the movements of the enemy in the border zone between forces, his formations and deployments, his defense lines and possible surface targets. This reconnaissance is carried out by aviation, drones, specific reconnaissance units and the reinforced reconnaissance armored battalion of the corps. In this respect, a total connection and complement must exist in the missions of aviation and ground reconnaissance and keeping in mind that its task is never of fighting.  

The reinforced reconnaissance battalion operates in a sector of up to 60 kilometers wide and 100 kilometers deep. Its advance over the parent unit must be at least 6 hours in order to utilize gathered information. On the basis of its reconnaissance order, battalion commander, keeping his companies always under control, can send up to 16 patrols of 3 vehicles to covering his sector, looking always for a gravitational center of the deployment. Having done this, he can send on the concentric center of the effort up to 2 patrols’ echelons, being relieved or being inserted, according to the used method. Finally, if the area to reconnoiter is occupied by the enemy, he can advance his companies as attack spears, under the screen of advance patrols. The battalion must not infiltrate very deeply inside the enemy deployment, if there exists a serious risk of being isolated.

Resultado de imagen de Panhard AML-245    PANHARD AML 245.

Not all Armies have given or given sufficient value to this last reconnaissance type, which depends on their military doctrine.

All the operational principles of reconnaissance could be summarized as follows: Always focus on the objective received from the command (its mission is to generate information, the combat will be done by others), seeking the maximum use of time and its means, getting and maintaining contact with the enemy and never losing the freedom of action. It will allow him to perform and to escape, without being caught by ever higher forces.

The tactical reconnaissance is also needed in the urban combats. Not always the tactical reconnaissance penetrates too much in the disputed or enemy area. The industrial or populated zones, full of «concealing relative heights» and staggered in depth, which offer protection from the enemy sights, even nearby, and covers against the light and heavy fire, «thicken» considerably the tactical maneuver of the contenders. Reducing this way, the depth of the fighting zone of the infantry. So, masses of the artillery, as batteries and medium groups of it, are deployed at very short distance to his enemy. In a artillery fighting zone then very next to the forward limit of the own defense position.

On October 9, 1942 a patrol of Soviet reconnaissance entered behind the German lines in Stalingrad, seeking to detect the enemy movements in his rear. The 4 men sheltered in an auxiliary railroad coach, torn and left, placed in a railroad between the workshops of the Red October factory (where before were made metallic pieces and small weapon), at North-East of the city. And the disputed Mamaiev hill, towards the geographical center of Stalingrad, which was offering grand sights on most of the city.

Resultado de imagen de Engesa EE-9 Cascavel brasileño. ENGESA EE-9 CASCAVEL.

During almost the whole day they remained in that hiding place, communicating by radio to his lines the German activity. They had located several dozens of German mortars and howitzers, accompanied by the trucks which were moving his ammunition, by the rear roads to some emplacements placed in the suburbs of Stalingrad’s west. Also they located numerous mortars and pieces placed in a glen at the north of the Mamaiev hill, doing fire against the Soviet positions in the city.

On having got dark, the explorers broke a telephonic cable of the fixed enemy network of communications and hoped that the Germans were coming to repair it. Very soon they observed the light of a lantern and when the soldier came closer, killed him to shots. One of the Soviets disguised himself with his uniform and placed close to the route of the railroad, hoping that another German came closer the cut cable. Soon another lantern started approaching by the way. The soldier fell in the ambush and the explorers made it unconscious. On having recovered, he met 4 Soviets of foot together near him. Pulled down the soldier Willy Brandt gave his name, range and unit of belonging. Psychologically they had already gained the hand on him.

Resultado de imagen de drones guerra Vietnam   DRONE AQM-34 Ryan Firebee, IN VIETNAM.

Immediately afterwards, the German told to the explorers that 94th German infantry division had come to the factories zone from the south of the city, that 24th panzer division was going towards there and that the Fuehrer had ordered that Stalingrad should be totally taken by October, 15. This confirmed to them the reason of the extensive movements estimated by them in the German operational zone.

For the small reconnaissance patrol, to take with it after his lines, a prisoner already interrogated, was more a nuisance and a danger that a minimal success. And, in spite of the hardness, even the brutality, of the combats in the city, they neither killed, nor mutilated him. The Soviets reported to Brandt that had revealed military secrets, took him to the railroad line and indicated the direction that he had to continue to reach his comrades and left him free”.

But, what is this of speaking about operational reconnaissance in the age of the electronics, the robotics and the computer science?

Almost 50 years ago, the North Americans had developed an arsenal of electronic devices, directed to the vigilance (surveillance) of his enemies in Vietnam. Already they had reconnaissance drones to monitor «from above» their guerrilla slippery enemy. That transmitted his images by television to the planes of detection and transmission, placed at dozens of km from the observed zone.

Resultado de imagen de sensor ADSID   ADSID SENSORS .

The principal sensor used in the remote vigilance was the ADSID (Air Delivered Seismic Intruder Device). It was thrown principally from the F-4 Phantom, following guidelines of navigation by radar, in order to cover adequately the observing zone, as a traffic route of men and vehicles, a parking or store. The device measured 91 cm. of length and 15 cm. of diameter. And on having fallen down was remaining almost buried, opening then a transmitting aerial of 120 cm. height, camouflaged as if it was a defoliated bush. His battery allowed it to issue during a month and half.

With these sophisticated artifices they were trying to observe the traffic of goods and men by the Ho Chi Minh Route, the route of supplies of the Popular Army of North Vietnam and the Vietcong in South Vietnam. It was a highly branched out and protected route that, departing from North Vietnam penetrated in Laos and crossed it. And then, detached diverse routes towards the different communist operations zones in South Vietnam.

The program «White Igloo» destined 1,7 thousands of million dollars between 1966 and 1971, for these tasks of compilation of information with the ADSID. With the information gathered from the traffic in the routes, the Americans were deciding the interdiction bombardment actions, using his different air devices, including the invisible and inaudible (with his cruise height) B-52 strategic bombardiers. At the beginning of 1971, the information of the aerial photos after the bombardments, taken by planes that were flying after the assault formations, allowed the analysts to suppose that the «war of trucks» was causing a very severe effort to the industrial capacity of the suppliers of North Vietnam (the USSR and China).

Resultado de imagen de Joint Surveillance Target Attack Radar System  A BOEING OF THE JSTARS SYSTEM.

But, if it was true that were destroying so many trucks and equipment, how was possible that the communists were keeping the tactical initiative in South Vietnam? On the other hand, where were the tens of thousands of remains of trucks that literally had to cover many of the ways and parks of the Route? Who were bothering to remove them? The response was given soon by the American junior officers: they were ate by a monster called the «Great Laotian Truck Eater»; a horrible rotten that was getting up towards the dawn and was devouring the vehicles destroyed by the aviation during the night, after the photography for «wreck count». Because the Americans are very scrupulous with the statistics and consider the lie an almost inexcusable social sin for his civil servants.

Up to today, almost 50 years later, the electronics, the robotics and the computer science have continued improving. But it does not seem that they are useful in Iraq, Afghanistan or Syria, to detect a “donkey bomb”; to avoid that group of cruel fanatics without God («as Allah does the Good, make you also the Good and do not promote the corruption (the “evil», the Noble Koran orders them), destroys great part of one of the principal mosques sanctuaries of the chiism in Samarra; to know if in an Iraqi or Syrian house are terrorists or only a terrified Arabic family, before demolishing her with heavy fire from a distance and extremely, according to his military operational doctrine.

In addition, during enough time still the air and spatial American means, as spy satellites, drones or not crewed planes and planes of the system Joint Surveillance Target Attack Radar System (JSTARS), will have serious limitations for the detection and check of small ground, even regular, forces. In the areas of difficult transitability and with possibilities of concealment, as mountains, jungles and forests, marshes and urbanized zones (industrial, of logistics, and of housings). Those not only offer concealment, but also coverings from the fire up to the near combat distances.

The Americans do not use the tactical reconnaissance, which demands some tactical characteristics of semi independent elite forces and a specific moral courage. And that is one of the most difficult tasks of the infantry. They use the combat reconnaissance and call her, expressively, reconnaissance.

(TO BE CONTINUED).

The modern Hybrid Warfare. 3rd. Part.

(THE END)

The Multifunctional, Total or Multisubject Wars.

In general, the attacks are realized to the software of a system, looking for a «weakness» of this one. And using the malicious codes, the back entrances, etc. A penetration or attack to the software is prevented in general with an antivirus adapted to the received virus. To attack the hardware is necessary to act on the «physical component» of the computer. And his detection, with the nowadays existing miniaturization, turns out to be very improbable and long in the time, until the devastation is detected. The best way of acceding to the hardware is realizing the intrusion in the factories of components and of assemblies. But these are protected by control measures of components and external equipment, based on the nationality and the producer of them.

The cyberattacks go to cybernetic networks of the society, both public and private, to the communications and means of control of equipment and networks. Becoming concrete definite in the facilities of different out-standing or strategic sectors of a country or alliance; like, industrial centers, military communications, administrative public negotiations, social opened networks, energy distributors, intranets of banks and economic means. And they seek to paralyze or to disturb the functioning of them or to distribute in them more or less opened tendentious information, to alter or to direct the public or particular general opinion in favor of the interests not always evident of the attackers.

Resultado de imagen de ataques ciberneticos mas famosos

The cyberattact is a «total attack» of swarm type; that is, of multiple and simultaneous or sequential character. It is directed on the economic, administrative, civil and military structures, which hold and allow that a «social group» should work. It is a «form of fight» in the cybernetic area. Where «one» seeks «to occupy» tactical or strategic «advantageous positions«. And «to damage» the enemy, preventing him from keep his pace, his «habitual tempo» of functioning and stealing and depriving him sometimes of the costly goods of research and development created by him. And that were allowing him to keep a competitive advantage in national «intervention means» in the industrial, economic and military fields. A branch of the cyberattack is the industrial espionage.

With them is achieved to seriously concern and debilitate the diplomatic, economic, military and civil sectors of a society. In the civilian is the original humus, the social essence, as creator of the «national morale» and the «will of defense» of the social group. Being those sectors the «means of intervention» with which a State counts for his global, holistic defense, against the aggression and external and internal dangers.

It is known the supposedly American attack using an advanced virus against the software of the Iranian centrifugal machines. That were operating to separate the isotopes of the Uranium 235 and Uranium 239 (not fissionable), using his different “molecular mass”. Seeking to obtain U235 enough pure to create «self fissionable critical masses«, the explosive of the atomic bombs, for his supposed nuclear devices. As the % of purity between an industrial use, to generate electricity, for example, and the great purity that needs a «critical mass», both «activities of successive enrichment» are perfectly recognizable by the foreign intelligence. In May, 2010 it was detected by the Iranians a malicious virus, called Stuxnet, in the of Nataz’s nuclear station. And that gave to a thousand of them the «order» of self-destructing. But, already in January of this year, the inspectors of the Atomic International Energy Agency (the AIEA) and the Iranian technical personnel had detected that many centrifugal machines were working slowly or badly and without a certain motive.

Resultado de imagen de ataques ciberneticos mas famosos

China takes a privileged singular position as a «great universal factory» in the global economy. And the same sells cheap products of immediate consumption on a large scale, that compete principally in price, which makes already products of high added value with the most modern technologies. This allowed him to lead one of the most significant and consistent cases of cyberattacks on a large scale against a country or coalition. The history was published by Bloomberg.

The agents of a unit of espionage and cybernetic war of the Chinese Popular Army managed to place some malicious «components» in the motherboards of IT equipment of the Supermike company, of San Jose, California. Who buys to Chinese factories, which have, in turn, subcontracts and suppliers of components in China. This way, the IT equipment with this «Trojan horse» allowed the cybernetic Chinese spies to accede for 3 years to industrial and governmental secrets of the EE. UU.

The anomalies emerged in 2015, when Elementary Technologies, who was designing software to compress files, reported of them in the baseplates of his cybernetic servants. Around 30 technological companies existed, between them Amazon and Apple, and diverse agencies of American intelligence, «invaded» in the Chinese attack. It was verified that the cybernetic servants of Elementary were mounted by Supermike, which is the major world producer of cybernetic servants.

It was found that some plates of the cybernetic servants had installed a «perfected component» that did not appear in his design and that it was not a chip. This multifunctional «foreign corps» would have been placed in 4 factories of China that mount the cybernetic servants of Supermike.

Resultado de imagen de ataque chino al hardware THE SUPPOSED CHINESE COMPONENT INTRODUCED IN THE HARDWARE.

The physical interventions in the hardware are more difficult, because all customers theoretically verify the equipment that they make or buy. Attack to the other people’s hardware foreign are doing usually during his traffic from the manufacturer to the client. That is the method that the American agencies use. But this malicious and comfortable manipulation of the Chinese spies can be effected because China is the great manufacturer (with license or without her) of hardware (computers, mobiles). And the directors and controls of his factories collaborate of well or badly degree with the «requests of the authorities», in a wide sense.

And, finally, some days ago was important the recidivist case, still not close, of the Chinese giant of the telecommunications Hua Wei. This way, the agencies of intelligence of the U.S.A- has warned that must not be used the products and services of Huawei and ZTE. Accusing that the terminals of these brands might be working as «cybernetic concealed agents«, spying for the Chinese government. Also, the Pentagon has prohibited to his personnel to introduce in the military bases the products of these brands.

China, as a great power example, of realizing his own and adapted «combinations» of means of intervention in his different stages.

Imagen relacionada CHINA’S ASPIRATIONS…

One first Chinese national foreign objective is to promote the multipolarity in the world structure of the great powers and his allies. Looking that does not exist a world hegemonic power, like the USA, that hinders him in the extension of his influence and power from his «nodal center«.

For it, he will create alliances and will establish agreements with others countries in detriment or in substitution of that hegemonic power. And he will be a «obstructionist intransigent actor» in all the actions that that power promotes unilaterally in the international forums (UNO, Atomic International Energy Agency). This way, the actions of the western nations in the Syrian conflict were frustrated and limited by the systematic veto of China to his approval in the Security Council. Though the Chinese communists consider to be out of the fight for the direct influence in the Moslem Middle East. And, the Chinese decision to renew his relations with the Sub-Saharan Africa, it was partly a strategic corollary of the «war to the terror» of the USA and the NATO in Middle East, as supplier region of crude oil and gas to the whole world.

Resultado de imagen de china poder político militar A CHINESE NAVAL GROUP OF STRATEGIC PROJECTION SAILS IN THE CHINA’S SOUTH SEA, AFTER CROSS  THE TAIWAN’S STRAIT.

China is for Russia and Russia is for China a partner, competitor and rival, if it is worth this polyvalent definition, which does that none of the expressions is in fullness. Both are «emergent powers«, according to the new nomenclature, determined in growing, in not get damage directly for the moment and in eroding the hegemonic power and his Europeans allied.

This way, the Chinese would not act directly, not by third interposed countries, in Syria, in the boiling cauldron of the Asia of the Southwest, scene of the global contest that sunnis and Shiites develop for the control and the supremacy in the Islam. But they will do it collaborating up to a point with the interests and the diplomatic propositions of the Russians. Reinforcing this way a political common position of counterweight and neutralization of the influence of West in the zone. And in exchange for a certain Russian reciprocity in favor of the Chinese interests, in other countries in which do not shock the national influences of both. Resultado de imagen de china Paracelso y Spratly. A CHINESE NAVAL BASE OF MISILES IN A SMALL ISLAND OF THE PARACELSO’S ARCHIPELAGO .

A strategic exterior Chinese preference goes towards the Indian subcontinent and to the nations of the first Asian circle of terrestrial and maritime nearness. The India is a radical rival at his measure, with whom it beared several frontier wars in the middle of the 20th century. The India has a political structure more advanced than China, the liberal participant democracy, still in spite of all his contradictions, ethnic, religious and social discrimination and lacks of all kinds. And it possesses a demographic strength that overcomes China’s people grow. Though lately the Chinese begin to realize the irrational of his «pseudo scientists» methods of the control of the birthrate. That the communist China applied in altars of a material rational progress. Progress which only enjoys in diverse degrees at the present, the members of the communist party and his families, the technical personnel who design, stimulate and develop it, the chiefs and officials of the armed forces and a minority of entrepreneurs and men of business. That have prospered at the shade of an institutional inveterate clientele of the mentioned public elites.

At the west of China, close with his Sinkiang’s immense region (Xinjiang), in the Oriental Turkestan, there is a rosary of former soviet socialist republics of 2 thousands Km long, that get until the Caspian Sea. They are, from east to west, Kazajistan, Kirguistan, Tadzikistan, Uzbekistan and Turkmenistan. And there form these countries a monolithic set of several etnias, gathered in the names of them, but extended over several simultaneously, of Turkoman origin, of the central steppes of Asia. And agglutinated also by his belonging to the Islam sunní. All this form a multinational defensive and refractory shield to the expansive activity and to the significant presence of the Chinese in his internal matters or in his exterior trade, always with effects of political guardianship. These Turkoman Muslims are rather potentials allied of the Great Russia, with only she puts a bit of care and dedication to attract and to attend them.

Imagen relacionadaCHINA PROJECTS IN  AFRICA HER ECONOMY AND INFLUENCE. DISPLAYING HERSELF AS A COUNTRY THAT NEVER WAS COLONISLIST.

Another great strategic preference of Beijing is to extend his influence and increase the economic and diplomatic bows with the development nations, specially those who have «natural resources and primary cultures«, that are necessary for the manufacturing production, the supply and the general development of the nations. She has taken it even far beyond his geographical borders of political influence or strategical military.

With the interminable income of his exports and with the knowledge of the development in many areas, China does intelligent and massive strategic national «landings» in diverse countries of Africa and Spanish America. With them it establishes «binding alliances» of backing, advising and support. Trying to anchor firmly and creating allies or «friends» by all this world in development. 

Going firmly by the political, economic, diplomatic and military way of turning to what China really seeks to be:

one (or the) hegemonic power in the 21st century.

 The litigious, even violent, and, at least, very menacing, that China keeps with the countries of the East Asian, demonstrate how awkward, despotic and subjecting can be his presence in the short distances. When China thinks that com into play his national interests or his national pride. Whose loss in hands of the «foreign powers» until almost middle of last century, is one of the neurotic tics of the exterior politics of Beijing, from October 1, 1949.

In the Sea of the South of China, this power is expansive and hegemonic. And keeps litigious more or less important with the rest of the Asian countries bathed by this sea. That are The Philippines, Malaysia, Brunei, Indonesia, Singapore, Thailand and Vietnam.

This sea has 3500 thousands Km2. And China thinks that it is his «Second Persian Gulf«, for the sub aquatic oil and natural gas deposits, existing and estimated. For comparison and perspective, the Mediterranean Sea only has 2500 thousands Km2 and his coasts bathe to 24 countries in three continents. None of which is hegemonic or expansive.

In order to settle itself in the «disputed archipelagos«, China follows a strategy of small and consolidated advances. Installing in them, in islands and rocky islands, military air or naval bases and extending the logistic capacities of some of them, substracting area to the sea. This has forced to some coastal countries to realize occupations in the islands of his regional seas. Destined, rather, to indicate his presence and sovereignty.

Two of the most showy cases are the archipelagos of Spratly and Paracelso.

The Spratly has hundreds of islands and rocky islands spread by more than 400 thousand Km2, near the Philippines. In relation to this archipelago, the Court of Arbitration of The Hague already pronounced that does not exist a legal base for the Chinese claims. And that the Spratly are not islands with economic projection. But, China, simply, does not recognize it.

The Paracelso’s archipelago, at 700 Km south of Hong Kong, is placed at the west of the southern Sea of China, in the entry of Tonkin’s gulf (Vietnam). There, China has crude oil platforms in dispute with the Vietnamese government. Near the Chinese facilities have been diverse incidents between the Vietnamese fishing boats and patrols and the Chinese ships of escort. That have dispersed them using water cannons.

THE NO “COMBAT AVAILABILITY” OF THE FORCES IN THE DEFENSE.

 

A variant exists of deficient or useless «combat availability» of a military force. And it happens when exists the «entrusted«, the «satisfaction» of the commands in the real state of alert of that one. Without assuming or to appreciate the failures in it.

The Development.

We know that the high limit of a characteristic or property is very difficult or impossible to reach. Some of them are the «total destruction» of the enemy and the absolute «public security» in a population or in a society. If you monitor the great public sites, airports, parks, they would attack a church or a mosque…There are always plenty of potential objectives and not enough security forces… But what is exigible and necessary is that the commands optimize the use of the received military resources, which always are insufficient, in the tasks at their charge. With it they will have made all the humanly possible for fulfilling them. Since the optimization of those is equivalent to his «good employment » and to everything what this involve.

The variant of the deficient «combative availability» that we treat, arises in the defense. And it has several possible origins and reasons. This way, we have the deficient organization and deployment of the security zone. That will allow in major or less measured its secret, patient and multiple penetration by enemy groups. That will not have to possess necessarily sappers’ training. Also the dominant positions near the more or less permanent and important position of the forces, must be garrisoned by advanced detachments of, at least, a squad.

The approximation routes to the forces, from certain distance, must be registered by the mortars, the artillery and/or the aircrafts of support. In some sections ambushes can be established and, in others, obstacles and barriers covered by the own fires. Other sectors can be provided with cameras and sensors. The thermal and acoustic airborne sensors can track and detect small enemy units in the different phases of their approximation march to the combat. The intelligence should facilitate trustworthy reports, with sufficient information and updated with the enemy intentions and plans in our zone and their development.

Resultado de imagen de soldados indisciplinados THEY ALSO COULD BE IRREGULARS.

In the irregular war, the enemy is in the habit of reconnoitre, at least initially and also in fluid conditions of fight, by observation. It is important to locate and eliminate these «reconnaissance positions», which will never be fixed, but alternative and ephemeral. The own patient observation is the way. And bearing in mind that, if the exigency is intense, every 30 minutes must be substituted the observer, Because he looks, but already he does not see. If additional means exist for it and as complement, it is necessary to use the patrolling against the armed or not native marauders, in the way of reconnaissances and attacks with limited aims.


Let’s remember that the correct security must prevent that our forces could be beaten by the fire of the enemy infantry weapons. Also, detecting the enemy, tactical surprises from him are avoided to those. And that the presence and/or the action of our forces in this zone, including the advanced detachments, have as a specific task, to win the sufficient time, in order that the forces that have advanced and deployed them, could reach the right «combat readiness» to reject the enemy. And for all this, the security is a irrenounceable part of our total “combat readiness”.

But, also the most experienced veteran or professional units can be «surprised» by the appearance in force of the unexpected enemy, in an assault against them. And it happens when they are entrusted or satisfy with a deficient security. That is another face, less evident and defined as such, of her not or insufficient own “combat availability«.

An Example from the Western Front in the Second World War.

On June 10 of 1,944, soon after the midnight, 2 º battalion of 29 ª division of infantry of U.S.A. was prepared to pass the night. The men had traveled approximately 25 Kms. during the last 20 hours. The executive official of the battalion, commander Maurice Clift, chose a zone formed by two meadows surrounded by hedgerows, in order that the troops were happening the night in the open. The men entered them and were left to fall down against the terraces of the hedges. So tired they were that nobody bothered to come untied the rucksacks and the personal equipment. The majority of they remained slept at once. Some few paid attention to the noise of a few engines coming closer, but they thought they were American vehicles.

They were actually German tanks and trucks belonging to 352 ª infantry division. Not known by none of two rivals, the Germans had been withdrawing and following the same route that the American battalion followed in its advance. When they stopped, the German explorers detected the North American movements in the meadows of encamped. The Germans advanced secretly and surrounded the meadows.

Suddenly, the Germans threw flares. Under the sinister light, almost as brilliant as the midday light, its assault cannons opened fire on the hedges against the Americans. Along one of the hedges, a platoon got up and was cut down by the German machine guns. Many Americans, scared and disoriented, were running across, looking for the meadows exit; the German infantries were knocking down them with its repetition fire. The shells of the German mortars were exploiting for all the zone of the meadows. The Americans were responding with a vague, jerky rifles fire, directed to the opposite hedges. Which could reach both the Germans and their own men in their strolling.

Resultado de imagen de soldados indisciplinados  WASTER SOLDIERS.

«It was terrible”, a survivor was indicating general Cota. «We had crawled more than 90 ms. out of the field, when we listened from behind, a shouting of our men. I thought that the Germans were launching a bayonet charge against them».

The commander of 2º battalion, lieutenant colonel William Warfield (ironically, camp of war), had his command post in a farm close to the highway. Warfield tried to establish a defense, but it was in vain. The officials who threw out the house towards the field, were brought down rapidly. A German shouted in English towards the command group: «Give up, give up!». «Of giving up, certainly not!», roared Warfield. He tried to lead a small group towards the meadows where his men were, but turned out to be dead immediately.

The battle extended about 20 minutes. The battalion had 150 casualties, including 50 dead, slightly more than one third of its effective. Little before dawn, a gravely injured young lieutenant who was reporting to his division commander, general Charles Gerhardt, was falling down suddenly on knees and was striking the soil with his fists. While was sobbing and was sorry that all his men were died and that he had left them to fall down.

The general Gerhardt got angry. «Without safety, shouted exalted. «Simply the battalion came to the field and threw to fall asleep».

An example of the modern counterinsurgency warfare.

The Bristish Complex Bastion in the province of Helmand.

Helmand is one of 32 provinces of Afghanistan. It spreads over 58.583 km ² at the southwest of the country and has a population around the million and half of inhabitants, of the pashtun and baluchi ethnias. The capital is Laskar Gah. In his Washer’s district, at the northwest of the capital, the Camp Bastion is installed. It is the principal military British base in Afghanistan. It can house between 20 and 30 thousand persons in all its facilities, British and American principally, depending on the Branch to which they belong and their missions, equipments and supplies. It occupies a total extension of 52 Km2, approximately 10 km per 5 km. It was designed to be the center of the logistic operations of the ISAF in Helmand. In addition, it is the major military British camp constructed outside their country after the II World War. Built by the British Engineers since the beginning of 2006, the Complex is placed in a desert zone and away from the populations and is provided with long clear sights in all directions.

The Camp is divided structurally in different «sections». Bastion 1 and 2 were first erected. Bastion 2 also contains the Camp Barber (USA) and the Camp Viking (Danish). Bastion 0 was added about 2010 and it houses the facilities of the external contractors. The Bastion 3 is used for the specific training of counterinsurgency. The Complex also includes Camp Leatherneck (of the USMC) and Camp Shorabak, of the National Afghan Army. Camp Bastion’s airport, which possesses two landing strips, attends more than 600 aircraft flights every day, in operations of combat, logistic and medicals. In the attached heliport are deployed the Westland WAH-6 Apache of multiple attack and the Boeing CH-47 Chinook of mixed transport. In these moments the Complex can handle and attend almost all the military and civil aircraft in use. The Complex also houses a great military campaign hospital. And large areas of this great base are protected by a nine meters high concrete wall, which spreads over a perimeter of more of 40km, inserted with special vigilance towers, with soldiers and high technology instruments.

Resultado de imagen de soldados indisciplinados SOLDIERS DRINKING IN THE JAIL.

The British base has been attacked in diverse occasions during his years of existence. The most “media” occasion has been this that we treat. In the assault were dead two Marines (of the attached Camp Leatherneck). And other nine persons, eight military men and a civil contractor, were hurt. Six McDonnell Douglas AV-8B Harrier II airplanes of the Marines Corps were destroyed and other two were very damaged. As for the logistic facilities, were destroyed three stations of fuels supply and damaged six aviation hangars not structurally reinforced.

The atack tactic of the Taliban.

The Taliban usual procedure to assault a weak defended or without spirit enemy position is this: at dawn they bombard with the fixed rocket launchers heavy fire, then they approach to use mortars, finally, the assault is realized by several independent squads, that converging advance shooting AK and RPD or PK machine gun bursts and their RPG and RL hollow charge grenade-launchers. They only fire on verified targets or from above and from below them. When they try to keep the surprise, the initiative and the confusion, to lengthen the military reaction time and to obtain a very local and temporary superiority, they act without their meager heavy fire support.

E incluso avanzan arrastrándose lenta y pacientemente. Por ejemplo, para romper un perímetro defensivo y dirigirse y atacar los hangares y aparcamientos evidentes de grandes aeronaves.

A characteristic of the Taliban is that they do not get involved in the defense of their positions. Once obtained the harassment of the enemy and extended the hurt, the mutilation and the stupor on the military men, they will move back. They are not so silly to wait intrepid for the heavy, precise and devastate military fire. Nor to presume of courage, in front of enemies with weapons of superior range and characteristics and capable of turning a surface target into a destruction zone. Also, there are the time and its corollary, the opportunity. The Taliban handle very well the tactical and operational times. They are masters of the patience, the waiting, the repetition of simple and easy trainings. For the important attacks they manage to use scale models of the goal. And, to penetrate in a base and attack the heavy and evident war aircrafts, only need to represent part of the perimeter, the directional location of the target and its identification, as well as the rejection fighting positions of the irruption sector.

Its execution.

Enough hours before 12 pm of Thursday, the 13th of September of 2012, the Taliban forces began to approach from several directions to the air zone of the Complex. To keep a low tactical trace, they followed dragging techniques in their advance to and through the security zone of the area. And up to there got, without being detected, 45 to 50 insurgents that, in three convergent spears of advance attacked by midnight, supported by their squad organic weapons. Not to being detected up to the beginning of the assault, also helped them the scanty combative availability of the men. And the tedious and unproductive routine of the guards and patrols, which creates the passive defense of a great protective barrack. Around 15 Taliban from two of the groups, managed to get through Camp Bastion’s perimeter and to effectively attack the air zone. Finally the attacking group was wiped out (dead and injured men and prisoners).

It was a «significant» assault, the British Defense Department declared, as the insurgents should never have come so far away. It was, admitted the ISAF, a «good coordinated» attack. Organized in three assault groups, the Taliban managed to get through the defense perimeter of the base. «They were well equipped and trained, dressing USA Army uniforms and armed with automatic rifles, grenade-launchers and explosive jackets», continued the ISAF in his communique. This mission assured that during the assault, the international troops killed 14 insurgents and hurt other one, who is arrested.

The British correspondents in Afghanistan assured that Camp Bastion has an excellent visibility from all parts and is extremely strengthened. The defense correspondent of the Daily Telegraph, who has been for more than twelve times in Camp Bastion, wrote on Sunday, the 14th: «In spite of being in the center of the most dangerous province of Afghanistan, I always felt completely sure, undoubtedly, from an assault of the Taliban. And honestly I believed that there were more possibilities of dying knocked down by a military vehicle that murdered by insurgents». The Coalition’s forces, make clear the correspondents, ask themselves how the Taliban were capable of giving this surprise attack to a strengthened and isolated complex barrack. And a spokesman, Adam Wojack, said that the Friday assault «was a sign for the Coalition that it is necessary to give much attention to the popular, local and international state of mind about Afghanistan».

On Monday, the 10th of September Zabihullah Mujahid, a spokesman insurgent, declared to Reuters that the Taliban were trying to use all their resources to kill the prince Henry (also called «Harry the Nude», his name of war), third in the succession line to the British throne. After the facts, another Taliban spokesman underlined that they attacked in «revenge» for the American amateur movie which offends Mohammed. And that they choose to commit an attack against Camp Bastion, because the prince Harry was there, acting as co-pilot gunner in the Joint Air Group.

 

And other one of an unsuccessful army …

On Sunday, the 18th of December, 2016, the franchise of the Islamic State in the Republic of Yemen realized an assault against the barracks of the so called National Security in al-Saulaba. That is placed 20 km at north of the coastal city of Aden, at the south of the country and that is now his nominal capital. One first showy characteristic of these suicidal assaults of the EI is that from August of this year, three assaults have been realized against the same barracks. Whose commands obstinatly mantain an ineffective and deficient «combative readiness» of the forces of the garrison, to keep their security.

In the last assault, the most lethal, died 50 soldiers of the Army of Yemen, loyalist to the president Abdo Rabu Mansur Hade. Hundreds of soldiers were still in the exterior of the barracks, waiting to receive the permission to enter and to receive their pays. One thousand soldiers had acceded already in the military facilities. But the access was limited to avoid agglomerations in the courts and facilities. Then, sunni terrorist slipped between the soldiers who were waiting out. And detonated his explosives jacket. Possibly liberating the so called “detonator of the dead man”.

The security is one of so called “principles of the war». That define «what to do» to obtain militarily our aims. And though it does not appear in all the existing lists of principles, specially in the shorter ones, the security is here to remain. And of its not observance, the efficiency and the power of other accepted principles will get reduced or disabled in their application. Since the principles constitute a global, harmonic and synergic set of the procedures of the to do well, for a military operational system.

EPILOG.

The combination of the usual defense and the mobile proactive defense exercises a synergic and convergent effect, of perfection and securement of the security zone. To detect and reject the tactical surprises of the enemy and to alert the own forces of his appearance from behind horizon. And to blur him the tracing of our defense zone. Thanks to the combat and observation advanced positions and the actions from them and of the patrols and advanced detachments. That would allow the enemy to glimpse and estimate where there would be the «defense positions» in the rejection zone and where the heavy fires of the defense would preferably go, in front of the forward limit of the mentioned zone.