Special Operations: Call In A Specialist For Instant Relief

Archives

April 16, 2021: U.S. SOCOM (Special Operations Command) once again leads the way in problem solving innovation. A recent success was developing of a system that determines when the best solution to a problem is to send a data or an OR (Operations Research) specialist to a SOCOM unit overseas. This occurs when SOCOM unit overseas has encountered obstacles in dealing with intel, Information Warfare or organizational problems they have been unable to solve quickly enough. For over a decade it was believed problems like this could effective be solved using “reach back” techniques that involved consulting with these senior or very specialized problem solvers back in the United States or some regional headquarters via email, chat or even video conference to work out as a solution. Finding that these communications techniques, while effective in many cases, still took a lot of time (days, weeks or months) that was often too late for situations that needed a solution much sooner rather than later. Applying problem-solving techniques to this problem eventually found a solution. This was done by analyzing the types of problems that took longer than expected to solve using reach back and determine which ones, in retrospect, could have been solved in hours or days if a specialist with the right Operations Research or related analytical skills were sent to the unit overseas to more quickly isolate the core of the problem and “reach back” with more effectiveness to find and try one of more solutions until the right one was found and implemented. These solutions were added to a database of “lessons learned” and the solution was often added to training or procedure update materials that got the new technique into wide use. Some SOCOM units were unsure if sending one of the “Geeks With Guns” to a combat zone would be worth the effort of supporting another person in small SOCOM units that relied on everyone in the team operating at a high level of skill and experience to survive and succeed. SOCOM operators gave the new techniques a chance because they knew from past experience that such apparently radical solutions often worked. That’s because for decades special operations troops had come up with unusual new solutions because they had proven time and again capable of selecting new concepts that did work when tested in the combat zone situations. At first this was mainly about new equipment or tactics. After 2001 it increasingly involved new tech that the military had not tried, much less adopted, yet.

The success of post-2001 problem solving-efforts was confirmed in 2017 when an analysis of what was most responsible SOCOM success against Islamic terrorists, especially ISIL (Islamic State in Iraq and the Levant). It had been the work of U.S. JSOC (Joint Special Operations Command). The 2017 revelations confirmed that JSOC had been responsible for most of the casualties ISIL had suffered so far. JSOC, using a combination of SOCOM operators, similar forces from allies (both NATO and Arab as well as, unofficially, Israel) and a growing number of contractors (usually for former SOCOM and other military personnel) developed new techniques that were responsible for locating most of the 70,000 ISIL personnel killed or captured so far. JSOC did a lot of the intel work using special equipment and techniques developed and used heavily in Iraq and Afghanistan after 2005. Back then about 90 percent of American special operations forces were in the Middle East, mostly Iraq. After 2008, with al Qaeda defeated and, on the run, SOCOM brought a lot of its personnel back home for some rest and retraining for counter-terror operations elsewhere. Then ISIL showed up in 2014 and soon about 60 percent of American special operations forces were in the Middle East and JSOC was planning and coordinating most of the operations. To do this JSOC has call on all American military assets and personnel. That’s where the J, for Joint becomes so important.

In addition to spy satellites and UAVs JSOC was a particularly heavy user of MC-12W intelligence-collection aircraft used by army, air force and JSOC contractors. The MC-12W is basically a militarized version of the commercial Beech King Air. That made it ideal for JSOC because King Airs are widely used by civilian firms worldwide. The U.S. Army began using this Beech aircraft as the RC-12 in the 1970s, and was seeking a replacement when the U.S. Air Force realized that the RC-12 was suitable for use as a Predator substitute to do surveillance and intel collection. At the time there were not enough Predators to meet the demand. The first air force MC-12Ws entered service over Iraq and Afghanistan by 2009. By 2014 the U.S. Army and SOCOM were known to be taking over RC-12Ws and adding more electronics and new software turned that them into army EMARSS (Enhanced Medium Altitude Reconnaissance and Surveillance System) aircraft. These aircraft can detect, monitor and jam all forms of wireless communications in an area. Since Islamic terrorists tend to lack any sophisticated military-grade communications gear an MC-12W overhead was very bad news for them. After 2011 most MC-12s were sent to Afghanistan, and found the experience (and success) there similar to that in Iraq. But by 2014 the MC-12s and a lot of UAVs were assigned to JSOC to go after ISIL and that meant returning to Iraq as well as showing up in Africa and anywhere else that ISIL was active.

ISIL and other Islamic terror groups were also resourceful and to survive at all had to innovate. The Islamic terrorists were prevented from spreading beyond Moslem communities or gaining any lasting success even among Moslems because groups like JSOC innovated more quickly and effectively. For example, when Islamic terrorists adopted encrypted messaging apps and social media to communicate, recruit, plan new attacks and attract donations and recruits, JSOC was able to figure out what the Islamic terrorists were doing, how they were doing it and what was the best method for thwarting them. A lot of the solutions, or details of how they worked, remained top secret. That made it difficult to spot new solutions, like sending a skilled analyst to the combat zone to speed up finding solutions for new enemy tactics.

JSOC was formed in 1980 in the aftermath of a failed mission into Iran to rescue American embassy personnel being held captive there. JSOC was meant to eliminate the coordination problems between the services that were found to be the main reason the Iran rescue mission failed. But until the 1990s JSOC didn’t have much to do and was pretty much a headquarters with no combat troops to command. That changed in the 1990s as the CIA began to suffer from the 1980s changes demanded by Congress and media driven public opinion, to get out of the spying (using people on the ground) business. The CIA found that relying on satellite and aircraft surveillance did not get the job done. It was then discovered that using Delta Force and SEAL commandos for CIA and other intelligence operations worked. This makes sense, because there were still situations overseas, often unanticipated ones, where you really, really needed to get an American in there to look around or make contact with local agents.

By the late 1980s there was another big change, SOCOM was created to manage and control SEALs, Special Forces and other special operations forces. That made it easier for JSOC to easily obtain the use of Delta Force and Seal Team Six operators for jobs like espionage. While many of these operators look like pro football players (and makes them stand out, even in civilian clothes), many do not. Turning one of these operators into a secret agent was not very difficult. Special operations “operators” already had a license to kill and were very good at handling emergencies and desperate situations.

During the 1990s SOCOM, Delta Force and the SEALs were already prepared to collect intel on the ground themselves simply because they could no longer rely on the CIA to do it for them. That changed after September 11, 2001 when the CIA was ordered to rebuild its HUMINT (human intelligence) field force. This took time and during the 1990s the commandos got experience doing espionage, and demonstrated they were very good at it. Despite some new gadgets like UAVs controlled via satellite links plus information analyzing software, there was still a need to put people on the ground (CIA or SOCOM) to collect information needed before commandos could plan and execute a successful mission. This proved invaluable for prevailing in the war against Islamic terrorists. This is one reason why everywhere Islamic terrorists operate they understand the importance of crippling the local intelligence effort, especially the local officers and bureaucrats in charge of intel, because it is through these men that JSOC delivers information and helps improve local collection.

For a long time, no one said much, officially, about the use of American commandos as spies and intelligence agents. This was in large part because few people outside SOCOM, JSOC and the CIA knew this was going on. Moreover, these operators were very effective because they were trained to be flexible, think fast, and operate under any conditions. While they normally train wearing camouflage uniforms and carrying an assault rifle, they have no problem going on a recon mission in a suit, armed with a 9mm pistol, or no weapon at all.

Delta continues to learn from British SAS, who have long made good use of close working relationships with British diplomats and overseas sources. Because of that it was no surprise when it became known that after 2001 JSOC operators (Delta and Seal Team Six) began performing secret operations, that stayed secret, involving anti-terrorism activities or nastier forms of diplomacy. Some of these missions did get a lot of publicity, like the capture of Saddam Hussein, the killing of al Qaeda founder Osama Bin Laden and ISIL founder Abu Bakr al Baghdadi. But JSOC largely stayed in the shadows, or at least tried to.

JSOC also stayed small, growing from about a thousand personnel in 2001 to 6,000 in 2017 (compared to 80,000 for all of SOCOM). The official JSOC personnel are probably even fewer than 6,000 because JSOC can also call on just about any American military personnel they need for individual missions. But to keep JSOC effective it was found that keeping the organization small was essential.

The most successful intelligence gathering technique used by JSOC against ISIL was first developed to detect roadside bombs and the people who made and placed them in Iraq and Afghanistan. This was known to the public as Task Force Odin and by 2006 this effort was using manned (usually MC-12s) and UAV aerial reconnaissance aircraft, along with pattern analysis and data mining, to find IEDs (roadside bombs), and the people who plant them, before the convoys arrive.

To do this, the U.S. Army developed an image analysis system that's basically just another form of pattern analysis. However, it's been a very successful system when it comes to finding newly planted IEDs. The army named this system, Constant Hawk, which was named one of the top ten inventions of 2006. The army names this top ten each year to give some of the more obscure, yet very valuable, developments some well-deserved recognition. If you want a good idea of what the future holds, check lists like this.

What JSOC and Constant Hawk took advantage of was tech that first appeared in the 1930s and 40s. Pattern analysis is one of the fundamental tools Operations Research (OR) practitioners have been using since World War II when the newly developed field of OR got its first big workout. Pattern analysis is widely used on Wall Street as well as by engineers, law enforcement, marketing specialists, and eventually the military. Constant Hawk uses a special video camera system to observe a locality and find useful patterns of behavior. Some of the Constant Hawk systems are mounted on light (MC-12s, mainly) aircraft, others are mounted on ground structures. Special software compares photos from different times. When changes are noted, they are checked more closely, which has resulted in the early detection of thousands of roadside bombs and terrorist ambushes. This largely eliminated roadside bomb attacks on supply convoys in Iraq, which travelled the same routes all the time. But those routes were also watched by Constant Hawk. No matter what the enemy did, the Hawk noticed. Eventually, the Hawk, and several other efforts, morphed into a campaign in Iraq that led to the death of over 3,000 terrorists caught in the act of setting up roadside bombs, or hidden and waiting to set them off and attack their victims with gunfire. Hundreds more terrorists were captured, and many thousands of roadside bombs were avoided or destroyed before they could go off. Constant Hawk evolved as more effective hardware and software became available. Israel played a major role in this because they have been facing constant terrorist threats for decade and have proved the most capable in developing new solutions for the terrorists can come up with new problems.

Despite initial skepticism all this geekery worked, and the troops like tools of this sort mainly because the systems retain photos of areas they have patrolled, and allows them to retrieve photos of a particular place on a particular day. Often, the troops returning from, or going out on a patrol, can use the pattern analysis skills we all have to spot something suspicious, or potentially so.

A related math tool is predictive analysis. This was widely used in Iraq to determine the identity of bombers, where they were, and where they were most likely to place their bombs next. This enabled the geeks-with-guns (the Army OR specialists) to offer regular "weather reports" about expected IED or terrorist activity. The troops took these reports very seriously, especially those who ran the hundreds of daily convoys that moved people and supplies around Iraq. If your route was predicted to be "hot", you paid extra attention that day, and often spotted IEDs that, as predicted, were there. Usually, the predictions were used to send the combat engineers and EOD (Explosive Ordnance Disposal) teams out to scout and clean the route. It's the feedback from these specialists that has brought the geeks their reputation. If the geeks, and their tools (computers, aerial images, and math), say there is something bad out there, they are generally right. For the geeks, it's all pretty obvious. Given enough data, you can predict all sorts of things, or just about anything, really. But to many people, including most reporters, it's all still magic. Task Force Odin is the latest name for an effort that has been going on for over four years, and traces its origins back to World War II, and the invention of Operations Research in the decade before that.

After 2008 JSOC backed further development of these analytic tools and quietly lined up the money to keep the MC-12s flying (often with civilian crews) and making it impossible for ISIL, which was founded by the al Qaeda who survived the 2008 defeat, to find a way to maintain enough secrecy to survive. This reputation led to the willingness to try sending a tech specialist to a combat zone to speed up finding and implementing a solution that was going to be more effective the sooner it was put to work.

 


Article Archive

Special Operations: Current 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close