8 The Network Fusion Cell : Developing the Capability
Background to the Network Fusion Concept
“ Manning , process and products enable G2 NFC to provide best possible , latest , comprehensive picture for all Joint Targeting entities and COM ’ s Decision Making …. Therefore HQ ARRC ’ s approach to Intelligence Support to Targeting should be sustained .” 1
JWC Staff in Ex TRIDENT JAGUAR post exercise report – June 2015
Over the last 20 years Armed Forces around the world have evolved in parallel to the adversaries and threats , particularly from the experience of Counter Insurgency Operations which most NATO forces have taken part in over the last 15 years in both Iraq and Afghanistan . During this period , the targeting of specific individuals and the development of the NATO F2T2EA 2 cycle evolved from being an exclusively Special Operations Forces activity to become everyone ’ s responsibility , whether it fell within a Battle Group ’ s AOR , or up to a much larger region or even pan-theatre . The F2T2EA methodology is G2 intensive and requires analysts equipped with database and link analysis tools to develop a detailed understanding of the networks in order to identify how to best to target them . With the broadening range of non-traditional threats to NATO members , the need to understand and be able to effectively target human networks has continued to gain in importance . Therefore whilst the ASC continues to act as the hub for the more generic and traditional threats from an adversary , the NFC looks across the other PMESII 3 domains to understand the wider threats : such examples include the use of energy supplies ( gas , oil or electricity ) as a weapon , media as an influencing tool , the political environment , criminal networks , critical national infrastructure ( CNI ) and cyber warfare .
The NFC contribution in Support to Targeting
The following explanation outlines the support that NFC provides to the HQ ARRC JTF HQ battle rhythm . It is worth noting that this approach remains applicable across the other roles ( i . e . Land Component Command , Corps HQ ) that the HQ ARRC undertakes .
Macro Analysis . To help COMARRC and the staff understand the environment and focus collection , the NFC conducts a macro analysis of how the various networks within the system interact and which ones either possess the greatest threat to the overall operation , or that have the greatest leverage on other networks . The output is referred to as the System of Systems Analysis and it seeks to identify critical capabilities and requirements , operational areas , activities , and critical vulnerabilities . The key output , briefed to various HQ audiences including COMARRC at the Joint Coordination Board ( JCB ), is identification of vulnerable nodes within the system . With this macro understanding of the System , COMARRC confirms the effects he wishes to have , and then areas of the macro analysis are prioritised for more focussed human network analysis to enable target development .
Micro Analysis . Following the JCB the NFC focuses the bulk of its analysis on understanding the sub-networks , and within them the key actors that are pivotal to the functioning of their networks . The intelligence from all available collection and exploitation methods are fused together to produce targetable intelligence in the form of draft target packs . These
Hostile Friendly Economic Criminal
SEC
LIN
SCO
RATS
DNK
Halland Län
Energy Halland
SDF
Trans FEM
OCGs
ADF
SCO
SEC
ADF
RATS
GoT
TORRIKE
ARNLAND
SDF
RATS
Skäne
Jonkoping Län
Jönköping
ADF
GoA
SDF
RHU
ADF
NSF
SDF
Kronoberg
CTE
Neutral
FTF
APF
Blekinge
Energy & Resources
NTUC
ADF / SDF ( KDF )
GADA
NOM
Kalmar
Kalmar Län
ADF
Overlap = Direct dealing / observed interaction Arrow = Indirect dealing / deniable influence
Protest Groups
FAF
SDF
EMT
DUS
Energy & Resources
Invest Metal
T Navy Karlskrona
RATS
SEC
GoB
SCO
BHC BPA BAG
BOTHNIA
Figure 2 : An example of a System of Systems analysis , this one created in support of Ex TRIDENT JAGUAR 15
1 p . 59 . Ex TRIDENT JAGUAR 2015 HQ ARRC Second Evaluation Report dated 12 June 2015 . 2 Find , Fix , Track , Target , Engage , Assess . 3 Political , Military , Economic , Social , Infrastructure and Information .