Short-range ballistic missiles (SRBMs) are not merely hardware assets; they are precision tools whose true value depends on the doctrine, tactics, and operational culture that govern their use. For Bangladesh, the central question is not which model to acquire—be it comparable to Bora, M20, SY-400 (BP-12A) or Tayfun—but how these systems can be deployed to create a credible, conventional deterrent that strengthens national defence without destabilising the regional balance. The future of Bangladesh’s SRBM programme lies in strategic employment, operational adaptability, and disciplined control.
Doctrine First: Deterrence by Controlled Denial
Bangladesh’s missile doctrine must embody deterrence by denial—preventing an adversary from achieving objectives rather than pursuing destruction for its own sake. The SRBM force should be a conventional, politically authorised instrument designed to impose tangible operational costs on any hostile actor threatening national sovereignty. These costs could include the neutralisation of forward airbases, logistics hubs, or critical command nodes. It must be having a long arm reach capable of inflicting a hefty cost on the adversary out to 1,000 km periphery of Bangladesh’s territories. Every launch must adhere to strict authorisation procedures, with a clear emphasis on precision, legality, and minimisation of civilian harm. A transparent yet firm posture will reinforce deterrence while maintaining diplomatic stability.
The Kill Chain: Sensors Define Effectiveness
A missile is only as effective as its targeting network. The SRBM kill chain should be seamless, linking sensors, command nodes, and shooters through a responsive and resilient structure. Bangladesh must build a fused intelligence, surveillance, and reconnaissance (ISR) framework combining tactical UAVs, fixed surveillance radars, electronic intelligence, and satellite data access. Dedicated targeting cells at brigade level should manage real-time data fusion, ensuring rapid targeting and post-strike battle damage assessment (BDA). Shortening the sensor-to-shooter cycle through automation and layered authorisation will enhance responsiveness while preserving political oversight.
Mobility, Basing, and Survivability
Bangladesh’s geography—narrow, riverine, and densely populated—demands a highly mobile SRBM force. Static launch parks invite pre-emption; mobility and concealment ensure deterrent credibility. The Bangladesh Army should prioritise truck-mounted transporter-erector-launchers (TELs), operating through dispersed shoot-and-scoot drills along preplanned but unpredictable routes. TELs can be concealed within forested zones, interior road networks, and temporary shelters. Decoys, emission control, and false logistics trails must be institutionalised to complicate adversary targeting. A survivable missile force—always present but rarely locatable—creates psychological and operational uncertainty for opponents.
Employment Patterns and Tactical Use
Graduated Counter-Force Strikes
For most contingencies, Bangladesh’s SRBMs should focus on counter-force strikes—neutralising purely military targets such as airbases, radar stations, or fuel depots to restrict enemy operational tempo. These actions can be synchronised with electronic warfare (EW) and cyber operations to degrade situational awareness.
Time-Phased Interdiction
SRBMs can shape the battlefield by interdicting enemy reinforcements and logistical routes during the early phases of conflict. Sequential precision strikes on road choke points, bridges, or forward supply bases can slow enemy mobilisation while giving Bangladesh’s defensive units time to manoeuvre.
Maritime Denial in the Bay of Bengal
Given Bangladesh’s maritime geography, an SRBM-equipped coastal defence component could deny hostile naval staging or reinforcement. TELs positioned near the coast and linked with naval radar networks would enable time-sensitive targeting of military ships or port infrastructure—strictly within international law and with protection for neutral shipping.
Limited Retaliation and Counter-Escalation
A well-calibrated SRBM response to limited aggression—such as attacks on forward outposts or airspace incursions—allows Bangladesh to impose costs while retaining diplomatic space for de-escalation. Proportionality and precise messaging will be essential to maintain legitimacy and avoid escalation spirals.
Saturation Strikes (Extreme Contingency)
Only in the event of a large-scale invasion should Bangladesh employ saturation tactics. Multiple dispersed TELs launching in salvo, combined with EW disruption, could overwhelm enemy defensive nodes. Such employment would require the highest level of national authorisation and stringent humanitarian oversight.
Integration with Joint Operations
SRBMs gain potency when integrated into a joint command architecture. The Bangladesh Army’s missile forces should coordinate with air defence networks, the Air Force’s early-warning systems, and naval coastal surveillance. Electronic warfare units can disrupt enemy BMD systems, while UAVs provide post-strike assessment. This integration allows synchronised timing of missile strikes with air raids or artillery barrages, maximising the operational effect.
Command, Control, and Safeguards
The credibility of an SRBM force is tied to its discipline and safety. Bangladesh must institute two-party launch authorisation, combining civilian approval with military execution. Secure, redundant communications resistant to jamming and cyberattack are vital. Tiered rules of engagement, strict legal vetting, and permanent oversight mechanisms will ensure the force remains a deterrent, not a destabiliser.
Training, Exercises, and Institutional Culture
Doctrine must be reinforced through training. The Army should conduct regular joint exercises involving missile brigades, ISR units, and EW teams, rehearsing full operational cycles from target acquisition to post-strike BDA. Command post simulations and crisis wargames will prepare commanders for high-stress decision-making. The cultural foundation should prioritise restraint, discipline, and adherence to rules of engagement.
Diplomatic and Strategic Messaging
Operational measures must align with diplomatic posture. Bangladesh should publicly reaffirm that its missile force is conventional, defensive, and compliant with international norms. Pre-notification of major exercises and transparency regarding non-nuclear status will help maintain regional stability. Carefully crafted strategic communications—stressing deterrence, not provocation—will limit the potential for miscalculation by neighbours.
Employment Over Equipment
For Bangladesh, the deterrent value of SRBMs lies not in the number of missiles but in the systems of employment, control, and doctrine that surround them. A mobile, disciplined, and integrated force enhances national defence credibility while maintaining political responsibility. When properly organised, SRBMs serve as instruments of deterrence by denial—ensuring that any hostile actor must weigh the heavy operational costs of aggression. The way forward lies in marrying technological capability with strategic maturity.
Annex-I: Comparison of Available SRBMs for the Bangladesh Army
Overview: This brief reframes the SRBM comparison around how each missile family would be employed by the Bangladesh Army, emphasising operational capability, brigade‑level employment, logistic footprint, and typical mission sets relevant to Dhaka’s defence needs. The intent is practical: assess which attributes matter most for Bangladesh’s geography, force structure and likely missions (border denial, coastal/maritime denial, counter‑air interdiction and operational shaping), and highlight employment concepts rather than vendor specifications.
Key capability questions for Bangladesh planners:
- Can launchers operate on Bangladesh’s road network and disperse in riverine/forest terrain?
- What is the logistic tail (reloads, resupply vehicles, fuel) for a brigade‑level deployment?
- How well does the missile integrate with Bangladesh’s ISR (UAVs, coastal radars, SIGINT) and tactical C2?
- What mission types does it best serve: short‑range counter‑air, time‑phased interdiction, maritime denial, or signalling?
| System | Origin / Maker | Typical Launcher | Approx. Range (Variant) | Warhead (Typical) | Guidance / Accuracy (CEP) | Mobility / Notes |
|---|---|---|---|---|---|---|
| Bora / Khan | Turkey — Roketsan | 6×6 / 8×8 TEL (truck-mounted) | ~80–280 km | ~470 kg HE | GPS/GLONASS-aided INS; ≤10 m CEP | High mobility; designed for shoot-and-scoot; decoy/dispersion options available |
| BP‑12A (SY‑400 family) | China — CASC | 8×8 TEL (SY‑400 common launcher) | ~280 km | ~480 kg | INS + satellite aid; CEP ~30–50 m | Flexible launcher family; includes targeting and training packages |
| M20 / DF‑12 | China — ALIT | Truck-mounted TEL | ~100–280 km | 300–500 kg | GPS/INS; CEP ~30 m | Designed for terminal manoeuvre and accuracy; widely marketed for tactical roles |
| Tayfun (Typhoon) | Turkey — Roketsan | Large truck TEL | 800~1,000 km | Block/variant dependent, ~500 kg | GPS/GLONASS-aided INS with improved terminal guidance; high accuracy | Newer and larger family than Bora/Khan; some variants approach MRBM class |
Annex-II: Illustrative Deployment Scenarios
| Scenario | Strategic Aim | Typical Targets | Notes |
|---|---|---|---|
| Rapid deterrent demonstration | Signal resolve and readiness during crises | Test range or uninhabited coastal zone | Low-risk demonstration with diplomatic messaging |
| Limited counter-force strike | Neutralise adversary airfields and depots | Forward bases, radar, comms nodes | Integrated EW and UAV BDA; strict political control |
| Time-phased interdiction | Disrupt enemy mobilisation | Bridges, logistics hubs, convoy choke points | Conducted over 24–72 hours, emphasising mobility |
| Maritime-denial posture | Restrict hostile naval movement | Port approaches, coastal staging zones | Coastal TELs coordinated with naval surveillance |
| Defensive counter-escalation | Calibrated response to limited aggression | Specific depots or launch sites | Maintains room for diplomatic de-escalation |
| Saturation strike (extreme) | Overwhelm major enemy assets | Multiple airbases, C2 centres | Highest national authorisation required |
Notes: Bangladesh’s SRBM programme, when paired with doctrine-driven employment, robust ISR networks, and disciplined command control, represents a powerful yet stabilising addition to its defence posture. Deterrence is best achieved not through fear, but through predictability, professionalism, and preparedness.
Annex-III: Striking Indian and Myanmar Military KPIs & Countering Reactive Moves
Reference for Bangladeshi planners on SRBM employment against likely Indian and Myanmar military targets, anticipated adversary reactions, countermeasures, and operational constraints.
| KPI (Neighbour) | Recommended SRBM Employment (Bangladesh) | Likely Reactive Moves (Neighbour) | Bangladesh Counters & Mitigations | Political / Operational Constraints |
|---|---|---|---|---|
| Forward airbases & dispersal areas (India: Tezpur, Jorhat, Bagdogra region) | Time‑compressed, precision counter‑air strikes targeting shelters, fuel farms and taxiways during a narrow window; use multiple small salvos from dispersed TELs; integrate EW to degrade base sensors. | Rapid reinforcement of air assets, scrambled interceptors, diplomatic pressure, possible pre‑emptive strikes or sortie surges. | Emphasise mobility (shoot‑and‑scoot), disperse reloads, use EW to blind cueing, perform sequenced strikes to avoid mass interception; immediate diplomatic messaging framing strikes as proportional self‑defence. | Extremely high geopolitical risk; avoid strikes on dual‑use civilian airports; require highest political authorisation and legal vetting. |
| Fuel & ammunition depots (India) | Precision strikes on hardened storage and fuel farm infrastructure timed to disrupt sortie generation and sustainment; prefer penetrator warheads and secondary‑effects planning. | Rapid relocation of stocks, convoying under escort, elevation of alert states and reinforcement of logistics security. | Use time‑phased interdiction to target chokepoints and sustainment routes; exploit interior lines to strike newly identified caches; use ISR to validate relocations. | Civilian fuel infrastructure proximity may complicate targeting; strong requirement for multi‑source target validation and BDA. |
| Air surveillance & radar nodes (India) | SEAD‑style SRBM strikes on key radar sites, coordinated with EW and decoys to suppress detection and degrade BMD cueing. | Increased mobility of radar assets, emissions control, deployment of redundant sensors and mobile EW/BMD shelters. | Employ EW to mask own launches and to create windows for strike; target C2 links and data fusion nodes rather than individual radars where feasible. | Risk of escalation if strikes are perceived as enabling strategic-level attack; ensure legal and political justification. |
| Major logistic hubs / rail & road junctions (India) | Time‑phased interdiction strikes to sever reinforcement axes — sequential strikes on bridges, marshalling yards and chokepoints over 24–72 hours. | Rapid repair efforts, military engineering surge, rerouting of logistics, protective convoy operations. | Conduct follow‑on interdiction on repair units, use ISR to prioritise strikes on newly opened routes, coordinate with interdiction by ground and air assets. | Potential civilian disruption; need to avoid major civilian economic centres and ensure clear proportionality assessments. |
| Forward SAM/AD clusters (India) | Precision strikes to neutralise clustered AD nodes, timed to precede counter‑air operations and create temporary windows for friendly air/AD action. | Reinforcement of AD coverage, redeployment to rear areas, increased use of mobile AD and decoys. | Use salvo timing and EW to saturate interceptors, target AD C2 links and reloads rather than entire coverage footprints. | High risk of escalation; carefully limit target set to military-only nodes and maintain clear post‑strike BDA. |
| Command, control & communications nodes (India) | Limited, high‑value strikes on theatre C2 nodes to degrade coordination; avoid strategic political command centres. | Hardened C2 dispersion, encrypted comms, rapid relocation of staffs, diplomatic signalling. | Prioritise cyber/EW to degrade comms rather than kinetic strikes where political risk is high; if kinetic, ensure surgical precision and legal authorisation. | Strikes on national command nodes could be seen as major escalation; reserved for severe contingencies. |
| Border staging areas & temporary depots (Myanmar) | Discrete precision strikes on confirmed military concentrations and staging areas to deter cross‑border incursions; target only verified military positions. | Scattering of forces into smaller groups, dispersal into civilian areas, use of irregulars/proxies to complicate targeting. | Insist on multi‑source validation (UAV + SIGINT + HUMINT); if uncertainty exists, prioritise signalling, interdiction of logistical corridors and diplomatic pressure. | High humanitarian sensitivity — avoid operations near refugee flows and humanitarian corridors; legal vetting essential. |
| Forward command posts & logistics hubs (Myanmar) | Precision strikes on forward CPs and logistic hubs supporting operations near the border; short‑notice strikes from coastal or interior TELs depending on ISR feed. | Repositioning CPs, decentralisation of logistics, deliberate blending into civilian infrastructure. | Maintain stringent target validation and avoid mixed targets; use proportional strikes and post‑strike humanitarian assessments to limit fallout. | Very high political/humanitarian risk; use only against clear military targets with confirmed evidence. |
| Coastal embarkation points / maritime staging (Myanmar) | Maritime‑focused interdiction using coastal TELs to target loading/embarkation nodes and forward coastal stores; coordinate with naval patrols for positive identification. | Camouflage of embarkation, movement to less vulnerable sites, use of small craft to disperse loads. | Integrate naval ISR, maritime patrol aircraft and coastal radars for confirmation; adopt restrictive ROE to protect neutral shipping. | Third‑party merchant shipping risk; must comply with maritime law and protect neutral traffic. |
| General: Neighbour BMD & ISR ramp‑up (India/Myanmar) | Use EW and deception to degrade cueing; adopt salvo doctrines that complicate interceptor allocation; prefer multiple small, precise strikes to mass launches. | Rapid BMD deployments, increased ISR sorties, diplomatic escalation and potential sanctions or force posture changes. | Invest in EW, deception, signature management and dispersion; leverage international diplomacy to mitigate escalation; pre‑establish hotlines to reduce misinterpretation. | Sustained EW and deception campaigns carry risks of escalation in other domains (cyber, air); coordinate with diplomatic channels. |
Guidance notes:
- All kinetic options require robust multi‑source validation and strict civilian exclusion lists.
- Proportionality, legal vetting and immediate BDA are mandatory prior to any follow‑on action.
- Strikes on Indian KPIs require the highest level of political authorisation and are politically sensitive; use as deterrent leverage rather than first resort.

Khaled Ahmed is a seasoned former intelligence analyst and military expert from the Netherlands, bringing over 15 years of specialised experience in operational intelligence, threat analysis, and strategic defence planning. Having served in high-level, classified roles within Dutch military intelligence, he possesses rare expertise in European security architecture, NATO doctrine, and asymmetric warfare. Khaled’s deep operational insight and international perspective enable him to deliver precision-driven intelligence analysis and forward-looking strategic forecasts. A trusted contributor to high-level risk assessments and security briefings, he offers readers clarity on complex defence and security challenges. Khaled leads the National Security and Fact Analysis sections at BDMilitary. He holds a Master’s degree in International Relations from the University of Groningen, The Netherlands, and is fluent in Dutch, French, and Arabic — combining linguistic dexterity with operational expertise to analyse security issues across cultures and regions.