Professional Documents
Culture Documents
Intelligence
Intelligence
INTELLIGENCE
MARCH 2010
DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only because it requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG 091913Z Mar 04. This determination was made on 12 January 2009. Other requests for this document must be referred to ATTN: ATZS-CDI-D, U.S. Army Intelligence Center of Excellence, Fort Huachuca, AZ 85613-7017, or via e-mail at [email protected]. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document in accordance with AR 380-5.
This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil).
*FM 2-0
Field Manual No. 2-0 Headquarters Department of the Army Washington, DC, 23 March 2010
INTELLIGENCE
Contents
Page
PART ONE
Chapter 1
INTELLIGENCE AND THE OPERATIONAL ENVIRONMENT ......................... 1-1 The Operational Environment ............................................................................ 1-1 The Intelligence Warfighting Function ................................................................ 1-3 Purpose of Intelligence ....................................................................................... 1-4 Role of Intelligence ............................................................................................. 1-4 Intelligence Tasks ............................................................................................... 1-5 Characteristics of Effective Intelligence............................................................ 1-17 Actionable Intelligence...................................................................................... 1-18 Critical Thinking ................................................................................................ 1-18 Civil Considerations and Cultural Awareness .................................................. 1-19 The Intelligence Process .................................................................................. 1-19 Army Intelligence Enterprise ............................................................................ 1-20 Intelligence Disciplines ..................................................................................... 1-21 Emerging Capabilities....................................................................................... 1-23 THE INTELLIGENCE COMMUNITY .................................................................. 2-1 Unified Action ..................................................................................................... 2-1 Intelligence Community ...................................................................................... 2-1 Intelligence in the Modular Force ....................................................................... 2-5 Categories of Intelligence Products.................................................................... 2-7
Chapter 2
DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only because it requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG 091913Z Mar 04. This determination was made on 12 January 2009. Other requests for this document must be referred to ATTN: ATZS-CDI-D, U.S. Army Intelligence Center of Excellence, Fort Huachuca, AZ 85613-7017, or via e-mail at [email protected]. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document in accordance with AR 380-5. *This publication supersedes FM 2-0, 17 May 2004. i
Contents
Unified Action Intelligence Operations .............................................................. 2-10 Force Projection Operations ............................................................................. 2-12 Entry Operations ............................................................................................... 2-17
PART TWO
Chapter 3
FUNDAMENTALS IN FULL SPECTRUM OPERATIONS ................................. 3-1 The Operational Concept .................................................................................... 3-1 Intelligence Support to the Elements of Full Spectrum Operations .................... 3-2 Elements of Combat Power ................................................................................ 3-5 Army Capabilities ................................................................................................ 3-6 INTELLIGENCE PROCESS IN FULL SPECTRUM OPERATIONS .................. 4-1 Section I Intelligence and the Operations Process .................................... 4-1 Section II The Intelligence Process .............................................................. 4-2 Commanders Input ............................................................................................. 4-2 Intelligence Process Continuing Activities .......................................................... 4-2 The Intelligence Process Steps .......................................................................... 4-9 Section III Intelligence Communications Architecture............................. 4-21 Section IV Knowledge Management .......................................................... 4-22
Chapter 4
PART THREE
Chapter 5
ALL-SOURCE INTELLIGENCE ......................................................................... 5-1 Definition ............................................................................................................. 5-1 Role ..................................................................................................................... 5-2 Fundamentals ..................................................................................................... 5-2 Planning .............................................................................................................. 5-2 Types of Intelligence Products ............................................................................ 5-8 Intelligence, Surveillance, and Reconnaissance Operations .............................. 5-9 Intelligence, Surveillance, and Reconnaissance Synchronization .................... 5-10 COUNTERINTELLIGENCE ................................................................................ 6-1 Definition ............................................................................................................. 6-1 Mission ................................................................................................................ 6-1 Role ..................................................................................................................... 6-1 Fundamentals ..................................................................................................... 6-1 HUMAN INTELLIGENCE ................................................................................... 7-1 Definition and Terms ........................................................................................... 7-1 Role ..................................................................................................................... 7-1 Human Intelligence Collection Methodologies .................................................... 7-2 Capabilities and Planning Considerations .......................................................... 7-4 Human Intelligence in Maneuver Organizations ................................................. 7-6 Human Intelligence Authorities ........................................................................... 7-7 Human Intelligence Technical Channels ............................................................ 7-7
Chapter 6
Chapter 7
ii
FM 2-0
23 March 2010
Contents
Chapter 8
GEOSPATIAL INTELLIGENCE ......................................................................... 8-1 Introduction ......................................................................................................... 8-1 National System for Geospatial-Intelligence and National GeospatialIntelligence Agency ............................................................................................ 8-1 Geospatial Intelligence Within Army Doctrine .................................................... 8-3 IMAGERY INTELLIGENCE ............................................................................... 9-1 Definitions ........................................................................................................... 9-1 Role .................................................................................................................... 9-1 Fundamentals ..................................................................................................... 9-1 Imagery Collection Platforms.............................................................................. 9-2 Types of Imagery Sensors.................................................................................. 9-3 Imagery Intelligence in the Intelligence Process ................................................ 9-3 MEASUREMENT AND SIGNATURE INTELLIGENCE ................................... 10-1 Definition and Terms ........................................................................................ 10-1 Role .................................................................................................................. 10-3 Fundamentals ................................................................................................... 10-3 Measurement and Signature Intelligence in the Intelligence Process ............. 10-4 OPEN-SOURCE INTELLIGENCE ................................................................... 11-1 Definition and Terms ........................................................................................ 11-1 Role .................................................................................................................. 11-1 Fundamentals ................................................................................................... 11-1 Open-Source Intelligence Considerations ........................................................ 11-2 Open-Source Media ......................................................................................... 11-6 SIGNALS INTELLIGENCE .............................................................................. 12-1 Definition ........................................................................................................... 12-1 Role .................................................................................................................. 12-1 Fundamentals ................................................................................................... 12-2 National to Tactical Signals Intelligence Relationships .................................... 12-2 Signals Intelligence in the Intelligence Process ............................................... 12-4 Electronic Warfare Support and Signals Intelligence ....................................... 12-6 TECHNICAL INTELLIGENCE ......................................................................... 13-1 Definition ........................................................................................................... 13-1 Role .................................................................................................................. 13-1 Fundamentals ................................................................................................... 13-2 Technical Intelligence Organizations................................................................ 13-2 Technical Intelligence in the Intelligence Process ............................................ 13-4 INTELLIGENCE ESTIMATE, INTELLIGENCE RUNNING ESTIMATE, AND INTELLIGENCE SUMMARY.............................................................................. A-1 LANGUAGE SUPPORT..................................................................................... B-1 GLOSSARY .......................................................................................... Glossary-1 REFERENCES .................................................................................. References-1 INDEX .......................................................................................................... Index-1
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Appendix A Appendix B
23 March 2010
FM 2-0
iii
Contents
Figures
Figure 1-1. Relationship between the operations and intelligence processes..................... 1-20 Figure 1-2. Example of the tactical portion of the Army intelligence enterprise................... 1-21 Figure 4-1. The operations process ....................................................................................... 4-1 Figure 4-2. The intelligence process ...................................................................................... 4-2 Figure 4-3. Requirements development and integration into the ISR process .................... 4-14
Tables
Table 1-1. Intelligence tailored to the commanders needs ................................................... 1-6 Table 2-1. Examples of partners and sources of intelligence reach ...................................... 2-8 Table 3-1. Primary civil support tasks and example supporting tasks (FM 3-0) .................... 3-4 Table 4-1. Presentation methods and products ..................................................................... 4-9 Table 6-1. Counterintelligence coordinating authority functions ............................................ 6-5 Table 9-1. Sensor characteristics matrix................................................................................ 9-4 Table 11-1. Open-source intelligence classification considerations .................................... 11-4 Table 11-2. Primary open-source media.............................................................................. 11-7 Table B-1. Special staff officer responsibilities requiring linguist support .............................. B-5 Table B-2. Personal staff officer responsibilities .................................................................... B-6
iv
FM 2-0
23 March 2010
Preface
FM 2-0 is the Armys keystone manual for military intelligence (MI) doctrine. It describes The fundamentals of intelligence operations. The intelligence warfighting function. The intelligence process. MI roles and functions within the context of Army operations. Intelligence in unified action. Intelligence considerations in strategic readiness. The intelligence disciplines.
This field manual (FM) provides MI guidance for commanders, staffs, trainers, and MI personnel at all echelons. It forms the foundation for MI and intelligence warfighting function doctrine development. It also serves as a reference for personnel who are developing doctrine; tactics, techniques, and procedures (TTP); materiel and force structure; and institutional and unit training for intelligence operations. This FM uses joint and Army terms. These terms are italicized and the number of each proponent publication follows the definition. Definitions for which FM 2-0 is the proponent publication (the authority) are in boldfaced text. These terms and their definitions will be in the next revision of FM 1-02. In this manual, other aspects of the area of operations (AO) refers to terrain and weather and civil considerations, which can be organized and analyzed using either the mission variables or the operational variables. This publication applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve unless otherwise stated. Headquarters, U.S. Army Training and Doctrine Command, is the proponent for this publication. The preparing agency is the U.S. Army Intelligence Center of Excellence (USAICoE), Fort Huachuca, AZ. Send written comments and recommendations on DA Form 2028 (Recommended Changes to Publications and Blank Forms) directly to: Commander, USAICoE, ATTN: ATZS-CDI-D (FM 2-0), 550 Cibeque Street, Fort Huachuca, AZ 85613-7017. Send comments and recommendations by e-mail to [email protected] or submit an electronic DA Form 2028.
23 March 2010
FM 2-0
Summary of Changes
FM 2-0 updates the Armys keystone doctrine on intelligence. The following paragraphs summarize the most important updates and changes from FM 2-0, 17 May 2004, with change 1 dated 11 September 2008. Chapter 1 makes the following changes: Replaces the intelligence battlefield operating system with the intelligence warfighting function in accordance with FM 3-0 and discusses the mission variables for which the intelligence warfighting function is responsible: enemy, terrain (to include weather), and civil considerations. Updates the descriptions of the intelligence tasks. Addresses the concept of actionable intelligence. Describes the characteristics of effective intelligence, which include the six relevant information quality criteria and three additional criteria. Introduces the intelligence survey as a means to provide the unit intelligence officer with an initial assessment for recommending intelligence asset apportionment within the area of operations (AO) and how to best use the units intelligence assets within the AO. Addresses the concept of critical thinking. Increases the number of intelligence disciplines from seven to nine by adding geospatial intelligence (GEOINT) and open-source intelligence (OSINT). Addresses the emerging capabilities of biometrics, Distributed Common Ground System-Army (DCGS-A), human terrain analysis teams, document and media exploitation (DOMEX) in modern military operations, and the concept of red teaming. Chapter 2 makes the following changes: Provides an overview of national, joint, and Army intelligence organizations. Updates unified action and force projection operations sections based on FM 3-0. Chapter 3 describes the operational concept, discusses intelligence support to the elements of full spectrum operations, and introduces the elements of combat power based on FM 3-0. Chapter 4 makes the following changes: Updates the intelligence process by combining the collect and process steps, adding a continuing activity (generate intelligence knowledge), and describing an additional input to the intelligence process (commanders input). Establishes the definition of an intelligence requirement and describes the information priorities hierarchy for the intelligence warfighting function. Chapters 5 through 13 make the following changes: Address the generate intelligence knowledge continuing activity for the all-source analyst. Incorporate the updated intelligence preparation of the battlefield (IPB) steps. Describe the intelligence running estimate. Update the counterintelligence (CI) functions and organizations. Update human intelligence (HUMINT) functions and organizations based on FM 2-22.3. Introduce GEOINT as an intelligence discipline and discuss the Army implementation of GEOINT in chapter 8. Incorporate changes to the measurement and signature intelligence (MASINT) discipline.
vi
FM 2-0
23 March 2010
Summary of Changes
Introduce OSINT as an intelligence discipline in chapter 11. Updates signals intelligence (SIGINT) definitions and organizations.
Appendix A adds instructions on the contents of the intelligence estimate, intelligence running estimate, and intelligence summary (INTSUM). Appendix B updates language support requirements and adds a short discussion of language technology.
23 March 2010
FM 2-0
vii
PART ONE
Chapter 1
OPERATIONAL VARIABLES
1-2. Analysis of the broad aspects of an operational environment in terms of the operational variables political, military, economic, social, information, infrastructure, physical environment, and timeprovides relevant information that senior commanders use to understand, visualize, and describe the operational environment. As a set, these operational variables are often abbreviated as PMESII-PT. (See FM 3-0.)
23 March 2010
FM 2-0
1-1
Chapter 1
1-3. While the operational variables are directly relevant to campaign planning, they may be too broad to be applied directly to tactical planning. This does not mean they are not of value at all levels. They are fundamental to developing the understanding of the operational environment necessary to conduct planning at any level, in any situation. 1-4. When identifying threats based on the joint systems approach (using PMESII), there are three primary components of the operational environment for which the intelligence warfighting function is responsible: threat, terrain (to include weather), and civil considerations. 1-5. The degree to which each operational variable provides useful information depends on the situation and echelon. Once intelligence Soldiers have completed their overall analysis, they factor in small unit leaders intelligence requirements. For example, social and economic variables often receive close analysis as part of enemy and civil considerations at brigade and higher levels. These factors may affect the training and preparation of small units. However, they may not be relevant to a small unit leaders mission analysis. That leader may only be concerned with questions such as, Who is the tribal leader for this village? Is the electrical generator working? Does the enemy have antitank missiles?
MISSION VARIABLES
1-6. Upon receipt of a warning order (WARNO) or mission, Army leaders narrow their focus to six mission variables. Mission variables are those aspects of the operational environment that directly affect a mission. They outline the situation as it applies to a specific Army unit. The mission variables are mission, enemy, terrain and weather, troops and support available, time available, and civil considerations (METT-TC). These are the categories of relevant information used for mission analysis. (Relevant information is all information of importance to commanders and staffs in the exercise of command and control [FM 3-0].) Army leaders use the mission variables to synthesize the operational variables and tactical-level information with local knowledge about conditions relevant to their mission. Intelligence warfighting function Soldiers are responsible for describing the enemy, terrain and weather, and civil considerations: Enemy. Relevant information regarding the enemy may include Threat characteristics (previously order of battle factors). Threat courses of action (COAs). Terrain and weather. Terrain and weather are natural conditions that profoundly influence operations. Terrain and weather are neutral. They favor neither side unless one is more familiar withor better prepared to operate inthe environment of the area of operations (AO). Civil considerations. Civil considerations are the influence of manmade infrastructure, civilian institutions, and attitudes and activities of the civilian leaders, populations, and organizations within an area of operations on the conduct of military operations (FM 6-0). Civil considerations comprise six characteristics expressed in the memory aid ASCOPE: Areas. Structures. Capabilities. Organizations. People. Events. Note. For additional information on ASCOPE and the intelligence preparation of the battlefield (IPB) process, see FM 2-01.3. Understanding the operational environment requires understanding the civil aspects of the area of influence. 1-7. Analysis based on the mission variables (METT-TC) enables leaders to synthesize operational-level information with local knowledge relevant to their missions and tasks in a specified AO. Tactical and
1-2
FM 2-0
23 March 2010
operational leaders can then anticipate the consequences of their operations before and during execution. (See FM 3-0 for a detailed discussion of the operational and mission variables.)
Chapter 1
plan operations, employ forces effectively, employ effective tactics and techniques, and implement protection. 1-14. The intelligence warfighting function is always engaged in supporting the commander in offensive, defensive, stability, and, when directed, civil support operations. Intelligence provides timely, relevant, accurate, predictive, and tailored products. It supports realistic training, thorough planning, meticulous preparation, and aggressive execution, all of which posture the Army for success. The current deployment tempo requires intelligence readiness to support the full spectrum operations at any point along the spectrum of conflict. This support reaches across levels of war to produce the intelligence required to successfully accomplish the mission through a combination of space, aerial, seaborne, and ground-based systems to provide the most comprehensive intelligence possible. During force projection operations, the intelligence warfighting function supports the commander with accurate and responsive intelligence from predeployment through redeployment. 1-15. The intelligence warfighting function architecturethe components comprising the intelligence warfighting functionprovides specific intelligence and communication structures at each echelon from the national level through the tactical level. (In recent years, brigade combat team [BCT] intelligence capabilities and access have increased significantly.) These structures include intelligence organizations, systems, and procedures for generating intelligence knowledge and for planning, preparing, collecting, and producing intelligence and other critical information in a useable form to those who need it, when they need it. Effective communication connectivity and automation are essential components of this architecture.
PURPOSE OF INTELLIGENCE
1-16. The purpose of intelligence is to provide commanders and staffs with timely, relevant, accurate, predictive, and tailored intelligence about the enemy and other aspects of the AO. Intelligence supports the planning, preparing, execution, and assessment of operations. The most important role of intelligence is to drive operations by supporting the commanders decisionmaking.
ROLE OF INTELLIGENCE
1-17. Intelligence drives the conduct of operations. Therefore, intelligence officers are responsible for ensuring that the intelligence warfighting function operates effectively and efficiently. Intelligence officers are not simply managers; they are the commanders primary advisors on employing ISR assets and driving ISR collection. In addition, intelligence officers support their commanders with analysis and production of timely, relevant, accurate, and predictive information tailored to the commanders specific needs. 1-18. Commanders require intelligence about the enemy and other aspects of the AO before executing operations to effectively accomplish their missions. Intelligence helps commanders visualize the AO, organize their forces, and control operations to achieve their objectives. Intelligence supports protection by alerting commanders to threats and assisting in preserving and protecting the force. 1-19. Units may have to deal with multiple threats. Commanders must understand how current and potential enemies organize, equip, train, employ, and control their forces. Intelligence provides an understanding of the enemy, which assists in conducting operations. Commanders must also understand their AO, area of influence, area of interest, and the impact of each on friendly and threat operations. 1-20. Intelligence personnel provide mission-oriented intelligence about enemy forces within the AO, area of influence, and area of interest as well as about other relevant aspects of the AO. All-source analysts depend upon ISR activities to collect and provide information about the threat and other aspects of the AO. They make their most significant contributions when they accurately predict (predictive intelligence) possible enemy events and actions. Intelligence is never perfect and can be extremely time consuming and difficult. However, providing worst-case and probable threat COAs based on verified or probable threat capabilities and intent during wargaming is a core intelligence function.
1-4
FM 2-0
23 March 2010
1-21. Predictive intelligence is not an exact science and is vulnerable to incomplete information. Commanders must understand that intelligence predictions are only estimates and they accept an amount of risk in formulating plans based only on the intelligence officers assessments. The intelligence officer uses all-source intelligence to try to mitigate the risk. The intelligence officer should ensure the commander is aware of, and has taken into account, all aspects of the enemy, terrain and weather, and civil considerations portions of the mission variables, and should provide the commander with an estimate regarding the degree of confidence the intelligence officer places in each analytic prediction. 1-22. Predictive intelligence enables the commander and staff to anticipate key enemy events or reactions and develop branch plans to counter them. Intelligence professionals tailor intelligence to the commanders requirements to support the commanders situational understanding. Commanders require intelligence in a clear and concise format so they can understand it, believe it, and act on it. It is the intelligence officers primary function to deliver timely intelligence to the commander. A close professional relationship allows intelligence officers to provide the best possible support to their commander. It helps them to tailor products to the commanders needs. Commanders and intelligence officers must work to develop this relationship.
INTELLIGENCE TASKS
1-23. The personnel and organizations within the intelligence warfighting function conduct four primary tasks: Support to force generation. Support to situational understanding. Perform ISR. Support to targeting and information superiority. 1-24. The primary intelligence tasks facilitate the commanders visualization and understanding of the threat and other aspects of the AO. These tasks are interactive and often occur simultaneously. Table 1-1, page 1-6, shows an example of these tasks tailored to the commanders needs. (See FM 7-15, chapter 2, for the complete list of intelligence tactical tasks and their measures of performance.)
23 March 2010
FM 2-0
1-5
Chapter 1
Which course of action (COA) will be implemented? Which enemy actions are expected?
Support to targeting and information superiority Provide intelligence support to targeting. Provide intelligence support to Army information tasks. Provide intelligence support to combat assessment.
Utilize lethal or nonlethal fires against targets. Destroy/suppress/ neutralize targets. Reposition intelligence or attack assets.
Which decision points, highpayoff targets (HPTs), and high-value targets (HVTs) are linked to the enemys actions? Are the assets available and in position to collect on the decision points, HPTs, and HVTs? Have the assets been repositioned for branches or sequels? Are the units fire (lethal and nonlethal) and maneuver effective? Which targets should be reengaged? Is the units information engagement effective?
Perform Indications and Warning 1-27. This task provides the commander with advance warning of threat actions or intentions. The intelligence officer develops I&W to rapidly alert the commander of events or activities that would change the basic nature of the operation. I&W enable the commander to quickly reorient the force to unexpected contingencies and shape the operational environment. Conduct Intelligence Readiness Operations 1-28. Intelligence readiness operations support contingency planning and preparation by developing baseline knowledge of multiple potential threats and operational environments. This information and training enable a collaborative effort and environment to provide the best possible initial threat understanding.
1-6
FM 2-0
23 March 2010
Conduct Foundry 1-29. Foundry is a training program designed to sustain critical intelligence capabilities and perishable intelligence skills, and to provide regional focus, technical training, and functional expertise to the tactical MI force through home-station training platforms, mobile training teams, and live environment training opportunities. Foundry provides a single hub for advanced skills training across the Active Army, Army National Guard, and the Army Reserve MI force. It also provides training to leaders who supervise MI missions and Soldiers who perform MI activities.
Chapter 1
indexing and correlation, normalization, storage, security protocols, and associated applications. The following must be addressed in database development, management, and maintenance: Data sources. Information redundancy. Import and export standards. Data management and standards. Update and backup procedures. Data mining, query, and search protocols.
and materials are refined for use in mission analysis, IPB, and other planning tasks through functional analysis. This task encompasses the types of environments (for example, desert, jungle) and the military aspects of terrain. Obtain Detailed Weather and Weather Effects Information and Intelligence 1-40. This task entails obtaining detailed information and intelligence regarding recent and historical weather trends, seasonal patterns, aspects of the weather, and weather zones. This task includes obtaining information from sources about the weathers effects on friendly and enemy forces and operations in the area of interest. Sources include intelligence reach; research; data mining; database access through the digital topographic support system; academic studies, products, or materials; intelligence archives; and OSINT. This task requires specific and detailed information for each weather factor. 1-41. The Integrated Meteorological System (accessed through DCGS-A) provides commanders at all echelons with an automated weather system. This system receives, processes, and disseminates weather observations, forecasts, and decision aids for weather and environmental effects to all warfighting functions. The information, intelligence, products, and materials obtained are refined for use in mission analysis, IPB, and other planning tasks through functional analysis. Obtain Detailed Civil Considerations Information and Intelligence 1-42. This task entails obtaining detailed information and intelligence concerning the civil considerations within or affecting the expected area of interest. The intelligence section obtains this information from sources that include intelligence reach; research; data mining; database access; academic studies, products, or materials; intelligence archives; and OSINT. The data, information, intelligence, products, and materials obtained are refined for use in mission analysis, IPB, and other planning tasks through functional analysis. This task develops specific and detailed information for each characteristic of civil considerations. Complete Studies 1-43. To assist in achieving goals and objectives, this task entails providing the requesting command or organization with detailed information, assessments, and conclusions about the AO and area of interest. A study can be a systems or functional analysis product. It should be as detailed and in-depth as time allows. Studies provide knowledge that supports understanding of the local populations; cultures and caste system; societal systems or organizations; political systems and structures; religions practiced and their impacts; moral beliefs and their impacts; civil authority considerations; military organizations, structure, and equipment; and attitudes toward U.S., multinational, or host-nation forces. Studies can also include the views and attitudes of multinational and host-nation forces towards these factors. Complete studies include two tasks: Conduct area, regional, or country study. This task entails studying and providing missionfocused knowledge of the terrain and weather, civil considerations, and threat characteristics for a specified area or region of a foreign countryincluding the attitudes of the populace and leaders toward joint, multinational, or host-nation forcesto assist in achieving goals and objectives. Studies can also include the views and attitudes of multinational and host-nation forces. Studies provide detailed information, assessments, and conclusions on the area of interest of the requesting command or organization. Studies should be as detailed as time allows. Conduct specified study. This task entails studying and providing focused knowledge of the terrain and weather, civil considerations, and threat characteristics for a specified topic or requirement. Studies provide the requesting command or organization with detailed information, assessments, and conclusions on the area of interest. Studies should be as detailed and in-depth as time allows.
Chapter 1
mission, and operations at each echelon. Based on their own mission analysis, the staff at each echelon allocates intelligence resources obtained through the generating force according to the commanders guidance, intent, and mission objectives.
multiple sources and provide succinct answers directly to supported units when time is critical. (See paragraph 1-35.)
23 March 2010
FM 2-0
1-11
Chapter 1
effort of the entire staff across all warfighting functions. Specific information requirements (SIRs) facilitate tasking by matching requirements to assets. ISR integration is vital in controlling limited ISR assets. During ISR integration, intelligence requirements are identified, prioritized, and validated. The staff recommends redundancy, mix, and cues as appropriate as well as feasible tasks that are thoroughly planned and written into the order. The result of ISR synchronization and ISR integration is an effort focused on answering the commanders requirements. Perform ISR integration includes two tasksdevelop the ISR plan and execute, evaluate, and update the ISR plan. Develop the ISR Plan 1-59. The operations officer develops the ISR plan. This plan reflects an integrated collection strategy and employment, production, and dissemination scheme that will effectively answer the CCIRs. The entire unit staff analyzes each requirement to determine how best to satisfy it. The staff receives ISR tasks and RFIs from subordinate and adjacent units and higher headquarters. The ISR plan includes all assets that the operations officer can task or request, and coordinating mechanisms to ensure adequate coverage of the area of interest. Execute, Evaluate, and Update the ISR Plan 1-60. This task includes updating reconnaissance and surveillance through dynamic retasking and periodic updates of the ISR plan. The operations officer updates the ISR plan based on information received from the intelligence officer. The operations officer integrates and manages the ISR effort through an integrated staff process and procedures. As priority intelligence requirements (PIRs) are answered and new information requirements arise, the intelligence officer updates the intelligence synchronization tools and provides new input to the operations officer, who updates the ISR plan. The intelligence and operations officers work closely with all staff elements to ensure the units organic, assigned, attached, and operational control (OPCON) collectors receive appropriate taskings.
Conduct Reconnaissance
1-61. Reconnaissance is a mission undertaken to obtain, by visual observation or other detection methods, information about the activities and resources of an enemy or adversary, or to secure data concerning the meteorological, hydrographic, or geographic characteristics of a particular area (JP 2-0). Other detection methods include signals, imagery, and measurement of signatures or other technical characteristics. This task includes performing chemical, biological, radiological, and nuclear (CBRN) reconnaissance. It also includes engineer reconnaissance (including infrastructure reconnaissance and environmental reconnaissance).
Conduct Surveillance
1-62. Surveillance is the systematic observation of aerospace, surface, or subsurface areas, places, persons, or things by visual, aural, electronic, photographic, or other means (JP 3-0). Other means may include but are not limited to space-based systems and special CBRN, artillery, engineer, special operations forces, and air defense equipment. Surveillance involves observing an area to collect information.
Chapter 1
Establish a Mission Intelligence Briefing and Debriefing Program 1-64. Commanders establish, support, and allocate appropriate resources for a mission intelligence briefing and debriefing program. Conducting battle updates and after-action reviews are separate tasks from the mission briefing and debriefing program. 1-65. The intelligence officer section develops a mission intelligence briefing plan and complementary debriefing plan to support the commanders program. Soldiers receive a mission intelligence briefing before executing a patrol or similar operation. The briefing sensitizes Soldiers to specific information and reporting requirements, information gaps, and unique mission requirements. The mission intelligence briefing and debriefing generally follow the format of a mission briefingreview the route traveled, collection objectives of the patrol, and the methods employed. The debriefing program captures the SIRs the patrol was to collect and any additional information and observations the patrol made concerning the operational environment. It also collects any fliers, pamphlets, media, or pictures the patrol found or obtained. Within this task are two tasks: Establish a mission intelligence briefing plan. The intelligence section develops the mission intelligence briefing plan. The mission intelligence briefing plan identifies information Soldiers executing patrols should be seeking. It ensures that all Soldiers conducting patrols, tactical movements, and nontactical movements are sensitized to SIRs, reporting requirements, information gaps, and unique mission requirements. The intelligence mission briefing and debriefing generally follow the format of a mission briefing: review the route traveled, collection objectives of the patrol, and methods employed. Establish a debriefing plan. The intelligence section develops a complementary debriefing plan. The debriefing plan captures information related to the SIRs the patrol collected against, and any additional information and observations the patrol made concerning the operational environment. It also collects any fliers, pamphlets, media, or pictures the patrol found or obtained. The plan should include all returning patrols, leaders who have traveled to meetings, returning human intelligence (HUMINT) collection teams, aircrews, and others who may have obtained information of intelligence value. The intelligence section debriefs personnel. Debriefers then write and submit a report or report information verbally, as appropriate. The requirement for a debriefing by the intelligence section, following each mission, should be a part of the intelligence mission briefing. Leaders should not consider the mission complete and release personnel until the debriefings and reporting are completed. Conduct Intelligence Coordination 1-66. Conduct intelligence coordination is carried out by the intelligence section to facilitate active collaboration, laterally and vertically. It includes establishing and maintaining technical channels to refine and focus the intelligence disciplines performing ISR tasks. It also properly coordinates the discipline assets when operating in another units AO. Conduct intelligence coordination includes two tasks: Establish and maintain technical channels. Intelligence commanders and intelligence staffs maintain control of each intelligence discipline during operations through technical channels to ensure adherence to applicable laws and policies, ensure proper use of doctrinal techniques, and provide technical support and guidance. Applicable laws and policies include all relevant U.S. law, the law of war, international law, directives, DOD instructions, and orders. Commanders direct operations but often rely on the intelligence sections technical expertise to conduct portions of the units collection effort. Technical channels also involve translating ISR tasks into the specific parameters used to focus highly technical or legally sensitive aspects of the ISR effort. Technical channels include but are not limited to defining, managing, or guiding the use of specific ISR assets; identifying critical technical collection criteria, such as technical indicators; recommending collection techniques, procedures, or assets; coordinating operations; and directing specialized training for specific MI personnel or units. Note. In specific cases, regulatory authority is granted to specific national and DOD intelligence agencies for specific intelligence discipline collection and is passed through technical channels.
1-14 FM 2-0 23 March 2010
Conduct deconfliction and coordination. Deconfliction and coordination consist of a series of related activities that facilitate operations in another units AO. These activities facilitate successful ISR collection, support of the operation, and fratricide avoidance. MI organizations may be placed in general support for coverage of an AO or in direct support of a specific unit. MI organizations operating in general support should coordinate with unit commanders when operating in that units AO. At a minimum, the MI organizations announce their presence and request information on any conditions or ongoing situations that may affect how they conduct their missionorganizations should conduct thorough face-to-face coordination. Failure to conduct proper deconfliction and coordination may get Soldiers killed. An MI organization operating in direct support of a specific unit coordinates with the unit for augmentation to conduct operations in accordance with force protection requirements. The MI organizations leader also coordinates with the supported units intelligence section for debriefings of returning members, convoy leaders, and others. Support Sensitive Site Exploitation 1-67. Sensitive site exploitation consists of a related series of activities inside a captured sensitive site to exploit personnel, documents, electronic data, and materiel captured at the site, while neutralizing any threat posed by the site or its contents. A sensitive site is a designated, geographically limited area with special diplomatic, informational, military, and economic sensitivity for the United States. This includes factories with technical data on enemy weapon systems, war crimes sites, critical hostile government facilities, areas suspected of containing persons of high rank in a hostile government or organization, terrorist money-laundering areas, and document storage areas for secret police forces. While the physical process of exploiting the sensitive site begins at the site itself, full exploitation may involve teams of experts located worldwide. (See FM 3-90.15 for doctrine on site exploitation.) Provide Intelligence Support to Personnel Recovery 1-68. Support to personnel recovery consists of intelligence activities and capabilities focused on collecting information needed to recover and return U.S. personnelwhether Soldier, Army civilian, selected DOD contractors, or other personnel as determined by the Secretary of Defensewho are isolated, missing, detained, or captured in a specific AO. This support also includes conducting detailed analysis, developing detailed products, and preparing estimates to support operations undertaken to recover isolated, missing, detained, or captured personnel. (See FM 3-50.1 for doctrine on personnel recovery.)
Chapter 1
accurate, current intelligence and information to the staff and ensures the ISR plan supports the finalized targeting plan. Provide intelligence support to targeting includes two tasksprovide intelligence support to target development and provide intelligence support to target detection. Provide Intelligence Support to Target Development 1-71. Target development is the systematic analysis of threat forces and operations to determine high-value targets (HVTs) (people, organizations, or military units the threat commander requires for successful completion of the mission), high-payoff targets (HPTs) (people, organizations, or military units whose loss to the enemy contributes significantly to the success of the friendly COA), and systems and system components for potential engagement through maneuver, fires, electronic means, or information engagement or operations. Provide Intelligence Support to Target Detection 1-72. The intelligence officer establishes procedures for disseminating targeting information. The targeting team develops the sensor and attack guidance matrix to determine the sensors required to detect and locate targets. The intelligence officer incorporates these requirements into the ISR synchronization tools for later incorporation into the ISR plan.
vulnerable to command and control warfare. Additionally, intelligence plays a key role in assessing the effectiveness of command and control warfare. Note. This task supports electronic attack, which employs jamming, electromagnetic energy, or directed energy against personnel, facilities, or equipment. The task identifies critical threat information systems and command and control nodes. Provide Intelligence Support to Information Protection 1-76. The intelligence warfighting function supports information protection by providing information to identify threat command and control warfare capabilities, activities, and tactics, techniques, and procedures (TTP). Intelligence provides information relating to computer network defense, physical security, OPSEC, counterdeception, and counterpropaganda. Provide Intelligence Support to Operations Security 1-77. This task identifies capabilities and limitations of the threats intelligence system, including adversary intelligence objectives and means, procedures, and facilities that collect, process, and analyze information. This task supports the identification of indicators that adversary intelligence capabilities and systems might detect that could be interpreted or pieced together to obtain essential elements of friendly information (EEFIs) in time to use against friendly forces. Provide Intelligence Support to Military Deception 1-78. This task identifies capabilities and limitations of the threats intelligence collection capabilities, systems, and means. This task also identifies threat biases and perceptions.
Chapter 1
derived from multiple sources and disciplines to minimize the possibility of deception or misinterpretation. Alternative or contradictory assessments should be presented, when necessary, to ensure balance and bias-free intelligence. Timeliness. Intelligence must be provided early to support operations, and prevent surprise from enemy action. It must flow continuously to the commander before, during, and after an operation. Intelligence organizations, databases, and products must be available to develop estimates, make decisions, and plan operations. Usability. Intelligence must be presented in a form that is easily understood or displayed in a format that immediately conveys the meaning to the consumer. Completeness. Intelligence briefings and products must convey all the necessary components to be as complete as possible. Precision. Intelligence briefings and products must provide only the required level of detail and complexity to answer the requirements. Reliability. Intelligence must be evaluated to determine the extent to which the information that has been collected and is being used in intelligence briefings and products is trustworthy, uncorrupted, and undistorted. Any concerns with these must be stated up front. 1-83. Effective intelligence meets three additional criteria: Relevant. Intelligence must support the commanders concept of operations. It must be relevant to the capabilities of the unit, the CCIRs, and the commanders preferences. Predictive. Intelligence should inform the commander about what the threat can do (threat capabilities, emphasizing the most dangerous threat COA) and is most likely to do (the most likely threat COA). The intelligence staff should anticipate the commanders intelligence needs. Tailored. Intelligence must be presentedbased on the needs of the commanders, subordinate commanders, and staffin a specific format that is clear and concise so they can understand it, believe it, and act on it. It should support and satisfy the commanders priorities.
ACTIONABLE INTELLIGENCE
1-84. Actionable intelligence is an example of bringing the characteristics of effective intelligence together with the effective integration of intelligence into ongoing operations to support the commander. Joint doctrine discusses the concept of critical intelligence. (See JP 2-0.) Army personnel have used the concept of actionable intelligence to reflect the joint concept of critical intelligence. In current operations, the concept of actionable intelligence is used by Army personnel to describe information that answers operational requirements. Army personnel also use it to describe specific commanders guidance in the attack guidance matrix to a sufficient degree and with sufficient reliability to support the commanders targeting decisions. 1-85. Ideally, the staff thoroughly integrates intelligence into the operations process to ensure the collection and reporting of timely, relevant, accurate, predictive, and tailored information and intelligence. This integration is accomplished by using the characteristics of effective intelligence as well as conducting a successful ISR plan through detailed ISR synchronization and ISR integration, so commanders can fight the threat based on knowledge rather than assumptions.
CRITICAL THINKING
1-86. Critical thinking is disciplined reasoning whereby individuals formulate ideas about what to believe or do. It involves determining the meaning and significance of what is observed or expressed. It also involves determining whether adequate justification exists to accept conclusions as true, based on a given inference or argument. Critical thinking is essential to understanding situations, identifying problems, finding causes, arriving at justifiable conclusions, and making quality plans. It is essential to improved analysis. (See FM 6-0 for more information on critical thinking. See FM 5-0 for applying critical thinking to planning. See TC 2-33.4 for applying critical thinking to intelligence analysis.)
1-18
FM 2-0
23 March 2010
Chapter 1
1-95. The four continuing activities plus the commanders input drive, shape, and develop the intelligence process. The intelligence process provides a common model for intelligence professionals to use to guide their thoughts, discussions, plans, and assessments. The intelligence process generates information, products, and knowledge about the threat, terrain and weather, and civil considerations, which support the commander and staff in the conduct of operations. See chapter 4 for a full discussion of the intelligence process. Figure 1-1 shows the relationship between the operations and intelligence processes.
1-20
FM 2-0
23 March 2010
1-98. The purpose of the Army intelligence enterprise is to provide technical support and guidance as well as an information and intelligence architecture that efficiently and effectively synchronizes reconnaissance and surveillance, and intelligence analysis and production to produce intelligence to support the commanders situational understanding. Figure 1-2 exemplifies the tactical portion of the Army intelligence enterprise.
Figure 1-2. Example of the tactical portion of the Army intelligence enterprise
INTELLIGENCE DISCIPLINES
1-99. The Army intelligence enterprise is commonly organized through the intelligence disciplines. Each discipline applies unique aspects of support and guidance called technical channels. 1-100. The Armys intelligence disciplines are All-source intelligence. Counterintelligence (CI).
23 March 2010 FM 2-0 1-21
Chapter 1
HUMINT. Geospatial intelligence (GEOINT). Imagery intelligence (IMINT). Measurement and signature intelligence (MASINT). OSINT. Signals intelligence (SIGINT). Technical intelligence (TECHINT). 1-101. For more information regarding the intelligence disciplines, see Part Three of this manual and the manuals that address each intelligence discipline.
ALL-SOURCE INTELLIGENCE
1-102. All-source intelligence is the products, organizations, and activities that incorporate all sources of information and intelligence, including OSINT, in the production of intelligence. All-source intelligence is both a separate intelligence discipline and the name of the process used to produce intelligence from multiple intelligence or information sources. (See chapter 5.)
COUNTERINTELLIGENCE
1-103. CI counters or neutralizes foreign intelligence and security services (FISS) and international terrorist organizations (ITO) intelligence collection efforts. It does this through collection, CI investigations, operations, analysis, production, and functional and technical services. CI includes all actions taken to detect, identify, track, exploit, and neutralize the multidiscipline intelligence activities of friends, competitors, opponents, adversaries, and enemies. It is the key intelligence community contributor to the protection of U.S. interests and equities. CI helps identify EEFIs by identifying vulnerabilities to threat collection and actions taken to counter collection and operations against U.S. forces. (See chapter 6.)
HUMAN INTELLIGENCE
1-104. HUMINT is the collection of foreign information by a trained HUMINT collector. It uses human sources and a variety of collection methods, both passively and actively, to collect information including multimedia on threat characteristics. (See chapter 7.)
GEOSPATIAL INTELLIGENCE
1-105. Section 467, Title 10, United States Code (10 USC 467) establishes GEOINT. Geospatial intelligence is the exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the Earth. Geospatial intelligence consists of imagery, imagery intelligence, and geospatial information (JP 2-03). (See chapter 8.)
IMAGERY INTELLIGENCE
1-106. IMINT is derived from the exploitation of imagery collected by visual photography, infrared sensors, lasers, multispectral sensors, and radar. These sensors produce images of objects optically, electronically, or digitally on film, electronic display devices, or other media. (See chapter 9.)
1-22
FM 2-0
23 March 2010
frequency, nuclear detection, and seismic sensors. MASINT collection also includes techniques for collecting CBRN and other materiel samples. (See chapter 10.)
OPEN-SOURCE INTELLIGENCE
1-108. OSINT is produced from publicly available information collected, exploited, and disseminated in a timely manner to an appropriate audience for addressing a specific intelligence requirement. 1-109. Expressed in terms of the Army intelligence process, OSINT is relevant information derived from the systematic collection, processing, and analysis of publicly available information in response to intelligence requirements. 1-110. The Army does not have a specific military occupational specialty (MOS), additional skill identifier (ASI), or special qualification identifier (SQI) for OSINT. With the exception of the Asian Studies Detachment, the Army does not have base tables of organization and equipment (TOEs) for OSINT units or staff elements. OSINT missions and tasks are embedded within existing missions and force structure or accomplished through task organization. (See chapter 11.)
SIGNALS INTELLIGENCE
1-111. SIGINT is produced by exploiting foreign communications systems and noncommunications emitters. SIGINT provides unique intelligence and analysis information in a timely manner. The discipline comprises communications intelligence (COMINT), electronic intelligence (ELINT), and foreign instrumentation signals intelligence (FISINT). (See chapter 12.)
TECHNICAL INTELLIGENCE
1-112. TECHINT is derived from the collection and analysis of threat and foreign military equipment and associated materiel for the purposes of preventing technological surprise, assessing foreign scientific and technical capabilities, and developing countermeasures designed to neutralize an adversarys technological advantages. (See chapter 13 and TC 2-22.4.)
EMERGING CAPABILITIES
1-113. Five emerging capabilities that impact intelligence operations are Biometrics. DCGS-A. Human terrain analysis teams. Document and media exploitation (DOMEX). Red teaming.
BIOMETRICS
1-114. JP 2-0 defines biometric as a measurable physical characteristic or personal behavioral trait used to recognize the identity or verify the claimed identity of an individual. Biometrics-enabled intelligence is the intelligence information associated with and/or derived from biometrics data that matches a specific person or unknown identity to a place, activity, device, component, or weapon that supports terrorist/insurgent network and related pattern analysis, facilitates high-value individual targeting, reveals movement patterns, and confirms claimed identity (DODD 8521.01E).
23 March 2010
FM 2-0
1-23
Chapter 1
1-115. Typical automated biometrics systems include five integrated components: Collection device. Hardware found on a biometric device that converts biometric input into a digital signal and conveys this information to the processing device. Algorithms. A sequence of instructions that tells a biometrics system how to solve a particular problem. An algorithm has a finite number of steps and is typically used by the biometric engine to compute whether a match exists between a biometric sample and a biometric template. Database. Used to store collected information for later matching. Decision process. An automated or human-assisted process or analysis that produces a decision by matching components against specific search criteria. Dissemination process. A process that gets the data collected to whomever and wherever it needs to be in a timely manner. 1-116. The implementation of these five components leads to personal identification and the identification of an individual with certainty. This implementation occurs in three stages: The sensor collects biometric data of or on a feature, for example fingerprints, an iris scan, a photographic image of a face, or a DNA sample. The system stores the biometric feature in a mathematical template in a database. The processing device runs a search of the template against a matching algorithm that compares it to templates already stored in the database. 1-117. Commanders require the ability to link identity information to a given individual. Biometrics systems are employed to deny threat forces freedom of movement within the populace and to positively identify known threats. These systems collect biometric data and combine them with contextual data to produce an electronic dossier on the individual. 1-118. Personal identification includes positively identifying friendly, adversary, and nonadversary forces. Intelligence-related functions that biometrics can support or enhance include Intelligence analysis. Screening of foreign national and local employee hires. CI and force protection. Interrogation and detention operations. HVT confirmation (including high-value individuals and individuals killed in action). Base access and local security. Population control or census (screening, enrolling, and badging operations). 1-119. The ability to positively identify and place an individual within a relevant context adds a level of certainty that significantly enhances the overall effectiveness of the mission. Personal identification enabled by biometric technology can help identify and locate specific individuals in support of targeting. This capability is necessary for force protection and security missions as well as when an operational capability is required to achieve an advantage in all operational themes and across the spectrum of conflict. 1-120. Affixing an individuals identification using the individuals unique physical features and linking this identity to the individuals past activities and previously used identitiessuch as friendly forces accesses, permissions, clearance status, medical information, and unique biometrically based identifiers, in addition to adversary or unknown personsprovides more accurate information on the person. Ensuring access to all available information about an individual is critical to functions, such as screening persons for access to vessels and positions of trust and prosecuting terrorists and other criminals. Biometrics capabilities continue to develop, and current operations continue to evolve. Integrating the operational, intelligence, and communication aspects of biometrics systems into a cohesive concept of employment is necessary to maximize the advantages of biometrics-enabled intelligence (BEI).
1-24
FM 2-0
23 March 2010
Chapter 1
captured materials. Captured materials are divided into captured enemy documents (CEDs) and captured enemy materiel (CEM). 1-127. DOMEX is the systematic extraction of information from all media in response to the commanders collection requirements. When conducted properly, DOMEX operations are intended to Maximize the value of intelligence gained from CEDs. Provide the commander with timely and relevant intelligence to effectively enhance awareness of the enemys capabilities, operational structures, and intent. Assist in criminal prosecution or legal processes by maintaining chain of custody procedures and preserving the evidentiary value of captured materials. 1-128. DOMEX is an increasingly specialized, full-time mission requiring advanced automation and communication support, analytical support, and expert linguists. DOMEX and translation operations were considered purely HUMINT processing activities directly associated with language capabilities and extensive background knowledge in area studies. However, current doctrinal thought acknowledges that HUMINT is no longer the sole asset responsible for and capable of conducting DOMEX operations. Personnel involved in DOMEX do not require HUMINT training to screen or translate a document; rather, it is best to use sparse HUMINT assets to conduct the HUMINT mission. DOMEX is an Army-wide responsibility. While HUMINT assets may be used, when available, to perform the DOMEX mission, HUMINT organizations are consumers of DOMEX information rather than major providers. 1-129. For DOMEX products to be a force multiplier, the rapid exploitation of captured materials must occur at the lowest echelon possible. DOMEX assets pushed down to the tactical level provide timely and accurate intelligence support to warfighters. This practice not only enables rapid exploitation and evacuation of captured materials, but also hastens the feedback commanders receive from the higher echelon analysis. 1-130. The traditional methodology for intelligence dissemination sends reports through an echeloned structure from national, to theater, to corps, to division, and so on, then back up through the same rigid structure. Recent military operations have shown that this methodology seldom results in lower tactical echelons receiving timely intelligence critical to their AO. Intelligence staffs need to use any available communication medium to pass vital information. 1-131. Critical pieces of information must be passed quickly to those who can use them, specifically, tactical commanders. Intelligence staffs are responsible for reporting and disseminating DOMEX-derived information in a manner that ensures the information reaches not only the next higher echelon but also the tactical commander most affected by the information. 1-132. DOMEX personnel are usually not available below battalion level except in MI organizations. Maneuver battalion intelligence staffs must prepare their subordinate units for DOMEX operations. There are two techniques for doing this. When intelligence and target-language personnel are available, they can be task-organized as intelligence support teams and placed with companies or platoons. Alternatively, the intelligence section can train company or platoon personnel in specific handling, screening, and inventorying techniques. 1-133. Where tactical assets are insufficient, operational and strategic assets can be requested to support a units organic assets, through personnel augmentation or virtual or long-distance support. DOMEX support elements provide this support worldwide. 1-134. The skills, knowledge, and equipment for specialized processing are available at intelligence community organizations through the communications architecture. Units can request support from a number of organizations: National Security Agency (NSA). Defense Intelligence Agency (DIA). National Geospatial-Intelligence Agency (NGA). National Media Exploitation Center (NMEC). National Ground Intelligence Center (NGIC).
1-26 FM 2-0 23 March 2010
Joint document exploitation centers (JDECs). Other U.S. or multinational intelligence community organizations. 1-135. These organizations use specialized techniques and procedures to extract additional information from captured audio and video materials. Application of specialized processing techniques and procedures may require the classification of the processed information and restrict its dissemination.
RED TEAMING
1-136. Red teams provide commanders with an enhanced capability to explore alternatives during planning, preparation, execution, and assessment. Whenever possible, commanders employ red teams to examine plans from a threats perspective. A red team is a special staff section whose members primarily participate in planning future operations and plans cells unless integrated into another cell. Red team members anticipate cultural perception of partners, enemies, adversaries, and others. They conduct independent critical reviews and analyses. 1-137. Red teaming provides commanders alternative perspectives by challenging planning assumptions, assisting in defining the problem and end state, identifying friendly and enemy vulnerabilities, and identifying assessment measures. These alternative perspectives help commanders account for the threat and environment in plans, concepts, organizations, and capabilities. These perspectives also address the standpoint of multinational partners, enemies, adversaries, and others in the AO.
23 March 2010
FM 2-0
1-27
Chapter 2
INTELLIGENCE COMMUNITY
2-3. Several organizations in the intelligence community support military operations by providing specific intelligence products and services. The intelligence officer and the staff must be familiar with these organizations and the methods of obtaining information from them as necessary.
23 March 2010
FM 2-0
2-1
Chapter 2
Peacekeeping and multinational support. Noncombatant evacuation operations. Indications and warning (I&W). Targeting. Battle damage assessment (BDA). Current intelligence. Systems analysis of the adversary. Collection management. Intelligence architecture and systems support. Intelligence support to operations planning. Defense critical infrastructure protection. Document and media exploitation (DOMEX). 2-6. For more information on the DIA and its organizations, see DODD 5105.21.
2-2
FM 2-0
23 March 2010
U.S. Army Intelligence and Security Command 2-12. INSCOM, which includes the National Ground Intelligence Center (NGIC), provides intelligence support to strategic- and operational-level commanders in the areas of IMINT, MASINT, SIGINT, operational and tactical HUMINT, CI, technical intelligence (TECHINT), information operations, general military intelligence (GMI), and scientific and technical intelligence (S&TI). Other organizations include the Army Reserve Military Intelligence Readiness Command. 2-13. The Army has vested its intelligence at the operational level with INSCOM, a direct reporting unit responsible for the Armys intelligence forces above corps. INSCOMs mission is to conduct and support intelligence, security, and information operations for military commanders, Army Service component commanders, and national decisionmakers. INSCOMs goal is to provide superior information and information capabilities to Army commanders, while denying the same to adversaries. Headquarters, INSCOM, in coordination with its major subordinate commands, provides a myriad of general intelligence support operations. INSCOM serves as the national to tactical intelligence conduit. Army Space Program Office 2-14. The Army Space Program Office (ASPO) executes the Armys Tactical Exploitation of National Capabilities Program (TENCAP). The program focuses on exploiting the current and future tactical potential of national systems and integrating the capabilities into the Armys tactical decisionmaking process. Army TENCAP systems enable the tactical commander maximum flexibility to satisfy intelligence needs under a wide range of operational scenarios. ASPO is the point of contact (POC) for all tactical activities between direct reporting units or users and the NRO.
23 March 2010
FM 2-0
2-3
Chapter 2
community. Joint force commanders and their J-2s should be familiar with the roles and responsibilities of the following non-DOD members of the intelligence community: Director of National Intelligence (DNI). Central Intelligence Agency (CIA). Department of State (DOS). Department of Energy (DOE). Federal Bureau of Investigation (FBI). Department of the Treasury. United States Coast Guard (USCG). Department of Homeland Security (DHS). Drug Enforcement Administration (DEA).
Department of State
2-21. The DOSs Bureau of Intelligence and Research performs intelligence analysis and production on a variety of political and economic topics essential to foreign policy determination and execution.
Department of Energy
2-22. The DOE analyzes foreign information relevant to U.S. energy policies and nonproliferation issues.
2-4
FM 2-0
23 March 2010
OTHER AGENCIES
2-28. There are a number of U.S. Government agencies and organizations, not members of the intelligence community, that are responsible for collecting and maintaining information and statistics related to foreign governments and international affairs. Organizations such as the Library of Congress, the Departments of Agriculture and Commerce, the National Technical Information Center, and the U.S. Patent Office are potential sources of specialized information on political, economic, and military-related topics. The intelligence community may draw on these organizations to support and enhance research and analysis and to provide relevant information and intelligence for commanders and planners. 2-29. Many other U.S. Government agencies may become directly involved in supporting DOD especially during stability operations. (See JP 2-01 for a description of agency support to joint operations and intelligence.) These organizations include Department of Transportation. Disaster Assistance Response Team within the Office of Foreign Disaster. U.S. Agency for International Development.
23 March 2010
FM 2-0
2-5
Chapter 2
Inform the commander. Identify, define, and nominate objectives. Support the planning and execution of operations. Counter adversary deception and surprise. Support friendly deception efforts. Assess the effects of operations on the adversary. 2-34. Intelligence operations are wide-ranging activities conducted by intelligence staffs and organizations to provide commanders and national-level decisionmakers with timely, relevant, accurate, predictive, and tailored intelligence. The six steps of the joint intelligence process are planning and direction, collection, processing and exploitation, analysis and production, dissemination and integration, and evaluation and feedback: Planning and direction. Intelligence planning for rapid response to possible crises occurs well in advance as part of a commands overall joint operations planning process. The most likely threat scenarios are used as the core of this planning effort, which includes determining the personnel, equipment, and intelligence architecture essential for generic support to force deployments. When a particular crisis unfolds, planners develop an operation order (OPORD). Collection. Collection includes those activities related to the acquisition of data required to satisfy the requirements specified in the collection plan. Collection operations management involves the direction, scheduling, and control of specific collection platforms, sensors, and HUMINT sources and alignment processing, exploitation, and reporting resources with planned collection. Processing and exploitation. During processing and exploitation, raw collected data is converted into forms readily useable by commanders, decisionmakers at all levels, intelligence analysts, and other consumers. Analysis and production. During analysis and production, intelligence production occurs from information gathered by the collection capabilities assigned or attached to the joint force and from the refinement and compilation of intelligence received from subordinate units and external organizations. All available processed information is integrated, evaluated, analyzed, and interpreted to create products that will satisfy the commanders priority intelligence requirements (PIRs) or requests for information (RFIs). Dissemination and integration. During dissemination and integration, intelligence is delivered to and used by the consumer. Dissemination is facilitated by a variety of means determined by the needs of the user and the implications and criticality of the intelligence. Evaluation and feedback. During evaluation and feedback, intelligence personnel at all levels assess how well each of the various types of intelligence operations are being performed.
2-6
FM 2-0
23 March 2010
unmanned aircraft system (TUAS) platoon, and a ground collection platoon. For more information on BCT intelligence, see FM 2-19.4.
INTELLIGENCE REACH
2-37. The intelligence officer must determine how best to support the units mission with intelligence reach capabilities. Detailed planning and training are critical to the success of intelligence reach operations. Intelligence reach supports distributed analysis to support the CCIRs. Table 2-1, page 2-8, shows examples of partners and sources of intelligence reach. The following are steps the staff can take to ensure optimal use, operability, and effectiveness of intelligence reach: Establish data exchange methods and procedures. Establish electronic message transfer procedures. Establish homepages for identified forces. Establish POCs for I&W centers, production centers, combatant command JIOCs, DIA, INSCOM, and their major subordinate commands, such as NGIC and the higher MI organizations. Ensure the intelligence staff has the necessary personnel, training, automated systems, bandwidth, and resources to conduct intelligence reach. Determine information requirements through staff planning. Develop production requirements for identified intelligence gaps. Order geospatial products for the projected area of interest. Establish and maintain a comprehensive directory of intelligence reach resources before deployment and throughout operations. The value of intelligence reach will greatly increase as the staff develops and maintains ready access to rich information resources. These resources are numerous and may include Army, joint, DOD, non-DOD, national, commercial, foreign, and university research programs. Know what types of information the resources can provide. Continuously expand the resource directory through identification of new resources. Use intelligence reach first to fill intelligence gaps and requirements and answer RFIs. This technique can preclude unnecessary tasking or risk to limited ISR assets. Maintain continuous situational understanding and anticipate intelligence requirements. Use intelligence reach to fulfill these requirements and provide the results to the commander and staff for the conduct of operations. Exchange intelligence reach strategies with other units. Present the information retrieved through intelligence reach in a usable form. Share the information derived from intelligence reach with subordinate, lateral, and higher echelons. Ensure follow-on forces have all information as well.
23 March 2010
FM 2-0
2-7
Chapter 2
Services National Air and Space Intelligence Office of Naval Intelligence. Center. National Maritime Intelligence Center. Marine Corps Intelligence Agency. Air Force Intelligence, Surveillance, and Reconnaissance Agency. Joint U.S. Transportation Command JIOC. U.S. European Command Joint Intelligence Operations Center (JIOC). U.S. Strategic Command. U.S. Southern Command JIOC. U.S. Space Command Combat Information Center JIOC. U.S. Special Operations Command JIOC. U.S. Northern Command JIOC. U.S. Space Command Combat Information Center. U.S. Africa Command JIOC. U.S. Joint Forces Command Air Intelligence Center. U.S. Central Command JIOC. Department of Defense Defense Intelligence Agency (DIA). Defense Attach Office. Civil-Military Operations. Defense Human Intelligence. Missile and Space Intelligence Center. National Geospatial-Intelligence Center (NGA). National Center for Medical Intelligence. National Security Agency (NSA). Non-Department of Defense Department of Energy (DOE). Federal Emergency Management Agency Federal Bureau of Investigation (FBI). (FEMA). Department of State (DOS). U.S. Immigration and Customs Drug Enforcement Agency (DEA). Enforcement (ICE). National Director of National Intelligence (DNI). Bureau of Intelligence and Research (State Department). National Intelligence Council (NIC). Office of Intelligence Support (Department Central Intelligence Agency (CIA). of Transportation). National Reconnaissance Office (NRO). Department of Homeland Security (DHS). Commercial RAND. Reuters. Janes Defense Weekly. Associated Press. Economic Intelligence Unit. United Press International. Cable News Network. Foreign Defense Intelligence Staff, United Defense Intelligence Organization, Kingdom. Australia. National Defense Headquarters, Canada.
2-8
FM 2-0
23 March 2010
2-39. The categories of intelligence are distinguishable from each other based on the purpose of the intelligence product. The categories can overlap and some of the same intelligence is useful in more than one category. Depending upon the echelon, intelligence organizations use specialized procedures to develop each category of intelligence. The following information describes each category.
CURRENT INTELLIGENCE
2-42. Current intelligence supports ongoing operations; it involves the integration of time-sensitive, allsource intelligence and information into concise, accurate, and objective reporting on the area of operations (AO) and current threat situation. One of the most important forms of current intelligence is the threat situation portion of the COP. The intelligence officer is responsible for producing current intelligence for the unit. In addition to the current situation, current intelligence should provide projections of the threats anticipated actions and their implications on the friendly operation. (See JP 2-0.)
Chapter 2
assessment of operations. The intelligence officer applies and updates the database as it executes its intelligence production tasks.
TARGET INTELLIGENCE
2-46. Target intelligence is the analysis of enemy units, dispositions, facilities, and systems to identify and nominate specific assets or vulnerabilities for attack, reattack, or exploitation (for intelligence). It consists of two mutually supporting production tasks: Target development. The systematic evaluation and analysis of target systems, system components, and component elements to identify high-value targets (HVTs) for potential engagement through lethal or nonlethal means. Combat assessment. Once a target is engaged, combat assessment provides a timely and accurate estimate of the effects of the application of military force (lethal or nonlethal) and command and control warfare on targets and target systems based on predetermined objectives.
COUNTERINTELLIGENCE
2-49. CI analyzes the threats posed by foreign intelligence and security services (FISS) and international terrorist organizations (ITO) and the intelligence activities of nonstate actors, such as organized crime, terrorist groups, and drug traffickers. CI analysis incorporates all-source information and the results of CI investigations and operations to support a multidiscipline analysis of the force protection threat.
ESTIMATIVE
2-50. Estimates provide forecasts on how a situation may develop and the implications of planning and executing military operations. Estimative intelligence goes beyond descriptions of adversary capabilities or reporting of enemy activity. It tries to forecast the unknown based on an analysis of known facts using techniques such as pattern analysis, inference, and statistical probability.
their missions. Ideally, multinational and interagency intelligence partners provide cultures, perspectives, and capabilities that reinforce and complement Army MI strengths and capabilities. Close intelligence coordination is the foundation of successful unified action.
23 March 2010
FM 2-0
2-11
Chapter 2
Scope. Duration. Terrain. Permanence. 2-58. Several attributes of the land environment affect the application of landpower. ISR is the means the Army uses to implement the joint doctrinal concept of persistent surveillance to support tactical operations. ISR is also essential to detect, locate, characterize, identify, track, and target high-payoff targets (HPTs) and HVTs, as well as provide combat assessment in real time within a very fluid operational environment. (See JP 2-0 and JP 3-33 for more information on joint intelligence operations and organizations.)
Coordinate for and rehearse electronic message transfers (for example, Internet Protocol addresses, routing indicators) using the same communications protocols with theater, higher headquarters, and subordinate and lateral units that the unit would use when deployed. Plan, train, and practice surging intelligence functions on likely or developing contingency crises. Prepare and practice coordination from predeployment through redeployment with other elements and organizations (for example, the intelligence discipline assets and analytical elements, the G-7, staff weather officer, civil affairs [CA], psychological operations [PSYOP], and special operations forces [SOF] units, including databases and connectivity). Include the following as a part of daily (sustainment) operations: U.S. Army Reserve (USAR) and other augmentation. A linguist plan with proficiency requirements. (Alert linguists through early entry phases of deployment.) Training (individual and collective). Establish formal or informal intelligence links, relationships, and networks to meet developing contingencies. Forward all RFIs to higher headquarters in accordance with SOPs. Establish statements of intelligence interests, other production, and I&W requirements. 2-64. To draw intelligence from higher echelons and focus intelligence downward, based on the commander's needs, the intelligence officer must Understand the J-2s multiple echelon and broadcast dissemination capability to ensure near real-time reporting to all deployed, in transit, or preparing to deploy forces. Maintain or build intelligence databases on threats and other aspects of the AO for each probable contingency. State and record the CCIRs (at a minimum, list the PIRs and ISR tasks or requests). 2-65. Until the units collection assets become operational in the AO, the intelligence officer will depend upon intelligence from the Army forces or joint task force (JTF) to answer the units intelligence needs. 2-66. Force projection encompasses five processes that occur in a continuous, overlapping, and repeating sequence throughout an operation. The five processes include Mobilization. Deployment. Employment. Sustainment. Redeployment. 2-67. Intelligence and ISR considerations during force projection are discussed below.
MOBILIZATION
2-68. Mobilization is the process by which the armed forces or part of them are brought to a state of readiness for war or other national emergency. It assembles and organizes resources to support national objectives. Mobilization includes activating all or part of the USAR, and assembling and organizing personnel, supplies, and materiel. A unit may be brought to a state of readiness for a specific mission or other national emergency. The mobilization process is where specific Active Army, Army National Guard (ARNG), Army National Guard of the United States (ARNGUS), and USAR units, capabilities, and personnel are identified and integrated into the unit. During mobilization, the intelligence officer Monitors intelligence reporting on threat activity and I&W data. Manages information requirements and RFIs from the unit and subordinate units including updating ISR planning.
23 March 2010
FM 2-0
2-13
Chapter 2
Establishes habitual training relationships with the Active Army, ARNG, ARNGUS, and USAR augmentation units and personnel as well as higher echelon intelligence organizations identified in the existing OPLAN. Supports the USAR units and augmentation personnel by preparing and conducting intelligence training and threat update briefings and by disseminating intelligence. Identifies ISR force requirements for the different types of operations and contingency plans. Identifies individual military, civilian, and contractor augmentation requirements for intelligence operations. The Army, in particular the intelligence warfighting function, cannot perform its mission without the support of its Army civilians and contractors. The force increasingly relies on the experience, expertise, and performance of civilian personnel. 2-69. During mobilization, the intelligence officer, in conjunction with the rest of the staff, ensures adequate equipping and trainingof Active Army and USAR MI organizations and individual augmenteesto conduct intelligence operations. Predictive intelligence also supports the decisions the commander and staff must make regarding the size, composition, structure, and deployment sequence of the force to create the conditions for success. 2-70. The intelligence officer supports peacetime contingency planning with intelligence knowledge and IPB products and databases on likely contingency areas. The intelligence officer establishes an intelligence synchronization plan implemented upon alert notification. For a smooth transition from predeployment to entry, the intelligence officer must coordinate intelligence synchronization and communications plans before the crisis occurs. The intelligence synchronization plan identifies the intelligence requirements supporting the plans, to include ISR assets providing support throughout the area of interest. Command and support ISR-asset relationships at each echelon. Report and request procedures not covered in unit SOPs. Deployment sequence of ISR personnel and equipment. Early deployment of key ISR personnel and equipment is essential for force protection and combat readiness. Composition of initial and follow-on deploying assets is influenced by mission variablesmission, enemy, terrain and weather, troops and support available, time available, and civil considerations (METT-TC) availability of communications, and availability of lift. Communications architecture supporting both intelligence staffs and ISR assets. Friendly vulnerabilities to hostile intelligence threats and plans for conducting force protection measures. The staff must begin this planning as early as possible to ensure adequate support to force protection of deploying and initial entry forces. Time-phased force and deployment data (TPFDD) monitoring and recommending changes in priority of movement, unit, or capability to enable reconnaissance and surveillance. 2-71. The intelligence officer must continually monitor and update the OPLANs to reflect the evolving situation, especially during crises. National intelligence activities monitor regional threats throughout the world and can answer some intelligence requirements supporting the development of OPLANs. 2-72. Upon alert notification, the intelligence officer updates estimates, databases, IPB products, and other intelligence products needed to support command decisions on force composition, deployment priorities and sequence, and the area of interest. Units reassess their collection requirements immediately after alert notification. The intelligence officer begins verifying planning assumptions within the OPLANs. CI and the intelligence staff provide force protection support and antiterrorism measures. 2-73. Throughout mobilization, unit intelligence activities provide deploying forces with the most recent intelligence on the AO. The intelligence staff also updates databases and situation graphics. The intelligence officer must Fully understand the unit, Army forces, and joint force intelligence organizations. Revise intelligence and intelligence-related communications architecture and integrate any new systems and software into the current architecture.
2-14 FM 2-0 23 March 2010
Support 24-hour operations and provide continuous intelligence (to include weather) support. Plan all required intelligence reach procedures. Determine transportation availability for deployment and availability during deployment. Determine all sustainability requirements. Determine intelligence release requirements and restrictions and releasability to multinational and host-nation sources. Review status-of-forces agreements (SOFAs), rules of engagement (ROE), international laws, and other agreements, emphasizing the effect that they have on intelligence collection operations. (Coordinate with the staff judge advocate on these issues.) Ensure ISR force deployment priorities are reflected in the TPFDD to support ISR activities based upon the mission variables. Ensure intelligence links provide the early entry commander vital access to all-source Army and joint intelligence collection assets, processing systems, and databases. Develop an intelligence survey. Review the supporting unit commanders specified tasks, implied tasks, task organization, scheme of support, and coordination requirements with forward maneuver units. Address issues or shortfalls and direct or coordinate changes. Establish access to national databases for each intelligence discipline, as well as links to joint Service, multinational, and host-nation sources.
DEPLOYMENT
2-74. Deployment is the movement of forces and materiel from their point of origin to the AO. This process has four supporting componentspredeployment activities, fort-to-port, port-to-port, and port-todestination. Success in force projection operations hinges on timely deployment. The size and composition of forces requiring lift are based on mission variables, availability of prepositioned assets, the capabilities of host-nation support, and the forward presence of U.S. forces. Force tailoring is the process used to determine the correct mix and sequence of deploying units. 2-75. During deployment, intelligence organizations at home station or in the sustainment area take advantage of modern satellite communications, broadcast technology, data processing systems, and other automation to provide graphic and textual intelligence updates to the forces en route. En route updates help eliminate information voids and, if appropriate, allow the commander, in response to changes in the operational area, to adjust the plan before arriving at the joint operations area (JOA). 2-76. Intelligence units extend established networks to connect intelligence staffs and collection assets at various stages of the deployment flow. Where necessary, units establish new communications paths to meet unique demands of the mission. If deployed, theater and corps analysis and control elements play a critical role in making communications paths, networks, and intelligence databases available to deploying forces. 2-77. Space-based systems are key to supporting intelligence during the deployment and the subsequent stages of force projection operations by Monitoring terrestrial areas of interest through ISR assets to help reveal the enemys location and disposition, and attempting to identify the enemys intent. Providing communication links between forces en route and in the continental United States (CONUS). Permitting MI collection assets to accurately determine their position through the Global Positioning System (GPS). Providing timely and accurate data on meteorological, oceanographic, and space environmental factors that might affect operations. Providing warning of theater ballistic missile launches. Providing timely and accurate weather information to all commanders through the Integrated Meteorological System.
23 March 2010 FM 2-0 2-15
Chapter 2
2-78. Situation development dominates intelligence operations activities during initial entry operations. The intelligence officer attempts to identify all threats to arriving forces and assists the commander in developing force protection measures. During entry operations, echelons above corps organizations provide intelligence. This support includes providing access to departmental and joint intelligence and deploying scalable intelligence assets. The entire effort focuses downwardly to provide tailored support to deploying and deployed echelons in response to their CCIRs (PIRs and friendly force information requirements [FFIRs]). 2-79. Collection and processing capabilities are enhanced, as collection assets build up in the deployment area, with emphasis on the build-up of the in-theater capability required to conduct sustained ISR activities. As the build-up continues, the intelligence officer strives to reduce total dependence on extended splitbased intelligence from outside the AO. As assigned collection assets arrive into the JOA, the intelligence officer begins to rely on them for tactical intelligence although higher organizations remain a source of intelligence. 2-80. As the Army forces headquarters arrives in the JOA, the joint force J-2 implements and, where necessary, modifies the theater intelligence architecture. Deploying intelligence assets establishes liaison with staffs and units already present in the AO. Liaison personnel and basic communications should be in place before the scheduled arrival of parent commands. ISR units establish intelligence communications networks. 2-81. CONUS and other relatively secure intelligence bases outside the AO continue to support deployed units. Systems capable of rapid receipt and processing of intelligence from national systems and high capacity, long-haul communications systems are critical to the success of split-based support of a force projection operation. These systems provide a continuous flow of intelligence to satisfy many operational needs. 2-82. The intelligence officer, in coordination with the G-3/S-3, participates in planning to create conditions for decisive operations. The intelligence officer also adjusts collection activities as combat power strength builds. During entry operations the intelligence officer Monitors force protection indicators. Monitors the ISR capability required to conduct sustained intelligence operations. Monitors intelligence reporting on threat activity and I&W data. Develops measurable criteria to evaluate the results of the intelligence synchronization plan. Assesses Push versus pull requirements of intelligence reach. Effectiveness of the intelligence communications architecture. Reporting procedures and timelines. Intelligence to OPLANs and OPORDs, branches, and sequels (including planning follow-on forces).
EMPLOYMENT
2-83. Intelligence and ISR support the employment of forces by meeting the commanders requirements. They focus primarily on supporting commander situational understanding, targeting, and force protection. Good planning and preparation can ensure a smooth transition from deployment to employment and from employment through sustainment to redeployment.
SUSTAINMENT
2-84. Sustainment involves providing and maintaining levels of personnel and materiel required to sustain the operation throughout its duration. Sustainment may be split-based between locations within and outside continental United States (OCONUS). For intelligence, sustainment may be focused on force rotation ensuring that intelligence personnel or units entering an established AO have current intelligence and the appropriate level of detailed knowledge of ongoing intelligence operations. This includes
2-16 FM 2-0 23 March 2010
Providing data-file updates through the generate intelligence knowledge continuing activity of the intelligence process before the deployment of replacement personnel or units. Ensuring a coordinated intelligence handoff of ongoing intelligence operations such as military source operations. Ensuring units have the MI assets required to accomplish the mission, such as personnel (including linguists), communications systems, ISR systems, and appropriate maintenance support.
REDEPLOYMENT
2-85. Redeployment is the process by which units and materiel reposture themselves in the same theater; transfer forces and materiel to support another joint force commanders operational requirements; or return personnel and materiel to the home or demobilization station upon completion of the mission. Redeployment operations encompass four phases: Recovery, reconstitution, and predeployment activities. Movement to and activities at the port of embarkation. Movement of the port of debarkation. Movement to home station. 2-86. As combat power and resources decrease in the AO, force protection and I&W become the focus of the commander's intelligence requirements. This drives the selection of those assets that must remain deployed until the end of the operation and those that may redeploy earlier. The S-2 Monitors intelligence reporting on threat activity and I&W data. Continues to conduct intelligence to force protection. Requests ISR support (theater and national systems) and intelligence to support redeployment. 2-87. After redeployment, MI personnel and units recover and return to predeployment activities. ISR units resume contingency-oriented peacetime intelligence operations. USAR ISR units demobilize and return to peacetime activities. Intelligence officers Monitor intelligence reporting on threat activity and I&W data. Update or consolidate databases. Maintain intelligence readiness. Provide their input into the Force Design Update process to refine modified table of organization and equipment (TOE) and evaluate the need for individual mobilization augmentee personnel. Prepare after-action reports and lessons learned. Submit organizational needs requests.
ENTRY OPERATIONS
2-88. Threats often possess the motives and means to interrupt the deployment flow of Army forces. Threats to deploying forces may include advanced conventional weaponry (air defense, mines) and weapons of mass destruction (WMD). Sea and air ports of debarkation should be regarded as enemy HPTs because they are the entry points for forces and equipment. Ports of debarkation are vulnerable because they are fixed targets with significant machinery and equipment that are vulnerable to attack; in addition to military forces and materiel, host-nation support personnel, contractors, and civilians may be working a port of debarkation. 2-89. An enemy attack or even the threat of an enemy attack, on a port of debarkation can have a major impact on force projection momentum. Commanders at all levels require predictive intelligence so that they may focus attention on security actions that reduce vulnerabilities. To avoid, neutralize, or counter threats to entry operations, the commanders rely on the ability of the intelligence officer to support future operations by accurately identifying enemy reactions to U.S. actions, anticipating their response to counteractions, and predicting additional enemy courses of action (COAs).
23 March 2010 FM 2-0 2-17
PART TWO
Chapter 3
23 March 2010
FM 2-0
3-1
Chapter 3
complexity, and asymmetric threat methods. (See FM 2-91.6 for a detailed discussion about Soldier surveillance and reconnaissance.) 3-4. The increased situational awareness that Soldiers develop through personal contact and observation is a critical element of the units ability to more fully understand the battlefield. Soldiers collect combat information that is processed into intelligence by unit intelligence analysts. While medical personnel cannot be assigned ISR tasks due to their Geneva Convention category status, if they do gain information through casual observation of activities in plain view while conducting their humanitarian duties, they will report the information to their supporting intelligence element.
OFFENSIVE OPERATIONS
3-6. Offensive operations are combat operations conducted to defeat and destroy enemy forces and seize terrain, resources, and population centers (FM 3-0). Offensive operations at all levels require effective intelligence to help the commander avoid the enemys main strength and to deceive and surprise the enemy. During offensive operations, intelligence must provide the commander with updated intelligence preparation of the battlefield (IPB) products and an intelligence running estimate, in a timely manner, for the commander to significantly affect the enemy. The intelligence running estimate ensures commanders have the intelligence they need to conduct offensive operations with minimum risk of surprise. 3-7. The intelligence officer develops IPB products to assist the commander in identifying all aspects within the AO or area of interest that can affect mission accomplishment. The entire staff, led by the echelon intelligence staff, uses the IPB process to identify any aspects of the AO or area of interest that will affect enemy, friendly, and third-party operations. The IPB process is collaborative in nature and requires information from all staff elements and some subordinate units, who all use the results and products of the IPB process for planning. 3-8. The intelligence officer supports the commanders use of unit ISR assets to analyze the terrain and confirm or deny the enemys strengths, dispositions, and likely intentions. These assets also gather information concerning the civilian considerations within the AO. The intelligence officer and operations officer, in coordination with the rest of the staff, develop an integrated ISR plan that satisfies the commanders maneuver, targeting, and information requirements. 3-9. In offensive operations, a commanders information requirements often include Locations, composition, equipment, strengths, and weaknesses of the defending enemy force including high-payoff targets (HPTs) and enemy ISR capabilities. Locations of possible enemy assembly areas. Locations of enemy indirect fire weapon systems and units. Locations of gaps and assailable flanks. Locations of areas for friendly and enemy air assaults. Locations of enemy air defense gun and missile units. Locations of enemy electronic warfare (EW) units. Effects of terrain and weather and civil considerations on current and projected operations. Numbers, routes, and direction of movement of displaced civilians.
3-2 FM 2-0 23 March 2010
Withdrawal routes of enemy forces. Anticipated timetable schedules for the enemys most likely course of action (COA) and other probable COAs. Locations of enemy command and control and ISR systems and the frequencies used by the information systems linking these systems.
DEFENSIVE OPERATIONS
3-10. Defensive operations are combat operations conducted to defeat an enemy attack, gain time, economize forces, and develop conditions favorable for offensive or stability operations (FM 3-0). The immediate purpose of defensive operations is to defeat an enemy attack. Commanders defend to buy time, hold key terrain, hold the enemy in one place while attacking in another, or destroy enemy combat power while reinforcing friendly forces. 3-11. Intelligence should determine the enemy's strength, COAs, and location of enemy follow-on forces. Defending commanders can then decide where to arrange their forces in an economy-of-force role to defend and shape the battlefield. Intelligence support affords commanders the time necessary to commit the striking force precisely. 3-12. Intelligence supports the commanders defensive operations with IPB products to identify probable enemy objectives and various approaches; patterns of enemy operations; the enemys vulnerability to counterattack, interdiction, EW, air attacks, and canalization by obstacles; and the enemys capability to conduct air attacks against friendly forces, insert forces behind friendly units, and employ chemical, biological, radiological, nuclear, and high-yield explosives (CBRNE) weapons. The intelligence officer must also evaluate how soon follow-on forces can be committed against an enemy attacking in echelons. 3-13. The intelligence officer supports the commander with synchronization of the ISR plan to answer the commanders critical information requirements (CCIRs). ISR activities must be continuously assessed and updated during operations. The ISR plan must provide early identification of as many of the commanders requirements as possible. It is critical that the intelligence officer support the commanders ability to see the enemy during the conduct of all defensive operations. In defensive operations, these requirements often include Locations, composition, equipment, strengths, and weaknesses of the advancing enemy force. Enemy reconnaissance objectives or goals. Locations of possible enemy assembly areas. Locations of enemy indirect fire weapon systems and units. Locations of gaps, assailable flanks, and other enemy weaknesses. Locations of areas for enemy helicopter and parachute assaults. Locations of artillery and air defense gun and missile units. Locations of enemy EW units. Locations, numbers, and intentions of civilian populations. Effects of terrain and weather and civil considerations on current and projected operations. Likely withdrawal routes for enemy forces. Numbers, routes, and direction of movement of displaced civilians. Anticipated timetable of the enemys most likely COA. Locations of enemy command posts, fire direction control centers, EW sites, and target acquisition sensor and target fusion sites and the frequencies they are using.
STABILITY OPERATIONS
3-14. Stability operations encompass various military missions, tasks, and activities conducted outside the United States in coordination with other instruments of national power to maintain or reestablish a safe and
23 March 2010
FM 2-0
3-3
Chapter 3
secure environment, provide essential governmental services, emergency infrastructure reconstruction, and humanitarian relief (JP 3-0). 3-15. Missions where stability operations predominate are often much more complex than those where offensive and defensive operations are dominant; therefore, obtaining the intelligence required is often more complex. As a result, commanders must be more involved in and knowledgeable of ISR during stability operations. Elements of combat power are discussed below. 3-16. In stability operations, commanders often require more detailed intelligence and IPB products to determine how best to conduct operations and influence the local populace to enhance regional stability. The identification and analysis of the threat, terrain and weather, and civil considerations are critical in determining the most effective missions, tasks, and locations in which stability operations are conducted. A lack of knowledge concerning insurgents, local politics, customs, and culture as well as how to differentiate between local combatants, often leads to U.S. actions that can result in unintended and disadvantageous consequencessuch as attacking unsuitable targets or offending or causing mistrust among the local population. This lack of knowledge could potentially threaten mission accomplishment.
Augment Federal and State agencies Mass immigration. Continuity of critical Government services.
Planned augmentation to civil law enforcement including Counterdrug support. Border security. Training. Facilities. Equipment.
chemical, biological, radiological, nuclear, and high-yield explosives combatant commander headquarters operation plan
3-4
FM 2-0
23 March 2010
3-18. A distinguishing aspect of civil support operations is the status of the Army National Guard (ARNG)normally the first military force responding to any incident or emergency within the United States. Within the United States, ARNG supports their respective state or territory under a state chain of command when in State Active Duty status or Title 32, United States Code (32 USC) status. In either status, ARNG forces operating within their respective states have authorities that U.S. law severely restricts for Active Army and Army Reserve forces. For example, the Governor may employ National Guardsmen in a law enforcement capacity. However, if the President federalizes ARNG forces from any state or territory, those National Guardsmen fall under the Department of Defense (DOD) and are subject to the same Federal laws and restrictions applied to the Active Army and mobilized Army Reserve. 3-19. Intelligence support in civil support operations is as important as in other operations. All commanders must ensure intelligence support remains within the guidelines of U.S. law and applicable policies. In particular, operations must adhere to regulations and directives that implement restrictions within the intelligence oversight requirements. Intelligence support of Title 10, United States Code (10 USC) forces focuses on specific missions authorized by the Secretary of Defense. State National Guard commanders ensure that their intelligence capabilities comply with applicable policies, regulations, U.S. law, and the missions authorized by the Governor of that state. Commanders and intelligence professionals must consult with staff judge advocates concerning any unclear areas of intelligence capability. 3-20. Army forces involved in civil support conduct incident awareness and assessment (IAA). IAA is a distilled version of ISR operations used by forces in combat. IAA is based on the same concepts as ISR operations. However, IAA addresses only those information requirements permitted by law within a domestic environment. Due to policy issues and a history of intelligence abuses in the 1960s and 1970s, domestic ISR applications do not occur without express permission of the Secretary of Defense (SECDEF). Further, any use of intelligence capabilities for purposes other than traditional use must be expressly approved by the SECDEF. 3-21. Intelligence analysis can also assist civil authorities in identifying areas where the military can provide support to restoring essential services. Reconnaissance and surveillance assets can assist in search and rescue, damage assessment, potential hazards, and locating displaced persons. Reconnaissance and surveillance assets can also help identify and locate CBRNE materiel and weapons. However, employment of Active Army and Army Reserve reconnaissance and surveillance assets requires authorization from the Secretary of Defense or a designated representative. (For more information on intelligence support in domestic operations, see DODD 5200.27, AR 381-10, JP 3-28.)
23 March 2010
FM 2-0
3-5
Chapter 3
ARMY CAPABILITIES
3-24. Military intelligence (MI) has responsibilities and functions that support full spectrum operations at all echelons. The distribution of specific intelligence assets enhances the capability of the combined arms team. The planning and analysis of force tailoring identifies required intelligence resources and capabilities and blends the mission requirements necessary for mission success. The task organization that follows force tailoring establishes an ordered command and support structure with technical channels for the intelligence assets to conduct their support missions.
COMBINED ARMS
3-25. Combined arms is the synchronized and simultaneous application of the elements of combat power to achieve an effect greater than if each element of combat power was used separately or sequentially (FM 3-0). As an integral part of combined arms, staffs must identify all intelligence capabilities required to conduct operations in an AO. Specific intelligence capabilities that are not organic or need to be bolstered are requested for the force pool for force tailoring.
FORCE TAILORING
3-26. Force tailoring is the process of determining the right mix of forces and the sequence of their deployment in support of a joint force commander (FM 3-0). Force tailoring involves selecting the right force structure for a joint operation from available units within a combatant command or from the Army force pool. Based on mission analysis, the staff at each echelon identifies intelligence capabilities and resources to support the commanders guidance, intent, and mission objectives.
TASK-ORGANIZING
3-27. Task-organizing is the act of designing an operating force, support staff, or logistic package of specific size and composition to meet a unique task or mission. Characteristics to examine when taskorganizing the force include but are not limited to training, experience, equipage, sustainability, operating environment, enemy threat, and mobility. For Army forces, it includes allocating available assets to subordinate commanders and establishing their command and support relationships (FM 3-0). 3-28. Once intelligence assets have been allocated, each echelon task-organizes the assets to provide maximum mission support. Intelligence asset task organization occurs within a tailored force package as commanders organize units for specific missions. As commanders reorganize units for subsequent missions, intelligence assets may be redistributed to support new or changing requirements.
3-6
FM 2-0
23 March 2010
3-31. Commanders direct operations but often rely on technical expertise to plan, prepare, execute, and assess portions of the units collection effort. Technical channels also involve translating ISR tasks into the specific parameters used to focus highly technical or legally sensitive aspects of the ISR effort. Technical channels include but are not limited to Defining, managing, or prescribing techniques for the employment of specific ISR assets. Identifying critical technical collection criteria such as technical indicators. Recommending collection techniques, procedures, or assets. Conducting operational reviews. Conducting operational coordination. Conducting specialized training for specific MI personnel or units. 3-32. An example of technical channels is the Prophet-control team converting PIRs and ISR tasks developed during the military decisionmaking process (MDMP) and assigning times and anticipated enemy frequencies for subordinate Prophet teams to collect.
23 March 2010
FM 2-0
3-7
Chapter 4
Figure 4-1. The operations process 4-2. The operations process and the intelligence process (see chapter 1, paragraph 1-93, and the discussion below) are mutually dependent. The commander provides the guidance and focus through commanders critical information requirements (CCIRs) (priority intelligence requirements [PIRs] and friendly force information requirements [FFIRs]) that drive the operations and intelligence processes. The intelligence process operates during all parts of the operations process to provide the continuous intelligence essential to the operations process. Intelligence about the area of operations (AO) and area of interest supports Army forces in combining offensive, defensive, and stability or civil support operations simultaneously, as part of an interdependent joint force to seize, retain, and exploit the initiative, accepting prudent risk to create opportunities to achieve decisive results. Intelligence preparation of the battlefield (IPB) is one of the integrating processes. (See FM 3-0 for further discussion on the integrating processes.)
23 March 2010
FM 2-0
4-1
Chapter 4
COMMANDERS INPUT
4-4. Commanders are responsible for driving the intelligence process. They do this by providing commanders input. While it is not a part of the intelligence process itself, commanders input is the primary mechanism commanders use to focus the intelligence warfighting function. Commanders provide input at their discretion. Information gained through the assess continuing activity triggers the intelligence staff to request commanders input. 4-5. The commanders input directly influences a units intelligence, surveillance, and reconnaissance (ISR) effort. Each commander determines which intelligence products to develop as well as the products formats. Commanders may provide input at any point during the intelligence process. The staff then adjusts the ISR effort accordingly.
4-2
FM 2-0
23 March 2010
Chapter 4
4-14. Generate intelligence knowledge is also the basis for developing a units initial intelligence survey. By performing the generate intelligence knowledge activity, the intelligence staff continues to gather, categorize, and analyze information on relevant aspects of the projected AO, continually adding new information and updating and refining their understanding of the projected AO. 4-15. During a deployment, a units information databases become a source of information for follow-on units as they generate intelligence knowledge during Army force generation (ARFORGEN). During and after deployment, the generate intelligence knowledge continuing activity also supports tactical overwatch and the collection of lessons learned.
4-4
FM 2-0
23 March 2010
4-21. The intelligence survey also assists in determining what communication capabilities will be required for projected intelligence operations and addresses any apparent gaps in intelligence standing operating procedures (SOPs). Additionally, the intelligence survey is the basis for determining what additional or specialized intelligence assets the unit may require.
ANALYZE
4-22. Analysis is the process by which collected information is evaluated and integrated with existing information to produce intelligence that describes the currentand attempts to predict the future impact of the threat, terrain and weather, and civil considerations on operations. The intelligence staff analyzes intelligence and information about the threats capabilities, friendly vulnerabilities, and all other relevant aspects of the AO and area of interest to determine how they will impact operations. The intelligence staff must also analyze and identify issues and problems that occur during the units intelligence process. One example of this could be focusing on the wrong priority or assets that are unable to collect required information. This analysis enables the commander and staff to determine the appropriate action or reaction and to focus or redirect assets and resources to fill information gaps, mitigate collection limitations, or alleviate pitfalls. (See TC 2-33.4 for doctrine on intelligence analysis.) 4-23. Analysis occurs at various stages throughout the intelligence process. Leaders at all levels conduct analysis to assist in making many types of decisions. An example is a HUMINT collectors analyzing an intelligence requirement to determine the best possible collection strategy to use against a specific source. 4-24. Analysis in requirements management is critical to ensuring the information requirements receive the appropriate priority for collection. The intelligence staff analyzes each requirement To determine its feasibility, whether or not it supports the commanders intent. To determine the best method of satisfying the information requirements. To determine if the collected information satisfies requirements. 4-25. During the produce step, the intelligence staff analyzes information from multiple sources to develop all-source intelligence products. The intelligence staff analyzes information and intelligence to ensure the focus, prioritization, and synchronization of the units intelligence production effort is in accordance with the PIRs. 4-26. In situation development, the intelligence staff analyzes information to determine its significance relative to predicted threat courses of action (COAs) and the CCIRs (PIRs and FFIRs). Through predictive analysis, the staff attempts to identify enemy activity or trends that present opportunities or risks to the friendly force. They often use the indicators developed for each threat COA and CCIRs (PIRs and FFIRs) during the MDMP as the basis for their analysis and conclusions.
ASSESS
4-27. Assessment is the continuous monitoring and evaluation of the current situation, particularly the enemy, and progress of an operation (FM 3-0). Assessment plays an integral role in all aspects of the intelligence process. Assessing the situation and available information begins upon receipt of the mission and continues throughout the intelligence process. The continual assessment of intelligence operations and ISR assets, available information and intelligence, and the various aspects of the AO, are critical to Ensure the CCIRs (PIRs and FFIRs) are answered. Ensure intelligence requirements are met. Redirect collection assets to support changing requirements. Ensure operations run effectively and efficiently. Ensure proper use of information and intelligence. Identify enemy efforts at deception and denial.
23 March 2010
FM 2-0
4-5
Chapter 4
4-28. The assess step plays a critical role in evaluating the information collected during the intelligence process. The continual assessment of reconnaissance and surveillance and of available information and intelligence (expressed in terms of the mission variables) are critical to ensure that the intelligence staff Answers the CCIRs. Provides the operations staff with input to redirect ISR assets in support of changing requirements. Makes effective use of information and intelligence. 4-29. During planning, the intelligence staff conducts a quick initial assessment of the units intelligence posture and holdings, status of intelligence estimates, and any other available intelligence products. From this assessment, the commander issues initial guidance and a warning order (WARNO). 4-30. During execution, the intelligence staff continues assessing the effectiveness of the ISR effort while simultaneously assessing the results and products derived from the ISR synchronization effort. The critical aspects of assessment include determining whether The CCIRs have been answered. The CCIRs are still likely to be answered with the current reconnaissance and surveillance. ISR synchronization and integration account for and reflect changes to the CCIRs. ISR activities are adjusted for changes to the operational environment. 4-31. This type of assessment requires sound judgment and a thorough knowledge of friendly military operations, characteristics of the AO and area of interest, and the threat situation, doctrine, patterns, and projected COAs.
DISSEMINATE
4-32. Disseminate, an information management activity, is to communicate relevant information of any kind from one person or place to another in a usable form by any means to improve understanding or to initiate or govern action (FM 6-0). For the intelligence warfighting function, the purpose of dissemination is to ensure that users receive the information and intelligence that they require to support operations. Access to unit information and intelligence may be available across many echelons. Each echelon with access to information may perform analysis on that information, based on their resources and their requirements, and then ensure that their analysis is properly disseminated. Disseminate includes direct dissemination; granting access to databases, information, or intelligence; and sharing. It also encompasses posting information to the appropriate Web sites, intelligence reach, and updating the common operational picture (COP). Determining the product format and selecting the means to deliver it are key aspects of dissemination. The information and intelligence must be timely, relevant, accurate, predictive, and tailored intelligence to the commander and other users. 4-33. Successful operations at all levels require increased demands on the intelligence warfighting function. Timely and accurate dissemination of intelligence is key to the success of operations. Commanders must receive combat information and intelligence products in time and in an appropriate format to support decisionmaking. To achieve this, the commander and staff must establish and support a seamless intelligence architectureincluding an effective dissemination planacross all echelons to ensure information and intelligence (product and data access) flow efficiently to all those who need them. Intelligence and communications systems continue to evolve in their sophistication, application of technology, and accessibility to the commander. Their increasing capabilities also create an unprecedented volume of information available to commanders at all echelons. The commander and staff must have a basic understanding of these systems and their contribution to the intelligence warfighting function. The Distributed Common Ground System-Army (DCGS-A) enterprise is the primary method for providing intelligence products to users.
4-6
FM 2-0
23 March 2010
Direct Dissemination
4-34. Information presentation may be in a verbal, written, interactive, or graphic format. The type of information, time allocated, and commanders preferences all influence the information format. DCGS-A provides a common backbone for the dissemination of intelligence. Answers to CCIRs for the commander, subordinate commanders, and staff require direct dissemination. 4-35. A dissemination plan can be a separate product or integrated into existing products, such as the ISR synchronization tools, the decision support template, or decision support matrix.
Granting Access
4-36. Properly managing access to databases, information, or intelligence ensures that personnel, units, or organizations that need all or part of the information can obtain the information they need. Information resides in established classified and unclassified databases, programs, networks, systems, and other Webbased collaborative environments maintained by national agency, multinational, joint, and Army organizations or echelons. Granting access is governed by Applicable national agencies. Multinational, joint, and Army regulations, policies, and procedures for personnel accesses and clearances. Individual system accreditation. Specialized training for clearances and systems or database usage. Special security procedures and enforcement. 4-37. The intelligence staff must identify users who will require access to protected unit intelligence Web sites, Web postings, data files, and databases. The staff must ensure users are granted the appropriate accesses. The intelligence staff also processes requests from individuals, organizations, or agencies outside the unit who may require access to unit intelligence Web sites, Web postings, data files, or databases, and grant the appropriate level of access to ensure optimal information sharing and continuity of operations. 4-38. The intelligence staff must ensure that all accesses granted conform to the appropriate U.S. law, DOD regulations, classification guidelines, and security protocols. (See AR 380-28 [C], DHE-M 3301.001 [S], DIAM 58-11 [S//NF].)
Sharing
4-39. Sharing is primarily the result of establishing a Web-based collaborative environment. Collaboration includes the sharing of knowledge, expertise, and information, normally online. Collaboration may take many forms. Collaborative tools include computer-based tools that help individuals work together and share information. They allow for virtual online meetings and data sharing. Sharing allows analysts, other intelligence personnel, and other subject matter experts to freely exchange information and intelligence to assist in answering their commanders requirements. The intelligence staff must identify the most effective methods to share intelligence with all required users. Sharing applies specifically to multinational partners, who are unable to access U.S. information systems or data files. Some users may require hardcopy printouts of new or updated intelligence; some may simply need to access the unit intelligence Web page; and some may simply require access to specific unit databases.
Posting
4-40. Information may be posted to military Web sites for the widest possible dissemination. This makes the information available to personnel and units interested in the information or intelligence, which is not part of the normal dissemination group for a unit or organization. When posting information to the Web or updating information on their Web site, it is critical that units or organizations inform higher, subordinate, and lateral units or organizations that may require this information. Units rarely have enough personnel to dedicate a Soldier to continuously search Web sites for new or updated information that may be of use to
23 March 2010
FM 2-0
4-7
Chapter 4
that unit or organization. The intelligence staff must regularly review posted information to ensure that it remains valid, relevant, and has not become outdated.
Intelligence Reach
4-41. Intelligence reach is an important part of the intelligence effort. It allows intelligence analysts to retrieve existing information, intelligence products, and data that can support answering the CCIRs from outside the unit, in a timely manner, without waiting for an answer to a request for information (RFI) or an ISR task. The information, intelligence products, or data retrieved can then be evaluated for use in the units intelligence products or analysis.
Dissemination Procedures
4-45. Intelligence officers and personnel at all levels assess the dissemination of intelligence and intelligence products. Disseminating intelligence simultaneously to multiple recipients is one of the most effective, efficient, and timely methods, and can be accomplished through various meansfor example, push or broadcast. However, within the current tactical intelligence architecture, reports and other intelligence products move along specific channels. The staff helps streamline information distribution within these channels by ensuring dissemination of the right information in a timely manner to the right person or element. There are three channels through which commanders and their staffs communicate:
4-8
FM 2-0
23 March 2010
Command channel. Staff channel. Technical channels. Command Channel 4-46. The command channel is the direct chain-of-command link used by commanders or authorized staff officers for command-related activities. Command channels include command radio nets, video teleconferences, and the Maneuver Control System. Staff Channel 4-47. The staff channel is the staff-to-staff link within and between headquarters. The staff uses the staff channel for control-related activities. Through the staff channel, the staff coordinates and transmits intelligence, controlling instructions, planning information, and provides early warning information and other information to support command and control. Examples of staff channels include the operations and intelligence radio net, telephone, the staff huddle, video teleconference, and the warfighting functionspecific components of DCGS-A, which provide information and intelligence to the rest of the intelligence architecture. Technical Channels 4-48. Staffs typically use technical channels to control specific activities. These activities include fire direction and the technical support and sensitive compartmented information (SCI) reporting channels for intelligence dissemination and reconnaissance and surveillance. The SIGINT tasking and reporting radio net, intelligence broadcast communications, and the wide area networks supporting single intelligence discipline collection, processing, and production are examples of technical channels.
PLAN
4-51. The plan step consists of the activities that identify pertinent information requirements and develop the means for satisfying those requirements, meeting the commanders desired end state. The CCIRs (PIRs and FFIRs) drive the ISR effort. The intelligence officer synchronizes the ISR plan and supports the operations officer in ISR integration. Planning activities include but are not limited to
23 March 2010 FM 2-0 4-9
Chapter 4
Conducting IPB and preparing IPB products and overlays. Developing the initial intelligence running estimates or briefings (usually as part of the mission analysis briefing). These should include initial PIRs as well as threat strengths and vulnerabilities that friendly forces should avoid or exploit. Synchronizing the ISR effort: Identifying pertinent information and intelligence requirements in coordination with the operations officer. Managing requirements. Submitting RFIs and using intelligence reach to fill information gaps. Evaluating reported information. Establishing the intelligence communications and dissemination architecture. Developing, managing, and revising the ISR synchronization tools and the ISR plan as mission requirements change. Supporting the preparation of Annex B (Intelligence), and assisting the S-3 in completing Annex L (Intelligence, Surveillance, and Reconnaissance) of the OPLAN or operation order (OPORD). Assessing the situation. Assisting the operations officer with updating the ISR plan. 4-52. Intelligence officers must ensure that they are working closely with operations officers on the ISR plan and that both are working from the same intelligence baseline. The commanders intent, planning guidance, and CCIRs (PIRs and FFIRs) drive the planning of intelligence operations. Planning, managing, and coordinating these operations are continuous activities necessary to obtain information and produce intelligence essential to decisionmaking.
Coordinate
4-53. Staff and leaders coordinate with various organizations to ensure the necessary resources, such as linguist support (see appendix B), information, intelligence, training, and procedures are in place to facilitate effective intelligence operations. Coordination for and Management of Movement of ISR Assets 4-54. All ISR assets at one time or another will coordinate for movement through or near another units AO. To avoid fratricide, ISR elements must coordinate with units, operations officers, intelligence officers, and each other. ISR elements must also coordinate with appropriate staff elements to establish no-fire areas and/or other fire support coordination measures around ISR assets, airspace control measures, and appropriate weapons control status (in reference to aerial ISR assets). Coordination for and Management of Information andIintelligence 4-55. The intelligence staff must prepare and practice coordination and management with personnel from all military intelligence (MI) units, non-MI units, other Service components, and multinational organizations that may contribute to or facilitate the ISR effort. This coordination enables the intelligence officer to share and update databases, information, and intelligence and ensures connectivity with those organizations. All units are sources of relevant information regarding the enemy and other aspects of the AO. Liaison 4-56. In order to coordinate, synchronize, and integrate operations; exchange information and intelligence; move through certain areas; and ensure protection, it may be necessary to establish a liaison officer with many different elements, organizations, and the local population and institutions of the country where friendly forces are conducting operations. This includes the local police, town officials, foreign military forces, and political and other key figures within the AO. Operations may also necessitate coordination,
4-10 FM 2-0 23 March 2010
synchronization, and integration with other U.S. and multinational forcessuch as the International Security Assistance Force, the International Police Task Force, Organization for Security and Cooperation in Europe, and Defense HUMINT. (See FM 6-0 for more information on liaison duties.) Movement 4-57. When conducting movement through other units AOs, MI units must first conduct detailed coordination with the unit that has been assigned the AO through which the MI unit is moving. Detailed coordination will identify key operational limitations and provide the moving unit with coordination measures for the AOsuch as no fire areas, target reference points, call signs and passwords, and casualty evacuation procedures. Proper management ensures ease of movement and safe passage of friendly forces through an area. Properly coordinated movement minimizes the risk of fratricide.
Chapter 4
synchronization involves the entire staff and all of the warfighting functions. All staff sections within a command post have the responsibility to satisfy information requirements. Satisfying information requirements through staff element coordination facilitates ISR planning by eliminating the necessity to task an asset to collect information that another unit or asset already observed in the course of operations. The commander may designate an ISR working group; however, the primary staffs responsibilities cannot be delegated. 4-61. When planning, preparing, executing, and assessing reconnaissance and surveillance, the intelligence staff must strive to achieve maximum effectiveness and efficiency. The intelligence staff considers six essential criteria to conduct ISR synchronization: Anticipate. Coordinate. Prioritize. Balance. Reach. Control. Anticipate 4-62. The intelligence officer must recognize when and where to shift collection or identify new intelligence requirements. The intent of this criteria is to identify a new or adjust an existing requirement and present it to the commander before the commander or other staff members identify the need. By participating in the operations processes, intelligence officers can best anticipate requirements. Coordinate 4-63. The intelligence staff must coordinate and collaborate with all staff sections and higher headquarters and subordinate and adjacent units in order to continuously synchronize the ISR plan. The intelligence staff must be engaged in the units planning and orders-production activities to ensure early identification of intelligence requirements. The intelligence staff must also be integrated into the combat information reporting and battle tracking of current operations to anticipate the need for dynamic or ad hoc ISR taskings. Early and continuous consideration of ISR planning factors Enhances the units ability to direct ISR assets in a timely manner to support developing situations. Ensures thorough planning. Increases flexibility in selecting and retasking assets. Prioritize 4-64. The ISR process begins with the CCIR. Then intelligence officers prioritize each validated intelligence requirementbased on its importance in supporting the commanders intent and decisions as well as the current situationso that low-density/high-demand ISR assets and resources are directed against the most critical requirements. Balance 4-65. Balance is simply achieving maximum efficiency using an appropriate mix of disciplines, ISR assets, and resources to satisfy as many competing intelligence requirements as possible. It also means that the intelligence staff should resist favoring or becoming too reliant on one particular unit, discipline, or system. Balance involves using a combination of redundancy, mix, and cueing of a variety of ISR capabilities to complement each other:
4-12
FM 2-0
23 March 2010
Redundancy is achieved using several same-type ISR assets to cover the same named area of interest (NAI). Mix means planning for complementary coverage by combining assets from multiple units and intelligence disciplines designed to increase the probability of collection success and reduce the chances of successful threat deception. Cueing involves the use of one or more sensors to provide data resulting in the use of another system to conduct collection. Reach 4-66. When recommending the ISR task assignments, the intelligence officer must first determine whether higher or other organizations ISR tasks will reliably answer the units requirements. If higher or other organizations ISR tasks can reliably answer the units requirements, the intelligence officer can use intelligence reach and RFIs to answer initial information requirements without having to use the echelons ISR assets. Intelligence, which is confirmed by more than one intelligence discipline, is generally preferred over single-source reporting. Based on a number of potential intelligence vulnerabilities, a unit should not depend solely on intelligence reach to satisfy a PIR. Control 4-67. If higher or other organizations ISR tasks cannot reliably answer the CCIRs, the intelligence officer recommends tasking organic, assigned, attached, and operational control (OPCON) ISR assets to ensure timely and effective collection as well as overall synchronization. These assets are more responsive to the commanders needs and can be balanced with other resources. ISR assets belonging to other units, agencies, or organizations may have limited availability and are likely to receive differing priorities from their respective commanders. Information gathered by other ISR resources is harder to verify and correlate with information collected by organic assets.
Additional Considerations
4-68. The staff must carefully focus ISR plans on answering the CCIRs (PIRs and FFIRs) and enable the quick retasking of units and assets as the situation changes. ISR synchronization includes continually identifying new and partial intelligence gaps. This ensures that the developing threat situation, not only the OPLAN, drives reconnaissance and surveillance. Specifically, intelligence officers Evaluate ISR assets for suitability (availability, capability, vulnerability, and performance history) to execute ISR tasks and make appropriate recommendations on asset tasking to the operations officer. Assess ISR collection against CCIRs (PIRs and FFIRs) to determine the effectiveness of the ISR plan. They maintain situational awareness to identify gaps in coverage and to identify the need to cue or recommend redirecting ISR assets to the operations officer. Update the ISR synchronization tools as requirements are satisfied, modified, or created. They remove satisfied requirements and recommend new requirements as necessary. In coordination with operations staff, monitor satisfactory completion of ISR tasks from higher headquarters. Operations officers integrate the updated synchronization plan into orders tasking ISR assets. 4-69. ISR synchronization requires constant coordination between the current operations, intelligence, and plans cells within an organization. The entire staff participates in ISR planning. The intelligence officer is the lead for ISR synchronization. The operations officer creates the ISR plan. 4-70. ISR integration is vital in controlling limited ISR assets. Thoroughly integrated ISR activities add many collection resources, multiplying the potential for all-source collection of information. All ongoing ISR activities contribute to updating the ISR plan. 4-71. FMI 2-01 describes the ISR synchronization process in detail.
23 March 2010
FM 2-0
4-13
Chapter 4
Figure 4-3. Requirements development and integration into the ISR process 4-75. The three types of validated information requirements are ordered in the following hierarchical structure for purposes of assigning ISR tasks: PIR. Intelligence requirement. Information requirement. Priority Intelligence Requirement 4-76. A PIR is an intelligence requirement, stated by the commander as a priority for intelligence support, which the commander needs to support decisionmaking and to understand the area of interest or the threat. The intelligence officer manages PIRs for the commander, but the PIRs belong solely to the commander. All staff sections may recommend requirements that may become PIRs. PIRs are selected as part of the process of identifying CCIRs during mission analysis; they, along with FFIRs, are updated as part of updating the CCIRs throughout the operation. PIRs have first priority in collection assets tasked to their collection.
4-14
FM 2-0
23 March 2010
Intelligence requirement 4-77. Joint doctrine defines an intelligence requirement as 1. Any subject, general or specific, upon which there is a need for the collection of information, or the production of intelligence. 2. A requirement for intelligence to fill a gap in the commands knowledge or understanding of the operational environment or threat forces (JP 2-0). For purposes of the Army intelligence warfighting function and ISR synchronization, an intelligence requirement is a type of information requirement developed by subordinate commanders and the staff (including subordinate staffs) that requires dedicated ISR collection for the elements of threat, terrain and weather, and civil considerations. Intelligence requirements must be answered to facilitate operations. They require ISR collection assets to be assigned for their collection, second in priority to PIRs. Information requirements 4-78. Information requirements are all information elements the commander and staff require to successfully conduct operations; that is, all elements necessary to address the factors of METT-TC (FM 6-0). For the purposes of the intelligence warfighting function and ISR synchronization, validated information requirements are requirements that fill a gap in knowledge and understanding of the area of interest (terrain and weather, and civil considerations) or the threat. After validated requirements are identified and the ISR plan is completed, there may be additional information requirements that support the development of situational understanding, answer gaps in the COP, and provide additional details required for analysis. These are information requirements that do not require collection by ISR assets to be answered. The staff answers these requirements through intelligence reach, RFIs, or dissemination.
PREPARE
4-79. Preparation is the key to successful intelligence analysis and collection. Intelligence analysts must use the previous step to prepare products for the commander and staff for orders production and the conduct of operations. Failure to properly prepare for intelligence collection and the development of intelligence products can cause an operation to be focused on the wrong location or objective or on a misrepresented enemy force. Thorough preparation by the staff allows the commander to focus the units combat power to achieve mission success. The prepare step includes those staff and leader activities that take place upon receiving the OPORD, OPLAN, WARNO, or commanders intent to improve the units ability to execute tasks or missions and survive on the battlefield. For intelligence units, these activities include Conducting necessary coordination link-up movements, staging, terrain deconfliction, and terrain reconnaissance in accordance with the OPORD, mission variables (METT-TC), and unit SOPs. Verifying fire support, casualty evacuation, fratricide avoidance, airspace coordination, and coordination measures and procedures. Establishing and testing the intelligence architecture. This activity includes complex and technical issues like hardware, software, communications, communications security materials, network classification, technicians, database access, liaisons, training, funding, and TTP. Establishing intelligence team cohesiveness. This activity includes Knowing different units and organizations capabilities. Training the necessary collective skills. Establishing effective relationships with different units and organizations. Developing mutual battle rhythms and TTP. Leveraging the right architectures and collaboration tools. Coordinating effective analytic collaboration. This activity is necessary to maximize the complementary analytic capabilities of different units and organizations that produce intelligence within the same joint operations area (JOA). Coordinating this collaboration is an effortintensive activity that requires careful mutual planning, division of labor, defined responsibilities, and procedures for adapting to changing circumstances as they develop.
23 March 2010 FM 2-0 4-15
Chapter 4
Establishing reporting procedures. Updating IPB, the intelligence estimate, the intelligence running estimate, and ISR synchronization. Producing intelligence estimates. Ensuring staff and personnel are trained. Otherwise, the leader must evaluate the risk they bring to the operation. Planning refinement, brief-backs, SOP reviews, and rehearsals, and coordinating with various elements and organizations. Establishing other troop-leading procedures or coordination, as necessary, in accordance with mission variables (METT-TC).
Inspections
4-81. Once all required equipment and support materials are acquired, staff and leaders must conduct inspections to ensure that the unit and Soldiers are prepared to conduct their mission. It is crucial that staff and leaders check to verify that procedures, personnel, equipment, and services are in place and ready for mission execution. Leaders can only expect what they inspect.
Rehearsals
4-82. Rehearsals help units prepare for operations by either verifying that provisions and procedures are in place and functioning or identifying inadequacies, which staff and leaders must remedy. They allow participants in an operation to become familiar with and to translate the plan into specific actions that orient them to their environment and other units when executing the mission. Rehearsals also imprint a mental picture of the sequence of key actions within the operation and provide a forum for subordinate and supporting leaders and units to coordinate. When possible, rehearse on the actual terrain.
Communications
4-83. Staff and leaders must work closely with the G-6/S-6 to coordinate for the required communication links. The unit may require classified and unclassified network connections for their equipment. If elements of the unit will be working outside the range of the units communications systems, then it is necessary to coordinate for global or extended range communications. Leaders must obtain the required type and
4-16 FM 2-0 23 March 2010
amount of communications equipment and related components as well as the latest fills and frequencies. They must possess and be familiar with all the instructions, passwords, policies, regulations, and directives conducive to OPSEC. They must also ensure Soldiers are trained in the use and procedures involved in operating communications equipment. The intelligence officer must verify the frequencies, alternate frequencies, and reactions during jamming, as well as the latest time information is of value for specific information to be reported.
Situation Updates
4-84. Staff preparation includes assembling and continuously updating estimates. For example, continuous IPB provides accurate situational updates for commanders. The G-2/S-2 uses the DCGS-A enterprise and automated tools to continuously integrate information and intelligence products, from subordinate intelligence officers and supporting ISR organizations, to update the threat situation, terrain and weather, and civil considerations.
Intelligence Handoff
4-85. Intelligence handoff may occur in three primary situationswhen handing over a mission (during relief in place or transition of authority), when handing off targets, or when handing off technical channels for intelligence assets. A well-prepared intelligence handoff ensures a smooth and seamless transition between units. It is important that the receiving unit becomes familiar with the operation, target, or technical channels requirements as soon as possible to avoid compromising the intelligence production and flow of the mission. The following are points to consider during an intelligence handoff: Briefings and reports (learn what briefings are required and when, as well as report formats and requirements, to include technical requirements). Past, present, and planned activities within the area of influence. Established SOPs (know procedures for reporting; intelligence contingency funds and incentive use if applicable; emplacement and use of ISR equipment). Key personalities (introductions are required; establish rapport and a good working relationship with all key personalities): Key personnel on the base or camp (their responsibilities; how to contact them). Key personnel in other U.S. and multinational service components (coordinate for exchange of information and intelligence). Key personalities from surrounding towns (local figures). Key national-level political and military figures. Supporting units (know where to go for sustainment, information, or assistance and for points of contact (POCs) within those organizations). Current attitudes (understand current attitudes and perspectives of the local populace). Equipment operation and idiosyncrasies (equipment may run on different quick reaction capabilities and off-the shelf applications; personnel may need to train on specific equipment and procedures). Area familiarization (identify NAIs, key terrain, minefields, and boundaries; know camp locations, routes and route names, checkpoints, and towns). Handover of databases (analytical, intelligence discipline databases, source registry, technical channels, and POCs). Close coordination for cross-boundary target handoff (complete target information when not handing off a formal target package on a target that conducts cross-boundary operations). The specific aspects of technical channels.
Rules of Engagement
4-86. Although ROE training was presented during the plan step of the intelligence process, leaders at all levels can take the opportunity during the prepare step to ensure their subordinates completely understand
23 March 2010 FM 2-0 4-17
Chapter 4
the ROE. During this step, commanders may need to consider exceptions to, or modifications of the ROE to facilitate HUMINT and counterintelligence (CI) collection or to enable the employment of ISR assets.
COLLECT
4-87. The collect step involves collecting, processing, and reporting information in response to ISR tasks. ISR assets collect information and data about the threat, terrain and weather, and civil considerations for a particular AO and area of interest. A successful ISR effort results in the timely collection and reporting of relevant and accurate information, which supports the production of intelligence or combat information. 4-88. The collected information forms the foundation of intelligence databases, intelligence production, and the intelligence officers situational awareness. The requirements manager evaluates the reported information for its responsiveness to the ISR tasks. 4-89. As part of the ISR plan, elements of all units obtain information and data concerning the threat, terrain and weather, and civil considerations within the AO. Well-developed procedures and carefully planned flexibility to support emerging targets, changing requirements, and the need to support combat assessment is critical. Once the information is collected, it must be processed into a form that enables analysts to extract essential information and produce intelligence and targeting data. Collected and processed information must then be reported to the appropriate units, organizations, or agencies for analysis or action.
4-18
FM 2-0
23 March 2010
Special Reconnaissance
4-95. Special reconnaissance is the complementing of national and theater intelligence collection assets and systems by obtaining specific, well-defined, and time-sensitive information of strategic or operational significance. It may complement other collection methods constrained by weather, terrain, hostile countermeasures, and/or other systems availability. Special reconnaissance places U.S. or U.S.-controlled personnel conducting direct observation in hostile, denied, or politically sensitive territory when authorized. Special operating forces (SOF) may conduct these missions unilaterally or to support conventional operations. (See JP 3-05 and FM 3-05.120 [S//NF].) 4-96. Army SOF elements conduct special reconnaissance missions to obtain information not available through other means. Special reconnaissance operations encompass a broad range of collection activities including surveillance, reconnaissance, and target acquisition. Special reconnaissance missions provide intelligence or information often unavailable through other means. Typical special reconnaissance missions include Surveillance and target acquisition of hostile command and control systems, troop concentrations, long-range weapons, lines of communication, chemical, biological, radiological, nuclear, and high-yield explosives (CBRNE) capabilities, and other targets. Location and surveillance of hostage, enemy prisoner of war, or political prisoner detention facilities. Poststrike reconnaissance for battle damage assessment (BDA). Meteorologic, geographic, or hydrographic reconnaissance to support specific air, land, or sea operations.
Process
4-97. Once information has been collected, it is processed. Processing involves converting, evaluating, analyzing, interpreting, and synthesizing raw collected data and information into a format that enables analysts to extract essential information to produce intelligence and targeting data. Processing examples include Preparing imagery for exploitation. Enhancing imagery. Translating a document from a foreign language. Converting electronic data into a standardized reporting format (including database formats) that can be analyzed by a system operator. Correlating information. 4-98. Processing data and information is performed unilaterally and cooperatively by both humans (cognitive) and automated systems. Information or intelligence relevant to the current situation is converted into the appropriate format for inclusion in the COP. 4-99. Processing converts relevant information into a form suitable for analysis, production, or immediate use. Processing includes sorting through large amounts of collected information and intelligence (multidiscipline reports from the units ISR assets, adjacent and higher echelon units and organizations, and non-MI elements in the AO). Processing identifies and exploits that information which is pertinent to the commanders intelligence requirements and facilitates situational understanding. 4-100. Often collection assets must collect and process their data before reporting it. MI systems have their own reporting and processing systemswith details in the appropriate MI system manuals and technical manuals. Some collection assets, particularly air reconnaissance and ground scouts, can report relevant information immediately usable by the tactical commander (for example, for targeting purposes). However, the personnel in the reporting chain still process these reports by evaluating their relevancy and accuracy. In many cases, the output of a collection asset is data or information of limited immediate use to a commander until it has been analyzed and becomes part of an intelligence product.
23 March 2010
FM 2-0
4-19
Chapter 4
4-101. The intelligence staff processes information collected by the units assets as well as that received from higher echelons. Through intelligence reach, the intelligence staff processes many types of information and data from all of the intelligence disciplines and from the units ISR assets and from ISR assets outside the unit.
Reporting
4-102. The timely and accurate reporting of combat information and intelligence is critical to successful operations. Information and intelligence is delivered as voice, text, graphic, or digital media. Voice data is reported over tactical radios on the command net or operations and intelligence net. Text, graphic, and other digital media are reported over battle command network systems, including DCGS-A, and deposited in the common database, e-mail accounts, and on the units Web page. 4-103. The most critical information collected is worthless if not reported in a timely manner. Collectors may report information through verbal, written, graphic, or electronic means. Unit SOPs must clearly state the transmission means of different types of reports (for example, sent by satellite communications, frequency modulation [FM] radios, or by automated means). In general, the transmission of reports for threat contact and actions, CCIRs, exceptional information, and CBRNE reports is by voice FM, and then followed up with automated reports. 4-104. Commanders and staffs must remember that timely reporting, especially of threat activity, is critical in fast-moving operations. Collectors must report accurate information as quickly as possible. Commanders and staff must not delay reports for the sole purpose of editing and ensuring the correct format. This is particularly true for reporting information or intelligence that answers CCIRs. 4-105. The intelligence officer coordinates with the unit staff, subordinate and lateral commands, and higher echelon units to ensure that specific reporting assets, personnel, equipment (especially communications), and procedures are in place. The intelligence officer requests or establishes the appropriate message addresses, routing indicators, mailing addresses, and special security office security accreditation for units.
Time-Sensitive Reporting
4-106. Intelligence and time-sensitive combat information that affects the current operation is disseminated immediately upon recognition. Combat information is unevaluated data gathered by or provided directly to the tactical commander which, due to its highly perishable nature or the criticality of the situation, cannot be processed into tactical intelligence in time to satisfy the users tactical intelligence requirements (JP 1-02). Exceptional information is information that would have answered one of the commanders critical information requirements if the requirement for it had been foreseen and stated as one of the commanders critical information requirements (FM 6-0). The routing of combat information and exceptional information proceeds immediately in two directionsdirectly to the commander and through routine reporting channels, which include intelligence analysis and production elements. Timesensitive information usually includes reports concerning threat contact and actions and CCIRs.
PRODUCE
4-107. The produce step involves combining analyzed information and intelligence from single or multiple sources into intelligence or intelligence products to answer known or anticipated requirements. The intelligence officer integrates evaluated, analyzed, and interpreted information from single or multiple sources and disciplines into finished intelligence products. As with collection operations, the intelligence officer must ensure the units information processing and intelligence production are prioritized and synchronized to support answering the CCIRs (PIRs and FFIRs). Production also involves combining new information and intelligence with existing intelligence to produce intelligence in a form that the commander and staff can apply to the MDMP and supports and helps facilitate situational understanding. During the produce step, the intelligence staff exploits information by
4-20
FM 2-0
23 March 2010
Analyzing the information to isolate significant elements. Evaluating the information to determine accuracy, timeliness, usability, completeness, precision, and reliability. Evaluating the information to determine if it is relevant, predictive, and properly tailored. Combining the information with other relevant information and previously developed intelligence. Analyzing or assessing the information to predict possible outcomes. Presenting the information in a format most useful to users. 4-108. The intelligence staff addresses numerous and varied production requirements based on PIRs and intelligence requirements; diverse missions, environments, and situations; and user format requirements. Through analysis, collaboration, and intelligence reach, the intelligence officer and the staff use the intelligence production capability of higher, lateral, and subordinate echelons to meet the commanders requirements. Proficiency in these techniques and procedures facilitates the intelligence staffs ability to answer command and staff requirements regardless of the situation. 4-109. Intelligence products must be timely, relevant, accurate, predictive, and tailored. The accuracy and detail of every intelligence product has a direct effect on how well the unit conducts operations. However, the intelligence officer and unit must use intelligence (regardless of its form) that meets the requirements, although it might not be as detailed or refined. A good answer that is on time is better than a more refined answer that is late. 4-110. The intelligence officer produces intelligence for the commander as part of a collaborative process. The commander drives the intelligence officers intelligence production effort by establishing intelligence and information requirements with clearly defined goals and criteria. Differing unit missions and operational environments dictate numerous and varied production requirements to the intelligence officer and staff. Through the ISR synchronization tools, the intelligence officer synchronizes the information, intelligence, and PIRs with the operational timeline. 4-111. The intelligence officer and staff provide intelligence products that enable the commander to Plan operations and employ maneuver forces effectively. Recognize potential COAs. Conduct mission preparation. Employ effective TTP. Take appropriate security measures. Focus ISR. Conduct effective targeting. Conduct assessment of intelligence production, reporting, and ongoing operations.
23 March 2010
FM 2-0
4-21
Chapter 4
What are the information exchange rates on each network relative to the network capacity? Where are the units intelligence production elements? Where are the units decisionmakers? How does the unit disseminate information from its producers to its decisionmakers and/or consumers? How long does it take to pass certain reports and products? Are the systems used by the units collectors, producers, processors, and consumers compatible with each other? If not, what is the plan to overcome this challenge? How can the unit access databases and information from higher and other agencies? Are there special requirements necessary to access these databases, such as security clearance, polygraph, training, or certification?
4-22
FM 2-0
23 March 2010
PART THREE
Chapter 7 defines and discusses the role and fundamentals of the human intelligence discipline. Chapter 8 discusses the geospatial intelligence discipline and its role in Army operations. Chapter 9 defines and discusses the role and fundamentals of the imagery intelligence discipline. Chapter 10 defines and discusses the role and fundamentals of the measurement and signature intelligence discipline. Chapter 11 defines and discusses the role and fundamentals of the open-source intelligence discipline. Chapter 12 defines and discusses the role and fundamentals of the signals intelligence discipline. Chapter 13 defines and discusses the role and fundamentals of the technical intelligence discipline.
Chapter 5
All-Source Intelligence
DEFINITION
5-1. All-source intelligence is the intelligence discipline responsible for all-source products and the processes used to produce them. All-source intelligence also refers to intelligence products and/or organizations and activities that incorporate all sources of information, most frequently including human resources intelligence, imagery intelligence, measurement and signature intelligence, signals intelligence, and open-source data in the production of finished intelligence (JP 2-0). 5-2. Army forces conduct (plan, prepare, execute, and assess) operations based on the all-source intelligence assessment developed by the intelligence section. The all-source intelligence assessment is expressed as part of the intelligence estimate.
23 March 2010 FM 2-0 5-1
Chapter 5
5-3. All-source intelligence operations are performed by the intelligence section. They are continuous and occur throughout the operations process and the intelligence process. Most of the products resulting from all-source intelligence are initially developed during planning, and updated as needed throughout preparation and execution based on information gained from continuous assessment.
ROLE
5-4. There is an ever-growing volume of data and information available on the operational environment from numerous sources that commanders can use to improve their situational understanding. Situational understanding enables the commander to better Make decisions to influence the outcome of the operation. Prioritize and allocate resources. Assess and take risks. Understand the needs of the higher and subordinate commanders. 5-5. The commander depends on a skilled intelligence officer working to provide sound intelligence preparation of the battlefield (IPB) products; support the intelligence, surveillance, and reconnaissance (ISR) effort; and provide all-source intelligence analysis, including conclusions and projections of future conditions or events needed to accomplish the mission within the commanders intent.
FUNDAMENTALS
5-6. Intelligence results from the collection, processing, integration, evaluation, analysis, and interpretation of available information. This also applies to activities, which result in the product, and to the organizations engaged in such activities. 5-7. Using information from all disciplines and available sources, all-source analysts conduct analysis and produce timely, relevant, accurate, predictive, and tailored intelligence that satisfies the commanders requirements. All-source analysis provides an overall picture of the threat, terrain and weather, and civil considerations, as well as other aspects of the area of operations (AO). Thorough and disciplined all-source analysis reduces the possibility of error, bias, and misinformation through the consideration of multiple sources of information and intelligence.
PLANNING
5-8. During planning throughout the spectrum of conflict and operational themes, the intelligence staff is responsible for providing well-defined, specific all-source intelligence products and tools. The commander and staff expect and require these throughout planning, regardless of the specific process used: Threat characteristics. Threat templates and models. Threat course of action (COA) statements. Event template and event matrix. High-value target list (HVTL). Weather effects matrix. Modified combined obstacle overlay (MCOO) and terrain effects matrix. Civil considerations IPB overlays. Appropriate civil support products. Note. Possible products are only limited by the intelligence staffs initiative and imagination. 5-9. The military decisionmaking process (MDMP) combines the conceptual and detailed components of planning. Commanders use it to build plans and orders for extended operations as well as to develop orders
5-2 FM 2-0 23 March 2010
All-Source Intelligence
for short-term operations within the framework of a long-range plan. The following discussion is structured around the MDMP steps because most staff members are familiar with them.
MISSION ANALYSIS
5-10. The MDMP begins with an analysis of the mission assigned by the higher headquarters. Most intelligence section actions during mission analysis facilitate the commanders situational understanding and contribute to one or more of the following tasks: Perform IPB. Maintain the intelligence running estimate. Update the intelligence estimate. Develop the initial ISR plan (in collaboration with the operations section). 5-11. Actions required to complete these tasks overlap. Thus, collaboration among intelligence staff members is essential. Additionally, the intelligence section provides intelligence input to other command post cells and elements needed to perform their tasks. Concurrently, intelligence staffs perform parallel and collaborative planning with the higher and lower echelon intelligence staffs. Doing this promotes a common situational awareness among staffs at all echelons. 5-12. A thorough mission analysis is crucial to planning. The mission analysis process and products help commanders refine their situational understanding and determine the restated mission. Accurate situational understanding enables them to better visualize the operation. There are several distinct tasks associated with mission analysis that depend on all-source intelligence operations. Generally, the intelligence portion of mission analysis is an evaluation of the following categories of relevant informationthreat, terrain and weather, and civil considerations. Additionally, it includes an analysis of the higher headquarters plan or order to determine critical facts and assumptions; specified, implied, and essential tasks; and constraints that affect ISR activities. Intelligence section actions during mission analysis result in the development of an initial ISR plan, the refinement of the commanders situational understanding, and the staff refining staff running estimates based on that same understanding. To avoid misunderstanding and ensure there is a clear and common understanding of what is fact and what is assumption at this point, all-source analysts must tell the commander and staff what they know and why they know it; what they think and why they think it; what they do not know and what they are doing about it. This promotes critical thinking and generates the staff discussion required to formulate sound COAs for offensive, defensive, stability, and civil support operations.
Chapter 5
terrainobservation and fields of fire, avenues of approach, key terrain, obstacles, cover and concealment (OAKOC). The analyst also briefs what effect the weather will have on terrain. The general product resulting from terrain analysis is the MCOO. (See FM 2-01.3 for a detailed explanation of terrain analysis and the other standard products developed as a result of the analysis.) Evaluate Weather Conditions and Effects 5-16. If available, the U.S. Air Force (USAF) weather team assigned to the intelligence section provides weather forecasting and analysis under the direction of the intelligence officer. Using the Integrated Weather Effects Decision Aid function in the Integrated Meteorological System program, the intelligence section briefs the commander and staff on the weather forecasthow it will affect warfighting functions in general as well as personnel and equipment specifically. (See FM 2-01.3 for a detailed explanation of weather analysis.) Evaluate Civil Considerations 5-17. ASCOPE is an acronym for area, structures, capabilities, organizations, people, and events. These categories are used to analyze and describe civil considerations that may affect operations. The analyst includes the effects urban centers may have on friendly and threat forces in civil considerations. There is no standard product resulting from this analysis. The intelligence officer generally develops products that fit the information needed to describe the situation and facilitate the commanders situational understanding. This is especially critical when conducting stability and civil support operations. (See FM 2-01.3 and FM 3-06 for detailed discussions of analyzing civil considerations.) Develop Threat Capabilities 5-18. To accurately depict how a threat commander might deploy and maneuver forces on the battlefield, an analyst must understand how the threat is organized and equipped, what the threats capabilities are, and how the threat has employed forces in the past. An understanding of threat characteristics and detailed organizational charts assist in this analysis. This also helps identify what signatures the threat gives off collectable by friendly ISR assets. Maintaining accurate threat characteristics is also essential in conducting combat assessment. This applies to regular and irregular forces as well as insurgent and terrorist organizations. Threat characteristics for conventional forces are generally available within the intelligence community. The analyst generally has to develop threat characteristics for emerging threats such as terrorists and insurgents, which is accomplished by using information gained from national combatant commands and theater intelligence organizations, as well as from the publications of these types of threat groups. Develop Threat Models 5-19. Depending on the mission, there are three types of threat models generally required for planning. The first two are used in conventional operations. They show how the threat might execute offensive and defensive operations against friendly forces. The third is used to show how irregular forces might execute operations against friendly forces in complex terrain, such as an urban area. Each of these products includes a graphic depiction of the accompanying threat COA statement. Together, they communicate the threats disposition, objectives, goals and end state, main and shaping efforts, and how the threat is expected to maneuver. Additionally, these products graphically and textually explain the threats intent for fires, ISR, information engagement, command and control warfare, and logistics. Finally, they explain the threats failure options and a recommendation on how to defeat the threat. Both the overlay and statement are included in the mission analysis briefing. Depending on the mission, the analyst generally develops more than one threat model to articulate other possible threat COAs. Identify High-Value Target List 5-20. Every threat situation template and threat COA statement is accompanied by an HVTL that describes and prioritizes, in terms of their relative worth, those assets that the threat commander requires to achieve
5-4 FM 2-0 23 March 2010
All-Source Intelligence
stated objectives. The analyst develops the HVTL in coordination with the rest of the staff. The HTVL can include specific individuals (often referred to as high-value individuals [HVIs]) and organizations. Develop an Event Template and Matrix 5-21. Developed as the basis for the decision support template (DST) and the ISR overlay, this tool helps identify the commanders decision points and determine ISR strategies. The event template and matrix ensure a consistent and well-reasoned portrayal of threat capabilities throughout planning. They are critical in tying ISR and the concept of operations together. The event template and matrix are not briefed during mission analysis, but they must be ready for COA development.
Determine Constraints
5-24. A higher commander normally places some constraints on subordinate commanders. Constraints are restrictions placed on the command by a higher command. They dictate an action or inaction, thus restricting the freedom of action a subordinate commander has for planning. A typical constraint for reconnaissance and surveillance is establishing a limit of advance. Constraints are normally contained in the scheme of maneuver paragraph, concept of operations paragraph, or coordinating instructions paragraph in the base order. They might also be stated in the annexes to the order.
Chapter 5
development. Identifying information requirements helps the commander filter information available by defining what is important to mission accomplishment. It also helps to focus the efforts of the rest of the staff and subordinate commands.
All-Source Intelligence
5-34. Additionally, if initial IPB products have not been made available to higher headquarters and subordinate commands, they should be issued with the WARNO.
ORDERS PRODUCTION
5-40. The staff, led by the operations officer, prepares the order by turning the selected COA into a clear, concise concept of operations and supporting information. The order provides all the information subordinate commands need to conduct their operations. However, this is not the first time subordinate commanders and their intelligence staffs have seen this data. Parallel and collaborative planning involves intelligence analysts at all echelons. They have reviewed each others intelligence products as they were developed. At this point, they clarify changes and submit requests for additional information and product support. Before issuing the order, the intelligence section conducts an orders crosswalk with the rest of the staff as directed by the operations officer.
23 March 2010
FM 2-0
5-7
Chapter 5
RUNNING ESTIMATE
5-42. A running estimate is a staff sections continuous assessment of current and future operations to determine if the current operation is proceeding according to the commanders intent and if future operations are supportable (FM 3-0). Running estimates provide information, conclusions, and recommendations from the perspective of each staff section. They serve as a staff technique to support the commanders visualization and decisionmaking, as well as the staffs tool for assessing during preparation and execution. In the running estimate, staff officers continuously update their conclusions and recommendations as they evaluate the impact of information. 5-43. Each staff section produces a running estimate. The main difference between the running estimate and the old staff estimatethe staff not only continuously updates the information in the estimate, but also continuously updates the conclusions and recommendations while including projections of future conditions of the area of interest.
5-8
FM 2-0
23 March 2010
All-Source Intelligence
Threat. Threat situation (including strengths and weaknesses). Threat capabilities and an analysis of those capabilities (COAs available to the threat). Conclusions drawn from that analysis. 5-48. The intelligence running estimate details threat characteristics into threat capabilities and projections of future threat actions.
INTELLIGENCE ESTIMATE
5-51. An intelligence estimate is the appraisal, expressed in writing or orally, of available intelligence relating to a specific situation or condition with a view to determining the courses of action open to the enemy or adversary and the order of probability of their adoption (JP 2-0). The intelligence staff develops and maintains the intelligence estimate.
Chapter 5
Remains synchronized with the scheme of maneuver. Is issued as part of the order and updated throughout the operation based on changes to the situation and answers to intelligence requirements. Assigns appropriate collection tasks to subordinate units. Requests intelligence support as needed from higher and adjacent units.
5-10
FM 2-0
23 March 2010
All-Source Intelligence
DISSEMINATE
5-62. The disseminate step Identifies all users requiring direct dissemination of information collected during ISR activities. Determines the perishability of information collected. Determines the best method of disseminating information to each user. Develops an audit trail of information disseminated. Ensures the proper database management of information collected during ISR activities.
23 March 2010
FM 2-0
5-11
Chapter 6
Counterintelligence
DEFINITION
6-1. Counterintelligence is information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorist organizations or activities (Executive Order 12333 [EO 12333]). 6-2. Counterintelligence (CI) includes all actions taken to detect, identify, track, exploit, and neutralize the multidiscipline intelligence activities of adversaries. It is a key intelligence community contributor to protect U.S. interests and equities.
MISSION
6-3. The mission of Army CI is to conduct aggressive, comprehensive, and coordinated investigations, operations, collection, analysis and production, and technical services. These functions are conducted worldwide to detect, identify, assess, counter, exploit, or neutralize the foreign intelligence and security services (FISS) and international terrorist organizations (ITO) collection threat to the Army and Department of Defense (DOD), in order to protect the lives, property, or security of Army forces. Army CI has four primary mission areas: Counterespionage. Support to force protection. Support to research and technology protection. Cyber CI.
ROLE
6-4. The role of CI is to deny, degrade, disrupt, or mitigate FISS and ITO ability and capability to successfully execute intelligence collection targeting U.S. or friendly force interests. CI focuses on countering FISS and ITO intelligence collection activities targeting information or material concerning U.S. or friendly force personnel, activities, operations, plans, equipment, facilities, publications, technology, or documentseither classified or unclassified. CI does this without official consent of designated U.S. release authorities, for any purpose that could cause damage or otherwise adversely impact the interests of national security of the U.S. ability to fulfill national policy and objectives. 6-5. CI elements are instrumental in contributing to situational awareness in the area of influence. CI elements may corroborate other intelligence discipline information as well as cue other intelligence assets through the CI core competencies and CI technical services.
FUNDAMENTALS
6-6. Fundamentals of the CI discipline include CI core competencies. CI structure. Support to contingency operations. Operational considerations.
23 March 2010
FM 2-0
6-1
Chapter 6
Operations
6-8. CI operations are broadly executed CI activities that support a program or specific mission. CI operations use one or more of the core CI competencies discussed below. CI operations can be offensive or defensive, and they are derived from, transitioned to, or used simultaneouslydepending on the scope, objective, or continued possibility for operational exploitation. CI operations fall into two categoriesCI support operations and CI sensitive operations. (See AR 381-20, AR 381-47 [S], and AR 381-102 [S].)
Investigations
6-9. CI investigations are conducted when national security crimes are allegedly committed by anyone under CI authority. The primary objective of any CI investigation is the identification, exploitation, or neutralization of threats directed against the Army. CI investigations are also conducted to identify systemic security problems that may have damaging repercussions to Army operations and national security interests.
Collection
6-10. CI collection is the systematic acquisition of information concerning the FISS and ITO intelligence collection threat targeting Army equities. CI elements conduct collection activities to support the overall CI mission. CI collection is conducted by using sources, elicitation, official liaison contacts, debriefings, screenings, and open-source intelligence (OSINT) to obtain information that answers the standing CI collection requirements or other collection requirements based on commanders requirements. Although CI and human intelligence (HUMINT) have a collection mission, there are distinct differences between their collection objectives. HUMINT focuses on answering the commanders critical information requirements (CCIRs) concerning the plans, intentions, capabilities, and disposition of the adversary, as a whole. 6-11. CI specifically targets the FISS and ITO intelligence collection threat targeting U.S. forces. CI collection is conducted to understand how FISS and ITO are targeting U.S. forces, so countermeasures can be identified and recommended to commanders and program managers to protect personnel, mission, resources, and technology. Collection is only one of five CI core competencies; whereas, collection is HUMINTs only mission. (See DA PAM 381-15 [S//NF] for more information on collection activities.)
6-2
FM 2-0
23 March 2010
Counterintelligence
Perform technical surveillance countermeasures (TSCM). Perform cyber CI activities that provide protection to information networks as well as identify vulnerabilities and attempted intrusions into Army and DOD computer networks. Perform CI scope polygraph examinations. Provide support to Army information tasks.
COUNTERINTELLIGENCE STRUCTURE
6-17. CI organizations and force structure are designed to support the modular force construct through scalable team, operations management, and technical channels packages. CI elements assigned to division, battlefield surveillance brigades (BFSBs), Army Service component command (ASCC), and strategic units are capable of operating at all echelons across the spectrum of conflict. The joint 2X organizational and operational concept has been established in Army force structure to decentralize CI operational approval and execution. As the primary force provider for the DOD CI in contingency and combat operations, the establishment of the 2X and the CICA throughout the Army ensures a trained and experienced cadre of CI professionals capable of filling Army, joint, and combined 2X and CICA positions.
2X
6-18. The 2X is the CI and HUMINT manager who is authorized to coordinate, deconflict, and synchronize all CI and HUMINT missions in the area of intelligence responsibility. The 2X manages CI and HUMINT intelligence requirements including HUMINT collection requirements, time-sensitive collection requirements, report evaluations with source-directed requirements, and source assessments. At each echelon, the 2X section may be structured differently, but there is always a requirement for three componentsCICA, a HUMINT operations cell (HOC), and an operations support cell (OSC). (See TC 2-22.303 for information on the Army 2X and JP 2-01.2 [S] for information on the joint 2X.)
23 March 2010
FM 2-0
6-3
Chapter 6
Counterintelligence Team
6-23. The CI team conducts CI investigations, CI operations, CI collection (debriefings, source operations, liaison, and screening), CI analysis, and CI technical services support to protect the supported unit from threat intelligence activities. (See FM 2-22.2 for information on CI teams.)
6-4
FM 2-0
23 March 2010
Counterintelligence
23 March 2010
FM 2-0
6-5
Chapter 6
Operational Counterintelligence
6-26. Operational level CI assets are generally assigned to ASCC or combatant command organizations and are focused on a specific theater. CI, at the operational level, is primarily focused on counterespionage and CI support to protection. Operational CI assets are instrumental in protecting bases of operations from infiltration, collection, planning, and targeting by FISS and ITO entities. Although operational CI elements have a vital mission to counter the FISS and ITO threat on a daily basis, they may be tasked to deploy and support contingency or combat operations. This is especially true in large-scale combat operations when the size, scale, and scope of the operation exceed the capability of organic tactical CI assets to provide adequate support in the area of operations (AO). When required, operational CI assets may be tasked to support strategic CI operations. 6-27. MI brigades provide operational support to the separate ASCCs. CI elements in MI brigades support combatant commanders, generally in their areas of responsibility. Operational level CI activities and functions include investigations, collection, analysis and production, and technical services and support. CI elements must be capable of quickly transitioning from a peacetime mission to crisis operations to support combatant commander requirements. Theater CI assets conduct Army, joint, and multinational operations
6-6
FM 2-0
23 March 2010
Counterintelligence
in their joint operations areas (JOAs). Operational elements may also be deployed to support or reinforce tactical forces in contingency operations.
Tactical Counterintelligence
6-28. Tactical CI generally denotes all CI assets assigned to Army corps and below. This includes CI assigned directly to brigade combat teams (BCTs), divisions, and corps units. CI at the tactical level is primarily focused on CI support to force protection to their supported commanders during operations. CI assets at the tactical level are instrumental in protecting bases of operations from infiltration, collection, planning, and targeting by FISS and ITO entities.
Chapter 6
6-32. A key element to the CI teams success is the opportunity to spot, assess, and develop relationships with potential sources of information. Operating as independent teams, without being tied to intelligence, surveillance, and reconnaissance (ISR) or combat assets, enables the CI teams maximum interaction with the local population, thereby maximizing the pool of potential sources of information. Along with the opportunity to spot, assess, and interact with potential sources of information, a second key element of a CI teams success is its approachability to the local population. A soft posture enables a CI team to appear nonthreatening. Experience has shown that the local population in general is apprehensive of fully and openly armed patrols and Soldiers moving around population centers. 6-33. During some operations, civilian attire or nontactical vehicles may be used to lower the CI team profile. In some special situations, these measures are taken to make the operation less visible to the casual observer. In addition, in some cultures, sharing food and beverages among friends is expected; exceptions to restrictions or general orders should be considered to facilitate successful CI team operations, many of which are geared towards developing relationships with potential sources of information.
OPERATIONAL CONSIDERATIONS
6-34. CI must be represented and integrated into all phases of operational planning. The success of a CI team is measured by the operational emphasis, resourcing, and equipping they receive from their supported command. While operational security and freedom of movement are critical to effective CI operations, conditions within the AOspecifically high threat areaswill often require the CI team to find nondoctrinal solutions to allow them to operate. This may mean the CI team is paired with other combat and noncombat units to facilitate movement in a particular AO. 6-35. The mission of the CI team must be integrated into the overall scheme of maneuver to support the commanders requirements. CI teams are often resourced or outfitted with non-table of organization and equipment (TOE), resources, and personnel that serve a specific purpose and provide them a unique capability to support their commander. These resources should not be used for non-CI missions or redirected without the commanders approval; if this occurs, the commander is accepting a significant degradation to the units ISR capability.
Counterintelligence
operations (PSYOP), engineer, or other operations. This method reduces the risk to the team while allowing a limited ability to collect information. It also has the advantage of placing the team in contact with the local population and allowing it to spot, assess, and interact with potential sources of information. However, this deployment method restricts collection by subordinating the teams efforts to the requirements, locations, and timetables of the unit or operation in which it is integrated and does not allow for the conduct of sensitive source operations. Note. This method of employment should be considered a last resort.
23 March 2010
FM 2-0
6-9
Chapter 7
Human Intelligence
DEFINITION AND TERMS
7-1. Human intelligence is the collection by a trained human intelligence collector of foreign information from people and multimedia to identify elements, intentions, composition, strength, dispositions, tactics, equipment, and capabilities. 7-2. A human intelligence (HUMINT) source is a person from whom information is collected for the purpose of producing intelligence. HUMINT sources can include friendly, neutral, or hostile personnel. The source may either possess first- or second-hand knowledge normally obtained through sight or hearing. Categories of HUMINT sources include but are not limited to detainees, enemy prisoners of war (EPWs), refugees, displaced persons, local inhabitants, friendly forces, and members of foreign governmental and nongovernmental organizations. 7-3. A HUMINT collector is a person who is trained to collect information from individuals (HUMINT sources) for the purpose of answering requirements. HUMINT collectors are the only personnel authorized to conduct HUMINT collection operations. They are trained and certified enlisted personnel in military occupational specialty (MOS) 35M, warrant officers (WOs) in MOS 351C and 351M, commissioned officers in MOS 35F, and their Federal civilian employee and civilian contractor counterparts. Trained means successful completion of one of the following courses, which are the only accepted sources of interrogation training for military personnel: 35M Basic HUMINT Collector Course at U.S. Army Intelligence Center of Excellence, Fort Huachuca, Arizona. U.S. Marine Corps Basic Marine Air-Ground Task Force Counterintelligence (CI)/HUMINT Course at the Navy and Marine Corps Intelligence Center, Dam Neck, Virginia. Joint Interrogation Certification Course at HUMINT Training-Joint Center of Excellence, Fort Huachuca, Arizona. Defense Intelligence Agency I-10 Course, Alexandria, Virginia. Note. Certification is conducted at the discretion of the combatant commander in accordance with established combatant command policies and directives. 7-4. HUMINT collection operations must be conducted in accordance with all applicable U.S. law and policy, which include U.S. law; the law of war; relevant international law; relevant directives including DODD 3115.09, DODD 2310.1E, Department of Defense (DOD) instructions, FM 2-22.3, and military executive orders including fragmentary orders. Additional policies and regulations apply to the management of contractors engaging in HUMINT collection. (See FM 2-22.3, appendix K.)
ROLE
7-5. HUMINT operations focus on determining the capabilities, threat characteristics, vulnerabilities, and intentions of threat and potential threat forces. HUMINT operations target actual and potential adversary decisionmaking architecture with the intent of helping to shape friendly forces visualization of threat and potential threat forces. HUMINT collection activities and operations include screening, interrogation, debriefing, liaison, and human source operations.
23 March 2010
FM 2-0
7-1
Chapter 7
7-6. Once the type of operation has been determined, leaders use the operations processplan, prepare, execute, and assessto conduct the operation. The following paragraphs briefly discuss the different types of HUMINT operations.
SCREENING OPERATIONS
7-10. Screening is the process of evaluating and selecting human sources and documents for the prioritized collection of information based on the collection requirements and mission of the unit conducting the screening or its higher headquarters. Screening categorizes and prioritizes sources based on the probability of a particular source having priority information and the level of cooperation of the source. Screening is also used to determine if a source matches certain criteria that indicate that the source should be referred to another agency. Screening is conducted at all echelons of command and in all operational environments. There are two general categories of screeninghuman source screening and document and media screening. 7-11. Media is screened for content, which answers priority intelligence requirements (PIRs) or other information of intelligence interest. Screening operations also help determine which intelligence discipline or agency could best conduct the exploitation of a given source. Screening operations include but are not limited to Tactical screening to support combat or contingency operations. Checkpoint screening (mobile or static) of local populations as they transit through and within the area of operations (AO) or to screen large numbers of individuals, such as refugees or displaced persons as they enter the AO. Local population screening of personnel within their own neighborhoods. Collection facility screening conducted as a normal part of HUMINT collection operations at collection facilities, such as theater interrogation and debriefing facilities and refugee camps. Local employee screening to determine possible security risks or identify sources who can provide information in response to the commanders critical information requirements (CCIRs).
INTERROGATION OPERATIONS
7-12. Interrogation is the systematic effort to procure information to answer specific collection requirements by direct and indirect questioning techniques of a person who is in the custody of the forces
7-2 FM 2-0 23 March 2010
Human Intelligence
conducting the questioning. Some examples of interrogation sources include EPWs and other detainees. Interrogation sources range from totally cooperative to highly antagonistic. Interrogations may be conducted at all echelons in all operational environments. Note. Interrogations may only be conducted by personnel trained and certified in the interrogation methodology, including personnel in MOSs 35M and 351M, or select others as may be approved by DOD policy. Interrogations are always to be conducted in accordance with applicable laws and policies, regardless of the echelon or operational environment in which the HUMINT collector is operating. 7-13. Detainee interrogation operations conducted at U.S. detention facilities, multinational-operated facilities, or other agency-operated collection facilities are more robust and require greater planning, but have greater logistic support. Interrogation operations are specific operations normally conducted at detainee collection facilities directed at the wide-scale collection of information from detainees using interrogation techniques. Although field interrogations are conducted at all echelons and during all operations with detainees, detention facilities where interrogation operations occur are normally located only at theater or joint task force (JTF) level.
DEBRIEFING OPERATIONS
7-14. Debriefing is the systematic questioning of cooperating human sources to satisfy intelligence requirements consistent with applicable law. The source is usually not in custody and is usually willing to cooperate. Debriefing may be conducted at all echelons and in all operational environments. The primary categories of sources for debriefing are refugees, displaced persons, local civilians, and friendly forces.
Chapter 7
7-19. HUMINT collection teams (HCTs) must be able to travel to meet sources and to remain at a meeting location long enough to conduct their meeting. This requirement to remain in one location for up to several hours means that HCTs require dedicated security. Placing an HCT with a combat patrol for movement will not provide them with the support they need for stationary operations, since combat patrols need to keep on the move.
LIAISON OPERATIONS
7-20. Liaison with local military, government, or civilian agency officials provides an opportunity to collect information required by the commander. The HUMINT collector meets with these officials to conduct liaison, coordinate certain operations, collect information, and obtain leads to potential sources of information. Elicitation is the primary technique used with liaison contacts, although in many cases there is a more formal exchange of information. Information obtained by these elements through liaison tends to reflect the official positions of their superiors and may not be entirely accurate or complete.
CAPABILITIES
7-23. HUMINT collection capabilities include the ability to Collect information and cue from an almost endless variety of potential sources including friendly forces, civilians, detainees, and source-related documents. Focus on the collection of detailed information not available by other means. This includes information on threat intentions and local civilian and threat force attitudes and morale. It also includes building interiors and facilities that cannot be collected on by other means due to restrictive terrain. Corroborate or refute information collected from other reconnaissance and surveillance assets. Operate with minimal equipment and deploy in all operational environments to support offensive, defensive, and stability operations. Based on solid planning and preparation, HUMINT collection can provide timely information if deployed forward to support maneuver elements.
PLANNING CONSIDERATIONS
7-24. Interpersonal skills, availability of trained and certified personnel, and time are important considerations when conducting planning for HUMINT operations.
Interpersonal Skills
7-25. HUMINT depends on the subjective interpersonal capabilities of the individual rather than on the abilities to operate collection equipment. HUMINT collection capability is based on experience within a specific AO that can only be developed over time.
7-4
FM 2-0
23 March 2010
Human Intelligence
Time
7-27. HUMINT collection, particularly source operations, takes time to develop. Collection requirements must be developed with sufficient lead time for collection. Human Intelligence Language Limitations 7-28. While HUMINT collectors can normally use an interpreter, a lack of language proficiency by the collector can significantly slow collection efforts. Such language proficiency takes time to develop. Misuse of Human Intelligence Personnel 7-29. HUMINT collectors are frequently utilized incorrectly and assigned missions that belong to civil affairs, military police, counterintelligence (CI), interpreters, translators, or other operational specialties for which they are not trained or certified to conduct or supervise. Employing HUMINT collectors in any capacity other than HUMINT collection missions severely impacts their ability to answer intelligence requirements. Human Intelligence Collection Capability 7-30. HUMINT collection capability is limited when commanders do not provide support specifically to the HCT for the conduct of HUMINT collection missions. Often HCTs are required to travel with patrols in order to have mobility within the AO. While this does get the HCT off the base or camp, it does not allow them the time or flexibility to conduct a HUMINT collection mission. The nature of patrol missions requires them to keep on the move most of the time. HUMINT collection missions often require the HCT to remain at a location for extended periods. In order for HUMINT collection missions to be successful, commanders must provide dedicated mission support to allow for this requirement. (See AR 381-100 [S].) Human Intelligence Risk Management 7-31. Maneuver commanders, in weighing the risks associated with employing HCTs, should consider the potential loss of a wealth of information, such as enemy activities, locations of high-value personnel, and threats to the force, that they may incur if they restrict HCT collection activities. Human Intelligence Legal Obligations 7-32. Applicable U.S. law and regulations and international law govern HUMINT collection operations. HUMINT operations may be further restricted by status-of-forces agreements (SOFAs) and other agreements, Executive orders, rules of engagement (ROE), and local laws. Such documents, however, cannot permit interrogation actions that are illegal under U.S. or international law. Human Intelligence Connectivity and Bandwidth Requirements 7-33. With the exception of the size, activity, location, unit, time, equipment (SALUTE) report, most HUMINT reporting requires considerable bandwidth. Deployed HCTs must be able to travel to and report from all areas in the AO. Digital communication equipment must be able to provide reliable connectivity with team reporting channels and sufficient bandwidth for transmission of reports, including digital imagery. Human Intelligence Reporting and Immediate Access to Sources 7-34. Except in tactical situations, when HUMINT collectors are in immediate support of maneuver units, HUMINT collection and reporting takes time. In stability operations, sources need to be assessed and
23 March 2010 FM 2-0 7-5
Chapter 7
developed. Once they are developed, they need to be contacted, which often takes time and coordination. In offensive and defensive operations, HUMINT collection at EPW holding areas may still be timely enough to meet tactical and operational requirements.
Human Intelligence
23 March 2010
FM 2-0
7-7
Chapter 8
Geospatial Intelligence
INTRODUCTION
8-1. There are many producers of geospatial intelligence (GEOINT), and the users of GEOINT extend from the national level down to the lowest tactical level. The overall GEOINT enterprise that supports operations extends across all Services, multinational partners, and other organizations during joint operations and unified action. GEOINT requirements, methods of collection (and associated systems), and products vary widely based on the echelon of support and the various types of operations. 8-2. The Army does not conduct GEOINT operations in isolation. GEOINT is comprised of many ongoing operations and activities across the Department of Defense (DOD). The National System for Geospatial-Intelligence (NSG) manages operations through guidance, policy, programs, and organizations. The NSG is the combination of technology, policies, capabilities, doctrine, activities, people, data, and communities necessary to produce GEOINT in the form of integrated intelligence across multiple environments. The NSG community consists of members and partners: Members include the intelligence community, joint staff, military departments (including the Services), and combatant commands. Partners include civil applications committee members, international partners, industry, academia, defense service providers, and civil community service providers.
23 March 2010
FM 2-0
8-1
Chapter 8
8-5. The NGA, as the functional manager, published National System for Geospatial Intelligence (NSG): Geospatial Intelligence (GEOINT) Basic Doctrine, Publication 1-0, the capstone GEOINT doctrine publication, in September 2006. This NSG doctrine explains that GEOINT is an intelligence discipline that has evolved from the integration of imagery, IMINT, and geospatial information. The basic capabilities and products of these three areas still exist as the foundation of GEOINT. 8-6. NSG doctrine discusses four fundamental aspects of GEOINT: The discipline of GEOINT. The data that comprise GEOINT. The process used to develop GEOINT products. The products derived from GEOINT data. 8-7. GEOINT provides a common framework for supporting joint operations to better enable mission accomplishments across the range of military operations and with all mission partners. GEOINT support to joint operations supports the multidirectional flow and integration of geospatially referenced data from all sources to achieve shared situational awareness of the operational environment, near real-time tracking, and collaboration between forces. The GEOINT cell at the combatant command coordinates closely with the joint force commander GEOINT cell (if the combatant command and joint force commander are two different organizations) to ensure continuity in operations across all functions, organization levels, and levels of warfare. 8-8. GEOINT activities necessary to support joint operations include the capability to define GEOINT requirements, discover and obtain GEOINT, put GEOINT in a useable form, and then maintain, use, and share GEOINT. The GEOINT cell interfaces directly with the user to define user requirements. Then it interfaces with the NSG to obtain and provide the best quality GEOINT possible directly to the warfighter in fulfillment of the broad range of requirements depicted by the various mission functions. The GEOINT cell supports joint operations with five activities: Define GEOINT mission requirements. Obtain mission-essential GEOINT. Evaluate available GEOINT data. Use and disseminate GEOINT. Maintain and evaluate GEOINT. 8-9. The use of GEOINT can be categorized into five general areas: General military intelligence and indications and warning. Safety of navigation. Operational awareness. Mission planning and command and control. Target intelligence. 8-10. The combatant commands develop area and point target GEOINT requirements to support the planning and execution of joint operations. The GEOINT cell assigned to combatant commands is responsible for coordinating all GEOINT requirements within its area of responsibility while ensuring that the supporting commands or component commands are executing theater and mission-specific GEOINT requirements. This includes planning provisions for war reserve requirements and enabling the common operational picture (COP) with a GEOINT framework for all needed layers of geospatial information. 8-11. Each combatant command (except the U.S. Strategic Command) has also established a joint intelligence operations center (JIOC) to plan, prepare, integrate, direct, synchronize, and manage continuous full-spectrum defense intelligence operations. The goal of all JIOCs is the integration of intelligence into operations to increase the speed, power, and effectiveness of DOD operations. These organizations facilitate access to all available intelligence sources and analyze, produce, and disseminate timely, relevant, accurate, predictive, and tailored all-source intelligence and GEOINT to support planning and execution of military operations. The combatant commands have imagery exploitation, geospatial information, and services capabilities.
8-2 FM 2-0 23 March 2010
Geospatial Intelligence
8-12. The types of imagery-derived products generated by the combatant commands include text reports, database entries, target materials and support products, visualization products, and annotated graphics. The GEOINT cell provides advice to the combatant commander on all geospatial information and geodetic sciences. While the combatant commands rely heavily on basic maps, charts, target coordinates, geodetic surveys, and other standard geospatial information provided by NGA, they also research, develop, and produce their own mission-specific, specialized geospatial products and services for the combatant commander and components. These products (for example, aeronautical and hydrographic products, terrain graphics and data, charts, perspective views, image graphics, target materials) provide value-added improvements to NGA digital products. 8-13. The NGA support team (NST) is the primary mechanism for interaction between the combatant commands and NGA. The NST coordinates NGAs operational, policy, and training support to its customers. NGA maintains NSTs at the Joint Staff, combatant commands, Services, and DOD agencies. 8-14. A typical NST is composed of a senior representative (a military O-6 or a defense intelligence senior leader), staff officers, and imagery and geospatial analysts. A reach component at NGA Headquarters focuses NGA production support. In addition to using NSTs, NGA may deploy crisis or geospatial support teams of imagery and geospatial analysts upon request, independently, as augmentation to an existing NST, or as part of a national intelligence support team (NIST). 8-15. A NIST is a nationally sourced team composed of intelligence and communications experts from Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), National Security Agency (NSA), or any combination of these agencies. These teams of government and/or contract personnel employ deployable GEOINT production systems. NST personnel have reachback to NGA for data and products, fuse this information with tactical and theater sources, and work with users to produce products tailored to their needs. For more information on joint GEOINT doctrine, refer to JP 2-03.
23 March 2010
FM 2-0
8-3
Chapter 8
8-20. Geospatial engineer units that are located at the theater Army level are the GPCs. The GPC mission is to collect, create, manage, and disseminate geospatial data, information, and products for the area of responsibility. GPCs are responsible for providing geospatial data, information, and products to geospatial engineering units for dissemination to Army Battle Command Systems and for coordinating the acquisition and production activities of geospatial engineering units operating within GPCs area of responsibility. GPCs also coordinate with NGA, host or allied nation geospatial support activities, and higher headquarters to create and maintain a geospatial architecture from national to tactical levels. 8-21. The conduct of operations depends on geospatial data and imagery. That geospatial data and imagery is the foundation for the COP, and it facilitates situational understanding for all of the warfighting functions. The COP is a critical tool to integrate all Army operations by providing a common view of operations and the operational environment. One of the primary data managers for the COP is the geospatial engineer at every echelon down to the brigade combat team. The GEOINT cell is responsible for creating and maintaining the GEOINT database of the COP. The GEOINT database establishes the geospatial data foundation for the GEOINT cell. These databases include enterprise databases such as the Theater Geospatial Database and Imagery Product Library. 8-22. The GEOINT cell provides direct support to create GEOINT products. The GEOINT cell is responsible for coordinating GEOINT requirements within the area of responsibility. The GEOINT cell provides the commander visualization of the area of operations (AO) and manages the geospatial and imagery foundations of the COP. GEOINT cells provide a collaborative environment for the geospatial engineer and imagery analyst to achieve maximum development of GEOINT products. 8-23. A cell is a group of personnel with specific skills brought together to accomplish key functions. GEOINT cells are composed of imagery analysts supported by geospatial engineers to provide commanders a more complete picture of the physical environment and infrastructure in the operational environment. The advantages of GEOINT cells include centralized GEOINT production, synchronization of effort, reduction of redundancy, and maximization of the imagery analyst and the geospatial engineer skills. 8-24. There are other differences in the Army construct. The Army Views the current categories of imagery, IMINT, and geospatial information as sufficient and more specific for Army purposes. GEOINT is unique and necessary to describe a value-added to intelligence operations through analysis and integration and/or combination of imagery, IMINT, and geospatial information. Note. According to NSG: GEOINT Basic Doctrine, Publication 1-0, Almost any type of GEOINT can be produced without using intelligence analysis . Recognizes that geospatial engineers are not the sole providers of geospatial data and information to the enterprise. All Soldiers and units provide this data; the geospatial engineers verify and manage this data for the Army. Geospatial engineers also produce data and GEOINT products, enhance existing data, reconcile data conflicts, and analyze and disseminate data. Maintains a tactical intelligence architecture and uses systems that are significantly different from the other aspects of the GEOINT enterprise. NGA develops GEOINT architecture and standards for the GEOINT enterprise. Army intelligence units and organizations do not control all the different forms of data (imagery and geospatial), the different systems, and the tactical command and control network. Manages commanders requirements for information that falls across all of the Armys warfighting functions and differs from NGA requirements to support DOD. Has a doctrinal information hierarchy established in FM 6-0 that builds from data to information, to knowledge, to understanding. In this hierarchy, intelligence (depending on the level of detail) can be resident anywhere from the information to the understanding levels. 8-25. The Army recognizes, as stated in NSG: GEOINT Basic Doctrine, Publication 1-0, that GEOINTs added value is based on the prerequisite for analysis and the integration and/or combination of all three
8-4 FM 2-0 23 March 2010
Geospatial Intelligence
elements that result in more comprehensive and tailored intelligence support. Also, just like NGA, Army doctrine recognizes four fundamental aspects of GEOINT: GEOINT as an intelligence discipline. The GEOINT discipline encompasses all intelligence tasks and intelligence activities involved in the planning, collection, processing, analysis, exploitation, and dissemination of GEOINT. GEOINT as the product defined above. Unique processes used to develop GEOINT. Unique data used to develop GEOINT. 8-26. The goal of Army GEOINT operations is to provide tailored products that serve as the foundation for the COP and facilitate the commanders gaining situational understanding. Just as it states in NSG: GEOINT Basic Doctrine, Publication 1-0, Advances in technology and the use of geospatial data have created the ability to integrate and/or combine elements of any or all of the areas, along with other elements of information, resulting in many new, more sophisticated capabilities for producing products and conducting analysis. Advanced technology now provides the capability to use and combine geospatial data in different ways to create interactive/dynamic, customized visual products. It allows the analyst to quickly make more complex connections between different types of data and information than previously possible. GEOINT is a major step toward improving Army intelligence and intelligence operations.
23 March 2010
FM 2-0
8-5
Chapter 9
Imagery Intelligence
DEFINITIONS
9-1. Imagery intelligence is the technical, geographic, and intelligence information derived through the interpretation or analysis of imagery and collateral materials (JP 2-03). 9-2. Imagery analysis is the science of converting information extracted from imagery into intelligence about activities, issues, objects, installations, and/or areas of interest. 9-3. Imagery exploitation involves the evaluation, manipulation, and analysis of one or more images to extract information related to a list of essential elements of information. There are three phases of imagery exploitation: first phase, also known as time-dominant, and second and third phases, which are nontimedominant. The purpose of time-dominant exploitation (first phase) is to satisfy priority requirements of immediate and/or identify changes or activities of immediate significance. The purpose of second phase exploitation is to provide an organized and comprehensive account of the intelligence derived from validated intelligence requirements tasking. In the third phase, detailed, authoritative reports on specific installation, objects, and activities are prepared by the agencies participating in the exploitation effort. (See JP 2-03.)
ROLE
9-4. The role of imagery intelligence (IMINT) is to assist commanders in applying and protecting their combat power and support operations. Imagery often enhances the commanders situational understanding of the area of operations (AO). Imagery is also used for military planning, training, and operations that include navigation, mission planning, mission rehearsal modeling, simulation, and precise targeting. Imagery assets, particularly unmanned aircraft systems (UASs) and moving target indicator (MTI) systems, are useful in cueing other intelligence, surveillance, and reconnaissance (ISR) systems. Other than direct human observation, IMINT is the only intelligence discipline that allows commanders to visualize the AO in near real time as the operation progresses. When maps are not available, hardcopy or softcopy versions of imagery can act as substitutes. Imagery can update maps or produce grid-referenced graphics. Detailed mission planning and intelligence preparation of the battlefield (IPB) often require imagery, including three-dimensional stereo images, to provide the degree of resolution necessary to support specialized planning.
FUNDAMENTALS
9-5. Some imagery assets are very responsive to individual commanders critical information requirements (CCIRs). Some tactical and theater imagery collection platforms can transmit imagery data directly into the command posts. Examples include data from UASs, the Joint Surveillance Target Attack Radar System (JSTARS), and Airborne Reconnaissance Low. This direct downlink enables the intelligence officer to exploit the imagery as soon as possible instead of waiting for finished imagery products. Anyone can look at an image, but a trained imagery analyst is necessary to accurately assess the intelligence value of the imaged data. 9-6. Imagery-related equipment has undergone a reduction in size. The modularity and size reduction of imagery analysis, processing, and display systems facilitates transport; this allows commanders to deploy with fewer systems while retaining capabilities and systems (or subsystems) required to complete the mission. Imagery considerations include communications bandwidth, product classification, releasability,
23 March 2010 FM 2-0 9-1
Chapter 9
and equipment and software for imagery analysts to perform their mission. Data compression allows faster transmission of imagery products directly to the warfighter.
COMMERCIAL
9-9. Commercial companies build, launch, and operate satellite and airborne imagery platforms for profit. In times of crises, license agreements with the U.S. Government obligate U.S. commercial satellite imaging systems to provide data only to the U.S. Government at the market value. This protects information concerning U.S. operations from threat exploitation from commercial systems such as Google Earth. However, the U.S. Government cannot afford to buy all the commercial imagery available for a crisis, and foreign commercial imagery systems are not bound to this arrangement; therefore, the nations enemies and adversaries may use these imagery sources. Commercial imagery has become increasingly valuable for many reasons: Due to its unclassified nature, civil and commercial imagery are useful in an open environment; they may be released to other government agencies, intergovernmental or nongovernmental organizations, and multinational partners. Civil and commercial imagery can be made available for public release. The use of civil and commercial imagery allows national technical means systems more time to focus on other intelligence functions. Civil and commercial imagery sources and companies offer electro-optical and radar imagery. Some offer large area collection useful for broad area coverage purposes, normally at a reduced resolution. 9-10. The National Geospatial-Intelligence Agency (NGA) Source Directorate is responsible for ordering commercial imagery. The Unclassified National Imagery Library is available to research Department of Defense (DOD)-purchased commercial imagery. The intelligence officer should consult the NGA Source Directorate when forming commercial imagery requests.
THEATER
9-11. Theater reconnaissance assets provide medium- to high-resolution imagery coverage to unified commands, joint task forces, or major component commands and serve to fill the gaps in coverage from national-level assets. The primary purpose of these assets is to support theater-level operations by providing imagery coverage over those gaps in national-level assets. Theater-imagery collection assets generally have more standoff capability than tactical-level assets and therefore are capable of detecting, tracking, and designating targets at a greater distance than tactical assets. This capability helps ensure greater survivability of these assets. Theater-level assets also support tactical operations when tactical collection assets are unavailable. Theater combined air operations centers hold approval authority for theater assets.
TACTICAL
9-12. Tactical commanders are engaged in the close fight and therefore have unique intelligence requirements. Tactical collection assets are used to designate and collect on tactical-level targets within the
9-2 FM 2-0 23 March 2010
Imagery Intelligence
commanders AO. These assets are used to answer intelligence requirements, such as the enemys current disposition and the enemy defensive preparations on or near friendly objectives. Tactical collection assets are organic to tactical commanders and therefore are extremely responsive to their collection requirements.
ANALYZE
9-17. Timeliness is critical not only to imagery collection but also to IMINT reporting and imagery analysis. It is difficult to separate IMINT reporting from imagery analysis in this discussion, as demonstrated below; the three phases of IMINT reporting all depend on timeliness requirements. Each phase represents a different degree of analysis and period available to accomplish imagery exploitation: First phase imagery analysis (time-dominant) is the rapid exploitation of newly acquired imagery to satisfy an immediate need based on the commanders requirements. Time-dominant exploitation and reporting are accomplished in accordance with unit standing operating procedures (SOPs) but not later than 24 hours after receipt of imagery. This phase satisfies priority intelligence requirements (PIRs) and/or identifies changes or activity of immediate significance. First phase imagery analysis normally results in an initial phase imagery report. Second phase imagery analysis is the detailed exploitation of recently acquired imagery and the reporting of imagery-derived intelligence and information while meeting the production and timeliness requirements. Other intelligence discipline source material may support second phase imagery, as appropriate, and may result in a secondary supplemental imagery report. Third phase imagery analysis is the detailed analysis of all available imagery pertinent to a specific information requirement and the subsequent production and reporting resulting from this analysis within a specified time. This phase provides an organized detailed analysis of an imagery target or topic, using imagery as the primary data source but incorporating data from other sources as appropriate.
23 March 2010
FM 2-0
9-3
Chapter 9
Ineffective during thermal crossover periods. Not easily interpretable; requires skilled analysis. Cannot penetrate clouds.
All weather; penetrates fog, haze, clouds, and smoke. Day or night use. Active sensor; does not rely on visible light or thermal emissions. Best sensor for change detection; good standoff capability. Large area coverage. Moving target detection. Large database available. Band combinations can be manipulated to enhance interpretability. Images can be merged with other digital data for higher resolution.
Not easily interpretable; does not produce a literal representation of imaged area. Requires skilled analysis. Difficult to obtain positive identification or classification of equipment.
Large files slow to ingest. Not easily interpretable; requires skilled analysis. Computer manipulation requires large memory and storage capabilities; requires large processing capabilities.
9-18. The two types of imagery exploitation are national and departmental: National exploitation is imagery exploitation that supports Presidential requirements, National Security Council requirements, congressional requirements, or requirements of a common concern to the intelligence community. Departmental exploitation is imagery exploitation that supports assigned missions of a single agency, department, or command. Imagery analysts complete departmental exploitation to satisfy requirements depending on phase and exploitation and report the results as soon as possible. Timelines for completing exploitation vary depending on unit SOPs.
ASSESS
9-19. Upon receipt, the requestor should immediately assess the imagery product for accuracy and relevance to the original request. The requestor then notifies and informs the imagery analyst of the extent to which the product answered the PIRs. Providing feedback, regarding the product, to the producer helps ensure that the producer will provide the required information in the correct format. The following are some of the questions the requestor should consider when providing feedback to the producer:
9-4 FM 2-0 23 March 2010
Imagery Intelligence
Does the product have the proper classification markings? Is the product format acceptable? Is additional product or future product information needed? Is excess product information included? Does the IMINT product satisfy the requirement?
DISSEMINATE
9-20. IMINT products are disseminated in digital and hardcopy formats. Analysts at the producing organization are responsible for ensuring dissemination. Digital dissemination is the primary means of dissemination. It can be accomplished by posting products to organizational image product libraries and intelligence community Web sites, or even disseminating directly via e-mail (such as in JPEG format). Couriers or other mail systems will distribute the hardcopy products.
PLAN
9-21. Determining requirement is the first step in planning for IMINT. The staff must clearly articulate their intelligence requirements to include communicating what the mission is and how the requested product will aid in mission accomplishment. The intelligence officer should submit the imagery, collection, and production requirements in the Geospatial Intelligence Management System (GIMS) using established procedures such as those in unit SOPs or as established by the combatant command. 9-22. The intelligence officer must also determine the specific imagery requirements to avoid burdening the system with unnecessary requests. The desire for imagery products often exceeds the capabilities of the imaging system. Therefore, it is imperative that intelligence officers consider the type of analysis needed and request only what they require. The specifications of the request for IMINT products often affect the timeliness of the response. For example, determining if vehicles are tanks requires less time and resolution than determining the make, model, and tank capabilities. 9-23. IMINT products include Imagery that detects and/or identifies and locates specific unit types, equipment, obstacles, and potential field fortifications from which intelligence analysts can assess enemy capabilities and develop possible courses of action. Imagery that updates maps and enhances the interpretation of information from maps. Detailed mission planning uses imagery including stereo images for three-dimensional viewing of the terrain. MTI and full-motion video displays or products that provide a near real-time picture of an objects movement by indicating its speed, location, and direction of travel. MTI systems do not differentiate friendly from enemy forces. Imagery that supports protection of the force by helping commanders visualize how their forces look, including their disposition, composition, and vulnerabilities, as exploited by enemy IMINT systems. Target packets with imagery of the high-value targets and high-payoff targets that include critical elements of the targets and potential collateral damage. Imagery that supports combat assessment to confirm damage, determine the percentage of damage, or whether the target was unaffected. Advanced geospatial intelligence (GEOINT) products that can determine change detection, specific weapon system identifications, chemical compositions and material content, and a threats ability to employ these weapons.
PREPARE
9-24. The intelligence officers IMINT-related actions during the prepare step include establishing or verifying the portion of the intelligence communications architecture that supports receipt, processing,
23 March 2010 FM 2-0 9-5
Chapter 9
displaying, and analysis of imagery. Additionally, the intelligence officer ensures that required IMINT analytical assets and resources are prepared to provide support or are available through intelligence reach. Lastly, the intelligence officer also ensures that IMINT reporting and dissemination channels and procedures are in place and rehearsals are conducted with all pertinent IMINT elements to ensure interoperability.
COLLECT
9-25. A given target will not necessarily receive continuous coverage due to the possible conflict between the number and priority of targets and the number and availability of imaging assets. However, a commander may decide to have continuous surveillance of certain targets, for specified periods, usually using organic imaging assets (for example, UASs) although this detracts from the commanders ability to use these assets for other imagery targets within the area of interest.
PRODUCE
9-26. The imagery analyst ensures the IMINT product satisfies the associated intelligence requirements and the product is in the required format. The quality and resolution of the product highly depends on the type of sensor, the platform, collection geometry, the time of day, and the weather conditions. The quality and resolution directly affect the imagery analysts ability to identify objects and analyze activity within the images.
9-6
FM 2-0
23 March 2010
Chapter 10
Chapter 10
intensities, dynamic motion, spectral and spatial characteristics, and the material composition of a target. Electro-optical data collection has broad application to a variety of military, civil, economic, and environmental targets. Electro-optical sensor devices include radiometers, spectrometers, nonliteral imaging systems, lasers, or laser detection and ranging systems: Infrared. A subcategory of electro-optical that includes data collection across the infrared portion of the electromagnetic spectrum where spectral and thermal properties are measured. LASER. Integration and specialized application of MASINT electro-optical and other collection to gather data on laser systems. The focus of the collection is on laser detection, laser threat warning, and precise measurement of the frequencies, power levels, wave propagation, determination of power source, and other technical and operating characteristics associated with laser systemsstrategic and tactical weapons, range finders, and illuminators. Hyperspectral imagery. A subcategory of intelligence derived from electro-optical sensors resulting from reflected or emitted energy in the visible and infrared spectrum used to improve target detection, discrimination, and recognition. Hyperspectral imagery can detect specific types of foliage (supporting drug-crop identification; disturbed soil); supporting the identification of mass graves, minefields, caches, underground facilities or cut foliage; and variances in soil, foliage, and hydrologic featuresoften supporting CBRNE contaminant detection. Spectroradiometric products. Products that include electro-optical spectral (frequency) and radiometric (energy) measurements. A spectral plot represents radiant intensity versus wavelength at an instant in time. The number of spectral bands in a sensor system determines the amount of detail that can be collected about the source of the object being viewed. Sensor systems range from multispectral (2 to 100 bands) to hyperspectral (100 to 1,000 bands) to ultraspectral (1,000+ bands). More bands provide more discrete information or greater resolution. The characteristic emission and absorption spectra serve to signature or define the makeup of the feature that was observed. A radiometric plot represents the radiant intensity versus time. An example is the radiant intensity plot of a missile exhaust plume as the missile is in flight. The intensity or brightness of the object is a function of several conditions including its temperature, surface properties or material, and how fast it is moving. For each point along a time-intensity radiometric plot, a spectral plot can be generated based on the number of spectral bands in the collector. Geophysical. Geophysical MASINT involves phenomena transmitted through the earth (ground, water, atmosphere) and manmade structures including emitted or reflected sounds, pressure waves, vibrations, and magnetic field or ionosphere disturbances. Unattended ground sensors (UGS) are an example of geophysical sensors: Seismic. The passive collection and measurement of seismic waves or vibrations in the earths surface. Acoustic. The collection of passive or active emitted or reflected sounds, pressure waves, or vibrations in the atmosphere or in the water. Water-based systems detect, identify, and track ships and submersibles operating in the ocean. Magnetic. The collection of detectable magnetic field anomalies in the earths magnetic field (land and sea). Magnetic sensors have the capability to indicate the presence and direction of travel of an object containing iron. Nuclear radiation. The information derived from nuclear radiation and other physical phenomena associated with nuclear weapons, reactors, processes, materials, devices, and facilities. Nuclear monitoring can be done remotely or during onsite inspections of nuclear facilities. Data exploitation results in characterization of nuclear weapons, reactors, and materials. A number of systems detect and monitor the world for nuclear explosions, as well as nuclear materials production.
10-2
FM 2-0
23 March 2010
Materials. The collection, processing, and analysis of gas, liquid, or solid samples. Intelligence derived from materials is critical to collection against CBRNE warfare threats. It is also important to analyzing military and civil manufacturing activities, public health concerns, and environmental problems. Samples are both collected by automatic equipment, such as air samplers, and directly by humans. Samples, once collected, may be rapidly characterized or undergo extensive forensic laboratory analysis to determine the identity and characteristics of the sources of the samples.
ROLE
10-5. MASINT provides intelligence to the commander in full spectrum operations to facilitate situational understanding. MASINT can defeat many of the camouflage, concealment, and deception techniques currently used to deceive intelligence, surveillance, and reconnaissance (ISR) systems. 10-6. By application of near real-time analysis and dissemination, MASINT has a potential ability to provide timely situational awareness and targeting not necessarily available to other disciplines. Specifically, MASINT sensors have unique capabilities to detect missile launch; detect and track aircraft, ships, and vehicles; perform noncooperative target identification and combat assessment; and detect and track fallout from nuclear detonations. Often, these contributions are the first indicators of hostile activities. 10-7. The MASINT systems most familiar on todays battlefield are employed by ground surveillance and chemical, biological, radiological, and nuclear (CBRN) reconnaissance elements. MASINT spans the entire electromagnetic spectrum and its capabilities complement the other intelligence disciplines. MASINT provides, to varying degrees, the capability to Use automatic target recognition and aided target recognition. Penetrate manmade and/or natural camouflage. Penetrate manmade and/or natural cover, including the ability to detect subterranean anomalies or targets. Counter stealth technology. Detect recently placed mines. Detect natural or manmade environmental disturbances in the earths surface not discernible through other intelligence means. Provide signatures (target identification) to munitions and sensors. Enhance passive identification of friend or foe. Detect the presence of CBRNE agents including before, during, or after employment. Detect signature anomalies that may affect target-sensing systems.
FUNDAMENTALS
10-8. Within the Department of Defense (DOD), two agencies provide policy and guidance for MASINT. The National-Geospatial Intelligence Agency (NGA) is responsible for the radar and electro-optical subdisciplines, while the Defense Intelligence Agency (DIA) maintains the other four. While NGA and DIA provide policy and guidance for MASINT, their policy and guidance do not interfere with Service component operations. Each Service has a primary command or staff activity to develop requirements and coordinate MASINT effort. The Army G-2 staff is the functional manager for Army MASINT resources, policy, and guidance. Army weapons systems programs that require MASINT information to support system design or operations, submit requests through the Army Reprogramming Analysis Team or U.S. Army Intelligence and Security Command (INSCOM) channels for data collection and processing. 10-9. The scientific and technical intelligence (S&TI) community also performs MASINT collection and processing primarily to support research and development (R&D) programs and signature development. Every S&TI center has some involvement in MASINT collection or production that reflects that center's overall mission (for example, the National Ground Intelligence Center [NGIC]) has responsibility for armored vehicles and artillery). Service R&D centers such as the Communications-Electronics Command
23 March 2010 FM 2-0 10-3
Chapter 10
Research, Development, and Engineering Center (RDEC), the Army Research Laboratory, and the Night Vision and Electronic Systems Laboratory are also involved in developing sensor systems for collecting and processing MASINT. 10-10. In addition to supporting the S&TI mission, INSCOM units also execute limited ground-based operational collection to support the Army Service component command (ASCC) and subordinate units.
ANALYZE
10-13. The intelligence staff analyzes intelligence and information about the enemys equipment, doctrine, and tactics, techniques, and procedures (TTP). Using this information, along with the knowledge of friendly force MASINT capabilities, the intelligence staff develops and refines a collection strategy to maximize the use of the units MASINT systems to answer intelligence gaps.
ASSESS
10-14. The primary goal of the MASINT assess continuing activity is to determine whether the results of MASINT collection and production meet the requirements of the units ISR effort. MASINT producers must assess all facets of MASINT operationsfrom receipt of the ISR task to the dissemination of MASINTin an effort to determine the effectiveness of MASINT. An assessment of the friendly forces capabilities must be conducted to ensure the continued effectiveness of, or to improve upon MASINT collection. This assessment is not only directed at each MASINT asset individually but also at the supporting intelligence communications architecture and the units entire ISR effort. 10-15. Additionally, the intelligence officer immediately assesses MASINT products upon receipt for accuracy and relevance. The intelligence officer must inform the MASINT producer of the extent to which the product answered the priority intelligence requirements (PIRs) or intelligence requirements. Providing feedback to the MASINT producer and collector helps improve the effectiveness and efficiency of MASINT.
DISSEMINATE
10-16. MASINT of critical importance to the force, including answers to the PIRs, is disseminated through the most expeditious means possible. 10-17. For intelligence reach operations, MASINT products are available and disseminated in a variety of forms. The requestor must ensure that the MASINT product can be transmitted over the available communications systems, including verifying the appropriate security level of the communications system.
10-4
FM 2-0
23 March 2010
PLAN
10-18. Some MASINT sensors can provide extremely specific information about detected targets, whereas other sensors may only be capable of providing an indication that an entity was detected. Additionally, there are varying capabilities of detection, identification, and classification among MASINT sensors. These varying capabilities require synchronizing the employment of MASINT sensors both within the MASINT discipline and within the ISR effort as a whole. (See FMI 2-01 for more information on ISR synchronization.) 10-19. Depending on the type of sensor employed, a given MASINT collection target or named area of interest (NAI) may not necessarily receive continuous coverage due to the possible conflict between the number and priority of targets and the number and availability of MASINT assets. However, a commander may decide to have continuous surveillance of certain targets by using available MASINT assets (for example, UGS like OmniSense, Silent Watch, and Scorpion). 10-20. Another consideration when planning MASINT missions is whether to use active, passive, or a combination of sensors when planning MASINT coverageall based on the commanders intent, the mission, the mission variables, and the capabilities of the sensors. Additionally, personnel must be detailed to emplace the sensors (and retransmission systems, if necessary) and monitor sensor reports.
PREPARE
10-21. The primary responsibilities of the intelligence officer during the prepare step of the intelligence process for MASINT is to support the operations officer in identifying the best locations to emplace MASINT assets and to ensure that the intelligence officer analysts can receive and verify the information transmitted by those assets. Additionally, the intelligence officer must ensure that required MASINT analytical assets and resources are prepared to provide support or are available through intelligence reach. Since MASINT products are not as well known as products from other intelligence disciplines, the intelligence officer must be aware of the types of MASINT products available to support the operation, and then educate the rest of the units staff on the use of these MASINT products. Lastly, the intelligence officer must also ensure MASINT reporting and dissemination channels and procedures are in place and rehearsals are conducted with all pertinent MASINT elements to ensure interoperability.
COLLECT
10-22. MASINT provides information required to answer PIRs and other intelligence requirements to support the ISR effort. To be effective, MASINT collection must be synchronized within its own discipline, and also synchronized and integrated into the units overall ISR effort. MASINT sensors are employed throughout the full spectrum of operations from a variety of platformssubsurface, ground, marine, and aerospace. 10-23. MASINT involves huge volumes of data that have to be processed before beginning analysis and production. The process function regarding MASINT involves converting raw data into a form that is suitable for performing analysis and producing intelligence. MASINT processing can include relatively simple actions (such as converting an UGS activation into a report) to a complex task (such as processing hyperspectral imagery into a report identifying the composition and concentrations of carcinogenic emissions from a factory).
PRODUCE
10-24. Effective and timely MASINT requires personnel with diverse skill sets. The MASINT producer must ensure the MASINT product satisfies the associated intelligence requirements and the product is in the required format. The quality, fidelity, and timeliness of MASINT products highly depend upon the type of target, the collection system, the systems position in relation to the target or NAI, and the weather, as well as the system operators ability to identify the appropriate threat activity. The objective of MASINT production is to develop products useable in all-source intelligence.
23 March 2010 FM 2-0 10-5
Chapter 11
Open-Source Intelligence
DEFINITION AND TERMS
11-1. Open-source intelligence is the discipline that pertains to intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement. Open-source intelligence (OSINT) is derived from the systematic collection, processing, and analysis of publicly available, relevant information in response to intelligence requirements. Two important related terms are open source and publicly available information: Open source is any person or group that provides information without the expectation of privacythe information, the relationship, or both is not protected against public disclosure. Publicly available information is data, facts, instructions, or other material published or broadcast for general public consumption; available on request to a member of the general public; lawfully seen or heard by any casual observer; or made available at a meeting open to the general public. Note. All OSINT operations conducted by intelligence personnel must comply with the legal restrictions in Executive Order 12333 (EO 12333), DODD 5100.20, and AR 381-10.
ROLE
11-2. OSINT operations are integral to Army intelligence operations. The availability, depth, and range of publicly available information enable intelligence organizations to satisfy many intelligence requirements without the use of specialized human or technical means of collection. OSINT operations support other intelligence, surveillance, and reconnaissance (ISR) efforts by providing general initial information that supports generate intelligence knowledge and enhances collection and production. As part of a singlesource and all-source intelligence effort, the use and integration of OSINT ensures commanders have the benefit of all available information.
FUNDAMENTALS
11-3. The source, the information, and the collection meansrather than a specific category of technical or human resourcesdistinguish OSINT from other intelligence disciplines. Open sources broadcast, publish, or otherwise distribute unclassified information for public use. The collection means (techniques) for obtaining publicly available information from these media of communications are unintrusive. Other intelligence disciplines use confidential sources or intrusive techniques to collect private information: Confidential source is any person, group, or system that provides information with the expectation that the information, relationship, or both, are protected against public disclosure. Private information is data, facts, instructions, or other material intended for or restricted to a particular person, group, or organization. There are two subcategories of private information: Controlled unclassified information requires the application of controls and protective measures, for a variety of reasons (that is, sensitive but unclassified, or for official use only), not including those that qualify for formal classification. Classified information requires protection against unauthorized disclosure and is marked to indicate its classified status when in written or readable form.
23 March 2010 FM 2-0 11-1
Chapter 11
11-4. The following characteristics address the role of publicly available information and OSINT in Army operations: Provides the foundation. The U.S. social structures, education system, news services, and entertainment industry shape worldview awareness of international events and perceptions of non-U.S. societies. This foundation can be an essential part of the generate intelligence knowledge continuing activity of the intelligence process. Answers requirements. The availability, depth, and range of public information enable intelligence and nonintelligence organizations to satisfy many of the commanders critical information requirements (CCIRs) (priority intelligence requirements [PIRs] and friendly force information requirements [FFIRs]) and information requirements without the use of specialized human or technical means of collection. Given the volume, scope, and quality of publicly available information, OSINT operations can often proceed directly from the planning step to the production step of the intelligence process. Enhances collection. Open-source research and collection support other surveillance and reconnaissance activities by answering requirements and providing foundational information (biographies, cultural information, geospatial information, technical data) that optimizes the employment and performance of sensitive human and technical means of collection. Enhances production. As part of single-source and all-source intelligence production, the use and integration of OSINT ensures commanders have the benefit of all sources of available information.
Open-Source Intelligence
Classification. Deconfliction. Deception and bias. Intellectual property. Open sources and information.
COMPLIANCE
11-9. Under AR 381-10, procedure 2, Army intelligence activities may collect publicly available information on U.S. persons only when it is necessary to fulfill an assigned function. There must also be a link between the collection of the U.S. person information and the Army intelligence organizations assigned mission. Army intelligence components must exhaust the least intrusive collection means before requesting a more intrusive collection means. The following are additional considerations for Internet collection: Army intelligence components must use Government computers to access the Internet for official Government business unless otherwise authorized. Internet protocol addresses, uniform resource locators (URLs), and e-mail addresses that are not self-evidently associated with a U.S. person may be acquired, retained, and processed by Army intelligence components without making an effort to determine whether they are associated with a U.S. person as long as the component does not engage in analysis focused upon specific addresses. Once such analysis is initiated, the Army intelligence component must make a reasonable and diligent inquiry to determine whether the data is associated with a U.S. person.
LIMITATIONS
11-10. Intelligence personnel and organizations must comply with applicable Department of Defense (DOD) directives and Army regulations that govern contact with and collection of information from open sources. For example, DODD 5100.20 prohibits signals intelligence (SIGINT) organizations from collecting and processing information from public broadcasts with the exception of processing encrypted or hidden meaning passages. AR 380-13 prohibits the assignment of Army, military, or civilian personnel to attend public or private meetings, demonstrations, or other similar activities held off-post, to acquire counterintelligence (CI) investigative information without specific approval by the Secretary of Defense or the Undersecretary of the Army.
OPERATIONS SECURITY
11-11. More than any other intelligence discipline, the OSINT discipline could unintentionally provide indicators of U.S. military operations. Information generally available to the public as well as certain detectable activities, such as open-source research and collection, can reveal the existence of, and sometimes details about, classified or sensitive information or undertakings. Such indicators may assist those seeking to neutralize or exploit U.S. military operations. Purchasing documents, searching an Internet site, or asking questions at public events are examples of detectable open-source research and collection techniques that could provide indicators of U.S. plans and operations. 11-12. Taking OPSEC into consideration, organizations must determine what level of contact with open sources and which collection techniques might provide indicators that an enemy could piece together in time to affect U.S. military operations. In OSINT operations, countermeasures range from limiting the frequency or duration of contact with a source to prohibiting all contact with a source. If OPSEC so requires, such as to protect a Government computer from hacker retaliation, a direct reporting unit commander may approve nonattributable Internet access.
CLASSIFICATION
11-13. AR 380-5 states that intelligence producers must be wary of applying so much security that they are unable to provide a useful product to their consumers. This is an appropriate warning for OSINT
23 March 2010 FM 2-0 11-3
Chapter 11
operations where concern for OPSEC can undermine the ability to disseminate inherently unclassified information. As shown in table 11-1, the classification of source metadata, collector metadata, collected information, and derivative intelligence differs based on the means of collection and the degree of damage to national security that disclosure of this information could reasonably be expected to cause. Since it is already in the public domain, publicly available information and the source metadata are unclassified. AR 380-5, chapter 4, directs that Army personnel will not apply classification or other security markings to an article or portion of an article that has appeared in a newspaper, magazine, or other public medium. For reasons of OPSEC, the classification of collector information is controlled unclassified or classified information. Table 11-1. Open-source intelligence classification considerations
If Information source Collection means Overt Clandestine Overt Open Nonattributable Unclassified Source metadata Classified or controlled unclassified Classified Collector metadata Classified or controlled unclassified Classified Controlled unclassified Classified or controlled unclassified Then Collected information Classified or controlled unclassified Intelligence report Classified or controlled unclassified Classified, controlled unclassified, or unclassified
Confidential
Unclassified
Note. This table is prescriptive not directive. Organizations with original classification authority or personnel with derivative classification responsibilities must provide subordinate organizations and personnel with a security classification guide or guidance for information and intelligence derived from open sources in accordance with the policy and procedures in AR 380-5.
11-14. According to AR 380-5, chapter 2, a compilation of unclassified publicly available information into an intelligence product (estimate, report, or summary) is normally not classified. In unusual circumstances, the combination of individual unclassified items of information into an intelligence product may require classification if the compilation provides an added factor that warrants classification. 11-15. AR 380-5, chapter 6, provides a list of factors or classification considerations that include but are not limited to the following: Intelligence that reveals the identity of a conventional source or method that normally does not require classification. Intelligence identifying a sensitive source or method is classified, as well as the evaluation of the particular source or method. An intelligence requirement is classified when it reveals what is not known, what is necessary to know, and why. Note. The intelligence staff creates sanitized, unclassified collection tasks from the intelligence requirements since uncleared U.S. and non-U.S. persons comprise a significant portion of opensource collectors. Information that would divulge intelligence interests, value, or extent of knowledge on a subject. Information related to political or economic instabilities in a foreign country threatening American lives and installations there.
11-4
FM 2-0
23 March 2010
Open-Source Intelligence
DECONFLICTION
11-16. During planning, both the intelligence and operations officer staffs must deconflict OSINT operations with other activities. Specifically, contact or interaction with open sources may compromise the operations of another intelligence discipline. Open-source collection may adversely affect the ability of nonintelligence organizationssuch as civil affairs (CA), the military police (MPs), medical, and public affairsto accomplish their missions. Conversely, CA, MPs, medical, public affairs, or other personnel who overtly contact an OSINT source, may inadvertently compromise OSINT operations as well as the safety of the open source or collector. Each of these situations could lead to the loss of access to the open source and information of intelligence value.
INTELLECTUAL PROPERTY
11-19. AR 27-60 prescribes policy and procedures for the acquisition, protection, transfer, and use of patents, copyrights, trademarks, and other intellectual property by the Department of the Army. It is Army policy to recognize the rights of copyright owners consistent with the Armys unique mission and worldwide commitments. As a rule, Army organizations will not reproduce or distribute copyrighted works without the permission of the copyright owner unless such use is within an exception under U.S. copyright law or required to meet an immediate, mission-essential need for which noninfringing alternatives are either unavailable or unsatisfactory. 11-20. According to the U.S. Copyright Office, fair use of a copyrighted work for purposes such as criticism, comment, news reporting, teaching, scholarship, or research, is not an infringement of copyright. Implicit with fair use is the documentation and citation of the source of the copyrighted information. The following are four factors in determining fair use: Purpose and character of the use. In the context of fair use, intelligence operations are similar in purpose and usage to nonprofit news reporting and research organizations. Nature of the copyrighted work. Amount and substantiality of the portion used in relation to the copyrighted work as a whole. There is no specific number of words, lines, or notes that may safely be taken without permission. Usually, the amount or portion of copyrighted material is limited to quotations of excerpts and short passages, and summary of a speech or article, with brief quotations. Effect of the use upon the potential market for or value of the copyrighted work. The effect on the market or value of copyrighted material relates to reproduction and dissemination of
23 March 2010
FM 2-0
11-5
Chapter 11
products provided by the owner beyond that authorized the owners terms of use or described in contracts and licenses with the U.S. Government.
OPEN-SOURCE MEDIA
11-22. A simple communications model consists of a sender, a message, a medium, and a receiver. The medium is the access point to publicly available information for open-source research and collection. The primary media that open sources use to communicate information to the public are shown in table 11-2, page 11-7, and discussed below.
PUBLIC DOCUMENTS
11-25. A document is any recorded information regardless of its physical form or characteristics. Like public speaking, public documents have always been a source of intelligence. Documents provide in-depth information about the operational environment that underpin the ability to plan, prepare for, execute, and assess military operations. During operations, documents, such as newspapers and magazines, provide insights into the effectiveness of information tasks, especially information engagement. Books, leaflets, magazines, maps, manuals, marketing brochures, newspapers, photographs, public property records, and other forms of recorded information continue to yield information of intelligence value about operational environments. Sustained document collection contributes to the development of studies about potential
11-6 FM 2-0 23 March 2010
Open-Source Intelligence
operational environments. Collection of documents on the operational and technical characteristics of foreign materiel aid in the development of improved U.S. tactics, countermeasures, and equipment. Table 11-2. Primary open-source media
System Components Speaker Public speaking Format Audience Graphic Public documents Recorded Printed Sponsor Relationship Conference Debate Demonstration Location Drawing Engraving Painting Compact data storage device Digital video disk Book Brochure Newspaper Low frequency AM radio Medium frequency AM radio Elements Message Lecture Rally Composition Photograph Print Hard disk Tape Periodical Pamphlet Report VHF FM radio L- and S-band satellite radio
Public broadcasts
Ku band satellite television VHF and UHF terrestrial television Chat E-mail News; newsgroup Commerce Education Commerce Education Dictionary Directory Downloads Financial
URL VHF
Web cam Web cast Web log Government Military organizations Government Military organizations Geospatial Search and URL lookup Technical support Translation
Internet sites
AM FM UHF
PUBLIC BROADCASTS
11-26. A public broadcast entails the simultaneous transmission of data or information for general public consumption to all receivers or terminals within a computer, radio, or television network. Public broadcasts are important sources of current information about the operational environment. Television news broadcasts often provide the first indications and warning (I&W) of situations that may require the use of U.S. forces. Broadcast news and announcements enable personnel to monitor conditions and take appropriate action when conditions change within the AO. News, commentary, and analysis on radio and television also provide windows into how governments, civilians, news organizations, and other elements of society perceive the United States and U.S. military operations. Broadcasts also provide information and insights into the effectiveness of information tasks.
23 March 2010
FM 2-0
11-7
Chapter 11
INTERNET SITES
11-27. Army intelligence components must use Government computers to access the Internet for official Government business unless otherwise authorized (for example, an Army Reservist participating in the World Basic Information Library Program). 11-28. Internet sites enable users to participate in a publicly accessible communications network that connects computers, computer networks, and organizational computer facilities around the world. The Internet is more than just a research tool; it enables intelligence personnel to locate and observe open sources of information. Through the Internet, trained collectors can detect and monitor Internet sites that may provide I&W of enemy intentions, capabilities, and activities. 11-29. Collectors can monitor newspaper, radio, and television Web sites that support assessments of information tasks, especially information engagement. Collectors can conduct periodic searches of Web pages and databases for content on threat characteristics. Collecting Web page content and links can provide useful information about relationships between individuals and organizations. If properly focused, collecting and processing publicly available information from Internet sites can support understanding of the operational environment.
11-8
FM 2-0
23 March 2010
Chapter 12
Signals Intelligence
DEFINITION
12-1. Signals intelligence is intelligence derived from communications, electronic, and foreign instrumentation signals (JP 2-0). Signals intelligence (SIGINT) provides unique intelligence information, complements intelligence derived from other sources, and is often used for cueing other sensors to potential targets of interest. For example, SIGINT, which identifies activity of interest, may be used to cue geospatial intelligence (GEOINT) to confirm that activity. Conversely, changes detected by GEOINT can cue SIGINT collection against new targets. The discipline is subdivided into three subcategories: Communications intelligence (COMINT). Electronic intelligence (ELINT). Foreign instrumentation signals intelligence (FISINT).
COMMUNICATIONS INTELLIGENCE
12-2. Communications intelligence is technical information and intelligence derived from foreign communications by other than the intended recipients (JP 2-0). COMINT includes cyber operations, which is gathering data from target or adversary automated information systems or networks. COMINT also may include imagery, when pictures or diagrams are encoded by a computer network or radio frequency method for storage and/or transmission. The imagery can be static or streaming.
ELECTRONIC INTELLIGENCE
12-3. Electronic intelligence is technical and geolocation intelligence derived from foreign noncommunications electromagnetic radiations emanating from other than nuclear detonations or radioactive sources (JP 3-13.1). ELINT consists of two subcategoriesoperational ELINT (OPELINT) and technical ELINT (TECHELINT): OPELINT is concerned with operationally relevant information such as the location, movement, employment, tactics, and activity of foreign noncommunications emitters and their associated weapon systems. TECHELINT is concerned with the technical aspects of foreign noncommunications emitters, such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels.
ROLE
12-5. SIGINT provides intelligence on threat capabilities, disposition, composition, and intentions. In addition, SIGINT provides targeting information for the delivery of lethal and nonlethal fires.
23 March 2010
FM 2-0
12-1
Chapter 12
FUNDAMENTALS
12-6. The intelligence officer must understand how SIGINT assets are organized not only within the Army but also throughout the Department of Defense (DOD). The majority of SIGINT assets from all the armed services, combined with national SIGINT assets, work together to support commanders from the tactical to the strategic level. Only by understanding the SIGINT structure that transcends traditional Service component boundaries can the intelligence officer understand how to use SIGINT effectively.
12-2
FM 2-0
23 March 2010
Signals Intelligence
Comprehensive technical SIGINT information to support collection, processing, analysis, and reporting, as well as collateral support for the units SIGINT/electronic warfare (EW) mission. Information on current world situations and friendly and threat military operations, tailored to a given units mission. Assistance in identifying hardware and software to carry out specific training and operational missions beyond the capability of organic equipment and systems. Advising Army tactical SIGINT personnel, at all levels, to reach and maintain an operational readiness posture by using ATCAE mobile training teams, the TROJAN program, and SIGINT Foundry Garrison Cryptologic Activities assets. Electronic quality control of unit reporting and forwarding to national time-sensitive systems. Assistance in obtaining SIGINT communications network connectivity and accesses to national assets including databases. Assistance in reviewing and recommending modifications to U.S. SIGINT directives on behalf of the tactical ground units SIGINT technical issues.
23 March 2010
FM 2-0
12-3
Chapter 12
ANALYZE
12-19. The SIGINT analyst evaluates intelligence and information about the enemys communications capabilities to determine appropriate SIGINT collection strategies. Conversely, a corresponding analysis of the friendly forces SIGINT capabilities must be conducted to ensure the continued effectiveness of, or to improve upon, SIGINT collection. SIGINT analysts also sort through large amounts of signals information and intelligence to identify and use only, that which pertains to the commanders critical information requirements (CCIRs) (PIRs and friendly force information requirements [FFIRs]).
ASSESS
12-20. The primary goal of the assess continuing activity applied to SIGINT is to determine whether the results of SIGINT collection meet the requirements of the units ISR effort. To determine effectiveness, SIGINT producers must assess all facets of SIGINT operationsfrom receipt of the ISR task to the dissemination of SIGINT reports and products. This assessment is not only directed at SIGINT assets on an individual basis, but also includes the supporting SIGINT architecture and the units entire ISR effort. 12-21. The intelligence officer immediately assesses SIGINT products upon receipt for timeliness, relevance, and accuracy. They must inform the SIGINT producer of the extent to which the product answered the intelligence requirement. Feedback is provided to the SIGINT producer and collector; this reinforces the effectiveness and efficiency of SIGINT.
12-4
FM 2-0
23 March 2010
Signals Intelligence
DISSEMINATE
12-22. SIGINT of critical importance to the force, including answers to the CCIRs (PIRs and FFIRs), is disseminated through the most expeditious means possible. Due to the highly perishable nature of SIGINT, the most expeditious reporting means is often immediately augmented with a follow-up report or augmented by a report transmitted through additional means, thus enhancing the probability of receipt. Sometimes the most expeditious means of reporting critical SIGINT information to the commander is face to face. Sanitized SIGINT reports and tactical reports can be sent on lower classification systems, such as the Secure Internet Protocol Routing Network (SIRPNET), to ensure distribution to commanders at lower echelons. 12-23. For intelligence reach operations, SIGINT products are available and disseminated in a variety of formshardcopy, softcopy, direct viewing, or broadcast. Time-sensitive reporting keeps NSA, commanders, and non-SIGINT organizations advised on the status of current and potential threats. It is imperative to ensure that SIGINT products are only transmitted over communications systems at the appropriate classification level.
PLAN
12-24. An important SIGINT planning consideration is that, when possible, SIGINT collection should be employed in conjunction with other intelligence disciplines collection systems. SIGINT is often used to cue, and be cued by, other ISR assets. 12-25. During planning, the SIGINT technical control element retrieves, updates, and develops any required SIGINT databases. This includes coordination with air and ground assets, other SIGINT assets, or elements that support the operation, as well as SIGINT assets that will operate in another units AO.
PREPARE
12-26. Prepare involves operational direction and control of SIGINT activities, including tasking and the allocation of effort. OPCON of SIGINT assets provides an authoritative prescription for SIGINT activities including the uniform techniques and standards by which SIGINT information is collected, processed, and reported. 12-27. SIGINT operational tasking encompasses the direct levying of SIGINT information requirements by a military commander on designated SIGINT resources. This includes the authority to deploy all or part of the SIGINT resources for which SIGINT operational tasking authority has been delegated. 12-28. The commander ensures the SIGINT unit and asset leaders have conducted all necessary coordination and rehearsals, which includes establishing or verifying the operation of the SIGINT technical architecture. 12-29. The intelligence officer and SIGINT asset commander validate the availability of SIGINT assets and NSA databases and records. SIGINT reporting and dissemination channels and procedures need to be in place. Deploying personnel require deployment training and a current polygraph to qualify for access to resources, appropriate and necessary database access, and connectivity and interoperability with all appropriate SIGINT elements. Courses such as Deployer (DEPL) 2000 help prepare SIGINT Soldiers for deployment.
COLLECT
12-30. SIGINT performs two major collection activities: signals intercepts and direction finding (DF). The collect step also includes signals processing.
23 March 2010
FM 2-0
12-5
Chapter 12
Signals Intercepts
12-31. Signals intercepts include those SIGINT actions used to search for, intercept, and identify threat electromagnetic signals for the purpose of immediate threat recognition. Signals intercept provides information required to answer PIRs and other intelligence requirements to support the ISR effort.
Direction Finding
12-32. Even when threat radio operators use communications security procedures, SIGINT teams can often intercept and approximate the location of the threats signals. SIGINT teams can use DF to determine the movement of threat personnel or equipment, locations of emitters associated with weapon systems and units, new and confirmed emitter locations, and friendly targets the threat might intend to attack (lethal and nonlethal). 12-33. In addition to using DF to intercept and approximate the location of threat forces, DF operations can assist the radio-equipped friendly force by locating and vectoring assets or units during limited visibility, locating downed aircraft and personnel radio beacons, conducting signal security assessments; and locating sources of communication interference and jamming.
PRODUCE
12-36. The SIGINT analyst provides SIGINT products to satisfy the intelligence requirements, in the required format and in a timely manner. The quality and timeliness of SIGINT products highly depend on the type of intercept, the collection system, the systems position in relation to the threat emitter and the weather, as well as the SIGINT operators ability to identify the appropriate threat signal activity. SIGINTs objective is to be used in all-source analytical production. 12-37. There are a number of products generated from SIGINT. SIGINT reports are time-sensitive in nature and will contain anything from a traditional text formatted report to nontraditional reports comprised of color graphics, sound, and/or video clips. SIGINT reports produced have titles such as (although not limited to) klieglights, tactical reports, and tactical ELINT reports and contain caveats that allow or restrict intelligence information to individuals with a need to know.
Signals Intelligence
the intelligence community for further exploitation after the operational commanders ES requirements are met. (See JP 3-13.1.) 12-40. SIGINT can support and be supported by the components of EW. This means preserving the electromagnetic spectrum for friendly use while denying its use to the adversary. ES data can be used to produce SIGINT; this provides intelligence information for electronic or lethal attack or targeting.
23 March 2010
FM 2-0
12-7
Chapter 13
Technical Intelligence
DEFINITION
13-1. Technical intelligence is derived from the collection, processing, analysis, and exploitation of data and information pertaining to foreign equipment and materiel for the purposes of preventing technological surprise, assessing foreign scientific and technical capabilities, and developing countermeasures designed to neutralize any adversarys technological advantages (JP 2-0).
ROLE
13-2. A strength of the U.S. military is the diversity and extent of its technology base. While the U.S. is one of the world leaders in integrating technology, the threat can achieve temporary technological advantage in certain areas by acquiring modern systems or by improvising new weapons. The world arms market is willing to provide advanced systems to countries or individuals with the resources to pay for them. A concerted technical intelligence (TECHINT) enterprise is vital to providing precise direction and purpose to Department of Defense (DOD) research and development (R&D) and exploitation process to ensure quick and efficient neutralization of threat technological advantages and networks. 13-3. The role of TECHINT is to ensure that the warfighter understands the full technological capabilities of the threat. With this understanding, the U.S. forces can adopt appropriate countermeasures, operations, and tactics. 13-4. TECHINT has three goals within its role: To ensure the U.S. armed forces maintain technological advantage against any threat. To provide timely, relevant, accurate, predictive, and tailored TECHINT support to the warfighter throughout the full spectrum of military operations including using captured enemy materiel (CEM) to provide U.S. forces intelligence, information, and training on foreign weapons systems. To analyze certain design traits of foreign weapons systems to develop, confirm, or deny indicators of threat intent. 13-5. TECHINT includes the subset weapons technical intelligence (WTI), which combines forensic science with TECHINT for application against irregular and nontraditional threats. As such, WTI has four goals: To forensically examine events and/or devices or weapons to better understand linkages between technical design and tactical use to guide efforts of the protection warfighting function. To enable targeting by identifying, selecting, prioritizing, and tracking individuals and matching them with groups, weapons materiel, financiers, suppliers, insurgent leaders, and other related elements. To provide limited forensic analysis of improvised explosive devices (IEDs), improvised weapons, and weapon components to identify the origin of materiel and components. To use information from CEM collected during site exploitation activities to further detain and potentially support the prosecution of individuals for criminal activity.
23 March 2010
FM 2-0
13-1
Chapter 13
FUNDAMENTALS
13-6. The fundamentals of TECHINT consist of TECHINT/WTI application in full spectrum operations and the importance of chain of custody.
CHAIN OF CUSTODY
13-10. The proper documentation of CEM is a key factor in producing accurate and relevant TECHINT for the commander. For example, linking the capture location details of employment and the list of associated CEM can yield a significant amount of exploitable information. 13-11. Specifically, the proliferation of weapons from nation states and nonstate actors can reveal thirdparty influences; properly recorded weapons emplacement can identify the effectiveness of weapons against U.S. forces. Additionally, proper chain of custody is necessary in linking individuals and threat networks with weapons and materiel and/or events. The information gained through exploitation may eventually be used in U.S. or host-nation legal proceedings.
Technical Intelligence
acquires, produces, maintains, and disseminates S&TI pertaining to missile and space weapons systems, subsystems, components, and activities. The S&TI produced at MSIC also covers foreign state-of-the-art technology and research applicable to missiles. Defense HUMINTconducts worldwide human intelligence (HUMINT) operations to support foreign materiel acquisition (FMA) and foreign materiel exploitation (FME). 13-14. The organizations and agencies below constitute the Army TECHINT structure.
Chapter 13
Research Laboratory System, and the U.S. Army Test and Evaluation Command. Each element plays a role in operations by conducting highly technical evaluations of foreign equipment. 13-18. Both in times of conflict and otherwise, the AMC conducts FME on equipment purchased by individual RDECs, supplied by the intelligence community, or recovered in theater. Results are provided to the intelligence community, the U.S. R&D community, and the rest of DOD. AMCs foreign ordnance exploitation capability resides within the Explosive Ordnance Disposal (EOD) Technology Directorate located at the Armament Research Development and Engineering Center (ARDEC), Picatinny Arsenal. The capability resides within two teams in the directorate: The Foreign Ordnance team: Collects and exploits foreign explosive ordnance. Develops render-safe and disposal procedures for foreign explosive ordnance. Prepares detailed intelligence reports and other publications to support the EOD, intelligence, and U.S. R&D communities. The Foreign Materiel Exploitation team: Conducts detailed multidisciplinary exploitation of selected foreign explosive ordnance items as directed by the intelligence community and other customers, including both laboratory and live testing activities. Prepares detailed foreign materiel test reports to disseminate test results to the intelligence and U.S. R&D communities. Prepares foreign weapon system download procedures in support of EOD. 13-19. There are many other agencies with TECHINT responsibilities within the DOD. Refer to TC 2-22.4 for more information on TECHINT.
Technical Intelligence
IEDs through various electronic means with deadly accuracy most likely resulting in high casualty rates. CIED training in theater and at home station results in Soldier readiness and also prepares units with intelligence and knowledge to understand and attack insurgent networks. Unit and institutional training for TECHINT teams provides a key combat multiplier. It also provides the use of knowledge centers through intelligence reach and the Distributed Common Ground System-Army (DCGS-A). TECHINT databases serve units in contact as well as follow-on and redeployed units to support Army force generation (ARFORGEN), particularly in terms of overwatch and lessons learned.
ANALYZE
13-24. TECHINT analysts use checklists established by S&TI agencies and the joint captured materiel exploitation centers (JCMECs) to analyze each type of the threats equipment for which requirements exist. Analysis always begins with what is known and what is not known about the piece of equipment. TECHINT units maintain procedures and plans for sampling, analyzing, and handling materiel.
ASSESS
13-25. The primary goal of the TECHINT assess continuing activity is to determine whether the results of TECHINT production meet the units priority intelligence requirement (PIRs) and intelligence requirements. The intelligence officer immediately assesses TECHINT products upon receipt for timeliness, relevance, and accuracy. The intelligence officer must inform the TECHINT producer of the extent to which the product answered the PIRs or intelligence requirements. Providing feedback to TECHINT analysts helps improve the effectiveness and efficiency of TECHINT. 13-26. The intelligence officer also assesses the success of the units intelligence, surveillance, and reconnaissance (ISR) effort in accomplishing any TECHINT-associated ISR task, and shares the assessment with the staff and the pertinent units or personnel.
DISSEMINATE
13-27. TECHINT organizations post intelligence studies and TECHINT reports through secure databases as well as through existing intelligence communications architecture. When possible, the preparing organizations share findings with other fusion and analysis elements. Additionally, TECHINT contributes information about threat weapons and equipment and their effectiveness against U.S. forces. 13-28. Relevant TECHINT findings are shared with higher headquarters for operational and strategic application, with adjacent units for pattern and trend analysis, and with lower echelons for situational awareness and general knowledge. They are often used in the development of tactics, techniques, and procedures (TTP). Direct dissemination of information contained in TECHINT databases should be sent to the unit responsible for the capture and/or collection of the material, connecting the technical expert with the operational and tactical commanders as often as possible. 13-29. TECHINT of critical importance to the force is disseminated through the most expeditious means possible. Routine TECHINT reports and products are usually transmitted through the units existing intelligence communications architecture as a preliminary technical report. 13-30. For intelligence reach operations, TECHINT products are available and disseminated in a variety of forms. The requestor must ensure that the TECHINT product can be transmitted over the available communications systems. This includes verifying the appropriate security level of the communications systems.
PLAN
13-31. Based on the information or intelligence from the generate intelligence knowledge continuing activity, the intelligence officer refines PIRs and information requirements including TECHINT considerations. Planning must include specialized TECHINT support for both preplanned and contingency
23 March 2010
FM 2-0
13-5
Chapter 13
operations to ensure these teams are positioned in accordance with operational needs. TECHINT planning considerations include Task-organizing ground reconnaissance units with TECHINT teams or weapons intelligence teams to employ forensics capabilities. Linguists for translation and transliteration. Intelligence reach capability to access and query databases and knowledge center analysts. Intelligence preparation of the battlefield (IPB) including identification of named areas of interest (NAIs) and target areas of interest (TAIs). Joint capabilities ISR including special operations forces (SOF). 13-32. As other mission requirements change, TECHINT planning is synchronized with operations.
PREPARE
13-33. Training Soldiers is the basis for successful operations. The intelligence officer must ensure that required TECHINT analytical assets, resources, and evacuation means are available to provide support. This includes verifying coordination with the task-organized TECHINT teams from the 203d MI Battalion. The intelligence officer must also ensure the means to report and disseminate TECHINT collection to the unit are in place so they can immediately adopt appropriate countermeasures, operations, or tactics to enhance their survival and mission accomplishment. 13-34. Once an operation order (OPORD), operation plan (OPLAN), or warning order (WARNO) related to a TECHINT mission is issued, units may adjust their planning and collaborate with analytical agencies to augment operations. In addition, the intelligence officer must ensure that required TECHINT analytical assets, resources, and evacuation means are prepared to provide support. 13-35. The intelligence officer must also ensure the means, such as DCGS-A, to report and disseminate TECHINT results to the unit and its Soldiers are in place so they can immediately adopt appropriate countermeasures, operations, or tactics to enhance their survival and mission accomplishment.
COLLECT
13-36. TECHINT collection includes capturing, reporting, and evacuating CEM. TECHINT collection begins when an organization or individual reports the recovery or acquisition of threat materiel or as ordered by a commander. Each CEM may be exploited at each level unless prohibited by higher headquarters, and continues through succeeding higher levels until an appropriate countermeasure to neutralize the CEM capabilities is identified or developed. 13-37. U.S. forces safeguard CEM and report it through intelligence channels to the first TECHINT element in the reporting chain. The location of this TECHINT element will be in accordance with mission, enemy, terrain and weather, troops and support available, time available, and civil considerations (METTTC) factors; however, the TECHINT representative or element will verify if the type of materiel is of intelligence value and determine its further disposition in conjunction with the units staff. 13-38. TECHINT processing starts (simultaneously with collection) with the capture of a piece of equipment of TECHINT value. In accordance with METT-TC factors, a TECHINT team may move to the location of the item at the capture site or wait until the item is evacuated before conducting initial exploitation. 13-39. After initial exploitation, the team decides if further processing is required. If it is, the items are sent to the appropriate exploitation center. If the item is deemed to yield no immediate tactical intelligence value, it may still be evacuated to the S&TI centers in the continental United States (CONUS) for further analysis as the systems may represent a change to the threats technological capabilities.
13-6
FM 2-0
23 March 2010
Technical Intelligence
PRODUCE
13-40. TECHINT teams normally report initial and secondary examinations of CEM using either a preliminary technical report or a complementary technical report: A preliminary technical report Includes a general description of the item. Alerts others to information that can be used immediately by tactical units. A complementary technical report is more in-depth and Follows a secondary or an in-depth initial examination. Allows the JCMEC to compare new information with intelligence holdings. 13-41. At each successive echelon of exploitation, TECHINT analysts add to the overall body of information on an item by either adding to previous reports or by preparing new reports. The JCMEC or other national level S&TI activities prepare more advanced technical reports and analyses. These reports include Detailed technical reports. Translation reports. Special technical reports. 13-42. Other TECHINT products include JCMEC publications such as operator manuals, maintenance manuals, TECHINT bulletins, and tactical user bulletins. S&TI analysis bulletins. FME reports. Weapons intelligence team reports.
23 March 2010
FM 2-0
13-7
Appendix A
INTELLIGENCE ESTIMATE
A-3. The primary purpose of the intelligence estimate is to Determine the full set of courses of action (COAs) open to the threat and the probable order of their adoption. Disseminate information and intelligence. Determine requirements concerning the threat and other relevant aspects of the area of operations (AO). A-4. The intelligence estimate is a logical and orderly examination of the intelligence factors affecting the accomplishment of a mission. It provides commanders with an analysis of the AO and the threat strength and capabilities that can influence their mission. It is used as a basis for planning and disseminating intelligence. A-5. An intelligence estimate may be prepared at any level. It may be written or oral, formal or informal, detailed or summarized. It is normally written at division and higher levels and briefed down to the battalion level. The following is an example of the basic information and intelligence that could be included in an intelligence estimate. This is neither an all-inclusive nor directed format: Mission. Analysis of the area of operations. This analysis of the terrain is based on The military aspects of terrain (observation and fields of fire, avenues of approach, key and decisive terrain, obstacles, and cover and concealment). Other significant characteristics. The effects of the terrain on friendly and threat operations. The current weather conditions based on the military aspects of weather (visibility, wind, precipitation, cloud cover, temperature, and humidity). Weather effects on friendly and threat operations. Relevant climatological data. Projected weather forecast with significant trends for the season and specific geographic location. An analysis of the civil considerations and projected effects of the civil considerations on friendly and threat operations, and vice versa.
23 March 2010 FM 2-0 A-1
Appendix A
Current threat situation. This is based on the threat characteristics (see FM 2-01.3). This includes estimates of the strength of threat forces, recent significant threat activities and trends, and threat peculiarities and weaknesses. Threat capabilities. This includes both an overview and a detailed analysis and discussion of as many threat COAs as the intelligence staff has been able to develop. Summary of the most significant points. This includes The most significant terrain and weather and civil considerations effects on operations. Potential impacts of operations on terrain and civil considerations. At a minimum, the most likely and most dangerous threat COAs. The most significant threat vulnerabilities. A-6. The intelligence estimate also includes four tabs: Tab A (Terrain). Terrain is developed primarily by the engineer coordinator. Tab B (Weather). Weather is developed primarily by the staff weather officer. Tab C (Civil Considerations). Civil consideration products are developed primarily by the intelligence officer, in coordination with the rest of the staff. Tab D (Intelligence Preparation of the Battlefield [IPB]). IPB products are developed primarily by the intelligence officer, in coordination with the rest of the staff.
INTELLIGENCE SUMMARY
A-8. The INTSUM contains a brief summary of the most current threat situation covering a period designated by the commander. This period will vary with the desires of the commander and the requirements of the situation. It provides a summary of the enemy situation, enemy operations and capabilities, and the characteristics of the terrain and weather and civil considerations. An INSTUM can be presented in written, graphic, or oral format, as directed by the commander. A-9. The INTSUM aids in assessing the current situation and updates other intelligence reports. Negative information is included, but no operational information is excluded. The INTSUM reflects the intelligence officers interpretation and conclusions regarding threat capabilities and probable COAs, as well as civil considerations. The INTSUM is prepared at brigade and higher echelons and disseminated to higher, lower, and adjacent units. The INTSUM has no prescribed format except INTSUM will be the first item of the report. The following is an example of the basic information and intelligence that should be included in an INTSUM. This is neither an all-inclusive nor directed format: Date-time group (DTG) of the INTSUM and time period the INTSUM covers. Weather and weather effects that include the current conditions based on the military aspects of weather (visibility, wind, precipitation, cloud cover, temperature, and humidity), an extended forecast (5-7 days), projected weather impacts on specific friendly and threat systems and operations, light data. Significant threat activities over the reporting period and a near-term analysis of threat intent and activity. Significant impacts of civil considerations on operations and vice versa. Subunit assessments of significant threat activities and civil considerations in their AOs over the reporting period and a near-term analysis of threat intent and activity.
A-2
FM 2-0
23 March 2010
Notable trends in threat activity (indications and warning [I&W]) over a designated period of time (such as the previous 14 days). This may be presented as an all-source analysis product or focused on specific threat activities of interest to the commanderor both. This portion of the INTSUM should highlight new or emerging threats and level of impact that each threat may present to the units operations. Battle damage assessment (BDA) roll-up includes known or estimated threat unit strengths, significant threat systems degraded or destroyed, and all known captured, wounded, or killed threat personnel during the reporting period. Written enemy situation and/or situation template (as of a specific DTG). Assessments include a near-term and a long-term assessment of threat activities with as much detail as possible based on available information and current intelligence analysis. High-payoff target list (HPTL) (in coordination with the targeting officer). High-value target (HVT) list (in coordination with the targeting officer) may include highvalue individuals, depending on the unit mission. Current PIRs and projected PIRs by phase. ISR synchronization tools and products. Special assessments are developed for any unique circumstance that requires additional analysis.
23 March 2010
FM 2-0
A-3
Appendix B
Language Support
ROLE OF LINGUISTS
B-1. Military operations are highly dependent on military- and contractor-provided foreign language support. The requirement to communicate with and serve on multinational staffs, communicate with local populations, and exploit enemy forces necessitates the use of linguists. The growing focus on multinational operations increases the competition for limited linguist resources that are vital for mission success. This appendix establishes the framework and process to access, prioritize, and employ the Armys limited organic linguist resources.
23 March 2010
FM 2-0
B-1
Appendix B
Language Support
Identify category II and category III linguist requirements. Evaluate and/or use local maps and terrain products in operations. Process for MI purposes material taken from detainees or civilian internees. At lower echelons, conduct Soldier surveillance and reconnaissance. Assess local open-source information for intelligence value. Coordinate intelligence and liaison with multinational and host-nation counterparts. Determine, during the initial intelligence preparation of the battlefield (IPB), all foreign languages (spoken and written) and dialects needed for mission accomplishment. Collect, process, produce, and disseminate information derived from linguist sources. Provide intelligence training for MI linguists employed in AOs. Coordinate for security investigations, as necessary, for local hire linguists. Provide support to CI screening of contracted linguists and local national labor force.
23 March 2010
FM 2-0
B-3
Appendix B
B-4
FM 2-0
23 March 2010
Language Support
Responsibilities
Should speak the required foreign language. If not, the liaison officer requires a translator or interpreter for all aspects of duties. Requests interpreters to assist when representing the multinational operations. Translates orders, maps, traces, overlays, and documents into multinational foreign languages. Recruits, interviews for suitability, and hires civilian local labor force, if required. Negotiates host nation on labor agreements. Administers dental care to support humanitarian mission requirements. Rehabilitates, constructs, and gains access to existing dental facilities as required. Supports the procurement process of local goods and services not readily available through normal logistic channels. Ensures limited non-U.S. and U.S. pay support to multinational forces, host-nation forces, designated civilians, and detainees. Ensures all necessary banking and currency support are available in theater. Supports medical humanitarian assistance and disaster relief operations. Provides medical care to detainees and civilians within the commands area of operations. Coordinates medical laboratory access in the area of operations. Determines the nature of local health threats to the force through populace interviews. Determines the identity of local or captured medical supplies. Determines source and suitability of local foods. Assists the local population with veterinary service needs. Identifies enemy force chemical weapons and equipment. Communicates chemical, biological, radiological, nuclear, and high-yield explosives risks to supported populations. Procures proper local materials to support engineering missions. Communicates engineering project requirements to contracted local work force. Communicates engineering project impact on local landowners and other affected parties. Procures local topographic maps and terrain products. Assesses environmental concerns of host-nation and local populations in multinational operations. Supports displaced civilian control activities. Supports internment and resettlement operations, to include displaced civilians. Supports weapons buy-back programs, as required, and works closely with civilmilitary liaisons for payments to local officials. Supports counterdrug and customs activities. When authorized, helps foreign civil authorities maintain control. Conducts liaison with local law enforcement agencies. Produces approved psychological operations products and counterpropaganda media. Evaluates the impact of psychological operations on the target audience. Supports identification of enemy air defense artillery. Communicates air defense warnings to supported populations. Communicates air defense project requirements to contracted local work force. Provides safety training to local labor force. Communicates warnings of dangerous military operations and other hazards to local populace. Coordinates commercial and local transportation needs. Coordinates movement scheduling and routes with multinational forces and/or host nation.
Engineer coordinator
Provost marshal
Psychological operations officer Air defense coordinator Safety officer Transportation officer
23 March 2010
FM 2-0
B-5
Appendix B
SOURCES OF LINGUISTS
B-20. There are various sources a commander can use to obtain the linguists necessary to support operations. It is vital to know the advantages and disadvantages of each type of linguist and to carefully match the available linguists to the various aspects of the operation.
Language Support
dependent MOS/AOCs. An added advantage is that since their sole job is translation and interpretation, they do not have to be removed from another job to be used as linguists. Major disadvantages are they have no additional skills that give them dual functionality as do the 18, 37, 38, 180A MOSs/AOCs, and they usually do not have security clearances, which can limit their use.
23 March 2010
FM 2-0
B-7
Appendix B
Language Support
than limited working proficiency in the foreign language. The six base levels of proficiency, as established by DLPT and/or oral exam, are Level 0 (no proficiency). The Soldier has no functional foreign language ability. Level 0+ is the minimum standard for special-forces personnel and indicates a memorized proficiency only. Level 1 (elementary proficiency). The Soldier has limited control of the foreign language skill area to meet limited practical needs and elementary foreign language requirements. Level 2 (limited working proficiency). The linguist is sufficiently skilled to be able to satisfy routine foreign language demands and limited work requirements. Level 3 (general professional proficiency). The linguist is capable of performing most general, technical, formal, and informal foreign language tasks on a practical, social, and professional level. Level 4 (advanced professional proficiency). The linguist is capable of performing advanced professional foreign language tasks fluently and accurately on all levels. Level 5 (functionally native proficiency). The linguist is functionally equivalent to an articulate and well-educated native in all foreign language skills; the linguist reflects the cultural standards of the country where the foreign language is natively spoken. B-35. The above proficiency base levels designate proficiency in any of the four language skillslistening, reading, speaking, and writing. The DLPT only evaluates reading and listening skills (for example, 2+/3, or 3/1+). Currently, these tests do not evaluate linguists above the 3 proficiency level. The current Army standard to be considered a qualified linguist is a level 2. Oral proficiency interviews evaluate speaking proficiency and may be used to provide a listening score. These interviews may provide an evaluation all the way up to the 5 proficiency level.
23 March 2010
FM 2-0
B-9
Appendix B
LINGUIST
B-39. The Army includes linguists in MOS 09L, who are specifically trained to be interpreters and translators: Interpreter 09L. Interpretation is the transfer of meaning from one spoken language into another spoken language. Units may require interpretation capabilities to support commanders in communicating with multinational and threat forces. CA and PSYOP units and law enforcement, medical, logistic, transportation, training, legal, liaisons, and engineer units may also require interpreter support. Currently, most Services do not have an interpreter specialty. Translator 09L. Translation is the rendering by writing of meaning from one written language into another language. Units may require translation of documents to support commanders in communicating with multinational and threat forces. CA and PSYOP units and law enforcement, medical, logistic, transportation, training, legal, liaisons, and engineer units may also require translator support. Currently, most Services do not have a pure translator specialty.
HUMAN INTELLIGENCE
B-40. HUMINT collectors specifically include enlisted personnel in MOS 35M, WOs in MOSs 351M and 351Y, commissioned officers in MOS 35F, select other specially trained MOSs, and their Federal civilian employee and civilian contractor counterparts. Note. These specially trained and certified individuals are the only personnel authorized to conduct HUMINT collection operations. B-41. HUMINT collection operations that require foreign language capability include the following: Interrogation. Foreign language requirements for interrogation operations include the ability to read foreign language documents for planning and preparation and support to document and media exploitation (DOMEX); and listening and speaking abilities for conduct of the interrogation itself. Even if the interrogation is going to be accomplished using an interpreter, it is beneficial for the interrogator to have proficiency in the target language for more complete understanding and quality control of the interpreter. Debriefing. Debriefers require foreign language reading, listening, and speaking capabilities to prepare for and carry out debriefings. Liaison. HUMINT collectors rely heavily on language ability to conduct effective liaison with host-nation and other officials. Military source operations (MSO). All foreign language capabilities are required for effective conduct of MSO. Support to DOMEX. HUMINT collectors with a foreign language reading capability can provide initial support to DOMEX. Many captured enemy documents (CEDs) are associated with detainees and other human sources. HUMINT collectors will often be the first persons to screen the CEDs associated with these detainees and other human sources for immediate exploitation and use in their interrogations. Screening. HUMINT collectors conducting screening must have a foreign language capability in reading, speaking, and listening.
COUNTERINTELLIGENCE
B-42. A CI agent is a Soldier in MOS 35L, a WO in MOS 351L, or a commissioned officer in MOS 35E. A CI agent obtains information by direct questioning of a person or persons that may or may not be under the agents control. Language requirements for CI roles require skills comparable to those performed by HUMINT specialists. A skilled interpreter can often assist a debriefer, whose skill set is often treated as an additional skill identifier (ASI) added to the HUMINT or CI specialties.
B-10
FM 2-0
23 March 2010
Language Support
Appendix B
Language Program. Many of these programs are conducted in foreign countries as part of the military in-country immersion program. Television programs. Some of the best and more enjoyable ways of learning a foreign language are through movies and television programs. Both foreign and U.S. programs (with foreign subtitle or foreign dubbed) provide the linguist with enjoyable learning environments. Computer and software language programs. There are many commercial software programs currently on the market: Transparent Language (http://www.transparent.com/). Rosetta Stone (http://www.rosettastone.com also available to the military through Army Knowledge Online [AKO]). Tell Me More (http://www.tellmemorestore.com/). National Security Agency (NSA). Military Cryptologic Continuing Education Program (MCCEP). The MCCEP, at https://www.mccep.org/, was established to provide a structure for the professional development of cryptologic military language analysts. MCCEP provides career guidance to assist language analysts in broadening and deepening their target knowledge and job abilities. SCOLA . A nonprofit educational organization that receives and retransmits television programming from around the world in many languages. These programs are available through Internet to students of language study, ethnic communities, and anyone seeking a global perspective. SCOLAs Web site is http://www.SCOLA.org; http://www.podcastdirectory.com. Mobile training teams. Contact the Defense Language Institute for more information on its mobile training team language courses (http://www.dliflc.edu). On-the-job training. One of the best, if not the best, methods to help Soldiers increase their language capabilities is through on-the-job training. Many federal programs need linguists. The Reach Language Support Program provides meaningful and challenging translation opportunities to members of the military while providing translation of foreign documents ([email protected]). Deployments also provide language proficiency training opportunities. Unit command language program. Almost all Army MI battalions have a command language program manager who supports military linguists in a personal language program development. The command language program manager is the best first step in any Army linguists career. Joint Language University. The Joint Language University is a cooperative effort between agencies of the Federal Government, DOD, and academic institutions (http://jlu.wbtrain.com/). Internet. There are several language resources available on the Internet: Podcasts. (http://www.itunes.com; http://www.word2word.com/podad.html). Google. A wealth of language opportunities from music, podcasts, videos, programs, and all sorts of great new technology to support foreign language development (http://www.google.com). Lingnet. An online information service, accessible through the Internet or through direct connection, devoted to meeting the needs of the linguist community (http://www.lingnet.org). Langnet. A language learning support system with interactive materials designed for those who want to practice and maintain their target language reading and listening skills (http://www.langnet.org). Foreign Language Portal. Lists, by foreign language, on the For Official Use Only Army server of foreign language materials (https://www.us.army.mil/suite/doc/5987514).
LANGUAGE TECHNOLOGY
B-47. DOD and the Army have limited human foreign language translation capability to meet requirements. The existing automated foreign language capabilitySequoyah Foreign Language
B-12 FM 2-0 23 March 2010
Language Support
Translation Systemmitigates linguistic shortfalls by expanding the number of language translation points of presence to meet the speech and text translation requirements for current and future operations. Sequoyah is a suite of existing and developing language software modules that are integrated, scalable, tailorable, interoperable, user-friendly, easily deployable, and available at all echelons. Sequoyah meets the foreign language translation requirements when human linguists are unavailable. It includes Web-enabled, mobile, and portable configurations.
CAPABILITIES
B-53. Machine language translation capabilities include simple prerecorded speech phrase translations (phrase-based), full two-way free speech translations (free form), and text translations. Various systems have different capabilities that the user should fully understand before using the devices. B-54. There are four modes of machine language translationspeech-to-speech, speech-to-text, text-totext, and text-to-speech. Devices may operate in one mode exclusively or in a combination of modes. Speech-to-text and text-to-text devices can be used to monitor foreign broadcast media. B-55. One-way devices can be loaded with a series of relevant questions, commands, or instructions based on the situation. This will ensure that the same questions, commands, or instructions are being used each time. As an example, these devices can be used for checkpoint operations where a specific sequence of events occurs repetitively for each person or vehicle passing through the checkpoint. B-56. Some machine language translation devices can record long portions of speech for later translation by an interpreter. For example, anticoalition mosques in Iraq have disseminated tactical information and anticoalition messages during operations in the call to prayer. A recording of the call to prayer can be analyzed for its content later.
LIMITATIONS
B-57. All translation devices are limited to the content of their programs. One-way devices depend on the intended recipient acknowledging the preprogrammed phrases with simple yes or no responses or an indication that the recipient understands by their actions. B-58. Sophisticated two-way devices interpret cultural and linguistic nuances as well as simple word-forword translation. Regardless of the accuracy of the device, machines can only translate words. They cannot include the unspoken social and cultural subtexts that are also a component of any conversation. Additionally, the device might not account for variations in specific meaning of words or phrases based on
23 March 2010 FM 2-0 B-13
Appendix B
local dialects. Users must always be aware of the possibility of misunderstandings due to improperly translated words, phrases, or concepts.
B-14
FM 2-0
23 March 2010
Glossary
SECTION I ACRONYMS AND ABBREVIATIONS
2X 10 USC 10 USC 467 32 USC ACO AFDD AMC AO AOC AR ARNG ARNGUS ASCC ASCOPE ASPO ATCAE BCT BDA BFSB CA CBRN CBRNE CCIR CED CEM CI CIA CICA CIED CJCMEC COA CONUS COP CSS human intelligence and counterintelligence staff element Title 10, United States Code Section 467, Title 10, United States Code Title 32, United States Code Army Cryptologic Operations Air Force doctrine document United States Army Materiel Command area of operations area of concentration Army regulation Army National Guard Army National Guard of the United States Army Service component command areas, structures, capabilities, organizations, people, events (civil considerations) Army Space Program Office Army Technical Control and Analysis Element brigade combat team battle damage assessment battlefield surveillance brigade civil affairs chemical, biological, radiological, and nuclear chemical, biological, radiological, nuclear, and high-yield explosives commanders critical information requirement captured enemy document captured enemy materiel counterintelligence Central Intelligence Agency counterintelligence coordinating authority counter-improvised explosive device combined joint captured materiel exploitation center course of action continental United States common operational picture Central Security Service
23 March 2010
FM 2-0
Glossary-1
Glossary
DA DA PAM DCGS-A DCS DEA DF DHE-M DHS DIA DIAM DLPT DNA DNI DOD DODD DOMEX DOS DST DTG EEFI ELINT e-mail EO EPW ES EW FBI FFIR FISINT FISS FM FM FMA FME FMP FMI G-1 G-2 G-3 G-4
Glossary-2
Department of the Army Department of the Army pamphlet Distributed Common Ground System-Army deputy chief of staff Drug Enforcement Administration direction finding Defense HUMINT Enterprise-manual Department of Homeland Security Defense Intelligence Agency Defense Intelligence Agency manual Defense Language Proficiency Test deoxyribonucleic acid Director of National Intelligence Department of Defense Department of Defense directive document and media exploitation Department of State decision support template date-time group essential element of friendly information electronic intelligence electronic mail Executive order enemy prisoner of war electronic warfare support electronic warfare Federal Bureau of Investigation friendly force information requirement foreign instrumentation signals intelligence foreign intelligence and security services field manual frequency modulation foreign materiel acquisition foreign materiel exploitation Foreign Materiel Program field manual interim assistant chief of staff, personnel assistant chief of staff, intelligence assistant chief of staff, operations assistant chief of staff, logistics
FM 2-0 23 March 2010
Glossary
G-6 G-7 G-9 GEOINT GMI GPC HCT HPT HQDA HUMINT HVT HVTL I&W IAA IED ILR IMINT INSCOM INTSUM IPB ISR ITO J-2 JCMEC JIOC JOA JP JPEG JRIC JTF MASINT MCCEP MCOO MDMP METT-TC MI MOS MP MSIC
assistant chief of staff, signal assistant chief of staff, information management assistant chief of staff, civil affairs geospatial intelligence general military intelligence geospatial planning cell human intelligence collection team high-payoff target Headquarters, Department of the Army human intelligence high-value target high-value target list indications and warning incident awareness and assessment improvised explosive device Interagency Language Roundtable imagery intelligence United States Army Intelligence and Security Command intelligence summary intelligence preparation of the battlefield intelligence, surveillance, and reconnaissance international terrorist organizations intelligence directorate of a joint staff joint captured materiel exploitation center joint intelligence operations center joint operations area joint publication Joint Photographic Experts Group joint reserve intelligence center joint task force measurement and signature intelligence Military Cryptologic Continuing Education Program modified combined obstacle overlay military decisionmaking process mission, enemy, terrain and weather, troops and support available, time available, and civil considerations (mission variables) military intelligence military occupational specialty military police Missile and Space Intelligence Center
23 March 2010
FM 2-0
Glossary-3
Glossary
MSO MTI NAI NCMI NGA NGIC NIST NRO NSA NSG NST OMT OPCON OPELINT OPLAN OPORD OPSEC OSINT PIR PMESII PMESII-PT POC PSYOP R&D RDEC RFI ROE S&TI S-1 S-2 S-3 S-4 S-6 S-7 S-9 SBCT SCI SECDEF SIGINT
military source operations moving target indicator named area of interest National Center for Medical Intelligence National Geospatial-Intelligence Agency National Ground Intelligence Center national intelligence support team National Reconnaissance Office National Security Agency National System for Geospatial Intelligence National Geospatial-Intelligence Agency support team operational management team operational control operational electronic intelligence operation plan operation order operations security open-source intelligence priority intelligence requirement political, military, economic, social, information, infrastructure political, military, economic, social, information, infrastructure, physical environment, time (operational variables) point of contact psychological operations research and development research, development, and engineering center request for information rules of engagement scientific and technical intelligence personnel staff officer intelligence staff officer operations staff officer logistics staff officer signal staff officer information engagement staff officer civil affairs staff officer Stryker brigade combat team sensitive compartmented information Secretary of Defense signals intelligence
Glossary-4
FM 2-0
23 March 2010
Glossary
SIR S//NF SOF SOFA SOP TC TCAE TECHELINT TECHINT TENCAP THREATCON TPFDD TS TSCM TTP UAS UGS U.S. USAR USC USCG WARNO WMD WO WTI
specific information requirement secret//not releasable to foreign nationals special operations forces status-of-forces agreement standing operating procedure training circular technical control and analysis element technical electronic intelligence technical intelligence Tactical Exploitation of National Capabilities Program threat condition time-phased force and deployment data top secret technical surveillance countermeasures tactics, techniques, and procedures unmanned aircraft system unattended ground sensor United States United States Army Reserve United States Code United States Coast Guard warning order weapons of mass destruction warrant officer weapons technical intelligence
SECTION II TERMS
*all-source intelligence (Army) The intelligence discipline concerned with all-source products and the processes used to produce them. (joint) 1. Intelligence products and/or organizations and activities that incorporate all sources of information, most frequently including human resources intelligence, imagery intelligence, measurement and signature intelligence, signals intelligence, and open-source data in the production of finished intelligence. 2. In intelligence collection, a phrase that indicates that in the satisfaction of intelligence requirements, all collection, processing, exploitation, and reporting systems and resources are identified for possible use and those most capable are tasked. (JP 2-0) *analysis The process by which collected information is evaluated and integrated with existing information to produce intelligence that describes the currentand attempts to predict the futureimpact of the threat, terrain and weather, and civil considerations on operations. general military intelligence Intelligence concerning the (1) military capabilities of foreign countries or organizations or (2) topics affecting potential US or multinational military operations, relating to the following subjects: armed forces capabilities, including order of battle, organization, training, tactics, doctrine, strategy, and other
23 March 2010 FM 2-0 Glossary-5
Glossary
factors bearing on military strength and effectiveness; area and terrain intelligence, including urban areas, coasts and landing beaches, and meteorological, oceanographic, and geological intelligence; transportation in all modes; military materiel production and support industries; military and civilia communications systems; military economics, including foreign military assistance; insurgency and terrorism; military political-sociological intelligence; location, identification, and description of militaryrelated installations; government control; escape and evasion; and threats and forecasts. (Excludes scientific and technical intelligence.) (JP 2-0) *human intelligence The collection by a trained human intelligence collector of foreign information from people and multimedia to identify elements, intentions, composition, strength, dispositions, tactics, equipment, and capabilities. *intelligence reach A process by which intelligence organizations proactively and rapidly access information from, receive support from, and conduct direct collaboration and information sharing with other units and agencies, both within and outside the area of operations, unconstrained by geographic proximity, echelon, or command. *intelligence requirement A type of information requirement developed by subordinate commanders and the staff (including subordinate staffs) that requires dedicated ISR collection for the elements of threat, terrain and weather, and civil considerations. *open-source intelligence The discipline that pertains to intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement.
Glossary-6
FM 2-0
23 March 2010
References
REQUIRED PUBLICATIONS
These documents must be available to the intended users of this publication. FM 1-02 (101-5-1). Operational Terms and Graphics. 21 September 2004. FM 5-0 (101-5). Army Planning and Orders Production. 20 January 2005. JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 12 April 2001.
RELATED PUBLICATIONS
These sources contain relevant supplemental information. AFDD 2-9. Intelligence, Surveillance, and Reconnaissance Operations. 17 July 2007. AR 11-6. Army Foreign Language Program. 31 August 2009. AR 27-60. Intellectual Property. 1 June 1993. AR 350-1. Army Training and Leader Development. 18 December 2009. AR 380-5. Department of the Army Information Security Program. 29 September 2000. AR 380-10. Foreign Disclosure and Contacts with Foreign Representatives. 22 June 2005. AR 380-13. Acquisition and Storage of Information Concerning Nonaffiliated Persons and Organizations. 13 September 1974. AR 380-28. (C) Department of the Army Special Security System (U). 16 September 1991. AR 380-40. (O) Policy for Controlling and Safeguarding Communications Security (COMSEC) Materiel (U). 30 June 2000. AR 380-49. Industrial Security Program. 15 April 1982. AR 380-53. Information Systems Security Monitoring. 29 April 1998. AR 380-67. The Department of the Army Personnel Security Program. 9 September 1988. AR 381-10. U.S. Army Intelligence Activities. 3 May 2007. AR 381-14. (C) Technical Counterintelligence (TCI) (U). 30 September 2002. AR 381-20. The Army Counterintelligence Program. 15 November 1993. AR 381-45. Investigative Records Repository. 25 August 1989. AR 381-47. (S) Offensive Counterintelligence Operations (U). 17 March 2006. AR 381-100. (S) Army Human Intelligence Collection Programs (U). 15 May 1988. AR 381-102. (S) U.S. Army Cover Program (U). 29 December 2000. AR 614-115. (S//NF) Military Intelligence Officer Excepted Career Program (Great Skill) (U). 12 April 2004. AR 614-200. Enlisted Assignments and Utilization Management. 26 February 2009. Chatham House Web site. http://www.chathamhouse.org.uk/about/chathamhouserule/ .(Contains text and additional information about the Chatham House Rule.) DA PAM 381-15. (S//NF) Foreign Military Intelligence Collection Activities (FORMICA) Program (U). 11 June 2009. DHE-M 3301.001. (S) Defense Intelligence Agency (DIA) Human Intelligence (HUMINT) Manual, Vol I: Collection Requirements, Reporting, and Evaluation Procedures (U). 22 January 2009. DIAM 58-11. (S//NF) Department of Defense (DOD) Human Intelligence (HUMINT) Policies and Procedures (U). 5 September 2002.
23 March 2010 FM 2-0 References-1
References
DODD 2310.1E. The Department of Defense Detainee Program. 5 September 2006. DODD 3115.09. DOD Intelligence Interrogations, Detainee Debriefings, and Tactical Questioning. 9 October 2008. DODD 5100.20. National Security Agency/Central Security Service (NSA/CSS). 26 January 2010. DODD 5105.21. Defense Intelligence Agency (DIA). 18 March 2008. DODD 5200.27. Acquisition of Information Concerning Persons and Organizations Not Affiliated with the Department of Defense. 7 January 1980. DOD 5240.1-R. Procedures Governing the Activities of DOD Intelligence Component That Affect United States Persons. 1 December 1982. DODD 5240.01. DOD Intelligence Activities. 27 August 2007. DODD 8521.01E. Department of Defense Biometrics. 21 February 2008. EO 12333. United States Intelligence Activities. 4 December 1981. FM 2-01.3. Intelligence Preparation of the Battlefield/Battlespace. 15 October 2009. FM 2-19.4. Brigade Combat Team Intelligence Operations. 25 November 2008. FM 2-22.2 (34-60). Counterintelligence. 21 October 2009. FM 2-22.3 (34-52). Human Intelligence Collector Operations. 6 September 2006. FM 2-91.6. Soldier Surveillance and Reconnaissance: Fundamentals of Tactical Information Collection. 10 October 2007. FM 3-0. Operations. 27 February 2008. FM 3-05.120. (S//NF) Army Special Operations Forces Intelligence (U). 15 July 2007. FM 3-06. Urban Operations. 26 October 2006. FM 3-13. Information Operations: Doctrine, Tactics, Techniques, and Procedures. 28 November 2003. FM 3-19.50. Police Intelligence Operations. 21 July 2006. FM 3-24. Counterinsurgency. 15 December 2006. FM 3-36. Electronic Warfare in Operations. 25 February 2009. FM 3-39 (FM 3-19.1). Military Police Operations. 16 February 2010. FM 3-50.1. Army Personnel Recovery. 10 August 2005. FM 3-90. Tactics. 4 July 2001. FM 3-90.15. Sensitive Site Operations. 25 April 2007. FM 4-02. Force Health Protection in a Global Environment. 13 February 2003. FM 4-02.7. Multiservice Tactics, Techniques, and Procedures for Health Service Support in a Chemical, Biological, Radiological, and Nuclear Environment. 15 July 2009. FM 4-02.17. Preventive Medicine Services. 28 August 2000. FM 4-02.18. Veterinary Service Tactics, Techniques, and Procedures. 30 December 2004. FM 5-19. Composite Risk Management. 21 August 2006. FM 6-0. Mission Command: Command and Control of Army Forces. 11 August 2003. FM 6-20-10. Tactics, Techniques, and Procedures for the Targeting Process. 8 May 1996. FM 7-15. The Army Universal Task List. 27 February 2009. FM 8-42. Combat Health Support in Stability Operations and Support Operations. 27 October 1997. FM 27-10. The Law of Land Warfare. 18 July 1956. FMI 2-01. Intelligence, Surveillance, and Reconnaissance (ISR) Synchronization. 11 November 2008. FMI 2-01.301 (34-130). Specific Tactics, Techniques, and Procedures and Applications for Intelligence Preparation of the Battlefield. 31 March 2009. FMI 2-22.9. Open Source Intelligence. 5 December 2006.
References-2 FM 2-0 23 March 2010
References
JP 1. Doctrine for the Armed Forces of the United States. 14 May 2007. JP 2-0. Joint Intelligence. 22 June 2007. JP 2-01. Joint and National Intelligence Support to Military Operations. 7 October 2004. JP 2-01.2. (S) Joint Doctrine, Tactics, Techniques, and Procedures for Counterintelligence Support to Operations (U). 5 April 1994. JP 2-03. Geospatial Intelligence Support to Joint Operations. 22 March 2007. JP 3-0. Joint Operations. 17 September 2006. JP 3-05. Doctrine for Joint Special Operations. 17 December 2003. JP 3-13.1. Electronic Warfare. 25 January 2007. JP 3-28. Civil Support. 14 September 2007. JP 3-33. Joint Task Force Headquarters. 16 February 2007. JP 3-60. Joint Targeting. 13 April 2007. JP 5-0. Joint Operation Planning. 26 December 2006. NSG: Geospatial Intelligence (GEOINT) Basic Doctrine Publication 1-0. National GeospatialIntelligence Agency (NGA). September 2006. TC 2-22.4. Technical Intelligence. 19 November 2009. TC 2-22.303. The 2X Handbook. 31 July 2006. TC 2-33.4 (FM 34-3). Intelligence Analysis. 1 July 2009. 10 USC. Armed Forces. Available online at http://www.gpoaccess.gov/uscode/browse.html . 32 USC. National Guard. Available online at http://www.gpoaccess.gov/uscode/browse.html .
PRESCRIBED FORMS
None.
REFERENCED FORMS
DA forms are available on the APD website (www.apd.army.mil). DA Form 2028. Recommended Changes to Publications and Blank Forms.
23 March 2010
FM 2-0
References-3
Index
Entries are by paragraph number.
A
actionable intelligence, 1-84 all-source intelligence, 5-1, 5-7. See also intelligence, disciplines. analysis and production, 6-14. See also CI, core competencies. analyze, 4-22. See also continuing activities. IMINT and, 9-17 MASINT and, 10-13 SIGINT and, 12-19 TECHINT and, 13-24 anticipate, 4-62. See also ISR, planning. area of operations (AO), 1-6,1-66, 2-42, 3-2, 4-2, 6-26, 8-22, 13-21, A-5 Army Cryptologic Operations, 12-8. See also SIGINT, relationships. Army intelligence enterprise, 1-98 Army National Guard, 3-18 Army Service component command (ASCC), 2-31, 7-41 Army SIGINT systems, 12-14. See also SIGINT, relationships. Army Technical Control and Analysis Element, 12-9. See also SIGINT, relationships. ASCOPE. See civil considerations (ASCOPE). assess, 4-27. See also continuing activities. commander's input and, 4-4 IMINT and, 9-19 MASINT and, 10-14 SIGINT and, 12-20 TECHINT and, 13-25 battlefield surveillance brigade, 7-40 biometrics, 1-114, 1-118. See also emerging capabilities. brigade combat team (BCT), 2-30 Army intelligence enterprise and, 2-35 HUMINT asset, 7-36 primary intelligence organization in, 2-36 United States Coast Guard and, 2-26 civil considerations (ASCOPE), 1-6, 1-42, 1-87, 1-89, 3-16, 5-17, A-6, A-9 civil support operations, 3-17, 4-2. See also full spectrum operations, requirements. classification, 11-13. See also OSINT, considerations for. collect, 4-87. See also intelligence process, steps of. IMINT and, 9-25 MASINT and, 10-22 SIGINT and, 12-30 TECHINT and, 13-36 collection, 6-10. See also CI, core competencies. collection activities, 12-30 direction finding, 12-32 SIGINT processing, 12-34 signals intercepts, 12-31 combat information, 4-106 combat power, 3-22, 9-4 combined arms, 3-25. See also full spectrum operations, MI support to. command and support relationships, 3-29. See also full spectrum operations, MI support to. command channel, 4-46. See also disseminate, procedures. commander's critical information requirement (CCIR), 4-72, 4-90, 5-27, 9-5 commercial imagery systems, 9-9. See also imagery collection platforms. common operational picture, 4-42, 5-44, 5-49. See also intelligence products, types of; disseminate.
C
captured enemy materiel (CEM), 13-10 captured materials exploitation operations, 7-21. See also HUMINT collection, methodologies. Central Intelligence Agency (CIA), 2-20. See also intelligence, community. chain of custody, 13-10 CI, 6-1. See also intelligence products, categories of; intelligence, disciplines. 2X, 6-18 contingency operations, 6-30 core competencies, 6-7, 6-12 Defense Intelligence Agency (DIA) and, 2-5 Federal Bureau of Investigation (FBI) and, 2-23 missions, 6-3 operational and tactical, 6-29 operational considerations, 6-34 operational management team, 6-22 operational risk mitigation, 6-36 strategic and departmental, 6-24 structure, 6-17 team, 6-17, 6-23, 6-32
B
balance, 4-65. See also ISR, planning. 23 March 2010
FM 2-0
Index-1
Index
F
facts and assumptions, 5-25, 5-35 Federal Bureau of Investigation (FBI), 2-23. See also intelligence, community. force generation, 1-25 force projection, 2-60, 2-66 force protection, 6-28, 6-31 force tailoring, 3-26. See also full spectrum operations, MI support to. foreign governments, 2-28 foreign instrumentation signals intelligence, 12-4. See also SIGINT, subcategories. foreign intelligence and security services (FISS), 6-3, 6-10 foreign language support, B-31 Foundry, 1-29 friendly force debriefing operations, 7-15. See also HUMINT collection, methodologies. friendly force information requirement (FFIR), 4-73 full spectrum operations, 3-1 MI support to, 3-24 requirements, 3-5
D
DCGS-A, 1-121, 4-112. See also emerging capabilities. common operational picture and, 5-50 disseminate and, 4-33 debriefing operations, 7-14. See also HUMINT collection, methodologies. deception and bias, 11-17. See also OSINT, considerations for. deconfliction, 11-16. See also OSINT, considerations for. Defense HUMINT, 13-13 Defense Intelligence Agency (DIA), 2-5, 13-13. See also DOD, agencies. Defense HUMINT Manager, 7-43 MASINT and, 10-8 defensive operations, 3-10, 4-2. See also full spectrum operations, requirements.
E
effective intelligence, 1-83, 3-6
Index-2
FM 2-0
23 March 2010
Index
I
imagery, 8-4 imagery assets, 9-4 imagery collection platforms, 9-7 imagery intelligence (IMINT). See IMINT. imagery sensors types of, 9-13 IMINT, 9-1. See also intelligence, disciplines. GEOINT, 8-4 National GeospatialIntelligence Agency (NGA) and, 2-7 improvised explosive device (IED), 13-6, 13-16 incident awareness and assessment (IAA), 3-20 indications and warning (I&W), 2-40, 2-86. See also intelligence products, categories of. information collection of, 1-57, B-37 private, 11-3 publicly available, 11-1, 11-4, 11- 21. See also OSINT, considerations for. information requirement, 1-56, 4-52, 4-79. See also requirements. information superiority, 1-69 initial data-file development, 4-10. See also generate intelligence knowledge, aspects of. INSCOM, 2-11, 6-25, 10-10, 12-8, 13-16 FM 2-0
H
Headquarters, Department of the Army Deputy Chief of Staff, G-2, 13-15 higher headquarters order, 5-22 mission analysis and, 5-13 operational timeline and, 5-30 high-value target list (HVTL), 5-20 human intelligence (HUMINT). See HUMINT. human terrain analysis teams, 1-124. See also emerging capabilities. HUMINT, 7-1. See also intelligence, disciplines. 2X, 6-18 23 March 2010
Index
M
MASINT, 10-1. See also intelligence, disciplines. collection systems, 10-2 Defense Intelligence Agency (DIA) and, 2-5, 10-8 National GeospatialIntelligence Agency (NGA) and, 2-7 subdisciplines, 10-4 United States Coast Guard and, 2-26 materials, 10-4. See also MASINT, subdisciplines. measurement and signature intelligence (MASINT). See MASINT. METT-TC. See mission variables (METT-TC). MI Battalion, 203d, 13-16 military decisionmaking process (MDMP), 4-17, 4-108, 5-9, B-6 military intelligence (MI). See MI. military source operations, 7-16. See also HUMINT collection, methodologies. Missile and Space Intelligence Center, 13-13 mission analysis, 1-44, 1-88, 4-17, B-2 all-source intelligence and, 5-12 briefing of, 5-31
J
joint intelligence process, 2-34 joint reserve intelligence centers (JRICs), 2-10 Joint reserve intelligence centers (JRICs). See also DOD, agencies. joint task force (JTF), 7-42
L
landpower, 2-57 language technology, B-47, B-53, B-57 FM 2-0
Index-4
23 March 2010
Index
R
radar, 10-4. See also MASINT, subdisciplines. radar imagery sensors, 9-14 radio frequency, 10-4. See also MASINT, subdisciplines. reconnaissance, 1-61 reconnaissance and surveillance, 1-57, 1-60, 1-63, 1-98, 4-28, 4-61, 4-68, 4-90, 5-24 red teaming, 1-136. See also emerging capabilities. redeployment, 2-85. See also force projection, processes. relevant information, 1-2, 4-12, 4-50, 5-12, 5-57 reporting, 4-103 request for information (RFI), 4-67, 4-94, 5-28. See also ISR, tasks requirements, 4-76, 5-57. See also ISR synchronization, activity steps. rules of engagement (ROE), 4-87 running estimate, 5-42. See also intelligence products, types of. course of action (COA) and, 5-35 IPB and, 4-17
N
National Center for Medical Intelligence, 13-13 National GeospatialIntelligence Agency (NGA), 2-7, 8-3, 9-10. See also DOD, agencies. MASINT and, 10-8 support team, 8-13 National Ground Intelligence Center (NGIC), 13-16 National Reconnaissance Office, 2-9. See also DOD, agencies. National Security Agency/Central Security Service, 2-8. See also DOD, agencies. National System for Geospatial-Intelligence (NSG), 8-2 national technical means, 9-8. See also imagery collection platforms. nuclear radiation, 10-4. See also MASINT, subdisciplines.
P
persistent surveillance, 2-53 personnel recovery, 1-68 plan, 4-52. See also intelligence process, steps of. IMINT and, 9-21 MASINT and, 10-18 SIGINT and, 12-24 TECHINT and, 13-31 PMESII-PT. See operational variables (PMESII-PT). police intelligence, 1-50 police intelligence operations, 1-50 through 1-52 posting, 4-41. See also disseminate. prepare, 4-80. See also intelligence process, steps of. IMINT and, 9-24 MASINT and, 10-21 SIGINT and, 12-26 TECHINT and, 13-33 prioritize, 4-65. See also ISR, planning. priority intelligence requirement (PIR), 4-73, 4-77. See also requirements. produce, 4-108. See also intelligence process, steps of. analyze and, 4-25 IMINT and, 9-26 MASINT and, 10-24 FM 2-0
O
offensive operations, 3-6, 4-2. See also full spectrum operations, requirements. open-source intelligence (OSINT). See OSINT. operational control (OPCON), 1-60, 6-20, 13-16 operational environment, 1-1 generate intelligence knowledge and, 4-7 operational variables and, 1-3 23 March 2010
S
scientific and technical intelligence (S&TI), 2-47. See also intelligence products, categories of. MASINT and, 10-9 TECHINT and, 13-13, 13-15 screening operations, 7-10. See also HUMINT collection, methodologies. sensitive site exploitation, 1-67 sharing, 4-40. See also disseminate. Index-5
Index
T
table of organization and equipment (TOE), 1-110, 6-5, 11-5 tactical collection assets, 9-12. See also imagery collection platforms. tactical intelligence overwatch, 1-49, 4-15 target intelligence, 2-46. See also intelligence products, categories of. targeting combat assessment and, 1-79 employment and, 2-83 information superiority and, 1-70 MASINT provides, 10-6 nonlethal actions and, 1-73 task-organizing, 3-27. See also full spectrum operations, MI support to. TECHINT, 13-13, 13-16. See also intelligence, disciplines. chain of custody, 13-10 enterprise, 13-12 goals, 13-4 weapons technical intelligence (WTI), 13-7 technical channels, 1-66, 3-30, 4-49, 6-22. See also disseminate, procedures. HUMINT, 7-45 intelligence handoff and, 4-86
U
unified action, 2-1, 2-52 United States Army Intelligence and Security Command (INSCOM). See INSCOM. United States Army Materiel Command, 13-17 United States Coast Guard, 226. See also intelligence, community.
W
warfighting functions, 1-10, 1-11, 3-2 combat power and, 3-22 DCGS-A and, 1-123 requirements collaboration with, 5-57 weather effects, 5-16 wargaming, 5-36 warning order (WARNO), 5-61, 5-33 weapons technical intelligence (WTI), 13-5, 13-7 weather, 1-6, 1-40, 3-16, 5-16, A-6, A-9
Index-6
FM 2-0
23 March 2010
FM 2-0
23 March 2010
Official:
JOYCE E. MORROW
Administrative Assistant to the Secretary of the Army 1006103
DISTRIBUTION:
Active Army, the Army National Guard, and the United States Army Reserve. To be distributed in accordance with the initial distribution number (IDN) 11 1117 requirements for FM 2-0.
PIN: 081441-000