Military Intelligence
- FM 2-0 (Intelligence Field Manual)
- Warfighting functions in general (Intelligence is one warfighting function)
- Maneuver
- Intelligence
- Fire Support
- Air Defense Artillery
- Command and Control
- Logistics
- Mobility, Survivability, Counter-Mobility
- Intelligence assists the commander in
- Visualizing his battlespace
- Organizing his forces
- Controlling operations to achieve the desired tactical objectives or end-state.
- Intelligence supports force protection by alerting the commander to emerging threats and assisting in security operations.
- Forms of intelligence
- HUMINT – Human intelligence
- SIGINT-Signal intelligence
- IMINT – Imagery intelligence
- TECHINT- Technical Intelligence
- MASINT-Measures and Signals Intelligence
- CI-Counter Intelligence
- S2 is the intelligence section
- Half of the Military Intelligence branch works at the CORP or higher
- Brigade (S2)
- Battalion(S2)
- 35D – MAJ, CPT, 1 LT
- 96B - Enlisted
- The four intelligence tasks
- Support to Situational Understanding
- Tasks
- Perform IPB
- Perform Situational Development
- Provide intelligence Support to Force Protection
- Conduct Police Intelligence Operations
- Commander’s Focus
- Plan the mission
- Execute the operation
- Secure the force
- Commander’s Decisions
- Which COA will I implement?
- Which enemy actions are expected?
- Support to Strategic Responsiveness
- Tasks
- Perform Indicators and Warnings (I&W)
- Ensure intelligence readiness
- Conduct area study of foreign countries
- Support sensitive site exploitation
- Commander’s focus
- Orient on contingencies
- Commander’s decisions
- Should I increase the unit’s level of readiness
- Should I implement the OPLAN (Operation plan)
- Counter Intelligence, Surveillance and Reconnaissance
- Tasks
- Preform intelligence synchronization
- Preform Intelligence, Surveillance and Reconnaissance (ISR) Integration
- Conduct tactical Reconnaissance
- Conduct surveillance
- Commander’s focus
- Plan the mission
- Prepare
- Execute
- Assess
- Commander’s decisions
- Which DPs, HPTs, etc. are linked to the enemy actions?
- Are assets available and in position to collect on the DPs and HPTs etc?
- Have the assets been repositioned for contingency mission?
- Provide Intelligence Support to Effects
- Tasks
- Provide intelligence support to targeting
- Provide intelligence support to IO
- Provide intelligence support to Combat assessment
- Commander’s focus
- Destroy/Suppress/neutralize targets
- Reposition intelligence or attack assets
- Commander’s Decisions
- Is my fire (lethal or non-lethal) and maneuver effective
- Should I refire the same targets
- Intelligence Preparation for Battlefield/Battlespace (IPB)
- FM 34-130
- IPB is the systematic, continuous process of analyzing the threat and the environment in a specific geographic area.
- Answer the commander’s questions about
- Terrain
- Weather
- Enemy Situation
- Helps commanders to selectively apply combat power at critical points in time and space on the battlefield.
- Describes the environment and its effects
- Determining the threat’s likely Course of Action (COA).
- Who conducts IPB
- Conducted at all levels (different levels of detail are required)
- S2 and G2 lead in IPB
- Process remains the same regardless of Audience, only the products may change.
- Everyone in the US Army conducts IPB in some form
- Four steps of IPB
- Define the Battlefield Environment
- Area of operation – the physical space where your unit is authorized to conduct operations. Given to you by your higher headquarters.
- Area of Interest-The physical area where enemy forces or their actions may affect your unit’s mission. Determined by the S2 and commander.
- Describe the Battlefield Effects
- Analyze the battlefield with regards to
- Terrain (Urban, Complex Terrain)
- Terrain Analysis
- Military Aspects of Terrain (OCOKA/OAKOC)
- Lines of communication(roads, rail, waterways)
- Cross-country movement overlay
- Drainage overlay
- Military Aspects of Terrain (OKOKA)
- Observation – the ability of a force to see the enemy either visually or through the use of surveillance devices.
- From where can the enemy see me?
- Where can I see the enemy from here?
- Fields of fire-An area that a weapon or groups of weapons can effectively cover with fire from a given position.
- From where can the enemy shoot me?
- Where can I shoot the enemy from here?
- Cover-Physical protection from the effects of both direct and indirect fires.
- Concealment-protection from observation
- Obstacles – Natural or man-made terrain features that stop, impede, or divert military movement.
- Obstacles are the foundation of an engagement area.
- Can I stop/slow the enemy here long enough to mass fires upon him.
- Will the enemy stop/slow me here and try to mass fires upon me?
- Use the (Modified Combined Obstacle Overlay) MCOO to graphically depict obstacles
- Key Terrain-Any natural or man-made feature which gives the force which controls it an advantage.
- Consider the following when analyzing terrain.
- Mission
- Level of Command
- Type of Unit
- Does the terrain aid me in the accomplishment of my mission?
- Does the terrain aid the enemy in the accomplishment of his mission?
- Avenues of Approach
- Air or ground route of an attacking force which leads to the objective or key terrain within its path.
- On the attack ask - what route can I take to the objective?
- In the defense, ask – what route could the enemy take to get to me or the objective?
- Always consider both mounted and dismounted avenues of approach.
- Develop a MCOO to identify avenues of approach.
- Consider (Doctrinal distances, formations, speeds, maneuver space)
- Classify terrain as it pertains to maneuverability into one of three categories.
- Unrestricted – free of any restriction to movement. Units move at doctrinal speeds/distances. Nothing needs to be done to enhance mobility.
- Restricted- Terrain hinders movement. Units must adjust doctrinal distances or speeds. Some effort required to enhance mobility.
- Severely Restricted-terrain severely hinders movement. Units cannot travel at doctrinal distances and speeds.
- Logistical Infrastructure (sources of potable water, power production facilities, natural resources, communications systems, religious beliefs).
- Population demographics( education levels, cultural distinctions, religious beliefs)
- Economic conditions
- Politics( local, regional, and international treaties; unofficial politics –warlords, and gangs.
- Weather (FM 34-81-1)
- Visibility
- Light Data
- Begin Morning Nautical Twilight (BMNT)
- End Evening Nautical Twilight (EENT)
- Sunrise
- Sunset
- Moon Phases
- Laser range finding
- Poor visibility increases light infantry survivability.
- Winds
- Smoke / Chemical dispersion
- Decrease trajectory data and first hit probability
- Affects airborne, air assault, aviation operations
- Precipitation
- Degrades mobility
- Limits visibility
- Degrades weapons effectiveness
- Affects troop Morale
- Cloud Cover
- Heavy cloud clover limits illumination and solar heating of targets.
- Degrades many target acquisition systems
- Ceiling affects aviation operations
- Temperature and Humidity
- Extreme temperature reduces personnel effectiveness
- Low temperature degrade ballistics of weapons
- Temperature can effect vehicle performance
- High humidity decreases stamina of foot soldier
- Describe the battlefields effects on threat / friendly capabilities and board courses of action.
- Modified Combined Obstacle Overlay (MCOO) is the ultimate product
- Evaluate the Threat
- Do not underestimate your opponent
- Doctrinal template (DOCTEMP) – Illustrate the deployment pattern and disposition preferred by the threat’s normal tactics when not constrained by the effects of the battlefield environment.
- Usually a scaled graphical depiction of threat dispositions for a particular type of standard operations.
- E.g. (Battalion movement to contact, an insurgent ambush, terrorist kidnapping).
- Description of tactics and options
- Operations of the major units or elements portrayed on the template.
- Activities of the different battlefield operating systems
- Listing or description of options available to the threat should the operation fail (branches), or subsequent operations if it succeeds (sequels).
- Identify high value target
- HVTS - Assets the Commander requires to accomplish his mission
- High Payoff Targets are the targets (HVTS) that belong to the enemy that we must kill to be successful.
- Identify threat capabilities
- Four tactical broad COAs (Operational Capabilities) open to military forces in conventional operations.
- Attack, Defend, Reinforce, Conduct a retrograde
- Broad COAs can be divided into a variety of more specific COAs.
- Battle Operating System (BOS) Capabilities (Equipment and Capabilities)
- Examples
- Use of NBC, Use of supporting air assets, Intelligence collection, electronic warfare, Engineering Operations, Air assault or airborne operations, Amphibious assaults, Psychological warfare (PSYOP), deceptive operations.
- Identify Threat Course of Actions
- Identify the threat’s likely objectives and desired end state
- What does the enemy seek to do to us
- How does the enemy define success
- How can we deny him success
- Identify full set of COAs available to the threat SITEMPs (Situation Templates)
- Develop as many potential COAs as time allows
- Criteria (suitability, feasibility, acceptability, uniqueness, consistency with doctrine).
- Situation templates – are graphical depictions of the expected threat dispositions should he adopt a particular COA.
- Enemy SOP (Threat Model) + Environment (Terrain Model) = Enemy COA (SITEMP)
- Evaluate and prioritize each COA
- Develop each COA in the amount of detail time allows
- What, when, where, how, why
- Identify initial collection requirements
- IPB for special staff and support units
- The products will be slightly different
- The process remains the same
- Situation Development – the act of quickly compiling, displaying, and analyzing the current battle as it relates to the enemy and friendly forces.
- Based upon the collection effort and the unit’s effort to answer the Commander’s critical information requirements
- Determines which COA the enemy has adopted
- May identify some HVT not initially named during IPB process
- Based on the Priority Intelligence Requirements
- Helps the commander make decisions
- Force Protection
- Determines if friendly forces are
- Under threat of enemy action
- In proper security posture
- Informed of the threat
- Subversion and Espionage Directed against the U.S. Army (SAEDA)
- Subversion – Sabotage or terrorist acts
- Espionage- Spying(Internal and External)
- Counterintelligence measures
- Practice camouflage principles and techniques
- Practice noise and light discipline
- Practice field sanitization
- Use proper radiotelephone procedure
- Specific examples
- Do not take personal letters or pictures into combat areas
- Do not keep diaries in combat areas
- Be careful when discussing military affairs
- Report anyone that tries to get information about US operations
- Discuss military operations only with those that have a need to know
- Remind fellow soldiers of their counterintelligence responsibilities
- What defines a SAEDA incident
- Attempts by unauthorized personnel to obtain classified information
- Attempts by unauthorized personnel to obtain unclassified yet FOUO information.
- Acts of treason espionage and treason by Army personnel
- Contact with persons known or suspected to be a foreign agent or terrorist
- Discovery of surveillance devices near sensitive areas
- What if I’m approached
- Stay calm, get information, buy time then report.
- Don’t try to apprehend, make deals, agreements, or think about anything.
- Reporting procedures
- Recall as many details as possible as soon as possible. Make notes of what occurred.
- Contact your S2 / security manager
- Inform as few as people as possible (generally only two your S2 and your commander).
- If outside the U.S. report it to nearest military authority or U.S. Embassy/Consulate.
- Support to Strategic Responsiveness
- Strategic responsiveness focuses on factors and variables that affect where soldiers will live, work, and fight. It is a composite of all conditions, circumstances, and influences that affect the employment of military forces and bear on the decisions of the unit Commander.
- Eleven Critical Variables in the Operational Environment
- Information
- Information-based society
- Information technology
- Information warfare
- Information systems attack
- Psychological warfare
- Deception
- Media and global information flow
- Transparency (access to data)
- Sway public and political opinion
- Strategic implication of the tactical incident
- How planning is effected by an incident
- Economics
- Haves and have-nots
- Economic v. military superiority
- Ability to buy military technology or to conduct prolonged operations
- Regional and global relationships can result in military or political assistances.
- Time (Drives decision making capabilities)
- Opponents see time as being in their advantage
- Adjust to the nature of the conflict
- Control U.S. entry
- Dictate the tempo
- Outlast the U.S. will to continue
- Makeup of population
- Cultural, religious, ethnicity
- Failed or failing state
- Devotion to cause / hatred of another group
- Refugees and displaced persons
- Urban environments
- ROE has to address
- Difficulty distinguishing friend from foe
- Presence of children/women
- Short range of contact/time to react
- Involvement of civilians from both sides
- Physical Environment
- Military forces are optimized for certain environments
- Less complex and open environments (desert plains) favor the U.S.
- Urban and complex terrains enemies will use to their advantage.
- Military Capabilities (Most critical and complex factor)
- U.S. has overall technological advantage
- Conventional warfare is generally used against local and regional actors.
- Adaptive (asymmetric) warfare is generally used when the U.S. becomes involved.
- Weapons of Mass Destruction in Third World States
- Negate US advantages
- Threaten higher causalities
- Complicate military planning
- Perception of military strength
- Interfere with force build up / early entry
- Complicate operations
- Requires protective measures
- Nations that have nuclear weapons
- US, UK, France, Russia, Pakistan, India, China, North Korea, Israel.
- Nations suspected of have nuclear weapons
- Libya, Iran
- External Organization
- International humanitarian assistance
- Natural and man-made disasters
- Disease, hunger, and poverty
- Growing in influence and power
- Willingness to become involved in crisis situations
- Stated and hidden objectives
- Favorable to U.S. and provide assistance
- Adverse to U.S. or create conflict
- Make mistakes
- Alliances and Coalitions
- National Will (Victory often depends on will)
- People, government, and military.
- Objectives and duration of conflict.
- Attack the opponent’s national will and try to preserve your own
- U.S. National will as a vulnerability
- Technology
- Symmetric Capabilities
- Level the playing field
- Systems of similar capabilities or more advanced than our own
- Asymmetric
- Counters to our high tech systems
- Less advanced systems in complex/urban settings
- Selected niche areas
- Low-cost, high-payoff new technologies
- Precision munitions
- Technological surprise
- Nature and Stability of State
- Who is in charge (Where is the real strength)
- Political Leadership
- Military
- Police
- How strong or shaky
- Nature and aims of military campaign
- Kinds of threats present
- Threat – Any specific foreign nation or organization with intentions and military capabilities that suggest it could be adversarial or challenge the security interests of the United States, its friends, or allies.
- Actors – nation states (countries) and non-nation actors
- Categories of nation states
- Core States (Major powers)
- Dominate World Powers
- Most conflict with global consequences will involve the core states
- Transition States (Want-to-be)
- Larger, industrialized countries that want to be core states
- China, India, Indonesia, Russia
- Rogue States (Hostile)
- Countries hostile to their neighbors.
- Weaker countries but still a threat
- Seek weapons of mass destruction
- Support and sell arms to terrorists
- Iran, North Korea, Cuba, Libya
- Failed or Failing States (Instability)
- Weaker countries falling apart
- Revolution
- Economic collapse
- Definitions are fluid and based on
- Economics
- Politics (Internal and External)
- Expeditionary Military
- Multinational Alliances and Coalitions
- NATO and OPEC
- Non-nation Actors
- Rogue Actors
- Terrorists
- Drug-trafficking
- Criminal
- Third Party Actors
- Media
- External Organizations
- Civilians
- Analysis of Situation Development (So What)
- What does this mean?
- Why would the enemy do this?
- Determines the enemy’s future intentions
- Conduct Intelligence, Surveillance and Reconnaissance
- The intelligence officer synchronizes intelligence support to the ISR effort by focusing the collection, processing, analysis, and intelligence products on the critical needs of the Commander.
- The operations officer (in coordination with the intelligence officer) tasks and directs the available ISR assets to answer the commander’s critical information requirements (CCIRs).
- Four subtasks of ISR
- Perform intelligence synchronization
- Perform ISR integration
- Conduct tactical reconnaissance
- Conduct surveillance
- ISR
- CCIR (Priority Information Requirements and Friendly Force Information Requirements)
- A prioritized list of the remaining intelligence requirements
- Evaluate ISR assets and resources
- All of the assigned ISR tasks
- Surveillance – involves continuously observing an area to collect information. Wide-area and focused surveillance provides valuable information
- Reconnaissance – assets collect information and can validate current intelligence or predictions. Reconnaissance units, unlike other units, are designed to collect information.
- Orient the reconnaissance asset on the named area of interest (NAI) and/or reconnaissance objective in a timely manner.
- Report all information rapidly and accurately
- Complete the mission NLT the time specified in the order
- Answer the requirement that prompted the task
- Collectors must ask Four Questions of an NAI
- Why is it important to look there?
- What do you expect to see?
- When should we expect to see it?
- How long do we need to look?
- FM 34-8 Intelligence Battlefield Operating System (BOS)
- Salute Report (Size, Activity, Uniform, Time, Equipment)
- The Five S’s (Search, Silence, Segregate, Safeguard, Speed to the Rear)
- Search
- As soon as they are captured
- Take weapons and papers, except identification papers and protective masks.
- Give a written receipt for any personal property and documents taken.
- Tag documents and personal property to show which PW had them
- Before evacuating a PW attach a tag to him (Made yourself or provide by Battalion S2)
- PW documents can be a good source of information
- Give such documents to leader quickly, so information is not lost or become out-of-date.
- Segregate PWs by sex
- Subgroups
- Enlisted Personnel
- Civilians
- Political Figures
- Subgroups keeps leaders from prompting escape efforts
- Silence
- Do not let them talk to each other
- Report anything a PW says or does
- This keeps PW from planning escape and cautioning each other on security.
- Speed – Quickly move to rear (Leader will reassemble them and move them to the rear for questioning by the S2).
- Safeguard
- Do not let anyone abuse them.
- Watch for escape attempts
- Do not let PWs bunch up, spread out too far, or start diversions
- If a PW is wounded and cannot be evacuated through normal channels, he will be evacuated through medical channels.
- Provide intelligence Support to Effects
- The task of providing the commander information and intelligence support for targeting of the threats forces, threat organizations, units and systems through lethal and non-lethal fires to include electronic attack and information operations.
- Subtasks
- Provide intelligence Support to targeting
- Target Development – Systematic analysis of the enemy forces and operations to determine HVTs, systems, and system components for potential attack through maneuver, fires, or information.
- Target Detection – Establishes procedures for dissemination of targeting information.