Military Intelligence

  1. FM 2-0 (Intelligence Field Manual)
  2. Warfighting functions in general (Intelligence is one warfighting function)
  3. Maneuver
  4. Intelligence
  5. Fire Support
  6. Air Defense Artillery
  7. Command and Control
  8. Logistics
  9. Mobility, Survivability, Counter-Mobility
  10. Intelligence assists the commander in
  11. Visualizing his battlespace
  12. Organizing his forces
  13. Controlling operations to achieve the desired tactical objectives or end-state.
  14. Intelligence supports force protection by alerting the commander to emerging threats and assisting in security operations.
  15. Forms of intelligence
  16. HUMINT – Human intelligence
  17. SIGINT-Signal intelligence
  18. IMINT – Imagery intelligence
  19. TECHINT- Technical Intelligence
  20. MASINT-Measures and Signals Intelligence
  21. CI-Counter Intelligence
  22. S2 is the intelligence section
  23. Half of the Military Intelligence branch works at the CORP or higher
  24. Brigade (S2)
  25. Battalion(S2)
  26. 35D – MAJ, CPT, 1 LT
  27. 96B - Enlisted
  28. The four intelligence tasks
  29. Support to Situational Understanding
  30. Tasks
  31. Perform IPB
  32. Perform Situational Development
  33. Provide intelligence Support to Force Protection
  34. Conduct Police Intelligence Operations
  35. Commander’s Focus
  36. Plan the mission
  37. Execute the operation
  38. Secure the force
  39. Commander’s Decisions
  40. Which COA will I implement?
  41. Which enemy actions are expected?
  42. Support to Strategic Responsiveness
  43. Tasks
  44. Perform Indicators and Warnings (I&W)
  45. Ensure intelligence readiness
  46. Conduct area study of foreign countries
  47. Support sensitive site exploitation
  48. Commander’s focus
  49. Orient on contingencies
  50. Commander’s decisions
  51. Should I increase the unit’s level of readiness
  52. Should I implement the OPLAN (Operation plan)
  53. Counter Intelligence, Surveillance and Reconnaissance
  54. Tasks
  55. Preform intelligence synchronization
  56. Preform Intelligence, Surveillance and Reconnaissance (ISR) Integration
  57. Conduct tactical Reconnaissance
  58. Conduct surveillance
  59. Commander’s focus
  60. Plan the mission
  61. Prepare
  62. Execute
  63. Assess
  64. Commander’s decisions
  65. Which DPs, HPTs, etc. are linked to the enemy actions?
  66. Are assets available and in position to collect on the DPs and HPTs etc?
  67. Have the assets been repositioned for contingency mission?
  68. Provide Intelligence Support to Effects
  69. Tasks
  70. Provide intelligence support to targeting
  71. Provide intelligence support to IO
  72. Provide intelligence support to Combat assessment
  73. Commander’s focus
  74. Destroy/Suppress/neutralize targets
  75. Reposition intelligence or attack assets
  76. Commander’s Decisions
  77. Is my fire (lethal or non-lethal) and maneuver effective
  78. Should I refire the same targets
  79. Intelligence Preparation for Battlefield/Battlespace (IPB)
  80. FM 34-130
  81. IPB is the systematic, continuous process of analyzing the threat and the environment in a specific geographic area.
  82. Answer the commander’s questions about
  83. Terrain
  84. Weather
  85. Enemy Situation
  86. Helps commanders to selectively apply combat power at critical points in time and space on the battlefield.
  87. Describes the environment and its effects
  88. Determining the threat’s likely Course of Action (COA).
  89. Who conducts IPB
  90. Conducted at all levels (different levels of detail are required)
  91. S2 and G2 lead in IPB
  92. Process remains the same regardless of Audience, only the products may change.
  93. Everyone in the US Army conducts IPB in some form
  94. Four steps of IPB
  95. Define the Battlefield Environment
  96. Area of operation – the physical space where your unit is authorized to conduct operations. Given to you by your higher headquarters.
  97. Area of Interest-The physical area where enemy forces or their actions may affect your unit’s mission. Determined by the S2 and commander.
  98. Describe the Battlefield Effects
  99. Analyze the battlefield with regards to
  100. Terrain (Urban, Complex Terrain)
  101. Terrain Analysis
  102. Military Aspects of Terrain (OCOKA/OAKOC)
  103. Lines of communication(roads, rail, waterways)
  104. Cross-country movement overlay
  105. Drainage overlay
  106. Military Aspects of Terrain (OKOKA)
  107. Observation – the ability of a force to see the enemy either visually or through the use of surveillance devices.
  108. From where can the enemy see me?
  109. Where can I see the enemy from here?
  110. Fields of fire-An area that a weapon or groups of weapons can effectively cover with fire from a given position.
  111. From where can the enemy shoot me?
  112. Where can I shoot the enemy from here?
  113. Cover-Physical protection from the effects of both direct and indirect fires.
  114. Concealment-protection from observation
  115. Obstacles – Natural or man-made terrain features that stop, impede, or divert military movement.
  116. Obstacles are the foundation of an engagement area.
  117. Can I stop/slow the enemy here long enough to mass fires upon him.
  118. Will the enemy stop/slow me here and try to mass fires upon me?
  119. Use the (Modified Combined Obstacle Overlay) MCOO to graphically depict obstacles
  120. Key Terrain-Any natural or man-made feature which gives the force which controls it an advantage.
  121. Consider the following when analyzing terrain.
  122. Mission
  123. Level of Command
  124. Type of Unit
  125. Does the terrain aid me in the accomplishment of my mission?
  126. Does the terrain aid the enemy in the accomplishment of his mission?
  127. Avenues of Approach
  128. Air or ground route of an attacking force which leads to the objective or key terrain within its path.
  129. On the attack ask - what route can I take to the objective?
  130. In the defense, ask – what route could the enemy take to get to me or the objective?
  131. Always consider both mounted and dismounted avenues of approach.
  132. Develop a MCOO to identify avenues of approach.
  133. Consider (Doctrinal distances, formations, speeds, maneuver space)
  134. Classify terrain as it pertains to maneuverability into one of three categories.
  135. Unrestricted – free of any restriction to movement. Units move at doctrinal speeds/distances. Nothing needs to be done to enhance mobility.
  136. Restricted- Terrain hinders movement. Units must adjust doctrinal distances or speeds. Some effort required to enhance mobility.
  137. Severely Restricted-terrain severely hinders movement. Units cannot travel at doctrinal distances and speeds.
  138. Logistical Infrastructure (sources of potable water, power production facilities, natural resources, communications systems, religious beliefs).
  139. Population demographics( education levels, cultural distinctions, religious beliefs)
  140. Economic conditions
  141. Politics( local, regional, and international treaties; unofficial politics –warlords, and gangs.
  142. Weather (FM 34-81-1)
  143. Visibility
  144. Light Data
  145. Begin Morning Nautical Twilight (BMNT)
  146. End Evening Nautical Twilight (EENT)
  147. Sunrise
  148. Sunset
  149. Moon Phases
  150. Laser range finding
  151. Poor visibility increases light infantry survivability.
  152. Winds
  153. Smoke / Chemical dispersion
  154. Decrease trajectory data and first hit probability
  155. Affects airborne, air assault, aviation operations
  156. Precipitation
  157. Degrades mobility
  158. Limits visibility
  159. Degrades weapons effectiveness
  160. Affects troop Morale
  161. Cloud Cover
  162. Heavy cloud clover limits illumination and solar heating of targets.
  163. Degrades many target acquisition systems
  164. Ceiling affects aviation operations
  165. Temperature and Humidity
  166. Extreme temperature reduces personnel effectiveness
  167. Low temperature degrade ballistics of weapons
  168. Temperature can effect vehicle performance
  169. High humidity decreases stamina of foot soldier
  170. Describe the battlefields effects on threat / friendly capabilities and board courses of action.
  171. Modified Combined Obstacle Overlay (MCOO) is the ultimate product
  172. Evaluate the Threat
  173. Do not underestimate your opponent
  174. Doctrinal template (DOCTEMP) – Illustrate the deployment pattern and disposition preferred by the threat’s normal tactics when not constrained by the effects of the battlefield environment.
  175. Usually a scaled graphical depiction of threat dispositions for a particular type of standard operations.
  176. E.g. (Battalion movement to contact, an insurgent ambush, terrorist kidnapping).
  177. Description of tactics and options
  178. Operations of the major units or elements portrayed on the template.
  179. Activities of the different battlefield operating systems
  180. Listing or description of options available to the threat should the operation fail (branches), or subsequent operations if it succeeds (sequels).
  181. Identify high value target
  182. HVTS - Assets the Commander requires to accomplish his mission
  183. High Payoff Targets are the targets (HVTS) that belong to the enemy that we must kill to be successful.
  184. Identify threat capabilities
  185. Four tactical broad COAs (Operational Capabilities) open to military forces in conventional operations.
  186. Attack, Defend, Reinforce, Conduct a retrograde
  187. Broad COAs can be divided into a variety of more specific COAs.
  188. Battle Operating System (BOS) Capabilities (Equipment and Capabilities)
  189. Examples
  190. Use of NBC, Use of supporting air assets, Intelligence collection, electronic warfare, Engineering Operations, Air assault or airborne operations, Amphibious assaults, Psychological warfare (PSYOP), deceptive operations.
  191. Identify Threat Course of Actions
  192. Identify the threat’s likely objectives and desired end state
  193. What does the enemy seek to do to us
  194. How does the enemy define success
  195. How can we deny him success
  196. Identify full set of COAs available to the threat SITEMPs (Situation Templates)
  197. Develop as many potential COAs as time allows
  198. Criteria (suitability, feasibility, acceptability, uniqueness, consistency with doctrine).
  199. Situation templates – are graphical depictions of the expected threat dispositions should he adopt a particular COA.
  200. Enemy SOP (Threat Model) + Environment (Terrain Model) = Enemy COA (SITEMP)
  201. Evaluate and prioritize each COA
  202. Develop each COA in the amount of detail time allows
  203. What, when, where, how, why
  204. Identify initial collection requirements
  205. IPB for special staff and support units
  206. The products will be slightly different
  207. The process remains the same
  208. Situation Development – the act of quickly compiling, displaying, and analyzing the current battle as it relates to the enemy and friendly forces.
  209. Based upon the collection effort and the unit’s effort to answer the Commander’s critical information requirements
  210. Determines which COA the enemy has adopted
  211. May identify some HVT not initially named during IPB process
  212. Based on the Priority Intelligence Requirements
  213. Helps the commander make decisions
  214. Force Protection
  215. Determines if friendly forces are
  216. Under threat of enemy action
  217. In proper security posture
  218. Informed of the threat
  219. Subversion and Espionage Directed against the U.S. Army (SAEDA)
  220. Subversion – Sabotage or terrorist acts
  221. Espionage- Spying(Internal and External)
  222. Counterintelligence measures
  223. Practice camouflage principles and techniques
  224. Practice noise and light discipline
  225. Practice field sanitization
  226. Use proper radiotelephone procedure
  227. Specific examples
  228. Do not take personal letters or pictures into combat areas
  229. Do not keep diaries in combat areas
  230. Be careful when discussing military affairs
  231. Report anyone that tries to get information about US operations
  232. Discuss military operations only with those that have a need to know
  233. Remind fellow soldiers of their counterintelligence responsibilities
  234. What defines a SAEDA incident
  235. Attempts by unauthorized personnel to obtain classified information
  236. Attempts by unauthorized personnel to obtain unclassified yet FOUO information.
  237. Acts of treason espionage and treason by Army personnel
  238. Contact with persons known or suspected to be a foreign agent or terrorist
  239. Discovery of surveillance devices near sensitive areas
  240. What if I’m approached
  241. Stay calm, get information, buy time then report.
  242. Don’t try to apprehend, make deals, agreements, or think about anything.
  243. Reporting procedures
  244. Recall as many details as possible as soon as possible. Make notes of what occurred.
  245. Contact your S2 / security manager
  246. Inform as few as people as possible (generally only two your S2 and your commander).
  247. If outside the U.S. report it to nearest military authority or U.S. Embassy/Consulate.
  248. Support to Strategic Responsiveness
  249. Strategic responsiveness focuses on factors and variables that affect where soldiers will live, work, and fight. It is a composite of all conditions, circumstances, and influences that affect the employment of military forces and bear on the decisions of the unit Commander.
  250. Eleven Critical Variables in the Operational Environment
  251. Information
  252. Information-based society
  253. Information technology
  254. Information warfare
  255. Information systems attack
  256. Psychological warfare
  257. Deception
  258. Media and global information flow
  259. Transparency (access to data)
  260. Sway public and political opinion
  261. Strategic implication of the tactical incident
  262. How planning is effected by an incident
  263. Economics
  264. Haves and have-nots
  265. Economic v. military superiority
  266. Ability to buy military technology or to conduct prolonged operations
  267. Regional and global relationships can result in military or political assistances.
  268. Time (Drives decision making capabilities)
  269. Opponents see time as being in their advantage
  270. Adjust to the nature of the conflict
  271. Control U.S. entry
  272. Dictate the tempo
  273. Outlast the U.S. will to continue
  274. Makeup of population
  275. Cultural, religious, ethnicity
  276. Failed or failing state
  277. Devotion to cause / hatred of another group
  278. Refugees and displaced persons
  279. Urban environments
  280. ROE has to address
  281. Difficulty distinguishing friend from foe
  282. Presence of children/women
  283. Short range of contact/time to react
  284. Involvement of civilians from both sides
  285. Physical Environment
  286. Military forces are optimized for certain environments
  287. Less complex and open environments (desert plains) favor the U.S.
  288. Urban and complex terrains enemies will use to their advantage.
  289. Military Capabilities (Most critical and complex factor)
  290. U.S. has overall technological advantage
  291. Conventional warfare is generally used against local and regional actors.
  292. Adaptive (asymmetric) warfare is generally used when the U.S. becomes involved.
  293. Weapons of Mass Destruction in Third World States
  294. Negate US advantages
  295. Threaten higher causalities
  296. Complicate military planning
  297. Perception of military strength
  298. Interfere with force build up / early entry
  299. Complicate operations
  300. Requires protective measures
  301. Nations that have nuclear weapons
  302. US, UK, France, Russia, Pakistan, India, China, North Korea, Israel.
  303. Nations suspected of have nuclear weapons
  304. Libya, Iran
  305. External Organization
  306. International humanitarian assistance
  307. Natural and man-made disasters
  308. Disease, hunger, and poverty
  309. Growing in influence and power
  310. Willingness to become involved in crisis situations
  311. Stated and hidden objectives
  312. Favorable to U.S. and provide assistance
  313. Adverse to U.S. or create conflict
  314. Make mistakes
  315. Alliances and Coalitions
  316. National Will (Victory often depends on will)
  317. People, government, and military.
  318. Objectives and duration of conflict.
  319. Attack the opponent’s national will and try to preserve your own
  320. U.S. National will as a vulnerability
  321. Technology
  322. Symmetric Capabilities
  323. Level the playing field
  324. Systems of similar capabilities or more advanced than our own
  325. Asymmetric
  326. Counters to our high tech systems
  327. Less advanced systems in complex/urban settings
  328. Selected niche areas
  329. Low-cost, high-payoff new technologies
  330. Precision munitions
  331. Technological surprise
  332. Nature and Stability of State
  333. Who is in charge (Where is the real strength)
  334. Political Leadership
  335. Military
  336. Police
  337. How strong or shaky
  338. Nature and aims of military campaign
  339. Kinds of threats present
  340. Threat – Any specific foreign nation or organization with intentions and military capabilities that suggest it could be adversarial or challenge the security interests of the United States, its friends, or allies.
  341. Actors – nation states (countries) and non-nation actors
  342. Categories of nation states
  343. Core States (Major powers)
  344. Dominate World Powers
  345. Most conflict with global consequences will involve the core states
  346. Transition States (Want-to-be)
  347. Larger, industrialized countries that want to be core states
  348. China, India, Indonesia, Russia
  349. Rogue States (Hostile)
  350. Countries hostile to their neighbors.
  351. Weaker countries but still a threat
  352. Seek weapons of mass destruction
  353. Support and sell arms to terrorists
  354. Iran, North Korea, Cuba, Libya
  355. Failed or Failing States (Instability)
  356. Weaker countries falling apart
  357. Revolution
  358. Economic collapse
  359. Definitions are fluid and based on
  360. Economics
  361. Politics (Internal and External)
  362. Expeditionary Military
  363. Multinational Alliances and Coalitions
  364. NATO and OPEC
  365. Non-nation Actors
  366. Rogue Actors
  367. Terrorists
  368. Drug-trafficking
  369. Criminal
  370. Third Party Actors
  371. Media
  372. External Organizations
  373. Civilians
  374. Analysis of Situation Development (So What)
  375. What does this mean?
  376. Why would the enemy do this?
  377. Determines the enemy’s future intentions
  378. Conduct Intelligence, Surveillance and Reconnaissance
  379. The intelligence officer synchronizes intelligence support to the ISR effort by focusing the collection, processing, analysis, and intelligence products on the critical needs of the Commander.
  380. The operations officer (in coordination with the intelligence officer) tasks and directs the available ISR assets to answer the commander’s critical information requirements (CCIRs).
  381. Four subtasks of ISR
  382. Perform intelligence synchronization
  383. Perform ISR integration
  384. Conduct tactical reconnaissance
  385. Conduct surveillance
  386. ISR
  387. CCIR (Priority Information Requirements and Friendly Force Information Requirements)
  388. A prioritized list of the remaining intelligence requirements
  389. Evaluate ISR assets and resources
  390. All of the assigned ISR tasks
  391. Surveillance – involves continuously observing an area to collect information. Wide-area and focused surveillance provides valuable information
  392. Reconnaissance – assets collect information and can validate current intelligence or predictions. Reconnaissance units, unlike other units, are designed to collect information.
  393. Orient the reconnaissance asset on the named area of interest (NAI) and/or reconnaissance objective in a timely manner.
  394. Report all information rapidly and accurately
  395. Complete the mission NLT the time specified in the order
  396. Answer the requirement that prompted the task
  397. Collectors must ask Four Questions of an NAI
  398. Why is it important to look there?
  399. What do you expect to see?
  400. When should we expect to see it?
  401. How long do we need to look?
  402. FM 34-8 Intelligence Battlefield Operating System (BOS)
  403. Salute Report (Size, Activity, Uniform, Time, Equipment)
  404. The Five S’s (Search, Silence, Segregate, Safeguard, Speed to the Rear)
  405. Search
  406. As soon as they are captured
  407. Take weapons and papers, except identification papers and protective masks.
  408. Give a written receipt for any personal property and documents taken.
  409. Tag documents and personal property to show which PW had them
  410. Before evacuating a PW attach a tag to him (Made yourself or provide by Battalion S2)
  411. PW documents can be a good source of information
  412. Give such documents to leader quickly, so information is not lost or become out-of-date.
  413. Segregate PWs by sex
  414. Subgroups
  415. Enlisted Personnel
  416. Civilians
  417. Political Figures
  418. Subgroups keeps leaders from prompting escape efforts
  419. Silence
  420. Do not let them talk to each other
  421. Report anything a PW says or does
  422. This keeps PW from planning escape and cautioning each other on security.
  423. Speed – Quickly move to rear (Leader will reassemble them and move them to the rear for questioning by the S2).
  424. Safeguard
  425. Do not let anyone abuse them.
  426. Watch for escape attempts
  427. Do not let PWs bunch up, spread out too far, or start diversions
  428. If a PW is wounded and cannot be evacuated through normal channels, he will be evacuated through medical channels.
  429. Provide intelligence Support to Effects
  430. The task of providing the commander information and intelligence support for targeting of the threats forces, threat organizations, units and systems through lethal and non-lethal fires to include electronic attack and information operations.
  431. Subtasks
  432. Provide intelligence Support to targeting
  433. Target Development – Systematic analysis of the enemy forces and operations to determine HVTs, systems, and system components for potential attack through maneuver, fires, or information.
  434. Target Detection – Establishes procedures for dissemination of targeting information.