FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
2-0
58
Chapter 2 2-38. Table 2-6 lists several operational aspects and intelligence, threat, and other OE considerations associated with the cyberspace domain. Table 2-6. Cyberspace domain operational aspects and intelligence and other considerations Cyberspace domain The cyberspace domain is the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunication networks, computer systems, embedded processors and controllers, and relevant portions of the electromagnetic spectrum (FM 3-0). Cyberspace is not constrained by geography; it is an extensive and complex global network of wired and wireless links connecting nodes that reach across every domain. Friendly, enemy, adversary, and host-nation networks, communications systems, computers, cellular phone systems, social media, and technical infrastructure are all part of cyberspace. The cyberspace domain is congested, contested, and critical to successful operations. (See FM 3-12.) Operational aspects Army intelligence considerations Threat and other OE considerations • Army intelligence must— ▪Leverage the intelligence architecture, including intelligence from the intelligence and cyberspace communities about the cyberspace domain. ▪Collaborate, participate in exercises, and build intelligence relationships with U.S. Cyber Command, other Services, CCMDs, and UAPs. • Space domain depends on the land, maritime, air, and space domains. ▪Understand USCYBERCOM, Army, joint, • CO use links and nodes located in these and other Service cyberspace and EW domains and perform functions to gain capabilities. access and create effects, first in ▪Build an understanding of and integrate with Threat capability examples: cyberspace and then in other domains. unique Army cyberspace capabilities and • Information warfare intent and objectives • Space operations depend on organizations such as ARCYBER, in the cyberspace domain. (This can cyberspace; space capabilities provide ARCYBER G-2, and the Cyber Military have global effects.) critical portions of cyberspace bandwidth. Intelligence Group. • Offensive CO against friendly forces. • Inherently joint, interorganizational, ▪ Build an electromagnetic order of battle in • Defensive cyberspace capabilities. multinational, and often a shared conjunction with the cyberspace community. • Cyberspace infrastructure with resource with signal and intelligence • Support other Services, CCMDs, and UAPs: specifications and nodes. units and organizations. ▪Support all measures to counter threat • EW capabilities, to include meaconing, • Army forces conduct CO and supporting information warfare, misinformation, and jamming, and decoys. activities as part of both Army and joint disinformation in the cyberspace domain, as • Disruption of friendly space capabilities. operations. authorized. Other OE examples: • Commanders and staffs use cyberspace ▪Support cyberspace domain target • Cyberspace (nonground) and EW capabilities to gain situational development on certain threat capabilities, communications, including cellular awareness and understanding of the as appropriate. coverage. enemy. ▪Support the joint identification of threats to • Cyberspace providers and ground • Cyberspace and EW capabilities enable key friendly cyberspace capabilities, as infrastructure, including power decision making, protect friendly appropriate. generation and networks. information, and inform and influence • Provide Army forces— • Computer, information technology, and audiences. ▪Coordinated electromagnetic spectrum associated commercial advancements. • To achieve an information advantage, actions, in terms of signals intelligence. • Other associated emerging technologies the commander and staff must integrate ▪Support to EW activities. such as nano computers and quantum EW activities and CO: computing. ▪Ensures command and control and ▪Support to CO and cybersecurity. maintains operations security. • Team with ARCYBER to exploit cyberspace ▪Slows or degrades enemy decision capabilities as part of intelligence support and information collection. making and targeting. • Team with Army EW units to exploit EW capabilities as a part of intelligence support and information collection. • Conduct signals intelligence surveys. Note. Challenges in terms of authorities, coordination, and deconfliction between Title 10 and Title 50 statute operations can occur. (See paragraphs B-71 through B-74.) ARCYBER United States Army Cyber Command FM field manual CCMD combatant command OE operational environment CO cyberspace operations UAP unified action partner G-2 assistant chief of staff, intelligence USCYBERCOM United States Cyber Command EW electromagnetic warfare
2-0
59
Multidomain Operations and Intelligence DIMENSIONS 2-39. Understanding the human, information, and physical dimensions of each domain assists commanders and staffs in assessing and anticipating the impacts of their operations. Operations reflect the reality that war is an act of force (in the physical dimension) to compel (in the information dimension) the decision making and behavior of enemy forces (in the human dimension). Actions in one dimension influence factors in the other dimensions. Intelligence analysts can categorize information and intelligence related to the human, information, and physical dimensions across all domains by the following elements for each threat entity: intent, capability, access, resources, and expertise. Understanding this interrelationship enables decision making about how to create and exploit advantages in one dimension and achieve objectives in the others without causing undesirable consequences. (See figure 2-4.) (See FM 3-0 for doctrine on the dimensions.) Figure 2-4. Interrelationships between the human, information, and physical dimensions
2-0
60
Chapter 2 2-40. Table 2-7 list several operational and intelligence considerations associated with the human dimension. Table 2-7. Operational and intelligence considerations for the human dimension The human dimension encompasses people and the interaction between individuals and groups, how they understand information and events, make decisions, generate will, and act within an operational environment (FM 3-0). Operational considerations (not all-inclusive) Intelligence considerations (not all-inclusive) • Impossibility of isolating the human dimension from the information Discussion: and physical dimensions. • The will to fight emerges from the complex interrelationship of • Activities and effects within the human dimension. They are challenging, culture, emotion, and behavior. but not impossible, to understand, collect against, make predictions • Military objectives are achieved by influencing that interrelationship. about, and support operational planning. Human thinking, will, intent, and • Influencing that interrelationship occurs by affecting attitudes, behavior are complex. beliefs, motivations, and perceptions. • Intelligence disciplines and complementary capabilities conducting • The commander and staff identify relevant actors and predict their information collection in and against the human dimension. For behaviors. example, PAI research, OSINT, HUMINT, and identity activities can • By understanding the operational environment, including relevant make important contributions to understanding important aspects of actors, the commander and staff attempt to influence relevant the human dimension; however, Army forces ultimately use an all- actors’ behaviors, decision making, and will through physical and source approach. informational means. • IWFTs, including warning intelligence, intelligence preparation of Human advantage: the operational environment, situation development, and intelligence support to targeting. They assist in accounting for • A human advantage occurs when a force holds the initiative in aspects within the human dimension. terms of training, morale, perception, and will. • Center of gravity analysis, functional analysis using critical factors, the • A human advantage enables friendly morale and will, degrades outside-in thinking analytic technique, and thorough analysis of relevant enemy morale and will, and influences popular support. actors. They are critical in assisting intelligence analysts in understanding • Examples include— the human dimension. ▪Soldier competence. • Operational variables, civil considerations (within the mission ▪The force’s health and physical fitness. variables), and a crosswalk of both operational and mission variables. They assist intelligence analysts in considering the ▪A cultural affinity and good relations with the local population. human dimension. FM field manual OSINT open-source intelligence HUMINT human intelligence PAI publicly available information IWFT intelligence warfighting function task 2-41. Table 2-8 lists several operational and intelligence considerations associated with physical dimension. Table 2-8. Operational and intelligence considerations for the physical dimension The physical dimension is the material characteristics and capabilities, both natural and manufactured, within an operational environment (FM 3-0). Operational considerations (not all-inclusive) Intelligence considerations (not all-inclusive) Discussion: • War is conducted with physical mechanisms. • Impossibility of isolating the physical dimension from the human and information dimensions. • Each domain is inherently physical. • Existence of most of the threat and other operational environment • The physical dimension includes space orbits, terrain, weather, considerations in table 2-2 on page 2-10 within the physical military formations, electromagnetic radiation, and weapons systems dimension. and their ranges. • Activities and effects within the physical dimension. They are • Physical activities create effects in the human and information easier, although not easy, to understand, collect against, and dimensions. predict compared to threat and other relevant actor aspects of the • The electromagnetic spectrum is one of the physical mechanisms human and information dimensions. that occurs across all domains. • Proficiency of intelligence disciplines and complementary Physical advantage: capabilities in conducting information collection in the physical • A physical advantage occurs when a force holds the initiative in dimension. terms of the number and combinations of capabilities, quality of • IWFTs, including warning intelligence, IPOE, situation capabilities, or geographic positioning. development, and intelligence support to targeting. They must • Finding multiple physical advantages is typically the goal of most consider the physical dimension. tactical operations: occupation of key terrain, physical isolation of the • A relatively complete list of threat and other operational enemy, and destruction of enemy units. environment aspects. This list within the physical dimension is • A physical advantage results in superior combat power. quite extensive. • A physical advantage creates human and information advantages. FM field manual IWFT intelligence warfighting function task IPOE intelligence preparation of the operational environment
2-0
61
Multidomain Operations and Intelligence 2-42. Table 2-9 list several operational and intelligence considerations associated with the information dimension. Table 2-9. Operational and intelligence considerations for the information dimension The information dimension is the content and data that individuals, groups, and information systems communicate and exchange, as well as the analytics and technical processes used to exchange information within an operational environment (FM 3-0). Operational considerations (not all-inclusive) Intelligence considerations (not all-inclusive) Discussion: • Connects humans to the physical world. Information transits through • Impossibility of isolating the information dimension from the human all domains. and physical dimensions. • Information—true, false, or in between—is used by friendly, enemy, • Activities and effects within the information dimension. They are adversary, and neutral actors to influence perceptions, decision challenging, but not impossible, to understand, collect against, make making, and behaviors. predictions about, create intelligence products, conduct intelligence • The effective employment of information depends on the audience, assessments, and support operational planning. message, and method of delivery. • Intelligence disciplines and complementary capabilities conducting • Social media can enable the swift mobilization of people and information collection in and against the information dimension. For resources around ideas and causes. example, PAI research, OSINT, and identity activities can make • Disinformation can significantly and negatively affect emotions, important contributions to the intelligence effort; however, Army perceptions, decision making, and behaviors. forces ultimately use an all-source approach. • Information enables decision making and combat power. • IWFTs, including warning intelligence, IPOE, situation • The information dimension is key to seizing, retaining, and exploiting development, and intelligence support to targeting. They must the initiative and consolidating gains. account for aspects within the information dimension. Information advantage: • Support to protecting information and disrupting threat communications. This is not that difficult. • An information advantage is the operational benefit derived when— ▪Friendly forces understand and exploit informational • Support to deception. This is more difficult, while support to influencing behaviors and countering misinformation and considerations to achieve information objectives. disinformation are very difficult. ▪Denying the threat’s ability to achieve information objectives. • Functional analysis with critical factors, the operational variables, • Army forces employ human and physical aspects to gain information civil considerations (within the mission variables), and a crosswalk advantages. of the operational and mission variables. They assist intelligence • Most types of information advantage result from intrinsic human and analysts in considering the information dimension. physical aspects of Army operations. • Content, data, and processes that individuals, groups, and • An information advantage can occur in terms of— information systems use to communicate; the technical processes ▪Collecting more and better information. and analytics used to exchange information; and how relevant ▪Using relevant information more effectively. actors and populations communicate. Intelligence analysts should highlight these. ▪Effective communications and protecting information. • Importance of analyzing relevant actors, information processes, ▪Disrupting the threat’s communications. communications means and nodes, and computer hardware and ▪Conducting deception. software—among other aspects. ▪Influencing relevant actors’ behavior. FM field manual OSINT open-source intelligence IPOE intelligence preparation of the operational environment PAI publicly available information IWFT intelligence warfighting function task OPERATIONAL AND MISSION VARIABLES 2-43. The operational and mission variables are tools that assist commanders and staffs in refining their understanding of the domains and dimensions of an OE. Commanders and staffs analyze and describe an OE in terms of eight interrelated operational variables: political, military, economic, social, information, infrastructure, physical environment, and time (PMESII-PT). The operational variables assist leaders in understanding the land domain and its interrelationships with information, relevant actors, and capabilities in the other domains. 2-44. Commanders analyze information categorized by the operational variables in the context of the missions they are assigned. They use the mission variables, in combination with the operational variables, to refine their understanding of the situation and visualize, describe, and direct operations. The mission variables are mission, enemy, terrain and weather, troops and support available, time available, and civil considerations—each of which has informational considerations—those aspects of the human, information, and physical dimensions that affect how humans and automated systems derive meaning from, use, act upon, and are impacted by information (FM 3-0). The mission variables are represented as METT-TC (I). (See FM 5-0 for doctrine on the operational and mission variables.)
2-0
62
Chapter 2 Note. METT-TC (I) represents the mission variables that leaders use to analyze and understand a situation in relationship to the unit’s mission. The first six variables are not new. However, the pervasiveness of information and its applicability in different military contexts requires leaders to continuously assess various aspects of information during operations. Because of this, I has been added to the METT-TC mnemonic. Informational considerations, expressed as a parenthetical variable, is an important component of each variable of METT-TC that leaders must understand in developing an understanding of a situation and the relevant portions of the OE. (See FM 3-0.) INTELLIGENCE AND UNDERSTANDING AN OPERATIONAL ENVIRONMENT 2-45. Understanding the domains and dimensions of an OE requires aggressive information collection and thorough intelligence analysis across echelons—from the joint level, where there are sophisticated capabilities, to the lowest tactical echelon. However, analyzing and understanding the domains and dimensions of an OE are not an end in and of themselves; information from the domains and dimensions must also feed the operational and mission variables. This ultimately results in the commander and staff reaching adequate situational understanding and visualizing, describing, and directing operations. Figure 2-5 concisely illustrates how to understand an OE and continuously focus and refine information from the domains and dimensions to support operations. Figure 2-5. Understanding an operational environment
2-0
63
Multidomain Operations and Intelligence 2-46. Understanding an OE is complex. The intelligence staff and intelligence analysis contribute to analyzing and describing the relevant aspects of the domains and dimensions through the operational and mission variables specific to a unit’s mission. Through participation with the entire staff, the intelligence staff leads and/or performs an important role in— ⚫ Understanding the domains and dimensions in time and space and identifying OE changes, including their causes and impacts. ⚫ Identifying how human behaviors and beliefs and information impact the physical dimension of operations. ⚫ Identifying one or more centers of gravity, depending on the echelon and situation. ⚫ Functional analysis. ⚫ Developing adversary and enemy threat models and identifying strengths and vulnerabilities across all domains. ⚫ Identifying possible friendly and enemy windows of opportunity across the domains and dimensions to create effects and possibly reach an advantage. Note. The intelligence staff must view the OE from friendly and enemy perspectives and any significant neutral and other actors. ⚫ Determining how, when, and where to leverage friendly capabilities across the domains to find and exploit friendly windows of opportunity. ⚫ Assisting the commander to visualize operations and impacts on the OE. ⚫ Framing and planning COAs and decisions during the MDMP. 2-47. The intelligence staff, primarily through continuous intelligence analysis and IPOE, assists the commander and staff in focusing on and understanding the relevant aspects of an OE and determining in which domains those relevant aspects reside. This allows the commander and staff to discount irrelevant aspects of the OE. Identifying significant aspects of the OE (a substep to step 1 of IPOE) and describing environmental effects on operations (step 2 of IPOE) are crucial in ensuring the operational and mission variables are properly considered during the MDMP. The following also support the commander and staff’s understanding of an OE: ⚫ Understanding domain capabilities and how they are employed and understanding the various aspects of the dimensions are critical in synchronizing intelligence activities, to include modifying the intelligence architecture. ⚫ In turn, intelligence synchronization supports effective collection management and intelligence collection, which result in more focused and relevant information within the operational and mission variables. ⚫ Leveraging specialized and detailed intelligence from the intelligence enterprise is crucial to the effort. ⚫ Collaborating with each staff section and across the intelligence enterprise provides additional depth to understanding each domain and its interdependencies. ⚫ Accessing joint target system analysis (TSA) and joint target development products can be useful when trying to understand domain capabilities and interdependencies. ⚫ Army forces, especially when preparing for armed conflict during competition, must conduct Army analysis of threat systems through a federated target production effort. ⚫ The following IWFTs also support understanding an OE (see appendix B): ▪ Conduct pre-mission analysis of the OE. ▪ Provide warnings. ▪ Provide intelligence support to targeting (including target value analysis). ▪ Perform situation development.
2-0
64
Chapter 2 2-48. Figure 2-6 illustrates several ways that intelligence supports understanding an OE. Figure 2-6. How intelligence supports understanding an operational environment SECTION III – FUNDAMENTALS OF OPERATIONS 2-49. Understanding operational doctrine starts with understanding the higher-level doctrinal concepts in FM 3-0. Intelligence professionals must understand these fundamental concepts as well as how the intelligence warfighting function nests within them. In this manner, intelligence professionals can use the correct terminology and proper concepts in their dealings with the supported commander and staff and fellow intelligence professionals. This ensures the credibility of the professionals and the intelligence warfighting function. 2-50. The primary purpose of intelligence is to effectively support operations. Intelligence professionals must understand intelligence fundamentals and basic Army operational doctrine to provide effective and flexible intelligence support. This also assists intelligence professionals in understanding how commanders and staffs integrate and synchronize intelligence into operations as well as ensuring they are an effective part of the combined arms team.
2-0
65
Multidomain Operations and Intelligence ARMY OPERATIONS 2-51. The Army’s primary mission is to organize, train, and equip its forces to conduct prompt and sustained land combat to defeat enemy ground forces and seize, occupy, and defend land areas. It supports four strategic roles for the joint force. Army forces shape OEs, counter aggression on land during crisis, prevail during large-scale combat, and consolidate gains. The Army fulfills its strategic roles by providing forces for joint campaigns that enable the integrated deterrence of adversaries outside of conflict and the defeat of enemies during conflict or war. 2-52. Army forces achieve objectives through the conduct of operations. An operation is a sequence of tactical actions with a common purpose or unifying theme (JP 1, Volume 1). Operations vary in many ways. They occur in all types of physical environments, including urban, subterranean, desert, jungle, mountain, maritime, and arctic. Operations vary in scale of forces involved and duration. Operations change various conditions in the human, information, and physical dimensions of an OE and how these dimensions interrelate. 2-53. The complex environment in which operations occur demands leaders who understand both the science and art of operations. Understanding the science of operations—such as combat power ratios, weapons ranges, and movement tables—assists leaders in improving synchronization and reducing risk. However, there is no way to eliminate uncertainty, and leaders must exercise operational art to make decisions and assume risk. Intangible factors, such as the impact of leadership on morale, using shock effect to defeat enemy forces, and supportive populations, are fundamentally human factors that can overcome physical disadvantages and often decide the outcomes of an operation. 2-54. Army forces must be prepared for the most demanding and dangerous types of operations. Army forces contribute to conventional deterrence through their demonstrated capability, capacity, and will to wage war on land in any environment against any opponent. Credible combat forces with lethal capabilities make the other instruments of national power more potent, and they assist in deterring the enemy’s escalation of violence during other types of operations. (See FM 3-0 for doctrine on Army operations.) 2-55. Effective and flexible intelligence support assists the Army with the challenges and complexity associated with a broad variety of and significant differences between the types of Army operations and the OE factors that affect those operations. Army commanders, staffs, and the intelligence warfighting function must leverage the intelligence enterprise and fight for intelligence to grapple with these issues. While intelligence is complex and threats, especially peer threats, can counter at least some of the intelligence capabilities and collection assets, Army commanders and staffs can overcome these issues. Every Army echelon can mitigate these challenges through the commander owning the intelligence effort, effective staff integration, and creative and adaptive information collection to overcome existing information collection gaps. Together, these aspects of fighting for intelligence ensure success, whether the operation is a large- scale combat operation, foreign humanitarian operation, counterinsurgency, foreign internal defense, or a noncombatant evacuation. MULTIDOMAIN OPERATIONS 2-56. Multidomain operations is the combined arms employment of joint and Army capabilities to create and exploit relative advantages to achieve objectives, defeat enemy forces, and consolidate gains on behalf of joint force commanders (FM 3-0). Employing Army and joint capabilities makes use of all available combat power from each domain to accomplish missions at the least cost. Multidomain operations are the Army’s contribution to joint campaigns, spanning the competition continuum. Below the threshold of armed conflict, multidomain operations are how Army forces accrue advantages and demonstrate readiness for conflict, deterring adversaries while assuring allies and partners. During conflict, they are how Army forces close with and destroy the enemy, defeat enemy formations, seize critical terrain, and control populations and resources to deliver sustainable political outcomes.
2-0
66
Chapter 2 2-57. Leaders must understand the interdependencies between their own assigned forces and the forces or capabilities provided by others to generate the complementary and reinforcing effects of combined arms approaches. Army forces employ joint and other unified action partner capabilities to the extent they are available. However, because peer threats can contest the force in all domains, Army forces must be prepared to conduct operations when some or all joint capabilities are unavailable to support mission accomplishment. 2-58. Army forces employ organic capabilities in multiple domains, and they continuously benefit from air and maritime strategic transportation and space and cyberspace capabilities that they do not control, including global positioning, satellite communications, and joint ISR. Lower echelons may not always notice the opportunities created by higher echelons or other forces that operate primarily in other domains; however, leaders must understand how the absence of those opportunities affects their concepts of operations, decision making, and risk assessment. Like all operations, Army intelligence is and has been inherently multidomain in terms of the intelligence process. RELATIVE ADVANTAGE 2-59. During operations, small advantages can have significant impacts on the outcome of a mission, particularly when they accrue over time. Therefore, creating and exploiting relative advantages are necessary for all operations, and they become even more critical when opposing sides are evenly matched. A relative advantage is a location or condition, in any domain, relative to an adversary or enemy that provides an opportunity to progress towards or achieve an objective (FM 3-0). Commanders seek and create relative advantages to exploit through action, and they continually assess the situation to identify ways to expand opportunities. Army forces must accurately see themselves, see the enemy or adversary, and understand their OE before they can identify and exploit windows of opportunity to reach a relative advantage; this is one way that intelligence is critical to operations. 2-60. Army leaders are accustomed to creating and exploiting relative advantages through the combined- arms approach that traditionally focuses on capabilities from the land, maritime, and air domains. The proliferation of space and cyberspace capabilities further requires leaders who understand the advantages those capabilities create in their OE. The ability to integrate space, counterspace, and cyberspace capabilities (which can vary by echelon) expands options for creating advantages to exploit. Multidomain operations fracture the coherence of threat operational approaches by destroying, dislocating, isolating, and disintegrating their interdependent systems and formations, and by exploiting the opportunities these disruptions provide to defeat enemy forces in detail. 2-61. Army forces combine maneuver and targeting methods to defeat enemy formations and systems. Army forces employ maneuver to close with and destroy enemy formations in close operations. Targeting priorities support fires and other key capabilities to disintegrate enemy networks and systems. The commander and staff must consider the various situational understanding-related requirements and targeting-related intelligence requirements and prioritize them accordingly. Note. Generally, a thorough situational understanding is necessary to conduct effective targeting. Leaders execute the targeting process to create advantages that enable freedom of maneuver and exploit the positional advantages created by maneuver. Targeting is a key means for leaders to integrate the joint capabilities required to create depth in the OE and protect friendly formations. WINDOWS OF OPPORTUNITY, RELATIVE ADVANTAGES, AND INTELLIGENCE 2-62. Reaching a position of relative advantage across multiple domains does not just happen. Friendly forces must find and exploit a window of opportunity to reach a relative advantage. This effort is closely related to planning and creating desired effects (through lethal and nonlethal means) during operations. These windows of opportunity could be considered subtasks of or a main task to reaching a position of relative advantage. Both a position of relative advantage and a window of opportunity are doctrinal concepts and not concrete graphic planning measures such as named areas of interest (NAIs) or decision points. However, a creative staff should be able to graphically portray a window of opportunity through a series of related existing graphic planning measures like NAIs, decision points, target areas of interest (TAIs), and engagement areas.
2-0
67
Multidomain Operations and Intelligence 2-63. Identifying a possible window of opportunity (in time, location, domains, and possibly dimensions), planning operations, and controlling operations to exploit the window of opportunity requires focused intelligence analysis. Therefore, Army forces require timely, accurate, relevant, and predictive intelligence to understand threat characteristics, capabilities, objectives, and COAs across domains when relevant to the mission. Intelligence initially drives the combinations of defeat mechanisms that commanders and staffs pursue as they employ friendly force capabilities, sometimes precisely in time and space, against enemy forces. 2-64. During IPOE, each staff element provides input, ensuring a sufficiently broad view of the OE. Subsequently, the IPOE effort assists in identifying windows of opportunity to exploit threat vulnerabilities. For example, the air defense artillery staff element’s input to IPOE about enemy IADS capabilities and vulnerabilities may present the friendly commander with a possible window of opportunity. The gaps identified during initial IPOE and the requirements developed during the subsequent steps of the MDMP would drive information collection requirements to confirm the window of opportunity, support further planning, and support the exploitation of the window of opportunity. (See ATP 2-01.3 for IPOE doctrine.) 2-65. Besides IPOE, building a relatively complete situational understanding (supported by intelligence situation development) across all domains and dimensions is required to see opportunities, seize the initiative, and exploit enemy vulnerabilities at a window of opportunity. Seeing and understanding when and how to isolate portions of the OE in one or more domains must be supported by the intelligence warfighting function across echelons and include leveraging the intelligence enterprise. (See figure 2-7.) Friendly forces may not be able to continually maintain an adequate level of situational understanding to exploit every window of opportunity. In these situations, friendly forces must either accept a greater degree of risk or wait until they can rebuild an adequate level of situational understanding to exploit a window of opportunity. Figure 2-7. Finding windows of opportunity by building situational understanding 2-66. During large-scale combat operations against a peer threat, ground-force commanders may be required to conduct tactical activities, such as a deliberate attack, to open a window of opportunity for further exploitation by the joint force. For example, the destruction of specific enemy IADSs within a time window and at specific locations may allow friendly joint suppression of enemy air defense operations. This, in turn, may allow a deep strike that could result in the destruction of key enemy capabilities and lead to a relative
2-0
68
Chapter 2 advantage. Figure 2-8 depicts a scenario based on this example of a window of opportunity and exploiting the window of opportunity. Figure 2-8. Window of opportunity and exploiting the window of opportunity (example) LARGE-SCALE COMBAT OPERATIONS 2-67. The Army is manned, equipped, and trained to operate in all operational scenarios or categories, starting with the most lethal conditions first—large-scale combat against a peer threat. Large-scale combat operations are extensive joint combat operations in terms of scope and size of forces committed, conducted as a campaign aimed at achieving operational and strategic objectives (ADP 3-0). During ground combat, they typically involve operations by multiple corps and divisions and include substantial forces from the joint and multinational team. Large-scale combat operations often include both conventional and irregular forces on both sides. Chapter 4 discusses large-scale combat operations as part of armed conflict. 2-68. The Army provides the joint force commander (JFC) significant and sustained landpower and intelligence capabilities. Landpower is the ability—by threat, force, or occupation—to gain, sustain, and exploit control over land, resources, and people (ADP 3-0). The Army supports the joint force by providing capabilities and capacity to apply sustained combined arms landpower. Those capabilities include maneuver, fires, special operations, intelligence, EW, cyberspace operations, space operations, sustainment, and area security. Army forces assist JFCs in gaining and maintaining the initiative, defeating enemy forces on the ground, controlling territory and populations, and consolidating gains to establish conditions for a political settlement favorable to U.S. interests. 2-69. The JFC applies Army capabilities to neutralize sophisticated enemy forces and capabilities by systematically destroying key nodes and capabilities essential to the enemy’s ability to continue fighting and/or legitimizing its messaging. The joint force requires Army special operations forces and conventional Army units that are proficient in combined arms operations and capable of employing capabilities across multiple domains in complementary ways. By aggressively engaging the enemy, Army forces enable joint force freedom of action. Army intelligence capabilities are an integral part of joint ISR across all unified action partners. (See FM 6-05 for doctrine on special operations forces and conventional force integration.) COMBINED ARMS AND COMBAT POWER 2-70. Combined arms is the synchronized and simultaneous application of arms to achieve an effect greater than if each element was used separately or sequentially (ADP 3-0). Leaders combine arms in complementary and reinforcing ways to protect capabilities and amplify their effects. Confronted with a constantly changing situation, leaders create new combinations of capabilities, methods, and effects to pose new dilemmas for
2-0
69
Multidomain Operations and Intelligence adversaries. The combined arms approach to operations during competition, crisis, and armed conflict is foundational to exploiting capabilities from all domains and dimensions. 2-71. Complementary capabilities compensate for the vulnerabilities of one system or organization with the capabilities of a different one. Infantry protects tanks from enemy infantry and antitank systems, while tanks provide mobile protected firepower for the infantry. Ground maneuver can make enemy forces displace and become vulnerable to joint fires, while joint fires can disrupt enemy reserves and C2 to enable operations on the ground. Cyberspace and space capabilities and EW can prevent enemy forces from detecting and communicating the location of friendly land-based fires capabilities, and Army fires capabilities can destroy enemy ground-based cyberspace nodes and EW platforms to protect friendly communications. 2-72. Reinforcing capabilities combine similar systems or capabilities to amplify the overall effects a formation brings to bear in a particular context. During urban operations, for example, infantry, aviation, and armor units working in close coordination reinforce the protection, maneuver, and direct fire capabilities of each unit type while creating cascading dilemmas for enemy forces. Army artillery can be reinforced by close air support, air interdiction, and naval surface fire support. This greatly increases both the mass and range of fires available to a commander. Space and cyberspace capabilities used to disrupt enemy communications can reinforce a brigade combat team’s (BCT’s) ground-based jamming effort to increase the disruption to enemy C2. Military information support operations can amplify the effects of physical isolation on an enemy echelon, making it more vulnerable to friendly force exploitation. 2-73. The organic composition, training, and task organization of Army units set conditions for effective combined arms. Throughout operations, commanders assess the OE and adjust priorities, change task organization, and request capabilities to create exploitable advantages, extend operational reach, preserve combat power, and accomplish missions. 2-74. Combat power is the total means of destructive and disruptive force that a military unit/formation can apply against an enemy at a given time (JP 3-0). To generate combat power and apply it against enemy forces, Army forces integrate capabilities and synchronize warfighting functions—groups of tasks and systems united by a common purpose that commanders use to accomplish missions and training objectives (ADP 3-0). The intelligence warfighting function is synchronized with the other warfighting functions to generate each dynamic—leadership, firepower, information, mobility, and survivability—of combat power (see FM 3-0). (See figure 2-9.) Figure 2-9. Generating combat power 2-75. The warfighting functions provide an intellectual organization for common critical capabilities available to commanders and staffs at all echelons and levels of warfare. Warfighting functions are not confined to a single domain; they typically include capabilities from multiple domains. Warfighting functions are not branch-specific. Although some branches, staff sections, and types of units have a role or purpose that mainly aligns with a warfighting function, each warfighting function is relevant to all types of units.
2-0
70
Chapter 2 2-76. Through the warfighting functions, well sustained units can move and maneuver to bring combat power to bear against the enemy. Joint and Army indirect fires complement and reinforce organic firepower in maneuver units. Survivability is a function of protection tasks, the protection inherent to Army platforms, and schemes of maneuver that focus friendly strengths against enemy weaknesses. Intelligence determines how and where to best apply combat power against enemy weaknesses. C2 enables leadership, the most important qualitative aspect of combat power. 2-77. Intelligence professionals must understand the value of their role within the combined arms approach to generating combat power through the dynamics of leadership, firepower, information, mobility, and survivability. The combined arms approach creates complementary and reinforcing effects by employing the warfighting functions, which are primarily synchronized by the C2 warfighting function. In this manner, the intelligence warfighting function plays a key role in combined arms. To a large extent, understanding the OE, planning operations, controlling ongoing operations, and conducting operational assessments begin with intelligence. Effective intelligence staff activities and intelligence operations result from intelligence synchronization, careful planning, and tailoring the use of intelligence capabilities and the intelligence architecture specifically for that unit’s operation. MULTIDOMAIN OPERATIONS: THE ARMY’S OPERATIONAL CONCEPT 2-78. The Army’s operational concept is multidomain operations. Multidomain operations are how Army forces contribute to and operate as part of the joint force. Army forces, enabled by joint capabilities, provide the lethal and resilient landpower necessary to defeat threat standoff approaches and achieve joint force objectives. 2-79. The employment of joint and Army capabilities, integrated across echelons and synchronized in a combined arms approach, is essential to defeating threats able to contest the joint force in all domains. Army forces integrate land, maritime, air, space, and cyberspace capabilities that facilitate maneuver to create human, information, and physical advantages that JFCs exploit across the competition continuum. Commanders and staffs require the knowledge, skills, attributes, and intelligence to integrate capabilities rapidly and at the necessary scale appropriate to each echelon. 2-80. During competition, theater armies strengthen landpower networks, set the theater, and demonstrate readiness for armed conflict through the C2 of Army forces supporting the command campaign plan. During crisis, theater armies provide options to combatant commanders (CCDRs) as they facilitate the flow and organization of land forces moving into theater. During armed conflict, theater armies enable and support the joint force land component commander’s (JFLCC’s) employment of land forces. The JFLCC provides C2 of land forces and allocates joint capabilities to its corps and other subordinate tactical formations. 2-81. Corps integrate joint and Army capabilities at the right tactical echelons and employ divisions to achieve JFLCC objectives. Divisions, enabled and supported by corps, defeat enemy forces, control land areas, and consolidate gains for the joint force. Defeating or destroying enemy capabilities that facilitate the enemy’s preferred layered standoff approaches is central to success. For example, ground-force commanders may be required to conduct tactical activities, such as a deliberate attack, to shape the environment to gain a position of relative advantage for activities, such as joint fires, within the other domains. Ultimately, operations by Army forces both enable and are enabled by the joint force. 2-82. Because uncertainty, degraded communications, and fleeting windows of opportunity characterize OEs during combat, multidomain operations require a disciplined initiative cultivated through a mission command culture. Leaders must have a bias for action and accept that some level of uncertainty is always present. Commanders who empower leaders to make rapid decisions and accept risk within the commander’s intent enable formations at echelon to adapt rapidly while maintaining unity of effort. (See ADP 6-0 for doctrine on the mission command approach.)
2-0
71
Multidomain Operations and Intelligence Multidomain Task Force The multidomain task force (MDTF) is one way that Army units integrate capabilities across domains to assist in achieving joint force objectives. An MDTF is an Army brigade-sized task force designed to coordinate, integrate, synchronize, and employ cross-domain fires to neutralize enemy A2 and AD strategies. MDTF operations allow more options for the joint force and a greater degree of freedom of maneuver. The MDTF has the following MI capabilities: • The MDTF S-2 is the principal staff officer for intelligence and synchronizes the intelligence warfighting function. • The multidomain effects battalion (MDEB) provides sensing and intelligence support, target development, and delivery and synchronization of nonlethal effects to the MDTF. The MDEB provides mission C2, planning, analysis, execution as well as company-level staff support functions. ▪ The MDEB S-2 section performs IPOE to assist the commander and staff’s visualization, planning, decision making, and nonkinetic effects employment. ▪ The MDEB has an organic MI company that answers the commander’s intelligence requirements and conducts SIGINT collection and technical analysis, OSINT, intelligence PED, and intelligence analysis to support multidomain operations. The MI company also coordinates with the fires cell for target development across the strategic contexts to create a relative advantage. (See ATP 2-19.1-1 and ATP 3-93.) Note. All Army units conduct multidomain operations, not just MDTFs. 2-83. Army intelligence supports all aspects of multidomain operations across all echelons—from the CCDR and staff to the Army maneuver battalion commander and staff. Joint intelligence supports critical joint force objectives such as neutralizing enemy integrated air defenses, destroying long-range surface-to- surface fires systems, denying enemy access to a designated area, disrupting enemy C2, protecting friendly networks, conducting military deception, or disrupting an enemy’s ability to conduct information warfare. These operations are enabled by precise and detailed joint intelligence on threat capabilities and vulnerabilities across all domains. Seeing and understanding when and how the joint force isolates portions of the OE in one or more domains are important to Army operations. 2-84. Army intelligence is inherently multidomain, joint, interagency, intergovernmental, and multinational through the intelligence enterprise. The Army synchronizes with unified action partners to provide effective and flexible intelligence across multiple domains and to reduce operational uncertainty. Through the Army IWFTs, intelligence professionals across the echelons support how commanders and staffs plan, make decisions, and control operations in and across the various domains and dimensions. Using the various tools and processes discussed under understanding an OE, the intelligence staff strives to support continuous situational understanding to allow Army units to see opportunities, seize the initiative, and exploit enemy vulnerabilities to open windows of opportunity and reach positions of relative advantage. 2-85. The optimal mix of leveraging partner, national, and joint capabilities and conducting aggressive Army information collection are necessary to defeat threat A2 and AD capabilities and support friendly long-range precision fires. Emerging Army deep sensing capabilities will assist in improving Army lethality at a greater depth. Deep sensing is the employment of capabilities beyond the division coordinated fire line to collect data and information that supports targeting, situational understanding, or decision making.
2-0
72
Chapter 2 TENETS OF OPERATIONS 2-86. The tenets of operations are desirable attributes that should be built into all plans and operations; they are directly related to how the Army’s operational concept should be employed. Commanders use the tenets of operations to inform and assess COAs throughout the operations process. The extent to which an operation exhibits the tenets provides insight into the probability of success. The tenets of operations are agility, convergence, endurance, and depth. 2-87. The Army provides forces capable of transitioning to combat operations, fighting for information, producing intelligence, adapting to unforeseen circumstances, and defeating enemy forces (agility). Army forces employ capabilities from multiple domains in a combined arms approach that creates complementary and reinforcing effects through multiple domains, while preserving combat power to maintain options for the JFC (convergence). Creating and exploiting relative advantages require Army forces to operate with endurance and in depth. Endurance enables the ability to absorb the enemy’s attacks and press the fight over the time and space necessary to accomplish the mission. Depth applies combat power throughout the OE, securing successive operational objectives and consolidating gains for the joint force. Table 2-10 lists several intelligence considerations for the tenets of operations. Table 2-10. Intelligence considerations for the tenets of operations Tenet of operations Intelligence considerations (not all-inclusive) • Intelligence preparation of the operational environment: Agility is the ability to move forces and adjust their ▪Terrain and weather analysis. dispositions and activities more rapidly than the enemy ▪Careful consideration of threat capabilities in conjunction with threat (FM 3-0). Agility requires sound judgment and rapid characteristics and threat models. decision making, often gained by creating and exploiting ▪Situation templates. information advantages. Agility requires leaders to ▪Event templates and associated event matrices. anticipate needs or opportunities and trained formations • Collection management. to change direction, tasks, or focus as quickly as the • Support to rapid decision making and risk management. situation requires. Change can include a transition • Input to decision support templates and to branches and sequels. between phases of an operation or the requirement to • Support to information advantage activities. adapt to a new opportunity or hazard. • Support to identifying windows of opportunity and relative advantages. • Continuous updates to the CIP and intelligence portion of the COP. • Intelligence preparation of the operational environment: ▪Significant civil considerations. Convergence is an outcome created by the concerted ▪Detailed situation templates. For example, templating threat logistics and lines employment of capabilities from multiple domains and of communications. echelons against combinations of decisive points in any ▪Event templates and associated event matrices. domain to create effects against a system, formation, ▪High-value targets. decision maker, or in a specific geographic area (FM 3-0). • Understanding the domains and dimensions through pre-mission analysis of the Its utility derives from understanding the interdependent operational environment. relationships among capabilities from different domains • Collection management and effectively using intelligence handover lines. and combining those capabilities in surprising, effective • Input to decision support templates. tactics that accrue advantages over time. When • Support to functional analysis and center of gravity analysis. combined, the complementary and reinforcing nature of each friendly capability present multiple dilemmas for • Support to information advantage activities. enemy forces and produce an overall effect that is greater • Support to identifying windows of opportunity and relative advantages. than the sum of each individual effect. The greater the • Support to targeting: extent to which forces achieve convergence and sustain it ▪Analyzing threat systems and conducting target value analysis. over time, the more favorable the outcome. ▪Developing target intelligence folders. ▪Conducting subsequent target development. • Continuous updates to the CIP and intelligence portion of the COP. Endurance is the ability to persevere over time • Intelligence preparation of the operational environment: Careful consideration throughout the depth of an operational environment and templating (situation and event templates) of threat activities in the rear area (FM 3-0). Endurance enhances the ability to project (friendly operational framework). combat power and extends operational reach; it is about • Collection management. resilience and preserving combat power while continuing • Counterintelligence primary mission areas (not the same as force protection; operations for as long as is necessary to achieve the see paragraphs 1-66 through 1-68). desired outcome. During competition, Army forces • Input to protection activities. improve endurance by setting the theater across all • Input to security operations. warfighting functions and improving interoperability with • Input to decision support templates. allies and other unified action partners. Endurance stems • Support to targeting. from organizing, protecting, and sustaining a force. • Continuous updates to the CIP and intelligence portion of the COP.
2-0
73
Multidomain Operations and Intelligence Table 2-10. Intelligence considerations for the tenets of operations (continued) Tenet of operations Intelligence considerations (not all-inclusive) • Intelligence preparation of the operational environment: Depth is the extension of operations in time, space, or purpose to achieve definitive results (ADP 3-0). While the ▪Terrain and weather analysis. focus of endurance is friendly combat power, the focus of ▪Detailed situation templates, especially in the deep area (friendly operational depth is enemy locations and dispositions across all framework). domains. Commanders achieve depth by understanding ▪Event templates and associated event matrices. the strengths and vulnerabilities of the enemy’s echeloned ▪High-value targets. capabilities and then attacking them throughout their • Understanding the domains and dimensions through pre-mission analysis of the dispositions simultaneously and sequentially. Although operational environment. simultaneous attacks through all domains in depth are not • Collection management and effectively using deep sensing. possible in every situation, leaders seek to expand their • Input to decision support templates. advantages and limit enemy opportunities for sanctuary • Support to targeting, especially deep operations and long-range precision fires. and regeneration. Leaders describe the depth they can • Support to information advantage activities. achieve in terms of operational reach. • Continuous updates to the CIP and intelligence portion of the COP. ADP Army doctrine publication COP common operational picture CIP common intelligence picture FM field manual IMPERATIVES OF OPERATIONS 2-88. Imperatives are actions Army forces must take to defeat enemy forces and achieve objectives at an acceptable cost. They are informed by the OE and the characteristics of the most capable threats that Army forces can encounter. The imperatives of operations include— ⚫ See yourself, see the enemy, and understand the OE. ⚫ Account for being under constant observation and all forms of enemy contact. ⚫ Create and exploit relative human, information, and physical advantages in pursuit of decision dominance. ⚫ Make initial contact with the smallest element possible. ⚫ Impose multiple dilemmas on the enemy. ⚫ Anticipate, plan, and execute transitions. ⚫ Designate, weight, and sustain the main effort. ⚫ Consolidate gains continuously. ⚫ Understand and manage the effects of operations on units and Soldiers. 2-89. Table 2-11 lists several intelligence considerations for the imperatives of operations. Table 2-11. Intelligence considerations for the imperatives of operations Imperative Intelligence considerations (not all-inclusive) • Applicable to most intelligence warfighting function tasks. • Understanding the domains and dimensions through pre-mission analysis of the OE in conjunction with cultural intelligence and civil information. See yourself, see the enemy, and understand the OE. • Intelligence preparation of the OE: enemy COA development. Commanders visualize OEs in terms of factors that are • Collection management. relevant to decision making. OEs are dynamic and • Functional analysis and center of gravity analysis (corresponds to defeat contain vast amounts of information that can overload C2 mechanisms [see FM 3-0]). systems and impede decision making. Commanders • Collaboration with the entire staff to facilitate situational and shared understanding of simplify information collection, analysis, and decision friendly and threat strengths and vulnerabilities and potential impacts across the OE. making by focusing on how they see themselves, see the • Assisting the commander and staff in understanding friendly combat power in enemy, and understand the OE. These three categories relation to the threat correlation of forces analysis. of factors are interrelated, and leaders must understand • Advising the commander on intelligence requirements development. how each one relates to the others in the current context. • Developing and maintaining a running estimate and the CIP. • Input to the military decision-making process. • Support to security operations and protection activities.
2-0
74
Chapter 2 Table 2-11. Intelligence considerations for the imperatives of operations (continued) Imperative Intelligence considerations (not all-inclusive) • Considering threat collection across all domains and dimensions and integrating that into the planning and execution of operations. • Multidisciplined intelligence threat assessments and associated countermeasure recommendations. • Counterintelligence primary mission areas. • Intelligence preparation of the OE: ▪Modified combined obstacle overlays. ▪Observation and fields of fire, avenues of approach, key terrain, obstacles, Account for being under constant observation and all and cover and concealment (OAKOC=military aspects of terrain). forms of enemy contact. Air, space, and cyberspace capabilities increase the ▪Considering the forms of contact, including influence. (See paragraphs 8-30 likelihood that threat forces can gain and maintain and 8-31.) continuous visual and electromagnetic contact with Army ▪Terrain analysis. forces. Enemy forces possess a wide range of land-, ▪Terrestrial and space weather analysis, with an emphasis on weather effects, maritime-, air-, and space-based intelligence, surveillance, in conjunction with the Air Force staff weather officer. and reconnaissance capabilities that can detect U.S. ▪Line of sight analysis. forces. Leaders must assume they are under constant ▪Electromagnetic reconnaissance. observation from one or more domains and continuously ▪Identifying enemy reconnaissance objectives. ensure they are not providing lucrative targets for the • Support to counterreconnaissance, including counter-unmanned aircraft system enemy to attack. operations. • Input to essential elements of friendly information. • Support to counterspace operations. • Support to deception operations. • Input to obscuration operations. • Input to the various forms of security across all security operations and activities, including electromagnetic emission control measures, unit dispersion techniques, operations security, information security, and physical security. Create and exploit positions of physical, information, and human advantage in pursuit of decision dominance. • Intelligence preparation of the OE: The employment of lethal forces is based on the premise ▪Situational understanding of domain and dimension interrelationships. that destruction and other physical consequences compel ▪Identifying enemy decision makers (with supporting identity intelligence), C2 enemy forces to change their decision making and networks with capabilities and vulnerabilities, objectives and intent, and behavior, ultimately accepting defeat. The type, amount, possible key decision points. and ways in which lethal forces compel enemy forces • Collection management. varies, and this depends heavily on enemy forces, their capabilities, goals, and the will of relevant populations. • Support to the military decision-making process. Understanding the relationship between physical, • Support to identifying windows of opportunity and relative advantages. information, and human factors enables leaders to take • Support to information advantage activities. advantage of every opportunity and limit the negative effects of undesirable and unintended consequences. Make initial contact with the smallest element possible. Army forces are extremely vulnerable when they do not sufficiently understand the disposition of enemy forces and become decisively engaged on terms favorable to enemy • Intelligence preparation of the OE: COA development. forces. To avoid being surprised and incurring heavy losses, • Collection management. leaders must set conditions for making enemy contact on • Support to rapid development of situational understanding. terms favorable to the friendly force. Leaders should • Input to information collection—cueing, redundancy, and mix considerations anticipate when and where to make enemy contact, the across domains and dimensions. probability and impact of making enemy contact, and actions to take on contact. Quickly applying multiple capabilities against enemy forces while preventing the bulk of the friendly force from being engaged itself requires understanding the forms of contact.
2-0
75
Multidomain Operations and Intelligence Table 2-11. Intelligence considerations for the imperatives of operations (continued) Imperative Intelligence considerations (not all-inclusive) Impose multiple dilemmas on the enemy. Imposing multiple dilemmas on enemy forces complicates their decision making and forces them to prioritize among • Intelligence preparation of the OE: competing options. This is a way of seizing the initiative and making enemy forces react to friendly operations. ▪Situational understanding of domain and dimension interrelationships. Simultaneous operations encompassing multiple domains— ▪Identifying enemy C2 networks with capabilities and vulnerabilities. conducted in depth and supported by deception—present ▪COA development. enemy forces with multiple dilemmas. Employing ▪Event templates and associated event matrices. capabilities from multiple domains degrades enemy • Support to the military decision-making process. freedom of action, reduces enemy flexibility and endurance, • Support to targeting. and disrupts enemy plans and coordination. The application • Support to deception efforts. of capabilities in complementary and reinforcing ways creates more problems than an enemy commander can solve. This erodes enemy effectiveness and the will to fight. Anticipate, plan, and execute transitions. • Input to information collection. Transitions mark a change of focus in an operation. • Collection management with emphasis on collection transitions. Leaders plan transitions as part of the initial plan or parts • Input to the military decision-making process. of a branch or sequel. They can be unplanned and cause • Input to consolidating gains, branches, and sequels. the force to react to unforeseen circumstances. • Continuous updates to the CIP and intelligence portion of the COP. Transitions can be part of progress toward mission accomplishment, or they can reflect a temporary setback. • Support to assessments, including measures of performance and effectiveness. Designate, weight, and sustain the main effort. Commanders frequently face competing demands for limited resources. They establish priorities to resolve • Intelligence preparation of the OE with emphasis on terrain analysis. these demands by designating, weighting, and sustaining • Assisting the commander and staff in understanding friendly combat power in the main effort. They provide the main effort with the relation to the threat correlation of forces analysis. appropriate resources and support necessary for its • Support to identifying defeat mechanisms. success. When designating a main effort, commanders • Collection management. consider augmenting a unit’s task organization and giving • Support to information collection. it priority of resources and support. The commander • Input to the military decision-making process. designates various priorities of support, such as for air • Support to targeting. and missile defense, close air support and other fires, • Continuous updates to the CIP and intelligence portion of the COP. information collection, mobility and countermobility, and sustainment. Consolidate gains continuously. Leaders add depth to their operations in time and purpose when they consolidate gains. Commanders consolidate gains at the operational and tactical levels as a strategically informed approach to current operations, • Collection management. considering the desired political outcome of the conflict. • Counterintelligence primary mission areas. During competition and crisis, commanders expand • Support to security operations and protection activities. opportunities created from previous conflicts and activities • Evaluating time windows for effects to appear within the OE. to sustain enduring U.S. interests, while improving the • Support to stability activities or operations. credibility, readiness, and deterrent effect of Army forces. During large-scale combat operations, commanders • Continuous updates to the CIP and intelligence portion of the COP. consolidate gains continuously or as soon as possible, deciding whether to accept risk with a more moderate tempo during the present mission or in the future as large- scale combat operations conclude. Understand and manage the effects of operations on units and leaders. Continuous operations rapidly degrade the performance of people and the equipment employed, particularly during combat. In battle, Soldiers and units are more likely to fail • Engagement with intelligence staff members. catastrophically than gradually. Commanders and staffs • Focusing on training to improve combat effectiveness. must be alert to small indicators of fatigue, fear, indiscipline, • Staff member recuperation. and reduced morale; they must take measures to deal with • Military intelligence unit engaged leadership. these indicators before their cumulative effects drive a unit to the threshold of collapse. Staffs and commanders at higher echelons must consider the impact of prolonged combat on subordinate units. This causes efficiency to drop, even when physical losses are not great. C2 command and control FM field manual CIP common intelligence picture OE operational environment COA course of action U.S. United States COP common operational picture
2-0
76
Chapter 2 OPERATIONAL APPROACH AND OPERATIONAL FRAMEWORK 2-90. An operational approach provides the logic for how tactical tasks ultimately achieve the desired end state. It provides a unifying purpose and focus to all operations. Sound operational approaches balance risk and uncertainty with friction and chance. The operational approach provides the basis for detailed planning, allows leaders to establish a logical operational framework, and assists in producing an executable order. (See ADP 3-0 and ADP 5-0 for doctrine on operational art and planning, respectively.) 2-91. An operational framework organizes an area of geographic and operational responsibility for the commander and provides a way to describe the employment of forces. The framework illustrates the relationship between close operations, operations in depth, and other operations in time and space across domains. As a visualization tool, the operational framework bridges the gap between a unit’s conceptual understanding of the environment and its need to generate detailed orders that direct operations. OPERATIONAL APPROACH 2-92. Through operational art, commanders develop their operational approach—a broad description of the mission, operational concepts, tasks, and actions required to accomplish the mission (JP 5-0). An operational approach is the result of the commander’s visualization of what needs to be done in broad terms to solve identified problems. It is the main idea that informs detailed planning. When describing an operational approach, commanders— ⚫ Consider ways to defeat enemy forces in detail and potential decisive points. Defeat in detail is concentrating overwhelming combat power against separate parts of a force rather than defeating the entire force at once (ADP 3-90). ⚫ Employ combinations of defeat mechanisms to isolate and defeat enemy forces, functions, and capabilities. ⚫ Assess options for assuming risk. 2-93. Table 2-12 lists several operational and intelligence considerations for operational approach. Table 2-12. Operational and intelligence considerations for operational approach Operational approach Operational and intelligence considerations (not all-inclusive) Defeating enemy forces in detail Armed conflict implies the need to defeat enemy forces. • Understanding the commander’s intent. Defeat is to render a force incapable of achieving its • Evaluating enemy forces in the context of all the relevant domains and objectives (ADP 3-0). When used as a task or effect in dimensions of an operational environment. operations, defeat provides the commander maximum • Understanding threat functions, capabilities, and echelonment. flexibility to accomplish the mission. Senior leaders assign • Understanding how the enemy may employ capabilities. defeat as a task when the situation is still developing, or • Identifying enemy strengths and vulnerabilities. when the commander on the ground, by virtue of • Comparing enemy vulnerabilities to friendly advantages to identify decisive experience and proximity to the problem, is uniquely points (key terrain, key events, critical factors or functions) to achieve capable of deciding how to employ lethal force to convergence. accomplish objectives. • Defeat mechanisms: Defeat mechanisms ▪Destroy is a tactical mission task that physically renders an enemy force Defeat mechanism is a method through which friendly combat-ineffective until reconstituted (FM 3-90). forces accomplish their mission against enemy opposition ▪Dislocate is to employ forces to obtain significant positional advantage in one (ADP 3-0). Army forces at all echelons commonly use or more domains, rendering the enemy’s dispositions less valuable, perhaps combinations of the four defeat mechanisms. Applying even irrelevant (FM 3-0). more than one defeat mechanism simultaneously creates ▪Isolate is to separate a force from its sources of support in order to reduce its multiple dilemmas for enemy forces and complementary effectiveness and increase its vulnerability to defeat (ADP 3-0). and reinforcing effects not attainable with a single mechanism. Commanders may have an overarching ▪Disintegrate is to disrupt the enemy’s command and control, degrading the defeat mechanism or combination of mechanisms that synchronization and cohesion of its operations (FM 3-0). accomplish the mission, with supporting defeat • Providing information to confirm/deny if friendly actions created the desired mechanisms for components of an enemy formation or effects and met the commander’s requirement. warfighting system. Defeat mechanisms can guide the • Conducting functional analysis and center of gravity analysis. subordinate development of tactical tasks, purposes, and • Providing intelligence support to targeting. effects in operations, facilitating control and initiative. • Providing intelligence support to combat assessment: battle damage assessment, physical damage assessment, and functional damage assessment.
2-0
77
Multidomain Operations and Intelligence Table 2-12. Operational and intelligence considerations for operational approach (continued) Operational approach Operational and intelligence considerations (not all-inclusive) • Stability mechanisms: ▪Compel refers to using, or threatening to use, lethal force to establish control and dominance, affect behavioral change, or enforce compliance with mandates, agreements, or civil authority. Stability mechanisms ▪Control involves imposing civil order. A stability mechanism is the primary method through ▪Influence refers to altering the opinions, attitudes, and ultimately the behavior which friendly forces affect civilians in order to attain of foreign, friendly, neutral, and threat audiences through messages, conditions that support establishing a lasting, stable presence, and actions. peace (ADP 3-0). As with defeat mechanisms, ▪Support establishes, reinforces, or sets the conditions necessary for the combinations of stability mechanisms produce instruments of national power to function effectively. complementary and reinforcing effects that accomplish • Conducting pre-mission analysis of the operational environment in conjunction the mission more effectively than single mechanisms. with cultural intelligence and civil information. • Performing intelligence preparation of the operational environment. • Using measures of performance and effectiveness to assess operations. • Considering the instruments of national power. • Considering the operational variables and civil considerations. • Leaders considering risk across the domains. Accepting risk in one domain may Risk create opportunities in other domains. Commanders accept risk on their own terms to create • G-2/S-2s recommending risk assumptions to friendly forces based on threat forces. opportunities and apply judgment to manage those • Commanders determining how to impose risk on enemy forces. hazards they do not control. Risk is an inherent part of • Presenting multiple dilemmas and increasing the number and severity of every operation and cannot be avoided. Commanders hazards with which enemy forces must contend. analyze risk in collaboration with subordinates to assist in • Providing commanders data to assess risk. Intelligence is necessary to assess determining the risk level and type and how to mitigate and assume risk. the risk. When considering how much risk to accept with a • Continuous situation development. course of action, commanders consider risk to the force • Providing intelligence support to protection. against the probability of mission success during current and future operations. They assess options in terms of • Considering human and information factors that govern how friendly and enemy weighting the main effort, economy of force, and physical forces and other relevant actors assess costs and benefits and calculate risk. loss based on what they have been tasked to do. • Waiting for near-perfect intelligence and synchronization. This may increase risk or close a window of opportunity. ADP Army doctrine publication FM field manual STRATEGIC FRAMEWORK 2-94. The strategic framework accounts for factors in the strategic environment and the connection of strategic capabilities to operational- and tactical-level operations. It includes the strategic support area, joint security area, extended deep area, and assigned operational area. 2-95. The strategic framework has importance in terms of joint operations and Army operational-level operations. For most Army operations, understanding the Army operational framework in the context of the strategic framework, is important. (See figure 2-10 on page 2-34). (See FM 3-0, JP 3-0, and JP 3-10.) OPERATIONAL FRAMEWORK 2-96. An operational framework is a cognitive tool used to assist commanders and staffs in clearly visualizing and describing the application of combat power in time, space, purpose, and resources in the concept of operations (ADP 1-01). Commanders build their operational framework on their assessment of the OE, including all domains and dimensions. They may create new models to fit the circumstances, but they generally apply a combination of common models according to doctrine. The three models commonly used to build an operational framework are— ⚫ Assigned areas. ⚫ Deep, close, and rear operations. ⚫ Main effort, supporting effort, and reserve. Note. Commanders may use any operational framework model they find useful, but they must remain synchronized with their higher-echelon headquarters’ operational framework. (FM 3-0 provides a detailed discussion on each model.)
2-0
78
Chapter 2 Figure 2-10. The Army operational framework in the context of the strategic framework 2-97. Intelligence professionals must understand and properly use the doctrinal terminology, concepts, and considerations for the operational framework. Table 2-13 lists several intelligence considerations for the three operational framework models. Table 2-13. Intelligence considerations for operational framework Operational framework models Intelligence considerations (not all-inclusive) • Interrelationships of domains and dimensions and associated impacts. An area of operations is an operational area • Enemy capabilities in each domain. defined by a commander for the land or maritime • Higher-echelon and adjacent-unit information collection force commander to accomplish their missions and capabilities. protect their forces (JP 3-0). • Evaluation of time windows for effects to appear within the area of operations. Assigned areas • Intelligence handover lines, as appropriate. A zone is an operational area assigned to a unit in the offense that only has rear and lateral boundaries • Location of NAIs, EAs, and TAIs. (FM 3-0). A sector is an operational area assigned to a unit in • Location of NAIs, EAs, and TAIs. the defense that has read and lateral boundaries • Location of friendly battle positions supported by and interlocking fires (FM 3-0). information collection capabilities. Within assigned areas, commanders organize their operations in time, space, and purpose by synchronizing deep, close, and rear operations. Across all operations, the G-2/S-2 must determine how to support consolidating gains optimally to capitalize on tactical successes. • Synchronizing the intelligence effort with close and rear areas, including the use of intelligence handover lines. • Setting conditions for future close operations. • Targeting and disintegrating enemy structures and Deep operations are tactical actions against enemy systems, including the high-value targets needed for forces, typically out of direct contact with friendly the close fight. Deep operations forces, intended to shape future close operations • Disrupting enemy freedom of action, coherence, and and protect rear operations (FM 3-0). tempo. • Support to deception. • Support to electromagnetic warfare. • Integrating intelligence between special operations forces and conventional forces.
2-0
79
Multidomain Operations and Intelligence Table 2-13. Intelligence considerations for operational framework (continued) Operational framework models Intelligence considerations (not all-inclusive) Close operations are tactical actions of subordinate maneuver forces and the forces providing immediate • Information collection supporting the maneuver of Close operations support to them, whose purpose is to employ subordinate formations. maneuver and fires to close with and destroy enemy • Identifying enemy reserve assets. forces (FM 3-0). • Support to security operations and protection activities. • Identifying bypassed forces. Rear operations are tactical actions behind major • IPOE, support to protection, and situation development subordinate maneuver forces that facilitate in order to support possible threats to the rear area, for Rear operations movement, extend operational reach, and maintain example, enemy special operations forces, air assaults, desired tempo (FM 3-0). terrorists, partisan forces, stay-behind forces, air attacks, cyberspace attacks, long-range fires, and chemical attacks. When supporting the main effort, supporting effort, and the reserve, intelligence synchronization across echelons is critical. The information collection effort must be synchronized across all operations to reduce the possibility of collection gaps. • Terrain analysis. A main effort is a designated subordinate unit • Collection assets available. Main effort whose mission at a given point in time is most critical • Threat use of denial and deception. to overall mission success (ADP 3-0). • Location of EAs, NAIs, and TAIs. • Location of enemy counterattack forces and reserve. A supporting effort is a designated subordinate unit • Collection assets available. Supporting effort with a mission that supports the success of the main • Location of enemy counterattack forces and reserve. effort (ADP 3-0). • Terrain analysis to determine optimal location for the placement of the reserve to support main and A reserve is that portion of a body of troops that is supporting efforts. withheld from action at the beginning of an • Collection assets available before and during Reserve engagement to be available for a decisive commitment. movement (ADP 3-90). • Location of enemy counterattack forces and reserve. • Positioning of collection assets to exploit main and supporting effort successes. ADP Army doctrine publication JP joint publication EA engagement area NAI named area of interest FM field manual TAI target area of interest IPOE intelligence preparation of the operational environment
2-0
81
Chapter 3 Integrating the Intelligence Warfighting Function SECTION I – INTEGRATING AND SYNCHRONIZING INTELLIGENCE 3-1. Leadership is the most essential dynamic of combat power, and it is the commander who provides purpose, direction, and motivation to accomplish the mission and improve the unit or organization. Leaders must be able to thoroughly understand the given mission, current situation, and how the OE may impact the mission. Therefore, leaders must integrate and synchronize intelligence into operations. This facilitates understanding an OE and assists in determining when and where to employ capabilities against adversaries and enemies. 3-2. Leaders must provide their formations, including the intelligence warfighting function, direction, guidance, and a sense of purpose. To do this, leaders must be knowledgeable of intelligence fundamentals, the intelligence process, the intelligence warfighting function, intelligence capabilities, the intelligence architecture, and how they can be leveraged to support the operations process. 3-3. Commanders and staffs at all levels synchronize intelligence with the other warfighting functions to maximize their ability to simultaneously visualize the OE and accomplish the required tasks and activities. The effective use of intelligence capabilities enhances the capability of the combined arms team to create and concentrate combat power and minimize risk. 3-4. The integration and synchronization of the warfighting functions, including the intelligence warfighting function, are important for mission success. While the intelligence warfighting function is somewhat complex, its integration is doctrinally no different than the integration of the other warfighting functions and no less important. Figure 3-1 illustrates the integration of the intelligence warfighting function, accomplished through planning methodologies, integrating processes, and a unit’s battle rhythm. Figure 3-1. Integrating and synchronizing the intelligence warfighting function
2-0
82
Chapter 3 SECTION II – THE ROLE OF THE COMMANDER AND STAFF 3-5. Command and control is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission (JP 1, Volume 2). C2 is fundamental to the art and science of warfare. (See FM 6-0.) No single specialized military function, either by itself or combined with others, has a purpose without it. Commanders are responsible for C2. Through C2, commanders provide purpose and direction to integrate all military activities toward a common goal— mission accomplishment. Staffs support commanders in making and implementing decisions and in integrating and synchronizing combat power. Competent staffs multiply a unit’s effectiveness. (See figure 3-2.) Figure 3-2. Exercising command and control to accomplish the mission THE COMMANDER 3-6. The commander drives intelligence, intelligence drives operations, and operations must support information collection; this relationship is continuous. Due to the fog and friction of war, including the efforts of determined and adaptive threat forces, commanders must fight for intelligence and then share it across echelons and with adjacent units. The commander, based on recommendations from the intelligence staff, tailors intelligence capabilities and intelligence operations to support the mission. The force-tailoring and specific task organization establish an ordered command and support structure with technical channels for intelligence operations. 3-7. Similar to the relationship with subordinate units and the rest of the staff, commanders provide the intelligence staff guidance and continuous feedback throughout operations (see also figure 3-2) by— ⚫ Providing direction. ⚫ Providing their understanding, visualization, and description of the problem. ⚫ Directing through clearly stated intelligence requirements and priorities. ⚫ Leading and making decisions. ⚫ Continuously assessing the operation through collaboration with the G-2/S-2 during the execution of operations. ⚫ Emphasizing the importance or close cross-staff collaboration, especially with the G-3/S-3, fire support coordinator/chief of fires, and G-6/S-6.
2-0
83
Integrating the Intelligence Warfighting Function Commander’s Critical Information Requirements A commander’s critical information requirement is specific information identified by the commander as being essential to facilitate timely decision making (JP 3-0). There are two CCIR categories: PIRs and friendly force information requirements (also called FFIRs). CCIRs directly influence decision making and facilitate the successful execution of operations. As discussed in paragraph 1-34, the intelligence warfighting function focuses on answering intelligence requirements comprising PIRs, targeting intelligence requirements, and other intelligence requirements. The commander approves and prioritizes all intelligence requirements, which drive every aspect of the intelligence process—information collection, including collection management; intelligence PED; intelligence analysis; intelligence production; and dissemination and integration. 3-8. The commander’s involvement and interaction enable the intelligence staff to assess how to more effectively produce intelligence to meet the commander’s requirements. The commander’s involvement also assists the staff in synchronizing the unit’s information collection effort with the operation. The commander and staff should also consider some unique aspects of the intelligence warfighting function: ⚫ Operational uncertainty. Intelligence does not eliminate uncertainty entirely; to succeed, commanders must take risks. ⚫ Driving IPOE. Make it a full staff effort. Focus the staff on those aspects of the OE that are important to the mission (commander’s focus and priorities for analysis). ⚫ Resourcing. Resource and prioritize the intelligence warfighting function appropriately. For example, adequate network capability and access are critical in meeting the commander’s needs. ⚫ Prioritization. Prioritize finite resources and capabilities by focusing collection and analysis on key decisions and targeting through intelligence requirements and other means. ⚫ Continuous collection. Information collection must be continuous. Start as early in the operations process, as feasible, and effectively transition to the next operation. ⚫ Tailoring intelligence. Clearly state what (in terms of priorities, format, and style) is needed across the various intelligence products, especially IPOE products, the intelligence running estimate, and the intelligence portion of the common operational picture (COP). 3-9. Building from this list, table 3-1 provides an extensive list of considerations to assist commanders and staffs in ensuring the intelligence warfighting function is effectively integrated into operations. Note. Table 3-1 is not intended as a checklist, a set of mandatory actions, or an all-encompassing list of considerations. Table 3-1. Commander and staff considerations An effective staff team. Build the team and foster a collaborative environment that encourages critical thinking, candor, and cooperation. Risk. Accept necessary risks and some operational uncertainty. Intelligence cannot eliminate uncertainty. Commanders determine the necessary risks inherent in any operation. Guidance. Broadly and clearly share the commander’s guidance and visualization of the operation and the OE. Ensure the right aspects of the domains and dimensions are accounted for in the operational variables and the mission variables. Driving IPOE. Initial guidance, key participation, and periodic oversight are extremely valuable in ensuring a thorough IPOE. Owning intelligence requirements. Personally engage in developing and approving intelligence requirements that drive operations and targeting. Enabling information collection. In nondoctrinal terms, information collection is the fight before the fight. Demand effective collaboration between the G-3/S-3, G-2/S-2, and rest of the staff to plan and control information collection. Allocate maneuver, fires, and other capabilities to enable information collection and intelligence analysis and production, when necessary. Resource the reconnaissance and surveillance network and intelligence operations sufficiently, to include providing adequate network capability (for example, relays, bandwidth, and access). Maximizing collection. Facilitate detailed planning on the use of organic, assigned, and attached collection, PED, and processing capabilities such that they can be thought of as information collection pacing items. It is also important to fully leverage supporting collection assets, external PED and analysis, and intelligence from national-level and allied and partner intelligence organizations.
2-0
84
Chapter 3 Table 3-1. Commander and staff considerations (continued) Allocating adequate time for information collection and intelligence analysis. Sometimes, operational necessity dictates timelines. However, sometimes, it is worth the time (tactical patience) to allow for thorough information collection, analysis, and the production of effective intelligence products. Owning the intelligence architecture. Emphasize its importance and facilitate teamwork between the G-3/S-3, G-2/S-2, G-6/S-6, G-9/S-9, CEMA officer, space operations officer, and other staff members. An effective intelligence architecture is crucial. The architecture connects each intelligence capability from national and multinational partner, joint, and higher-level Army echelons as well as from organic and supporting intelligence collection, intelligence PED, and all-source capabilities across the area of operations, including all command posts. The common operational picture and intelligence products. Provide clear guidance to the G-2/S-2 on the intent and standard for maintaining the threat portion of the common operational picture and the expectation for answering intelligence requirements. Sharing with allied and partner forces. Ensure the intelligence staff completes information sharing coordination before the operation and shares appropriately throughout the entire operation. Prioritizing battle damage assessment. Prioritize the battle damage assessment effort and ensure a thorough staff analysis is completed for battle damage assessment. Guiding transitions. Transitions can be very tricky for the intelligence warfighting function. Early and clear guidance is integral to effectively transitioning the intelligence warfighting function. CEMA cyberspace electromagnetic activities IPOE intelligence preparation of the operational environment G-2/S-2 division or corps/battalion or brigade intelligence staff officer PED processing, exploitation, and dissemination G-3/S-3 division or corps/battalion or brigade operations staff officer OE operational environment G-6/S-6 division or corps/battalion or brigade signal staff officer G-9/S-9 division or corps/battalion or brigade civil affairs operations staff officer THE STAFF 3-10. This general discussion focuses on the staff and its participation in the intelligence warfighting function. Chapter 5 discusses intelligence staff activities. The staff is a key component of the C2 warfighting function. In addition to executing its specialized staff tasks, the staff’s primary responsibilities include supporting the commander; assisting subordinate commanders, staffs, and units; and informing units and organizations outside the headquarters. SUPPORTING THE COMMANDER 3-11. Staffs support the commander in understanding, visualizing, and describing the OE; making and articulating decisions; and directing, leading, and assessing military operations. Staffs also support the commander by— ⚫ Making recommendations and preparing plans and orders for the commander. ⚫ Producing timely and relevant information and analysis and using knowledge management to extract that information from the vast amount of available information. ⚫ Battle tracking the ongoing operation to ensure information collection tasks are executed or adjusted as the situation dictates. ⚫ Seeing and understanding when windows of opportunity to achieve a relative advantage open and close, and by alerting and providing recommendations to the commander when decision criteria are met. ⚫ Monitoring and providing recommendations to adjust the plan or tasks when the situation changes and the anticipated decisions are no longer relevant. PARTICIPATING IN THE INTELLIGENCE WARFIGHTING FUNCTION 3-12. The entire staff is part of the intelligence warfighting function. The rest of the staff (other than the intelligence staff) has the same obligation to participate in key intelligence processes, meetings, and working groups just as the intelligence staff is obligated to fully engage in other warfighting function processes, meetings, and working groups.
2-0
85
Integrating the Intelligence Warfighting Function 3-13. The intelligence staff cannot be experts in all aspects of the OE and threat capabilities. Staff members must know certain aspects of the OE and threat capabilities related to their warfighting function or specialty. Important activities require the entire staff to participate; this ensures the intelligence warfighting function— ⚫ Facilitates a real understanding of the many important aspects of the OE (especially when, where, and how the threat will employ capabilities). ⚫ Assists the commander and staff’s visualization. ⚫ Supports in developing friendly COAs and recommending the best COA to the commander. ⚫ Assists in synchronizing combat power within the operation. ⚫ Supports targeting (through lethal and nonlethal means). 3-14. Some of the most important intelligence processes and activities requiring the rest of the staff’s participation, discussed in section III, includes— ⚫ IPOE, led by the intelligence staff, especially initial IPOE during step 2 (mission analysis) of the MDMP. ⚫ Collection management (the basis for information collection planning), led by the intelligence staff, and information collection processes. ⚫ Any intelligence working groups, if held. ⚫ The information collection working group, if held. SECTION III – STAFF TEAMWORK 3-15. Teamwork within a staff and between staffs produces the staff integration necessary to synchronize operations. A staff works efficiently with complete cooperation from all staff sections. In addition to being highly knowledgeable in their own fields, operations processes, and procedures, all staff members must be familiar with the duties and responsibilities of other staff sections to coordinate and achieve results for the commander. A force operates effectively in cooperation with all headquarters. Commanders and staffs contribute to foster this positive climate during training and sustain it during operations. However, frequent personnel changes and augmentations to their headquarters add challenges to building and maintaining a team. While all staff sections have clearly defined functional responsibilities, none can operate effectively in isolation; therefore, coordination is critical. Commanders ensure staff sections are properly equipped and manned. This allows staffs to efficiently work within their headquarters and with their counterparts in other headquarters. Commanders ensure staff integration by developing the unit’s battle rhythm, to include synchronizing various meetings, working groups, and boards. 3-16. Staff teamwork works in both directions. The intelligence staff must fully participate in and bring its unique perspectives, knowledge, and expertise to support the rest of the staff across the planning methodologies, integrating processes, working groups, and other staff functions. Conversely, the same is true of the rest of the staff supporting intelligence processes; tasks; working groups, if established; and functions. It is important to remember that the commander and staff are part of the intelligence warfighting function. Some of the support provided by the rest of the staff to the intelligence staff includes— ⚫ Sharing unique perspectives, knowledge, and expertise with the intelligence staff at key times within certain intelligence tasks. ⚫ Supporting ancillary and specialized information collection capabilities (see paragraph 3-35) and intelligence-related missions and operations (see paragraph 3-41). 3-17. Certain intelligence tasks are far more effective when the rest of staff, especially key members, participates with the intelligence staff at key times in certain intelligence tasks. The value of staff participation applies primarily to IPOE and collection management; it also applies to a lesser extent to pre-mission analysis of the OE, situation development, intelligence support to targeting, and support to operational assessments. Staff members contribute warfighting function/specialty knowledge and expertise as well as perspectives that differ from the intelligence staff’s—all of which are invaluable. This comprehensive staff participation is similar to the staff participation necessary to adequately conduct targeting, support protection, or any number of other staff tasks. Despite pervasive time constraints that hinder participation in key intelligence tasks, the lack of staff participation during initial IPOE, mission analysis, or collection management puts a unit’s mission at risk.
2-0
86
Chapter 3 3-18. Table 3-2 lists those staff members whose contributions to key intelligence tasks enable the effectiveness of the intelligence warfighting function. The list is not all-inclusive; staff members vary based on the echelon and specific unit. Table 3-2. Staff support to the intelligence warfighting function IPOE, situation development, and Collection management Staff section intelligence support to targeting input participation • Based on staff expertise, assist the • Based on staff expertise, develop intelligence staff in analyzing and information requirements, as needed; assist developing— the collection management team in— ▪Modified combined obstacle overlays. ▪Developing or refining indicators and ▪Civil considerations products. SIRs. ▪Threat objectives and the desired end ▪ Matching collection assets to SIRs. All staff sections: Provide subject matter state. ▪ Developing NAIs and active time. expertise to assist the intelligence staff in the ▪NAIs. ▪Planning the use of technical collection, following tasks. ▪High-value targets, which become high- biometric, forensic, and document and payoff targets. media exploitation capabilities. ▪Possible threat decision points. ▪Planning the use of ancillary collection • Assist the intelligence staff in deciding assets from associated warfighting what key aspects to add to the intelligence function or specialty knowledge. portion of the common operational picture • Assist the G-3/S-3 in developing the final and intelligence running estimate. Annex L (Information Collection). • Provides operational experience. • Assists in determining— ▪Friendly and enemy TAIs. • Develops threat C2 indicators, SIRs, and ▪Friendly and enemy engagement areas. NAIs. ▪Enemy time phase lines. • Develops threat reconnaissance, surveillance, and security operations G-3/S-3: Provides subject matter expertise on • Assists the entire staff in determining how indicators, SIRs, and NAIs. the art and science of military operations, the threat might integrate and synchronize • Develops threat maneuver unit indicators, including reconnaissance, surveillance, and its operations. SIRs, and NAIs. security operations. Evaluates IPOE products • Develops threat C2 models, intent, • Refines— to ensure they support friendly COA vulnerabilities, and templating. development and analysis. Plans and directs • Provides threat reconnaissance, ▪Friendly TAIs. information collection based on collection surveillance, and security operations ▪Friendly engagement areas. management. models; intent; vulnerabilities; and ▪Enemy time phase lines. templating. • Effectively integrates and synchronizes • Provides threat maneuver unit models, (feasible and supported) reconnaissance, intent, vulnerabilities, and templating. surveillance, and security operations into • Assists the staff in developing relative the collection management plan. combat power matrices for friendly and enemy forces. • Provides threat logistics models, intent, vulnerabilities, and templating. • Develops threat logistics and • Templates threat supply/resupply supply/resupply indicators, SIRs, and NAIs. G-4/S-4: Provides subject matter expertise on routes/points. • Conducts logistics planning for technical sustainment operations. Note. Threat logistic activities and lack of collection and document and media activities can be a good indicator of threat exploitation. intent and future threat operations/COAs. G-6/S-6: Provides subject matter expertise on friendly communications systems and assists • Provides threat communications systems the G-2/S-2 in identifying and evaluating models, intent, vulnerabilities, and Develops threat communications systems friendly communications systems’ templating, including networks and nodes. indicators, SIRs, and NAIs. vulnerabilities to cyberspace and • Conducts line-of-sight analysis. electromagnetic attack.
2-0
87
Integrating the Intelligence Warfighting Function Table 3-2. Staff support to the intelligence warfighting function (continued) IPOE, situation development, and Collection management Staff section intelligence support to targeting input participation • Integrates civil knowledge gained from unified action partners working with indigenous populations and institutions. • Conducts ASCOPE (areas, structures, capabilities, organizations, people, and • Develops civil considerations and local events) analysis. population attitudes, “atmospherics,” • Conducts PMESII-PT (political, military, indicators, SIRs, and NAIs. economic, social, information, • Determines the local population’s impact infrastructure, physical environment, and on information collection. time) analysis. G-9/S-9: Provides subject matter expertise on • Recommends the use of developed and • Provides civil considerations overlays with civil affairs operations. engaged civil network as part of collection. critical civilian infrastructure status and • Manages the civil information collection capabilities, and areas of cultural plan. significance (protected targets). • Directs civil reconnaissance, civil • In collaboration with unified action partners engagement, and civil network and the staff judge advocate, identifies development within the operational area. restricted fires requirements (persons and places) for the commander. Note. Refugees, displaced persons, and evacuees can have a major impact on friendly and threat operations. • Develops threat fires indicators, SIRs, and • Provides threat fires capabilities, models, NAIs. intent, vulnerabilities, and templating. • Shares the high-payoff target list, target Chief of fires/Deputy fires support • Assists in determining— synchronization matrix, attack guidance coordinator/Fires support officer: Provides ▪Friendly TAIs. matrix, and target selection standards. subject matter expertise on fires. • Ensures incorporation of ▪Friendly electromagnetic attack. counterfire/counterbattery radar systems in ▪Enemy time phase lines. the collection management plan. • Refines friendly TAIs. • Performs checks and balances between IPOE, subsequent operational planning, and collection management to account for all aspects of protection. • Provides threat rear-area capabilities, • Develops threat rear-area capabilities models, intent, vulnerabilities, and indicators, SIRs, and NAIs. Chief of protection: Provides subject matter templating. In this situation, threat rear- • Plans biometric and forensic capabilities expertise on all aspects of the protection area capabilities are threat capabilities, and identity activities as part of collection warfighting function. units, and systems that could be used in management. the friendly rear area to disrupt friendly • Shares the friendly critical and defended operations. These threat capabilities can asset lists. include terrorists, bypassed forces, stay- behind forces, special purpose forces, or many other threats to the friendly rear area. • Provides threat ADA models, intent, Air and missile defense officer: Provides vulnerabilities, and templating. subject matter expertise on ADA and assists • Determines threat air avenues of Develops threat ADA indicators, SIRs, and the G-2/S-2 in determining the locations of approach. NAIs. ADA assets and potential areas of • Identifies threat missile capabilities and employment. flight characteristics. • Develops threat close air support Air LNO (senior member of the tactical air indicators, SIRs, and NAIs. control party): Provides subject matter • Provides threat close air support • Shares airspace control orders, restricted expertise on air and space capabilities and capabilities models, intent, vulnerabilities, operations zones, and aerial ISR taskings. limitations as well as applies and integrates and templating. • Operates and maintains the joint air joint capabilities to generate multidomain • Provides access to Air Force intelligence request net. effects throughout an OE in direct support of products. • Advises the staff on preparing air support the ground commander’s intent and requests. guidance. • Transmits requests for ISR support.
2-0
88
Chapter 3 Table 3-2. Staff support to the intelligence warfighting function (continued) IPOE, situation development and Collection management Staff section intelligence support to targeting input participation Aviation officer: Provides subject matter Provides threat attack helicopter, air assault, expertise on Army aviation assets and Develops threat attack helicopter, air assault, and UAS (including UAS swarms) operations, ranging from attack aviation, lift, and UAS (including UAS swarms) indicators, capabilities, models, intent, vulnerabilities, UASs, and fixed-wing assets at the theater SIRs, and NAIs. and templating. army, corps, division, and brigade levels. • Provides threat engineer models, intent, vulnerabilities, and templating, including obstacle locations and mobility systems. Engineer officer: Provides subject matter • Conducts terrain analysis and assists in expertise on mobility/countermobility and determining— Develops threat engineer indicators, SIRs, assists the G-2/S-2 in developing enemy ▪Mobility corridors. and NAIs. obstacle plans for the enemy situation ▪Military aspects of terrain (observation template. and fields of fire, avenues of approach, key terrain, obstacles, and cover and concealment [also called OAKOC]) factors. • Provides threat CBRN capabilities, models, CBRN officer: Provides subject matter intent, vulnerabilities, and templating. expertise on CBRN and assists the G-2/S-2 Develops threat CBRN indicators, SIRs, and • Provides threat triggers for using CBRN. in determining the locations of CBRN assets NAIs. • Provides threat CBRN terrain and weather and potential areas of employment. considerations. CEMA section: Provides subject matter • Provides threat cyberspace and EW expertise on information pertaining to • Develops threat cyberspace and EW models, intent, vulnerabilities, and doctrine, tactics, and equipment of enemy indicators, SIRs, and NAIs. templating. cyberspace and EW forces, and access to • Plans friendly cyberspace and EW • Copartners to develop and maintain the cyberspace and EW capabilities for operations collection requirements. enemy electromagnetic order of battle. information collection. CEMA officer: Provides subject matter • Provides threat EW models, intent, • Develops threat EW indicators, SIRs, and expertise on ground-based, airborne, and vulnerabilities, and templating. NAIs. functional EW employment considerations. • Conducts line-of-sight analysis. • Plans friendly EW capabilities collection. • Develops threat explosive ordnance Explosive ordnance disposal officer: (including improvised explosive devices) Provides subject matter expertise on the Provides threat explosive ordnance (including indicators, SIRs, and NAIs. detection, identification, recovery, evaluation, improvised explosive devices) models, intent, • Plans foreign ordnance and weapons rendering safe, and final disposal of explosive vulnerabilities, and templating. technical intelligence collection, when ordnance. needed. • Provides threat information warfare • Develops threat information warfare Information operations officer: Provides models, intent, vulnerabilities, and indicators, SIRs, and NAIs. subject matter expertise on shaping templating. • Assists the collection management team in operational activities in and through the • Predicts threat themes and messaging in accounting for the information dimension, information dimension. conjunction with the intelligence staff. when needed. • Provides information overlays. • Develops threat deception indicators, SIRs, Military deception officer: Provides subject and NAIs. matter expertise on coordinating military Provides threat deception models, intent, • Assists the collection management team in deception assets and operations and vulnerabilities, and templating. accounting for the information dimension, influencing enemy decision makers. when needed. • Develops threat collection indicators, SIRs, and NAIs, in coordination with Operations security officer: Provides counterintelligence personnel. Provides threat collection models, intent, subject matter expertise on the development, • Assists the collection management team in vulnerabilities, and templating, in coordination organization, and administration of an accounting for the information dimension, with counterintelligence personnel. operations security program. when needed. • Shares essential elements of friendly information. • Develops threat psychological operations Psychological operations officer: Provides indicators, SIRs, and NAIs. Provides threat psychological operations subject matter expertise on synchronizing • Assists the collection management team in models, intent, vulnerabilities, and templating. MISO support to operations. accounting for the information dimension, when needed.
2-0
89
Integrating the Intelligence Warfighting Function Table 3-2. Staff support to the intelligence warfighting function (continued) IPOE, situation development and Collection management Staff section intelligence support to targeting input participation • Provides threat space models, intent, Space operations officer: Provides subject vulnerabilities, and templating. • Develops threat space indicators, SIRs, matter expertise on the space domain and • Provides space weather effects on and NAIs. adversary space/counterspace capabilities operations. • Provides space weather effects on and effects within the OE. • Provides threat counterspace capabilities, operations. characteristics, and employment. Staff judge advocate: Provides subject Provides legal considerations to minimize Provides legal considerations to minimize matter expertise on all types of legal matters unnecessary collateral damage or injury to unnecessary collateral damage or injury to and provides support and advice to the the civilian population. the civilian population. commander and staff. • Identifies health threats faced by friendly and enemy forces (injuries, diseases, environmental, weapons effects, physiologic and psychological stressors). Command surgeon or medical support • Provides details on the local population’s • Develops SIRs, NAIs, and indicators officer: Provides subject matter expertise on medical care and health factors, related to host nation medical facilities. all medical or medical-related matters and including— • Develops SIRs, NAIs, and indicators provides support and advice to the ▪Changes to access for medical care. related to medical-health threats. commander and staff. ▪Sanitation issue. • Provides medical evacuation procedures and methods. ▪Portable water supply. ▪Effects of significant health factors, for example, insects, diseases, and other issues. • Produces a religious area analysis and Chaplain: Provides religious, moral, and subsequently a religious impact ethical advisement to the commander and assessment. staff in areas that potentially impact the unit • Provides religious demographics, time Develops SIRs, NAIs, and indicators related both externally and internally. (specific holidays or time of day), and to religious factors (religious, human, and Note. Chaplains and unit ministry teams do practices. ideological) of the OE. not collect information that would violate their • Conducts sacred sites analysis (with the status as noncombatants. staff judge advocate) and determine religious impact on operations. • Promotes coordination, synchronization, and cooperation among its parent unit and LNO: Provides subject matter expertise from higher-echelon headquarters and its assigned headquarters. interagency, coalition, host-nation, Coordinates face-to-face, which is invaluable Note. This only occurs when the LNO is adjacent, and subordinate organizations, to sharing various collection details. authorized security access to the IPOE and as required. collection management processes. • Coordinates face-to-face, which is invaluable to sharing a different perspective on IPOE and IPOE products. ADA air defense artillery IPOE intelligence preparation of the operational environment C2 command and control ISR intelligence, surveillance, and reconnaissance CBRN chemical, biological, radiological, and nuclear LNO liaison officer CEMA cyberspace electromagnetic activities MISO military information support operations COA course of action NAI named area of interest EW electromagnetic warfare OE operational environment G-2/S-2 division or corps/battalion or brigade intelligence staff officer SIR specific information requirement G-3/S-3 division or corps/battalion or brigade operations staff officer TAI target area of interest G-4/S-4 division or corps/battalion or brigade logistics staff officer UAS unmanned aircraft system G-6/S-6 division or corps/battalion or brigade signal staff officer G-9/S-9 division or corps/battalion or brigade civil affairs operations staff officer
2-0
90
Chapter 3 SECTION IV – THE OPERATIONS PROCESS AND INTELLIGENCE 3-19. Commanders employ the operations process to incorporate coalition and joint partners, empower subordinate initiative, and ensure authorities and risk acceptance are delegated to the appropriate echelon for the situation. Staffs and subordinate headquarters earn the commander’s trust by providing relevant information, anticipating needs, and directing supporting actions. Close interaction between the commander and the G-2/S-2 and the other staff is essential as the staff supports unit planning and preparation. Commanders direct the intelligence warfighting function through their relationship with the G-2/S-2, the rest of the intelligence staff, and the MI unit commander. 3-20. As shown in figure 3-3, the major activities of the operations process are— ⚫ Plan. Planning normally begins upon receipt of orders from a higher-echelon headquarters and continues through the execution of the operation. ⚫ Prepare. Commanders, assisted by their chiefs of staff or executive officers, drive the preparation for an operation by allocating time, prioritizing resources, and supervising preparation activities, such as rehearsals, to ensure their forces are ready to execute operations. ⚫ Execute. During execution, commanders and staffs focus their efforts on translating plans into direct action to achieve objectives in accordance with the higher commander’s intent. ⚫ Continuously assess. The commander and staff continually assess operations and revise the plan through fragmentary orders (FRAGORDs). Figure 3-3. The operations process ARMY PLANNING METHODOLOGIES 3-21. Integrated planning—from conceptual to detailed planning—is critical to Army operations. Planning requires the integration of both conceptual thinking and detailed analysis. Army leaders employ several methodologies for planning, determining the appropriate mix based on the scope and understanding of the problem, time available, and availability of a staff. The Army planning methodologies, detailed in FM 5-0, include— ⚫ Army problem solving. ⚫ ADM. ⚫ The MDMP. ⚫ Rapid decision-making and synchronization process (RDSP). ⚫ Troop leading procedures (TLP).
2-0
91
Integrating the Intelligence Warfighting Function 3-22. Perfect knowledge and assumptions about the future do not occur. The commander and staff cannot predict with precision how enemies will react or how other actors will respond during operations. Nonetheless, the understanding and learning that occur during planning are valuable. Even if units do not execute the plan exactly as envisioned, planning results in an improved understanding of the situation that facilitates future decision making. Planning and plans assist leaders in— ⚫ Building situational understanding. ⚫ Identifying and developing solutions to problems. ⚫ Understanding, describing, and accepting risk. ⚫ Directing, coordinating, and synchronizing action. ⚫ Task-organizing the force and prioritizing efforts. ⚫ Anticipating events. 3-23. The intelligence staff has a critical role in all activities of the operations process, especially in planning and the integrating processes (see section V). The G-2/S-2 supports the commander’s ability to understand the OE and visualize operations by— ⚫ Leading the IPOE process and portraying the enemy and other relevant aspects of the OE throughout the MDMP. ⚫ Developing the information collection plan (in coordination with the G-3/S-3). ⚫ Producing the intelligence portion of the COP. ⚫ Updating the intelligence running estimate. ⚫ Developing other intelligence products and reports. INTELLIGENCE SUPPORT TO THE MILITARY DECISION-MAKING PROCESS 3-24. Although the five Army planning methodologies are important, the MDMP is the one most often applied from theater army to BCT levels during armed conflict. The military decision-making process is an iterative planning methodology to understand the situation and mission, develop a course of action, and produce an operation plan or order (ADP 5-0). The MDMP begins with the receipt of the mission and combines the conceptual and detailed components of planning. Commanders use the MDMP to visualize the OE and the threat, build plans and orders for extended operations, and develop orders for short-term operations within the framework of a long-range plan. (See FM 5-0.) 3-25. During the MDMP, the intelligence staff leads the IPOE effort and provides all-source intelligence products and tools. Besides IPOE, the intelligence staff uses products developed during pre-mission analysis of the OE and begins to develop some of the early intelligence support to targeting and collection management products and tools. The staff tailors the all-source intelligence products and tools to the commander’s requirements, the situation, and the mission. The commander and staff require the following products throughout planning: ⚫ Line of communications overlays. ⚫ Broadcast and communications networks. ⚫ Combined information overlays. ⚫ Electromagnetic orders of battle. ⚫ Hazards overlays (that accurately depict the affected areas). ⚫ Modified combined obstacle overlays (also called MCOOs) and terrain effects matrices. ⚫ Weather trends and current and forecasted weather effects on friendly and enemy capabilities. ⚫ Weather effects matrices and other weather tactical decision aids. ⚫ Civil considerations overlays (addressing factors such as demographics, political alignments, religions and sects, network diagrams, and link and node overlays). ⚫ Threat characteristics. ⚫ Threat models. ⚫ Broad set of possible threat COAs.
2-0
92
Chapter 3 ⚫ Threat situation templates (covering at least the most likely and most dangerous threat COAs). ⚫ Event templates and matrices. ⚫ Other relevant threat and civil consideration templates. ⚫ Analysis of threat systems products. ⚫ High-value target (HVT) lists, which facilitate or are used to develop high-payoff target lists (HPTLs). ⚫ Target value analysis and other intelligence support to targeting products. Note. Possible products are limited only by the intelligence staff’s initiative and creativity as balanced against time available. 3-26. Table 3-3 outlines intelligence support to the MDMP. Table 3-3. Intelligence support to the military decision-making process Step 1—Receipt of mission Intelligence support to step 1 • Begin parallel planning and collaborate with higher, lower, and adjacent intelligence organizations to facilitate the IPOE process. • Focus activities on the mission variables. • Identify gaps in intelligence holdings. • Use intelligence reach to collect updated or additional enemy, terrain and weather, and civil considerations data. • In coordination with the Air Force staff weather officer, update the weather estimate. • In coordination with the cyberspace electromagnetic warfare officer and CEMA section, • Alert the staff and other key participants. update the effects of the EMS and cyberspace domain, including information from products • Gather the tools. that portray the physical network and logical network layers. • Update running estimates. • Coordinate with the G-3/S-3, G-6/S-6, and the CEMA section to address the information • Conduct the initial assessment. dimension and cyberspace domain. When feasible, coordinate with the JFC information • Issue the commander’s initial guidance. planning cell. • Issue the initial WARNORD. • Develop and submit initial requests for information based on intelligence gaps. • Work with the operations staff to initiate the movement of collection assets, as needed, to position them for future collection. • If needed, work with the operations staff to revise ongoing information collection or initiate limited preliminary information collection, which is published as Annex L (Information Collection) to WARNORD #1. • Continually update target packets and the enemy situation. • Update the intelligence running estimate. Step 2—Mission analysis Intelligence support to step 2 • Analyze the higher headquarters’ plan or order. • Perform initial IPOE. • Determine specified, implied, and essential • Identify gaps in the higher headquarters information collection plan and IPOE. tasks. • Lead the staff through the IPOE process. Consolidate the staff’s IPOE products into a set of • Review available assets and identify coherent and holistic IPOE products. resource shortfalls. • Begin collection management by identifying specified and implied intelligence tasks from the • Determine constraints. higher headquarters order. • Identify critical facts and develop • Develop the initial collection management plan and support the initial information collection assumptions. plan (WARNORD, fragmentary order, or OPORD). • Begin a risk assessment. • Use pertinent intelligence from higher echelons. • Develop initial CCIRs and EEFIs. • Assist in determining the area of operations and area of interest. • Develop the initial information collection plan. • Develop initial information requirements (with staff). • Update plan for the use of available time. • In coordination with the G-3/S-3, recommend initial PIRs to the commander. • Develop initial themes and messages. • Assist in developing initial operations security vulnerabilities and EEFIs. • Develop a proposed problem statement. • Include weather (which includes space) and EMS effects on the enemy’s warfighting function • Develop a proposed mission statement. capabilities. • Present the mission analysis briefing. • Include key considerations for threat cyberspace operations, including the identification of • Develop and issue the initial commander’s key aspects of the cyberspace domain. intent. • Develop and issue initial planning guidance. • Develop COA evaluation criteria. • Issue a WARNORD.
2-0
93
Integrating the Intelligence Warfighting Function Table 3-3. Intelligence support to the military decision-making process (continued) Step 2—Mission analysis Intelligence support to step 2 (continued) • Analyze the higher headquarters’ plan or MCOO and terrain (with engineer officer): Does the overlay— order. • Identify restricted or severely restricted terrain? • Perform initial IPOE. • Identify mobility corridors (air and ground)? • Determine specified, implied, and essential tasks. • Identify infiltration lanes and landing and pickup zones? • Review available assets and identify • Identify key or decisive terrain? resource shortfalls. • Define defensible terrain? • Determine constraints. • Identify terrain that supports survival and evasion of personnel executing their isolated • Identify critical facts and develop Soldier guidance? assumptions. • Identify aspects within the information dimension (and their interrelationship with the human • Begin a risk assessment. dimension), such as communications means and networks (telephone networks [landline, cellular, satellite, and voice over internet protocol]; internet; radio; television; newspapers • Develop initial CCIRs and EEFIs. and other printed material; social media; cyber cafes; threat and neutral narratives; threat • Develop the initial information collection plan. and neutral actor vulnerabilities to information advantage activities; and friendly • Update plan for the use of available time. vulnerabilities to threat information warfare activities). • Develop initial themes and messages. Situation templates: Do the situation templates— • Develop a proposed problem statement. • Include all committed and reinforcing forces as well as combat multipliers? • Develop a proposed mission statement. • Focus at least two levels down in detail (or as command dictates), including all threat • Present the mission analysis briefing. warfighting functions? • Develop and issue the initial commander’s • Graphically portray threat characteristics, vulnerabilities and peculiarities, activities, and intent. capabilities for each COA? • Develop and issue initial planning guidance. • Event templates and matrices (unrefined): Do the event templates identify and focus on NAIs, • Develop COA evaluation criteria. time phase lines, time distance analysis, critical actions, or threat DPs? • Issue a WARNORD. Step 3—COA development Intelligence support to step 3 • Ensure IPOE products are deliberately integrated into COA development. Critical products include the MCOO, civil considerations products, threat objectives, threat models (including • Assess relative combat power. HVTs), situation templates, and event templates. • Generate options. • Integrate information and intelligence received from the initial information collection effort. • Array forces. • Ensure weather and EMS effects on the warfighting function capabilities are deliberately • Develop a broad concept. integrated into COA development. • Assign headquarters. • Refine and prioritize situation templates, event templates, and matrices. • Develop COA statements and sketches. • Update HVTs for targeting by lethal and nonlethal methods. • Conduct COA briefing. • Take an active part in analyzing combat power by providing all available information on • Select or modify COAs for continued current threat forces and the situation. analysis. • Provide information on threat vulnerabilities while analyzing relative combat power. • Consider as many possible COAs as time permits, starting with the most likely and including the worst case (most dangerous). Step 4—COA analysis (war game) Intelligence support to step 4 As the enemy commander— • Use the enemy situation template as a starting point and the event template and matrix as guides to develop critical enemy DPs in relation to friendly COAs. • Project enemy reactions to friendly actions and project enemy losses. • Capture the results of each enemy action and counteraction as well as corresponding friendly and enemy strengths and vulnerabilities. As the command’s senior intelligence officer— • Identify new information requirements. • Gather the tools. • Recommend PIRs that correspond to DPs and refine PIRs with the LTIOV. • List all friendly forces. • Redefine enemy COAs based on developed DPs and the situation template. • List assumptions. • Develop critical enemy DPs in relation to friendly COAs. • List known critical events and DPs. • Fight as an uncooperative enemy to develop DPs and project enemy losses. • Select the war-gaming method. • Address all relevant enemy activities. • Select a technique to record and display • Assist in developing target selection standards and the attack guidance matrix from war- results. gamed COAs. • War-game the operations and assess the • Recommend changes to the information collection plan. results. • Based on the war game, refine the situation and event templates with corresponding DPs, • Conduct a war-game briefing (optional). TAIs, and HVTs, including NAIs. • Refine the event matrix with TAIs and HVTs. • Participate in the targeting process. • Link NAIs to TAIs. • Display the scheme of information collection during the war game. • Assists the G-3/S-3 in developing the decision support template. • Consider the effects of enemy and friendly COAs on local population attitudes and behaviors.
2-0
94
Chapter 3 Table 3-3. Intelligence support to the military decision-making process (continued) Step 5—COA comparison Intelligence support to step 5 • Ensure incorporation of the recommended PIRs in the tasking of subordinate units and the requests to higher and lateral echelons. • Coordinate with supporting information collection organizations and G-2/S-2s to ensure the information collection plan is understandable and executable. When executed, the plan • Conduct analysis of advantages and should enable a rapid and seamless transition between current and future operations. disadvantages. • Modify the initial set of intelligence requirements developed during mission analysis to reflect • Compare COAs. war-gaming results. • Conduct a COA decision briefing. • Include weather and EMS effects on specific warfighting function capabilities’ analysis of advantages and disadvantages for each COA. • Clearly delineate intelligence requirements. • Ensure the synchronization of all available collection assets. Step 6—COA approval Intelligence support to step 6 • Recommend PIRs (including the LTIOV) and the supporting information collection plan. • Implement, refine, or rework the intelligence running estimate, Annex B (Intelligence), and the information collection plan based on the commander's acceptance, modification, or rejection of the staff's recommendation. • Upon COA approval, the G-2/S-2 and G-3/S-3 coordinate with supporting information collection resources to ensure the scheme of information collection supports the approved COA. • Refine the weather estimate. Commander approves a COA. • Collaborate with the G-3/S-3 to ensure staffs at all levels understand the following: ▪Scheme of information collection. ▪EEFIs. ▪Collection tasks. ▪Analysis and production priorities. ▪Intelligence control measures: target handover, reconnaissance handover, and reporting responsibilities. ▪Procedures for tasking and reporting. Step 7—Orders production, Intelligence support to step 7 dissemination, and transition • The G-2/S-2 plans cell, assisted by the intelligence cell, develops Annex B (Intelligence) to the OPORD and assists the G-3/S-3 in producing Annex L (Information Collection). • The G-2/S-2 plans cell assists other staff members in preparing the enemy or information collection aspects of their annexes. Paragraph 3 (Coordinating Instructions) of Annex B (Intelligence) explains measures for handling captured personnel, documents, and materiel. • Produce and disseminate orders. • The G-2/S-2 reviews the OPORD and Annex B (Intelligence) for accuracy and completeness • Transition from planning to operations. as well as compatibility with foreign disclosure policy or guidelines. • The G-2/S-2 forwards Annex B (Intelligence) to the G-3/S-3 for incorporation and dissemination into the OPORD. • The collection manager, supported by the intelligence cell, develops requests for information (intelligence production); with G-2/S-2 approval, the manager forwards the requests to the next higher echelon and adjacent units. CCIR commander’s critical information requirement IPOE intelligence preparation of the operational environment CEMA cyberspace electromagnetic activities JFC joint force commander COA course of action LTIOV latest time information is of value DP decision point MCOO modified combined obstacle overlay EEFI essential element of friendly information NAI named area of interest EMS electromagnetic spectrum OPORD operation order G-2/S-2 division or corps/battalion or brigade intelligence staff officer PIR priority intelligence requirement G-3/S-3 division or corps/battalion or brigade operations staff officer TAI target area of interest G-6/S-6 division or corps/battalion or brigade signal staff officer WARNORD warning order HVT high-value target
2-0
95
Integrating the Intelligence Warfighting Function SECTION V – INTELLIGENCE AND THE INTEGRATING PROCESSES 3-27. An integrating process consists of a series of steps that incorporate multiple disciplines to achieve a specific end. Integrating processes begin in planning and continue during preparation and execution. Commanders and staffs use the integrating processes to synchronize specific functions throughout the operations process. The intelligence staff supports the integrating processes by providing detailed and relevant all-source intelligence on the various aspects of the threat, terrain and weather, civil considerations, and other significant aspects of the OE. (See ADP 5-0 for doctrine on the integrating processes.) 3-28. Key integrating processes include— ⚫ IPOE. ⚫ Information collection. ⚫ Targeting. ⚫ Risk management. ⚫ Knowledge management. Note. IPOE is not discussed in this section. See paragraphs 3-15 through 3-17 for a discussion of the importance of the entire staff’s collaborative involvement, see paragraphs 3-25 and 3-26 for a discussion of IPOE in the context of the MDMP, and see paragraphs 5-42 through 5-61 for a detailed discussion of IPOE in the context of the intelligence staff. INFORMATION COLLECTION Information collection is an activity that synchronizes and integrates the planning and employment of sensors and assets as well as the processing, exploitation, and dissemination systems in direct support of current and future operations (FM 3-55). FM 3-55 discusses information collection capabilities, including human or automated sensors and assets directed to collect information that enables better decision making and expands an understanding of the OE. Information collection is an integrated operations and intelligence function (see figure 3-4 on page 3-16). Collection management drives information collection. Therefore, collection management teams must understand information collection, as well as the art of effectively integrating collection management into information collection and the operations process. Information collection provides commanders and staffs with detailed and timely intelligence, which assists them in gaining situational understanding of the threat and OE. Commanders and staffs accomplish situational understanding by answering intelligence requirements in time and space and identifying any threats to mission accomplishment. The intelligence staff provides commanders with predictive assessments (accounting for the domains and dimensions, as illustrated in figures 2-5 and 2-6 on pages 2-18 and 2-20, respectively) of the enemy, terrain and weather, civil considerations, and other significant aspects of the OE. (See FM 3-55 and ATP 2-01 for doctrine on information collection.) Note. The intelligence warfighting function’s contributions to information collection include collection management and intelligence operations. However, intelligence PED and intelligence analysis are integral to information collection.
2-0
96
Chapter 3 Figure 3-4. Intelligence contribution to information collection Conduct information collection is an IWFT. The collection management team must understand the basics, nuances, and complexities associated with conducting the information collection tasks, discussed in detail in appendix B, not just collection management: ⚫ Conduct collection management. ⚫ Direct information collection. ⚫ Execute collection. ⚫ Conduct intelligence-related missions and operations.
2-0
97
Integrating the Intelligence Warfighting Function CONDUCT COLLECTION MANAGEMENT 3-33. Collection management is commander driven. The collection management team, with assistance from the rest of the staff—especially the operations staff—manages intelligence requirements for the commander, prepares the collection management plan, and coordinates with the operations staff to maintain integration and synchronization as the information collection effort progresses. Chapter 5 discusses collection management extensively. 3-34. This discussion focuses on those aspects of collection management that require extensive staff cross- collaboration and coordination with and cooperation between the intelligence staff and other members of the staff (see also paragraph 3-41): ⚫ Using ancillary collection assets during information collection. ⚫ Executing technical collection during tactical operations and the complementary capabilities. Using Ancillary Collection Assets 3-35. The G-2/S-2 and collection manager, in coordination with the rest of the staff, develop the collection management plan using primary collection assets (whose mission is to perform one of the four primary means of information collection: reconnaissance, surveillance, intelligence operations, and security operations), ancillary collection assets, and nonmilitary information sources. Ancillary collection assets are those units and systems tasked to perform information collection while also performing another mission during operations. They are sometimes referred to as nontraditional assets. Examples of ancillary collection assets include but are not limited to— ⚫ Target acquisition radars. ⚫ Air defense system sites. ⚫ Logistics convoys. ⚫ Military police performing security and mobility support. ⚫ Helicopter battalions. ⚫ Sniper teams. ⚫ Civil affairs (CA) teams (unless already performing civilian reconnaissance). ⚫ Special reconnaissance teams (unless performing strategic reconnaissance). ⚫ Joint terminal attack controllers. ⚫ Fire support teams. ⚫ Army space control systems, if available. 3-36. The entire staff must cooperate with the G-2/S-2 and collection management team and perform detailed coordination to reasonably recommend these ancillary collection assets to the G-3/S-3 and operations staff for tasking and inclusion in Annex L (Information Collection) of the order. To ensure successful information collection, the tasking should be detail-oriented since the assets may be unfamiliar with information collection techniques and procedures. After tasking, staff control of these ancillary collection assets is important. (See ATP 2-01.) Executing Technical Collection 3-37. The tactical execution of technical collection involves collaboration and detailed coordination across the staff. Technical collection and the evacuation of captured materiel for subsequent exploitation are usually not performed by the MI unit. Therefore, other types of units and logistical elements are heavily involved in technical collection activities. Note. Commanders should not overlook the importance of technical collection in supporting TECHINT and DOMEX. In some situations, technical collection can provide valuable information and intelligence to support operations.
2-0
98
Chapter 3 DIRECT INFORMATION COLLECTION The operations staff integrates collection assets through a deliberate and coordinated effort across all warfighting functions. Tasking and directing information collection are vital in controlling limited collection assets. During tasking and directing information collection, the staff recommends cueing, redundancy, and mix, as appropriate. Staffs task information collection by issuing warning orders (WARNORDs), FRAGORDs, and operation orders (OPORDs). They direct collection assets by continuously monitoring the operation. Staffs retask to refine, update, or create new requirements. Tasking and directing information collection include two tasks: ⚫ Develop the information collection plan. ⚫ Execute, evaluate, and update the information collection plan. 3-39. Using intelligence handover lines is a flexible means of directing information collection, as well as analysis, to support key decisions and/or targeting. An intelligence handover line is a control measure between two friendly units used to pass responsibility for the conduct of information collection against a specific enemy force. Chapter 8 discusses intelligence handover lines. EXECUTE COLLECTION Executing collection focuses on requirements tied to the execution of tactical missions (reconnaissance, surveillance, intelligence operations, and security operations) based on the intelligence requirements. Collection activities acquire information about the threat and the AO, and they provide that information to intelligence processing and exploitation elements. Typically, collection activities begin soon after receipt of mission and continue throughout preparation and execution of the operation. They do not cease at the conclusion of the mission but continue as required. This allows the commander to focus combat power, execute current operations, and prepare for future operations simultaneously. (FM 6-0 lists G-3/S-3 responsibilities.) CONDUCT INTELLIGENCE-RELATED MISSIONS AND OPERATIONS The associated intelligence tasks (for example, provide intelligence support to personnel recovery) facilitate the conduct of reconnaissance and surveillance. These tasks also include specialized missions (such as exploitation of a sensitive site) that provide intelligence and information outside the traditional information collection construct. Conduct intelligence-related missions and operations includes six tasks: ⚫ Establish a mission intelligence briefing and debriefing program. ⚫ Conduct intelligence coordination. ⚫ Support site exploitation. ⚫ Conduct explosive ordnance disposal support. ⚫ Provide intelligence support to personnel recovery. ⚫ Conduct identity activities. Note. The conduct intelligence-related missions and operations task emphasizes the importance of staff collaboration during collection management. TARGETING 3-42. Targeting is the process of selecting and prioritizing targets and matching the appropriate response to them, considering operational requirements and capabilities (JP 3-0). Targeting is an integral part of the operations process that organizes the commander and staff’s efforts to integrate and synchronize fires into operations. Targeting seeks to create specific desired effects through lethal and nonlethal actions. 3-43. Targeting encompasses many processes, all linked and logically guided by the joint targeting cycle. Units may use the Army targeting methodology or the joint targeting cycle, as appropriate (according to the organizational echelon), to integrate and synchronize capabilities, across warfighting functions and information advantage activities, into operations to create the desired effects in time and space. The targeting
2-0
99
Integrating the Intelligence Warfighting Function team recommends targeting guidance to the commander, develops targets, selects targets for attack, and coordinates, integrates, and assigns organic or allocated joint, interagency, and multinational fires to specific targets and target systems. (See FM 3-60.) Target A target is an entity or object that performs a function for the threat considered for possible engagement or other action (JP 3-60). Targets include an array of mobile and stationary forces, equipment, and capabilities that span the human, information, and physical dimensions. Threats can use targets to conduct operations. A target’s importance is determined by its potential contribution to achieving the commander’s objectives or otherwise accomplishing assigned tasks or reaching an effect. Targets are continuously refined or adjusted as an operation unfolds. TARGETING WITHIN MULTIDOMAIN OPERATIONS 3-44. Targeting is a complex and multidisciplined effort that requires coordinated interaction among many groups. Army forces meet a diverse array of challenges and contribute to national objectives across a range of operational categories, including large-scale combat operations, limited contingency operations, crisis response, and support to security cooperation. While most operations conducted by Army forces occur either below the threshold of armed conflict or during limited contingencies, Army readiness focuses on large-scale combat operations. 3-45. Army forces conduct operations to support joint campaigns, which mostly occur as part of a larger coalition operation. Leaders must understand the interdependencies between their own assigned forces and the forces or capabilities provided by others to generate the complementary and reinforcing effects of combined arms approaches. Army forces employ joint and other unified action partner capabilities to the extent these capabilities are available. However, because peer threats can contest the force in all domains, Army forces must be prepared to conduct operations when some or all joint capabilities are unavailable to support mission accomplishment. 3-46. Army forces employ organic capabilities in multiple domains, and they continuously benefit from maritime and air strategic transportation and space and cyberspace capabilities that they do not control, including global positioning, satellite communications, and ISR. Lower echelons may not always notice the opportunities created by higher echelons or other forces that operate primarily in other domains; however, leaders must understand how the absence of those opportunities affects their concept of operations, decision making, and risk assessment. TARGETING PRINCIPLES 3-47. Targeting proceeds from the commander’s objectives to an assessment of the results achieved throughout an operation. Participants in the targeting process should adhere to these targeting principles for creating the desired effects while diminishing undesired or adverse collateral effects. The targeting principles are— ⚫ Focused. Targeting focuses on achieving the commander’s objectives. The function of targeting is efficiently achieving the commander’s objectives within the parameters set at the operational level—directed limitations, the rules of engagement or the rules for the use of force, the law of war, and other guidance given by the commander. Every nominated target must contribute to attaining the commander’s objectives. ⚫ Effects-based. Targeting seeks to create specific desired effects through lethal and nonlethal actions or capabilities. Target analysis encompasses all possible means to create desired effects, drawing from all available capabilities. The art of targeting seeks to create desired effects with the least risk and time and resource expenditures.
2-0
100
Chapter 3 ⚫ Interdisciplinary. Targeting is a command function that requires the participation of many disciplines, including all unit staff elements, other organizations, and multinational partners, to plan, prepare, execute, and assess targeting tasks. ⚫ Systematic. A targeting methodology is a rational and iterative process that systematically analyzes, prioritizes, and assigns assets against targets to create those effects that will contribute to achieving the commander’s objectives. During the operation, if the desired effects are not created, targets may be considered again in the process or operations may have to be modified. TARGETING MEMBERS 3-48. Targeting team members are competent experts in doctrine and the processes and procedures associated with operations and targeting. The team understands existing authorities and critical staff capabilities that enable the creation and assessment of effects to support the commander’s intent. Furthermore, the team understands its targeting duties and requirements enough to coordinate both vertically and horizontally. Team members have the flexibility to recognize changes in the OE and make timely coordination to affect targeting. Key targeting personnel may not exist at all echelons. The key targeting personnel within the intelligence staff include but are not limited to the— ⚫ G-2/S-2. ⚫ United States Air Force (USAF) staff weather officer (SWO). ⚫ Intelligence targeting team officer. ⚫ Collection manager. ⚫ Analysis and control element (ACE) or brigade intelligence support element (BISE) chief. ⚫ Field artillery intelligence officer (FAIO). THE TARGETING PROCESS THROUGH THE ARMY TARGETING METHODOLOGY 3-49. Across the Army strategic contexts, the number of possible targets far exceeds the number of resources available to acquire and create desired effects. It is critical for the higher echelon to provide adequate guidance and anticipate the likely requirements for subordinate echelons. Targeting is a top-down driven process with a substantial need for bottom-up refinement. This applies to any circumstance requiring lead time or insertion into supporting planning or execution cycles. The importance of what targets to attack and with what available capabilities must be planned and prioritized. The decide, detect, deliver, and assess (D3A) Army targeting methodology is how the Army performs the targeting process. D3A is a flexible, repeatable four-function process, not designed to be time-constrained or rigidly sequential. (See figure 3-5.) Figure 3-5. Decide, detect, deliver, and assess Army targeting methodology
2-0
101
Integrating the Intelligence Warfighting Function 3-50. The targeting process provides an effective method for matching friendly force capabilities against enemy targets to achieve the commander’s desired effects and objectives. There are two general ways to frame the D3A Army targeting methodology: ⚫ During planning and the MDMP, the staff uses the targeting methodology as a process to assist in product development and visualization. The staff applies the methodology to analyze the commander’s guidance to determine the right targets, at the right place, at the right time. During the MDMP, the staff can make these decisions and apply the required assets to create desired effects. The staff can further discuss the methodology by developing COAs and war- gaming them. The staff also applies the methodology to assessment requirements and the analysis needed to facilitate future decisions. ⚫ As an integrating process during execution, the targeting methodology enables the staff to apply targeting products (HPTLs, target selection standards [TSS], attack guidance matrices [AGMs], information collection synchronization matrices, and target synchronization matrices) to facilitate operations. The staff makes decisions continuously, adjusts detection methods or locations, and revises delivery options based on changes to threat COAs. RISK MANAGEMENT 3-51. Risk management is the Army’s primary process for identifying hazards and controlling risks during operations. Risk management is the process to identify, assess, and mitigate risks and make decisions that balance risk cost with mission benefits (JP 3-0). The chief of protection (or S-3 in units without a protection cell), in coordination with the safety officer, integrates risk management into the MDMP. The intelligence staff participates in the overall risk management process and integrates risk management into collection management when recommending tasks for collection assets. (See ATP 5-19 for risk management doctrine.) 3-52. Commanders must focus and use intelligence to explicitly understand the lethality of large-scale combat operations, preserve their combat power, and mitigate operational risk, when possible, to achieve the end state. Using intelligence to see and understand within each domain can reduce risk to the friendly force and enhance success in chaotic and high-tempo operations. 3-53. Intelligence provides the commander the ability to detect adversary activities, predict enemy intentions, understand and track enemy capabilities across all domains, inform decisions, and provide realistic assessments of operational and tactical risks. During situation development, analysts determine the significance of collected information and its significance relative to predicted threat COAs. Through predictive analysis, the staff templates threat activity or trends that present opportunities or risks to the friendly force. This support assists the commander and staff in deciding when and where to concentrate sufficient combat power to defeat the threat while mitigating risks. KNOWLEDGE MANAGEMENT 3-54. Knowledge management is the process of enabling knowledge flow to enhance shared understanding, learning, and decision making (ADP 6-0). The purpose of knowledge management is aligning people, process, and tools within the organizational structure and culture to achieve a shared understanding. This alignment improves collaboration and interaction between leaders and subordinates and information sharing with subordinate units, higher-echelon headquarters, and unified action partners. (See ATP 6-01.1 for knowledge management doctrine.) 3-55. The intelligence staff participates in both the unit’s overall knowledge management effort and its own staff knowledge management effort. Managing knowledge within the unit and the intelligence staff is critical to providing effective intelligence support. Important aspects of knowledge management include— ⚫ Using the intelligence process with fundamentally sound procedures to ensure the right intelligence gets to the right users at the right time in a useable format, and the intelligence is integrated into operations, to include targeting, as appropriate. ⚫ Ensuring the right focus and fundamentally sound procedures are used to avoid information overload and inundating the commander and staff with too much information and intelligence.
2-0
102
Chapter 3 ⚫ Ensuring the intelligence staff is data literate according to Army Deputy Chief of Staff for Intelligence (DA G-2) standards. ⚫ Avoiding circular reporting, which is receiving the same reports and information from sources other than the original source. Circular reporting can result in erroneous intelligence analysis and negatively affect the commander’s decisions and the staff’s control of operations. ⚫ Protecting against threat misinformation, disinformation, deception, and collection countermeasures by emphasizing the use of all-source intelligence. The commander and staff can use single-source intelligence and combat information, but they must understand the risk of threat deception. SECTION VI – COMMAND NODES AND CELLS AND BATTLE RHYTHM 3-56. Command nodes and cells and battle rhythm are important to C2. Effective C2 requires continuous, and often immediate, close coordination, synchronization, and information sharing across the staff. To promote this, commanders organize their staffs and other components of the C2 system into command posts (CPs) to assist them in effectively conducting operations. CPs provide a physical location for people, processes, and networks to directly assist commanders in understanding, visualizing, describing, directing, leading, and assessing operations. Across the CPs, commanders establish a battle rhythm as a procedural way to organize the activities within their headquarters and throughout the force. The battle rhythm is a deliberate daily cycle of command, staff, and unit activities that assist in synchronizing current and future operations. COMMAND NODES AND CELLS 3-57. Intelligence operations are distributed across and support redundant and functionally integrated command nodes—main CPs and tactical CPs (which include support area CPs) and mobile command groups. Each command node retains the capacity to execute C2 of the warfighting functions synchronized with higher and lower echelons of command. 3-58. Intelligence personnel not assigned to intelligence cells in main CPs assist the G-2/S-2 in managing intelligence operations from across the battlefield. This generally includes intelligence personnel assigned to integrating cells in tactical CPs in addition to mobile command groups at the corps and division echelons. (See FM 6-0 for staff roles and responsibilities.) Note. This publication provides information on intelligence cell structures based on modified tables of organization and equipment and force design updates. Commanders can task-organize based on mission requirements. COMMAND POSTS 3-59. A command post is a headquarters, or a portion there of, organized for the exercise of command and control (FM 6-0). Corps, division, and BCT headquarters can employ a main CP, tactical CP, and mobile command group. Additionally, a corps and division can use a rear area CP. Each CP has specific functions by design that assist commanders in understanding, visualizing, describing, directing, leading, and assessing operations. The following includes CP functions common to all CPs: ⚫ Conduct knowledge management, information management, and foreign disclosure. ⚫ Build and maintain situational understanding. ⚫ Control operations (by coordinating, synchronizing, and integrating). ⚫ Assess operations. ⚫ Coordinate with internal and external organizations. ⚫ Perform CP administrative activities.
2-0
103
Integrating the Intelligence Warfighting Function Main Command Post 3-60. A main command post is a portion of a unit headquarters containing the majority of the staff designed to command and control current operations, conduct detailed analysis, and plan future operations (FM 6-0). The main CP is the unit’s principal CP, serving as the primary location for plans, analysis, sustainment coordination, and assessments. It includes representatives from all staff sections and information and C2 systems to conduct operations. At certain echelons, the main CP can act as a JTF, JFLCC, or a coalition forces land component commander. 3-61. The main CP is larger, has more staff members, and is less mobile than the tactical CP. It operates at both operational and tactical levels and as a fully functional, stand-alone CP. All battalion and above units are resourced with a main CP that includes an executive officer or chief of staff, as appropriate, to supervise the staff. The main CP conducts all meetings (which may include working groups, cells, and boards) required to achieve mission requirements. 3-62. Main CP general functions include— ⚫ Controlling operations. ⚫ Receiving reports from subordinate units and preparing reports required by higher headquarters. ⚫ Planning operations, including branches and sequels. ⚫ Integrating intelligence into current operations and plans. ⚫ Synchronizing the targeting process. ⚫ Planning and synchronizing sustainment operations. ⚫ Assessing the progress of operations. Tactical Command Post 3-63. A tactical command post is a portion of a unit headquarters designed to command and control operations as directed (FM 6-0). It relies on the main CP for planning, detailed analysis, and coordination as well as for certain functions remaining with the main CP that require intelligence reach. The tactical CP is connected digitally to the main CP, mobile command group, higher headquarters, and all subordinate unit headquarters, including joint and multinational partner intelligence organizations. The tactical CP can support the entire range of missions at that echelon, but it does not have the same longevity and capacity as the main CP. Additionally, the tactical CP should prepare to be able to communicate in a denied, degraded, and intermittent low-bandwidth environment. 3-64. A tactical CP intelligence cell— ⚫ Supports current operations. ⚫ Ensures the tactical CP remains informed of the current enemy situation. ⚫ Makes recommendations related to the operation. 3-65. A tactical CP intelligence cell accomplishes these tasks by continually communicating and collaborating with the main CP intelligence cell and supported unit headquarters. The structure of a tactical CP is organic to the unit’s mission. In most situations, the structure is designed based on unit SOPs and mission variables (METT-TC [I]). The echelon determines the proper location of the tactical CP relative to the forward line of own troops. Mobile Command Group 3-66. The mobile command group is the commander’s mobile CP. The commander selects key personnel based on mission variables to staff the mobile command group. These key personnel often represent those staff sections—typically maneuver, fires, and intelligence—that can immediately affect current operations. 3-67. The intelligence representative to the mobile command group must be integrated with echelons above brigade organizations, the main and tactical CPs, and subordinate commands through the intelligence architecture. The mobile command group intelligence officer—
2-0
104
Chapter 3 ⚫ Assists the commander in interpreting intelligence reports and coordinating intelligence operations with the main and tactical CPs. ⚫ Informs the commander of the intelligence running estimate and intelligence readiness. Rear Area Command Post 3-68. Based on the situation, threat, size of the rear area, and the number of units in the rear area, corps and division commanders may form a rear area CP to assist in controlling operations. The rear area CP includes the support area as a subset of the rear area. The rear area CP enables corps and division commanders to exercise C2 over disparate functionally focused elements operating in rear areas that may exceed the effective span of control of the maneuver enhancement brigade or corps and division main CPs. 3-69. The rear area CP is not a separate section in a unit’s table of organization and equipment. When commanders form a rear area CP, they do so from the personnel and equipment in the main and tactical CPs. It normally collocates with the maneuver enhancement brigade, which provides the rear area CP with signal connectivity, sustainment, security, and workspace. 3-70. Rear area CP functions include— ⚫ Planning and directing sustainment. ⚫ Terrain management. ⚫ Movement control. ⚫ Area security. ⚫ Current and future operations. ⚫ Providing the situational awareness of the deep, close, and security fights. ⚫ Assisting the main CP with information flow from higher, lower, and lateral units. ⚫ Coordinating with the host-nation, international organizations, nongovernmental organizations, and other stakeholders, as required. ⚫ Issuing orders. COMMAND POST CELLS 3-71. Commanders organize CP cells based on the situation. A command post cell is a grouping of personnel and equipment organized by warfighting function or by planning horizon to facilitate the exercise of command and control (FM 6-0). Staff elements comprising personnel and equipment from staff sections form CP cells, which are typically organized as integrating and functional cells. (See figure 3-6.) These CP cells provide staff expertise, communications, and information systems that work together to assist the commander in planning and controlling operations. Figure 3-6. Command post cells
2-0
105
Integrating the Intelligence Warfighting Function Note. Resourcing for CP cells is different at each echelon. Specific information can be found in the doctrinal publications for each echelon. Integrating Cell 3-72. Integrating cells coordinate and synchronize forces and warfighting functions within a specified planning horizon. A planning horizon is a point in time commanders use to focus the organization’s planning efforts to shape future events (ADP 5-0). The three planning horizons are short-, mid-, and long-range; they are associated with the following cells, respectively: ⚫ Current operations integration cell (COIC): The COIC is the focal point for the execution of current operations. This involves assessing the current situation while regulating forces and warfighting functions according to the commander’s intent and concept of operations. All staff sections are represented in the COIC either permanently or on call. Intelligence personnel assigned to the COIC ensure all relevant intelligence regarding the enemy and other threats, terrain and weather, and civil considerations are integrated into the COP. The COIC— ▪ Issues, monitors, evaluates, directs, and controls the execution of orders. ▪ Conducts limited short-range planning and coordinates this effort within the functional cells. ▪ Continually updates IPOE. ▪ Conducts regular operations and assessment briefings. ▪ Maintains and displays the COP. ▪ Conducts shift changes, assessments, and other briefings as required. ⚫ Future operations cell: The future operations cell focuses on adjustments to the current operation—including the positioning or maneuvering of forces in depth—that facilitate the continuation of the current operation. ⚫ Plans cell: The plans cell (responsible for mid- to long-range planning operations) develops plans, orders, branches, and sequels using the MDMP to prepare for operations beyond the scope of the current order. The plans cell oversees military deception planning. The G-5 leads the plans cell and oversees planning for future operations. The intelligence planner— ▪ Assists in developing plans, orders, branches, and sequels. ▪ Monitors the common intelligence picture (CIP) and COP. ▪ Stays abreast of current operations by coordinating with the COIC. ▪ Coordinates with the ACE, BISE, or equivalent intelligence analysis element to produce intelligence products required for planning and orders production. Functional Cell 3-73. Functional cells coordinate and synchronize forces and activities by warfighting function. Organizing staff sections among CP functional cells expands the commander’s ability to exercise C2 and makes the C2 system more resilient. The functional cells in a CP are intelligence, movement and maneuver, fires, protection, and sustainment. Chapter 5 discusses the intelligence staff and the intelligence functional cell. BATTLE RHYTHM 3-74. A headquarters’ battle rhythm consists of a series of meetings (to include working groups and boards), briefings, and other activities synchronized by time and purpose. The battle rhythm is a deliberate daily cycle of command, staff, and unit activities intended to synchronize current and future operations (FM 6-0). The chief of staff or executive officer oversees the unit’s battle rhythm and ensures activities are logically sequenced so the output of one activity informs another activity’s inputs. This is important not only within the headquarters but also in the unit’s battle rhythm as it nests with the higher-echelon headquarters.
2-0
106
Chapter 3 3-75. Understanding the purpose and potential decisions of each meeting and activity is equally important. This understanding allows members of the staff and subordinate commanders to provide appropriate input to influence decisions. The battle rhythm enables— ⚫ A commander’s decision making. ⚫ A routine for staff interaction and coordination. ⚫ Interaction between the commander and staff. ⚫ Staff synchronization across time, space, and purpose. ⚫ Planning by the staff. 3-76. In conjunction with the integrating processes, working groups—groupings of predetermined staff representatives who meet to provide analysis, coordinate, and provide recommendations for a particular purpose or function (FM 6-0)—are important in integrating and synchronizing intelligence into operations. Effective integration and synchronization require the entire staff’s full participation in the information collection working group as well as the intelligence staff’s full participation in the other working groups, especially the targeting, CEMA, and protection working groups. 3-77. EMS actions, as discussed in paragraph 1-103, provide a good example of the criticality of detailed staff coordination and effective working groups. Coordinating and deconflicting SIGINT collection, EW operations, and spectrum management connect to executing optimal information collection, CEMA integration, targeting, and information advantage activities. The intelligence and CEMA staffs must collaborate with the rest of the staff and across working groups, especially the CEMA and targeting working groups. 3-78. Working groups address various subjects depending on the situation and echelon. Brigade and battalion headquarters have fewer working groups than higher echelons. Working groups may convene daily, weekly, monthly, or intermittently depending on the subject, situation, and echelon. Typical working groups, at corps and division headquarters, scheduled within the unit’s battle rhythm include— ⚫ Assessment. ⚫ Knowledge management. ⚫ Civil-military operations (CMO). ⚫ Protection. ⚫ CEMA. ⚫ Sustainment. ⚫ Information collection. ⚫ Targeting. ⚫ Information operations. ⚫ Airspace control. Note. Time permitting, some units conduct a targeting coordination board that unites key members of the CEMA, information collection, targeting, and other working groups to obtain the commander’s validation and approval of targeting within current and future operations.
2-0
107
Chapter 4 Army Strategic Contexts and Intelligence SECTION I – OVERVIEW 4-1. The Army is a globally engaged, regionally responsive force that provides a full range of capabilities to CCDRs. The Army provides the joint force with the capability and capacity for the application of landpower. Army forces meet a diverse array of challenges and contribute to national objectives across a wide range of operational themes, including large-scale combat operations, limited contingency operations, crisis response, military engagement, and support to security cooperation. The Army also provides a broad range of organizations, units, and capabilities to support theater operations. 4-2. Combatant commands develop theater campaign plans that rely on the operational themes as well as campaign and operations activities. When a situation forces a branch to the campaign plan, it may eventually lead to armed conflict. In these situations, the full capability of the intelligence enterprise supports the combination of offensive, defensive, and stability operations to seize, retain, and exploit the initiative and consolidate gains to ultimately return to competition. 4-3. Army intelligence is an inherent part of any joint and multinational combined arms team; intelligence activities conducted facilitate successful joint operations. The intelligence enterprise supports the joint force across the competition continuum through the aggressive execution of information collection and intelligence production. A portion of the Army intelligence force is designated to support the joint force. (See figure 4-1.) Figure 4-1. Joint competition continuum aligned with the Army strategic contexts
2-0
108
Chapter 4 ARMY STRATEGIC CONTEXTS 4-4. Army doctrine describes the strategic situation through three contexts—competition, crisis, and armed conflict—in which Army forces conduct operations (see figure 4-1 on page 4-1). Therefore, the rest of this publication uses the Army strategic contexts as a major doctrinal construct to discuss intelligence. Supporting Army forces, as part of unified action, across the strategic contexts require an effective intelligence warfighting function that is continuously vigilant and flexible. The Army synchronizes its intelligence effort with unified action partners to achieve unity of effort and meet the commander’s intent. Intelligence unity of effort is critical in accomplishing the mission. The character of effective and flexible intelligence support transitions across the Army strategic contexts. INTELLIGENCE SUPPORT 4-5. Effective intelligence support assists in identifying and creating exploitable advantages in the OE. It is important to note—some peer threats view themselves in continual conflict, whether war in the traditional sense has begun. Intelligence professionals must consider this peer threat perspective and seek advantages to provide commanders with options against the threat across the strategic contexts. The intelligence staff must also understand how intelligence warfighting function capabilities support the tenets and imperatives of operations across the strategic contexts—doing so optimizes the integration of operations and intelligence. While some intelligence tasks and activities are specific to certain strategic contexts, many of the tasks and activities span across all three strategic contexts. Commanders and staffs must collaborate with the intelligence staff to adequately address the planning, collection and PED, storage and safeguarding, and analysis of intelligence and associated contextual data during each Army strategic context. 4-6. The intelligence staff must coordinate with the rest of the staff continuously. This coordination ensures the first imperative of operations—see yourself, see the enemy, and understand the OE—is always at the forefront of synchronizing operations and intelligence and identifying advantages against threat forces. Threat forces seek advantages in multiple domains and dimensions to overwhelm U.S. forces’ ability to react. At times, these advantages are not readily identified because threat activities, windows of opportunity, and friendly efforts to exploit those windows and reach an advantage occur over extended time windows (in some situations, over decades). Successful intelligence operations must remain agile and flexible to continuously monitor OE changes and friendly and enemy strategic and operational effects, so the commander and staff can adjust forces and capabilities when needed. Long-Term Situational Understanding Challenges The broad nature of the Army strategic contexts and long-duration time windows are challenges to Army commanders and staffs. While many aspects of the theater are inherently national- and joint-level activities, the Army also has an important role. The effort to provide continuous situational understanding across the strategic contexts and account for all domains and dimensions is carefully focused through the operational variables (PMESII-PT) and pre-mission analysis of the OE. Focusing a large volume of information and intelligence down to a manageable amount of relevant information is time-consuming and requires detailed analysis. Often, there are limitations on the conduct of information collection during competition—and sometimes during crisis. Despite these challenges, Army commanders and staffs must support the planning and execution of flexible deterrent and response options as well as defeat and stability mechanisms to achieve desired end states. Gaps and problems with gaining situational understanding during competition can result in an even greater challenge as friendly forces transition into crisis and armed conflict.
2-0
109
Army Strategic Contexts and Intelligence 4-7. Intelligence support is inherently difficult and is often discussed throughout this manual as fighting for intelligence. Fighting for intelligence applies as much to intelligence support to Army units and organizations during competition (including long-term situational understanding) or crisis as it does to intelligence support to a division conducting offensive operations during a large-scale combat operation. Each strategic context discussion in this chapter concludes with a fighting for intelligence discussion. (See paragraphs 1-120 through 1-125 for a discussion on the concept of fighting for intelligence.) SECTION II – COMPETITION BELOW ARMED CONFLICT 4-8. Competition exists when two or more state or nonstate adversaries have incompatible interests but neither seeks armed conflict. Nation-states compete using all instruments of national power to gain and maintain advantages that assist them in achieving their goals. Low levels of lethal force can be part of competition. Adversaries often employ cyberspace capabilities and information warfare to destroy or disrupt infrastructure, interfere with government processes, and conduct activities in a way that does not cause the United States and its allies to respond with force. Competition provides military forces— ⚫ Time to prepare for armed conflict. ⚫ Opportunities to assure allies and partners of resolve and commitment. ⚫ Time and space to set the necessary conditions to prevent crisis or armed conflict. ADVERSARY METHODS 4-9. Conducting effective operations during competition requires a broad understanding of the strategic security environment and common adversary methods and objectives. During competition, adversaries seek to further their own interests using a variety of methods to hinder the United States from achieving its objectives. Therefore, the intelligence staff must understand adversary methods and their associated goals and desired effects. This knowledge assists the intelligence warfighting function in integrating and synchronizing with the other warfighting functions to generate combat power and apply it against adversary actions. Note. Peer threats conduct activities over prolonged time windows, so peer threat objectives, advantages, and effects may not be recognized immediately. In some situations, these advantages and effects may be observed slowly over expanded timeframes and eventually lead to crisis and possibly armed conflict. fragment ADVERSARY ACTIVITIES TO ACHIEVE STRATEGIC GOALS 4-10. By using a range of military and nonmilitary activities, peer threats use all instruments of national power to further their interests. The adversary’s use of diplomatic, economic, informational, and military activities shapes the OE to the adversary’s advantage well before armed conflict. Adversaries operate aggressively in the space or cyberspace domains during competition and crisis to influence the OE and deter or degrade friendly operations. Adversaries target foreign audiences to promote strategic messages on the international stage. At times, these messages are not legitimate or correct; the adversary’s intent is to get the messages out first, outside of the friendly forces’ ability to effectively counter these messages. Analyzing the possibility of threat and friendly forces leveraging a window of opportunity to gain or maintain human, information, and physical advantages is an important aspect of intelligence support during competition. ADVERSARY ACTIVITIES TO COUNTER A U.S. RESPONSE 4-11. An adversary may attempt to prevent or constrain the United States’ ability to project forces to the region and limit U.S. response options by using the following methods: ⚫ Conduct information warfare activities to manipulate the acquisition, transmission, and presentation of information in a manner that legitimizes adversary actions and portrays the United States as the aggressor.
2-0
110
Chapter 4 ⚫ Conduct preclusion activities through nonlethal means to undermine relationships, raise political stakes, manipulate public opinion, and erode resolve to constrain or eliminate basing rights, overflight corridors, logistics support, and concerted allied actions. ⚫ Isolate the United States from allies and partners by fostering instability in critical areas and among relevant actors to increase U.S. operational requirements. ⚫ Create sanctuary from U.S. and partner forces through international law and treaty agreements, monitoring and attacking partner forces from across international borders and using proxy forces. ⚫ Conduct systems warfare by executing cyberspace attacks against critical force projection and sustainment infrastructure nodes to delay or disrupt the United States’ ability to deploy forces. Systems warfare approaches include nonattributable attacks on domestic infrastructure and the employment of networked military capabilities that support isolation and preclusion efforts. ADVERSARY ACTIVITIES TO PRECLUDE U.S. ACCESS TO A REGION 4-12. Establishing favorable conditions by shaping an OE is critical to the United States’ success and the adversary’s success. Adversaries seek to establish conditions that limit or prevent U.S. access to a region, typically in locations close to either adversary borders or U.S. allied-partner borders. This includes but is not limited to— ⚫ Forward positioning of layered and integrated air defenses, long-range fires, and other A2 capabilities. ⚫ Positioning of systems capable of delivering conventional and nuclear munitions. ⚫ Positioning of intermediate-range ballistic missiles and cruise missiles. ⚫ Positioning of fixed-wing aircraft. ⚫ Positioning of unmanned aircraft systems (UASs). ⚫ Positioning of naval surface and subsurface forces. ⚫ Early warning surveillance radars. ⚫ Rocket artillery. ⚫ Conducting offensive cyberspace activities against friendly C2, infrastructure, and sustainment capabilities. ⚫ EW capabilities. ⚫ Counterspace capabilities. 4-13. Adversaries seek exploitable advantages in the OE; therefore, U.S. forces should expect that adversaries are observing them, including U.S. forces’ intentions and activities across all echelons within CONUS and outside the continental United States (OCONUS). Security activities and CI considerations for all echelons are important, ranging from technology protection and force modernization security to tactical unit deployments and exercises. Adversaries may reach and exploit advantages in terms of intelligence collection and then use the intelligence to cause grave harm to U.S. interests and operations. OPERATIONAL ASPECTS 4-14. Operations during competition— ⚫ Deter malign adversary action. ⚫ Set conditions to support friendly operations and the effective use of various capabilities should deterrence fail. ⚫ Shape an OE with allies and partners in ways that support U.S. strategic interests and policy aims. 4-15. Preparation for armed conflict is the primary focus of Army conventional forces during competition. Operations during competition focus on— ⚫ Setting the theater. ⚫ Building allied and partner capabilities and capacity. ⚫ Improving joint and multinational interoperability. ⚫ Protecting forward-stationed forces.
2-0
111
Army Strategic Contexts and Intelligence ⚫ Preparing to transition and execute operation plans (OPLANs). ⚫ Training and developing leaders for operations in specific theaters. ⚫ Promoting and protecting U.S. national interests and influence. ⚫ Building partner capacity and partnerships. ⚫ Recognizing and countering adversary attempts to gain positions of relative advantage across the domains and dimensions. 4-16. Competition activities are continuous within an area of responsibility (AOR). Army forces participate in and conduct numerous other activities to support the CCDR’s theater campaign plan. These activities include developing intelligence, countering weapons of mass destruction, providing support to humanitarian efforts, achieving information advantages, and organizing and participating in combined training and exercises. The CCDR uses these activities to improve security within partner nations, enhance international legitimacy, gain multinational cooperation, and influence adversary decision making. This cooperation includes exchanging information and sharing intelligence, obtaining access for U.S. forces in peacetime and crisis, and mitigating conditions that could lead to crisis and armed conflict. 4-17. The theater army and subordinate Army forces perform the following major activities during competition: ⚫ Execute flexible deterrent options and flexible response options. ⚫ Set the theater across warfighting functions, including in terms of preparing for intelligence operations and intelligence staff activities during crisis and armed conflict. ⚫ Tailor Army forces. ⚫ Project the force. (See appendix C.) 4-18. Other competition activities include but are not limited to— ⚫ Exchanging information and sharing intelligence with unified action partners. ⚫ Assisting allies and partners to improve their military capabilities and capacity. ⚫ Medical support. ⚫ Cooperative training. ⚫ Supporting local institutions. 4-19. Operations during competition consist of various long-term military engagements, security cooperation, and deterrence missions, tasks, and actions. Typically, these operations also occur to support the CCDR’s theater campaign plan or theater security cooperation plan. CCDRS use these plans as tools to organize, integrate, and execute joint operations. CONSOLIDATING GAINS 4-20. Experience proves that Army force activities conducted during competition assist in ensuring stability and reduce the potential for man-made crises or armed conflict throughout a region, even in locations where no previous combat has occurred. During competition, Army forces may consolidate gains from previous conflicts for many years as JFCs seek to maintain relative advantages against a specific adversary and sustain enduring political outcomes. Examples of consolidating gains during competition include but are not limited to— ⚫ Increasing theater supply stocks. ⚫ Developing and revising detailed contingency plans and perfecting tactical tasks to execute OPLANs for large-scale combat operations. ⚫ Promoting interoperability with host-nation units. This consideration includes intelligence agreements, exercises, interoperability agreements with unified action partners, and expedited means to revise intelligence sharing agreements, when necessary. ⚫ Promoting and facilitating civil-military integration and interorganizational cooperation between unified action partners and indigenous populations and institutions responsible for executing governance. ⚫ Infrastructure improvement. This consideration includes constant revisions and measures to improve the survivability of the intelligence architecture within the theater.
2-0
112
Chapter 4 ⚫ Assessing and improving protection measures against adversary capabilities. ⚫ SIGINT surveys and other intelligence surveys and assessments within the theater. ⚫ Leveraging Army engagements during the execution of foreign assistance, which includes humanitarian and civic assistance. FIGHTING FOR INTELLIGENCE 4-21. Intelligence is integral in supporting operations during competition. Often, this intelligence support is expressed as setting the theater among Army intelligence professionals. Continuous monitoring of the OE to determine changes that may lead to an escalation of hostilities must occur to give decision makers adequate warnings to determine and execute optimal deterrent and response actions. The intelligence staff must establish a baseline intelligence architecture to meet a broad range of requirements, to include ensuring information is available to support decision making if the strategic context transitions to crisis and armed conflict. Intelligence must be continuously developed to ensure Army and other joint forces are prepared to meet the multitude of scenarios that could possibly drive change and escalate conflict. If the situation does escalate, intelligence support must be able to focus on critical stability and defeat mechanisms for subsequent activities and operations. 4-22. Intelligence products assist the commander in countering actions by adversaries that challenge the security of forward-stationed units and the stability of a nation or region and are contrary to U.S. interests. Intelligence provides the commander and staff with the ability to— ⚫ Detect indicators of imminent threat activities and understand enemy intentions. ⚫ Track enemy activities and capabilities across the domains and dimensions. ⚫ Understand how the threat is attempting to gain and/or maintain positions of relative advantage. ⚫ Make informed decisions and realistic assessments of operational and tactical risks. ⚫ Support targeting. ⚫ Support information advantage activities. 4-23. Support to contingency plan development, which is treated as a branch to the campaign plan, is a vital activity during competition. Different situations within an AOR can cause a branch to the campaign plan, including regional instability, armed aggression, natural or man-made disasters, or humanitarian crises. Intelligence assists in identifying these potential situations and participates in developing plans to mitigate these scenarios. 4-24. Intelligence databases also have an important role in setting the theater from an intelligence perspective. Managing and creating unclassified and classified databases provide interoperable and collaborative environments for Army and joint forces, national agencies, and multinational organizations. Databases facilitate intelligence analysis, reporting, production, dissemination, sustainment, and intelligence reach. Within each theater, the development and validation of databases generally occur in a top-down manner, with significant support from regionally aligned forces and special operations forces. This allows units to maintain, populate, and continually update a thorough and accurate set of databases during subsequent Army strategic contexts. However, there may be instances when regionally aligned forces must develop and populate an authoritative database of threat signatures and associated contextual information, in conjunction with joint forces and the DIA. This is particularly true when an area quickly transitions from competition to crisis. In some scenarios, each echelon below theater army must prepare to establish localized intelligence databases during any strategic context. Unit SOPs should outline the requirements for managing, formatting and standardization, indexing and correlation, normalization, storage, security protocols, and associated applications. Note. It is critical for commands to update intelligence databases continually with actual and potential threat information to maximize the value of intelligence products and reports.
2-0
113
Army Strategic Contexts and Intelligence Two Key Aspects of Building Databases and Intelligence to Support Crisis and Armed Conflict Intelligence enterprise units and organizations should carefully use a federated analytical approach in developing and maintaining authoritative databases of threat indicators and key capability signatures and associated contextual information across all the domains and dimensions. Army intelligence units and organizations, in coordination with the intelligence enterprise, should use a federated analytical approach in analyzing threat systems similarly to joint TSA. Note. Army analysis of threat systems is not conducted to joint standards and is not captured in the same format as joint TSA and target development. When working as part of or to support the joint force, Army forces perform joint TSA and conduct target development to joint standards. SECTION III – CRISIS 4-25. Crisis is an emerging incident or situation involving a possible threat to the United States, its citizens, military forces, or vital interests that develops rapidly and creates a condition of such diplomatic, economic, or military importance that commitment of military forces and resources is contemplated to achieve national and/or strategic objectives (JP 3-0). During crisis, armed conflict has not yet occurred, but it is either imminent or a distinct possibility that requires a rapid response by forces prepared to fight if deterrence fails. A crisis can be long in duration, but it can also reflect a near-simultaneous transition to armed conflict. Leaders do not assume that a crisis provides additional time for a transition to armed conflict. Crisis is different from crisis response, which can result from a natural or human disaster. ADVERSARY METHODS 4-26. When conducting activities in an OE, peer threats seek to gain or maintain advantages against opponents. As a crisis develops, a peer threat uses information warfare and preclusion to shape the situation. This may include the adversary escalating or de-escalating its activities based on an assessment of the situation, which includes a calculation of the risk. During crisis, adversary methods include but are not limited to— ⚫ Shaping a crisis. ⚫ Controlling escalation. ⚫ Mitigating U.S. deterrence. ADVERSARY ACTIVITIES TO SHAPE A CRISIS 4-27. Peer threats shape a crisis to their benefit by seeking to exploit real or perceived advantages, which can be local, regional, and/or global. Peer threats use information warfare and preclusion to gain an information advantage against U.S. messaging and further isolate U.S forces and capabilities from allies. 4-28. Units and organizations, at and across echelons, conduct continuous information collection (including ISR within the joint force) to gain situational understanding of threat activities, capabilities, intent, and COAs. Threat forces seek to employ capabilities and conduct operations faster than friendly forces can act to gain and maintain a position of relative advantage. Threat forces can gain this advantage by finding a window of opportunity where friendly forces are either denied or delayed by specific circumstances from using the dynamics of combat power (leadership, firepower, information, mobility, survivability).
2-0
114
Chapter 4 ADVERSARY ACTIVITIES TO CONTROL ESCALATION 4-29. Peer threats may attempt to control the escalation of a crisis to avoid armed conflict with the United States by initiating actions to prevent or counter a U.S. response. These actions may focus on the United States and its allies by using the instruments of national power. These actions may include creating conditions on the ground designed to make U.S. military responses either too expensive to employ or too late to affect the political situation. A peer threat may also— ⚫ Accelerate its operational timeline. ⚫ Employ information warfare. ⚫ Increase support to proxy forces. ⚫ Increase the number of forward deployed units in the region. ⚫ Initiate crisis in other theaters to distract U.S. forces and diffuse U.S. response in the area of greatest interest. Note. In extreme situations to control escalation, an adversary may conduct a limited attack in response to U.S. reactions to the activities that precipitated the original crisis. ADVERSARY ACTIVITIES TO MITIGATE U.S. DETERRENCE 4-30. As an adversary plans for operations during crisis, there are several key actions the adversary considers to mitigate U.S. deterrence efforts and ensure U.S. operations do not significantly interfere with adversary interests. These actions may include— ⚫ Conducting limited attacks to expose friendly force vulnerabilities. These attacks may also degrade the deterrence value of deployed forces and destroy credibility among current and potential partners. ⚫ Disrupting or delaying the deployment of Army and joint forces through cyberspace attacks and denial of space capabilities. ⚫ Exploiting gaps in national interests among the United States, partner nations, and potential partners by attacking weaker countries whom the United States has no treaty obligations to defend. ⚫ Conducting deception operations to conceal real intent. ⚫ Increasing the use of proxy forces to coopt, coerce, or influence the local population, organizations, and governments within a crisis region. ⚫ Creating multiple dilemmas for the United States by attacking or threatening the use of force against potential partner nations in regions outside of the crisis region. ⚫ Impacting the will of the public through information warfare, including cyberspace attacks. ⚫ Threatening the use of nuclear weapons to prevent intervention by the United States, allies, and partners. OPERATIONAL ASPECTS 4-31. A crisis can result from one or a multitude of events/actions such as adversary actions/indicators of an imminent action or natural or human disasters. Examples of events/actions that can lead to a crisis include but are not limited to— ⚫ Aggressive behavior by an adversary to coerce and intimidate an opponent with the threat of force. ⚫ The presence of indicators foreshadowing a military coup or change of political power. ⚫ Increased dissemination of disinformation or misinformation targeted toward a country’s population and the international community. ⚫ Disease outbreak. ⚫ Build-up of military forces at an international border. ⚫ Failed elections. ⚫ Famine.
2-0
115
Army Strategic Contexts and Intelligence 4-32. Although an opponent has not yet used lethal force as its primary means of achieving objectives, crisis can escalate to armed conflict. Combat power derived from the intelligence warfighting function, in conjunction with the other warfighting functions, is critical in providing credible lethal capabilities to assist in deterring further provocation and compelling an adversary to cease aggressive action. 4-33. Some peer threats view conflict as a continuous condition in which sharpened or reduced periods of violence occur and recur. Additionally, adversaries may perceive themselves in a different context or state of conflict than U.S., allied, and partnered forces—what is viewed by one side as crisis might be perceived by the other side as armed conflict or competition. 4-34. Changing the intensity of its actions, even when that intensity reduces tension, does not end an adversary’s campaign to oppose U.S. interests. Intelligence professionals must continuously assess the OE and demonstrate flexibility in determining adversary actions, the changes they cause, and how information and intelligence can be used to de-escalate the situation or further prepare U.S. and allied partners for armed conflict. Regardless of the capabilities employed, there are generally two broad outcomes from a crisis: ⚫ Deterrence is maintained and de-escalation occurs. ⚫ Armed conflict begins. CONSOLIDATING GAINS 4-35. During and after a crisis response, Army forces consolidate gains to deny adversary forces the means to extend the crisis or create a similar crisis in the future. This often entails maintaining an enhanced force posture in a joint operations area for a time to demonstrate U.S. willingness to defend allies and partners. Continuous intelligence operations to support U.S. forces, allies, and partners are essential during any crisis. Commanders must emphasize information collection before and during the transition from competition to crisis to maintain a detailed understanding of the threat and continuously assess the situation, positioning their forces to retain the initiative. 4-36. During these transitions, threat forces attempt to exploit perceived vulnerabilities by conducting lethal and nonlethal activities against U.S. forces, allies, and partners. The threat’s use of disinformation and misinformation can be used to shape threat narratives to justify ongoing or pending actions, including the use of force. Commanders and staffs should focus on potential threat and friendly strengths, vulnerabilities, and advantages across the domains and dimensions. Continuous information collection and intelligence analysis are critical in ensuring flexible deterrent and/or flexible response options. FIGHTING FOR INTELLIGENCE 4-37. Operations during crisis place increasing demands on the intelligence warfighting function. The intelligence staff increases its knowledge of the threat and the specific OE, focuses the commander and staff with relevant information and intelligence, and expands various intelligence capabilities as part of the intelligence architecture. With the shift from competition to crisis, the theater army shifts to refining contingency plans and preparing estimates for the phased increase of ground forces and capabilities. During crisis, intelligence operations focus on the following: ⚫ Support theater openings in terms of finding and exploiting advantages. ⚫ Gain and maintain situational understanding of threat intent and COAs, activities, and the nature of those activities and effects across the theater. ⚫ Provide support to noncombatant evacuation operations, when needed. ⚫ Provide support to targeting and prepare for targeting during armed conflict. ⚫ Provide support to force projection and prepare for the possibility of a contested deployment. ⚫ Provide support to information advantage activities, as appropriate. ⚫ Provide support to protection activities. ⚫ Provide focused analysis of the domains and human, information, and physical dimensions, then properly focus that into analysis of the operational variables. ⚫ Provide support to identify and implement flexible deterrent and response options and follow-on activities and operations.
2-0
116
Chapter 4 ⚫ Significantly modify the intelligence architecture to prepare for the possibility of armed conflict. ⚫ Set conditions to reset theater intelligence and the intelligence architecture. 4-38. The intelligence staff must understand threat intent and COAs as well as ongoing activities in terms of the threat’s perspective, which often includes an extended time window. Leveraging the intelligence enterprise, including allies and partners, assists in understanding the threat’s perspective. This situational understanding is essential in gaining and maintaining advantages against the threat’s use of the five broad peer threat methods—information warfare, systems warfare, preclusion, isolation, and sanctuary (see paragraph 2-21). 4-39. Truly understanding the OE across the domains and dimensions, including important interrelationships, significantly increases the likelihood that commanders and staffs can accurately predict when, where, and how the threat will conduct actions. When commanders and staffs can predict threat actions, friendly force capabilities can be used to quickly gain positions of relative advantage. However, intelligence is rarely perfect. When commanders and staffs have a lower level of situational understanding, it is important to develop and rely on detailed indicators of possible threat intent and COAs and continually track those indicators. SECTION IV – ARMED CONFLICT 4-40. Armed conflict encompasses the conditions of a strategic relationship in which opponents use lethal force as the primary means for achieving objectives and imposing their will on the other. The employment of lethal force is the defining characteristic of armed conflict, and it is the primary function of the Army. Entering and terminating armed conflict are political decisions. Army forces may enter conflict with some advanced warning during a prolonged crisis or with little warning during competition. How well Army forces are prepared to enter an armed conflict ultimately depends on decisions and preparations made during competition and crisis. Army forces provide landpower to the joint force and conduct limited contingency or large-scale combat operations to ensure enduring political outcomes favorable to U.S. interests. Note. Large-scale combat operations are the focus of Army readiness and reflect the most intense and destructive form of armed conflict. Therefore, the rest of this section will focus on large-scale combat operations. WARFARE 4-41. The object of war is to impose a nation or group’s will on its enemy in pursuit of policy objectives. Regardless of the specific objectives, the decision to wage war represents a major policy decision and changes how Army forces use military capabilities. The nature of war, its principles, and its elements remain consistent over time. However, warfare, the conduct and characteristics of war, reflects changing means and contexts. The Army’s multidomain operations concept accounts for the constant nature of war and the changing character of warfare. Its balanced approach guides how Army forces operate across the competition continuum given the prevailing characteristics of anticipated OEs now and in the near future. 4-42. There are several important aspects of warfare discussed in FM 3-0. These aspects include the methods of warfare. There are many different methods of warfare, depending on the situation and actors, but they generally fall into two broad categories: ⚫ Conventional warfare is a violent struggle for domination between nation-states or coalitions of nation-states (FM 3-0). Conventional warfare is generally executed by two or more military forces through armed conflict. It is commonly known as conventional warfare because it means to fight enemy forces directly, with comparable military systems and organizations. ⚫ Irregular warfare is the overt, clandestine, and covert employment of military and nonmilitary capabilities across multiple domains by state and non-state actors through methods other than military domination of an adversary, either as the primary approach or in concert with conventional warfare (FM 3-0). Irregular warfare may include the use of indirect military activities to enable partners, proxies, or surrogates to achieve shared or complementary objectives.
2-0
117
Army Strategic Contexts and Intelligence 4-43. Offensive, defensive, and stability operations are inherent elements of conventional and irregular warfare. Divisions and higher echelons typically perform some combination of all three elements in their operations simultaneously. However, the lower the echelon, the more likely it is for that formation to be focused on one element at a time. The three types of operations differ: ⚫ An offensive operation is an operation to defeat or destroy enemy forces and gain control of terrain, resources, and population centers (ADP 3-0). Offensive operations are how commanders impose their will on an enemy. The offense is the most direct means of seizing, retaining, and exploiting the initiative to gain a physical and psychological advantage. Offensive operations typically include a sudden action directed toward enemy vulnerabilities, capitalizing on speed, surprise, and shock. ⚫ A defensive operation is an operation to defeat an enemy attack, gain time, economize forces, and develop conditions favorable for offensive or stability operations (ADP 3-0). Typically, the defense cannot achieve a decisive victory. However, it sets conditions for a counteroffensive or a counterattack that enables forces to regain the initiative. Defensive operations are a counter to an enemy offensive action, and they seek to destroy as many of the enemy forces as possible. Defensive operations preserve control over land, resources, and populations, and they protect lines of communications and critical capabilities against attack. Commanders can conduct defensive operations in one area to free forces for offensive operations elsewhere. ⚫ A stability operation is an operation conducted outside the United States in coordination with other instruments of national power to establish or maintain a secure environment and provide essential governmental services, emergency infrastructure reconstruction, and humanitarian relief (ADP 3-0). These operations support governance by a host nation, an interim government, or a military government. Stability involves coercive and constructive action. Note. Offensive, defensive, and stability operations are important doctrinal constructs across many of the Army intelligence doctrinal publications. LARGE-SCALE COMBAT OPERATIONS 4-44. Large-scale combat on land occurs within the framework of a larger joint campaign, usually with an Army headquarters forming the base of a joint force headquarters. These operations typically entail high tempo, high resource consumption, and high casualty rates. Large-scale combat introduces levels of complexity, lethality, ambiguity, and speed to military activities not common in other operations. 4-45. During large-scale combat operations, Army forces should expect deployments to be contested by enemy actions in all domains. In a contested deployment, the first challenge during large-scale combat operations is defeating a network of sophisticated A2 and AD systems. Enemy forces will attempt to deny U.S. and multinational forces access to the AO by contesting U.S. and multinational forces in each of the domains and dimensions of the OE. The joint force may even have to fight for intelligence to identify threat locations, strengths, and vulnerabilities to gain an initial lodgment. 4-46. Once joint and Army forces achieve an initial lodgment, they must be prepared to immediately conduct tactical operations. As a lodgment is formed, the threat will likely employ a variety of new capabilities to deny friendly forces freedom of maneuver. Friendly forces must be prepared to operate quickly across each domain and dimension. These multidomain efforts must entail joint synchronization, Service interdependencies, and the cross-domain convergence of capabilities at a time and place to create an operational advantage. Army forces must account for constant enemy observation, including the threat from cyberspace, space-based, and unmanned systems that saturate the OE. Army forces take measures to defeat the enemy’s ability to effectively mass effects while creating exploitable advantages to mass effects against enemy capabilities and formations.
2-0
118
Chapter 4 4-47. The challenge for and requirements on the intelligence warfighting function from deployment to initial lodgment and subsequent operations are substantial. Developing effective collection management plans and tasking collection assets (in depth and with redundancy) are essential. Intelligence support identifies windows of opportunity to counter the threat’s capabilities and enable the joint force to maintain freedom of action and gain positions of relative advantage. (The advantage can be a human, information, or physical advantage.) (See appendix C for intelligence support to force projection operations.) ADVERSARY METHODS 4-48. Although peer threats mainly seek to obtain their strategic objectives during competition, they will engage in armed conflict if they view the rewards are worth the risk. During armed conflict, peer threats employ combinations of threat methods to render U.S. military power irrelevant whenever possible and inflict unacceptable losses on the United States, its allies, and its partners. Peer threats use diplomatic, economic, informational, and military means to facilitate meeting their objectives. CHINA 4-49. China considers three aspects in the country’s view of conflict: ⚫ Comprehensive national power comprises hard power (military capability and capacity, defense industry capability, intelligence capability, and related diplomatic actions such as threats and coercion) and soft power (economic power, diplomatic efforts, foreign development, global image, and international prestige). Ultimately, all forms of conflict must enhance China’s comprehensive national power. ⚫ Deception is essential to China’s tactics to achieve desired perceptions by its opponents. These perceptions are ultimately exploited to further China’s objectives. Central to deception is having opponents make decisions not based on what is occurring in an OE. When doing so, opponents are faced with making decisions and conducting actions regarding situations or circumstances in which China has already set the conditions to have an advantage. ⚫ The Three Warfares are designed to unbalance, deceive, and coerce opponents to influence their perceptions in ways that create advantage. The Three Warfares are universally nonlethal, do not involve direct combat operations, and are designed to support and reinforce the traditional military operations of the People’s Liberation Army. The Three Warfares are— ▪ Public opinion warfare—China’s high-level information campaign designed to set the terms of political discussion. ▪ Psychological warfare—the deliberate manipulation of psychological reactions in targeted audiences designed to create and reinforce attitudes and behaviors favorable to China’s objectives and guide adversary behavior toward China’s preferred outcomes. ▪ Legal warfare—the setting of legal conditions to unbalance potential opponents by exploiting international or domestic law in order to hinder their military operations, create legal justification for People’s Liberation Army operations worldwide, and support Chinese interests through a valid framework. 4-50. During armed conflict, China employs systems warfare in combination with the other threat methods, such as preclusion, isolation, and sanctuary. China employs these threat methods throughout the domains and at all levels of warfare. Systems warfare involves— ⚫ Bypassing enemy systems’ areas of strength, gaining a combat advantage by approaching them asymmetrically. ⚫ Developing systems that excel at exploiting perceived vulnerabilities in enemy systems, thereby offsetting their strengths by undermining their systems’ ability to perform assigned missions. ⚫ Undermining international alliances through diplomatic efforts. ⚫ Conducting cyberspace attacks to disable air or seaports. ⚫ Using special operations forces to undermine civilian morale through covert operations.
2-0
119
Army Strategic Contexts and Intelligence 4-51. At the tactical level, systems warfare centers largely on targeting high-value battlefield systems such as radars, command and communications nodes, field artillery and air defense systems, and critical logistics support means. (For Chinese tactics, see ATP 7-100.3 and FM 3-0.) RUSSIA 4-52. Russian forces seek to shape the OE to gain and maintain relative advantages across the domains and dimensions. Russia seeks to do this by synchronizing capabilities and their effects simultaneously to overwhelm U.S. and allied force capabilities and capacity and weaken the United States’ national will to continue a conflict. (For Russian tactics, see FM 3-0.) 4-53. Russian goals are centered on creating constraints that prevent success of the United States’ campaign by using methods that focus on four key areas: ⚫ Disrupt or prevent understanding of the OE. Russian information warfare activities manipulate the acquisition, transmission, and presentation of information in a manner suitable to Russia’s preferred outcomes. ⚫ Target stability. Russia may foster instability in key areas and among key groups so regional security conditions do not support U.S. operational requirements. ⚫ Disaggregate partnerships. Russia acts upon U.S. allies and partners to reduce the United States’ ability to operate in its preferred combined, joint, and interagency manner. ⚫ Prevent access. Russia employs preconflict activities to deny access to U.S. forces, using nonlethal means initially and transitioning to lethal means if necessary. Russia seeks to undermine relationships, raise political stakes, manipulate public opinion, and attack resolve to constrain or deny basing rights, overflight corridors, logistics support, and concerted allied action. 4-54. Similar to U.S. forces, Russian forces operate combined arms forces to exploit the effects of both precision strikes and massed fires. Russian forces also— ⚫ Employ all available national elements of power both before employing conventional warfare and maneuver forces and after employing conventional warfare. ⚫ Employ deep maneuver against lesser opponents, when possible, to defeat an enemy’s will to resist early in a conflict. ⚫ Mass capabilities in pursuit of more limited objectives while fixing their adversary along a broad front. ⚫ Employ denial and deception to mask the true intent of operations. ⚫ Use the effects of strike actions to create the condition for military success. ⚫ Apply intelligence methods and decision making that are scientifically based to— ▪ Understand the conditions of an OE that will impact operations. ▪ Determine the tactical functions required and calculate the required allocation of combat power needed to accomplish a mission in a specific time and location. ▪ Understand the psychological and cognitive issues among competing friendly forces, aggressor forces, the local population, and other actors in an OE. CONSOLIDATING GAINS 4-55. During armed conflict, Army forces deliberately plan to consolidate gains throughout an operation. This is part of defeating the enemy in detail to accomplish overall policy and strategic objectives. From a small unit perspective, consolidating gains can be actions on the objective and preparing for enemy counterattacks, while from a theater army perspective, it can be incorporating partner-nation forces into ongoing operations. From the intelligence perspective, intelligence support to consolidating gains often focuses on situational understanding, warning intelligence, support to force protection, identity activities, and cultural understanding; it also assists in determining termination criteria or when it is operationally acceptable to transition from large-scale combat operations to post-conflict competition.
2-0
120
Chapter 4 4-56. Consolidating gains initially focuses on the exploitation of tactical success to ensure enemy forces cannot reconstitute any form of resistance in areas where they were initially defeated, or that enemy forces have not successfully conducted a deception operation to create a friendly force vulnerability or achieve a position of relative advantage. While the deep and close areas of the operational framework are important, the rear area has a special importance during consolidating gains due to bypassed, stay-behind, or infiltrated enemy forces; airborne, air assault, or special operations forces; terrorist cells; guerilla, partisan, or insurgent forces; the use of chemical weapons; or an effective combination of these forces and capabilities can significantly degrade friendly force operations. The impact of these types of threat operations can create crippling logistics, C2, civil population, and worldwide and U.S. public opinion issues. 4-57. Army forces must continuously consolidate gains to make temporary gains enduring. Like many activities, success is far more likely when the intelligence effort is carefully integrated and synchronized with operations. Typical operational functions and their reporting intelligence requirements include— ⚫ Locating bypassed enemy forces, bypassed or abandoned munitions and weapons, and stay- behind special purpose and proxy forces. ⚫ Populace and resource control measures. ⚫ Reestablishing law and order. ⚫ Providing humanitarian assistance. ⚫ Restoring key infrastructure. 4-58. When consolidating gains during armed conflict, the role of intelligence is vital in assessing relevant aspects of the OE, including but not limited to— ⚫ Detecting both positive and negative trends. ⚫ Discrediting disinformation and misinformation. ⚫ Determining the effectiveness of friendly operations. ⚫ Identifying actions that could threaten hard-won gains. ⚫ Assisting with the difficult transitions between offensive, defensive, and stability operations and the transition to post-conflict competition. TRANSITIONS BETWEEN OFFENSIVE, DEFENSIVE, AND STABILITY OPERATIONS 4-59. A main goal of defensive operations is defeating the enemy’s attacks and transition, or threaten to transition, to the offense. Units must deliberately plan for transitions to identify and establish the necessary friendly and enemy conditions for a successful transition. As friendly forces meet their defensive objectives, forces consolidate and reorganize for offensive operations or prepare to facilitate forward passages of lines for fresh formations. Units should do everything possible to prevent enemy forces from reinforcing their forward echelons, consolidating, or reorganizing while friendly forces prepare for follow-on operations. 4-60. Intelligence is critical to supporting the commander and staff as they— ⚫ Assess when they have enough combat power to maintain pressure on the enemy. ⚫ Identify opportunities to complete the defeat of enemy formations in order to reduce the risk of future casualties fighting the same enemy formations after recovery. ⚫ Assess the effects of battle on enemy forces relative to their own unit. 4-61. When offensive operations culminate before enemy forces are defeated, friendly forces rapidly transition to the defense. Commanders may deliberately transition to the defense when enemy forces are incapable of fully exploiting an opportunity, or when they believe they can build combat power to resume the offense before enemy forces can react effectively. Depending on where culmination occurs, friendly forces may have to reposition forces on defensible terrain and develop a form of defense and scheme of maneuver based on an assessment of the mission variables (METT-TC [I]). 4-62. Successful offensive operations end because Army forces have achieved their assigned objectives. A successful offense can also require a transition to a defensive posture dominated by stability operations and a strategic environment moving toward post-conflict political goals. These operations have the goal of transitioning responsibility for security and governance to legitimate authorities other than U.S. forces.
2-0
121
Army Strategic Contexts and Intelligence 4-63. As a transition to stability operations occurs, leaders focus on stability operations tasks and information advantage activities to inform and influence populations and conduct security force assistance. Effective collaboration with diplomatic and humanitarian organizations enhances the ability to achieve stability mechanisms. Army forces play a key role in enabling the joint force to establish and conduct military governance until a civilian authority or government is given control of its assigned areas. TRANSITION TO POST-CONFLICT COMPETITION 4-64. Army forces conclude armed conflict by establishing conditions favorable to the United States; they consolidate gains and prosecute operations with this desired end state. As hostilities end, stability operations tasks dominate operations with the purpose of transitioning responsibilities to legitimate authorities in a secure environment. Army forces provide the joint force with the option of establishing a military transitional government before transitioning full governing responsibility to host-nation or other provisional governments. 4-65. Standards for transitioning governance responsibility depend on the credibility, capability, and capacity of the governing organization to maintain the favorable conditions established during armed conflict. Strategic leaders determine the broad conditions for transition at the outset of operations and refine them based on how the situation changes. Army forces play a key role in understanding the host-nation culture, understanding critical infrastructure, assisting strategic leaders in developing realistic transition goals and timings, and determining the duration and scale of U.S. commitments required to maintain stability. 4-66. In some situations, operations may rapidly transition from large-scale combat operations to stability operations with the requirement to maintain continuous security while grappling with a new and very different set of challenges. Army units and organizations may modify their task organizations and priorities to meet additional tasks associated with stability operations. Some of the typical tasks associated with stability operations include the following: establish civil security, establish civil control, restore essential services, support to governance, support economic and infrastructure development, and conduct security cooperation. 4-67. This transition is very complex and difficult for the intelligence warfighting function. Intelligence must support all six tasks; it must often support combatting terrorism, arms control, counterinsurgency, counterdrug operations, and foreign internal defense in a larger context. Essential to intelligence support during the transition to the enable civil authority phase of operations is determining how intelligence units can support enabling the sustainability of civil authority. During these operations, intelligence staffs and units have a different focus, organize in a different manner, and perform unique tasks: ⚫ Many unique aspects of the OE—such as sociocultural factors, regional and local politics, and financial intelligence—become important. ⚫ For special operations forces, integration and interoperability with conventional forces become critical. (See FM 6-05.) ⚫ Fusion centers and other unique analytical centers are formed. ⚫ Certain aspects of operations—such as counter-improvised explosive devices, counterterrorism, and screening local hires—become more important. FIGHTING FOR INTELLIGENCE 4-68. Of all the Army strategic contexts, armed conflict creates the greatest challenge for the intelligence warfighting function, and large-scale combat operations against a peer threat is the most challenging form of armed conflict. The demands of large-scale combat operations consume all staff elements to provide the necessary support in the level of detail and at the tempo—the relative speed and rhythm of military operations over time with respect to the enemy (ADP 3-0)—these types of operations require. During large-scale combat, intelligence support is continually conducted to provide commanders and staffs the detailed knowledge of threat strengths, vulnerabilities, organizations, equipment, capabilities, and tactics to plan for and execute operations during unified action. An intense focus on the critical elements of intelligence support—such as supporting the commander and staff’s understanding, visualization, and ability to direct operations as well as assisting to drive the unit’s battle rhythm—is required. Chapter 8 details the roles and techniques associated with fighting for intelligence during large-scale combat operations.
2-0
123
PART TWO Major Intelligence Activities The doctrinal concepts in part I—intelligence and operational fundamentals—are important to fully understand the content in part II, which discusses major intelligence activities—intelligence staff support (chapter 5) and intelligence operations (chapter 6). Chapters 5 and 6 further set the foundation to understand the specifics of fighting for intelligence, which is discussed in detail in part III. Chapter 5 Intelligence Staff Support SECTION I – OVERVIEW 5-1. Staffs support commanders in making and implementing decisions and in integrating and synchronizing combat power. Competent staffs multiply a unit’s effectiveness. They provide timely and relevant information and analysis, make estimates and recommendations, prepare plans and orders, assist in controlling operations, and assess the progress of operations for the commander. A staff primarily— ⚫ Supports the commander. ⚫ Assists subordinate commanders, staffs, and units. ⚫ Informs units and organizations outside the headquarters. 5-2. Effective intelligence support is multifaceted, and the G-2/S-2 and intelligence staff are ultimately responsible for providing intelligence support to the commander and staff. The complexities of collecting against and conducting analysis on a determined and adaptive, threat that is technologically capable across all domains, creates challenges for the G-2/S-2 and intelligence staff. Other complexities that can challenge the intelligence staff include but are not limited to— ⚫ A multitude of factors within the OE (across the human, information, and physical dimensions). ⚫ Sophisticated intelligence capabilities. ⚫ The intelligence architecture. ⚫ Time constraints during the execution of the intelligence process. ⚫ The many requirements to support multidomain operations. 5-3. This chapter discusses how the intelligence staff provides intelligence support to the commander and staff, including— ⚫ Intelligence staff composition and responsibilities. ⚫ Key IWFTs. ⚫ Situational understanding, the CIP, and the COP.
2-0
124
Chapter 5 5-4. Figure 5-1 shows important aspects of fighting for intelligence from the context of the intelligence process, with emphasis on the commander’s role in driving the intelligence warfighting function and the G-2/S-2’s role in synchronizing intelligence. Figure 5-1. Military intelligence activities SECTION II – INTELLIGENCE STAFF COMPOSITION AND RESPONSIBILITIES 5-5. The first aspect of understanding intelligence staff support is understanding the intelligence staff’s composition and responsibilities, which differ by echelon but are also similar across echelons. The G-2/S-2 organizes its staff, provides focus, assigns tasks, and synchronizes the entire intelligence effort. However, the discussions about staff responsibilities interrelate with preceding discussions about staff teamwork, the operations process, integrating processes, and leveraging intelligence and collaborating with higher, subordinate, and adjacent units and organizations.
2-0
125
Intelligence Staff Support INTELLIGENCE STAFF COMPOSITION 5-6. The composition of the intelligence staff differs significantly across echelons—from theater army to BCT levels. The G-2/S-2 organizes its staff, to include the supporting intelligence analytical element, to meet the various requirements resulting from the conduct of operations. The higher the echelon, the more personnel within the intelligence staff and the more sophisticated the structure. Generally, certain functions are common across echelons and drive the organization of the intelligence staff. Forming permanent instead of ad hoc teams or sections is preferable because of the skills and proficiency necessary to perform those functions. Although there are intelligence staff elements in other CP cells, most of the intelligence staff sections reside in the main CP intelligence cell. Additional staff integration occurs through cross-functional working groups such as the information collection, protection, and targeting working groups. 5-7. The intelligence functional cell commonly includes the following: ⚫ The G-2X/S-2X. ⚫ Collection management. ⚫ Targeting. ⚫ The ACE or BISE (at the BCT level [see ATP 2-19.4]). ⚫ IEW maintenance and intelligence sustainment. ⚫ Intelligence communications. ⚫ The USAF SWO or staff weather team, when augmented. Notes. Higher headquarters may augment the intelligence cell with additional capabilities to meet mission requirements. This chapter discusses the intelligence staff, to include the supporting intelligence analytical element as a critical element of the intelligence staff. Intelligence analytical elements are either attached, under OPCON, DS, or in another support relationship to the headquarters and headquarters company or other headquarters that includes the staff at that echelon. For example, at the division level, the division ACE is controlled by the division G-2. INTELLIGENCE STAFF RESPONSIBILITIES 5-8. Staff members have specific duties and responsibilities associated with their area of expertise. They must be ready to advise the commander and other senior leaders about issues pertaining to their area of expertise without advanced notice. However, regardless of their career field or duty billet, all staff sections share a common set of duties and responsibilities, to include— ⚫ Managing information within their area of expertise. ⚫ Building and maintaining running estimates. ⚫ Conducting staff research. ⚫ Analyzing problems. ⚫ Performing IPOE. ⚫ Developing information requirements. ⚫ Advising and informing the commander. ⚫ Providing recommendations. ⚫ Preparing plans, orders, and other staff writing, including recommendations on Annex A (Task Organization). ⚫ Exercising staff supervision. ⚫ Performing risk management. ⚫ Assessing operations. ⚫ Conducting staff inspections and assistance visits. ⚫ Performing staff administrative procedures.
2-0
126
Chapter 5 5-9. The intelligence staff is primarily responsible for providing the commander and staff with intelligence on the threat, terrain, weather and weather effects, civil considerations, and other significant aspects of the OE. Other intelligence staff responsibilities include but are not limited to— ⚫ Enabling an effective intelligence process: ▪ Plan, establish, and revise an intelligence architecture in close collaboration with the G-6/S-6 and other staff members. ▪ Leverage data, information, and intelligence to provide the best intelligence support possible. ▪ Lead collection management, which drives information collection. Develop a draft of Annex L (Information Collection) of the order to assist the G-3/S-3. ▪ Ensure ongoing information collection—collecting the information needed for anticipated decisions and intelligence requirements. ▪ Use knowledge management techniques to optimize intelligence support. ▪ Answer requests for information (RFIs) from higher, subordinate, and adjacent units. ▪ Disseminate intelligence to higher, subordinate, and adjacent units and organizations. ⚫ Determining and requesting foreign disclosure office/representative support to facilitate collaboration with unified action partners and allies. ⚫ Facilitating an understanding of the OE, with the greatest emphasis on the threat, terrain, weather and weather effects, civil considerations, and other significant aspects of the OE: ▪ Conduct pre-mission analysis of the OE, including analysis of threat capabilities and the population (especially information dimension effects) across the domains and dimensions. ▪ Lead IPOE and produce the various IPOE products. ▪ Analyze and evaluate civil considerations in close collaboration with the G-9/S-9. ▪ Facilitate the USAF SWO or staff weather team in effectively providing forecasts and weather effects on friendly and enemy capabilities. Note. Commanders, supported by their staffs, must develop and maintain the best possible understanding of their OE, including the domains, dimensions, and the operational and mission variables. (See paragraph 2-31 for means to understanding the OE.) Figures 2-5 and 2-6 on pages 2-18 and 2-20, respectively, illustrate the inclusion of the domains, dimensions, and the operational and mission variables into staff activities and analysis, specifically the intelligence staff’s responsibility to provide the commander and staff with intelligence on the threat, terrain, weather and weather effects, civil considerations, and other significant aspects of the OE. ⚫ Supporting all forms of planning and assessments, to include targeting and the other integrating processes: ▪ Write Annex B (Intelligence) of the order. ▪ Provide intelligence support to targeting (through lethal and nonlethal means). ▪ Provide intelligence support to CA units executing operations with unified action partners and regional and local populations and institutions. ▪ Provide intelligence support to psychological operations, operations security (OPSEC), military deception, and other information advantage activities. ▪ Provide intelligence support to risk management. ▪ Provide intelligence support to knowledge management. ⚫ Supporting the conduct of operations and the commander’s decisions: ▪ Answer intelligence requirements and provide advice. ▪ Perform situation development, maintain the intelligence running estimate, and develop the CIP and the intelligence portion of the COP. ▪ Provide support to protection and sustainment (including specific requirements in the rear area). ▪ Provide support to combat assessment.
2-0
127
Intelligence Staff Support ⚫ Supporting security programs, to include the following: ▪ Supervise command and personnel security programs. ▪ Evaluate physical security vulnerabilities to support staff sections, particularly the operations and signal staffs. ▪ Perform staff planning and supervise the special security office, when applicable. The G-2/S-2 The G-2/S-2 leads the intelligence staff and has responsibility for what the intelligence staff does and does not accomplish. The G-2/S-2 is the primary advisor to the commander and staff on the intelligence warfighting function. Additionally, the G-2/S-2 has staff responsibility for the USAF SWO. Successful intelligence support is based on the successful execution of the intelligence process, which the G-2/S-2 enables through intelligence synchronization. However, the G-2/S-2, as one person, must depend on its staff to provide effective intelligence support to the unit and facilitate situational understanding and effective targeting. The G-2/S-2 is not responsible for the conduct of intelligence operations by the MI unit beyond conducting collection management. (See ATP 2-01.) The MI unit commander is responsible for the conduct of intelligence operations by the MI unit. Chapter 3 discusses the roles of the G-3/S-3, G-2/S-2, collection manager/collection management team, and MI unit commander/MI unit related to intelligence operations. Notes. Due to the nature and fluidity of large-scale combat operations, commanders will have to make decisions with imperfect intelligence. Intelligence that is too late for commanders to make timely decisions results in a loss of the initiative and lost battles and engagements. As much as possible, the intelligence staff depends on thorough and disciplined all-source analysis. All-source analysis reduces the possibility of error, bias, deception, disinformation, and misinformation by considering multiple sources of information and intelligence. However, when necessary, the commander and staff may have to depend on either single-source intelligence or combat information without all-source intelligence analysis or verification. The cyberspace domain and the information dimension require specialized expertise from outside the traditional military staff, such as industry and academia. Intelligence support to the cyberspace domain and the information dimension often requires specific authorities, moves at a high tempo, and requires close coordination with higher-level friendly military cyberspace activities and sometimes with nonmilitary cyberspace activities. SECTION III – KEY INTELLIGENCE WARFIGHTING FUNCTION TASKS 5-10. Chapter 1 describes how the intelligence warfighting function supports operations through a broad range of doctrinal tasks referred to as IWFTs. The intelligence staff is responsible for some of those tasks, MI units are responsible for other tasks, and both the intelligence staff and MI unit have shared responsibility for some tasks. Figure 5-2 on page 5-6 illustrates key IWFTs from an understanding the OE perspective; this section discusses the most important IWFTs from the intelligence staff’s perspective. Appendix B provides a detailed discussion of the IWFTs.
2-0
128
Chapter 5 Figure 5-2. Key intelligence tasks that support understanding the operational environment PLAN, ESTABLISH, AND REVISE AN INTELLIGENCE ARCHITECTURE 5-11. As discussed in chapter 1, the intelligence architecture has an important role in providing intelligence support. The G-2/S-2 and the intelligence staff plan, establish, and revise the intelligence architecture in close collaboration with higher-level and subordinate G-2/S-2s and the MI unit commander and staff at that echelon. Additionally, the intelligence staff must coordinate with key members of the staff, especially the G-6/S-6 and G-3/S-3. (See chapter 8 for the intelligence architecture during large-scale combat operations.)
2-0
129
Intelligence Staff Support 5-12. The intelligence architecture consists of more than a unit’s organic collection capabilities, systems, and personnel. It also includes all elements of the intelligence network and associated communications architectures (including the PACE communications plan) to enable intelligence operations and support to mission requirements. (See FM 6-02 for doctrine on PACE planning.) PLANNING 5-13. Planning the intelligence architecture is inseparable from long-range planning for future intelligence operations. The intelligence staff can neither perform long-range planning without carefully considering the intelligence architecture nor plan an intelligence architecture without carefully considering long-range planning. The intelligence architecture is connected directly to the types and methods of intelligence support necessary for future operational plans. This planning is roughly equivalent to developing a blueprint for a house that is based on a larger plan to build a housing area in that area. The unit cannot count on using intelligence capabilities during an operation if those capabilities are not accounted for in the intelligence architecture and supported by a larger communications plan. Once the intelligence architecture is in place and the unit is conducting operations, periodic changes are necessary; these changes are called revisions. 5-14. When developing the intelligence architecture, the intelligence staff collaborates with the MI unit staff to consider the personnel, organizations, systems, and procedures necessary for developing intelligence, including those required for intelligence operations. It is critical for the intelligence staff to collaborate with the commander and staff as early as possible and throughout planning to ensure the intelligence architecture is adequately planned and established as soon as possible. 5-15. The G-2/S-2 and intelligence staff also ensure the higher-headquarters linkage to the unit and subordinate unit requirements are adequately integrated into their intelligence architecture to enable effective information collection, PED, and analysis and production to support mission requirements. This ensures the intelligence architecture supports the necessary operational and technical connections between collection assets, control elements, PED capabilities, analytical cells, and various CPs to enable an effective information flow of intelligence to commanders and staffs and access (both inward and outward) across the intelligence enterprise. The intelligence architecture must also account for all complementary capabilities and intelligence-related missions and operations employed by the unit. ARCHITECTURE DETAILS 5-16. The intelligence staff portrays the intelligence architecture in a series of planning products that map the operational and technical aspects of the interoperability between the many components of the architecture. The planning products include but are not limited to the different— ⚫ Intelligence capabilities. Chapter 7 provides a list of organic and supporting general intelligence collection and all-source intelligence capabilities by echelon; each general intelligence collection capability comprises specific collection assets (platforms and collectors) with specific technical collection capabilities and associated PED. The intelligence staff must compile a list of all appropriate general intelligence capabilities that are part of the architecture, which must address bandwidth requirements, preparing for operations, collecting the required information, and the associated PED. The intelligence staff must then assess all applicable general intelligence capabilities to list the specific intelligence capabilities required for the architecture. ⚫ Communications means. Collection assets operate through many different communications means, which include formal message traffic, databases, product libraries, chat rooms, intelligence dissemination systems, and various voice methods. ⚫ Technical networks. Technical networks are those information management and information system connections that enable resource and information sharing. Intelligence architecture products capture not only networks and their technical specifications but also how architecture elements relate and interoperate with each other. Intelligence personnel disseminate and access information and intelligence on several networks, including NIPRNET, SIPRNET, JWICS, coalition networks, and intelligence broadcast systems. ⚫ Tactical considerations. The intelligence architecture should address likely tactical considerations such as mission tasks, technical control means, tipping and cueing, IEW and other maintenance, security measures, and medical support.
2-0
130
Chapter 5 COLLECTION MANAGEMENT Collection management is, in intelligence usage, the process of converting intelligence requirements into collection requirements, establishing priorities, tasking or coordinating with appropriate collection sources or agencies, monitoring results, and retasking, as required (JP 2-0). Collection management includes ensuring information collection, intelligence reach, RFIs, and requests for collection result in adequate information, combat information, and intelligence to support operations. (See ATP 2-01.) Note. In the Army, tasking authority derives from the commander and resides with the G-3/S-3. Within Army operations, neither the collection manager, G-2/S-2, nor intelligence staff members have tasking authority. To retask an asset, the G-2/S-2 must closely collaborate with the G-3/S-3, as well as address information collection issues within the COIC so intelligence is continually ready to support decision making, targeting, and other aspects of operations. It is important for the collection manager, ACE or BISE chief, and the appropriate G-3/S-3 representative to quickly work through information collection issues. Collection management is the primary driver for overall information collection planning, as discussed in paragraph 3-30. The overlap of collection management and information collection planning occurs in the— ⚫ Development of the collection management plan. ⚫ Use of intelligence handover lines and other graphic measures. ⚫ Feasibility and details of employing ground reconnaissance. ⚫ Planning of fires and sustainment to support the information collection effort. The following are inherent in conducting collection management: ⚫ Intelligence reach and RFIs. ⚫ Monitoring available collection assets and assessing their ability to provide the required information. ⚫ Recommending adjustments to new requirements or locations of collection assets, if required. ⚫ Collection orchestration, as part of the operational-level model. COLLECTION MANAGEMENT AND INTELLIGENCE ANALYSIS 5-20. During any phase of military operations, CCIRs are critical to the commander’s decisions and staff control. The intelligence warfighting function focuses on answering intelligence requirements. Both collection management and intelligence analysis are driven by PIRs, targeting intelligence requirements, and other intelligence requirements that subsequently drive the development of specific information requirements (SIRs). SIRs assist in tasking or requesting collection assets to collect information that results in effective intelligence that answers the commander’s requirements. 5-21. Collection management supports the intelligence analysis process and intelligence analysis supports the collection management process and both must account for PED activities. These activities must be synchronized, and analysts within both activities must collaborate closely to enable the intelligence warfighting function. Intelligence analysis sets the stage for collection management, which includes developing information requirements that later result in intelligence requirements that drive effective information collection. This enables intelligence analysts to answer the commander’s intelligence requirements. The intelligence staff conducts collection management in collaboration with the operations staff to collect, process, and analyze information that affects operations. (See ATP 2-33.4 for doctrine on intelligence analysis.)
2-0
131
Intelligence Staff Support COLLECTION MANAGEMENT FUNCTIONS The collection management functions—requirements management, mission management, and execution management—provide a useful way of viewing collection management as a whole. They also provide a potential means of structuring the collection management team and filling positions. These functions divide those processes and tasks associated with collection management to assist the collection management team in collaborating with and synchronizing information collection across the staff, various echelons, and other units and organizations. Army and joint doctrine have their own doctrinal models for the collection management functions. The Army developed its model (except for execution management) based on its tactical-level point of view; the joint force developed an operational-level model. Similar to the intelligence process, each model represents a framework that guides thought; they are not prescriptive. Units can use either the Army or joint model based on whichever is most useful to their needs. (See ATP 2-01.) A Tactical-Level Model Collection management teams consider the commander’s information collection guidance, information requirements (which become intelligence requirements), IPOE outputs, and intelligence analysis in the context of friendly operations in order to develop an effective collection management plan. During collection management, the three functions effectively divide the collection management effort, ensuring its success. (See figure 5-3.) Figure 5-3. Collection management using the Army tactical-level model An Operational-Level Model JP 2-0 describes the distinct functions of collection requirements management (CRM), collection operations management (COM), and collection orchestration in a joint intelligence context and provides some useful and detailed techniques associated with these functions. Units can adapt this joint operational-level model to Army operations with some modifications. For example, units can use this model at higher echelons during inherently joint operations or during operations that require significant interactions with a joint headquarters.
2-0
132
Chapter 5 At the appropriate echelons, Army collection orchestration is the integration, synchronization, and optimization of the intelligence process and operations, including national and theater collection integration; all-domain, multidiscipline collection strategy development; and the end-to-end synchronization of CRM, COM, reconnaissance, DOD ISR mission management, and PED. Note. Collection orchestration outside of the operational-level model for collection management belongs to the G-3/S-3, who has overall responsibility for information collection and tasking collection assets to conduct information collection. In the joint operational-level model, collection management teams also consider the commander’s information collection guidance, information requirements (which become intelligence requirements), IPOE outputs, and intelligence analysis in the context of friendly operations to develop an effective collection management plan. The most significant modification required to use this model for Army operations is accounting for the G-3/S-3’s information collection requirements. (See figure 5-4.) The G-3/S-3— ⚫ Integrates information collection during plans and operations in coordination with the rest of the staff. ⚫ Is the only staff officer with tasking authority from the commander. ⚫ Can authenticate all plans and orders and synchronize all warfighting functions in time, space, and purpose. Figure 5-4. Collection management using the joint operational-level model COLLECTION MANAGEMENT PROCESS Conducting the complex and detailed tasks associated with collection management is inherent in the collection management process. Based on the commander and staff’s participation, the collection management team, in close coordination with the operations staff, performs the five tasks of the collection management process—each discussed in detail in ATP 2-01: ⚫ Develop requirements. ⚫ Develop the collection management plan. ⚫ Support tasking and directing.
2-0
133
Intelligence Staff Support ⚫ Assess collection. ⚫ Update the collection management plan. The collection management tasks are continuous but not necessarily sequential; they are the basis for creating, tasking, and executing the information collection plan. (See figure 5-5.) This is accomplished through the challenging balance of— ⚫ Developing requirements that effectively support operations during requirements management. ⚫ Developing recommendations to task collection assets, including associated details such as the where, when, and how for that collection, and coordinating with those assets or their C2 element to ensure an effective information collection effort throughout the entire operation during mission management. ⚫ Ensuring a continuous integrated and synchronized information collection effort through timely and flexible adjustments to collection throughout the operation during execution management. Figure 5-5. The collection management process Effective collection management focuses on answering intelligence requirements by analyzing these requirements, planning collection based on tasks to collection assets, and then assigning these tasks in an order. The collection management plan synchronizes and coordinates collection assets and PED in the overall concept of operations, and positions and tasks collection assets so they can collect the right information, shift priorities as the situation develops, or execute a branch or sequel. Note. Concept of operations is a statement that directs the manner in which subordinate units cooperate to accomplish the mission and establishes the sequence of actions the force will use to achieve the end state (ADP 5-0). THE INTELLIGENCE ANALYSIS CONTINUUM 5-31. There is far more to intelligence analysis than simply IPOE. Intelligence analysis must support the commander’s decisions, situational understanding, ADM, the MDMP, information advantage activities, targeting, planning and executing deception operations, force protection considerations, and continuous operational assessments. In any operation, friendly and enemy forces will endeavor to set conditions to develop positions of relative advantage. Setting these conditions begins with pre-mission analysis of the OE, which provides relevant knowledge about the OE that is incorporated into the ADM and then used later during other intelligence analysis tasks. (See figure 5-6 on page 5-12.)
2-0
134
Chapter 5 Figure 5-6. The intelligence analysis continuum 5-32. During the MDMP, the intelligence staff leads IPOE and conducts continuous intelligence analysis to understand the OE and the options it presents to friendly and threat capabilities. For example, threat databases and signatures developed during pre-mission analysis of the OE assist in assessing threat capabilities and vulnerabilities during IPOE. This information facilitates decision making during the MDMP and provides a common understanding on how friendly forces may gain positions of relative advantage across multiple domains and dimensions. This is essential when determining how best to mitigate sophisticated threat A2 and AD systems, IADSs, deception, information warfare, systems warfare, the EMS and EW, UASs, robotic capabilities, and long-range fires capabilities, as well as accounting for civil considerations in the OE. 5-33. Based on relevant aspects of the OE (determined during IPOE), including the domains and dimensions, the commander and staff continuously assess information, operations, and changes in the OE. Warnings intelligence, situation development, intelligence support to targeting, and intelligence support to information advantage activities assist the commander and staff in further shaping the OE to facilitate mission success. The continuous assessment of collected information also mitigates risk to friendly forces while identifying opportunities to leverage friendly capabilities to open a window of opportunity.
2-0
135
Intelligence Staff Support LEVERAGE DATA, INFORMATION, AND INTELLIGENCE 5-34. Several areas in this publication mention leveraging and collaborating across the intelligence enterprise and intelligence architecture but in different contexts. This task is an inherent part of intelligence support and pertains to every other task in this chapter. An echelon does not collect all the information it needs, and an intelligence staff does not conduct all the intelligence analysis and production it needs to support the commander and staff. Every echelon uses data, information, and intelligence from higher, lower, and adjacent intelligence staffs and elements. 5-35. Information outside of military sources can be valuable, especially for the operational variables (PMESII-PT) and civil considerations. Academia, industry, and non-DOD information can be especially valuable, as well as PAI, in providing critical insight and awareness across all domains and dimensions, especially the human and information dimensions. Allies and other multinational partners have unique collection capabilities and valuable intelligence, including insight into specific regions and ongoing tensions. The joint force and other Services have unique and specialized data, information, and intelligence on many areas, especially within the maritime, air, space, and cyberspace domains (including ES data and information). Generally, higher-level Army echelons have more time, resources, and a broader context to produce intelligence; lower-level echelons may often have a more detailed and timelier picture of the enemy they face in the close area. Optimizing the task of leveraging data, information, and intelligence and effectively collaborating across echelons are both an art and the application of science. CONDUCT PRE-MISSION ANALYSIS OF THE OPERATIONAL ENVIRONMENT 5-36. To perform IPOE and the other important intelligence tasks that support operations, the intelligence staff must conduct a significant amount of analysis before receipt of mission. The intelligence staff cannot wait until receipt of mission to start intelligence analysis. As discussed in chapter 2, there are several tools and processes, some led by the G-2/S-2 and intelligence staff, that assist the commander and staff in understanding the OE. Intelligence analysis plays an important role in facilitating this understanding; therefore, the analytical effort must start as early as possible. As operational planning occurs in terms of theater campaign plans, contingency plans, and other planning (such as the ADM), the intelligence staff provides intelligence support, which is connected to facilitating an understanding of the OE through sequential analysis and developing various intelligence products. The result is an ever-increasing level of operational focus: ⚫ Analysis and products that account for the different aspects of the domains and dimensions, including their interrelationships. Note. While considering the domains and dimensions, these intelligence products may not be structured based on the domains and dimensions. ⚫ Analysis and products that account for the operational variables and how they interrelate. ⚫ Analysis and products that specifically address a threat; localized terrain; weather and weather effects; civil considerations, including cultural aspects of the OE; and other significant aspects of that area to prepare the staff for the MDMP, including IPOE. DOMAINS AND DIMENSIONS (GENERAL INTELLIGENCE) 5-37. During competition, for those units and organizations without much operational or geographic focus, the intelligence staff must first understand a threat and the regional civilian population and other significant factors (for example, destabilizing natural disasters across a region). Using the domains and dimensions as a framework provides a helpful context and checklist to ensure the intelligence staff’s holdings are as complete as possible and to build a comprehensive understanding of the OE. Information and intelligence usually flow first from the U.S. IC, academia, DIA, the theater army G-2 and military intelligence brigades-theater (MIB-Ts), and other higher-echelon intelligence units and organizations (such as MDTFs [see paragraph 2- 82]) in various forms. Some of this information and intelligence is or can be databased and some cannot. As this occurs, it is useful for intelligence staffs to practice their intelligence skills and compile or create intelligence products to further build their knowledge and proficiency as analysts. Analyzing and describing threat force capabilities, and even the whole of a threat government, are especially valuable in preparing for potential future operations. Producing these products should also assist intelligence staffs in finding information and intelligence gaps.
2-0
136
Chapter 5 5-38. During crisis and armed conflict with a specific operational or geographic focus, as time and the situation allows, producing general intelligence products on the threat and regional civilian population is of value. The greater the level of understanding of the OE at the general or holistic level, the better the understanding of the OE for a specific mission. OPERATIONAL VARIABLES (INTELLIGENCE FOR CONTINGENCY AND FUTURE PLANS) 5-39. The next level of operational focus is moving from generalized analysis, information, and intelligence to analysis, information, and intelligence specific to a contingency, possible operation, or known future operation. This can include the employment of ADM. In these instances, the joint force may perform joint IPOE, and higher-level Army echelons may perform a rather broad IPOE. However, lower-level Army echelons that have not received a mission do not perform IPOE yet. Another important aspect of intelligence support at this point during competition is analysis of threat systems, which is different from joint TSA. Joint intelligence and higher-level Army intelligence, even when not structured based on the operational variables, directly address one or more of the operational variables. This joint intelligence and higher-level Army intelligence flow to lower-level units and organizations. 5-40. The operational variables provide a second useful checklist, along with the domains and dimensions, to judge the completeness of intelligence products and information and intelligence gaps. The operational variables assist the commander and staff in understanding important factors, within and across the domains and dimensions, in a more focused manner and relevant to Army operations. At all echelons, intelligence staffs must practice their intelligence skills and compile or create intelligence products (focusing on one or more operational variables) to further build their knowledge and proficiency as analysts. THREAT, TERRAIN, WEATHER, AND CIVIL CONSIDERATIONS (PREPARING FOR THE MILITARY DECISION-MAKING PROCESS) 5-41. After contingency or other future plans are established, the next level of operational focus is preparing for receipt of mission, which starts the MDMP. Data, information, and intelligence focused on a specific threat (including the human and information dimensions), as well as localized terrain, weather and weather effects, and civil considerations (including the human and information dimensions) are invaluable to successfully performing IPOE. Beyond compiling data, information, and intelligence from other sources, conducting analysis and developing intelligence products for these categories are very similar to performing steps 2 and 3 of the IPOE process. While all aspects of building as much data, information, and intelligence are important, it is especially crucial to prepare detailed threat characteristics, models, and capabilities (considering the dimensions and domains), as much as possible, before receipt of mission. PERFORM INTELLIGENCE PREPARATION OF THE OPERATIONAL ENVIRONMENT Notes. IPOE should not be confused with joint IPOE. IPOE is used during Army operations; joint IPOE is used by joint headquarters and joint units. JP 2-0 describes joint IPOE differently than the conduct of the Army’s IPOE. Intelligence preparation of the operational environment is the systematic process of analyzing the mission variables of enemy, terrain, weather, and civil considerations in an area of interest to determine their effect on operations. IPOE was previously known as intelligence preparation of the battlefield (IPB). FM 2-0 has changed the term from IPB to IPOE to better reflect the multidomain aspects of the OE within the name of the process. However, IPB has already accounted for and discussed the domains and dimensions of the OE across its four steps; therefore, there is no change to the definition of IPOE, which matches the definition of IPB, and there is no change to the four steps of IPB, now IPOE. Despite the name change, readers should still refer to ATP 2-01.3.
2-0
137
Intelligence Staff Support 5-42. IPOE allows commanders and staffs to start from a mission-focused holistic approach to analyze the OE to support the mission. The approach— ⚫ Describes all relevant aspects of the OE that may impact friendly, threat, and neutral forces. ⚫ Considers all relevant domains and dimensions that may impact friendly and threat operations. ⚫ Identifies windows of opportunity to leverage friendly capabilities against threat forces to reach a position of relative advantage (human, information, or physical). ⚫ Allows commanders to leverage positions of relative advantage at a time and place most advantageous for mission success with the most accurate information available. 5-43. IPOE results in intelligence products used during the MDMP to assist in developing friendly COAs and decision points for the commander. Additionally, the conclusions reached and the products (which are included in the intelligence estimate) developed during IPOE are critical in planning information collection and conducting targeting. When discussing IPOE, it is natural to discuss the various IPOE products; however, the following outcomes of the IPOE process are as important as developing IPOE products: ⚫ Collaboration across the staff and with the commander. ⚫ Effective consideration of the range of possible threat COAs and capabilities (not just the most dangerous and most likely). ⚫ Careful analysis and detailed consideration of the terrain, weather, and significant mission and/or operational variable considerations. ⚫ A fair and accurate portrayal of the threat during COA development and analysis (war game). 5-44. The G-2/S-2 and intelligence staff lead the staff effort, but IPOE must include the entire staff—at least during key portions of the process. Often IPOE’s success is either set or not set, depending on what has occurred before IPOE. This intelligence effort applies the IWFTs of— ⚫ Plan, establish, and revise an intelligence architecture. ⚫ Leverage data, information, and intelligence. ⚫ Conduct pre-mission analysis of the OE. MISSION FOCUS 5-45. Upon receipt of a WARNORD or mission (or in anticipation of a mission), the commander and staff draw relevant information categorized by the operational variables and filter it into the mission variables (METT-TC [I]) used during mission analysis. During IPOE, the staff focuses on the relevant aspects of the OE regarding the staff’s warfighting function. The staff focuses primarily on the mission variables of enemy, terrain and weather, and civil considerations. However, based on the staff’s echelon, type of OE, type of operation, and changes in the OE, the staff may need to account for other significant aspects of the OE. 5-46. To be effective, IPOE must— ⚫ Consider all domains and dimensions. ⚫ Define the commander’s AOI by its geographic boundaries and across all domains to focus collection and analysis within the AOI. ⚫ Describe how the enemy, terrain and weather, and civil considerations will affect friendly and threat operations. This subtask involves the commander and the entire staff collaborating to determine these effects. No matter how complex, the staff must thoroughly consider the civil considerations (including information) that are significant to the mission. ⚫ Include relevant aspects of the OE that relate to relative advantages and defeat or stability mechanisms. ⚫ Support each step of the MDMP with IPOE products. ⚫ Consider the operational framework. (See chapter 2.) ⚫ Facilitate the commander’s ability to visualize the desired end state and a broad concept of how to shape current conditions into that end state. ⚫ Support the commander in directing the intelligence effort. ⚫ Facilitate understanding threat characteristics and threat goals, objectives, and COAs.
2-0
138
Chapter 5 INTELLIGENCE PREPARATION OF THE OPERATIONAL ENVIRONMENT PROCESS STEPS 5-47. The IPOE process consists of the following four steps: ⚫ Define the OE. ⚫ Describe environmental effects on operations. ⚫ Evaluate the threat. ⚫ Determine threat COAs. Note. Although there are four steps to the IPOE process, IPOE must seamlessly combine with pre- mission analysis of the OE; the leveraging of data, information, and intelligence; and situation development to serve as a continuous effort, with all staff members providing support to the intelligence warfighting function. Continuous analysis and assessments are necessary to maintain situational understanding of the OE in constant flux. Step 1—Define the Operational Environment 5-48. An OE for any specific operation comprises more than the interacting variables that exist within a specific physical area. It also involves interconnected influences from the global or regional perspective (such as politics, economics) that affect OE conditions and operations. Thus, each commander’s OE is part of a higher commander’s OE. Defining the OE results in the identification of— ⚫ Significant characteristics of the OE that can affect friendly and threat operations. ⚫ Gaps in current intelligence holdings. 5-49. Step 1 is important because it assists the commander in defining relevant aspects of the OE in time and space. This is equally important when considering characteristics of the domains and dimensions of the OE. Aspects of the OE may act simultaneously across the battlefield but may only factor in friendly or threat operations at specific times and locations. 5-50. During step 1, the intelligence staff must identify those significant characteristics related to the mission variables of enemy, terrain and weather, and civil considerations that are relevant to the mission. The staff evaluates significant characteristics to identify gaps and initiate information collection. The staff then justifies the analysis to the commander. Failure to identify or misidentifying the effect these variables may have on operations at a given time and place can hinder decision making and result in developing an ineffective information collection strategy. During step 1, the AO, AOI, and area of influence must also be identified and established. 5-51. Understanding friendly and threat forces is not enough; other factors, such as culture, languages, tribal affiliations, and operational and mission variables, can be equally important. Identifying the significant characteristics of the OE is essential in identifying the additional information needed to complete IPOE. Once approved by the commander, this information becomes the commander’s initial intelligence requirement, which focuses the commander’s initial information collection effort and the remaining IPOE process steps. 5-52. Additionally, where a unit will be assigned and how its operations will synchronize with other associated operations must be considered. For example, the intelligence staff should be forming questions about where the unit will deploy within the entire theater and the specific logistics requirements to handle the operation’s contingency plans. Step 2—Describe Environmental Effects on Operations 5-53. During step 2 of the IPOE process, the staff describes how significant characteristics affect friendly operations. The intelligence staff also describes how terrain, weather, civil considerations, and friendly forces affect threat forces. This evaluation focuses on the general capabilities of each force until the development of threat COAs in step 4 of IPOE and friendly COAs later in the MDMP. The entire staff determines the effects of friendly and threat force actions on the population.
2-0
139
Intelligence Staff Support 5-54. If the intelligence staff does not have the information required to form conclusions, it uses assumptions to fill information gaps—always careful to ensure the commander understands when assumptions are used in place of facts to form conclusions. Step 3—Evaluate the Threat 5-55. The purpose of evaluating the threat is to understand how a threat can affect friendly operations. Although threat forces may conform to some of the fundamental principles of warfare that guide Army operations, these forces have obvious, as well as subtle, differences in how they approach situations and problem solving. Understanding these differences is essential to understanding how a threat force will react in each situation. 5-56. Threat evaluation does not begin with IPOE. The intelligence staff conducts threat evaluations and creates threat models during the pre-mission analysis of the OE. Using this information, the intelligence staff refines threat models, as necessary, to support IPOE. When analyzing a well-known threat, the intelligence staff may be able to rely on previously developed threat models. When analyzing a new or lesser-known threat, the intelligence staff may have to evaluate the threat and develop threat models during the MDMP’s mission analysis step. When this occurs, the intelligence staff relies heavily on the threat evaluation conducted by higher headquarters and other intelligence agencies. 5-57. In situations where the mission is not oriented on a threat force, intelligence analysis and intelligence products may focus on terrain, weather, and civil considerations. (An example of this type of situation is a natural disaster.) However, IPOE must consider potential hazards and threats, such as terrorism, to any operation, as well as how friendly forces are under constant observation and contact by peer threats. Step 4—Determine Threat Courses of Action 5-58. During step 4, the intelligence staff identifies and develops possible threat COAs that can affect accomplishing the friendly mission. The staff uses the products associated with determining threat COAs to assist in developing and selecting friendly COAs during the COA steps of the MDMP. Identifying and developing valid threat COAs minimize the potential of surprise to the commander by an unanticipated threat action and support the development of important branches and sequels. 5-59. Failure to fully identify and develop valid threat COAs may lead to the development of an information collection strategy that does not provide the information necessary to confirm what COA the threat has taken, potentially resulting in friendly forces being surprised and possibly defeated. When needed, the staff should identify all significant civil considerations (those identified as OE significant characteristics) to portray the interrelationship of the threat, friendly forces, and population activities. 5-60. The staff develops threat COAs in the same manner friendly COAs are developed. ADP 5-0 provides a model for developing valid threat COAs that are suitable, feasible, acceptable, unique, and consistent with threat doctrine or patterns of operation. Although the intelligence staff has the primary responsibility for developing threat COAs, it needs assistance from the rest of the staff to present the most accurate and complete analysis to the commander. INTELLIGENCE PREPARATION OF THE OPERATIONAL ENVIRONMENT PRODUCTS 5-61. While there are other important IPOE process outcomes, the development of several IPOE products is also important. These products assist in driving subsequent steps of the MDMP, targeting, collection management, protection, risk management, other processes, and the conduct of IPOE at lower echelons. While not all inclusive, figure 5-7 on page 5-18 shows the flow of common products across IPOE’s four steps.
2-0
140
Chapter 5 Figure 5-7. Common intelligence preparation of the operational environment products PROVIDE WARNINGS 5-62. Across the range of military operations, various collection assets provide early warnings of threat action. As analysts screen incoming information and message traffic, they provide the commander with advanced warnings of threat activities or intentions that may change the basic nature of the operation. These warnings enable the commander and staff to quickly reorient the force to unexpected contingencies and to shape the OE. 5-63. Analysts can use analytic techniques and their current knowledge databases to project multiple scenarios and develop indicators as guidelines for providing warning intelligence. An indicator is, in intelligence usage, an item of information that reflects the intention or capability of an enemy and/or adversary to adopt or reject a course of action (JP 2-0). Analysts project future events and identify event characteristics that can be manipulated or affected. Characteristics that cannot be manipulated or affected should be incorporated into unit SOPs as warning intelligence criteria. (See ATP 2-01 and ATP 2-01.3 for doctrine on indicators.)
2-0
141
Intelligence Staff Support PROVIDE INTELLIGENCE SUPPORT TO TARGETING 5-64. Commanders and staffs need timely, accurate, relevant, and predictive intelligence to support the targeting effort, which includes the selection, prioritization, execution, and assessment of targets. Therefore, the intelligence support to targeting effort must be resourced, carefully planned, and supported by a large portion of the intelligence architecture. Intelligence support to targeting occurs across most of the intelligence warfighting function. While all intelligence disciplines and complementary capabilities support targeting, the effort is ultimately focused by the close collaboration between the all-source intelligence analysis element (whether dedicated to targeting or ad hoc), the collection management element, and various targeting and fires elements, including the target development working group, if applicable. Certain staff elements, including the USAF SWO, CEMA officer, and space operations officer, also have an important role. Intelligence support to targeting includes support to planning (target development), identifying (target detection), and assessing the effect of those operations (combat assessment). 5-65. Characteristics that best describe the intelligence support to targeting effort include deliberate planning, collaboration across intelligence enterprise echelons, and precise intelligence to target threat capabilities at the right time and place to open windows of opportunity to achieve positions of relative advantage. Unfortunately, providing precise intelligence is challenging because threats, especially peer threats, make it difficult to collect on and analyze threat systems. Intelligence analysis to predict threat COAs (considering terrain and weather effects), provide intelligence specific to a location and time, and accurately assess the employment of capabilities is difficult. Intelligence support to targeting includes tracking highly mobile targets and simultaneously engaging targets, including targets in complex terrain (such as subterranean and urban areas and jungle and mountainous terrain) and targets across multiple domains and dimensions (for example, targeting threat information systems). 5-66. The intelligence warfighting function provides support during D3A—from developing plans through the MDMP and executing the operation after the MDMP. The targeting process is continuous and so is intelligence support to targeting. Just like IPOE, intelligence support to targeting is based on the data, information, and intelligence that result from planning, establishing, and revising the intelligence architecture; conducting pre-mission analysis of the OE; and leveraging data, information, and intelligence. While not all-inclusive, figure 5-8 illustrates intelligence support to targeting before receipt of mission and during and after the MDMP. Figure 5-8. Intelligence support to targeting over time
2-0
142
Chapter 5 DECIDE 5-67. During the MDMP, targeting becomes more focused based on the commander’s guidance and intent. Once the commander determines objectives, the intelligence staff must continuously review them with respect to the threat and the changing situation to ensure they remain relevant to the commander’s intent. Intelligence provides the commander with an understanding of the threat in terms of probable intent, objectives, strengths, vulnerabilities, and COAs (at a minimum, most likely and most dangerous). Additionally, intelligence analysts recommend objectives based on enemy capabilities, vulnerabilities, centers of gravity, and likely COAs. 5-68. The decide function of the targeting methodology provides the overall focus and sets priorities for information collection and attack planning. Decide, the most important targeting function, requires close interaction between the intelligence, plans, operations, CEMA, fire support, space, and legal. The intelligence staff analyzes threat systems and their components to make a recommendation for generating the commander’s intended effect on the target, although the fire support officer, in collaboration with the G-3/S- 3, makes the final decision. The intelligence input is based primarily on the AGM, determining the most effective friendly means available to produce the commander’s desired effect on the target. The decide function draws heavily on the staff’s knowledge of the threat, a detailed IPOE (which occurs simultaneously), and a continuous assessment of the situation. Targeting priorities are addressed for each phase or critical event of an operation. 5-69. During the targeting meeting, the collection management team advises the targeting working group on the ability of available collection systems to acquire and identify HPTs, track HPTs, and support BDA on HPTs. The team assists the working group, as needed, in revising the intelligence architecture to disseminate target-related intelligence to attack systems in near real time. The targeting working group further refines event templates and associated event matrices (developed during IPOE) into targeting matrices, which provide the level of detail the collection management team requires to focus information collection to support targeting. The team uses targeting matrices, IPOE products, and TSS to divide HPTs into collection functions (acquire and identify, track, and support BDA), SIRs, NAIs and TAIs, and specific collection tasks. (See figure 5-9.) (See ATP 2-01, ATP 2-01.3, and ATP 2-33.4.) Figure 5-9. High-payoff target to specific information requirements
2-0
143
Intelligence Staff Support DETECT 5-70. The COIC is primarily responsible for directing the execution of the information collection effort to detect HPTs identified during the decide function. The intelligence cell (with the COIC) must focus its intelligence analysis efforts to support both situation development and the targeting effort. Therefore, close coordination between the intelligence cell and the FSE is critical. Key staff members in this effort include the G-3/S-3, G-2/S-2, information operations officer, FAIO, targeting officer, fire support coordinator, and fire support officer. 5-71. The collection manager directs the information collection synchronization effort, focusing on PIRs and target intelligence requirements. The collection manager ensures the information collection plan supports the finalized targeting plan. The collection management team, in coordination with the targeting team (or intelligence targeting officer), develops collection strategies to satisfy PIRs and targeting intelligence requirements. The collection management team may have to differentiate collection tasks to support the acquire and identify or track collection function when a collection asset cannot perform both collection functions. This is a major challenge during large-scale combat operations at which time the concept of persistent surveillance is often not possible. National technical means may have to serve as an intermittent form of surveillance, in conjunction with Army collection assets, to acquire and identify and track HPTs and may be one of the primary means to detect targets in the space and cyberspace domains. Some collection assets provide actual targetable information while information from other collection assets requires PED to produce valid targets. 5-72. The target priorities developed in the decide function are used to expedite the processing of targets. The collection management team— ⚫ Plans for synchronized collection, focusing on the proper HPT at each phase in the COA. ⚫ Plans collection to satisfy that set of SIRs, if BDA is required to support the COA. ⚫ Plans and arranges, when possible, direct dissemination of targeting intelligence from the collector to the targeting cell or the appropriate fires element. 5-73. During operations, the collection management team— ⚫ Monitors the execution of the collection management plan. ⚫ Uses the information collection matrix to ensure collection assets focus on the proper HPTs (and their associated NAIs and TAIs). ⚫ Alerts the appropriate fires element as targets of opportunity present themselves. ⚫ Cross-cues collection assets to support the targeting effort. 5-74. When detecting an HPT, the information is quickly disseminated to the FAIO to determine if the target meets the commander’s attack guidance, the target’s priority, and if the target complies with TSS. To ensure target-related intelligence is disseminated quickly, the FAIO is normally collocated in the intelligence cell with communications to the FSE/fires cell. The intelligence cell also supports targeting through other means in conjunction with the CEMA cell, space operations officer, and the rest of the staff. The FAIO coordinates with the intelligence cell and disseminates target-related intelligence directly to the FSE/fires cell. If the target meets the commander’s attack guidance and targeting priorities, it is actioned in accordance with the commander’s intent. In those instances when the situation dictates developing a new HPT, or when the staff assesses a significant change to an existing HPT, subsequent target development must occur. HPTs have the potential to change by targeting cycle, phase, activating event, or other criteria directed by the commander. When subsequent target development is necessary, the targeting information is forwarded for intelligence analysis and the target development process must occur quickly. Upon identifying a target specified for attack, analysts pass the target to the FSE/fires cell or the appropriate staff proponent, who directs the desired prosecution of effects against the target. (See ATP 2-01, ATP 2-01.3, and ATP 2-33.4.) DELIVER 5-75. During the deliver function, the intelligence staff analyzes threat systems and their components to make a recommendation for generating the commander’s intended effect on the target although the fire support officer, in collaboration with the G-3/S-3, makes the final decision. The intelligence input is based primarily on the AGM—determining the most effective friendly means available to produce the commander’s desired
2-0
144
Chapter 5 effect on the target. During the deliver function, the collection management team cues collectors to continue tracking targets during its engagement. Preplanned or cued BDA collection and reporting assist in determining if the engagement produced the desired effects; if not, continued tracking supports immediate reengagement. (See ATP 2-01, ATP 2-01.3, and ATP 2-33.4.) ASSESS 5-76. Intelligence supports the assessment function by determining if targeting actions have met the desired effects and if reattack is necessary to perform essential fires tasks and achieve the commander’s intent for fires. Intelligence support to combat assessment relates to specific targets by completing physical damage assessments and functional damage assessments. During the assess function, the collection management team continuously assesses the information collection effort and compares ongoing actions to the collection management plan and the original intent. As operations progress and the situation deviates from the plan, it is important to ensure information collection supports all requirements. If the staff’s assessment reveals that some requirements are not answered, the collection management team must reevaluate the collection management plan. Then the team and staff must provide input on adjustments to the collection effort, retasking, or the development of new tasks. The collection management team and current operations track the situation relative to those requirements to determine the completion of the collection task, the effectiveness of targeting and resulting effects on the target, continued synchronization with other operations or emerging collection opportunities, and most critically, the requirements for target reattack, if required. 5-77. The assess function is nested in the overall continuous assessment of operations within the operations and intelligence processes. Assessments are directly connected to the commander’s decisions throughout the conduct of operations. Planning for assessment identifies key aspects of the operation that the commander directs be closely monitored and identifies where the commander wants to make the decisions. Intelligence has a major role in assessments. 5-78. The assess function is performed through combat assessment—the determination of the overall effectiveness of force employment during military operations (JP 3-60). Operational assessments are normally conducted only at echelons above brigade. Combat assessment is composed of three related elements: BDA, munitions effectiveness assessment, and reattack recommendations. PROVIDE INTELLIGENCE SUPPORT TO INFORMATION ADVANTAGE 5-79. Chapter 2 discusses the OE dimensions; human, information, and physical advantages; and positions of relative advantage in accordance with FM 3-0. Initially, commanders and staffs should maintain a balanced outlook and approach to reaching human, information, and physical advantages. While not entirely new in execution, the recent doctrinal articulation of identifying and reaching advantages within and across dimensions can be somewhat complex. For example, most information advantages result from human and physical advantages, and several considerations to apply lethal and nonlethal means to reach a targeting effect span across all three dimensions. Additionally, most information advantages result from human and physical factors that are activities intrinsic to Army operations. 5-80. In many instances, especially during competition and crisis, commanders and staffs must understand many relevant aspects of the OE, including friendly and enemy capabilities and factors across the domains and dimensions, to conduct operations and activities to reach an information advantage. Additionally, commanders and staffs must understand and appreciate the complex interrelationship between the human, information, and physical dimensions from a friendly, threat, and other actors’ perspective. Units and intelligence organizations should leverage the Army Cyber Command G-2 and the Cyber Military Intelligence Group, the JFC information planning cell, and the Deputy Director for Global Operations for assistance in developing information advantage-specific support requirements. 5-81. Intelligence support to information advantage includes the following: ⚫ Support to understanding the OE, including the domains and dimensions. ⚫ Understanding threat information warfare capabilities and ongoing activities so friendly forces can preempt with their own messaging.
2-0
145
Intelligence Staff Support ⚫ IPOE. ⚫ Situation development. ⚫ Collection management. ⚫ Support to all information aspects of targeting. ⚫ Support to countering misinformation and disinformation efforts, including OSINT support. ⚫ Support to determining protection and security activities to mitigate threat activities. ⚫ Many aspects of CI, including technology protection. FM 2-0 modified the IWFTs to support information advantage: • ART 2.4.2, Provide Intelligence Support to Information Operations, from FM 2-0, dated 06 July 2018, has been deleted. • ART 2.4.2, Provide Intelligence Support to Information Operations, subtasks have been captured under IWFT 2.2.5, Provide Intelligence Support to Unique Missions. Some of the subtasks include—provide intelligence support to public affairs, military information support operations, CEMA, cybersecurity, OPSEC, and military deception. (See appendix B.) (ART Army tactical task) PERFORM SITUATION DEVELOPMENT 5-82. The intelligence staff performs continual situation development once IPOE is completed to support the unit’s MDMP. Situation development involves the logical next steps of taking IPOE and MDMP results and continuing to support the commander and staff in terms of understanding, visualizing, and decision making— except for support to targeting, which is a separate task. IPOE products are converted into threat-tracking intelligence products as well as into the development of standard intelligence products that support situational understanding and a unit/organization’s battle rhythm. Analysts continually produce current intelligence to answer the commander’s requirements; update and refine IPOE products, as needed; and support transitions to the next phase of an operation, branch, or sequel. 5-83. While IPOE initially shapes the development of situation development products, performing situation development is different from performing IPOE. Situation development products are more useful when key staff members collaborate with the intelligence staff. There are several standard doctrinal intelligence products associated with this task. Different units should freely modify these doctrinal products or develop their own, as long as they meet the doctrinal intent of providing relevant and timely support to the commander and staff. Some of these intelligence products include— ⚫ Event templates and associated event matrices. (See ATP 2-01.3.) ⚫ Intelligence estimates. (See ATP 2-33.4.) ⚫ Intelligence running estimates. (See ATP 2-33.4.) ⚫ INTSUMs. (See ATP 2-33.4.) ⚫ Graphic INTSUMs. (See ATP 2-33.4.) ⚫ Intelligence reports. (See ATP 2-33.4.) ⚫ Periodic intelligence reports. (See ATP 2-33.4.) ⚫ BDA charts. ⚫ Visualization products (according to the commander’s preference). 5-84. The intelligence staff can develop these products in digital, hardcopy, and/or acetate formats, depending on the echelon; various C2 and intelligence systems; DDIL communications environments; and the unit’s PACE plan. Performing situation development at any echelon also depends on how commanders and staffs decide to share, integrate, and synchronize the CIP and COP across echelons.
2-0
146
Chapter 5 SECTION VI – SITUATIONAL UNDERSTANDING, THE COMMON INTELLIGENCE PICTURE, AND THE COMMON OPERATIONAL PICTURE 5-85. As an operation progresses, the intelligence staff facilitates the commander and staff’s situational understanding through as timely and accurate situation development as possible. Information collection at and across echelons results in combat information and the dissemination of data and information to intelligence elements for analysis and the production of intelligence. The G-2/S-2 and intelligence staff perform many activities to integrate and synchronize intelligence collection, PED, and intelligence analysis at and across echelons, including collection management. Each echelon performs information collection and also collaborates across echelons to share data, information, and intelligence, which can be maintained at or accessed by that echelon. 5-86. The fog and friction of operations and information collection, as well as time constraints, can significantly challenge the intelligence staff. As this occurs, the intelligence staff provides continuous intelligence products, within the capabilities of intelligence analysis systems, including the COP, to facilitate the commander and staff’s situational understanding. The COP is the most important operational product used to establish a shared understanding between echelons. The intelligence staff provides the intelligence portion of the COP to the rest of the staff for integration into the COP. However, the G-2/S-2 ultimately succeeds or fails—not by producing any particular intelligence product or CIP; the G-2/S-2 succeeds by providing the commander what the commander needs, with respect to accurate intelligence, when the commander needs it. 5-87. Concurrent with producing intelligence, the intelligence staff collaborates across echelons to maintain a shared or common interpretation of threat locations, capabilities, objectives and intent, COAs, strengths, and vulnerabilities. While the G-2/S-2 and intelligence staff’s primary responsibility is to their commander and staff, they must also continually collaborate and share products, such as the CIP and intelligence portion of the COP across echelons. This open collaboration—usually up and down at least one echelon and with adjacent units—and a common intelligence interpretation result in better intelligence for each echelon’s commander and staff and supports a shared operational understanding between echelons. Figure 5-10 depicts the complex and intense effort to both support the commander and staff and collaborate across echelons with other intelligence staffs to support a common interpretation. 5-88. There are several areas where friction occurs while providing the commander and staff with intelligence to drive decision making and targeting and have a common interpretation between echelons: ⚫ The commander can disagree with the analysis. After providing the commander with the logic, if the commander still disagrees, the G-2/S-2 and intelligence staff must adopt the commander’s analysis while still considering other possible threat actions to support branches and sequels. ⚫ The higher- or lower-level or adjacent-unit G-2/S-2 or representative can disagree with the intelligence interpretation of many threat aspects of the situation. ⚫ Commanders across echelons can have a very different understanding, including their interpretation of the threat situation. ⚫ Communications between echelons can be degraded, intermittent, and limited. 5-89. The intelligence warfighting function works through this friction and then resets the CIP, as needed. Resetting a common interpretation of the situation and building a new CIP are necessary as commanders make decisions, operations transition, or echelons start a new MDMP and IPOE.
2-0
147
Intelligence Staff Support Figure 5-10. The effort to support the commander and maintain common intelligence across echelons and laterally THE COMMON INTELLIGENCE PICTURE 5-90. The common intelligence picture is a single, identical display of relevant, instructive, and contextual intelligence information regarding enemy, adversary, and neutral force disposition, and supporting infrastructures derived from all sources at any level of classification, shared by more than one command, that facilitates collaborative planning and assists all echelons to enhance situational awareness and decision making (JP 2-0). For Army purposes, the CIP is viewed as a single display or any combination of displays and products that— ⚫ Support the commander and staff’s situational understanding. ⚫ Allow the development of the intelligence portion of the COP. ⚫ Assist collaboration between echelons to support a common interpretation of key aspects of the threat. Note. In most instances, current technology and systems do not support a single CIP accomplishing all that is mentioned above. Therefore, the CIP can be any combination of the intelligence products discussed under situation development (see paragraph 5-83) as well as overlays, either digital or acetate.
2-0
148
Chapter 5 5-91. The CIP relies on constant intelligence synchronization and continuing assessments. Specifically, the CIP is based on— ⚫ Data, information, and intelligence from multiple echelons, organizations, and agencies. ⚫ Leveraging the intelligence enterprise. 5-92. The commander often directs how information and intelligence should be displayed on the CIP; the G-2/S-2 and intelligence staff should ensure the information and intelligence are tailored to the commander’s requirements. The following include some key aspects of the CIP: ⚫ The CIP is derived from— ▪ All intelligence disciplines, complementary capabilities, and ancillary collection assets. ▪ Threat and civil considerations information across all domains and dimensions of the OE. ⚫ The CIP is driven by unit SOPs and collaboration up and down one echelon. 5-93. G-2/S-2s must consider the following (not all-inclusive) when developing the CIP: ⚫ Commander’s requirements. ⚫ The unit’s mission. ⚫ CIP classification. ⚫ Echelon of CIP development. ⚫ CIP management procedures. ⚫ Available intelligence architecture and bandwidth. ⚫ Types of information to be displayed. ⚫ How information is to be displayed. ⚫ Dissemination and ingestion methods and procedures. ⚫ Reporting timelines. 5-94. The CIP focuses on describing the OE, the threat, and threat COAs. This product should have both a visual and textual component. If organized appropriately, both components will convey a clear and relevant threat narrative consistent with operational terminology. Intelligence staffs must exercise high control over the threat narrative to ensure consistency, which supports the commander and staff’s situational understanding. Chapter 8 discusses developing the CIP during large-scale combat operations. INTELLIGENCE PORTION OF THE COMMON OPERATIONAL PICTURE 5-95. The G-2/S-2 and intelligence staff carefully consider what aspects of the CIP to disseminate to the operations staff as the intelligence portion of the COP. The common operational picture is a display of relevant information within a commander’s area of interest tailored to the user’s requirements and based on common data and information shared by more than one command (ADP 6-0). Although the COP is ideally a single display, it may include more than one display and information in other forms, such as graphic representations or written reports, automatic updates, and overlays, often digitally stored in a common database. The intelligence portions of the COP are those messages and overlays relating to threats, terrain and weather, and civil considerations in the common database. The G-2/S-2 and intelligence staff ensure the common database reflects the most current information and intelligence available to maintain the timeliness, accuracy, and relevancy of the intelligence portion of the COP. 5-96. The commander and staff must account for and mitigate any limitations in the COP based on the C2 system and technology used to generate the COP. The threat situation and civil considerations portions of the COP, while updated by the intelligence staff regularly, are sometimes limited to displaying somewhat latent and composite locations and threat force dispositions. Somewhat latent indicates that in most situations, those locations were captured at a specific time and are not automatically updated. Composite indicates that in some situations, those locations were captured across multiple dates/times. The intelligence portion of the COP may also require further explanation from the intelligence staff or other intelligence products due to the complexity of the threat situation and mission variables.
2-0
149
Intelligence Staff Support 5-97. With the complexity of the OE, the intelligence staff must be prepared to— ⚫ Validate and maintain the threat portions of the COP in a timely and flexible manner. ⚫ Collaborate with the rest of the staff to ensure the appropriate operational and mission variables are displayed. ⚫ Effectively display the multiple types and layers of information the commander requires. 5-98. A COP is key to achieving and maintaining shared situational understanding in all domains and making effective decisions faster than the threat. The difficulty of maintaining a COP in a multinational environment varies based on training levels, language differences, level of data sharing, technical compatibility of systems, restrictions based on classification, and other national caveats. 5-99. The COP facilitates collaborative planning and assists commanders at all echelons in achieving shared situational understanding. The COP must consider relevant factors in domains affecting the operation as well as provide and enable a common understanding of the interrelationships between actions and effects through the human, information, and physical dimensions. Shared situational understanding allows commanders to visualize the effects of their decisions on other elements of the force and the overall operation.
2-0
151
Chapter 6 Intelligence Operations SECTION I – OVERVIEW 6-1. MI unit collection operations (intelligence operations) follow the Army’s framework for exercising C2—the operations process. The major C2 activities conducted during operations are planning, preparing, executing, and continuously assessing. Intelligence commanders, supported by their staffs, use the operations process to drive the conceptual and detailed planning necessary to direct, lead, and assess intelligence operations. 6-2. Through intelligence operations, MI collection personnel and systems collect information about capabilities, activities, disposition, and all other threat characteristics within the OE. Intelligence professionals follow the guidance outlined by the intelligence disciplines and complementary capabilities to ensure all tasks are accomplished successfully and in accordance with intelligence regulations and policies. 6-3. MI collection personnel are trained and certified. MI sensors operated by MI personnel can be directed to collect information. These MI collection capabilities are distinct from other Army information collection capabilities, such as reconnaissance or surveillance. The distinction is required because intelligence collection must comply with all applicable U.S. laws and policy. (See appendix D.) Additionally, certain intelligence disciplines require specific training and certifications to conduct intelligence operations. SECTION II – INTELLIGENCE OPERATIONS BASED ON INFORMATION COLLECTION 6-4. Information collection is the Army doctrinal construct for synchronizing and integrating the planning and employment of sensors and assets to collect information. The intelligence warfighting function’s contributions to information collection include collection management and intelligence operations. Chapter 5 discusses how collection management, through the intelligence process, nests within information collection. To understand intelligence operations, intelligence professionals must also understand information collection and how intelligence operations nest within it (under the execute collection task). INFORMATION COLLECTION AND INTELLIGENCE OPERATIONS 6-5. Intelligence operations is one of the four primary tactical tasks and missions the Army conducts as part of information collection. (See figure 6-1 on page 6-2.) The other three are reconnaissance, surveillance, and security operations. Note. When necessary, maneuver units conduct offensive operations to collect information. This entails commanders assuming risk to determine threat characteristics in the OE. (See chapter 8.)
2-0
152
Chapter 6 Figure 6-1. Intelligence operations as a primary tactical task INTELLIGENCE OPERATIONS 6-6. Intelligence operations are driven by the need to answer questions and fill requirements crucial to the conduct of the supported force’s overall operation. Units conducting intelligence operations follow the operations process. Collection activities acquire information and provide that information to intelligence analytical elements. Using products developed for the commander and staff, the G-3/S-3 and G-2/S-2 develop the information collection plan based on the commander’s intent and concept of operations. The information collection plan is synchronized with current and future operations throughout the MDMP, especially during COA analysis (war game). 6-7. After the supported unit staff develops information collection tasks and assigns a collection mission to an MI unit, and the collection manager develops the information collection plan, the MI unit begins intelligence operations to support information collection through the execute collection task. The collection management team updates the information collection plan continuously based on post-collection and post- exploitation to determine if the collection satisfied the intelligence requirements. This effort is complex, and there is significant overlap between the supported unit intelligence staff and the MI unit. Therefore, the supported unit staff and the MI unit must collaborate closely and early-on during planning and throughout to the completion of operations. 6-8. Executing collection focuses on requirements connected to the execution of tactical missions based on the intelligence requirements. Intelligence informs commanders and staffs of where and when to look for— ⚫ The way: Reconnaissance, surveillance, security operations, and intelligence operations. ⚫ The means: Ranges from national and joint collection capabilities to individual Soldier observations and reports. ⚫ The end: Intelligence that supports the commander’s decision making. ⚫ The result: The successful execution and assessment of operations depend on the effective synchronization and integration of the information collection effort.
2-0
153
Intelligence Operations Collection Management, Intelligence Operations, and Collaboration The success of intelligence operations depends on the G-3/S-3, G-2/S-2, collection manager, and MI unit commander (or their representatives) closely collaborating through some complex and interrelated tasks: • The G-3/S-3 tasks information collection, inside Annex L (Information Collection) of the unit order, based on the collection management plan. • The collection management team, directed by the G-2/S-2, leads the development of the collection management plan. • The MI unit must coordinate with and provide information to the collection management team during the development of the collection management plan; this is a team effort. • The MI unit staff plans operations and produces an order, including tasks to all collection assets, based on the supported unit order, including Annex L (Information Collection). • The G-2/S-2 and the MI unit commander must collaborate on and share responsibility for some other tasks related to intelligence operations such as maintaining the intelligence architecture, performing coordination, and planning IEW maintenance. • The MI unit must immediately coordinate with the G-2/S-2 or collection manager, who in turn coordinates with the G-3/S-3, if there is a need to diverge from Annex L (Information Collection) tasks. RECONNAISSANCE 6-9. Reconnaissance is a mission undertaken to obtain information about the activities and resources of an enemy or adversary, or to secure data concerning the meteorological, hydrographic, geographic, or other characteristics of a particular area, by visual observation or other detection methods (JP 2-0). Reconnaissance produces information about the AO. It identifies terrain characteristics, enemy and friendly obstacles to movement, and the disposition of enemy forces and civilians so commanders can maneuver forces freely to gain and maintain the initiative. All units and personnel conduct reconnaissance; successful and effective units combine three methods to perform reconnaissance: dismounted, mounted, and aerial. Units primarily tasked to conduct reconnaissance with tailored and specialized capabilities include air cavalry and attack helicopter units, ground cavalry and scout units, chemical reconnaissance elements, engineer reconnaissance teams, and special operations forces. Chapter 8 discusses the types of reconnaissance. (See FM 3-55.) SURVEILLANCE 6-10. Surveillance involves observing an area to collect information; the focus and tempo of this collection effort derive primarily from the commander’s intent and guidance. Surveillance involves observing the threat and local populace in an NAI or TAI. Surveillance may be a stand-alone mission or part of a reconnaissance mission (particularly area reconnaissance). Surveillance is tiered and layered with technical assets that collect information; it is passive and continuous. (See FM 3-55.) 6-11. Surveillance tasks can be performed by— ⚫ A variety of assets (in the land, maritime, air, space, and cyberspace domains). ⚫ Means (Soldiers and systems such as artillery and air defense radars). ⚫ Mediums (throughout the EMS). SECURITY OPERATIONS 6-12. Security operations are those operations performed by commanders to provide early and accurate warning of enemy operations, to provide the forces being protected with time and maneuver space within which to react to the enemy, and to develop the situation to allow commanders to effectively use their protected forces. (ADP 3-90). Security operations are enabling operations that occur during all operations. (See FM 3-55.) Commanders usually conduct enabling operations as part of their objectives or supporting efforts. The security force uses a combination of reconnaissance and surveillance assets to accomplish its mission. Chapter 8 discusses the types of security operations. (See FM 3-55.)
2-0
154
Chapter 6 INTELLIGENCE COLLECTION, THE COLLECTION MANAGER, AND THE REST OF THE SUPPORTED UNIT STAFF 6-13. The supported commander and staff plan and assess information collection at each echelon. Typically, an MI unit supports theater army, corps, division, and BCT echelons. In these cases, the MI unit collaborates closely with the supported commander and staff to plan, prepare, execute, and assess intelligence operations. Additionally, the MI unit usually serves as the means of C2 for any attached or supporting intelligence capability at that echelon. This collaboration ensures each echelon integrates and synchronizes intelligence operations from the theater strategic down to the tactical levels. For this reason, both the supported staff and MI unit staff members must thoroughly understand all aspects of the intelligence architecture, including the following capabilities: ⚫ Collection. ⚫ PED. ⚫ Intelligence analysis activities. ⚫ Technical channels. ⚫ Procedures for IEW maintenance and other support. COLLECTION MANAGER 6-14. If not already identified, designating a collection manager as part of the intelligence staff is vital to the success of intelligence support. The collection manager, working in conjunction with the G-2/S-2 and the rest of the staff, leads representatives from each staff section through the collection management process. (See ATP 2-01 for doctrine on the collection manager and collection management team.) 6-15. Collection managers— ⚫ Collaborate with each staff section to understand and validate all intelligence requirements. ⚫ Determine communications needs and procedures. ⚫ Understand the sustainment needs of all available collection assets. ⚫ Ensure collection times are relevant and purposeful. ⚫ Assisted by the intelligence and operations staffs, ensure all tasked collection and PED requirements are nested and synchronized to answer intelligence requirements. 6-16. Regardless of the echelon, collection managers focus support on three distinct roles: ⚫ Synchronizing collection to support current operations. ⚫ Ensuring effective management and technical control across the intelligence disciplines and complementary capabilities. ⚫ Planning support to future operations. JOINT INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE ASSET INTEGRATION 6-17. Joint ISR collection assets are important to Army tactical operations. In many situations, joint ISR collection is available to tactical units, providing they are not in movement and have connectivity, either through a broadcast dissemination system or within various intelligence databases. Although planning information collection starts with organic and supporting Army collection assets, Army units may receive a joint ISR asset through joint apportionment and allocation. The joint ISR process typically requires significant prior planning and approval. This is unlikely when the joint force is trying to gain access to an AO or within a highly contested OE. However, in certain situations, when an Army unit is the main effort, joint apportionment and allocation are possible. 6-18. In order to receive joint apportionment and allocation, the theater army and corps intelligence staff must determine what joint assets are available by collaborating and conducting coordination early in the joint planning process. The staff must also understand the various joint ISR scheduling and collection management tracking mechanisms, such as the air tasking order. Additionally, the staff must establish and integrate fire support coordination, air space coordinating measures, and other important coordination means, as well as plan the appropriate relationship and control means for the joint ISR assets.
2-0
155
Intelligence Operations STAFF CAPABILITY CONSIDERATIONS 6-19. Intelligence operations are complex. The staff must know and consider the practical capabilities and limitations of all unit organic and allocated assets. Capability considerations include the following: ⚫ Range. Range deals with the collector’s ability to provide target coverage. It is important for the staff to consider mission range (duration and distance) and the sensor range (how close the collection asset must be to the target to collect against it). ⚫ Communications. The staff considers communications requirements from the asset to the CP. The staff determines the ability to maneuver, including transit and required collection time on specific NAIs and TAIs. ⚫ Day and night effectiveness. The staff considers factors such as available optics and any effects of thermal crossover. ⚫ Battery/Power source life. The staff considers how long the asset can collect and how often the battery/power source will have to be replenished to continue collection. ⚫ Bandwidth. The staff considers available bandwidth and prioritizes requirements to ensure information can be continuously transmitted and accessed. ⚫ Expendability of asset. The staff must consider the necessity to recover the collection asset or if it is expendable. What is the risk associated with emplacing and recovering the asset? ⚫ Technical characteristics. Each asset must consider time factors (such as set-up and tear-down times) for task accomplishment. Other technical characteristics include— ▪ Specific environmental threshold sensitivities for each collection asset that adversely affect or prohibit the effective use of both its platform and sensor (including factors such as terrain, weather, and soil composition). ▪ Environmental effects on the collection asset (including factors such as urban or rural terrain and soil composition). ▪ Whether the asset can continue to operate despite EA. ⚫ Reporting timeliness. Each asset is assigned an earliest time and a latest time information reporting is of value according to the information collection plan and its supporting matrix. Other timeliness factors include— ▪ How the asset transmits data/information in near real time, or how the asset should be recovered to collect the data. ▪ The established reporting criteria for each collection asset. ▪ How long it takes to disseminate collected information to each requester. ⚫ Geolocation accuracy. Accuracy implies reliability and precision. The asset must be capable of locating a target accurately enough to engage it with precision-guided munitions. ⚫ Durability. Durability includes factors such as— ▪ Weather effects on the employment of the collection asset (platform and sensor payload). ▪ EMS effects on the employment of the collection asset. ▪ Whether the prime mover can traverse restricted terrain. ⚫ Detecting threat activity. The staff considers whether the collection asset can detect the expected threat activity and whether the threat can deceive the collection capability. ⚫ Performance history. Experienced staff officers must know which information collection capabilities are typically reliable to meet the commander’s information requirements. Readiness rates, responsiveness, and accuracy, over time, may raise one collector’s reliability factor. ⚫ Intelligence PED. The staff considers whether the unit has the intelligence PED capacity, time, and architecture required to support planned and projected intelligence operations. Intelligence PED is required to conduct responsive intelligence operations to support dynamic maneuver and fire support missions. The following includes some considerations to optimize intelligence PED: ▪ Collect. To accomplish the mission, PED units and elements must have the capability to receive collection from systems. ▪ Process. The processing and fusion of collected data transform a larger volume of data into information and convert that information into a useable format.
2-0
156
Chapter 6 ▪ Exploit. PED personnel and systems quickly analyze the processed information to add operational context to the information and identify specific relevance to the mission. ▪ Disseminate. PED personnel and systems issue reports and products to provide combat information and related intelligence to commanders and operational elements. This reporting facilitates subsequent single-source and all-source intelligence, analysis, targeting, cueing of other collectors, and decision making. SECTION III – INTELLIGENCE OPERATIONS GUIDELINES 6-20. There are guidelines for conducting successful intelligence operations. They are not checklists; rather, they describe ways to employ collection assets and develop the situation based on the commander’s guidance. Mirroring the fundamentals of reconnaissance, these guidelines support efforts that result in timely collection and reporting of the accurate, relevant information needed to produce intelligence. The supported unit staff and MI unit staff must determine which guidelines to emphasize based on the situation. The following includes the intelligence operations guidelines: ⚫ Maintain readiness. ⚫ Ensure continuous intelligence operations. ⚫ Orient on requirements. ⚫ Provide mixed and redundant coverage. ⚫ Gain and maintain sensor contact. ⚫ Report information rapidly and accurately. ⚫ Provide early warning. ⚫ Retain freedom of movement. MAINTAIN READINESS 6-21. MI unit readiness is a continuous priority through predeployment, deployment, and post deployment. Readiness is a key element during planning. The readiness of MI unit personnel and equipment impacts how MI capabilities can be leveraged to support an operation during planning. MI unit readiness also impacts the collection of information required to refine plans and issue orders and for operational execution. 6-22. As part of prepare, readiness focuses on— ⚫ Training. MI commanders and leaders must establish a training plan focused on intelligence tasks and functions. This ensures MI personnel are prepared to conduct individual and collective tasks to support the unit’s mission and are knowledgeable of equipment and other collection assets and databases. During training, recognizing opportunities to prepare for conventional force and special operations force (as well as joint and interagency) interdependence, interoperability, and integration can produce great dividends during operations. MI commanders and leaders that seize opportunities to collaborate with special operations and other intelligence organizations increase their understanding of each other’s capabilities and facilitate interdependence, interoperability, and integration during operations. The Military Intelligence Training Standard (also known as MITS) series of publications—TC 2-19.400, TC 2-19.401, TC 2-19.402, TC 2-19.403, TC 2-19.404, and TC 2-19.405—provide information on MI training. ⚫ Maintenance. This recurring event ensures intelligence assets are properly maintained and prepared to conduct information collection. For example, during planning, MI leaders should consider the availability of equipment maintainers and facilities for table of organization and equipment-based and commercial-off-the-shelf systems that may require dedicated field service representatives to provide repair and maintenance. ⚫ Equipment status. The commander is ultimately responsible for equipment status. The status of collection assets must be monitored and reported to the appropriate staff elements.
2-0
157
Intelligence Operations ⚫ Augmentation. Whether in the reset-train-ready stage or preparing for a specific mission, it is necessary for MI units to identify and report any additional personnel or resources necessary to accomplish the mission. This often involves additional collection assets or specialized personnel such as linguists or technical experts. ⚫ Sustainment. This involves the identification of outside resources, including the logistics, fuel, and protection necessary for mission success. ENSURE CONTINUOUS INTELLIGENCE OPERATIONS 6-23. Commanders direct the conduct of information collection activities before, during, and after the execution of all operations. Commanders depend on intelligence to know where, when, and how best to employ forces during all military operations. Typically, collection activities begin soon after receipt of mission and continue throughout the preparation and execution of the overall operation. Collection activities do not cease after the operation concludes but continue as required: ⚫ Before execution of the overall operation, intelligence operations focus on filling information gaps about all relevant aspects of the OE. ⚫ During execution, intelligence operations focus on providing commanders with updated information that verifies the threat’s composition, disposition, and intention as the operation progresses. This allows commanders to verify which COA the threat is actually adopting and determine if the plan is still valid based on actual events in the AO. Commanders can then make decisions, as needed, including adjustment decisions (those that modify the order to respond to unanticipated opportunities or threats). ⚫ After execution, intelligence operations focus on maintaining contact with threat forces to collect the information necessary for planning subsequent operations and protecting the friendly force. In stability operations, intelligence operations often focus on relevant aspects of the AO and AOI and on the civil considerations designated by the commander. ORIENT ON REQUIREMENTS 6-24. Commanders prioritize intelligence operations primarily by providing their guidance and intent early in planning. G-2/S-2s assist commanders in— ⚫ Identifying and updating their PIRs. ⚫ Ensuring PIRs are tied directly to the concept of operations and decision points. ⚫ Focusing PIRs on their most critical needs (because of limited collection assets). ⚫ Ensuring PIRs include the latest time information is of value (also called LTIOV) or the event by which the information is required. ⚫ Approving requests for intelligence collection requirements beyond a unit’s capabilities. ⚫ Aggressively seeking the results of higher-echelon intelligence operations as well as the answers to information requirements across all echelons through intelligence reach. 6-25. Commanders assign information collection tasks based on a unit’s collection capabilities. Therefore, commanders ensure the tasks they assign do not exceed the collection and analytical ability of their unit. When not using organic assets, commanders use previously established relationships to optimize effective operations as a combined arms team, when possible. PROVIDE MIXED AND REDUNDANT COVERAGE 6-26. Commanders integrate their assets’ capabilities to provide mixed and redundant coverage of critical locations identified during planning. The layering of collection assets through cueing, redundancy, and mixing assists in successfully answering requirements. Maximum efficiency in information collection is achieved when all collection assets are carefully employed together. The appropriate mix of collection assets assists in satisfying as many different requirements as possible. It also reduces the likelihood the unit will favor or rely on one particular unit, discipline, or system. The intelligence and operations staffs collaborate to balance requirements, available capabilities, and areas to be covered. Commanders and staffs continuously assess results to determine any changes in critical locations requiring this level of coverage.
2-0
158
Chapter 6 GAIN AND MAINTAIN SENSOR CONTACT 6-27. Once a unit conducting intelligence operations gains sensor contact, it maintains that contact unless directed otherwise or the survival of the unit is at risk. In intelligence operations, gaining and maintaining sensor contact occur when the collection asset can observe or receive a signal or is observable from a person or object. Sensor contact is critical in signals intercept and imagery collection missions. REPORT INFORMATION RAPIDLY AND ACCURATELY 6-28. Collection assets acquire and report timely and accurate information on all relevant aspects of the OE within the AOI. Collection assets report exactly what they observe and, if appropriate, what they do not observe. Seemingly unimportant information may be extremely important when combined with other information. Negative reports may be as important as reports of threat activity. To ensure collection assets report information rapidly, the intelligence staff collaborates with the signal staff to ensure communications plans incorporate collection asset communications requirements. The collection manager must establish a PACE communications plan for each collection asset and ensure it has been tested as information may quickly lose its value. Indicators and SIRs should be written such that they can be answered over the radio by a simple spot report in SALUTE format from the collection asset. PROVIDE EARLY WARNING 6-29. Commanders and staffs position collection assets to provide early warning of threat action. Commanders use intelligence operations as part of their information collection effort to ascertain the threat COA and timing. They then orient these assets to observe these locations for indicators of threat actions. Timely and complete reporting is essential to providing early warning. RETAIN FREEDOM OF MOVEMENT 6-30. Collection assets require battlefield mobility to successfully accomplish their missions. These assets do not engage in close combat in the execution of their collection tasks. The criticality of collection assets makes their survival the utmost consideration. If these assets are decisively engaged, collection stops, and personnel immediately execute the necessary battle drills. The collection asset leader’s initiative and knowledge of the terrain, weather, and threat reduce the likelihood of decisive engagement and assist in maintaining freedom of movement. The IPOE process can identify anticipated areas of likely contact. SECTION IV – CONDUCTING INTELLIGENCE OPERATIONS 6-31. Intelligence unit planning begins with receipt of mission, identifying information collection tasks in an order or plan. The unit then deliberately plans, prepares, and executes the mission in close coordination with the supported unit collection manager and other staff members to satisfy specific requirements. During the execution of intelligence operations, collection assets and supporting PED elements process, exploit, and disseminate intelligence reports and combat information. The staff continually assesses the effectiveness of the information collection plan to support the operations process. Combat information identified by the G-2/S-2 is immediately disseminated to the commander. APPLYING THE OPERATIONS PROCESS IN INTELLIGENCE OPERATIONS 6-32. The operations process describes the sequence of activities performed by any military unit to accomplish a mission. (See ADP 5-0.) MI units conduct the same sequence of activities (plan, prepare, execute, and assess) to accomplish the tasks assigned to them. MI units follow the operations process to conduct intelligence operations the same way maneuver units do to conduct their operations. However, the conduct of intelligence operations requires collaboration and close coordination with the supported unit intelligence staff. (See figure 6-2.)
2-0
159
Intelligence Operations Figure 6-2. Intelligence support PLAN 6-33. Planning is the art and science of understanding a situation, envisioning a desired future, and determining effective ways to bring that future about (ADP 5-0). It results in a plan or order that communicates the commander’s intent, understanding, and visualization of the operation to subordinates, focusing on desired results. Mission Planning 6-34. Mission planning begins when the MI unit receives or anticipates a new mission. This can come from an order issued by higher headquarters or derived from an ongoing operation. The MI unit relies on established SOPs to articulate individual and collective responsibilities during planning. The SOPs identify the participants, their responsibilities, and the tools or products required to produce intelligence. 6-35. Upon mission receipt, the supported unit’s order and annexes must be examined to identify specified and implied tasks and constraints contained in the order’s annexes. The MI unit commander and leaders should review Annex B (Intelligence), Annex D (Fires), Annex F (Sustainment), Annex H (Protection), Annex L (Information Collection), and Annex S (Special Technical Operations) to the base OPORD, as well as all supporting appendixes and tabs. Military Intelligence Unit Commander 6-36. During planning, the MI unit commander uses specified and implied tasks, the supported unit’s commander’s guidance and staff assessments, and the information collection plan. This allows the MI unit commander to tailor planning considerations, which include but are not limited to— ⚫ Determining the amount and type of equipment required and available for the mission. ⚫ Determining and requesting the augmentation of personnel and equipment, including required PED support to conduct single-discipline and multidiscipline intelligence operations. ⚫ Determining and requesting the augmentation of personnel for complementary capabilities. ⚫ Determining the communications (network and voice) and connectivity architecture, requirements, and limitations to support the mission. ⚫ Coordinating with other units to support the MI unit’s mission, including but not limited to— ▪ Medical personnel to establish casualty evacuation procedures. ▪ The fire support officer to coordinate fire support.
2-0
160
Chapter 6 ▪ The airspace coordinator if using airborne intelligence systems. ▪ Supported units to ensure the required mission, communications, logistics, and life support are available for the MI element/personnel. ▪ Maneuver units to coordinate terrain management where MI personnel are expected to operate. ▪ Adjacent MI unit commanders to identify threat information and coordinate and deconflict operations. ⚫ Observing subordinate execution of TLP by section, platoon, and company leaders. ⚫ Identifying language requirements and requesting augmentation, as appropriate. ⚫ Identifying intelligence contingency funds requirements. (See AR 381-141.) ⚫ Identifying IEW maintenance support and procedures before deployment. During deployment, this requires continuous assessment, especially when there are few or no organic IEW technicians and facilities. Troop Leading Procedures 6-37. During planning, MI unit leaders below the MI battalion level conduct TLP to prepare for intelligence operations. The troop leading procedures are a dynamic process used by small-unit leaders to analyze a mission, develop a plan, and prepare for an operation (ADP 5-0). These procedures enable leaders to maximize available planning time while developing effective plans and preparing their units for an operation. TLP are also supported by risk management. It is important for MI unit leaders to collaborate with both their higher MI unit (when applicable) and the supported unit throughout the entire TLP process. 6-38. The TLP and the MDMP are similar but not identical. Commanders with a coordinating staff use the MDMP (see table 3-3 on page 3-12); company-level and smaller units use the TLP (see figure 6-3). 6-39. TLP consist of eight steps. The sequence of the TLP steps is not rigid. Leaders modify the sequence to meet the mission, situation, and available time. Some steps are performed concurrently while others may be performed continuously throughout the operation. Step 1—Receive the Mission 6-40. MI leaders analyze mission objectives and current capabilities to accomplish the assigned mission, assess any possible issues (personnel, equipment, or maintenance) that could limit mission support, and raise any issues to the MI commander and supported that could hinder mission accomplishment unit. Step 2—Issue a Warning Order 6-41. MI leaders of elements supporting a mission issue a WARNORD to participating elements and personnel as soon as possible (usually within an hour after receipt of mission). This ensures subordinate leaders have key information needed to maximize preparation time. The MI unit may have to issue multiple WARNORDs due to additional information or changes to the supported unit’s WARNORD. The initial WARNORD should include a task organization (provides the detailed task organization for the mission: formation, personnel, and equipment) and timeline (provides a schedule of all preparatory tasks from receipt of mission to the start of collection). Step 3—Make a Tentative Plan 6-42. MI leaders create a tentative plan based on the supported unit’s WARNORD that attempts to meet mission requirements and remain within the framework of the commander’s intent. MI leaders ensure— ⚫ MI personnel and elements have all available information to complete the mission. ⚫ Soldiers are prepared to execute any tasks assigned to them and their section/element. ⚫ All equipment and vehicles are prepared for the mission, inventoried, and operational.