USMC Co Intel Team System
USMC Co Intel Team System
USMC Co Intel Team System
X-File 2-1.1
DESTR UCT ION NOTICE: Destroy by any method that will prevent
disclosure of con tents or rec ons truction of th e do cum ent.
X-File 2-1.1
No single phase of the cycle is more important than the others. All
of the phases are interdependent. Without proper direction, the
other phases will not focus on the correct objectives. Without
effective collection, there may be too much or too little
information and what information there is may prove to be
irrelevant. Without processing and production, there is a mass of Figure 2 Intelligence Development/Intelligence Cycle
random data instead of the knowledge needed for the planning and
execution of operations.
Summary of the Intelligence Cycle S Deliver knowledge, in context, in time, and in a form
usable in the decision making process.
• Planning and Direction: S Provide timely, accurate, and relevant intelligence to
S Identify intelligence needs. commanders and planners.
S Develop a plan for satisfying those needs. S Can be complex or simple, such as direct answers to
rapidly changing questions needed to support FB
• Collection: operations.
S Imagery systems. S Deliberate production makes full use of available
S Electronic intercept equipment. information to provide a complete and extensive product
S Human intelligence (HUMINT) sources. that satisfies non time-sensitive intelligence requirements.
S Sensors < Normally supports operations planning.
< surveillance or target acquisition, S Immediate production identifies information directly
< air surveillance radar, applicable to current operations. Information is subjected to
< counterbattery radar, and a compressed version of the production process, and the
< remote ground sensors. resulting product is rapidly disseminated to those affected.
S Combat data from reporting by operational units. < Normally associated with mission execution.
Need to Establish
The SASO mission in the urban environment presents a daunting
challenge to maintain situational awareness in support of nearly
constant noncontiguous operations—primarily patrolling—at the
rifle company level. In order to make this tactically feasible, rifle
companies normally establish a “firm base” (FB) from which they
operate patrols even as they stabilize their area of operations with
the presence of the firm base. (See X-File 3-11.11 The Company
Commander in SASO for complete discussion if this.)
NOTE
W e do n ot dep loy in order to o ccup y a FB. W e occu py a firm b ase to
conduct offensive operations in our zone. FB ops should not be the
prim ary foc us o f the C om pan y Co mmand er.
Functions of the Company Intel Cell • Enable rapid decision making and generation of tempo.
• Train the company intel cell members.
These include: S Company Intelligence Chief.
• Receive direction from the battalion intelligence officer and the S Intelligence Clerk(s).
company commander.
S This drives the company intelligence collection plan. Manning the Intel Cell
• Establish a briefing/debriefing process for organic and attached In the absence of T/O billets, the manning of the intel cell has to
units. be assigned as a collateral duty for suitable members of the
• Supervise the collection effort. existing company staff. You are well served to staff the intel cell
• Coordinate with the commander in order to task collectors with with about six (6) Marines. For example, artillery forward observer
information requirements. (FO) teams make great intel cells. The necessary billets are:
• Brief and debrief patrols including attachments. • Intelligence Cell Leader;
• Ensure proper equipment and training for assigned mission. S Company XO or Weapons Platoon Commander.
• Debrief collectors. • Intelligence Chief.
• Process or analyze and organize information. • Intelligence Clerks.
• Use intelligence analytical tools to continuously update a
company-level Intelligence Preparation of the Battlespace. If the company FB has a Marine trained in the Intelligence field,
• Identify: do your best to capitalize on his unique training. Avoid the
S Patterns and trends. temptation to use him on radio watch or guard. Ensure that he is
S Threat TTPs. provided both the time and opportunity to debrief posts and
S Threat organizational relationships. patrols, prepare reports and track patterns and information. Give
S Battlefield effects. him the opportunity to frequently and consistently talk to
S Civilian population. indigenous personnel in and around the FB. And, provide him the
S Infrastructure. opportunity to accompany foot and mounted patrols within your
• Supervise the production of these intelligence products; e.g., tactical area of responsibility. In addition to giving him “on the
S Intelligence Summaries. ground” awareness, it will also enhance his tactical credibility with
S Enemy activity overlays. all members of the FB.
S Situational maps.
S Link analysis diagrams.
• Disseminate intelligence to the commander and the battalion
intelligence officer.
S Radio, digital, verbal.
• Advise the commander on use of intelligence in operations.
• Coordinate or contribute to the targeting process.
• Describe potential environmental advantages and limitations.
• Ascertain enemy strengths to be avoided.
• Uncover enemy vulnerabilities that can be exploited.
• Recommend Courses of Action (COAs);
S based on weather, enemy, and terrain.
Control of Photographs
Treat photos as sensitive information with strict controls and
guidance for their handling. For example, if the object of a FB
photo knows that he is being collected against, he may relocate.
This may disrupt other collection methods in place such as
HUMINT and signals intelligence (SIGINT) that are not under the
control of the company intel cell. And, there is always the
possibility that our own photos could somehow be used for
propaganda against us or to possibly tip off some of our TTPs.
Video Cameras
Although it is not as easy to carry as a digital camera, a video
camera can record exactly what happened during significant events
witnessed by Marines. Instead of relying solely upon a verbal Figure 5 Dragon Eye Components
debrief, a patrol can now show the intel cell exactly what
happened, and review each event in sequence. This data can also
be easily passed on to HHQ in its original format, ensuring that the Among the tactical DE missions that can support the company FB
analysts at the battalion, regimental, or division level can see intel cell are:
everything just as the Marines on the deck saw them. • point and area reconnaissance,
• confirm other intelligence sources,
Dragon Eye (DE) • survey city area, before the entry of forces,
• support mounted and foot patrols,
This is a back-packable unmanned aerial vehicle (UAV) that is • identify suspected enemy forces,
designed to provide over-the-hill / around-the-corner • avoid fratricide,
reconnaissance for use at the lowest tactical level in any phase of • very limited battle damage assessment, and
operations. Its sensors provide the company commanders with an • deceive the enemy of our intentions in an area.
organic surveillance, reconnaissance and intelligence capability.
DE flights can potentially respond to opportunities and specific The entire system can be assembled, readied for flight, and
tactical requirements. launched in 10 minutes. It is operated by a two-man team.
Figure 5 is a picture of the DE components and one (1) UAV. The DE system is transportable to the field by any of the surface
vehicles in the Marine Corps inventory. Two Marines can
Dragon Eye sensors include full motion color, low light black and backpack, launch and operate the system with one or two UAVs,
white, and infrared (IR) cameras, each having the capability to one ground control station and ancillary equipment.
transmit video. DE battery endurance at normal speed is
approximately 60 minutes. It has the capability to capture still
images as digital photos for later use in the intelligence process.
Tracking Type Location Remarks Un it whoever is studying the map can quickly identify the significance
of each marking. For example, you could position green pins on
Infantry patrol the map to represent enemy ambushes. There will not be enough
engages enem y room on the map to write in all the relevant information about the
fire team sized
unit attem pting to event, so you need an easy way to find the information in either the
load am bus h site original report or the enemy activities matrix. This is where the
131800 Sm all
along MSR. Sm ith tracking number comes in.
38SMB234567 Team carried Patrol
Jun03 A rm s
small arms, 1 s t Plat The example in Table 2 (above) uses the date/time group as the
IED s, a nd cell
phones . Papers tracking number. You can either write the tracking number on the
from ene m y KIA map next to the pin or mark designating the location where the
turne d into S -2. 1 event took place—or—draw a line from the pin to the margin of
enemy detained. the map and write the tracking number there. Depending upon the
4 enem y number of events depicted, it will probably be easier to simply
captu red while write the tracking number neatly next to the symbol.
removing
weapons from Jones Using Command and Control Personal Computer (C2PC)
151400
Cache 38SMB234568 cache site. Patrol
Jun03
Cache contained 3 rd Plat
12 x AK-47, 3 x If the company intel cell has a dedicated computer—and has some
RPG w/rockets, trained operators—the tracking system can be done almost entirely
IED m aterials. using C2PC and Microsoft Office applications. In order to set this
Table 2 Enemy Activities Matrix for C Company up, you will need the S-2 to load digital maps onto the computer so
that they can be displayed in C2PC.
Note that the tracking number indicates when the events took place
and where to find the original reports in the file. The spreadsheet Use Microsoft Excel to create a spreadsheet or spreadsheets to
gives the location, what happened, and any results. Additional build an enemy activities matrix that can be printed or simply
information is up to the user's discretion. viewed on the computer. Also, you can create a hyperlink that will
automatically bring up any reports that have been stored digitally.
Tracking Graphically To do this, simply highlight the tracking numbers assigned to each
incident, (e.g., patrol reports, CI reports, IntSums from HHQ, etc.)
The next step is to graphically display each enemy activity or and use the right mouse click to create (and label) the hyperlink.
significant event that takes place within the company's zone in a Additional hyperlinks can link the spreadsheet to other analysis
useful and meaningful manner. One way is to use an enemy tools such as a time association matrix or summaries and
activities overlay, as described above. Using an overlay will keep assessments produced based upon the information in the matrix.
the intelligence map free from clutter and easy to view if there has
been a significant amount of enemy activity. However, if you want Use the overlays function on C2PC to create and easily manipulate
to depict enemy actions directly on the situation map, the enemy activities overlays, lines of communication overlays, lines
techniques are identical to those used on the overlay. Use different of division overlays, or any other analysis tool used with the
symbols, marks, or pins, so that each action is depicted so that situation map.
Figure 7 Sample
Connections
NOTE
Wh enever possible, make sure that the patrol that was debriefed
gets a co py of the fina l produ ct that is distributed . This bo th
confirm s that the info rmation is correct and encourages the patrol
because they see their efforts supporting the collective operations
of the u nit.