FM 2-0 Intelligence Operations
FM 2-0 Intelligence Operations
FM 2-0 Intelligence Operations
INTELLIGENCE
OPERATIONS
APRIL 2014
DISTRIBUTION RESTRICTION:
Distribution authorized to U.S. Government Agencies and their contractors only because it
requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG
091913Z Mar 04. This determination was made on 5 September 2013. Other requests must be
referred to ATTN: ATZS-CDI-D, U.S. Army Intelligence Center of Excellence, Fort Huachuca, AZ
85613-7017, or via e-mail at [email protected].
DESTRUCTION NOTICE:
Destroy by any method that will prevent disclosure of contents or reconstruction of the document
in accordance with AR 380-5.
Intelligence Operations
Contents
Page
PREFACE..............................................................................................................iii
INTRODUCTION ...................................................................................................iv
Chapter 1 FOUNDATIONS OF INTELLIGENCE OPERATIONS ....................................... 1-1
Role of Intelligence Operations .......................................................................... 1-1
U.S. Code and Intelligence Authorities............................................................... 1-1
Information Collection and Intelligence Operations ............................................ 1-2
Intelligence Operations Guidelines ..................................................................... 1-3
Intelligence Operations Contributions to the Intelligence Process ..................... 1-5
Using the Operations Process in Intelligence Operations .................................. 1-8
Intelligence Operations and the Integrating Processes.................................... 1-11
Intelligence Operations and the Continuing Activities................................................ 1-14
Regionally Aligned Forces ................................................................................ 1-14
Special Operations Forces Integration ............................................................. 1-14
Mission Command of Intelligence Operations .................................................. 1-15
Language Support ............................................................................................ 1-20
Chapter 2 BRIGADE COMBAT TEAM INTELLIGENCE OPERATIONS .......................... 2-1
Intelligence Capabilities Across the Brigade Combat Team .............................. 2-1
Company Intelligence Support Team ................................................................. 2-2
Battalion Intelligence Cell ................................................................................... 2-2
Brigade Combat Team Intelligence Cell ............................................................. 2-3
Military Intelligence Company ............................................................................ 2-8
Counterintelligence Augmentation ................................................................... 2-20
Remote Sensors ............................................................................................... 2-21
DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government Agencies and their contractors only
because it requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG
091913Z Mar 04. This determination was made on 5 September 2013. Other requests must be referred to ATTN:
ATZS-CDI-D, U.S. Army Intelligence Center of Excellence, Fort Huachuca, AZ 85613-7017, or via e-mail at
[email protected].
DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the
document in accordance with AR 380-5.
*This publication supersedes Appendix B of FM 2-0, dated 23 March 2010. It completes the supersession of FM 2-0,
dated 23 March 2010. Chapters 1 through 13 and appendix A of that manual were superseded by ADRP 2-0,
dated 31 August 2012.
Figures
Figure 2-1. Signals intelligence baselines............................................................................ 2-13
Figure 2-2. Line of bearing ................................................................................................... 2-14
Figure 2-3. Approximate emitter location based on a cut .................................................... 2-14
Figure 2-4. Probable emitter location based on a fix ........................................................... 2-15
Tables
Table 1-1. Sources of law, policy, and other documents applicable to intelligence
operations ........................................................................................................... 1-2
Table 1-2. Intelligence preparation of the battlefield and intelligence operations ................ 1-12
Table 1-3. The targeting process and intelligence operations ............................................. 1-13
Table 1-4. Army command and support relationships ......................................................... 1-18
Table 4-1. Joint ISR and Army information collection responsibilities ................................... 4-5
Note. FM 2-0 uses TUAS (for tactical unmanned aircraft system) in discussions specific to the
RQ-7B Shadow, which is organic to the MI company and battlefield surveillance brigade. It uses
UAS (for unmanned aircraft system) in discussions of topics common to all UAS categories.
FM 2-0 refers to elements of intelligence staff organizations by the name used for them in tables
of organization and equipment. When task-organized in a command post, these organizations
fulfill the role of staff elements as described in ATTP 5-0.1.
Table 1-1. Sources of law, policy, and other documents applicable to intelligence operations
EXECUTE COLLECTION
1-16. Intelligence operations are driven by the need to answer questions crucial to the conduct of the
overall operation of the supported force. Units conducting intelligence operations follow the operations
process. Collection activities acquire information and provide that information to intelligence analytical
elements. Information and data collected during intelligence operations may require processing, where
collected data is correlated and converted into a format suitable for analysis and further exploitation.
Processing during collection remains distinct from the intelligence process steps of analysis and production in
that the resulting information is not yet fully subjected to analytical techniques that produce an intelligence
product. Nevertheless, relevant, time-sensitive information resulting from processing and exploitation
(especially targeting, personnel recovery, or threat warning information) should be immediately disseminated
to commanders and staffs to facilitate timely operations.
ORIENT ON REQUIREMENTS
1-20. Commanders prioritize intelligence operations primarily through providing their guidance and
commander’s intent early in planning. Commanders—
Identify and update their priority intelligence requirements (PIRs).
Ensure PIRs are tied directly to the concept of operations and decision points.
Focus PIRs on their most critical needs (because of limited information collection assets).
Ensure PIRs include the latest time information is of value or the event by which the information
is required.
Approve requests for intelligence for collection requirements beyond a unit’s capabilities.
Aggressively seek the results of higher echelon intelligence operations and answers to information
requirements across the intelligence enterprise through intelligence reach.
1-21. Commanders assign information collection tasks based on a unit’s collection capabilities. Therefore,
commanders ensure the tasks they assign do not exceed the collection and analytical ability of their unit.
When not using organic assets, commanders use habitual relationships to optimize effective operations as a
combined arms team, when possible.
their echelon, as well as those at echelons above and below, and how to request and manage those assets. (See
ADRP 2-0.) Combatant command and subordinate joint forces apportion joint assets to subordinate echelons.
Corps and divisions allocate support from the apportioned assets to brigade combat teams (BCTs) and below.
Staff members must understand the system of apportionment and allocation. They determine what joint assets
are available by conducting collaboration and coordination early in the planning process. The staff must also
analyze the higher headquarters order and review the various scheduling or tracking mechanisms. Due to the
complexity of intelligence operations, the staff must know and consider practical capabilities and limitations
of all unit organic assets. Capabilities include the following:
Range. Range deals with the collector’s ability to provide target coverage. When considering an
asset’s range, it is important to consider mission range (duration and distance) and how close the
collection asset must be to the target to collect against it. Additionally, intelligence staffs consider
communications requirements from the asset to the command post. The staff determines—
Ability to maneuver, including travel and support times.
Transit and dwell times, if the best asset is an aerial system such as an unmanned aircraft
system (UAS).
Day and night effectiveness. Staffs consider factors such as available optics and any effects of
thermal crossover.
Technical characteristics. Each asset has time factors (such as set-up and tear-down times) for
task accomplishment that must be considered. Other technical characteristics include the following:
Whether the sensor can see through fog or smoke.
The effects of the environment on the collection asset (including factors such as urban or
rural terrain and soil composition).
Whether the asset can continue despite electronic attack.
Reporting timeliness. Each asset is assigned an earliest time and a latest time information
reporting is of value to the information collection plan. Other timeliness factors are—
The established reporting criteria for each collection asset.
How long it takes to disseminate collected information to each requester.
Geolocation accuracy. Accuracy implies reliability and precision. The asset must be capable of
locating a target accurately enough to engage it with precision-guided munitions.
Durability. Durability includes such factors as—
Whether the aircraft can launch in high winds or limited visibility.
Whether the prime mover can cross restricted terrain.
Threat activity. The staff considers whether the collection asset can detect the expected threat
activity.
Performance history. Experienced staff officers know which information collection assets are
reliable to meet the commander’s information requirements. Readiness rates, responsiveness,
and accuracy over time may raise one collector’s reliability factor.
PED enablers. The staff considers whether the unit has the PED enablers required to support
more flexible and responsive intelligence operations. (See ADRP 2-0.)
COLLECT
1-32. Intelligence operations are a major contributor to the collect step. These operations involve
collecting, processing, and reporting information in response to information collection tasks. Effective
intelligence operations allow flexibility and responsiveness to changing situations and adaptive threats. The
effective use of the intelligence architecture allows for the dynamic execution of intelligence operations. (See
ADRP 2-0.)
1-33. Effective collection requires using a variety of mutually reinforcing collection assets. Planned
redundancy of MI collection assets increase the reliability of information and can reduce the effectiveness of
enemy deception or denial efforts. (See paragraph 1-22.)
1-34. During intelligence operations, MI collection assets collect information, process it, and report it to
the appropriate intelligence staff for analysis—or, in the case of combat information, directly to the
appropriate commander for immediate action.
1-35. Collection focuses on requirements tied to the execution of tactical tasks. MI collection assets
executing intelligence operations are performing collection activities. These activities acquire information
about the threat and AO and provide that information to the intelligence staff for analysis and other
exploitation.
1-36. MI collection assets process collected information before reporting it. Processing converts
information into a form in which it can be used for reporting and intelligence analysis. This usually involves
placing the information in a standard report format (such as the spot report). It may involve translating the
material. Some MI information systems have their own processing systems, with details in the appropriate MI
system manuals and technical manuals.
1-37. Timely and accurate reporting of information is critical to developing the intelligence essential to
successful operations. Information and intelligence is delivered as voice, text, graphic, or digital media. Voice
data is reported over tactical radios on the command net or operations and intelligence net. Text, graphic, and
other digital media are reported over mission command network systems and deposited in the common
database, e-mail accounts, and on the unit’s Web page.
1-38. Combat information and intelligence that affects the current operation is reported and disseminated
immediately upon recognition. Combat information is unevaluated data, gathered by or provided directly to
the tactical commander which, due to its highly perishable nature or the criticality of the situation, cannot be
processed into tactical intelligence in time to satisfy the user’s tactical intelligence requirements (JP 2-01).
Some collection assets, particularly air and ground reconnaissance, can report combat information. The
routing of combat information proceeds immediately in two directions: directly to the commander, and
through routine reporting channels, which include intelligence analysis and production elements.
PRODUCE
1-39. Production (which involves analysis and synthesis) can be complex or simple. Complex production is
required for comprehensive products such as detailed intelligence studies for predeployment or higher
echelon operation planning. Simple production is necessary for products like information commanders need
to make quick decisions in a time-constrained situation. There is an inherent friction between the desire to
provide complete, accurate intelligence reports and the continuous requirement to support time-sensitive
tactical decisionmaking. In practice, these conflicting demands must be balanced by using both stated
direction (such as the commander’s intent and PIRs) and knowledge of the operational situation to determine
when to finish and disseminate a report.
DISSEMINATE
1-40. Timely dissemination of intelligence is critical to the success of operations. Effective dissemination
is deliberate, based on a communications architecture that includes a dissemination plan. Every echelon
works together to tailor the communications architecture, making it as efficient as possible by removing
information-sharing barriers.
ANALYZE
1-41. The detailed analysis that converts information into intelligence occurs during the production step.
However, hasty analysis occurs as part of processing at various stages throughout the intelligence process and
is inherent in all intelligence support to situational understanding and decisionmaking. (See TC 2-33.4.)
Collectors perform processing and initial analysis before reporting. For example, for a HUMINT collector
processing involves reviewing the results of a source meeting to determine and analyze if any of the
information meets reporting criteria and then completing the appropriate report.
1-42. All-source intelligence analysts and staffs use analytical techniques in situation development to
determine the significance of collected information and its significance relative to the threat, terrain, weather,
civil considerations, and other relevant aspects of the operational environment. Through predictive analysis,
the staff attempts to identify threat activity or trends that present opportunities or hazards to the friendly force.
They often use indicators developed for each threat course of action as the basis for their analysis and
conclusions. All-source intelligence analysts and staff rely on the distributed PED enablers sent forward with
collectors and a federated analytical approach. Federated analysis allows analysts at various echelons to
simultaneously work together on identifying threat activities and trends, answering PIRs and other
intelligence requirements, and predicting the threat courses of action. (For more information on distributed
PED enablers and federated analysis refer to doctrine on intelligence support to brigade operations and
intelligence support to division and above operations.)
ASSESS
1-43. The intelligence process assess activity is part of the overall assessment activity of the operations
process. For intelligence purposes, assessment is the continuous monitoring and evaluation of the current
situation, particularly significant threat activities and changes in the operational environment. Assessing the
situation begins upon receipt of mission and continues throughout the intelligence process. Friendly actions,
threat actions, terrain, weather, civil considerations, and events in the area of interest interact to form a
dynamic operational environment. Continuous assessment of the effects of each of these on the others,
especially the overall effect of threat actions on friendly operations, is essential to situational understanding.
received. For MI collection assets conducting intelligence operations, preparation activities include but are
not limited to—
Conducting necessary coordination, link-up movements, staging, terrain deconfliction, and
terrain reconnaissance in accordance with the order and unit standard operating procedures
(SOPs).
Verifying fire support, casualty evacuation, fratricide avoidance, airspace coordination, and
other coordination measures and procedures.
Coordinating with the Air Force weather team on weather effects on collection assets and
sensors.
Refining plans, backbriefs, SOP reviews, and rehearsals, and coordinating with various elements
and organizations.
Making other coordination as the situation requires.
requirement, the staff relieves the affected MI collection assets of responsibility for information collection
tasks related to that requirement.
1-62. As the situation changes, staffs also adjust the information collection plan to keep information
collection tasks synchronized with the overall operation, optimize collection, and support future operation
planning. As collected information answers requirements, the staff removes tasks associated with those
requirements from the information collection plan.
1-63. Changes to the situation may require retasking MI collection assets to answer new intelligence
requirements. The operations staff issues orders to retask assets. This is normally done in consultation with
the intelligence staff and other staffs as appropriate. Retasking is assigning an MI collection asset a new task
and purpose. Retasking may involve simple adjustments undertaken by the MI collection asset to meet the
new requirements or may require movement to another location. Significant retaskings require staff
coordination and deconfliction as discussed in paragraphs 1-50 and 1-51.
TARGETING
1-66. Targeting is the process of selecting and prioritizing targets and matching the appropriate response to
them, considering operational requirements and capabilities (JP 3-0). Army targeting uses the functions
decide, detect, deliver, and assess (D3A) as its methodology. Intelligence operations support the targeting
process by the following: locating targets; identifying, classifying, and tracking targets; observing actions on
targets; determining whether to engage or continue collection on targets; and assessing the effects of those
actions. MI collection assets collect information to aid in situation development, target acquisition, functional
damage assessment, munitions effects assessment, and battle damage assessment; however, many cannot
support all these tasks at the same time. Therefore prioritizing the information tasks given to them is critical.
Thorough planning and disciplined execution use high-demand MI collection assets more efficiently. (Table 1-3
on page 1-13 describes the relationship of the targeting process and intelligence operations. For doctrine on
targeting see FM 3-60. For doctrine on fires planning see ADRP 3-09.)
Decide
1-67. The decide function provides the overall focus and sets priorities for intelligence operations that
support targeting. This function draws heavily on IPB products and continuous assessment of the situation.
Targeting priorities are addressed for each phase or critical event of an operation. The decisions made are
reflected in the following products:
High-payoff target list, a prioritized list of high-payoff targets.
Information collection tasks to support targeting requirements.
Detect
1-68. Intelligence operations locate and track targets during the detect function. Requirements for target
detection and tracking are expressed as information collection tasks. These are incorporated into the
information collection plan and passed to MI collection assets as missions. Their priority depends on the
importance of the target to the concept of operations.
1-69. MI collection assets report information they collect, processing it as necessary. In the intelligence
cell, targeting information is forwarded to all-source intelligence analysts for situation and target
development. Once a target specified for attack is identified, the analysts pass it to the fires cell. The fires cell
directs execution of the attack based on the fire support plan. Coordination between the intelligence staff and
the fires cell is essential to ensure that the targets are passed to an attack system that will engage the target.
Deliver
1-70. The deliver function involves attacking targets with lethal or nonlethal weapons systems. The
requirement to observe delivery of fires, adjust artillery fires, or control air-delivered fires is not normally
assigned to MI collection assets.
Assess
1-71. The assessment function is continuous and directly tied to the commander’s decisions throughout the
conduct of operations. Intelligence operations conducted to assess the effects of fires contribute to
assessment. For MI collection assets, missions to assess the effects of fires take the same form as other
collection missions. The commander incorporates information collected during intelligence operations into
combat assessment to determine if attacks have had the required effects or if reattack is necessary.
Table 1-3. The targeting process and intelligence operations
Targeting
Key input Key output
function
• Commander’s intent • High-payoff target list
• Completed intelligence preparation of • Target selection standards
Decide
the battlefield products • Attack guidance matrix
• Targeting requirements • Input to information collection plan
• Intelligence operations to identify and
• Information collection tasks Detect track key targets for delivery of fires
• Decision to attack target (with lethal • Intelligence operations to continue to
or nonlethal weapons) Deliver identify and track targets
• Attack guidance matrix
Dynamic Targeting
1-72. Dynamic targeting has six steps: find, fix, track, target, engage, and assess. Targets of opportunity
have been the traditional focus of dynamic targeting, because decisions on whether and how to engage must
be made quickly. Planned targets are also covered during dynamic targeting, but the steps simply confirm,
verify, and validate previous decisions. In some cases, dynamic targeting requires change or cancellation to
planned missions. The find, fix, and track steps tend to be information-intensive, while the target and engage
steps are typically labor-, unit-, and decisionmaking-intensive. The final step of dynamic targeting is
assessment. (See ADRP 3-09.)
RISK MANAGEMENT
1-74. Risk management is the process for identifying, assessing, and controlling risks arising from
operational factors and making decisions that balance risk cost with mission benefits (JP 3-0). Throughout the
operations process, commanders use risk management techniques to develop mitigation and control measures
to help manage risk and protect the force. (See ADRP 3-37 for doctrine integrating risk management into
protection.)
1-75. For intelligence operations, risk management applies both to hazards to MI collection assets and to
the resulting information and intelligence. Disclosure of any information that could possibly compromise the
source of the information and tie it to intelligence operations must be consistent with U.S. national policies
and military objectives.
objective that otherwise might not be attainable. The best means of employing SOF is usually with
conventional forces in which each force fulfills the role it is optimally designed to accomplish.
1-84. During extended or large-scale operations involving both conventional forces and SOF, combined
control and deconfliction measures take on added significance and the integration and synchronization of
conventional and special operations missions are critical. The tactical commander must consider both
conventional and special operations capabilities and limitations, particularly in the areas of tactical mission
command and sustainment. The exchange of liaison elements between the staffs of appropriate conventional
forces and SOF further enhances integration of all forces concerned.
1-85. The exchange of liaison elements between the staffs of appropriate conventional forces and SOF
further enhances integration of all forces concerned. These liaison elements aid in executing the mission,
precluding fratricide, and eliminating duplication of effort, disruption of ongoing operations, or loss of
intelligence sources. These efforts are crucial to maintaining the overall unity of effort, coordination of
limited resources, and campaign tempo. SOF and conventional forces integration considerations include the
following:
Exchange and use of liaison and control elements are critical when conventional forces and SOF
conduct operations in the same operational area against the same threat.
A thorough understanding of a unit’s capabilities and limitations enhances integration and
interoperability planning.
During mission planning, options regarding how to integrate conventional forces and SOF
maneuver elements should be considered. Detailed planning and execution coordination is
required throughout the process.
Successful integration and interoperability of conventional forces and SOF are dependent upon
each understanding the other’s missions, systems, capabilities, and limitations.
1-86. Special operations missions are both intelligence-driven and intelligence-dependent. Intelligence
products developed for SOF must be detailed, accurate, relevant, and timely. For example, infiltrating a
building in a hostile noncombatant evacuation operation requires exact information on its structure and
precise locations of hostages or persons to be rescued. National- and theater-level intelligence products are
often required at a lower echelon than is normally associated with support to conventional forces. They may
also require near real-time dissemination to the operator level.
1-87. Special operations requirements are heavily mission- and situation-dependent. Because SOF
missions may vary widely, the associated intelligence support also may vary. Therefore, intelligence support
for SOF requires a thorough understanding of special operations requirements at the tactical level. This causes
national and theater support to be much more detailed and precise to support special operations requirements.
(See ADRP 3-05 for more details. The following variables can affect intelligence support:
Combat (hostile) or cooperative noncombat (permissive) environments.
Multinational, joint, or unilateral operations.
Force composition.
Maritime or land-based operations.
Mission duration.
Mission command elements and intelligence support facilities.
Adversary capabilities, objectives, and operational concepts.
Troops and support available. Available MI collection assets determine the possible
intelligence operations. Organic assets are often augmented by capabilities from higher
headquarters. Command and support relationships may limit how supported units employ these
assets.
Time available. When planning intelligence operations, staffs consider both the time required to
collect information and the time required to produce intelligence from that information. It makes
no sense to collect information if there is not enough time to produce intelligence from it. Staffs
pay particular attention to the time available before H-hour when considering whether to execute
intelligence operations to support planning.
Complexity of synchronizing intelligence operations. Intelligence operations by nature are
conducted over a wide breadth and depth of the supported command’s AO. Successful
intelligence operations require coordination across multiple echelons. They require airspace and
ground-space deconfliction and coordination. They require a tailored approach for PED enablers
to ensure assets are able to communicate, process, exploit, and disseminate efficiently and
effectively.
TASK-ORGANIZING
1-92. Planners carefully consider the appropriate command or support relationship needed for each
situation. Planners balance responsive support to the augmented unit with flexibility to distribute the low-
density, high-demand MI collection assets as necessary across the AO. Planners consider command and
support relationships along with the mission variables when developing plans and orders. The following
discussion addresses factors to consider for intelligence operations. (See ATTP 5-0.1 for doctrine on task-
organizing.)
Command Relationships
1-93. Command relationships are used when the most responsive employment of augmenting MI units is
required. Army command relationships are assigned, attached, operational control (OPCON), and tactical
control (TACON). Each relationship has inherent responsibilities associated with it. (See table 1-4 on page
1-18.) All relationships other than assigned temporarily associate the augmenting MI unit with the gaining
unit. Augmenting units return to their MI parent unit at the end of the operation, as specified in the plan or
order directing the relationship, or when directed by a fragmentary order.
1-94. OPCON normally provides full authority to task-organize augmenting commands and forces and to
employ those forces as the gaining commander considers necessary. It does not, in and of itself, include
authoritative direction for logistics or matters of administration, discipline, internal organization, or unit
training. A significant consideration in the OPCON relationship is that sustainment and other administrative
control (ADCON) responsibilities remain with the parent MI unit unless the plan or order directing the
relationship specifies otherwise. Normally, modifications to the inherent responsibilities are directed in the
Tasks to Units subparagraph of paragraph 3 of the order (for example, 1st BCT: Provide security and
sustainment support to 1/1/A/32 MI).
1-95. TACON limits the gaining commander’s authority to the detailed direction and control of movement
or maneuver necessary to accomplish the missions or tasks assigned. TACON does not provide authority to
change the organizational structure of the augmenting asset or direct administrative or logistic support.
Support Relationships
1-96. Commanders establish support relationships when subordination of one unit to another is
inappropriate, such as when limited MI collection capabilities must support multiple units. Support
relationships provide the greatest flexibility to distribute MI collection assets across an AO. Support
relationships are graduated from an exclusive supported and supporting relationship between two units—as in
direct support—to a broad level of support extended to all units under the control of the higher
headquarters—as in general support. Support relationships do not normally alter ADCON. Intelligence
operations normally use two support relationships: direct support and general support.
Note. Paragraphs 1-104 and 1-105 do not apply to HUMINT support to detainee operations. See
FM 2-22.3 for detailed information on this task.
1-107. Brigade control (general support) eliminates one echelon in planning, control, and reporting. This can
decrease planning time and improve responsiveness and flexibility. Brigade control may be appropriate under
these conditions:
The analytical requirements exceed the capacity of the supported battalion or reconnaissance squadron.
The TUAS launch and recovery section and/or the common ground station are close to the
controlling BCT command post, and the launch and recovery and common ground station elements
are close enough to the required named areas of interest to ensure sufficient time on station.
1-108. Supported battalion control (direct support) may be appropriate when the TUAS launch and recovery
section and common ground station are close to the battalion command post and both elements are close
enough to the required named areas of interest to ensure sufficient time on station.
TECHNICAL CHANNELS
1-109. Information normally moves throughout a force along specific transmission paths, or channels.
Establishing command and support relationships directs the flow of reported information during intelligence
operations. Channels help streamline information dissemination by ensuring the right information passes
promptly to the right people. Commanders and staffs normally communicate through three channels:
command, staff, and technical. (See ADRP 6-0 and FM 6-02.71.)
1-110. For intelligence operations, technical channels are the transmission paths between intelligence units
(including sections) performing a technical function requiring special expertise. Technical channels control
the performance of technical functions. They neither constitute nor bypass command authorities; rather, they
serve as the mechanism for ensuring the execution of clearly delineated technical tasks, functions, and
capabilities to meet the dynamic requirements of unified land operations. Establishing intelligence technical
channels ensures oversight of and adherence to existing policies or regulations for information collection
tasks contained within the information collection plan. It also ensures compliance with all applicable U.S.
laws and policy, including, but not limited to, those listed in table 1-1 on page 1-2. In specific cases,
regulatory authority is granted to national and DOD intelligence agencies for specific intelligence discipline
collection and is passed through technical channels.
1-111. Commanders direct operations but often rely on MI technical expertise to plan portions of the unit’s
intelligence operations effort. This expertise includes focusing information collection tasks involving SIGINT
collection, HUMINT military source operations, and CI. It involves applying highly technical or legally sensitive
aspects and specific parameters to each task. Information and requirements concerning these areas are passed over
technical channels. Specifically, uses of technical channels include, but are not limited to, the following:
Defining, managing, or prescribing techniques for the employment of specific MI collection assets.
Identifying critical technical collection criteria, such as technical indicators.
Recommending collection techniques, procedures, or assets.
Receiving classified reporting from MI collection assets.
LANGUAGE SUPPORT
1-112. Military operations are highly dependent on military- and contractor-provided foreign language
support. The requirement to communicate with and serve on multinational staffs, communicate with local
populations, and collect information necessitates the use of linguists. The growing focus on multinational
operations increases the competition for limited linguist resources that are vital for mission success. Language
support requirements typically fall into one of four broad categories:
Intelligence operations. This category includes the traditional SIGINT, HUMINT, and CI
disciplines, as well as foreign language support to protection and exploitation of open-source
information.
Operations and multinational liaison. This category includes coordination of military
operations and liaison with multinational partners, previously unaffiliated nations, host-nation
personnel and offices, and at times adversary or former adversary nations. (See ATTP 5-0.1.)
Civil affairs operations. Civil affairs operations enhance the relationship between civil
authorities and military forces. They involve applying civil affairs functional specialty skills to
areas normally under the responsibility of the civil government. These operations involve
establishing, maintaining, influencing, or exploiting relations between military forces and all
levels of host-nation government agencies. These activities are fundamental to executing
stability operations and stability tasks conducted during offensive and defensive operations.
Civil affairs personnel, other Army forces, other government agencies, or a combination of all
three performs these tasks. Foreign language support is critical to civil affairs in such areas as
government liaison, legal agreements, medical support and operations, law enforcement,
engineering projects, public safety, security, and population control. (See FM 3-57.)
Sustainment. This category consists of foreign language support to sustainment functions.
These functions include logistic contracting; port, railhead, airhead, or transshipment operations;
and convoy operations. (See ADP 4-0 and ADRP 4-0.)
1-113. The G-1 or S-1 is responsible for the linguist staffing and replacement management. The G-4 or S-4
has duties and responsibilities in some circumstances when local hire contract linguists are utilized to support
operations. Each staff element is responsible for determining linguist requirements for their staff or
warfighting function needs.
38 (Civil Affairs).
Functional area 48 (Foreign Area Officer).
09L (Interpreter-Translator).
Contract Linguists
1-119. U.S. civilians can be contracted to provide linguist support. They have an advantage over local-
national hires because their loyalty to the United States is more readily evaluated and it is easier for them to
be granted the necessary security clearance. However, there are usually severe limitations on the deployment
and use of civilians. A careful assessment of their language ability is important because, in many cases, they
use old-fashioned terms or interject U.S. idioms. If the linguists are recent immigrants, the use of the
language in their country of origin could be dangerous to them. Similarly, their loyalty may reside with their
country of origin, religious group, tribal affiliation, or other close connections when the interests of these
groups are at odds with U.S. interests.
1-120. Local-national hires often provide the bulk of linguist support. They are usually less expensive to
hire than U.S. civilians are and know the local dialect, idioms, and culture. The expertise of these linguists in
particular areas or subject matters can be an asset.
1-121. All commands must comply with the CI screening policy for contract linguist support. This may be
done by the hiring agency within the joint operations area or by CI personnel. These individuals must also be
screened by CI personnel periodically throughout their employment.
1-122. When requesting civilian contract linguists, the commander and staff must identify requirements by
category. The contract linguist categories are—
Category I. Category I linguists are locally hired personnel with an understanding of the English
language. They undergo a limited screening, are hired in-theater, do not possess a security
clearance, and are used for unclassified work. During most operations, category I linguists must be
rescreened on a scheduled basis. Category I linguists cannot be used for intelligence operations.
Category II. Category II linguists are U.S. citizens who have native command of the target
language and near-native command of the English language. They undergo a screening process
that includes a national agency check. Upon favorable findings, these personnel are granted a
Secret Collateral clearance.
Category III. Category III linguists are U.S. citizens who have native command of the target
language and native command of the English language. They undergo a screening process that
includes a special background investigation and a polygraph. Upon favorable findings, category III
linguists are granted an interim or final Top Secret/Sensitive Compartmented Information
clearance by the designated U.S. Government personnel security authority.
equipment, or one linguist team per location where the function is to be performed. The staff then determines the
number of linguists needed for an operation based on the tasks to be performed and the allocation of linguists.
Within this process the staff considers the different dialects within the AO when determining language support
requirements. The intelligence cell at each echelon is responsible for the following:
Identifying category II and category III linguist requirements needed to support intelligence
functions in all contingency areas. Intelligence staff requirements for linguist support include but
are not limited to the following:
Evaluate and/or use local maps and terrain products in operations.
Assess local open-source information for intelligence value.
Determining linguist requirements, based on the mission and on the foreign languages and
dialects spoken in the AO.
Providing intelligence training for MI linguists employed in AOs.
Coordinating for security investigations, as necessary, for local-hire linguists.
Providing support to CI screening of contracted linguists and hired local-national labor force.
1-125. For policy on the Army foreign language program, see AR 11-6.
Note. Forming and resourcing the COIST is vital to its successful employment. The earlier the
COIST is formed, the better. Early formation allows opportunities to practice and refine SOPs
prior to deployment. Communications requirements for the COIST require consideration by the
battalion and company commanders and staff.
COMPOSITION
2-14. The BCT intelligence cell consists of—
The BCT intelligence staff section, established by a unit table of organization and equipment.
The section is the core around which the BCT S-2 forms the BCT intelligence cell.
Designated Soldiers from the BCT MI company.
An assigned Air Force weather team.
BCT S-2
2-15. The BCT S-2 is the principal advisor to the BCT commander and staff for all matters concerning the
intelligence warfighting function. In that role, the S-2 leads the intelligence cell and advises the commander
on intelligence matters. The BCT S-2 helps the commander focus and integrate MI collection assets and
resources to satisfy BCT intelligence requirements. Some of the specific responsibilities of the S-2 are—
Oversee the BCT intelligence cell’s activities, specifically support to—
Situation development.
Lethal and nonlethal targeting.
Indications and warnings.
Assessment.
Protection.
Provide the commander and staff with assessments of threat capabilities, intentions, and courses
of action as they relate to the BCT and its mission.
With the S-3, help the commander coordinate, integrate, and supervise the conduct of
intelligence operations. This includes but is not limited to—
Overseeing the intelligence cell’s contributions to planning requirements and assessing
collection. (See ATTP 2-01.)
Recommending changes to the information collection plan based on changes in the situation
and weather.
Participate with the staff in performing IPB.
Evaluate language support requirements and manage linguist support for intelligence operations.
Coordinate for foreign disclosure training (when conducting operations with multinational
partners).
BCT S-2X
2-16. The S-2X is the principal advisor for all matters concerning the conduct of HUMINT and CI
activities. The S-2X staff element provides oversight and technical support for all HUMINT and CI
activities. This staff element assists the BCT staff in developing HUMINT and CI collection requirements.
(See TC 2-22.303 for 2X doctrine.)
2-17. While the MI company is responsible for tactical HUMINT collection, the S-2X provides the
collection focus, technical support, and technical guidance. The S-2X receives support and advice from the
BCT legal section. The S-2X—
Develops specific information requirements for HUMINT from the PIRs.
Deconflicts and synchronizes all HUMINT and CI activities in the BCT’s AO.
Coordinates technical support as needed for the HUMINT assets in the BCT’s AO.
Performs analysis of HUMINT reporting and provides input to the MI company’s analysis
platoon.
Oversees the BCT’s source registry.
Oversees the BCT’s intelligence contingency fund and source incentive program.
Reviews HUMINT tasking, funding requests, and collections to ensure compliance with legal,
regulatory, and procedural guidelines.
Oversees the reporting of questionable activities committed by intelligence employees in
accordance with AR 381-10, procedure 15.
Participates in planning for deployment and employment of CI assets in support of operations.
(CI assets from higher headquarters normally augment the BCT.)
FUNCTIONS
2-20. The BCT intelligence cell produces tailored intelligence analysis and products to support the
commander, staff, and subordinate units by performing the following functions:
Facilitate commanders’ visualization and understanding of the threat, terrain and weather, and
civil considerations, as well as other relevant aspects of operational environment within the BCT
area of interest.
Support targeting and protection.
Assist in information collection planning.
Produce intelligence products.
Disseminate and integrate intelligence.
the information necessary to selectively apply and maximize combat power at critical points in time and
space. (See FM 2-01.3.)
What are the unit’s intelligence processing capabilities (personnel and systems)?
Does the unit have enough personnel (operators and maintainers) to conduct distributed analysis,
provide PED enablers, and provide analytical and other support from multiple locations in the
AO?
Where are the unit’s intelligence production elements?
What equipment is needed to support intelligence operations and intelligence staff operations
and to provide analytical and other support from multiple locations in the AO?
Are the systems within the intelligence architecture (collection, production, and processing)
compatible with each other, and how do those systems communicate?
Identify the intelligence databases that intelligence staff personnel must access and the networks
or systems that are necessary to access them.
Identify users who require access to unit intelligence Web sites, Web postings, data files, and
databases, conforming to the appropriate U.S. law, DOD regulations, classification guidelines,
and security protocols.
Identify any special requirements necessary to access this data (that is, security clearance,
polygraph, training or certification, regulatory, procedural, and so forth) and the points of
contact to acquire the necessary authorization and permissions.
How does the unit work around incompatibility within the other warfighting functions’
architectures?
What are the security requirements to support intelligence operations and intelligence staff
operations?
What language support capabilities are needed for intelligence operations, key leader
engagement, and multinational liaison and information sharing.
How can the unit access databases and information from higher echelons and other agencies?
Are there special requirements necessary to access these databases, such as a security clearance,
polygraph, training, or certification?
How are unified action partners integrated into the intelligence architecture?
What are the personnel training requirements for equipment, systems, and software to establish
and maintain the intelligence architecture?
PLANNING CONSIDERATIONS
2-44. During the BCT’s planning, the MI company commander advises the BCT staff on employment
considerations of MI company assets and may assist in information collection planning. Mission variable
considerations affect the ability of the MI company commander to support BCT planning. When the BCT
commander approves the order, the MI company commander produces a company order. In addition to task
organization considerations addressed in ATTP 5-0.1, the MI company commander—
Reallocates and repositions company assets in response to changes in the BCT’s mission or
threat actions.
Establishes sustainment and security relationships with the BCT headquarters company and
subordinate battalions to sustain and protect MI company personnel and equipment as specified
in the BCT order.
Integrates higher echelon augmentations into company operations as directed in the BCT order.
2-45. MI leaders ensure that intelligence operations conform to and support the commander’s intent, concept
of operations, scheme of information collection, and the scheme of maneuver. Key questions for planning
intelligence operations and integrating them into the overall BCT operation may include the following:
What is the BCT task organization?
How will terrain affect the employment of MI company assets?
What effect will weather have on the capabilities of MI company assets?
How does the selected friendly course of action portray the threat and the threat’s reactions to
the plan?
What coordination is required with supported subordinate commanders and staffs?
What is the role of intelligence operations within the scheme of information collection?
Does the scheme of fires require intelligence operations support for target location and tracking?
Does the scheme of fires require intelligence operations support for battlefield damage assessment?
Does the communications plan provide adequate support for intelligence operations?
Does the BCT order provide for sustainment of MI collection assets that cannot be sustained by
the BCT headquarters company?
Do any MI collection assets require engineering support?
Does the scheme of mobility/countermobility require intelligence operations support?
Are there requirements or opportunities for biometrics collection?
Terrain
2-46. Terrain and vegetation have a significant impact on intelligence operations, particularly on the following:
Operational effectiveness of line-of-sight sensors.
Requirements for line-of-sight communications.
Time-sensitive dissemination of collected information.
2-47. SIGINT and imagery collection systems require line of sight to the target area to be effective.
Accordingly, planners assess the effects of natural and artificial obstacles—such as mountains, buildings,
and vegetation—on planned intelligence operations.
2-48. Commanders assigned an AO are responsible for terrain management within its boundaries. Effective
terrain management ensures commanders know what units are in their AO and where they are located. This
information helps commanders deconflict operations, control movement, and prevent fratricide. Terrain
management includes the movement and positioning of MI collection assets. The intelligence staff
coordinates MI collection asset movement and positioning. The MI company commander ensures assets are
at locations to conduct intelligence operations according to the information collection plan.
Weather
2-49. Weather is a critical factor in most intelligence operations. Adverse weather and its associated effects
may degrade the ability to identify and locate targets. Weather effects on platforms and sensors can also
limit the type, location, and availability of collection capabilities. The MI company receives weather
information from the Air Force weather team in the BCT intelligence cell. (See paragraphs 2-18 and 2-19.)
Threat
2-50. A detailed threat analysis is performed to determine how and where to employ MI collection assets
and how to obtain the best possible information about the threat. Intelligence operations can be hampered
by the threat’s air defense capability and by camouflage, cover, concealment, and deception activities.
Threat electronic warfare capabilities must be determined to assess their effects on the following:
Unmanned aircraft systems.
Various downlinks.
Communications links from collection assets to their controlling headquarters.
Sustainment
2-53. Sustainment considerations affecting intelligence operations include the following:
Logistics.
Maintenance, both motor maintenance on prime movers and electronic maintenance on
collection systems and sensors.
Supplies, especially fuel (class III), major end items, including radios (class VII), medical
(class VIII), and repair parts and components for equipment maintenance (class IX).
Personnel services. Human resources support.
Health service support. Medical evacuation.
Combat Engineer
2-54. When planning intelligence operations, MI company commanders should consider combat engineer
support requirements for mobility, countermobility, and survivability; contingency spill plans; disposal of
hazardous materials; and detecting and neutralizing explosive hazards. (See FM 3-34.22.)
Communications
2-55. Effective communications—analog or digital, voice or data, secure or nonsecure—is essential for
successful intelligence operations. A complete communications plan addresses many technical details. Key
requirements and planning considerations for intelligence operations include the following:
Determine and coordinate radio net requirements, supporting frequencies, and operational procedures
for reporting collected information.
Obtain the required type and amount of communications equipment and related components.
Possess and be familiar with all instructions, passwords, policies, regulations, and directives
required for operations security.
Ensure Soldiers are trained in the use and procedures involved in operating the equipment, such
as reactions during jamming.
Verify the fills, frequencies, alternate frequencies, and reporting guidelines for specific information.
Coordinate collection and dissemination procedures with multinational forces.
Establish, operate, and manage collection asset-specific communications networks.
2-56. The MI company operates on several communications nets. Communications redundancy reduces the
likelihood that losing any one system or command post will severely disrupt support to BCT operations. MI
company assets use three basic communications nets: the operations and intelligence nets, command nets,
and a discipline-specific technical net.
2-57. Operations and intelligence nets links the information collectors to controlling headquarters or
command posts. They are used to pass information of immediate value to the affected unit and to analytical
elements at the supported unit.
2-58. Command nets link higher headquarters with its subordinate elements. Normally a unit operates on two
command nets: one that links it to its higher headquarters and one that links it to its subordinate elements.
2-59. Technical nets link the control team to subordinate collection teams and to the centers or
organizations that provide the databases and technical guidance necessary for single discipline collection,
reporting, and analysis. (See paragraphs 1-109 through 1-111.)
2-60. Trojan SPIRIT communications systems are organic to the MI company. Through the Trojan SPIRIT
network, intelligence analysts gain access to national centers and other intelligence organizations outside
the BCT’s AO. Via these links, analysts can pull intelligence products, receive and analyze direct
downlinks from intelligence collection assets, and access external databases to fuse with organically
collected information. Trojan SPIRIT also provides access to JWICS through its joint deployable
intelligence support system (also called JDISS).
MULTIFUNCTIONAL PLATOON
2-61. In the near future, the design of the BCT MI company will change with the creation of one design for
each of the three types of BCTs—infantry, armored, and Stryker. The multifunctional platoon of the MI
company can employ multifunctional teams capable of multidiscipline collection and limited analysis.
Alternatively, it can employ a combination of SIGINT, HUMINT, and exploitation teams. The
multifunctional platoon is composed of—
Ground-based SIGINT and HUMINT collection teams.
An exploitation team. The exploitation team is responsible for receiving information and intelligence,
conducting initial analysis, and forwarding the results to the BCT intelligence staff and/or the
appropriate intelligence organization for further analysis.
2-62. The multifunctional platoon supports offensive, defensive, and stability tasks by providing—
Support to targeting, using SIGINT terminal guidance; tagging, tracking, and locating; and
intelligence collection.
Support to site exploitation, which includes support to document and media exploitation,
biometrics collection and enrollment, and battlefield forensic collection and limited exploitation.
Intelligence operations that include—
Determining threat locations, disposition, and intent.
Supporting interrogation of detained personnel.
Conducting SIGINT collection, direction finding of threat communications, support to SIGINT
surveys, and limited analysis.
Conducting military source operations. The multifunctional team or HUMINT collection
team can leverage relationships with the local population (especially leaders) to gain additional
information on the enemy’s intentions and to identify threats. They can also assist with debriefing
displaced persons and interrogating detainees.
Assisting in the conduct of threat vulnerability assessments.
Performing limited all-source intelligence analysis.
2-63. The multifunctional platoon’s flexible design permits it to be employed in a number of
different ways for simultaneous missions. The platoon possesses the organic equipment needed to
accomplish most missions; however, it may be augmented with specialized equipment to expand its
capabilities. The specific design and any requirements for augmentation are based on the situation
(described in terms of the mission variables, METT-TC) and outcomes of the BCT’s military
decisionmaking process and the MI company commander’s and the platoon leader’s troop leading
procedures. The troop leading procedures are a dynamic process used by small-unit leaders to
analyze a mission, develop a plan, and prepare for an operation. These procedures enable leaders to
maximize available planning time while developing effective plans and preparing their units for an
operation.
2-64. The platoon leader employs the platoon’s mix of capabilities to answer the commander’s specific
information requirements identified for each mission and to identify combat information. The platoon is
most successful when supported by the S-2X or G-2X and cryptologic support teams. Without these
organizations and relationships, the platoon may be limited to tactical questioning, support to situation
development, limited SIGINT and targeting analysis, and HUMINT liaison opportunities. (See ATP 2-19.5
for doctrine on the multifunctional team.)
Survivable. The position can protect the system from observation and threat fires and can
be exited quickly.
Achievable. The site can be reached by the collection asset under the anticipated weather,
trafficability, and visibility conditions.
Controllable. The site has line-of-site communications with the command post and with
other systems with which it must maintain data links or communications.
Tie the locations into baselines. Baselines normally are created in conjunction with phase lines
established in the supported unit’s concept of operations.
Coordinate with the operations staff for approval of locations. Coordination is critical in terrain
management and fratricide avoidance.
Include baseline locations on the information collection overlay and any other operational
graphics.
the flexibility to provide collection support to units during a variety of missions. Also, the greater the distance
from the collection asset to the emitter, the greater the possibility for error.
collector or analyst can determine the emitter’s most probable location. Some systems are designed to
automatically determine the emitter’s location without collector or analyst action.
Note. Military source operations are only conducted by HUMINT collectors. A HUMINT
collector is a person who is trained to collect information from individuals (HUMINT sources)
for the purpose of answering requirements. HUMINT collectors include trained and certified
enlisted personnel in MOS 35M, warrant officers in MOSs 351Y and 351M, commissioned
officers in area of concentration 35F, and their federal civilian employee counterparts. Trained
and certified civilian contractors can perform debriefing, screening, and other activities in
support of HUMINT operations.
2-87. Screening. As it applies to HUMINT collection, screening is the process of evaluating and selecting
human sources and documents for the prioritized collection of information based on the collection
requirements and mission of the unit conducting the screening. Screening categorizes and prioritizes
sources based on the probability of a particular source having priority information and the level of
cooperation of the source.
2-88. Debriefing. Debriefing is the process of overtly questioning cooperating human sources to satisfy
requirements, consistent with applicable law. The source usually is not in custody and usually is willing to
cooperate. Debriefing may be conducted at all echelons and throughout the range of military operations.
The primary categories of sources for debriefing are refugees, émigrés, displaced persons, local civilians,
and friendly forces.
2-89. Liaison. Liaison activities are programs to coordinate activities and exchange information with host-
nation military and civilian agencies, unified action partners, and nongovernmental organizations.
2-90. (FOUO) Controlled Source Operations. Controlled source operations are conducted using recruited
sources that respond to direction and control of the handling agent or collector and that are tasked and
provide information for which the source has placement and access. (See classified TC 2-22.307.)
2-91. Interrogation. HUMINT interrogation is the systematic process of using approved interrogation
approaches to question a captured or detained person to obtain reliable information to satisfy intelligence
requirements, consistent with applicable law and policy (FM 2-22.3). (See DODD 3115.09 and FM 2-22.3
for applicable law and policy.)
Zone Reconnaissance
2-106. The typical planning area for a UAS zone reconnaissance is five by eight kilometers in rural areas
and three by three kilometers in urban areas. UAS zone reconnaissance provides broad area search with
minimal target acquisition capability and is used to confirm or deny the existence of vehicles or personnel.
Area Reconnaissance
2-107. The typical planning area for a UAS area reconnaissance is three by five kilometers in rural areas
and one by one kilometer in urban areas. UAS area reconnaissance provides a narrower search area than
that of zone reconnaissance as well as the ability to acquire and report location data. It should be used to
confirm or deny threat activity and is often cued by another information collection asset. Both broad area
coverage and directed search area techniques are used for area reconnaissance.
Point Target
2-108. A point target is a specified imaging target. This mission is conducted to provide the clarity of
detail required for specific equipment identification or precision targeting. This type of mission is best
suited for identifying static or semistatic targets that require detailed analysis to answer specific
requirements. Point targets in a directed search area are the most common technique.
ultimately involves each echelon from company to BCT. At each echelon, full-motion video requirements
are developed, refined, and tasked for collection, or the requests are forwarded to higher echelons. This is
based on several factors, including aircraft capability, airspace coordination measures, operational
requirements, and weather. To be used efficiently, full-motion video requires more coordination than any
other collection capability within the BCT. There are three types of collection requests: preplanned and
immediate requests, and dynamic retasking.
Preplanned Requests
2-117. Preplanned requests are those anticipated by the requesting unit far enough in advance to permit
detailed mission coordination and planning. They may also be standing requests for indications and
warnings or force protection. The intelligence cell monitors and analyzes threat activity and supports
targeting while providing feedback to the commander to aid decisionmaking. Coupled with continuous
assessment, preplanned collection enables the seamless transition from preplanned missions to dynamic
retasking and cueing of other information collection assets. Preplanned requests typically focus on—
Indications and warning—key events and potential indicators.
Target development—collection and refinement of information needed to determine the type
and duration of action needed to create the effects specified in the attack guidance matrix.
Target verification—assistance in establishing the identification and status of a target.
Combat assessment—collection of information to support combat assessment.
Situational understanding—collection of information used to develop knowledge and understanding
of the current situation.
Immediate Requests
2-118. An immediate collection request is submitted outside the normal information collection planning
cycle after the air tasking order and daily information collection plan are published. It attempts to integrate
collection into a time-sensitive operation. Proper coordination through the chain of command is vital
throughout the process. Subordinate units must coordinate immediate collection requests with their higher
headquarters. This makes the request process quicker and ensures proper prioritization of immediate
requests with regard to existing requests.
Dynamic Retasking
2-119. Another type of request is dynamic retasking. The most notable difference between immediate
requests and dynamic retasking is aircraft launch status. Typically, immediate requests require generating a
new mission. Dynamic retaskings are requests that divert existing missions to new priorities. Dynamic
retasking requires a greater level of risk assessment, as some approved collection requirements must be
cancelled to meet a dynamic retasking. In addition to risk assessment, dynamic retaskings require a stricter
approval process and an increased level of airspace coordination because airspace situational understanding
by aircrews and air controllers is necessary.
Mission Execution
2-120. Mission execution involves conduct of the flight and the delivery of information, combat
information, and targeting data to the requester or others who require it. Digitization allows a high volume
of data to be received, correlated, analyzed, and viewed graphically. With digitization, information can
flow directly from the collector or processor to the requester in near real time.
COUNTERINTELLIGENCE AUGMENTATION
2-121. The BCT may receive CI teams from a higher echelon unit. CI at the tactical level is primarily
focused on CI support to protection. CI assets at the tactical level are instrumental in protecting bases from
infiltration, collection, and targeting by foreign intelligence and security services and international terrorist
organizations. (See FM 2-22.2.)
2-122. The employment of CI teams includes varying degrees of contact with the local population. As the
degree of contact increases, both the quantity and quality of CI collection increases. However, in many
instances, there is a risk to CI teams inherent with increased exposure to the local population. The decision
at what level to employ a CI team is situation-dependent. The risk to the CI assets must be balanced with
the need to collect against PIRs and to protect the force as a whole. Rules of engagement, status-of-forces
agreements, direction from higher headquarters, and the overall threat level may also restrict the
deployment and use of CI teams.
2-123. The situation and the command and support relationships influence the execution of CI plans and
operations. The CI scheme of support and support relationships are established in the CI appendix to the
intelligence annex to the BCT order, fragmentary orders, or other directives. (See ATTP 5-0.1.)
2-124. Characteristics of the AO influence the nature and extent of CI operations. The following AO
factors influence CI employment:
Historical and recent espionage, sabotage, subversion, or terrorist activities within the AO.
Population density.
Cultural makeup of the civilian population.
Attitude of the people and political groups toward friendly and threat forces.
Population’s susceptibility to threat penetration (hostile intelligence threat) and propaganda.
Stability of the local government, security, and law enforcement.
2-125. The number of CI resources available is critical. Careful planning, awareness of CI operations
throughout the deployed force joint operations area, and detailed intelligence and operations preparation are
required. CI targets should be identified as early as possible at the start of a contingency or new operation;
then appropriate operations are planned to exploit or neutralize threats. Care is taken to not overestimate CI
element capabilities. This risks overextending and dispersing CI activities on too many targets with limited
effectiveness. CI elements can be deployed on an area coverage concept or by unit assignment.
AREA COVERAGE
2-126. CI elements employed under area coverage are assigned a specific geographic area. Under area
coverage, CI support is provided to commands located within the designated area. CI elements continue to
operate within the assigned area, even when the tactical situation or supported units operating in the area
change.
2-127. General support is the best support relationship to use for area coverage. General support best
provides the means to meet the specific operational requirements of supported forces with limited organic
CI resources.
2-128. Area coverage provides the greatest continuity of tactical CI operations. It allows CI operations to
focus on the threat’s intelligence organization and activities while remaining unrestricted by the AOs
assigned to supported units. It also allows CI personnel to become familiar with the area, threat intelligence
organization and operations, and CI targets. Area coverage is particularly effective when conducting
stability tasks where threat demographics or operating areas do not match friendly force boundaries.
UNIT ASSIGNMENT
2-129. Situational and operational factors may require some CI elements to be either attached or placed in
direct support of the BCT (for example, during operations involving widely separated units in areas of
dense population). CI elements employed on a unit assignment basis normally remain with designated
supported units in a direct support relationship. The supported unit normally provides sustainment. They
operate within that unit’s AO under the specified relationships. In such cases, supported unit commanders
employ CI personnel to satisfy their CI requirements or other missions specified by the commander.
REMOTE SENSORS
2-130. Remote sensors are used to perform such tasks as perimeter defense, surveillance, environmental
monitoring (including radiological, nuclear, and early warning), and target acquisition. Remote sensors are
not an MI collection asset; however, they do provide information used to cue MI collection assets to
activity and should be considered when preparing the information collection plan. They are hand-emplaced
by Soldiers or robotic vehicles either inside or outside buildings and structures.
2-131. Remote sensors can be employed in almost any tactical situation. However, their optimal
employment is in areas where major movement is restricted to a few key lines of communications and the
traffic pattern of military and civilian activity can be easily discriminated. Remote sensor missions are
ideally suited to support relatively stable situations, such as long-term defensive or security operations,
where the time and resources are available to develop an extensive sensor network throughout the AO.
Remote sensors have limited utility in fast-moving mobile missions, raids, and other limited-duration
operations unless adequate time and means are provided to emplace sensors before executing the operation.
In addition, the employment of sensors in open terrain or heavily congested urban concentrations requires
detailed planning to ensure the sensor network can provide the desired information in those environments.
APPLICATIONS
2-132. Remote sensors may be employed in the following roles.
General Surveillance
2-133. In the general surveillance role, sensors are used to provide general surveillance of lines of
communications, helicopter landing zones, assembly areas, objectives, and other named areas of interest.
Sensor information is used to develop the general threat situation and support the concept of operations
through the detection of threat activity near insertion points or other objectives.
Early Warning
2-134. In the early warning role, sensors are placed along avenues of approach to provide early warning
of threat movement toward friendly positions. Sensor strings may be placed forward, on the flanks, or in
the rear of friendly units to facilitate force protection. In this application, sensors should be implanted as far
forward of friendly positions as possible, exploiting the extended range of the remote sensor system to
provide maximum reaction time.
Target Acquisition
2-135. A well developed sensor network can be used for target acquisition. Sensors are implanted along
key threat lines of communications or targeted areas of interest; then sensor activations are used to initiate
targeting action. The key limitation of sensors in this application is the inability to discriminate between
hostile, friendly, and noncombatant activity. As a result, sensor data normally must be confirmed by some
other reconnaissance, surveillance, or MI collection asset.
2-136. Sensors do provide an excellent means of facilitating the targeting process through the cueing of
other target acquisition sources. Once a target is positively identified, a well planned sensor network can track
a target as it moves across the AO. If used for target acquisition, care must be taken not to compromise the
location of sensor strings through repeated attacks on threat forces located in the same area.
Environmental Monitoring
2-137. Remote weather sensors are used in data-sparse or operationally significant regions to collect
critical weather observations to enhance the quality and quantity of weather data.
CAPABILITIES
2-138. Remote sensors have the following capabilities.
Remote Surveillance
2-139. Remote sensors provide an extended-range surveillance capability without the requirement to
maintain a physical presence in the surveillance area. With relays to maintain line-of-sight communications
connectivity between the sensors and the monitoring site, monitoring can be conducted a hundred miles or
more from the surveillance area. This capability gives commanders a means to economically monitor
activity in the AO, conserving the use of other reconnaissance, surveillance, and MI collection assets for
other critical tasks.
Continuous Operations
2-142. Sensors operate day and night, in all weather conditions. Individual sensors can operate
continuously for up to 30 days; relay systems can function for up to 45 days. Battery life is the primary
factor limiting sensor and relay endurance. Battery life depends on the number of activations and
transmissions required, along with weather and other environmental factors.
Stealth
2-143. Properly emplaced remote sensors are extremely difficult to detect. Built-in electronic
countermeasures also make electronic detection and countermeasures against remote sensors unlikely. To
enhance system security, individual sensors contain an alarm circuit that notifies the monitoring station if
the sensor is tampered with.
Flexibility
2-144. Remote sensors can be employed in a variety of means to support the concept of operations.
Sensors can be hand-emplaced by mounted or foot patrols or dropped from aircraft. Detections can be
relayed and processed in real time or stored by relays for transmission on command.
LIMITATIONS
2-145. Remote sensors have the following limitations.
Implant Missions
2-146. The time and resources required to implant sensors and relays are the key limitations on remote
sensor missions. The placement of sensors and relays needs to be planned in detail and accomplished well
in advance of when the information is needed. The tactical situation may preclude use of aircraft for
implant missions and limit the number of ground patrols that can be employed for implanting sensors.
Terrain Masking
2-147. Remote sensors require radio frequency line of sight between sensors and the monitoring site. As a
result, they are susceptible to terrain masking. Effective employment requires detailed planning of sensor,
relay, and monitoring site locations as well as knowledge of the capabilities and limitations of the
transmitters. Terrain masking may preclude extended-range employment of sensors in mountainous areas.
Responsiveness
2-149. Because of the time required to plan, prepare, and execute implant missions, remote sensors are
generally not responsive to rapidly changing requirements. Advance planning of sensor support through
detailed study of the mission, threat, AO, and commander’s intent provides the best means of anticipating
future sensor requirements.
Sensor Positioning
2-150. Accurate emplacement of the sensors is crucial to obtaining coverage of the surveillance area.
Knowing the exact location of the implanted sensor is critical to successful relay and monitoring. As a
result, sensor implant is done according to a plan, and the location of the implants must be accurately
reported to the monitoring agency.
Failure Rate
2-151. Inherent in all electronic systems is the possibility of component failure. Loss of any single
electronic component may render the device inoperable and degrade the operation of the overall system.
SUPPORT TO OPERATIONS
2-152. The nature of the operation determines the tactical application and scope of remote sensor
missions. For each type of mission, there are distinct considerations for the employment of remote sensors.
Offense
2-153. Offensive tasks are the most difficult to support with remote sensors. The rapid pace and fluid
nature of the offense may result in emplaced sensor networks being quickly uncovered by friendly forces.
Sufficient time and resources may not be available to reestablish the network to support the tactical tasks of
exploitation and pursuit. In addition, monitoring sensors and disseminating sensor data are complicated by
frequent displacements of advancing units.
2-154. When a sensor network can be established in advance of the operation, remote sensors can provide
the following support:
Monitoring of objectives. Sensors can provide surveillance of an objective and the avenues of
approach to it, detecting and characterizing the nature of activity on and around the objective.
Surveillance of entry points. As with objectives, sensors can provide surveillance of helicopter
landing zones and drop zones to provide early warning of threat activity that might preclude
their use.
Surveillance of the deep area. Sensors emplaced in the deep area can help guide planning by
characterizing the location, nature, and intensity of threat activity. Once execution begins, the
sensor network helps monitor threat response to the attack, providing early warning of
reinforcement or counterattacks, identifying retrograde operations, and assisting in target
acquisition efforts.
Defense
2-155. The use of remote sensors is well suited to support defensive tasks. Sensors provide the best
support when they can be emplaced in the covering force area. In the defense, sensors are implanted along
likely avenues of approach and in and around probable assembly areas to provide early warning of attacks.
An extensive sensor network can be used to track threat formations as they move across the AO, providing
basic targeting data and cueing other target acquisition assets. In a mobile defense, sensors can also be used
to provide surveillance of gaps between units or open flanks or rear areas.
Stability
2-156. For stability tasks, sensors can provide surveillance of population centers and key infrastructure
areas. They can also provide surveillance along lines of communications and borders.
EMPLOYMENT CONSIDERATIONS
2-157. Successful remote sensor missions require detailed planning and intelligence developed through
the IPB process. The mission, AO, threat, commander’s intent, and concept of operations must be analyzed
to determine the potential for remote sensor employment and the sensor information requirements that must
be satisfied.
2-158. The supported unit’s information collection plan includes provisions for sensor surveillance.
Incorporating remote sensors into the information collection plan provides the employment concept and
detailed instructions for the execution of remote sensor missions. Requirements for sensor employment are
developed along with concepts for the monitoring and dissemination of sensor data. These elements are
incorporated into the information collection plan.
Terrain
2-159. Terrain factors have a significant impact on sensor employment. The prevailing terrain in large
part determines a number of factors: among them, potential sensor locations, implantation means, sensor
detection radius, the requirement for relays, and the positioning of monitoring sites. Terrain factors to be
considered are as follows:
Soil type and composition. These factors determine detection radius and emplacement method.
Hard, compacted soils offer best detection conditions for seismic sensors.
Ambient interference. Seismic noise due to volcanic activity, earth tremors, or running water
degrades the quality of seismic sensor performance. (These can be either natural, such as rivers
and streams, or manufactured, such as sewer or water supply systems.) Emissions from power
lines and other electronic sources can disrupt magnetic sensors.
Vegetation. Vegetation provides concealment for sensors and relays but may inhibit antenna
placement and interfere with communications.
Lines of communications. The traffic pattern in the AO is a critical factor in determining the
best locations for sensor emplacement. In general, areas with limited lines of communications
and restricted cross-country mobility provide the best sensor information. Choke points along
lines of communications are particularly lucrative sensor targets.
Weather
2-160. While sensor components are designed to operate in a variety of weather conditions, extreme
weather conditions can impact the system’s performance. Adverse weather can—
Cancel or delay implant missions.
Displace antennas and above ground sensors or relays.
Degrade sensor performance.
Threat
2-161. The nature of the threat has a major effect on the success of remote sensor missions. A threat force
made up of mechanized or motorized units with an established doctrine for movement and pattern of
activity is more susceptible to detection by remote sensors than a small, foot-mobile insurgent group.
2-162. The threat’s ability to detect and interdict emplacement missions is also considered during
planning. The potential compromise of operations security and loss of assets during emplacement missions
must be balanced against the benefits to be gained from sensor employment.
EMPLACEMENT
2-163. The establishment of a comprehensive sensor network requires time and a significant investment
of resources. In addition to the operations security concerns discussed above, assets must be available to
conduct emplacement missions and there must be sufficient time to establish the network before sensor
information is required. Successful employment of remote sensors requires detailed planning.
2-164. During the planning requirements task, the operations and intelligence working group identifies
specific information requirements that remote sensors can answer. The intelligence and operations staffs
then develop information collection tasks for remote sensors based on these requirements. These tasks are
included in the sensor surveillance portion of the information collection plan, and sensors are emplaced to
perform them.
2-165. As part of the information collection plan, the sensor surveillance plan specifies the—
Type and location of sensors, relays, and monitoring sites.
Time of emplacement and unit responsible for emplacing each sensor string and any relays.
Time of recovery and unit responsible for recovery.
2-166. Remote sensors are usually emplaced during planning and preparation for the overall operation.
Therefore, a separate operation or fragmentary order is used to task units with employment or recovery of
sensors and associated equipment. Recovery of sensors and equipment may be directed in a separate order
or as a task to units in the operation order.
support of corps and division operational requirements, to include being the military intelligence force
provider for BCTs. The E-MIB is designed to perform in a variety of situations and be task-organized in
multiple ways.
3-6. The E-MIB is comprised of a headquarters and headquarters company and two MI battalions. Each
battalion is composed of a headquarters and headquarters detachment, a CI and HUMINT company, and a
collection and exploitation company. An E-MIB’s assets can be allocated across the corps to augment
existing capabilities or cover gaps, such as the lack of CI assets in the BCT.
INTELLIGENCE CELL
3-8. The intelligence functional cell is concerned with facilitating understanding of the operational
environment. The cell requests, receives, and analyzes information from all sources. It disseminates
intelligence products to support division or corps operations and the commander’s situational
understanding. This cell manages all requirements for information collection and MI collection assets under
division or corps control. It interfaces with the movement and maneuver cell to integrate intelligence
products and intelligence operations activities into current operations. It recommends tasks to the division
or corps operations staff for resources under division or corps control. This cell receives, processes,
analyzes, and disseminates all-source intelligence to support current and future operations. The intelligence
cell provides representatives to the current operations integration cell.
3-9. Each intelligence cell provides policies and procedures for conducting intelligence operations to
subordinate echelon intelligence cells. These policies and procedures allow the lower echelon intelligence
staffs the freedom to conduct intelligence operations more efficiently, as routine tasks can be executed
without obtaining approval from higher echelons.
3-10. To support operations, the main command post intelligence cell—
Receives, processes, and analyzes information from all sources, and disseminates intelligence.
Provides relevant intelligence to support current and future operations.
Participates in information collection planning.
Participates in the targeting process.
3-11. The intelligence cell at the corps and division consist of the three principal sections: intelligence
operations, the analysis and control element, and the G-2X.
Communications Integration
3-16. The communications integration staff element establishes communications connectivity with outside
intelligence elements, maintains internal and external intelligence digital communications functions, and
exercises communications security oversight of intelligence-specific communications equipment. The
intelligence cell develops the intelligence architecture to ensure a continuous flow of information and
intelligence within the command and to higher, lateral, and subordinate units.
3-17. The signal staff and the intelligence cell work closely to establish an architecture that meets the
command’s intelligence communications needs. The intelligence cell provides access to networks such as
JWICS and the National Security Agency Network (also called NSANET). The signal staff maintains the
command’s network for NIPRNET and SIPRNET access. Within the architecture, establishing protocols
and adhering to them provides for network discipline and more efficient information and intelligence
sharing.
Fusion Cell
3-21. The fusion cell performs situation development, prepares combat assessments, and develops and
updates threat information for the ongoing intelligence running estimate. The fusion cell provides
assessments to subordinate intelligence staffs. These assessments provide the current overall assessment of
the relevant aspects of the operational environment.
INTEGRATING CELLS
3-26. Integrating cells are organized by planning horizon rather than warfighting function. (See ATTP 5-0.1.)
A planning horizon is a point in time commanders use to focus the organization’s planning efforts to shape
future events (ADRP 5-0). The three planning horizons are short (usually associated with the current
operations integration cell), mid (usually associated with the future operations cell) and long (usually
associated with the plans cell). Commanders determine planning horizons based on the situation, echelon,
and tempo of operations. Horizons can range from hours and days to weeks and months. As a rule, the
higher the echelon, the more distant the planning horizon with which the headquarters is concerned. Thus,
divisions and corps are resourced for all three integrating cells. The intelligence functional cell provides
staff elements to all integrating cells.
Synchronize actions among the other command post cells, staff elements, meetings (including
boards and working groups), and other entities, such as personal and special staff sections that
operate independently.
Establish and conduct liaison with unified action partners.
Provide the current situation to the future operations and plans cells.
Perform near-term task assessment.
PLANS CELL
3-30. The G-5 leads the plans cell and oversees long-term planning. The G-5 is supported by two full time
intelligence planners. The plans cell develops plans, orders, branches, and sequels. It monitors the common
operational picture and stays abreast of the current operation by coordinating with the current operations
integration cell. When sufficient time exists before execution and the G-3 directs, the plans cell may write
branches for the current operation, particularly if those branch plans and fragmentary orders are relatively
complex.
3-31. Higher echelon plans cells provide IPB products tailored to the lower echelon needs within the
framework of the IPB process. (See FM 2-01.3.) Subordinate intelligence staffs then further refine the
higher echelon’s products into products usable for their commanders and staffs. Subordinate intelligence
staffs rely on higher headquarters staffs to provide the following intelligence products:
Threat organizational charts.
Available information regarding threat operational art, tactics, and techniques.
Threat situation template and course of action statements for threat courses of action.
Event templates and matrices.
High-value target lists.
Target packages on areas, structures, units, or individuals tasked out for reconnaissance,
surveillance, intelligence operations, and target acquisition.
Terrain analysis showing the military aspects of terrain and its effects on friendly and threat
operations.
Urban terrain analysis products showing the aspects of urban terrain and its effects on friendly
and threat operations.
Weather conditions and effects on enemy and friendly operations, including intelligence
collection sensors, personnel, and equipment.
Analysis of civil considerations, including IPB overlays.
Civil affairs assessments.
Military information support operations (formerly psychological operations) assessments.
Other public affairs activities assessments.
3-32. Based on these products, the lower echelon intelligence staffs further refine their intelligence
requirements and needs and nest their activities with those of higher echelons. They can also more
efficiently request further support as needed. Lower echelon intelligence staffs refine the products provided
to them by the higher echelon intelligence staffs, based on their commander’s requirements. These products
are sent back to the higher intelligence staffs along with the subordinate’s assessment for inclusion in the
higher intelligence staff’s assessment.
INTELLIGENCE ARCHITECTURE
3-34. Corps and division intelligence cells operate as integrated parts of the intelligence enterprise. The
intelligence enterprise is communications network-enabled. The backbone is based on an architecture that
transmits intelligence and information to and from various collection elements, units, and agencies by
means of different technologies and systems. With the continued development of sensors, processors, and
communications systems, it is increasingly important that intelligence cells understand the requirements for
establishing an effective architecture. Adequate communications and access to the intelligence enterprise
are often the most critical enablers for the intelligence warfighting function. Each staff element in the
intelligence cell, as well as the G-6, has some role in assisting the G-2 to establish and maintain the
intelligence architecture.
3-35. Corps and division intelligence architectures comprise specific intelligence and communications
structures that form the tactical portion of the intelligence enterprise. These structures include all personnel,
organizations, systems, and procedures necessary to assist in collecting, analyzing, producing, and
disseminating intelligence and information. Corps and division G-2s normally develop the overall
intelligence architecture and subarchitectures for HUMINT, GEOINT, and SIGINT communications.
FORCE TAILORING
3-36. Force tailoring is the process of determining the right mix of forces and the sequence of their
deployment in support of a joint force commander (ADRP 3-0). It involves selecting the right force
structure for a joint operation from available units within a combatant command or from the Army force
pool. Commanders then sequence selected forces into the joint operations area as part of force projection.
Joint force commanders request and receive forces for each campaign phase, adjusting the quantity of
Service component forces to match the weight of effort required. Army Service component commanders
tailor Army forces to meet land force requirements determined by joint force commanders. Army Service
component commanders also recommend forces and a deployment sequence to meet those requirements.
Force tailoring is continuous.
TASK-ORGANIZING
3-37. Task-organizing is the act of designing an operating force, support staff, or sustainment package of
specific size and composition to meet a unique task or mission (ADRP 3-0). Once intelligence assets have
been allocated, each echelon task-organizes the assets to provide maximum mission support. Intelligence
asset task organization occurs within a tailored force package as commanders organize units for specific
missions. As commanders reorganize units for subsequent missions, intelligence assets may be
redistributed to support new or changing requirements.
SUPPORT BRIGADES
3-38. Corps and divisions receive a mix of support brigades based on mission requirements. The types of
support brigades are the E-MIB, fires brigade, combat aviation brigade, maneuver enhancement brigade,
and sustainment brigade. These brigades are combined arms units designed to support BCTs and carry out
tasks in support of the division and corps. The joint force, corps, and division level each have different
relationships with support brigades. The supported unit intelligence cell provides intelligence support to
support brigades. Support brigades may receive MI collection assets as needed to support their missions.
These assets conduct intelligence operations the same way as assets supporting BCTs do.
FIRES BRIGADE
3-39. Fires brigades are normally assigned to, attached to, or placed under OPCON of a division, as the
mission requires. The fires brigade includes assets that can augment the supported division’s targeting
capabilities. The fires brigade main command post fires cell is the primary organization responsible for
interfacing with the division staff and for executing fires directed by the division. (See ATP 3-09.24.)
SUSTAINMENT BRIGADE
3-42. Sustainment brigades are subordinate to the theater sustainment command. They provide control of
the full range of logistic operations. Sustainment brigades consolidate functions previously performed by
corps and division support commands and area support groups into a single organization. The sustainment
brigade is normally given a support relationship with the supported force. However, under certain
conditions, a sustainment brigade could be placed under OPCON of a division for a specified operation,
such as an exploitation or pursuit. A division headquarters does not routinely have a command relationship
with its supporting sustainment brigades. All sustainment brigade headquarters have identical
organizations. (See ATP 4-93.)
regional operations company of the theater MI brigade for prioritization of analytic requirements as
required. It works with the geospatial planning cell normally assigned or attached to the theater MI brigade
to prioritize requests for geospatial data, information services, and terrain products for the theater army
staff. The section exercises requirements validation authority on staff and subordinate force requests for
information for theater army-, combatant command-, and national-level collection and production support.
Upon validation, the section submits and tracks requests for requirements satisfaction. The section is the
primary interface with the intelligence staff element in the current operations integration cell. The section
manages, validates, approves, and disseminates the threat portion of the common operational picture to
higher, lower, and adjacent commands and agencies. It advises the commander and subordinate units on the
enemy, weather, and terrain.
G-2X SECTION
4-8. The G-2X section synchronizes and integrates national to tactical level CI and HUMINT assets in the
combatant command area of responsibility for all operations. The G-2X is the primary advisor to the
commander on the employment of all CI and HUMINT assets, including relevant laws, policies, and
regulations affecting CI and HUMINT operations. The section directs, supervises, and coordinates the
planning, collection, analysis, and dissemination of CI and HUMINT.
4-11. INSCOM also delivers advanced skills training, linguist support, specialized quick reaction
capabilities and comprehensive intelligence-related logistics, contracting, communications, and other
expertise in order to enable mission command in support of Army, joint, and multinational commands and
the national intelligence community.
FOUNDRY
4-12. The Foundry program provides commanders with the means to achieve their priority intelligence
training. The purpose of the Foundry Intelligence Training Program is to provide Soldiers with focused
intelligence training to meet their commander’s training and readiness requirements. Soldiers participating
in the Foundry program receive training that builds on institutional, unit, and individual training; reflects
the current and changing operating environment; and increases functional and regional expertise while
developing and expanding contacts within the greater intelligence community. Additionally, the Foundry
program develops and implements longer term sustainment training capabilities through home-station
training sites. The Foundry portal links MI Soldiers, units, and commanders with Foundry training
opportunities, resources, and guidance. The MI Foundry program training course descriptions, schedules,
and standards are available on the portal for community-wide access. Access to the portal is gained through
Army Knowledge Online and also through the U.S. Army Intelligence Center Intelligence Knowledge
Network. (See AR 350-32 for more details.)
SUBORDINATE UNITS
4-13. There are two types of INSCOM subordinate units: functional commands and theater MI brigades.
Functional Commands
4-14. Functional commands have missions and capabilities focused on specific intelligence or operational
disciplines. INSCOM functional commands provide access to the national intelligence community and can
be leveraged to provide operational and training capabilities to meet Army and intelligence community
requirements. They can also be leveraged to reinforce theater MI brigades or to meet combatant command
requirements.
theater MI brigade forces leverage secure communications networks to access theater MI brigade, higher
echelon Army, joint, and intelligence community capabilities through intelligence reach. Although each
one is organized differently, their organization may include—
A multicomponent brigade headquarters that includes Regular Army and Army Reserve
elements.
An operations battalion, which serves as the theater army intelligence staff’s analysis and control
element. This battalion may also be task-organized into a theater ground intelligence center. The
battalion may contain a theater operations company and two regional operations companies.
A forward collection battalion, which may possess CI, HUMINT, and sometimes ground
SIGINT capabilities.
An aerial reconnaissance battalion or aerial exploitation battalion, which may be assigned either
to the brigade or to INSCOM and attached to the brigade. (See TC 2-19.13.)
A SIGINT battalion, which may be attached to the brigade for ADCON and operate under
OPCON of the National Security Agency/Central Security Service.
4-25. The ISR concept of operations roughly corresponds to annex L (information collection) of an Army
operation plan or order. The ISR concept of operations documents the synchronization, integration, and
operation of ISR resources in support of current and future operations. It outlines the capability to task,
collect, process, exploit, and disseminate accurate and timely information that provides the awareness
necessary to successfully conduct operations. It addresses how all available ISR collection assets and
associated PED infrastructure, including multinational and commercial assets, will be used to satisfy the
joint force’s anticipated collection tasks.
4-26. To facilitate the optimum utilization of all available ISR assets, an ISR concept of operations should
be developed in conjunction with the command’s planning effort. The ISR concept of operations should be
based on the collection strategy, and ISR execution planning, and should be developed jointly by the joint
force intelligence and operations staffs. The ISR concept of operations should also identify and discuss any
ISR asset gaps and shortfalls relative to the joint force’s validated PIRs and may be used as a vehicle for
justifying a request for the allocation of additional ISR resources. It should also require a periodic
evaluation of the capabilities and contributions of all available ISR assets relative to the joint force mission
in order to maximize their efficient utilization and to ensure the timely release of allocated ISR resources
when no longer needed by the joint force.
4-27. In the joint lexicon, collection management is a process with two subfunctions: collection
requirements management and collection operations management.
4-28. Collection requirements management—
Defines what intelligence systems must collect.
Focuses on the requirements of the customer.
Is all-source- (all intelligence discipline-) oriented and advocates (provides and supports) what
information is necessary for collection.
4-29. Collection operations management—
Specifies how to satisfy the requirement.
Focuses on the selection of specific intelligence disciplines and systems within a discipline to
collect information addressing the customer’s requirement.
Is conducted by organizations to determine which assets can best satisfy customers’ product
requests.
MULTINATIONAL OPERATIONS
5-2. Multinational operations are common, making multinational intelligence operations very important.
(See FM 3-16.) National interests require the United States to act with other nations. In many situations,
U.S. forces join with foreign forces to defeat common threats. The classification of U.S. intelligence may
present a challenge in releasing information, but sharing as much information and intelligence as possible
improves interoperability and trust within a multinational force. Commanders and staffs need to understand
their own and other nations’ policies on intelligence sharing. Early sharing of information during planning
ensures that multinational forces operate effectively.
OTHER CONSIDERATIONS
5-5. Other general principles that help guide multinational intelligence operations are—
Maintain unity of effort. Intelligence officers of each nation need to view the threat from
multinational as well as national perspectives. A threat to one element of a multinational force
must be considered a threat to all elements.
Make adjustments. There will be differences in intelligence doctrine and procedures among
multinational partners. Major differences may include how intelligence is provided to the
commander or procedures for sharing information among intelligence agencies.
Plan early and plan concurrently. This permits solutions to any differences to be developed
and tried before operations begin. Ensure there are sufficient resources for liaison requirements
to support multinational operations.
Perform complementary operations. Partner intelligence operations must be complementary,
and all intelligence resources must be available for application to the entire intelligence problem.
The intelligence staff must be prepared to navigate different approval processes and political
sensitivities when executing multinational intelligence operations.
5-6. The following are considerations for intelligence networks and architectures while operating with
multinational forces:
Establish a shared local area network using systems such as the Combined Enterprise Regional
Information Exchange System (also called CENTRIX) or the battlefield information, collection,
and exploitation system. Establish and enforce a standardized process for the intelligence sharing
architecture, such as utilizing the cross-domain enterprise all-source user repository for cross-
domain operations.
Many nations provide their own national suite of analytical tools, digital mapping capabilities,
collaboration software, and internal capabilities. DCGS-A is the primary intelligence component
residing on the U.S.-only mission command network.
Multinational intelligence analysis occurs on the multinational network of shared database
servers, with its metadata catalog and releasable databases. These tools access and pull data from
the multinational force shared databases and other nationally owned storage facilities.
Standardize compatible formats in which information is converted or stored so that it is
accessible and useable by multinational partners. However, ensure that information that does not
require conversion is left in its original format in order to facilitate faster flow of information.
Use the multinational intelligence center to coordinate multinational ISR and collection plans for
each nation.
Designate a single officer as the director of intelligence for the multinational force.
Ensure each nation has a representative present at the multinational intelligence center.
5-7. Effective use of intelligence liaison personnel can establish strong relationships with multinational
partners. Effective liaison can be instrumental in resolving the normal problems that result from language
barriers and cultural and operational differences during multinational intelligence operations.
5-9. Using the disclosure policy, pertinent laws, regulations and directives, the FDO adjudicates
disclosure requests through the use of delegated disclosure authorities and sanitization guidelines. The FDO
also advises the commander and staff on potential problems that may arise when current or future
requirements to disclose are not supported by existing disclosure authorities. The FDO facilitates sharing
relevant and pertinent intelligence about the situation and threat between the U.S. military and allies and
other multinational partners consistent with disclosure policy and U.S. joint force guidance. The FDO pays
special attention to intelligence classification and levels of access of multinational personnel. However, it
avoids sharing information about intelligence sources and methods with allies and other multinational
partners until approved by the appropriate national-level agency.
5-10. The U.S. joint force intelligence staff obtains the necessary foreign disclosure authorization for
category 8 (Military Intelligence) information from the Defense Intelligence Agency and disclosure
authority from the combatant command FDO as soon as possible. U.S. intelligence personnel should be
knowledgeable of the specific foreign disclosure policy, procedures, and regulations for the operation. It is
therefore imperative that the U.S. joint force intelligence staff considers adding extra FDO billets to the
joint manning document. The efficient flow of intelligence is enhanced by personnel knowledgeable of
foreign disclosure.
5-11. Intelligence support to protection of the force is critical. Every effort should be made to share any
intelligence that could affect accomplishing the multinational force mission or protecting the force. A key
consideration is the apportionment of trained foreign disclosure personnel within a theater of operations to
facilitate the capability of sharing information and products with the multinational force. (See AR 380-10
for additional information on foreign disclosure.)
Note. Paragraphs 5-12 through 5-14 implement multinational doctrine contained in AJP 2-0.
Conduct Foundry
6-6. Foundry is a training program designed to sustain critical intelligence capabilities and perishable
intelligence skills, and to provide regional focus, technical training, and functional expertise to the tactical
MI force through home-station training platforms, mobile training teams, and live-environment training
opportunities. Foundry provides a single hub for advanced skills training across the Active Army, Army
National Guard, and Army Reserve MI force. It also provides training to leaders who supervise MI
missions and Soldiers who perform MI activities.
6-14. The information and intelligence obtained are refined into knowledge for use in mission analysis
through functional analysis. Information is obtained through intelligence reach; research; data mining;
database access; academic studies, products, or materials; intelligence archives; open-source intelligence
(OSINT); and other information sources. Generate intelligence knowledge is the foundation for performing
IPB and mission analysis. The primary products of the generate intelligence knowledge task are the initial
data files and intelligence survey. Generate intelligence knowledge includes five tasks. Each of the first
four tasks is translated into a database or data files based on the commander’s guidance to support the
commander’s visualization:
Develop the foundation to define threat characteristics.
Obtain detailed terrain information and intelligence.
Obtain detailed weather and weather effects information and intelligence.
Obtain detailed civil considerations information and intelligence.
Complete studies.
Note. These tasks outline a basic approach to build and organize databases and data files. This
approach does not preclude users from organizing databases and data files in another manner,
such as by the operational or mission variables.
Complete Studies
6-19. To assist in achieving goals and objectives, this task entails providing the requesting command or
organization with detailed information, assessments, and conclusions about the AO and area of interest. A
study can be a systems or functional analysis product. It should be as detailed and in-depth as time allows.
Studies provide knowledge that supports understanding of the local populations; cultures and caste systems;
societal systems or organizations; political systems and structures; religions practiced and their impacts;
moral beliefs and their impacts; civil authority considerations; military organizations, structure, and
equipment; and attitudes toward U.S., multinational, or host-nation forces. Studies can also include the
views and attitudes of multinational and host-nation forces towards these factors. Complete studies includes
two tasks:
Conduct area, regional, or country study.
Conduct specified study.
Note. The term operational in the title of this task does not refer to the operational level of war.
Note 1. The police intelligence operations function is not an intelligence discipline; it is a law
enforcement function. However, it is within the critical intelligence task of support situational
understanding that police intelligence operations best support the operations process and inform
the intelligence process. Police intelligence operations are essential to this task, particularly
where irregular threats (criminal, terrorist, and insurgents) threaten the security of U.S. forces
and military operations. This function supports and enhances the commander’s situational
awareness and the common operational picture through collection, analysis, and appropriate
dissemination of relevant criminal and police information, and police intelligence.
Note 2. The police intelligence operations function is a vital tool of law enforcement and
criminal investigators that distributes and focuses military police and criminal investigation
assets. And while police intelligence is not collected by or for members of the intelligence
community, this intelligence could be relevant to a military intelligence mission. Remember that
there are additional rules that apply when members of the military intelligence community
collect, retain and disseminate U.S. persons information. Any access by the intelligence
community to information or products resulting from police intelligence operations directed
against U.S. persons should undergo competent legal review.
Requirements Development
6-39. The intelligence staff develops a prioritized list focusing on what information it needs to collect in
order to produce intelligence. Additionally, the intelligence staff dynamically updates and adjusts the
requirements in response to mission adjustments and changes. Each requirement is assigned a latest time
information is of value to meet operational requirements.
Assessing Collection
6-41. The commander and staff continuously evaluate the information collection plan based on the
assessment of results from reconnaissance missions, surveillance tasks, intelligence operations, and security
operations. Collection assessment is particularly important during execution because situations change
rapidly; evaluation identifies updates for information collection activities. Together, commanders and staffs
determine if CCIRs have been satisfied or are still relevant:
If CCIRs have been satisfied or are no longer relevant, they are eliminated from the information
collection plan.
If CCIRs have not been satisfied but are still relevant, the intelligence staff coordinates with the
operations staff during the operations and intelligence working group for additional assets and/or
recommends adjustments to the current coverage.
EXECUTE COLLECTION
6-49. Executing collection focuses on requirements tied to the execution of tactical missions (such as
reconnaissance, surveillance, security, and intelligence operations) based on the CCIRs. Collection
activities acquire information about the adversary and the AO, and provide that information to intelligence
processing and exploitation elements. Typically collection activities begin soon after receipt of the mission
and continue throughout preparation and execution of the operation. They do not cease at conclusion of the
mission but continue as required. This allows the commander to focus combat power, execute current
operations, and prepare for future operations simultaneously. Execute collection includes three tasks:
Establish technical channels and provide guidance.
Collect and report information.
Establish a mission intelligence briefing and debriefing program.
Note. In specific cases, regulatory authority is granted to specific national and DOD intelligence
agencies for specific intelligence discipline collection and is passed through technical channels.
for supporting the information-related activities. (See JP 3-60, FM 3-13, FM 3-36, and FM 3-60.) The
information and intelligence include identification of threat capabilities and limitations. The targeting
process uses the decide, detect, deliver, assess methodology. The intelligence officer supports targeting by
providing accurate, current intelligence and information to the staff and ensures the information collection
plan supports the finalized targeting plan. Provide intelligence support to targeting includes two tasks:
Provide intelligence support to target development.
Provide intelligence support to target detection.
target audiences and their environment. (See FM 3-53.) Continuous and timely intelligence is required to
assess target audience behavioral trends. Information and intelligence focus on the following:
Target audience’s motivation and behavior.
Indicators of success or lack of success (measures of effectiveness).
Target audience’s reaction to friendly, hostile, and neutral force actions.
SECTION II – TERMS
all-source intelligence
(Army) The integration of intelligence and information from all relevant sources in order to analyze
situations or conditions that impact operations. (ADRP 2-0)
ARFOR
The Army component and senior Army headquarters of all Army forces assigned or attached to a
combatant command, subordinate joint force command, joint functional command, or multinational
command. (ADRP 1-02)
combat information
(joint) Unevaluated data, gathered by or provided directly to the tactical commander which, due to its
highly perishable nature or the criticality of the situation, cannot be processed into tactical intelligence
in time to satisfy the user’s tactical intelligence requirements. (JP 2-01)
geospatial intelligence
(joint) The exploitation and analysis of imagery and geospatial information to describe, assess, and
visually depict physical features and geographically referenced activities on the Earth. Geospatial
intelligence consists of imagery, imagery intelligence, and geospatial information. (JP 2-03)
human intelligence
(Army) The collection by a trained human intelligence collector of foreign information from people
and multimedia to identify elements, intentions, composition, strength, dispositions, tactics, equipment,
and capabilities. (FM 2-22.3)
information collection
An activity that synchronizes and integrates the planning and employment of sensors and assets as well
as the processing, exploitation, and dissemination systems in direct support of current and future
operations. (FM 3-55)
intelligence operations
(Army) The tasks undertaken by military intelligence units and Soldiers to obtain information to satisfy
validated requirements. (ADRP 2-0)
intelligence, surveillance, and reconnaissance
(joint) An activity that synchronizes and integrates the planning and operation of sensors, assets, and
processing, exploitation, and dissemination systems in direct support of current and future operations.
This is an integrated intelligence and operations function. (JP 2-01)
planning requirements and assessing collection
The task that analyzes requirements, evaluates available assets (internal and external), recommends to
the operations staff taskings for information collection assets, submits requests for information for
adjacent and higher collection support, and conducts an assessment of the effectiveness of the
information collection plan. (ATTP 2-01)
reconnaissance
(joint) A mission undertaken to obtain, by visual observation or other detection methods, information
about the activities and resources of an enemy or adversary, or to secure data concerning the
meteorological, hydrographic or geographic characteristics of a particular area. (JP 2-0)
security operations
Those operations undertaken by a commander to provide early and accurate warning of enemy
operations, to provide the force being protected with time and maneuver space within which to react to
the enemy, and to develop the situation to allow the commander to effectively use the protected force.
(ADRP 3-90)
signals intelligence
(joint) (1) A category of intelligence comprising either individually or in combination all
communications intelligence, electronic intelligence, and foreign instrumentation signals intelligence,
however transmitted. (2) Intelligence derived from communications, electronic, and foreign
instrumentation signals. (JP 2-0)
surveillance
(joint) The systematic observation of aerospace, surface, or subsurface areas, places, persons, or things,
by visual, aural, electronic, photographic, or other means. (JP 3-0)
technical channels
Technical channels provide commanders with the means to rapidly employ or modify functional
capabilities for mission requirements. It enables the timely implementation of techniques, procedures,
standards, configurations, and designs in support of operations at all levels. Technical channels neither
constitutes nor bypasses command authority, but serves as the mechanism for ensuring the execution
of clearly delineated technical tasks, functions, and capabilities to meet the dynamic requirements of
full spectrum operations. The orders process will delineate the appropriate authorities required to
implement functional capabilities from Army down to the lowest echelons of command through the
use of technical channels. (FM 6-02.71)
threat
Any combination of actors, entities, or forces that have the capability and intent to harm United States
forces, United States national interests, or the homeland. (ADRP 3-0)
RELATED PUBLICATIONS
These documents are cited in this publication.
JOINT PUBLICATIONS
Most joint publications are available online: www.dtic.mil/doctrine/new_pubs/jointpub.htm.
JP 2-0. Joint Intelligence. 22 October 2013.
JP 2-01. Joint and National Intelligence Support to Military Operations. 5 January 2012.
JP 2-01.3. Joint Intelligence Preparation of the Operational Environment. 16 June 2009.
JP 2-03.Geospatial Intelligence Support to Joint Operations. 22 March 2007.
JP 3-0. Joint Operations. 11 August 2011.
JP 3-08. Interorganizational Coordination During Joint Operations. 24 June 2011.
JP 3-13.3. Operations Security. 4 January 2012.
JP 3-13.4. Military Deception. 26 January 2012.
JP 3-33. Joint Task Force Headquarters. 30 July 2012.
JP 3-52. Joint Airspace Control. 20 May 2010.
JP 3-59. Meteorological and Oceanographic Operations. 7 December 2012.
JP 3-60. Joint Targeting. 31 January 2013.
JP 6-0. Joint Communications System. 10 June 2010.
ARMY PUBLICATIONS
Most Army doctrinal publications are available online: www.apd.army.mil.
ADP 3-09. Fires. 31 August 2012.
ADP 3-37. Protection. 31 August 2012.
ADP 4-0. Sustainment. 31 July 2012.
ADP 5-0. The Operations Process. 17 May 2012.
ADP 6-0. Mission Command. 17 May 2012.
ADRP 3-05. Special Operations. 31 August 2012.
ADRP 3-09. Fires. 31 August 2012.
ADRP 3-37. Protection. 31 August 2012.
ADRP 3-90. Offense and Defense. 31 August 2012.
ADRP 4-0. Sustainment. 31 July 2012.
OTHER PUBLICATIONS
DOD publications are available at the DOD Issuances Web site (http://www.dtic.mil/whs/directives).
(FOUO) AFDD 3-59. Weather Operations. 27 August 2012. Available online at the “Air University
Curtis E. LeMay Center for doctrine Development and Education” Web site.
http://www.au.af.mil/au/lemay/main.htm, accessed 24 October 2013.
(FOUO) AJP 2-0. Allied Joint Intelligence Counter Intelligence and Security Doctrine. December
2003. Available on line at the “NATO Standardization Agency (NSA) Public Web Site.”
http://nsa.nato.int/nsa/, accessed 24 October 2013.
(FOUO) DHE-M 3301.001. Defense Human Intelligence (HUMINT) Enterprise Manual, Volume I:
Collection Requirements, Reporting, and Evaluation Procedures. 30 January 2009. This is a
classified publication available online at “The Army G-2 Homepage” (classified). Select the
HUMINT link. Contact the preparing agency of this manual for access instructions.
DOD 5240.1-R. Procedures Governing the Activities of DOD Intelligence Components that Affect
United States Persons. 7 December 1982.
DODD 2310.1E. The Department of Defense Detainee Program. 5 September 2006.
DODD 3115.09. DOD Intelligence Interrogations, Detainee Debriefings, and Tactical Questioning.
11 October 2012.
Executive Order 12333. United States Intelligence Activities. 4 December 1981. Available online at the
National Archives Federal Register Web site at http://www.archives.gov/federal-
register/codification/executive-order/12333.html, accessed 24 October 2013.
Geneva Conventions (1949). Available online at the International Committee of the Red Cross.
“International Humanitarian Law—Treaties and Documents” Web site at
http://www.icrc.org/IHL.nsf/CONVPRES?OpenView, accessed 24 October 2013.
Geneva Conventions, Protocol I (1977). Available online at the International Committee of the Red
Cross. “International Humanitarian Law—Treaties and Documents” Web site at
http://www.icrc.org/IHL.nsf/CONVPRES?OpenView, accessed 24 October 2013.
Hague Convention (1899 and 1907). Available online at the International Committee of the Red Cross.
“International Humanitarian Law—Treaties and Documents” Web site at
http://www.icrc.org/IHL.nsf/CONVPRES?OpenView, accessed 24 October 2013.
Manual for Courts-Martial (2012). Available online at the Army Publications Directorate Web site at
http://www.apd.army.mil/AdminPubs/ProductMap.asp, accessed 24 October 2013.
Title 10, United States Code. Armed Forces of the United States. Available online at the U.S. House of
Representatives Office of the Law Revision Counsel Web site at http://uscodebeta.house.gov/,
accessed 24 October 2013.
Title 32, United States Code. National Guard. Available online at the U.S. House of Representatives
Office of the Law Revision Counsel Web site at http://uscodebeta.house.gov/, accessed 24
October 2013.
Title 50, United States Code. War and National Defense. Available online at the U.S. House of
Representatives Office of the Law Revision Counsel Web site at http://uscodebeta.house.gov/,
accessed 24 October 2013.
RECOMMENDED READINGS
This document contains relevant supplemental information.
ATP 2-22.4. Technical Intelligence. 4 November 2013.
PRESCRIBED FORMS
None.
REFERENCED FORMS
Most Army forms are available online: www.apd.army.mil.
DA Form 2028. Recommended Changes to Publications and Blank Forms.
T Trojan SPIRIT,
tactical control (TACON), 1-95 communications links, 2-60
tactical unmanned aircraft troop leading procedures, 2-63
systems. See unmanned U–V
aircraft systems.
unit assignment (CI), 2-129
targeting, 6-57–6-59
defined, 1-66 unmanned aircraft systems
division and corps, 3-15, (UASs)
3-20 3-29 3-31 planning considerations for,
dynamic, 1-72 2-100–2-120
and intelligence operations, and air tasking order, 1-79,
1-66–1-73 2-51
methodology, 1-66 control and coordination of,
and remote sensors, 2-135– 2-109–2-114
2-136, 2-140, 2-148 employment of, 2-115–
support to, 2-25 2-120
theater army, 4-1 control of, 1-106–1-108.
and UASs, 2-111 and zone reconnaissance,
working group, 6-70 2-106
task and direct collection, 1-15, W–X–Y–Z
6-40, 6-44–6-48 weapons control status,
task-organizing, 3-37 intelligence operations
of MI collection assets, planning and, 1-51
1-92–1-108 weather, 6-14, 6-17. See also
tear lines, 5-4 Air Force weather team.
technical channels, 1-109– and intelligence operations,
1-111 2-49
establishing, 6-50 and remote sensors, 2-137,
and information collection 2-160
tasks, 6-50 zone reconnaissance, UASs
and intelligence operations, and, 2-106
1-88, 1-89
technical control
division and corps, 3-20
and intelligence
architecture, 2-32
technical nets/networks, 2-59
and intelligence
architecture, 2-32
terrain management
and intelligence operations,
1-78
and MI collection assets,
2-48
theater army, role of, 4-1
theater intelligence plan, 4-7
theater MI brigades, 4-15–4-18
and theater intelligence cell,
4-4, 4-6
theater operations company,
4-6
theater security cooperation,
1-80
threat characteristics, 6-15
translating, during collection,
1-36
RAYMOND T ODIERNO
General, United States Army
Chief of Staff
Official:
GERALD B. O’KEEFE
Administrative Assistant to the
Secretary of the Army
1405101
DISTRIBUTION:
Active Army, the Army National Guard, and the United States Army Reserve. To be distributed in
accordance with the initial distribution number (IDN) 111117, requirements for FM 2-0.
PIN: 081441-000