Atp2 22 9 2017
Atp2 22 9 2017
Atp2 22 9 2017
This is in reponse to your Freedom of Information Act (FOIA) request of July 5, 2017, to
the U.S. Army Installation Management Command (IMCOM), United States Army Garrison,
Fort Huachuca, for copies of ATP 2-22.9, Open-Source Intelligence, Intelligence Center of
Excellence (Huachuca), 30 June 2017. On January 8, 2019, IMCOM forwarded your request
and records to the U.S. Army Training and Doctrine Command (TRADOC). On November 5,
2019, TRADOC forwarded your request and records to this office and they were received on
November 6, 2019 .
Coordination with another element of our command has been completed and records have
been returned to this office for final disposition and direct reply to you. The records have
been determined to be partially releasable and are enclosed.
Information has been sanitized that would result in an unwarranted invasion of the privacy
rights of the individuals concerned. This information is exempt from the public disclosure
provisions of the FOIA per Title 5 U.S. Code 552 (b)(6).
Information also has been withheld pursuant to Title 5 U.S .C. 552(b)(3) of the FOIA.
Exemption (b)(3) pertains to information that is exempt by statute. The applicable statute is
50 U.S.C. § 3024(i), which protects intelligence sources and methods.
The withholding of the information described above is a partial denial of your request.
This denial is made on behalf of Major General Gary W. Johnston , Commanding, U.S. Army
Intelligence and Security Command, who is the Initial Denial Authority for Army intelligence
investigative and security records under the FOIA. You have the right to appeal this decision
to the Secretary of the Army. Your appeal must be postmarked no later than 90 calendar
days from the date of this letter. After the 90-day period , the case may be considered
closed; however, such closure does not preclude you from filing litigation in the courts. You
should state the basis of your disagreement with the response and provide justification for a
reconsideration of the denial. An appeal may not serve as a request for additional or new
information . An appeal may only address information denied in this response . Your appeal
is to be made to this office, for forwarding, as appropriate to the Secretary of the Army,
Office of the General Counsel.
If you have any questions regarding this action, feel free to contact this office at 1-866-
548-5651 , or email the INSCOM FOIA office at: usarmy.meade .902-mi-grp .mbx.inscom-foia-
service-center@mai l. mil and refer to case #0065F-20 . Please note that you now have the
ability to check the status of your request online via the U.S. Army Records Management
and Declassification Agency (RMDA) website:
https ://www.foia.army.mii/FACTS/CaseStatus.aspx. Please refer to FOIA Control Number:
FP-20-003201 . You may also contact the INSCOM FOIA Public Liaison, Mrs. Joanne
Benear, for any further assistance and to discuss any aspect of your request at 301-677-
7856 . Additionally, you may contact the Office of Government Information Services (OGIS)
at the National Archives and Records Administration to inquire about the FOIA mediation
services they offer. The contact information for OGIS is as follows: Office of Government
Information Services, National Archives and Records Administration , 8601 Adelphi Road-
OGIS, College Park, Maryland 20740-6001; email at ogis@nara .gov; telephone at 202-741-
5770 ; toll tree at 1-877-684-6448; or facsimile at 202-741-5769.
Sincerely,
chaei L
Director
Freedom of Information/Privacy Office
Investigative Records Repository
Enclosure
ATP 2-22.9
MCRP 2-10A.3
JUNE 2017,
DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because It requires
protection in accordance with AR 380-5, AR 530-1, and U.S. Army Directive 2016-37, 22 November 2016. This
determination was made on 10 February 2017. Contractor and other requests must be referred to ATIN: ATZS-
CDI-D, t,J.S. Army Intelligence Center of Excellence, Fort Huachuca, · AZ 85613-7017, or via e-mail at
[email protected]. Requests to release this do.cument to foreign ~ntities must be
referred to the requestor's supporting foreign disclosure office. . .
DESTRUCTION NOTICE: Destroy by any method that will preve nt disclosure of contents or reconstruction of the
document in accordance with AR 380-5.
30 June 2017
DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because it requires
protection In accordance with AR 380-5, AR 530-1, and U.S. Army Directive 2016-37, 22 November 2016. This
determination »'as made on 10 February 2017. Contractor and other requests must be referred to ATTN: ATZS-
CDI~D . U.S. Army Intelligence Center of Excellence, Fort Huachuca, AZ 85613-7017, or via e-mail at
[email protected]. Requests to re lease this document to foreign entities must be
referred to the requestor's su.pporting fore ign disclosure office .
DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the
document in accordance with AR 380-5.
•This publication supersedes ATP 2-22.9 dated 10 July 2012.
OSINT-Division and Above (U) ...........-... .. ......... ... .. ... ... .. ..... ....... ......... .......... .......... 2-4
Service Organizations (U) .. .. ... .. ... ... ... .............. ......... .... .... .. .. .. .... .. ._. .. .. .. ....... ............. 2-6
Figures (U)
Fi_gure_1-1 . (U) Intelligence relationships among regional communities of interest... .... .. .. .. .... ...... 1-5 ·
· Figure 1-2. (U) Marine Corps intelligence relationships .; .. .... ... ... ....... .. :.. .... ... ..... .. ..... .......... ... ...... 1-6
Figure 2-1. (U) Brigade coin bat team OS INT cell example ... .. ...... .. ...................... .... .... :... ........ .... 2-2
Figure 2-2. (U) Marine~air ground task force intelligence centerOS!NT cell example ...... .... .. .. .. .. 2-_3
·. · Figure 2-3. (U) Divi~ion and above/Major subordinate com(Tiand OSINT cell example_.............. ,. 2-5
Figure 3-1 . (U) Planning for OSINT activities ..... ,........... .... ... .. .......................... .... ..... ... .... .. .. .. ..... . 3-3
. .. ·,
- Tables (U)
_Table 3-1. (U~ OSINT prepara_tion considerat ions ..... .. ......... ..................: .. :.................. .... .. .. .... ..... 3-5
Table 4-1. (U) Open~source media, ~ompon?nts, and elements .. ... ...... ... ......... ......... .. ... ...... ........ 4-3
Contents (U)
. .
. 'Table C-1. (U) Boolean logic operators, connectors, and delimiters ............ .............. .. .. .............. C-3
Table C:-2. (U) Common website domafns ............ .. ..... .. ... .. ....... .... ... .. .. ... .. .. ...... :.......... : ............... C-6
Table C:.3. (U) Internet country code examples .. ..... .. .............. ................................. .................... C-8
Table D-1. (U) Military networks and research portals .. ...... ..... .. .. .............. .. ..... .. ... .............. .. ....... D-1
Table D-2. (U) Newspapers and news:teeds .... .. ................... .. ............. ..... .. .......................... ... .... 0 ~2
Table D-3. (U) U.S. military organizations and Federal agencies ....... .. .... ... .. .... .. ........... .............. D-2
Table D-11. (U) Internet portals .................... ..... ... .. .. ....... .. .... .. ... .. .......... ................. .. ........... ......... D-6
Table D-12. (U) Mapping and infrastructure portals ..... : .............................................. .................. D-6·
Table D-13. (U) Countries and geographic areas ...... .... .. ... ......... .......... ................ ....................... D-7
· Table D-14. (U) Research topics .. ....... ...... .................................................................................... D-7
Table D-15. (U) Conflict, threats, and military topics .... .. .. .............. ... .. ..... ........... ..... ... ......... ......... D-9
(U) Cyberspace is a global domain within the information environment consisting of the
interdependent network of information technology infrastructures and resident data, including the
internet, telecommunications networks, computer systems, and embedded processors and
controllers (JP 3-12[R]).
(U) Commanders and staffs of Army/Marine Corps headquarters serving as joint task force or multinational
headquarters should also refer to applicable joint or multinational doctrine concerning the range of military
operations and joint or multinational forces. Trainers and educators throughout the Army/Marine Corps also
use this publication.
(U) Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable United
States (U.S.), international, and, in some cases, host-nation laws and regulations. Commanders at all levels
must ensure their Soldiers/Marines operate in accordance with the law of war and the rules of engagement.
(See FM 27-1 0.)
(U) ATP 2-22.9/MCRP 2-1 OA .J uses joint terms where applicable. Selected joint, Anny, and Marine Corps
terms and definitions appear in both the glossary and the text. This publication is not the proponent for any
Army/Marine Corps terms. (See the page vii for style conventions used to identify terms in this publication.)
(U) The use or mention of the name of any commercial or private organization or its associated trademark or
services by the Army/Marine Corps does not express or imply an endorsement of the sponsor or its products
and services by the Army/Marine Corps.
(U) ATP 2-22.9/MCRP 2~10A.3 applies to the Active Army and Marine Corps, the Army National
Guard/Army National Guard of the United States, the U.S. Army Reserve, and the U.S. Marine Corps
Reserve, unless otherwise stated .
(U) The proponent of ATP 2-22.9/MCRP 2-JOA.J is the U.S. Army Intelligence Center of Excellence. The
preparing agency is the Capabilities Development and .Integration Directorate, U.S. Anny Intelligence Center
of Excellence, Fort Huachuca, AZ. Send · comments and recommendations on a DA Form 2028
(Recommended Changes {o Publications and Blank Forms) to Commander, U.S. Army Intelligence Center
of Excellence, ATTN: ATZS-CDI-D (ATP 2-22 .9), 550 Cibeque Street, Fort Huachuca, AZ 85613-7017; by
e-mail to [email protected]; or submit an electronic DA Form 2028.
(U) U.S. Marine Corps readers of this publication are encouraged to submit suggestions and changes
through the Universal Need Statement (UNS) process. The UNS submission process is delineated in
MCO 3900.20, which can be obtained from the Marine Corps Publications Electronic Library online.
. (U) The UNS recommendation should include the following information:
• Location of change.
• Publication number and title.
Note. (U) Intelligence officers have a responsibility to advise thi: commander on the best ethical
use of OS INT.
(U) Open sources possess much of the information needed to understand the physical and human factors of
an operational environment. Many information and intelligence requirements can be satisfied with open-
source information. Open-source information may increase situational . awareness. and can provide
confirmation of information obtained through non-OSINT-related technical or classified resources.
(U) Access to the massive amounts of open-source information, including publically available information,
is reshaping how people perceive the world. People can use open-source information to pursue a broad
spectrum of objectives. The significance and relevance of OSINT provides an additional leverage capability
and can cue technical or classified assetS'to refine and vaiidate both information and intelligence.
Note. (U) Collection of information on U.S. persons is regulated by law and regulation. (See
appendix A.) ·
Fundamentals (U)
(U) The passage of legislation has affected the United States (U .S.) intelligence
community and its application of open-source information. The National Security Act
of 1992 began the reformation of the U.S. intelligence community. This resulted In the
establishment of the Ope·n-Source Office in 1992, the Director of National! ntelligence
Open Source Center in 2005, and the Open Source Enterprise in 2015. Part one
describes the fundamentals of ope~-source intelligence (OSINT).
Chapter 1
Note. (U) This publication applies to the collection, exploitation, and analysis of open-source
information, including publicly available information (PAl), for the purposes of answering
intelligence requirements. Only intelligence personner perform this task. Only intelligence
professionals may conduct OSINT activities due to the authorities and restrictions placed upon
them in Executive Order (EO) 12333 as amended, DODM 5240.01. DOD 5240.1-R.
DODI 3115.12, JP 2-0, AR 381- I 0, and MCO 3800.2B. This publication does not apply to any of .
the other warfighting functions.
1-3 . (U) The intelligence resulting from open sources is produced by intelligence professionals,
incorporating tips and cues from other disciplines, and is integrated into all-source analysis. The following
terms a:re fundamental to understanding OSINT:
• Open-source information: Information that any member of the public could lawfully obtain by
request or observation as well as other unclassified information that has limited public distribution
or access (JP 2-0). ·
• Publicly available information: Information that has been published or broadcast for public
consumption, is available on request to the public, is accessible online or otherwise to the public,
is available to the public by subscription or purchase, could be seen or heard by any casual.
observer, is made available at a meeting open to the public, or is obtained by visiting any place or
attending any event that is open to the public. Publicly available information includes information
generally available to persons in a military community even though the military community is not
open to the civilian general public (DODM 5240.01).
• Collection: Information is collected when it is received by a Defense Intelligence Component,
whether or not it is retained by the Component for intelligence purposes or other purposes.
Collected information includes information obtained or acquired by any means, including
information that is volunteered to the Component. Collected information does not include:
information that only momentarily passes through a computer system of the Component;
information on the internet or in an electronic forum or repository outside the Component that is
simply viewed or accessed by a Component employee but is not copied, saved, supplemented, or
used in some manner; information disseminated by other Components ·or elements of the
Intelligence Community; or information that is maintained on behalf of another U.S. Government
agency and to which the Component does not have !'ICCess for intelligence purposes
(DODM 5240.01).
1-4. CU) OSINT production contributes to all-source intelligence and the continuing activities of the
intelligence process (analyze and assess), as described in ADRP 2-0 and MCDP 2. Like other intelligence
disciplines, OSINT is developed based on intelligence requirements and can be used to cue or supportother
intelligence disciplines.
• OSINT addresses requirements. The availability, depth, and range of open-source information
enable intelligence professionals to satisfy many priority intelligence requirements (PIRs) and
information requirements without using specialized ·human or technical collection means.
• OSINT enhances collection. Open-source information supports other requirements a~d provides
information that optimizes the employment and performance of sensitive human and technical
collection means. Examples of this type of information include biographies, cultural information,
geospatial information, and technical data.
• OSINT enhances production. As part of singie-source and all-source intelligence production,
the use and integration of OS INT ensure commanders have the benefit of all sources of available
information.
1-8 . (U) OSINT supports the development and refinement of the collection plan to satisfy intelligence
· requirements, and may quickly fill information gaps to optimize the use of low-density collection assets .
OSINT supports situational understanding by-
• Developing an understanding of complex situations by integrating intelligence and operations.
• Supporting fused all-source analysis.
• Providing tips and cues from other intelligence activities.
• Supporting intelligence operations and activities in other intelligence disciplines.
1-12. (U) The Marine Corps intellz'gencefunctional tasks per MCO 3500.26A include-
• Provide support to the commander 's estimate.
• Provide intelligence to develop the situation.
• Provide indications and warning ofthreat.
• Provide intelligence support to force protection.
• Provide intelligence support to targeting.
• Provide intelligence support to combat assessment.
1-)3 . (U) The intelligence warfighting function receives information from a wide variety of sources. OSINT,
as an intelligence discipline, is produced from open-source information. PAl can be used to-
• Support situational understanding of the threat and operational environment.
• Develop intelligence about the enemy, terrain, weather, and civil considerations.
• Generate intelligence knowledge before receipt of mission tci provide relevant knowledge of the
operational environment.
• Contribute to satisfying intelligence requirements.
• Develop a baseline of knowledge and understanding about potential threat actions or intentions to
support answering ongoing intelligence requirements.
• Generate intelligence products as the basis for Army/ Marine Corps integrating functions such as
intelligence preparation of the ·battlefield/battlespace (IPB). lPB is designed to support running
estimates and the military decision--making process (MDMP)/Marine Corps planning process
(MCPP) . Many intelligence requirements are generated because ofiPB and its interrelation with
the MDMP/MCPP.
• Support situation development-a process for analyzing information and producing current
intelligence concerning portions ofthe mission variables of enemy, terrain and weather, and civil
considerations within the area of operations before and during operations. (See ADRP 1-03.)
Situation cjevelopment-
• Assists the intelligence staff in determining threat intentions and objectives.
• Assists in confirming or denying courses of action (CO As).
• Provides an estimate of threat combat effectiveness.
• Support plan requirements and assess collection by contributing to the analysis of information
requirements, the identification of intelligence gaps, and the determination of assets to satisfy the
requirements. (See ATP 2-01 and MCTP 2-IOA.)
(MAGTF) intelligence centers (M!Csf or combatant commands. The following includes other sources of
information: ·
• Supporting and supported combatant commands' joint intelligence operations centers.
• Theater army/Marine expeditionary force (known as MEF) intelligence staffs.
• National Ground Intelligence Center or the Marine Corps Intelligence Activity (MCIA).
• Other intelligence community members described in chapter 2.
Note. (U) Higher echelon units that provide reach support should maintain an understanding of
those units moving into and out of the supported combatant command's area of responsibility, and
engage them, as necessary, to provide OSINT reach support. ·
I -17. (U) Figure 1-1 illustrates intelligence reac;h relationships among regional communities of interest.
Forces regionally aligned with a given combatant command reach forward to projected receiving combatant
commands and back to national-level agencies. Regional communities of interest include-
• Region.al combatant commands, their associated theater armies, and regionally aligned .l\11
brigades (theater).
• The national-level intelligence community, which provides support through the-
..
• Open Source Enterprise .
National Groun~ Intelligence Center .
• National Geospatiai-Intelligence Agency .
• Defense Intelligence Agency (DIA) .
• National Security Agency.
• Special operations community personnel who collect open-source information through the
appropriate authorities.
UNCLASSIFIED
SOUTHCOM CENTCOM AFRICOM PACOM EUCOM NORTHCOM USFK SOC OM
USARSO USARCENT USARAF USARPAC USAREUR USARNORTH 8th ARMY USASOC
470th Ml BDE 513th Ml BDE 207th Ml BDE 500th MIBDE 66th Ml BDE 505th Ml BDE 501st Ml BDE SFG
UNCLASSIFIED
Figure 1·1. (U) Intelligence relationships among regional communities of interest
1-18, (U) Figure /-2 illustrates internal and external Marine Corps intelligence relationships:
• Marine expeditionary forces and M!Cs.
• Regional combatant commands and their assoc:iated Marine Corps Service comportent commands.
• The national-level intelligertce community, which provides support through DJA and MCIA.
UNCLASSIFIED
tt~·
T
'
~
· · ·\...:
Combatant Commands
' • • ·• ..c.
.
.
. ot.
Defense Intelligence Agency
. ..Jy
.
,
.....
I
I
I
I
.
~t
) I
.~:
I
·-- .
w.: I
T T
Marine Corps Serv Marine Air-Ground Task Force
Component Commands Intelligence Centers
.._
-+-•
''
•• ....
.....I.
~ .....(--·
. I
.. •
.
16
Open-Source Intelligence (OSINn Overview (U)
(b) (3)
PROCESSING, EXPLOITATION, AND DISSEMINATION (U)
1-22. (U) Executing effective OSrNT requires resourcing, planning for, and preparing specific OSfNT PED
capabilities. OSlNT PED capabilitie~ can be organic to the intelligence unit, task-organized or attached to a
supponed unit, or distributed from a centralized location through the network as required. Units can execute
PED using expeditionary and reach iechniques. At the basic level, the intelligence warfighting function
observes details about the threat and relevant aspects of the operational environment. It collects data-
processed and exploited into useable information.....:..for analysis and production that results in intelligence.
Army doctrine has tong recognized the functions of processing, initial analysis, and reporting, as well as the
requirement to provide combat information, ·
1-23. (U) Expeditionary PED is the deployment of lailored formations of tactical, operational, and/or ·
strategic intelligence Soldiers/Marines and enablers to support commanders. Expeditionary PED may be
necessary when-
• Infrastructure is underdeveloped.
• Emerging technologies are employed.
• Continuity of operation plans is required .
• Reach capabilities cannot support high-priority, time-sensitive requirements.
1-24. (U) Reach PED is conducted from sanctuary locations. It leverages a robust communications
infrastructure and pooled resources to provide multidiscipline intelligence PED support to deployed
commanders. Reach PED reduces the number of forward-deployed Soldiers/Marines by shifting PED
functions to dedicated centers within the United States or other theater locations. Reach PED depends on
assured communications to maintain uninterrupted mission support.
1-25. (U) OSINT PED includes the activitie:~ necessary to process infonnation into a useable fonn for
ingestion into the intelligence process or for dissemination as combat information. For example, OS TNT PED
may ·include the translation of foreign language material into English {a useable fonn) for use during IPB.
Advanced processing may involve digitizing, transcribing, and translating non-English graphics, recordings,
and text documents into English-language text fonnat. Language-based processing activities require
procedures and management to ensure transcripts and translations are timely, accurate, complete, and free of
bias. Continuity of operation plans, commanders' requirements, and architecture limitations may require
simultaneous employment of expeditionary and reach PED elements, For example, geospatial intelligence
PED may be conducted through expeditionary means, while OS TNT PED may be conducted through reach
to the M1 brigade {theater) or DIA.
17
Chapter 1
capitalizes on the principle of unity of command and supports the establishment and maintenance of tempo.
The six steps consist of problem framing, course of action development, course of action war game, course
of action comparison and decision, orders develop1'nent, and transition (MCRP I- I 0. 2).
Note. (U) Tenets of the MCPP include top-down planning, single-battle concept, and integrated
· planning. (See MCWP 5-l 0 for more information on the MCPP.)
1-28. (U) Upon receipt of the mission or in anticipation of a new mission, commanders and staffs begin the
MDMP. During step 1, OSINT is used to generate intelligence knowledge and assist in identifying gaps
addressable by open-source information. Immediately following receipt of the mission, the commander and
staff begin mission analysislproblemframing, the second step/first step of the MDMPIMCPP. Commanders
and staffs analyze the relationships among the mission variables (mission, enemy, terrain and weather, troops
and support available-time avail~ble and civil considerations [METT-TC]Imission, enemy, terrain and
weather, troops and support available-time available [METT-T]), seeking to gain a greater understanding of
the--
• Operational environment, the threat, and operational variables (political, military, economic,
social, information, infrastructure, physical environment, and time [PMESII-PT]/political,
military, economic, social, iriformation, and infrastructure [PMES!I}).
• Higher commander's desired end state.
• Mission and how it is nested with the higher headquarters' mission.
• Forces and resources available to accomplish the mission and associated tasks.
1-29. (U) Throughout the MDMPIMCPP, various staff elements use open-source information to perform
open-source research to support nonintelligence activities (for example, to prepare functional area-specific
running estimates, papers, briefings, plans, and orders). Intelligence analysts use open-source information to
collect intelligence in· order to produce products that assist the staff in updating its running estimates and
producing initial assessments. The intelligence staff atso conducts OSINT activities to answer specific
intelligence requirements. Major intelligence contributions to mission analysis occur as part ofiPB.
(U) This chapter describes the framework for the organization of OSINT assets to
enable commanders and staffs to leverage OSINT capabilities to address specific
intelligence requirements.
Note. (U) Neither brigade combat teams (BCTs)/MAGTFs nor battalions have assigned OSINT
positions. Positions assigned to a task-organized OSTNT cell come from those within the unit.
UNCLASSIFIED
:
;
Section Leader .'
.. .· . · ·- . · .
Requirements .
Manager
• :,r ·- . . ,..,. r o • .. -\
I I
Situation Target
Development Development
Analyst Analyst ;
. ~ .- .. -~. . . ...... ... . . - -.
UNCLASSIFIED
Figure 2-1. (U) Brigade combat team OSlNT cell example
(b) (3)
• Integrates information received on threat intentions, objectives, combat effectiveness, and
potential missions.
20
OSINT Structures (U)
I (b) (3)
Target Development Analyst (U)
UNCLASSIFIED
; ·,
OS INT OS INT
Officer in Charge ,.
1-
I Subject Matter '
Expert
·- ... .. . I .. .. - -
I
:
OSINT
Chief .-
;
. .. f.
'l
~ '
I I
OSINT
Analyst
I
( OS INT
CoHector
'
I
I·
~ .
...... - · ... . - , . .. . . . (
'· "
, - .~ .
UNCLASSIFIED
Fig ure 2-2. {U) Marine-air ground task force inteJJigence center OSJNr_ce/1 eKample
21
Chapter 2
2-21, ~ The number of OSJNT pr~~etitioners is based on intelligenco requirements, the 111ission, Wld
the federation of OSINr requirements or !eve! of suppon provided through reach (such as the MI brigade
to
[theater]). The OSINT collection activity requires the unit have the following:
· • Required intelligence oversight · • Risk assessment, OPSEC assessment, or
mechanisms. both.
• An OSINT training and tradocraft strategy. • . Collection plan.
• Appropriate security classification guides.
' UNCLASSIFIED
I
Situatlo~
!
Target
I
Target
I 1
J J
I f,.
Development and Development and i
Development and .I
i Linguist Linguist
Production .·. Production Production
l !. (
Analyst : Analyst \
Analyst '
.. . . " · . - . .. - .·. ... -~ .· ~ -' . l
-. '
; •. . •' , ...
__ l
UNCLASSIFIED
Figure 2·3. (U) Division and above/Major subordinate commandOSINT cell example
23
Chapter 2
24
OSINT Structures (U)
• Coordinates with the Army Chief Information offi~er/Deputy Chief of Staff, G-6 for unique
nen.,.ork requirements to support OSrNT activi ties.
• En~ures U.S . Army intelligence elements conduct OSINT activities in compliance with U.S . law,
the Director of National Intelligence, DOD,. and Anny policies, guidelines, and restrictions,
particularly those regarding intelligence oversight rules and procedures.
U.S. ARMY INTELLIGENCE AND SECURITY COMMAND, ARMY OSINT OFFICE (U)
(b) (3)
(b) (3)
~ --- --- -
25
Chapter 2
• (U) Submit requests for OSJNT informa~ion through I (b) (3) I to deconflict existing
requirements and products and post new unit requests as needed. Anny commands with available
intelligence Wlalysis capacity and a mission to conduct analysis activities in support of the
intelligence communi , ·ooo, or other Army intelligence requirements are encourage1:l to
routinely review (b) (3) and provide
answers where possible. The (b) (3) and Headquarter5, JNSCOM manages
Army accounts.
26
PART TWO
Chapter 3
Plan and Direct (U)
(U) The plan and direct step of the intelligence process closely corresponds with the
plan activity of the operations process. The plan and direct step starts well in advance
of detailed planning. It includes activities such as open-source collection, intelligence
reach, and analysis. These activities produce the initial intelligence knowledge about
the operational environment. After receipt of mission, intelligence analysts prepare
planning products for the commander and staff for orders production and execution of
operations. OSINT products support the plan and direct step by attempting to provide
a context for understanding classified information. OSINT products may also reduce
large target sets by quickly filling information gaps and allowing the efficient use of
low-density intelligence collection assets.
Chapter 3
. .
• Is expressed in terms of describe, visualize, and direct.
• Provides the cornerstone of guidance used by OSINT practitioners.
• Validates intelligence and information requirements.
3-3. (U) Commander's critical information requirement is an information requirement identified by the
commander as being critical to facilitating timely decision making (JP 3-0). CCIRs comprise two types of
requirements: .
• Priority intelligence requirement is an intelligence requirement, stated as a priority for
intelligence support, that tbe commander and staff nee'd to understand the adversary or other
aspects of the operational environment (JP 2-0 I).
• Friendly force information requirement is information the commander and staff need to
understand the status offtiendly force and supporting capabilities (JP 3-0).
3-4. (U) Open-source information is used to answer specific information requirements developed during
planning requirements and assessing collection (see ATP 2-01 and MCTP .2-JOA) and IPB (see
ATP 2 01.3/MCRP 2-JOB.J). The collection of open-source information is a means to analyze mission
variables (METT-TCIME1T-1) and operational variables (Prv!ESII-PTIPMES/1) . .
Note. (U) OSINT cannot eliminate all unknown aspects or uncertainties that concern command~
and slllffs. During planning, the intelligence swff fills gaps with reasonable assumptions. Upon
filling gaps with collected information, the intelligence staff develops databases -at the unit level
to_make the irormation readily available. Analysts should routinely review requirements through
[ (b) (3) since information to answer their requirements may exist. This reduces the number
of new. requests for information (RF!s) from subordinato units or organizations. ·
(b) (3)
· Nore. (U} The amount of classified information produced on any r e topic con be limited and
taken out of context if ~iewed from a. solei classified perspective. _____j~?._) _ __ _ _I
(b) (3) This strengthens the credibility of OSINT
products that support all-source intelligence. OSJNT validation provides the ability to cue other
ess ets, thus enhancing accuracy and precision.
29
Chapter 3
3-11. (U) Determining the open-source collection technique involves deciding the most effective way to
acquire open-source information. The extent to which open-source collection yields valuable information
varies greatly with the nature of the target and the subject involved. Collection techniques, depending cin
operation complexities, can enhance the chances of satisfYing intelligence and information requirements.
3-12. (U) Research and collection on the internet require a risk assessment. The result ofthe risk assessment
affects the techniques used for conducting OSINT activities. While portions of the internet that are publicly
available may be open-source, knowledge of the techniques used to collect the information may cause the
targeted individual, group, or nation to block, change, deceive, or turn off the source. Thus, techniques used
for collecting open-source information must be addressed in the risk assessment.
3-13. (U) Collection requires access to the internet to acquire PAL OSINT practitioners apply the intelligence
process to open-source information to produce a product and populate intelligence resources. Units can
contact the AOO to identify requirements for PAl and open-source data and data sources. The AOO provides
approved enterprise capabilities, resources, and solutions.
a ows econ tct10n wt exts mg requtrements an answers. ew umt- eve s are a e as nee e .
with intelligence analysis capacity and an authorized mission are encouraged to routinely review
requirements relevant 'to their area(ofoperations inl (b) (3) land produce OSINT answers where possible.
Us in~ (b) (3) !allows users to understand the scope of current OSINT activities in the DOD intelligence
enterprise as well as obtain answers to the following:
• Who has requirements? • Who needs additional commercial data
• Who is answering requirements? sources and what sources are needed?
• What requirements are answered? • Who can provide those commercial data
sources?
• Who else has similar requirements?
:IOSINTse(bY(3"}"'de
I
• Understanding of the supporting OS INT community of interest.
• Possible co-location of unit OSINT analysts with established. OSINT organizations or leveraging reach
support from military intelligence (MI) brigades (theater), corps/expeditionary Ml brigades.
• OS INT training and tradecraft. Review Foundry , Open-Source Tradecraft Division, and the Academy
for Defense Intelligence for appropriate OSINT offerings, including those related to-
• Operations security.
• Intelligence oversight.
• Basic OSINT tradecraft .
• Advanced OSINT tradecraft.
• Account access requirements. Contact the Army OSINT Office (AOO)fMC/A or the supported
combatant command :
:1 (b) {3)
• Secure web browsmg .
I
• Information collection plan.
• Co-location of unit OS INT analysts with established OS INT organizations or leveraging reach
support.
JWICS Joint Worldwide Intelligence Communications System
SIPRNET SECRET Internet Protocol Router Network
UNCLASSIFIED
~~~----~ (b~)~(3~)~------~l .
• Army intelligence components must obtain approval from Headquarters, lNSCOM; a national
intelligence agency; a combat support Rgency; or supported combatant command before
acquiring managed attribution capabilities.
• Intelligence personnel complete !!Ilnual OPSEC training as well as training in managed
attribution.
3-21. (U) Since collection focuses on answering intelligence requirements, protection of both the type or
duta collected and the source from which it is collected is a priority. For example, if a local newspaper or the
threat realizes that friendly forces are using the newspaper to develop intelligence, the threat may deny access
to the newspaper or manipulate the information it contains . This situation could make friendly forces a
deception target or put them at risk by denying them information. Protection of OSINT sources includes
32
Plan and Direct (U)
discrete use of the sources .to prevent denial of access to the sources. The AOO can support unit requirements
to identify and mitigate online risk while conducting OSINT activities.
3-22. ~U~ Personnel who have accessed websites in a risk management Ievell capacity may not acc.ess
those same websites using personally owned electronic devices for the purposes ofOPSEC. This restriction
does not apply to accessing commercially or publicly owned news media websites (such as CNN or ABC
News). The use of the internet for purely personal interests, which include academic research and news
information or subscriptions, is no t an OSINT activity.
3-23. (U) Reading classified information and then go ing to the internet to conduct searches on open-source
information based on the classified information may alert the target of friendly force interest. Knowing where
friendly forces seek information may cause a target to change its behavior or place a classified source at risk.
In some cases, this knowledge may endanger mission accomplishment or Soldiers'!Marines' lives. For this
reason, it is important to obtain a current OSfNT classification guide and perform a risk assessment regarding
OSINT collection.
Note. (U) An OSINT practitioner must be aware that collection of a classified document on a DOD
NlPRNET workstation constitutes a security violation.
3-25 : (U) The exploitation, processing, and analysis of information holdings may increase the classification
level. For example, two unclassified facts, when combined, could increase the classification of infonnation
obtained. Furthermore, an OSINT practitioner must be aware that combining site searches may give away
information about PIRs. All personnel performing OSINT activities must possess the appropriate security
clearance and access.
3-26 . (U) Units under the operational command of a combatant command are required to use the combatant
command security classification guidance. If there is no security classification guidance relevant to open-
source information, information should be unclassified, controlled unclassified, and releasable to foreign
partners for official use to the extent possible. However, there are several circumstances for which this
infonnation may or must be classified and/or not releasable . Security classification must be determined by
judiciously considering all applicable elements- particularly the loss of a source of information or harm to
an operational mission should the source be improperly revealed ,
.---~-------------- - -----------------------
COORD1NATlON (U)
(b) (3)
3-28, (U) The collection of open-source information requires coordination with higher and adjacent units to
ensure the open-source collection effort is not redundant. Routine deconfliction of open-source collection
allows units to focus on infonnation specific to tbeir area of operations.
3·29. (U) During planning, the intetligence and operations staffs ensure the synchronization of OSTNT tasks
with the scheme of maneuver (especially the scheme of information collection) and the scheme of
intelligence. Acquiring open-source infonnation may compromise the operations of other intelligence
disciplines or tactical units. Open-source collection that is not synchronized may result in redundant tasking
of collection assets and the improper use of forces and equipment, Redundant til.'! king may adversely affect
the ability of nonintelligence organizations, such as civil affairs, military police, and public affairs, to
accomplish their missions and tasks. Conversely, obvious oontact with an open-source by nonintelligence
organizatioJtS can compromise OSJNT tasks and lead to the loss of intelligence.
I (b) (3)
3-33. (U) Normally, collecting open-source information does not require direct observation of activities and
conditions within the area of operations. However, some situations may require collection from secondary
sources, such as government press offices, commercial news organizetions, end nongovernmental
organization spokespersons. These sources can intentionally or uninlcntionall d delete modi ·
omerwise filter the information released to the · ublic, 1 (b) (3
~~--------------~
(b) (3)
It is important to know the
'-.:-::c::r.:gro
= u=nc:r-:o:-r:o=p=en=-=-so=-:u-:-:r=ce=-:s=-11=-=n:-:r.t<=-
e-'pf:
::.u-=' e -=o-:zr£ith=ec-:·p=-=u:-.:b,.i'=c-.-
rp=-'o==s=-: " in::-.fi'io-=
:: rm k.nowledge assists 11naly sts in
=at"lo=-=n=-.--...r:-ris:-T
identifying objectives and factual infonnation, identifying bias, and highlighting deception efforts agsirut the
local audience as well os the overall operation. It would be of great value if a linguist had insight into cultural
normalcies and identifying propaganda.
34
Plan and Direct (U)
COPYRIGHT (U)
3-34. (U) When preparing OSINT products. intelligence personnel must consider intellectual property rights.
Copyright is a form of protection, for published and unpublished works, provided by Title 17, ·united States
Code (USC), to authors of original works of authorship, including literary, dramatic, musical, ·and artistic
works. Intelligence personnel using copyrighted material for which permission from the author has been
obtained cite the source of the material.
3~35. (U) There is considerable data available on the internet protected by copyright law. OSINT
practitioners need to be aware of information protected by copyright and ensure their collection does not
vi.olate the ownership of the information. Intellectual property is considered any creation of the mind,
including but not limited to-
• Musical works and compositions. • Inventions.
• Artistic displays. • Words or phrases.
• Discoveries. • Symbols and designs.
3-36. (U) It is illegal to violate the rights provided by the copyright law to the owner of copyright. One major
limitation is the doctrine affair use, which is given a statutory basis in Section 107 of the 1976 Copyright
Act (Section I 07, Title 17, USC). According to the U.S. Copyright Office, fair use of a copyrighted work for
purposes such as criticism, comment, news reporting, teaching, scholarship, or research is not an infringement
of copyright. The use of copyrighted work in intelligence products falls into the category of fair use for
scholarship and research. Fair use information should include attribution citations in intelligence products
referencing organizations or authors and the originating source title and date. The four factors in determining
fair use include-
• Purpose and character of the use.
• Nature of the copyrighted work.
• Amount and substantiality of the portion used in relation to the copyrighted work as a whole.
• Effect of the use upon the potential market for or value of the copyrighted work.
3-37. (U) Questions for determining whether copyright permission is required or fair use applies should be
directed to the local staff judge advocate or other legal counsel. If it is reasonably believed that the material
will be publicly released, a written legal opinion by "the supporting staffjudge advocate or other legal counsel
is required. ·
3-38. (U) AR 27-60, DOOM 5240.01 and DOD 5240.1-R prescribe policies and procedures for the
acquisition, protection, transfer, patent usage, copyrights, and trademarks of intellectual property. Army and
Marine C01ps policies recognize the rights of copyright owners, consistent with missions and worldwide
commitments. OSINT practitioners will not produce or distribute copyrighted works without the permission
of the copyright owner unless such use is authorized under U.S. copyright law. There is also a requirement ·
for OSINT practitioners to forward the material to be published publicly outside of intelligence organizations
to the Army Judge Advocate General's Corps/Marine Corps Judge Advocate Division for approval and
waiver of notice to the copyright holder, if necessary, for OPSEC. (For more information on copyright laws
and applicability, access the U.S. Copyright Office website on NIPRNET or contact the local staff judge
advocate office.)
LINGUISTS (U)
3-39. (U) The collection of open-source information often requires. linguists or foreign language translation
capabilities or both. Local nationals are often . the best source of linguists able to translate collected
information correctly and in the proper context. All locar nationals used for open-source collection niust be
vetted thoroughly for OPSEC reasons. (See FM 2-0 for information on language support; AR 11-6 for policy
on evaluation and reevaluation of linguist proficiency; and MCO 1550.25A for iriforrnation on the Marine
Corps Foreign Language Program.)
Chapter 3
J-40. (U) The ability to colle~;t and' analyze foreign material is critical in OSINT exploitation. The effective
use and employment oflingu ists, both civilian and military, facilitate this activity. The tasks for which foreign
language skills and knowledge proficiency are most critical include-
• Transcription. Both listening and writing proficiency in the source language are essential for an
accurate transcript. A transcript is ex1remely important when the transcriber's English-language
skills are inadequate for authoritative or direct translation from aud io or video into English text.
• Translation. Bilingual competence is a prerequisite for tr!I.!Ul.lations. Translators must be able~
Read and comprehend the S?urce l1111guage.
Write comprehensibly in English.
Choose the equivalent expression in English that fully conveys and be.st matches the meaning
intended in the source language. ',
• Interpretation, Interpretation is a specific skill. Not all linguists are trained to perfonn it.
Bilingual competence is a prerequ isite for interpretation. Interpreters must be able to-
• Hear and comprehend the source language.
• Speak comprehensibly in English.
• Choose the equivalent expression in English that fully conveys and best matches the meaning
intended in the source language.
36
Chapter 4
Collect (U)
(U) There ar.e several means of collecting open-source information during OSINT
collection activities. Intelligence personnel should take advantage of these deep and
important open sources of information. The employment ofOSINT resources to collect
from intelligence requirements varies by echelon. However, using search techniques is
fundamental to OSINT collection and can be implemented in any unit. Exploiting
media sources, using s.earch engines, and collecting infonnation specific to rhe
operational environment should be standard operating procedures (SOPs) for any
OSfNT ceiL These collection procedures should be planned and implemented the same
way as those for any other intelligence discipline.
Note. (U) Staff personnel also acquire PAI from open sources that is incorpornted into the running
estimate and used during IPB,
4-3, (U) Analysts conducting OSINT activities perfonn several tasks to establish duties and maintain focus
an requirements. The following include examples of tasks perfonned by OSI'NT cells:
• Monitoring operatloll.!l. This task ensures responsiveness to the current situation and assists the
cell in anticipating future col\ectian, .proeessing. reporting, and synchronization requirements.
· • Collect information from publicly available open sources.
• Perform source validation and report screening. Information is verified and validated b!i!ied on
PTRs and the commander's guidance. This action ensures pertinent 11!1d relevWlt information is not
overlooked. lnformation to be: analyzed is screened first to reduce the volume to a workable size.
Validotion should encompass the .clements of timeliness, completeness, and relevance to satisfy
intell igencc requirements.
• Disseminate Intelligence products Qnd information. OSINT products, information papers,
executive summaries, and country studies are disseminated to customers via ruch means as email,
M3 messaging system,! (b) (3) I·
• Cue. OSTNT cueing from other intelligence disciplines' information collection assel:3 improves
the information collection effort. Cueing enables the use of a multidiscipline approach to confirm
or deny information by another information source, collection organization, or production activit)'.
It also keeps organizations abreast of emerging unclassified in rormation and opportunities.
37
Chaptar4
•! (b) (3)
Note. (U) Information and intelligence. requirements that require confidential sources are not
assigned to OSINT cells. Confidential sources consist of any persons, groups, or systems that
provide information with the expectalion that the: information, relationship, or both are prott:"cte<l
against public diSG!osure.
38
- - -- -
Collect (U)
Note. (U) Table 4-1 does not illustrate an aJI-inclusivll list of opon~souroe media types but rather
the categories of open-source media to consider when collecting OSINT. ·
39
Chapter 4
4-17. (U) rntelligenco prof~ssionals · directly accessing open-source information to satisfy specific
intellig~nce reguiremcnts arc conducting Wl OSTNT activity. All OSlNT activities must be supported by an
officially approved collection plan. An intelligence professional is prohibited from creating or using a
personal socin.l media account when conducting OSINT activities and will not create a false persona.
Engagement (for example conversing, exchanging information) witll individuals or personas is an interactive
activity not authorized under OSINT authorities.
41
This page intentionally left blank.
Chapter 5
Produce (U)
(U) Intelligence professionais produce the intelligence resulting from open sources and
integrate it into the larger holdings of intelligence data. OSINT, as with all intelligence
disciplines, produces specific products as its contribution to intelligence production.
The goal of these products is to provide timely and accurate intelligence that answers
an intelligence requirement.
DIGITIZING (U)
5,4, (U) . Documents collected from the internet using enterprise tools and practices do not require
digitization. For physical documents, personnel create a digital record of documents by scanning or taking
digital photographs. Pertinent information about the document must be annotated to ensure accountability
and traceabi'lity. Digitization enables dissemination of a document to external databases and organizations.
It also aHows the use of machine translation tools to screen documents for keywords, names, and phrases.
5"6. (U) A translation is not verbatim but an approximation of the literal and implied meaning of th~
forei n langua e, (b) (3)
(b) (3) {See paragraphs 3-40 through 3-42 for more in nnat1on on trans auon an
machine language translation.)
5·7. (U) During processing, a linguist creates either an extract, a summary, or a ru!l translation of the
original document or transcript into a standardized format established by unit SOPs. The linguist uses onl ine
dictionaries, gazetteers, working aids, and software to improve the translation. Once completed, the
translation is sent to a quality control linguist. ·
REVIEWING (U)
5-8. (U) Linguists perform quality control reviews of each transcription and translation to ensure both
quality and consistency with established unit SOPs. A U.S, Government or milirery linguist should review
all information lhat a non-U.S. Government linguist processes, with exceptions involving long-term
muftinational partners of the United States and U.S. contractors with the requisite skills and the confidence
of the command. Linguistic quality control is an important facet of processing foreign open-source
information. Each tran.Kription and translation undergoes two levels of review:
• Quality control-a qualified linguist ensures the transcription or translation is accurete, complete,
free of bias, and in aCCQrdance with reporting and dissemination standards. The t:.S. linguist
returns the transcript or translation fur correction, adds or corrects missed content, or corrects
minor format errors, Upon completion of quality control, the transcription or translation is
availab!'e to use in OSINT production.
• Quality assurance-a qualified U.S. linguist or OSINT analyst reviews the transcript or
translation to ensure it contains all required information and reuds naturally in English. Once
reviewed, the completed transcription or translation is saved to internal datll.bases and available
for further use.
44
Produce (U)
Note. (U) It is often difficult to distinguish primary from secondary sources since both are
subjective. A primary source is not necessarily more of an authority or better than a secondary
source. For any source, primary or secondary, it is important for OSJNT practitioners to evaluate
the information for deception and bias.
45
Chapter 6
5- 16. (U) When accessing a website, OSI'NT practitioners should consider the-
I
I_
-····-- ------ - - - - · - ----- ----~---~-- .-·-
46
Chapter 6
Disseminate (U)
(U) Commanders must receive combat information and intelligence products timely
and in an appropriate format to facilitate situational understanding and support decision
making. Timely dissemination of intelligence is critical to the success of operations.
Effective dissemination is deliberate and ensures consumers receive the intelligence
they need to conduct operations.
DISSEMINATION (U)
6-1. (U) Intelligence and information requirements satisfied through open-source information should be
reported immediately, as specified in unit SOPs. Reporting and dissemination are not synonymous. The
disseminate step does not include the passing of information through normal reporting and technical channels
by intelligence organizations and units during the intelligence process. Rather, it involves the passing of
products based on intelligence analysis to users requiring that intelligence. (See ADRP 2-0 and MCDP 2.)
6-2. (U) OSINT products provided to other intelligence and operational elements facilitate all-source
intelligence, targeting, and cueing of other collectors.
Note. (U) Close cooperation between OS TNT practitioners and other staff members who collect
open-source information fosters a supportive environment about what and how to report
information of potential operational or intelligence value through the proper channels.
6-3. (U) OSINT must be timely, accurate, and properly disseminated to commanders and other customers
in a useable form . Disseminating OSINT products includes but is not limited to incorporating the products
into-
• Single discipline or multidiscipline estimates or assessments.
• Statements of facts.
• Evaluations of threat capabilities and limitations.
• Threats' likely COAs.
6-S. (U) The basic standards for reporting and disseminating information are-
• Timeliness. Information should be reported to affected units without being delayed for the sole
purpose of ensuring the correct format.
• Relevance. Information must contribute to answering intelligence requirements. Relevant
infoi:JTiation reduces collection, organization, and transmission times.
o Complet~ness. Using prescribed formats and following SOPs contribute to the completeness of
transmitted information.
,:
· (U) Open-source information covers a wide range of areas. Exploring, assessing, and
collecting PAl and information from open sources has the potential to adversely· affect
organizations that conduct OSINT missions. As with all intelligence activities, OSINT
activities must comply with intelligence oversight law, policy, and regulation. For the
Army, the AOO, in coordination with tl:le U.S. Anny Forces Command, ensures
intelligence collection authority and appropriate mission orders are documented for
U.S. Army Forces Command units provisioned with AOO OSINT capabilities.
Note. (U) EOs, Army regulations, Marine Corps policies, a!ld guidance change frequently.
Appendix A discusses the legal restrictions and regulatory limitations at the time of this writing.
It is imperative that readers ensure adherence to the most recent laws and regulations.
• Monitor the development, procurement, and management of tactical intelligence systems and
equipment and conduct related research, development, and test and evaluation activities.
• Conduct MI liaison relationships and MI exchange programs .
.·
INTERPRETATION AND IMPLEMENTATION (U)
A-5. (U) AR 381-10 and MCO 3800.2B interj,ret"and implement EO 12333 as amended and DOD 5240.1-R.
DODM 5240.01 is the most current guidance on intelligence oversight. AR 381-10 and DODM 5240.01
enable the Army intelligence community ·to perfonn authorized intelligence functions in a manner that
protects the constitutional rights of U.S. persons. However, the regulation does not authorize intelligence
activity. An Army intelligence unit or organization must have the mission and the authority to conduct any
intelligence activity, and particularly those directed against U.S. persons. Anny intelligence personnel
operating under the authority ofTitle 10, USC, or Title 50, USC, must comply with the Posse Comitatus Act
(Section 1385, Title 18, USC) and have prior approval by the Secretary of Defense when involved with
civipan law enforcement.
• Information that only temporarily passes through a computer system of the Component.
• Information on the internet or in an electrol)ic forum or repository outside the Component that is
simply viewed or accessed by a Component employee but is not copied, saved, supplemented, or
used in some manner.
• · Information disseminated by other Components or elements of the Intelligence Community.
• Information that is maintained on behalf of another U.S. Government agency and to which the
Component ~oes not have access for intelligence purposes ..
A-I 1. (U) Action must be taken to demonstrate the intended use of the collected information, such as
producing an intelligence information report, incident report, or adding the information to an intelligence
database. There must be a link between the collection of the U.S. person information and the intelligence
agency assigned mission. This link is particularly important when dealing with PAl, open-source information,
and information data exploitation. ·
A"12. (U) Army intelligence· components may collect U.S. person information by lawful means; however,
collection must be limited to the least intrusive means feasible and shall not violate the law. (See
DODM 5240.01.) The least intrusive means must be attempted before requesting or utilizing more intrusive
collection means. b 3
•
•
•
•
A-13. (U) Within the United States, foreign intelligence concerning U.S. persons may be collected only by
overt means, unless all of the following conditions are met: ·
•
•
•
•
A-14. (U) AR 381-10 does not authorize the collection ofany information relating to a U.S. person solely
because of personal lawful advocacy of measures opposed to government policy. The rules in EO 12333 as
amended and AR 381-10 protect U.S. persons' rights und'er the.First Amendment to the Constitution of the
United States.
(b) Collection about a person reasonably believed to be outside the United States. A defense
intelligence ·component may intentionally collect information about a person or object that, at the
time of collection, is outside the United States or about" a place outside the United States. If a ·
component does so and incidentally may have collected U.S. person information about a person
other than the subject of intentional collection, the component may, subject to Paragraph
3.3.c.(5)(b),retain all of the incidentally collected information for evaluation for up to 25 years.
A-17. (U) Other information retained by Anny intelligence components must be reported for oversight
purposes and for necessary subsequent proceedings.
A-18. (U) Access to U.S. person information retained in intelligence files, databases, an:d repositories is
limited to those with a need to know the information. U.S. person information in intelligence files, databases,
and repositories is retained in accordance with disp(Jsition criteria in AR 25-400-2. Intelligence components
will review intelligence files and databases annually. Intelligence components will specifically review U.S.
person information to ensure its retention is still necessary to an assigned function. This ensures the
information is not held beyond established disposition criteria, is retained for an authorized function, and was
not retained in violation of this regulation. This does not apply to the Investigative Records Repository or
other authorized long-term records holding areas.
(b) (3)
QUESTIONABLE INTELLIGENCE ACTIVITY (U)
A-20. (U) Questionable intelligence activity occurs when intelligence operations (in this context, all
intelligence or counterintelligence tasks) potentially violate laws, EOs, Presidential directives, and DOD or
Army policies. ·
A-21. (U) Intelligence personnel should report questionable intelligence activity through the chain of
command, the inspector general, or directly to the Assistant to the Secretary of Defense for Intelligence
· Oversight in accordance with AR 381-10. The following are examples of questionable intelligence activity
regarding improper collecting, retaining, or disseminating of U.S. person information:
• Collecting and gathering information about U.S. domestic groups not comiected with a foreign
power or intemational terrorism.
• Producing and disseminating intelligence threat assessments containing U.S. person information
without a clear explanation of the intelligence purpose for which the information was collected.
• Coll.ecting and gathering U.S. person infonnation for force protection purposes without
determining if the intelligence function is authorized. . .
• Collecting and gathering U.S. person information from open sources without a logical connection
to the mission of the unit."
A-22. (U) AR 381-10 directs intelligence organizations to refer questions concerning the interpretation of the
instructions on collection, retention, and dissemination of U.S. person information to the local staff judge
advocate's office. (For rriore information on EO 12333 as amended and intelligence oversight, access the
DOD Senior Intelligence Oversight Official website on NIPRNET.)
• A corporation incorporated in the United States, except for a corporation directed and controlled
by a foreign government or governments..
A-26. (U) Marine Corps intelligence activities shall be carried out in a manner that protects the
constitutional rights and privacy of u.s.
persons, and shall not request any person or entity to underiake
unauthorized activities.
A-27. (U) Marine Corps intelligence units and staffs can collect, retain, and disseminate intelligence on U.S.
persons, provided they adhere to a very specific set of criteria and restrictions. Information that identifies a
U.S. person may be collected by a Marine Corps intelligence component only ifit-
(1) Is necessary to the conduct of a function assigned to the collecting component.
(2) Falls within one of the 13 categories authorized under DODM 5240. OJ. Extracts of information
categories are provided in MCO 3800.28, Enclosure (2). ·
A-28. (U) Collection techniques authorized by DODM 5240.01 will be limited to those necessary to perform
assigned functions. The least intrusive means of collection will always be the preferred collection method.
A-29. (U) Special considerations exist for intelligence support to command antiterrorism/force protection
programs 'ivithin U.S. territory and/or involving information . regarding U.S. persons. DODM 5240.01
provides specific guidance.
A-30. (U) Intelligence training, or support to unit training, in an off-base domestic civilian environment
demands due diligence to .ensure that not only intelligence personnel but also other key personnel (for example
commanders, controllers, or nonintelligence Marines who may be conducting intelligence activities) are aware
ofintel/igence oversight provisions. Specific guidance is provided in MCO 3800.28, Enclosure (4).
A -31. (U) Use of the internet by intelligence components to conduct intelligence activities presents unique
challenges beyond traditional collection methods. To maximize. the use of the internet while properly
applying the provisions of EO 12333 as amended, intelligence personnel must understand how to analyze.
as well as characterize, information collected via the internet. The DOD Office of General Council (known
as OCG) memo, "Principles Governing the Collection of Internet Addresses by DOD Intelligence and
Counterintelligence Components," dated 06 FebruG/y 2001, addresses internet-based collection activity
against the network (as opposed to network content). Commanders can access the memo on the Inspector
General ofthe Marine Corps website on N1PRNET. ·
B-5. (U) URL information from the previous website visited is frequently an OPSEC issue because it
identifies the user's characteristics and interests. While necessary, the use of specific and.focused·search
terms also has potential OPSEC implications. For example, If the user enters the search terms [bradley us
arn1y}, the referring URL from the search engine would· be: http://www.[search engine
name] .com/search?hl,;,en&q= bradley+us+army. This tells the visited site that the user is searching in English
(hl=en) for information on Army General of the Army Omar N. Bradley or the U.S. Army's Bradley infantry
fighting. vehicle.
e-6. (U) A!l actions on a website are logged and saved. The information is saved and linked to what is .
referred to as cookie data. User actions recorded include but are not limited to-
• Words typed in search parameter fields.
• Drop-down menu choices.
• Che\lk boxes.
• Website movement patterns such as changing domain name or website address.
B-7 ~ (U) On many websites, information that users provide or fill in becomes part of ttie website and is
searchable. Key information to avoid sharing includes but is not limited to-
• Military plans.
• Operations.
• Exercises.
• Maps and chaJ:ts.
• Locations.
• Schedules.
• Equipment vulnerabilities, capabilities, and shortfalls.
• Names and related numbers:
• ·Telephone numbers .
• Birth dates .
• Identification numbers .
B-8. (-FeBeJ Threats, such as regular, irregular, terrorist forces, and criminal elements, are disruptive and
use cyberspace to execute operations against the Army. Often, these threats are innovative, networked, and
technologically adept.. They capitalize on emerging technologies to establish and maintain a cultural and
social advantage, leveraging areas that include but are not limited to mission command, recruiting, logistics,
fund raising, money laundering, information operations, and propaganda.
B-9. (U) Units engaged in OSINT exploitation using computer systems and internet usage should develop
cyberspace awareness assessments. These assessments sho.uld cover areas including but not limited to
network vulnerabilities, network threats (physical and virtual), and future risks. For information about-
• Cybersecurity awareness, access the U.S. Army Cyber Command website on NIPRNET.
• Cybersecurity threats and tips, access the U.S. Computer Emergency Readiness Team's website
on NIPRNET.
• Threat and vulnerability assessments and counterintelligence-cybe~ elements that perform internet
open-source collection and provide support to DOD and Army network and system analysis to
determine OPSEC vulnerabilities, see ATP 2-22.2-l.
Appendix C
FOR OFFICIAL
. i
USE ONLY
30 June 2017 ATP 2-22.9/MCRP 2-fOA.:J C-5
Appendix C
·'
. '
Appendix 0
(U) For Army terms and definitions, (Army) precedes the definition. For Marine Corps
terms and 'definitions, (Marine Corps) precedes .the definition.
78
Glossary (U)
(U)
.
MCRP 2-JOB.l.
. Intelligence Preparation of the. Battlefleld!Battlespace.
. ·' . ..
10.November
.
2014.
.·
(U) MCTP 2-IOA .. MAGTF Intelligence Collection. OJ July 2004.
(U) MCTP 3-20G. Air Reconnaissance. 21 July 2003.
(U) MCWP 5-l 0. Marine Corps Planning Process. 24 August 2010.
(U) SECNA VINST 3820.3E. Oversight of Intelligence Activities Within the Department of the Navy
(DON). 21 September 2005, Available online: http://www.secnav.nayy.mil.
WEBSITES (U)
(U) Inspector General ofthe Marine Corps. http:llwww.hqmc.marines.mil/igmc!
(U) Open Source Enterprise. http://www.opensource.gov/.
(U~ Open-Source Resources. See appendix D of this publication for the list ofwebsites for the open-
source resources.
(U) U.S. Army Cyber Command. http://www.arcyber.army.mil.
(U) U.S . Computer Emergency Readiness Team. http://www.us-cert.gov/.
(U) U.S. Copyright Office. https://www.copyright.gov/.
J
2-22, 2-26, 3-39-3--42
quality controVquallty supporting slt(!tlonal
assurance reviews, 5-6
M
(b)(3) unde~tandi ng, 1-6
OSINT activities: 1-2
open-source Information, '!..J, and classlric:atlon guide, 3-23
macl1ine foreign language and the National Open-Source
1·29, A·11 .
translation, 3-41; 3-42, 5-6 Commtttee and Defense
and OPSEC, 1-5
Marln9 air-ground task forca collection coordination, 3-28- Open-Source Councll, 2-27
(MAGTF), 2-11 , 2-18 . 3-31 Army Chief Information
MAGTF intelligence center (MJC). collection of, 3-4 OHicer/G-6, 2-28, 2-29
"1-16,1-18, 1-19, 2-11 evaluation of, 5.-12, 5-15, 5-16 Army Deputy Chief of Staff,
exploiting via websites, C-14- . G·2, 2-29
major suOon:Jlna/9 command
C-29, tables 0-1-0·15 Arm:; Intelligence components,
(MSC) . Sea OSINT cell. 2-37 .
optlmiling collection, 1-7
MBrintt Corps lnta/1/gence Actfvity procasslng of, 5-3 Army OSINTOffice, 2-30-2-32
(MCIA), 1-16, 1-19,2-33 providing foundation DA liS, 2-34-2-36
Marine Corps intelligence information, 1·7 MCJA. 2·33
component, A-24, A-27, A-31 satisfying requirements, 1-7 performing risk assessment,
Marine Corps Order (MCO) searching via open sources, 3-23
3800.29, A-23 C-6 planning for, 3·6
questionable actiYity, A-32 types, 4-4 requirements to conduct. 3-5
U.S. parson lnformarton, A-24- open-source resources. See search engines es primary
A-31 appendix o tool, C-6, C·7, C-30-C-33
U.S. Army Cyber Command,
MMne expedilionaty force , 1-16, operations 1environment, 1-13, 2-38
1-18,2-17 1-28, 2-38, 3-1
OSINT analyst, 2·11 , 2-15 .
Merine Corps planning process.
See MDMPIMCPP.
86
Index (U)
MARK A. MILLEY
General, United States Army
Chief of Staff
Official :
b6
GERALD B. O'KEEFE v
Administrative Assistant to lhe
Secretery of the Atmy
1718004
ROBERTS. WALSH
b6 J
Lieutenant General, U.S.
Marine Corps
Deputy Commandant
Combat .Development and
· Integration
DISTRIBUTION:
Active Army, the Army Nariona/ Guard, and Ihe United Slates Army Reserwt. Not to be distributed; electronic
media only.
89
PIN: 102813-000
MARINE CORPS.PCN: 144 000278 00